Home
Explore
Exams
Login
Get started
Home
Engineering
Computer Science
Chapter 8 - Privacy
4.5
(21)
Rate it
Studied by 1147 people
Call Kai
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/9
Earn XP
Description and Tags
Computer Science
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Call with Kai
Last updated 4:09 PM on 11/28/22
Update
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai
No analytics yet
Send a link to your students to track their progress
10 Terms
View all (10)
Star these 10
1
New cards
Digital footprint
information about a person on the Internet as a result of their online activity
Found in Lecture 8 - Privacy
2
New cards
Metadata
a set of data that describes and gives information about other data
Found in zyBooks Section 8.1
3
New cards
strategies to protect user information
- choose apps used carefully (How much does the app collect and record information? How does the app use the collected data?)
- think before posting (Could the information you are posting harm yourself if made public?)
- get the facts (Before signing up for a "free" service, consider how the service makes money)
- check and set preferences carefully (If you don't check/set user preferences, default may be to "share")
Found in Lecture 8 - Privacy
4
New cards
An employer might NOT hire a candidate if employer sees the candidate...
- posts inappropriate photographs (46% of companies said yes)
- posts about drinking/using drugs (41% of companies said yes)
- posts with poor communication skills (32% of companies said yes)
NOTE: 40+% percent of employers use social-media and search engines to research job
candidates
Found in Lecture 8 - Privacy and zyBooks Section 8.7
5
New cards
Authentication
is the process of verifying that you really are the person who has the right to access a given computer.
Managed by the OS.
Generally handled by user ID and password
sometimes expanded to include a security question (e.g., mother's maiden name)
some really secure systems will use biometrics data as well (fingerprints)
Found in Lecture 8 - Privacy
6
New cards
How does OS protect passwords?
OS encrypts a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm.
Typically password encryption uses a HASH function.
Found in Lecture 8 - Privacy
7
New cards
Encryption
How the OS protects passwords
Analogy: sending a letter written in a secret language
Found in Lecture 8 - Privacy and zyBooks Section 8.4
8
New cards
Hashing
Applying a mathematical one-way function to create a "signature" of the input.
Different inputs can resolve to the same hash.
Found in Lecture 8 - Privacy
9
New cards
One-way function
Can easily do function one way ... but really HARD to go the other way.
Consider two LARGE prime numbers (say i and j)
- I can multiple the two prime numbers easily
- I can NOT tell you the prime factorization very easily
Found in Lecture 8 - Privacy
10
New cards
Protocol
A mutually agreed-upon set of rules, conventions, and agreements for the efficient and orderly exchange of information
Found in zyBooks Section 8.4
Explore top notes
Parsons on Education
Updated 409d ago
0.0
(0)
Muslim Empires
Updated 1160d ago
0.0
(0)
AP Psych Neuron Notes
Updated 459d ago
0.0
(0)
Enthalpy, Entropy, and Heat Review
Updated 1087d ago
0.0
(0)
CHAPTER 6:ELECTRONIC STRUCTURE OF ATOMS
Updated 1177d ago
0.0
(0)
Chapter 11: Language and Culture
Updated 1274d ago
0.0
(0)
Physical Education "Aerobic Dancing"
Updated 1256d ago
0.0
(0)
Cold War
Updated 513d ago
0.0
(0)
Parsons on Education
Updated 409d ago
0.0
(0)
Muslim Empires
Updated 1160d ago
0.0
(0)
AP Psych Neuron Notes
Updated 459d ago
0.0
(0)
Enthalpy, Entropy, and Heat Review
Updated 1087d ago
0.0
(0)
CHAPTER 6:ELECTRONIC STRUCTURE OF ATOMS
Updated 1177d ago
0.0
(0)
Chapter 11: Language and Culture
Updated 1274d ago
0.0
(0)
Physical Education "Aerobic Dancing"
Updated 1256d ago
0.0
(0)
Cold War
Updated 513d ago
0.0
(0)
Explore top flashcards
Forensic Biology Revision Of Terms
25
Updated 930d ago
0.0
(0)
UNIDAD 2.5 - POR LA CIUDAD - SP2
41
Updated 1165d ago
0.0
(0)
AP Human Geography Unit 4 COMPLETE REVIEW
54
Updated 428d ago
0.0
(0)
Precalc Hnr-Trig Identities formulas
26
Updated 1201d ago
0.0
(0)
FUNGI CHAPTER 24
45
Updated 502d ago
0.0
(0)
Unit 5
20
Updated 1109d ago
0.0
(0)
Latin Poetry, Spring Final Vocabulary
83
Updated 1039d ago
0.0
(0)
Economics chapter 4
25
Updated 893d ago
0.0
(0)
Forensic Biology Revision Of Terms
25
Updated 930d ago
0.0
(0)
UNIDAD 2.5 - POR LA CIUDAD - SP2
41
Updated 1165d ago
0.0
(0)
AP Human Geography Unit 4 COMPLETE REVIEW
54
Updated 428d ago
0.0
(0)
Precalc Hnr-Trig Identities formulas
26
Updated 1201d ago
0.0
(0)
FUNGI CHAPTER 24
45
Updated 502d ago
0.0
(0)
Unit 5
20
Updated 1109d ago
0.0
(0)
Latin Poetry, Spring Final Vocabulary
83
Updated 1039d ago
0.0
(0)
Economics chapter 4
25
Updated 893d ago
0.0
(0)