Chapter 8 - Privacy

4.5(21)
studied byStudied by 1147 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards
Digital footprint
information about a person on the Internet as a result of their online activity

Found in Lecture 8 - Privacy
2
New cards
Metadata
a set of data that describes and gives information about other data

Found in zyBooks Section 8.1
3
New cards
strategies to protect user information
- choose apps used carefully (How much does the app collect and record information? How does the app use the collected data?)

- think before posting (Could the information you are posting harm yourself if made public?)

- get the facts (Before signing up for a "free" service, consider how the service makes money)

- check and set preferences carefully (If you don't check/set user preferences, default may be to "share")

Found in Lecture 8 - Privacy
4
New cards
An employer might NOT hire a candidate if employer sees the candidate...
- posts inappropriate photographs (46% of companies said yes)

- posts about drinking/using drugs (41% of companies said yes)

- posts with poor communication skills (32% of companies said yes)

NOTE: 40+% percent of employers use social-media and search engines to research job
candidates

Found in Lecture 8 - Privacy and zyBooks Section 8.7
5
New cards
Authentication
is the process of verifying that you really are the person who has the right to access a given computer.

Managed by the OS.

Generally handled by user ID and password

sometimes expanded to include a security question (e.g., mother's maiden name)

some really secure systems will use biometrics data as well (fingerprints)

Found in Lecture 8 - Privacy
6
New cards
How does OS protect passwords?
OS encrypts a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm.

Typically password encryption uses a HASH function.

Found in Lecture 8 - Privacy
7
New cards
Encryption
How the OS protects passwords

Analogy: sending a letter written in a secret language

Found in Lecture 8 - Privacy and zyBooks Section 8.4
8
New cards
Hashing
Applying a mathematical one-way function to create a "signature" of the input.

Different inputs can resolve to the same hash.

Found in Lecture 8 - Privacy
9
New cards
One-way function
Can easily do function one way ... but really HARD to go the other way.

Consider two LARGE prime numbers (say i and j)
- I can multiple the two prime numbers easily
- I can NOT tell you the prime factorization very easily

Found in Lecture 8 - Privacy
10
New cards
Protocol
A mutually agreed-upon set of rules, conventions, and agreements for the efficient and orderly exchange of information

Found in zyBooks Section 8.4