Held Wednesday, February 16, 2000
Today, we continue our discussion of computer crime and computer security by revisiting the text and considering techniques we might use to prevent these crimes.
Question 15 for today's class: Describe a technique we can use to conceal information.
Question 16 for Friday's class: Should the government have the right to access encrypted files?
Today we'll try a different way to look at these issues. Instead of the semi-recitation that we've done for the past few days, I'm putting you in charge of the discussion. I'll choose one of you to start (and may choose other roles, too).
I think it may help to start with some broad questions:
Saturday, 22 January 2000
Wednesday, 16 Febraury 2000
Disclaimer Often, these pages were created "on the fly" with little, if any, proofreading. Any or all of the information on the pages may be incorrect. Please contact me if you notice errors.
This page may be found at http://www.math.grin.edu/~rebelsky/Courses/CS105/2000S/Outlines/outline.15.html
Source text last modified Wed Feb 16 09:16:19 2000.
This page generated on Wed Feb 16 09:16:41 2000 by Siteweaver. Validate this page's HTML.
Contact our webmaster at firstname.lastname@example.org