25-06-2012, 12:22 PM
CS G357: Computer Security, Privacy and Usability
Computer Security.ppt (Size: 394 KB / Downloads: 207)
Analysis of HW5: Good Reports
Explains what tools were used
Explains what was found.
Gives specific details without compromising privacy
HW5: Things to avoid
Spending more than a paragraph describing your tools
Giving a few paragraphs of vague generalities talking about what was found.
Listing filenames without any thought as to what might be in the files.
Final Projects
You will need to have groups of two. Justification:
Two people can do a better project than one person.
Group work ethic should prevent some people from leaving this to the last minute.
You can write code, you can do policy, but the best projects will do both.
Uses of Biometrics:
Simple:
Verification – Is this who he claims to be?
Identification – who is this?
Advanced:
Detecting multiple identities
Patrolling public spaces
Why the Interest in Biometrics?
Convenient
Passwords are not user-friendly
Perceived as more secure
May actually be more secure
May be useful as a deterrent
Passive identification