In Depth Notes on Computing Innovations and Security
Computing Innovation
- Definition: Computing innovation incorporates a program as a fundamental component of its operation.
- Types:
- Physical: For example, self-driving cars.
- Non-physical Software: Such as picture editing software.
- Non-physical Concepts: Includes e-commerce.
- Definition: Any data that can identify, link, relate, or provide information about an individual.
Phishing
- Definition: A harmful tactic aimed at deceiving users into revealing personal data.
- Purpose: To infiltrate sensitive online accounts, such as banking and email.
Keylogging
- Definition: The act of using a program to monitor and record every keystroke made by a user.
- Purpose: To illicitly gain access to passwords and other sensitive information.
Malware
- Definition: Malicious software intended to harm computing systems or take partial control over them.
Rogue Access Point
- Definition: An insecure wireless access point granting unauthorized access to secure networks.
Distributed Denial of Service (DDoS)
- Definition: An attack aimed at making an online service unavailable by overwhelming it with traffic from multiple computers.
Encryption
- Definition: A method of encoding messages to ensure that only authorized parties are capable of reading them.
Decryption
- Definition: The process that reverses encryption, reverting a secret message back to its original plaintext form.
Types of Encryption
- Symmetric Key Encryption: Utilizes a single key for both encryption and decryption.
- Public Key Encryption: Employs a pair of keys: a public key for encryption and a private key for decryption. The sender does not need to possess the receiver’s private key for encryption, but it is necessary for decryption.
Cipher
- Definition: A general term for the technique or algorithm used for encryption.
- Example: Caesar's Cipher - An encryption method that shifts letters in the alphabet by a certain number of places.
Cracking Encryption
- Definition: The attempt to decode a secret message without complete knowledge of the cipher specifics.
- Technique Used: Frequency Analysis - This approach assesses the frequency of certain letters in English to inform cracking attempts.
Freeware
- Definition: Free downloads available from freeware or shareware sites that may contain malware and thus be untrustworthy.
Multi-factor Authentication
- Definition: A security system requiring at least two steps to unlock protected information, thereby adding extra layers of security.
Strong Password
- Definition: A password that is memorable for the user but challenging for others to guess, based on that individual's knowledge.
Virus
- Definition: A type of malicious program that can duplicate itself and covertly gain access to a computer, typically by attaching to legitimate software and operating autonomously.