1 balancing security and privacy in times of cyberterror educause western regional conference may 8,...

66
1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE [email protected]

Upload: brianne-barnett

Post on 22-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

1

Balancing Security and Privacyin Times of Cyberterror

EDUCAUSE Western Regional ConferenceMay 8, 2007

Steve WoronaEDUCAUSE

[email protected]

Page 2: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

2

The Internet ObeysOnly One Law

Page 3: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

3

The Internet ObeysOnly One Law

The Law of

Unintended Consequences

Page 4: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

4

or…

Page 5: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

5

Be careful what you ask for…

Page 6: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

6

…you might just get it

Page 7: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

7

Example 1: A Story from the Dawn of (Internet) Time

It all started in 1995 with a simple question:

What’s the best resource for filtering out adult material for K-12 students?

• Net Nanny

• Cybersitter

• Surfwatch

• Cyber Patrol

• Etc.…

Page 8: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

8

Example 2:A Poll on Campaign Finance

Page 9: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

9

Example 2:A Poll on Campaign Finance

Proposition 1:Who are our political candidates taking money from? This should be public information.(Agree/Disagree?)

Page 10: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

10

Example 2:A Poll on Campaign Finance

Proposition 1:Who are our political candidates taking money from? This should be public information.(Agree/Disagree?)

Proposition 2:What political candidates are you giving money to? This should be public information.(Agree/Disagree?)

Page 11: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

11

www.fec.gov

Page 12: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

12

Example 3:Do you want Privacy

or Privacy?

Page 13: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

13

Example 3:Do you want Privacy

or Privacy?

Sorry, you can’t have both.

Page 14: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

14

“You can’t have Privacywithout Security”

Page 15: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

15

“You can’t have Privacywithout Security”

• Privacy: Ensuring that your personal information doesn’t fall into the wrong hands

Page 16: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

16

“You can’t have Privacywithout Security”

• Privacy: Ensuring that your personal information doesn’t fall into the wrong hands• “VA Data Files on Millions of Veterans Stolen”• “Bank of America Loses A Million Customer Records”• “UCLA Warns 800,000 of Computer Break-In”

Page 17: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

17

“You can’t have Privacywithout Security”

• Privacy: Ensuring that your personal information doesn’t fall into the wrong hands• “VA Data Files on Millions of Veterans Stolen”• “Bank of America Loses A Million Customer Records”• “UCLA Warns 800,000 of Computer Break-In”• HIPAA, FERPA, etc.• State and federal data-spill notification mandates

Page 18: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

18

“You can’t have Privacywithout Security”

• Privacy: Ensuring that your personal information doesn’t fall into the wrong hands• “VA Data Files on Millions of Veterans Stolen”• “Bank of America Loses A Million Customer Records”• “UCLA Warns 800,000 of Computer Break-In”• HIPAA, FERPA, etc.• State and federal data-spill notification mandates

• Security: Limiting everyone’s activity to only the things they have a right to see and do• Who is trying to access data (“Authentication”)• Whether they have the right (“Authorization”)

Page 19: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

19

So Whenever Anyone Does Anything Online,

We Want to Know…

Page 20: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

20

So Whenever Anyone Does Anything Online,

We Want to Know…• Who they are

Page 21: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

21

So Whenever Anyone Does Anything Online,

We Want to Know…• Who they are

• What they’re doing

Page 22: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

22

So Whenever Anyone Does Anything Online,

We Want to Know…• Who they are

• What they’re doing

• Why they’re doing it

Page 23: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

23

Identity Management Issues• Single sign-on

• With possible refresh for sensitive transactions

• Network sign-on• No access unless we know who you are• CALEA, RIAA

• Multi-factor authentication• Biometrics

• “Guest” authentication• Hotels; conferences; visitors

• Wireless authentication• Signal leakage

Page 24: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

24

Another Definition of Privacy

• Privacy: The ability to go about your daily life without leaving a trail; the ability to read, speak, attend meetings, etc. anonymously

Page 25: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

25

The Importance of Anonymity

“Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all.”

