In Depth Notes on Computing Innovations and Security

Computing Innovation

  • Definition: Computing innovation incorporates a program as a fundamental component of its operation.
    • Types:
    • Physical: For example, self-driving cars.
    • Non-physical Software: Such as picture editing software.
    • Non-physical Concepts: Includes e-commerce.

Personally Identifiable Information (PII)

  • Definition: Any data that can identify, link, relate, or provide information about an individual.

Phishing

  • Definition: A harmful tactic aimed at deceiving users into revealing personal data.
    • Purpose: To infiltrate sensitive online accounts, such as banking and email.

Keylogging

  • Definition: The act of using a program to monitor and record every keystroke made by a user.
    • Purpose: To illicitly gain access to passwords and other sensitive information.

Malware

  • Definition: Malicious software intended to harm computing systems or take partial control over them.

Rogue Access Point

  • Definition: An insecure wireless access point granting unauthorized access to secure networks.

Distributed Denial of Service (DDoS)

  • Definition: An attack aimed at making an online service unavailable by overwhelming it with traffic from multiple computers.

Encryption

  • Definition: A method of encoding messages to ensure that only authorized parties are capable of reading them.

Decryption

  • Definition: The process that reverses encryption, reverting a secret message back to its original plaintext form.

Types of Encryption

  • Symmetric Key Encryption: Utilizes a single key for both encryption and decryption.
  • Public Key Encryption: Employs a pair of keys: a public key for encryption and a private key for decryption. The sender does not need to possess the receiver’s private key for encryption, but it is necessary for decryption.

Cipher

  • Definition: A general term for the technique or algorithm used for encryption.
    • Example: Caesar's Cipher - An encryption method that shifts letters in the alphabet by a certain number of places.

Cracking Encryption

  • Definition: The attempt to decode a secret message without complete knowledge of the cipher specifics.
    • Technique Used: Frequency Analysis - This approach assesses the frequency of certain letters in English to inform cracking attempts.

Freeware

  • Definition: Free downloads available from freeware or shareware sites that may contain malware and thus be untrustworthy.

Multi-factor Authentication

  • Definition: A security system requiring at least two steps to unlock protected information, thereby adding extra layers of security.

Strong Password

  • Definition: A password that is memorable for the user but challenging for others to guess, based on that individual's knowledge.

Virus

  • Definition: A type of malicious program that can duplicate itself and covertly gain access to a computer, typically by attaching to legitimate software and operating autonomously.