InfoCoBuild

Cybersecurity and Privacy and the Human Factors behind It

By Daniela Oliveira. Society is dependent on networked computer systems and software for everything from running the smart grid that powers your house to social networking with your family and friends. The societal dependency has raised new responsibilities for scientists to develop sound methods and practices to protect computer systems from attack - not just securing systems against lone individuals, but also nation states using computer systems to carry out their political and military agendas ? as well as protect the user against privacy threats created by ubiquitous computer systems. This talk will discuss these challenges from the viewpoint of implementing security across layers of abstraction, and designing systems that protect user privacy and that take into account the social, behavioral and economic implications of security.

Cybersecurity and Privacy and the Human Factors behind It


Related Links
Living in a Cyber-Enabled World
An exploration of the state of software today, how we got to where we are, and what we shall need to do to shore up the foundations of a digital society that is increasingly built on sand.
Privacy in the Internet (without Giving Up Everything Else)
Using the Internet inherently entails privacy risks. Each packet, potentially carrying information that users would rather keep private, is exposed to a network infrastructure operated by a number of third parties the user may not trust and likely cannot even identify.
Computer Viruses
Every so often there is a panic when computers succumb to viruses. The theory behind viruses is rather fun, and shows how bugs can disappear and become impossible to find.
Artificial Intelligence, Cloud Robots, Trusting Technology
As technology advances, a portion of our population cannot help but react with panic. Throughout our human history, as technology grows, so to has our fear as to where this technology will take us.
Cyber Forensics Research
Learn about research that is shaping global policies for digital forensics and redefining what is possible in cyber investigations.
Introduction to Cryptography and Data Security
The lectures give a fairly comprehensive introduction to modern applied cryptography. Topics include: Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA Cryptosystem, etc.