– Hugo Black, Talley v. California, 1960

Page 26: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

26

Privacy1 vs Privacy2

• Privacy1: Ensuring that your personal information doesn’t fall into the wrong hands. (“Confidentiality”)

• Privacy2: The ability to go about your daily life without leaving a trail; the ability to read (speak, attend meetings, etc.) anonymously. (“Anonymity”)

Page 27: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

27

The Dilemma

Page 28: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

28

The Dilemma• We want to go through cyber-life without

leaving a trail

Page 29: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

29

The Dilemma• We want to go through cyber-life without

leaving a trail• But we want everyone who comes in contact

with our data (and with us) to be identified and monitored

Page 30: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

30

The Dilemma• We want to go through cyber-life without

leaving a trail• But we want everyone who comes in contact

with our data (and with us) to be identified and monitored• Spam• Phishing• Threats• Poison-pen postings• Baseless accusations• Etc…

Page 31: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

31

The Dilemma• We want to go through cyber-life without leaving

a trail• But we want everyone who comes in contact with

our data (and with us) to be identified and monitored

Not Much Different Than• We want everyone to know who the

candidates are getting money from• But we don’t want anyone to know who we

are giving money to

Page 32: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

32

Privacy Can Be Tricky:Consider Chat Rooms

• In general you have no legal “expectation of privacy” in a chat room because you don’t know who else is listening• You’re essentially speaking in public• You have no reason to believe a police officer

(on- or off-duty) isn’t present• US vs Charbonneau

Page 33: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

33

Privacy Can Be Tricky:Consider Chat Rooms

• In general you have no legal “expectation of privacy” in a chat room because you don’t know who else is listening• You’re essentially speaking in public• You have no reason to believe a police officer

(on- or off-duty) isn’t present• US vs Charbonneau

• What are the limitations on government surveillance of chat rooms?

Page 34: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

34

Privacy Can Be Tricky:Consider Chat Rooms

• In general you have no legal “expectation of privacy” in a chat room because you don’t know who else is listening• You’re essentially speaking in public• You have no reason to believe a police officer

(on- or off-duty) isn’t present• US vs Charbonneau

• What are the limitations on government surveillance of chat rooms?• Child molestors

Page 35: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

35

Privacy Can Be Tricky:Consider Chat Rooms

• In general you have no legal “expectation of privacy” in a chat room because you don’t know who else is listening• You’re essentially speaking in public• You have no reason to believe a police officer

(on- or off-duty) isn’t present• US vs Charbonneau

• What are the limitations on government surveillance of chat rooms?• Child molestors• Dissident political groups

Page 36: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

36

The Dilemma• We want to go through cyber-life without leaving

a trail• But we want everyone who comes in contact with

our data (and with us) to be identified and monitored

Not Much Different Than• We want everyone to know who the

candidates are getting money from• But we don’t want anyone to know who we

are giving money to

Page 37: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

37

“Identified and Monitored”• “Government Plans Massive Data Sweep”

• “Feds Get Wide Wiretap Authority”

• “NSA Has Massive Database of Americans’ Phone Calls”

• “Finance-Monitoring Program Amounts to Spying”

• “Police Chief Wants Surveillance Cameras in Houston Apartments”

• “Big Brother Is Listening”

Page 38: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

38

“Big Brother Is Listening”(Daily Telegraph (UK), May 2, 2007)

Hidden microphones that can eavesdrop on conversations in the street are the next step in the march towards a “Big Brother” society, MPs were warned yesterday.

Richard Thomas, the Information Commissioner, said a debate had begun about whether listening devices should be set up alongside Britain’s 4.5 million CCTV cameras.

In evidence to the Commons home affairs committee, Mr. Thomas said he would be hostile to such an idea.

He was also alarmed by the prospect of tiny cameras, hidden in lamp posts, replacing more obvious monitors.

He said it was arguable that surveillance in Britain - which is greater than in any other democratic nation - may already have gone too far.

Page 39: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

39

Why Now?

Page 40: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

40

Why Now?

• Because we can

Page 41: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

41

Why Now?

• Because we can• Technology now makes it possible to collect,

maintain, and process everything you do• Moore’s Law is not being repealed• Brain = 1TB = $500 retail• Gordon Bell: MyLifeBits (10TB)• Library of Congress = 100TB• WORM drives• The Internet Archive• Ray Kurzweil: “The Singularity Is Near”

Page 42: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

42

Why Now?

• Because we can• And so our only limitations are those we choose

to impose on ourselves

Page 43: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

43

Why Now?

• Because we can

• Because we (think we) must

Page 44: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

44

Why Now?

• Because we can

• Because we (think we) must• Why?

Page 45: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

45

Why Now?

• Because we can

• Because we (think we) must• Because it makes law enforcement easier

Page 46: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

46

Law Enforcement and Data

• Specific, focused, temporary• Tap, probe, monitor, investigate what’s needed

to deal with a particular crime or threat

Page 47: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

47

The Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Page 48: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

48

Law Enforcement and Data

• Specific, focused, temporary• Tap, probe, monitor, investigate what’s needed

to deal with a particular crime or threat

• Just in case• Capture all possible information so that,

whenever something goes wrong, we can just play back the tape

Page 49: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

49

Some “just in case” examples

• Toll-gate license-plate photos• No longer needed if the bell doesn’t ring• But very helpful if you want to get a list of possible

suspects for yesterday’s crime

• Metro cards• Paying for your trip• Who was where when?

