Cyber security
Computing innovation: Includes a program as a part of a function
Examples:
- Physical: self driving car
- Non physical: picture editing software
- Non physical computing: e-commerce
Personally identifiable information: information about individual(s) that identifies them
- birthday, location, address, & computing data
- Can be used to stalk or steal your identity, if your data is in the wrong hands.
- Can be beneficial in scenarios, to find your desired ads.
When you get something free on the internet, you are paying by with your data - nothing is free.
Ethical concerns: computing innovation
- bias algorithms
- devices that collect data by monitoring it continuously
- software that has access to your data without your knowledge when you download something
Vocabulary: computing innovation
- Phishing: Email that looks realistic, but when the link is clicked on your information is sent to malicious hackers
- Key logging: program that uses a keystroke to access data in order to gain fraudulent
- Malware: software intended to damage computing system
- Rouge access point: wireless access point that gives unauthorized access to secure networks
- DDoS: Distributed denial of service
Encryption vocabulary
- Encryption: encoding message
- Decryption: reverse encryption
- Cipher: technique that preforms encryption
- Caesar’s encryption: encryption that shifts the alphabet by some numbers
- Cracking encryption: attempt to decode a secret message without knows the specifics of the cipher
- Symmetric key encryption: involves one key for decryption and encryption
- Public key encryption: pairs a public and private key for encrytion