Computer Science
computer science
computing
innovations
rogue access point
data
keylogging
method
phishing
technique
computer
viruses
malware
software
encryption
scurity
decryption
symmetric key encryption
public key encryption
encoding
decoding
cyber criminals
authentication
multifactor authentication
PII
safe computing
security
privacy
legal
ethical concerns
algorithms
sites
access
citizen science
crowdsourcing
human bias
bias
digital divide
world wide web
University/Undergrad
Data
________ sent over public networks can be intercepted, analyzed, and modified.
Security
________ protects that data from cyber attacks and hacking.
PII
________ and other information can be used to enhance a users online experience.
ethical concerns
Computing innovations can raise legal and ________.
human bias
Computing innovations can reflect existing ________.
security
To increase ________, encryption is used.
Algorithms
________ can be used to determine starting salaries for large companies.
World Wide Web
was intended only for rapid and easy exchange of information within the scientific community.
internet
is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.
digital divide
is the difference in access to technology including access to computers and the internet.
Infrastructure
Some parts of the world do not have access to the internet.
Algorithms
________ can be intentionally or unintentionally biased.
Education
A person could have access to the internet but not have the education to use it.
Indifference
A person could have access to the internet but choose not to use it.
Cost
The cost of accessing the internet could make using it unaffordable.
computing innovation
can have both a beneficial and a harmful effect on societies, cultures, or economies.
effect
may be an impact, a result, or an outcome.
Beneficial and/or harmful effects
are contextual and interpretive.
Identification
includes both the classification of the effect as either beneficial or harmful and justification for that classification.
Algorithms
are helping people make decisions that can have extreme ramifications.
Crowdsourcing
is the practice of obtaining input or information from many people via the internet.
Citizen science
is scientific research using public participation in scientific research.
Security
is needed to protect the confidentiality, integrity, and availability of information.
Privacy
is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.
PII
can be analyzed and processed by businesses and shared with other companies.
Cyber criminals
are creative in their methods for stealing PII data.
Authentication
measures protect devices and information from unauthorized access.
Multifactor authentication
is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism
Knowledge
something the user knows
Possession
something the user has
Inherence
something the user is
Encryption
is the process of encoding data to prevent unauthorized access.
Decryption
is the process of decoding the data.
Symmetric key encryption
uses the same key for both encryption and decryption.
Public key encryption
(also called asymmetric encryption) uses two keys—one private and one public.
Malware
is malicious software intended to damage a computing system or take partial control or its operations.
Computer viruses
are malicious programs that can copy themselves and gain access to a computer in an unauthorized way.
Viruses
often perform some type of harmful activity on infected host computers.
Phishing
is a technique that directs users to unrelated sites that trick the user into giving personal data.
Keylogging
is another method involving unauthorized access to a computer.
Data
sent over public networks can be intercepted, analyzed, and modified.
rogue access point
is a wireless access point that gives unauthorized access to secure networks.