An Algorithmic and Social Introduction to Computer Science (CSC-105 2000S)


Class 15: Computer Crime, Revisited

Back to Computer Crime and Morality. On to Public-Key Cryptography.

Held Wednesday, February 16, 2000

Overview

Today, we continue our discussion of computer crime and computer security by revisiting the text and considering techniques we might use to prevent these crimes.

Question 15 for today's class: Describe a technique we can use to conceal information.

Question 16 for Friday's class: Should the government have the right to access encrypted files?

Notes

Contents

Summary


Class Structure

Today we'll try a different way to look at these issues. Instead of the semi-recitation that we've done for the past few days, I'm putting you in charge of the discussion. I'll choose one of you to start (and may choose other roles, too).

Some Questions

I think it may help to start with some broad questions:


History

Saturday, 22 January 2000

Wednesday, 16 Febraury 2000

Back to Computer Crime and Morality. On to Public-Key Cryptography.


Disclaimer Often, these pages were created "on the fly" with little, if any, proofreading. Any or all of the information on the pages may be incorrect. Please contact me if you notice errors.

This page may be found at http://www.math.grin.edu/~rebelsky/Courses/CS105/2000S/Outlines/outline.15.html

Source text last modified Wed Feb 16 09:16:19 2000.

This page generated on Wed Feb 16 09:16:41 2000 by Siteweaver. Validate this page's HTML.

Contact our webmaster at rebelsky@grinnell.edu