Podcast
Questions and Answers
What is the main concept behind transposition encryption?
What is the main concept behind transposition encryption?
- It replaces letters with numbers only.
- It uses a fixed key for substitution.
- It doesn't require a specific pattern to decode.
- It alters the position of letters in a message. (correct)
Which of the following is an example of a substitution encryption method?
Which of the following is an example of a substitution encryption method?
- Reversing the order of letters
- Dividing the text into multiple parts
- Changing the case of letters in a message
- Shifting letters to the right by a fixed number (correct)
How does the Caesar cipher determine which letters to substitute?
How does the Caesar cipher determine which letters to substitute?
- By applying a designated shift value (correct)
- By counting letters to the left of the alphabet
- By replacing vowels with consonants only
- By using a random letter generator
In T9 texting, what action is taken to type the letter 'H'?
In T9 texting, what action is taken to type the letter 'H'?
Which of these shifts would correspond to an 'F' in the Caesar cipher if the shift is 5?
Which of these shifts would correspond to an 'F' in the Caesar cipher if the shift is 5?
What happens if the encryption information is easily accessible by unauthorized people?
What happens if the encryption information is easily accessible by unauthorized people?
If the Caesar cipher's shift is 3, what letter corresponds to 'I'?
If the Caesar cipher's shift is 3, what letter corresponds to 'I'?
What characterizes substitution ciphers as opposed to transposition ciphers?
What characterizes substitution ciphers as opposed to transposition ciphers?
How many times do you need to tap the button for the letter 'O' using T9 texting?
How many times do you need to tap the button for the letter 'O' using T9 texting?
What does a substitution cipher replace in a message?
What does a substitution cipher replace in a message?
What is the primary purpose of encryption methods?
What is the primary purpose of encryption methods?
What is a key feature of the Caesar cipher?
What is a key feature of the Caesar cipher?
What is an example of a real-world application of substitution encryption?
What is an example of a real-world application of substitution encryption?
What would happen if encryption information was easily accessible by others?
What would happen if encryption information was easily accessible by others?
What is the main difference between transposition and substitution encryption methods?
What is the main difference between transposition and substitution encryption methods?
What is the name of the encryption method that Julius Caesar used to communicate with his generals?
What is the name of the encryption method that Julius Caesar used to communicate with his generals?
How does the Caesar cipher determine the shift?
How does the Caesar cipher determine the shift?
What is a characteristic of substitution ciphers?
What is a characteristic of substitution ciphers?
What is the purpose of the shift in the Caesar cipher?
What is the purpose of the shift in the Caesar cipher?
What is an advantage of using encryption methods?
What is an advantage of using encryption methods?
What is a key responsibility of citizenship in a digital world?
What is a key responsibility of citizenship in a digital world?
What is typically needed to access websites or login to online accounts?
What is typically needed to access websites or login to online accounts?
What is an advantage of using strong passwords?
What is an advantage of using strong passwords?
What should you avoid including in your password?
What should you avoid including in your password?
What is the purpose of an authentication measure?
What is the purpose of an authentication measure?
How many characters should a strong password have at a minimum?
How many characters should a strong password have at a minimum?
Why is it important to keep your PII safe?
Why is it important to keep your PII safe?
What is a characteristic of a strong password?
What is a characteristic of a strong password?
What is the primary purpose of multi-factor authentication?
What is the primary purpose of multi-factor authentication?
What is a disadvantage of having accessible PII?
What is a disadvantage of having accessible PII?
What can prevent infections and fix errors that could compromise a system?
What can prevent infections and fix errors that could compromise a system?
What is an example of multi-factor authentication?
What is an example of multi-factor authentication?
Why is multi-factor authentication more secure than one-step authentication?
Why is multi-factor authentication more secure than one-step authentication?
What can password managers generate for online accounts?
What can password managers generate for online accounts?
What is a disadvantage of storing PII online?
What is a disadvantage of storing PII online?
What should you do when allowing a new website access to your personal information?
What should you do when allowing a new website access to your personal information?
What is a characteristic of multi-factor authentication?
What is a characteristic of multi-factor authentication?
What is the purpose of protection software?
What is the purpose of protection software?
What is the primary goal of a phishing email attack?
What is the primary goal of a phishing email attack?
What is a key indicator of a phishing email?
What is a key indicator of a phishing email?
What is the primary objective of a keylogging attack?
What is the primary objective of a keylogging attack?
Why is keylogging considered an unethical practice?
Why is keylogging considered an unethical practice?
What makes public networks particularly vulnerable to cyber attacks?