• ATM cameras• If no robbery occurred, no need to retain• But might have caught a glimpse of a kidnapper

Page 50: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

50

Déjà Vu?• “Homeland Security Monitored Students”

• “…surveillance by the Pentagon … database [of] … military protests and demonstrations at institutions of higher education …”

• “Although there does not appear to be any direct terrorist nexus to the event, a large gathering, especially on a college campus, may gain momentum and create public safety concerns. I do not see an issue of civil liberties being violated, rather proactive precautionary measures being taken by DHS and DoD.” – William H. Parrish, Assoc. Prof. of Homeland Security, VCU

Page 51: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

51

Airport Security TomorrowAirport security chiefs and efficiency geeks will be able to keep

close tabs on airport passengers by tagging them with a high powered radio chip developed at the University of Central London. The technology is to be trialled in Debrecen Airport in Hungary after being in development for two-and-a-half years by University College London as part of an EU-funded consortium called Optag.

Dr Paul Brennan, of UCL’s antennas and radar group, said his team had developed a radio frequency identification tag far in advance of any that had been used to now to label supermarket produce.

People will be told to wear radio tags round their necks when they get to the airport. The tag would notify a computer system of their identity and whereabouts. The system would then track their activities in the airport using a network of high definition cameras.

– The Register (UK), Oct. 12, 2006

Page 52: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

52

Network Authentication Today

• For every bit originating on our campus networks, we have the capability to know who put it there, when, and from where.

Page 53: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

53

Network Authentication Today

• For every bit originating on our campus networks, we have the capability to know who put it there, when, and from where.

• Will we do it?

Page 54: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

54

Network Authentication Today

• For every bit originating on our campus networks, we have the capability to know who put it there, when, and from where.

• Will we do it?

• Why?

Page 55: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

55

Network Authentication Today

• For every bit originating on our campus networks, we have the capability to know who put it there, when, and from where.

• Will we do it?

• Why?

• Who should be involved in the decision?

Page 56: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

56

The Dilemma in Other Words…

“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”

– Benjamin Franklin (1755)

Page 57: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

57

The Dilemma in Other Words…

“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” – Benjamin Franklin (1755)

“While the Constitution protects against invasions of individual rights, it is not a suicide pact.”

– Arthur Goldberg (1963)

Page 58: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

58

“The Constitution Is Nota Suicide Pact”

Page 59: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

59

“The Constitution Is Nota Suicide Pact”

Page 60: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

60

Or…

“Give me Liberty or give me Death!”– Patrick Henry

(Delegate, Virginia, 1775)

Page 61: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

61

Or…

“Give me Liberty or give me Death!”– Patrick Henry

(Delegate, Virginia, 1775)

“You have no civil liberties if you’re dead!”– Patrick Roberts

(Senator, Kansas, 2006)

Page 62: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

62

“The Eternal Value of Privacy”(Bruce Schneier)

The most common retort against privacy advocates is this line: “If you aren’t doing anything wrong, what do you have to hide?”

Some clever answers: “If I’m not doing anything wrong, then you have no cause to watch me.” “Because the government gets to define what’s wrong, and they keep changing the definition.” “Because you might do something wrong with my information.”

My problem with quips like these – as right as they are – is that they accept the premise that privacy is about hiding a wrong. It’s not. Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.

Cardinal Richelieu understood the value of surveillance when he famously said, “If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” Watch someone long enough, and you’ll find something to arrest – or just blackmail – with.

Privacy protects us from abuses by those in power, even if we’re doing nothing wrong at the time of surveillance.

We do nothing wrong when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them. Privacy is a basic human need.

Page 63: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

63

The Privacy/Security Rorschach

Page 64: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

64

The Privacy/Security Rorschach

“Law enforcement is not supposed to be easy.

Where it is easy, it’s called a police state.”

– Jeff Schiller, in Wired (1999)

Page 65: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

65

End

Page 66: 1 Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference May 8, 2007 Steve Worona EDUCAUSE sworona@educause.edu

66

Authentication Mechanisms

• Accounts and passwords

• ATM cards and PINs

• Smart cards

• Challenge/response systems

• Digital certificates

• Key-fob tokens

• Biometrics

• Etc…