Computers, Information Technology, the Internet, Ethics, Society and Human Values

Philip Pecorino, Ph.D.

Queensborough Community College,  CUNY

Chapter 7 Secrecy and Security

Resources

 

WEBLIOGRAPHY

Readings on Encryption and National Security-MIT Open Source

 Privacy, Security, Crypto, and Surveillance Archive. by The Electronic Frontier Foundation

A Plain Text on Crypto Policy   John Perry Barlow 1993 

Why I Wrote PGP Pretty Good Privacy encryption program Philip Zimmerman,

Interview with Philip Zimmerman after 9/11 attacks

Ethics of Encryption

m-o-o-t is a free open-source computer system that boots from a CD and contains all the cryptographic code needed to defeat GAK (Government Access to Keys) laws. We believe that people should and can have access to electronic privacy even from their Governments.

pseudonymity

Digital signature

Click Here to become an Arms Trafficker Now you can just click on a web page to export 3lines of text for an encryption program and become an International Arms Trafficker!


Encryption Special Report An explanation of the issues underlying the debate over encryption policy. Includes background, key stories, legislative update and profiles of key players, from the Washington Post.


Applied Cryptography Export Case A page on battle to export a disk containing the verbatim source code from the book Applied Cryptography

 A Declaration of the Independence of Cyberspace by John Perry Barlow

Secure Internet Programming
 

BIBLIOGRAPHIES

Counterpane Systems' WWW Cryptography Article Database

SOCIETIES and Organizations

Ethical, Social and Professional Issues in the Undergraduate Currriculum   CERIAS: The Center for Education and Research in Information Assurance and Security This site has several useful sections:  * A Framework for Integrating Ethical and Values-Based Instruction into the ACM Computing Curricula 2001  Learning and Teaching with Case Studies
Authoring Guidelines

Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, Eugene H. Spafford, Director

Computer Security Group, Cambridge University, UK

Computer Security Institute

Computer Security Research Center, London School of Economics

The Risks Digest: Forum On Risks To The Public In Computers And Related Systems, ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator

Encryption Policy Resource Page

Internet Privacy Coalition EPIC  Contains articles, reports, and government policies relating to encryption and privacy on the Internet.
Advanced Encryption Standard (AES) Development Effort  Developing a U.S. Federal Information Processing Standard (FIPS) that specifies an encryption algorithm(s) capable of protecting sensitive government information.
FIPS 46-2 - Data Encryption Standard (DES) Description of the standard.

EDUCATION  Cyber Security

There is  interest in the field from both the government and students (http://www.whitehouse.gov/the-press-office/2015/01/15/vice-president-biden-announces-25-million-funding-cybersecurity-educatio).

Department of Homeland Security's National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/research/resource-links-education

Central Resource site at : CyberDegrees.org.

- A full directory of cyber security degrees, from associate's degrees all the way to Ph.D programs
http://www.cyberdegrees.org/listings/

- Detailed looks into 20 careers related to cyber security, including job responsibilities, requirements, and growth opportunities
http://www.cyberdegrees.org/jobs/

- Tons of in-depth resources, including our complete guide to government security clearances (what they are, why they're given, and how to earn them)
http://www.cyberdegrees.org/resources/security-clearances/

OTHER

Crypto Law Survey

 

Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution. ppecorino@qcc.cuny.edu                @copyright 2006 Philip A. Pecorino                       

Last updated 8-2006                                                              Return to Table of Contents