Cyber security

Computing innovation: Includes a program as a part of a function

Examples:

  • Physical: self driving car
  • Non physical: picture editing software
  • Non physical computing: e-commerce

Personally identifiable information: information about individual(s) that identifies them

  • birthday, location, address, & computing data
  • Can be used to stalk or steal your identity, if your data is in the wrong hands.
  • Can be beneficial in scenarios, to find your desired ads.

When you get something free on the internet, you are paying by with your data - nothing is free.

Ethical concerns: computing innovation

  • bias algorithms
  • devices that collect data by monitoring it continuously
  • software that has access to your data without your knowledge when you download something

Vocabulary: computing innovation

  • Phishing: Email that looks realistic, but when the link is clicked on your information is sent to malicious hackers
  • Key logging: program that uses a keystroke to access data in order to gain fraudulent
  • Malware: software intended to damage computing system
  • Rouge access point: wireless access point that gives unauthorized access to secure networks
  • DDoS: Distributed denial of service

Encryption vocabulary

  • Encryption: encoding message
  • Decryption: reverse encryption
  • Cipher: technique that preforms encryption
  • Caesar’s encryption: encryption that shifts the alphabet by some numbers
  • Cracking encryption: attempt to decode a secret message without knows the specifics of the cipher
  • Symmetric key encryption: involves one key for decryption and encryption
  • Public key encryption: pairs a public and private key for encrytion