What makes public networks particularly vulnerable to cyber attacks?
What can happen if you respond to a phishing email?
What can happen if you respond to a phishing email?
What is a characteristic of a phishing email?
What is a characteristic of a phishing email?
What can keylogger software do?
What can keylogger software do?
Why are public networks insecure?
Why are public networks insecure?
What is the primary risk of using public networks?
What is the primary risk of using public networks?
What is the primary function of an access point on a network?
What is the primary function of an access point on a network?
What is a major risk associated with connecting to a rogue access point?
What is a major risk associated with connecting to a rogue access point?
What is a key difference between digital and manual files?
What is a key difference between digital and manual files?
What is a benefit of using digital files?
What is a benefit of using digital files?
What is a limitation of digital files?
What is a limitation of digital files?
What is file insecurity?
What is file insecurity?
What can happen to insecure files?
What can happen to insecure files?
What is a key feature of digital files?
What is a key feature of digital files?
What is a benefit of using digital files in businesses?
What is a benefit of using digital files in businesses?
Why should users be cautious when connecting to public networks?
Why should users be cautious when connecting to public networks?
What is the primary objective of encrypting a hard drive and mobile device?
What is the primary objective of encrypting a hard drive and mobile device?
What is the concept that measures how unpredictable a password is based on the type and combination of characters used and the length of the password?
What is the concept that measures how unpredictable a password is based on the type and combination of characters used and the length of the password?
What is the purpose of implementing anti-virus software?
What is the purpose of implementing anti-virus software?
What is the term for ensuring that information is not disclosed to the wrong individuals?
What is the term for ensuring that information is not disclosed to the wrong individuals?
What is the result of encrypting plaintext?
What is the result of encrypting plaintext?
What is the benefit of keeping your computer and devices updated?
What is the benefit of keeping your computer and devices updated?
What is the primary purpose of implementing the five pillars of cybersecurity?
What is the primary purpose of implementing the five pillars of cybersecurity?
What is the calculation for password entropy?
What is the calculation for password entropy?
What is the term for proving the identities of the sender and recipient when transferring information?
What is the term for proving the identities of the sender and recipient when transferring information?
What is the benefit of restricting access to files?
What is the benefit of restricting access to files?
What is the primary purpose of a white hat hacker?
What is the primary purpose of a white hat hacker?
What type of hacker would likely charge a fee for reporting vulnerabilities they discover?
What type of hacker would likely charge a fee for reporting vulnerabilities they discover?
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
What is the primary characteristic of a computer virus?
What is the primary characteristic of a computer virus?
How can a computer virus be spread?
How can a computer virus be spread?
Which of the following is a potential consequence of a virus infection?
Which of the following is a potential consequence of a virus infection?
How can you protect yourself from malware?
How can you protect yourself from malware?
Which of the following is NOT a characteristic of black hat hackers?
Which of the following is NOT a characteristic of black hat hackers?
What is the primary difference between a worm and a virus?
What is the primary difference between a worm and a virus?
Which of the following is an example of a ransomware attack?
Which of the following is an example of a ransomware attack?
What is a common challenge in identifying the source of a DDoS attack?
What is a common challenge in identifying the source of a DDoS attack?
What is an example of unintended consequences in the digital age?
What is an example of unintended consequences in the digital age?
What is algorithmic bias?
What is algorithmic bias?
What is the Digital Divide?
What is the Digital Divide?
What can contribute to programmer bias?
What can contribute to programmer bias?
How do algorithms on social media platforms contribute to algorithmic bias?
How do algorithms on social media platforms contribute to algorithmic bias?
What can be used to predict the types of ads a user might want to see?
What can be used to predict the types of ads a user might want to see?
What can determine whether a person has access to the Internet and computers?
What can determine whether a person has access to the Internet and computers?
What can be a result of unchecked programmer bias?
What can be a result of unchecked programmer bias?
What is a potential risk of the Digital Divide?
What is a potential risk of the Digital Divide?
What happens to the letters in a message when using the transposition encryption method?
What happens to the letters in a message when using the transposition encryption method?
What is the purpose of the shift in the Caesar cipher?
What is the purpose of the shift in the Caesar cipher?
Why was the T9 method of texting used in early cell phones?
Why was the T9 method of texting used in early cell phones?
What is a characteristic of substitution ciphers?
What is a characteristic of substitution ciphers?
What would happen if encryption information was easily accessible by unauthorized people?
What would happen if encryption information was easily accessible by unauthorized people?
What is the main difference between transposition and substitution encryption methods?
