/
S kills : none Concepts : log, S kills : none Concepts : log,

S kills : none Concepts : log, - PowerPoint Presentation

myesha-ticknor
myesha-ticknor . @myesha-ticknor
Follow
352 views
Uploaded On 2018-12-05

S kills : none Concepts : log, - PPT Presentation

IP address URL packet header and body geolocation anonymity proxy server the dictators dilemma graphical versus commandline user interface This work is licensed under a Creative Commons AttributionNoncommercialShare Alike 30 License ID: 735931

background survey 2010 blogspot survey background blogspot 2010 cis275assignments http 135 2011 address proxy 155 html internet server anonymity data location dilemma

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "S kills : none Concepts : log," is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

S

kills: noneConcepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma,” graphical versus command-line user interface

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.

Internet surveillance – who and where are you?Slide2

Where does this topic fit?Internet conceptsApplicationsTechnologyImplicationsInternet skills

Application developmentContent creationUser skillsSlide3

Data packets

10011

11101

10101

00110

Client

Server

155.135.1.1

11.144.1.14Slide4

1101010010101101010010101000101010001010110101010101001010101101010010101010100101010010101001111000110101011001100101011001010100110010101010101001010101010011010101010100101011101010100101101001011010010101010111001010000101010101010100

To: <IP address>

From: <IP address>

Header:

Body:

T

wo parts of an Internet protocol (IP) data packet

Why did I show the contents of the body as 1s and 0s?Slide5

IP address

Stop and find your IP addressSlide6

IP address

Date FinishedLinked From

155.135.55.229

1/27/201 14:10

http://cis275assignments.blogspot.com/2010/08/background-survey.html

155.135.55.229

1/31/2011 15:05

http://cis275assignments.blogspot.com/2010/08/background-survey.html

96.39.242.153

1/27/2011 2:40

http://cis275assignments.blogspot.com/2010/08/background-survey.html

155.135.55.229

1/27/2011 13:30http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.2291/25/2011 13:55

http://cis275assignments.blogspot.com/2010/08/background-survey.html75.3.224.651/31/2011 20:15http://cis275assignments.blogspot.com/2010/08/background-survey.html

76.234.226.1551/31/2011 15:10

http://cis275assignments.blogspot.com/2010/08/background-survey.html

155.135.55.2291/27/2011 14:20http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229

1/25/2011 14:10http://cis275assignments.blogspot.com/2010/08/background-survey.htmlClass survey – supplied without your knowledge

Why are all the “linked from” URLs the same?

Why do so many IP addresses begin with 155.135?Slide7

Where are you?

Stop and find your current location.

From ip2location.comApproximate location of 155.135.1.1:Slide8

Who are you?

IP address + time and date + ISP log →

Internet account holder

Who can get access to this information?Slide9

The U. S. Constitution says you need a warrant

But, what did Eric Snowden reveal?Slide10

Or a job with the NSA or an NSA contractorSlide11

Anonymity – public computerSlide12

Anonymity: proxy

server

Through a

proxy

Normal connection

Proxy

serverSlide13

Glasnost which undermined the USSR and other socialist countries consisted in handing over the mass media, one by one, to the enemies of socialism.Raúl CastroOctober, 1997One telex can cost twelve dollars [whereas] the same message costs 75 cents in the form of a fax and 3 cents via the Internet ... in spite of our blockaded circumstances, we are in a relatively good position [to face the challenges of such scientific and technological changes], due to the educational and scientific work developed by the revolution.

Carlos LageOctober, 1997

The dictator’s dilemmaSlide14

Ten year prison sentencesSlide15

SummarySlide16

Self-study questionsCriminals use proxy servers to hide their activity. Should we make it a crime to operate a proxy server or are there times when anonymity is desirable? Do you mind servers like the one at SurveyGizmo.com gathering data on you?

Can you think of reasons you might want data to be gathered on you?How do questions of privacy differ between cultures and political systems?What is the IP address of your computer? (You will probably have to get some help answering that question).Proxy servers allow user anonymity if surveillance is a problem, but they also enable a form of privacy – explain the way the latter works.Slide17

ResourcesA geo-location service:http://www.ip2location.com/

Yahoo identifies dissidents to the Chinese government:http://boingboing.net/2007/04/19/yahoo-aided-china-in.htmlStudent background survey that captured IP addresses:http://cis275assignments.blogspot.com/2010/08/background-survey.htmlThe dictator’s dilemma in Cuba:http://laredcubana.blogspot.com/2011/02/dictators-dilemma.html