Big Data: Large data sets that are infeasible or possible to traditionally process. Machine learning is used to find correlations in big data.
When using open data, we do the following:
Anonymize the data
Obfuscating Data
Hashing Passwords
Cyber criminal tools
Malware: Any kind of malicious software
Virus: A type of malware that copies itself to other computers
Phishing Attack: Sending a message while impersonating a legitimate website
DDoS (Disturbed Denial of Service): Multiple computers targeting with a flood of HTTP requests, overwhelming the server, all controlled by a bot net. These attacks are directed at the DNS.
ENCRYPTION AND DECRYPTION
Symmetric Cryptography: Fast, but requires a shared secret
Asymmetric Cryptography: Doesn’t need a shared secret, but slower.
They are usually used together. Asymmetric is used to exchange the key, and then symmetric is used once the key is gotten. This is use of the certificate authority and the TLS handshake protocol.