AP Review #3 — Cybersecurity

Big Data: Large data sets that are infeasible or possible to traditionally process. Machine learning is used to find correlations in big data.

When using open data, we do the following:

  • Anonymize the data

  • Obfuscating Data

  • Hashing Passwords

Cyber criminal tools

Malware: Any kind of malicious software

Virus: A type of malware that copies itself to other computers

Phishing Attack: Sending a message while impersonating a legitimate website

DDoS (Disturbed Denial of Service): Multiple computers targeting with a flood of HTTP requests, overwhelming the server, all controlled by a bot net. These attacks are directed at the DNS.

ENCRYPTION AND DECRYPTION

Symmetric Cryptography: Fast, but requires a shared secret

Asymmetric Cryptography: Doesn’t need a shared secret, but slower.

They are usually used together. Asymmetric is used to exchange the key, and then symmetric is used once the key is gotten. This is use of the certificate authority and the TLS handshake protocol.