What is the main difference between transposition and substitution encryption methods?
What is the purpose of encryption methods like the Caesar cipher?
What is the purpose of encryption methods like the Caesar cipher?
What is a real-world application of substitution encryption?
What is a real-world application of substitution encryption?
What is a dictionary attack?
What is a dictionary attack?
Which of the following is NOT a type of cybercrime?
Which of the following is NOT a type of cybercrime?
What is the primary goal of a Denial of Service (DoS) attack?
What is the primary goal of a Denial of Service (DoS) attack?
Why is it generally recommended to avoid using dictionary words in passwords?
Why is it generally recommended to avoid using dictionary words in passwords?
What is the key difference between a DoS attack and a DDoS attack?
What is the key difference between a DoS attack and a DDoS attack?
Which of these is a common method used to gain unauthorized access to a system in order to spread malware?
Which of these is a common method used to gain unauthorized access to a system in order to spread malware?
Which of the following is NOT a type of cyber attack?
Which of the following is NOT a type of cyber attack?
What is the main reason why using personally identifiable information (PII) in passwords is strongly discouraged?
What is the main reason why using personally identifiable information (PII) in passwords is strongly discouraged?
Why is it important to keep your PII safe?
Why is it important to keep your PII safe?
What is the primary purpose of encryption methods?
What is the primary purpose of encryption methods?
What is the primary difference between symmetric key encryption and public key encryption?
What is the primary difference between symmetric key encryption and public key encryption?
Which of the following is NOT a benefit of using symmetric key encryption?
Which of the following is NOT a benefit of using symmetric key encryption?
In the context of encryption, what does 'ciphertext' refer to?
In the context of encryption, what does 'ciphertext' refer to?
What is the role of a certificate authority in encryption?
What is the role of a certificate authority in encryption?
Which of the following best describes the process of decryption?
Which of the following best describes the process of decryption?
What is the main purpose of using encryption?
What is the main purpose of using encryption?
In the context of encryption, what is a 'key'?
In the context of encryption, what is a 'key'?
Which of the following is a disadvantage of symmetric key encryption?
Which of the following is a disadvantage of symmetric key encryption?
What is the purpose of a public key in public key encryption?
What is the purpose of a public key in public key encryption?
What is an example of a real-world scenario where encryption is essential?
What is an example of a real-world scenario where encryption is essential?
What is the primary focus of the open innovation movement?
What is the primary focus of the open innovation movement?
Which of the following best describes open access?
Which of the following best describes open access?
What is one significant benefit of open access repositories?
What is one significant benefit of open access repositories?
How did the Polish Cipher Bureau contribute during World War II?
How did the Polish Cipher Bureau contribute during World War II?
What role does cryptography play in today's digital age?
What role does cryptography play in today's digital age?
What is the main function of encryption in cryptography?
What is the main function of encryption in cryptography?
Which of the following is NOT a characteristic of open access repositories?
Which of the following is NOT a characteristic of open access repositories?
Which ancient civilization is noted for some of the earliest forms of cryptography?
Which ancient civilization is noted for some of the earliest forms of cryptography?
Which of the following best describes modern cryptography?
Which of the following best describes modern cryptography?
What is a critical aspect of maintaining information security in cryptography?
What is a critical aspect of maintaining information security in cryptography?
Which of the following is NOT a factor contributing to the digital divide?
Which of the following is NOT a factor contributing to the digital divide?
What is a key responsibility of programmers in mitigating the negative impacts of computing?
What is a key responsibility of programmers in mitigating the negative impacts of computing?
Which of these options is NOT a potential solution to the digital divide?
Which of these options is NOT a potential solution to the digital divide?
What is a primary purpose of the Digital Millenium Copyright Act (DMCA)?
What is a primary purpose of the Digital Millenium Copyright Act (DMCA)?
Which of the following is NOT an example of infrastructure that contributes to the digital divide?
Which of the following is NOT an example of infrastructure that contributes to the digital divide?
How can programmers contribute to addressing the digital divide?
How can programmers contribute to addressing the digital divide?
What is a key element of a programmer's Code of Ethics?
What is a key element of a programmer's Code of Ethics?
Which of these options is a potential consequence of ignoring ethical concerns in computing?
Which of these options is a potential consequence of ignoring ethical concerns in computing?
What is a primary challenge in addressing the digital divide?
What is a primary challenge in addressing the digital divide?
Which of the following is NOT a factor that can influence the digital divide?
Which of the following is NOT a factor that can influence the digital divide?
Flashcards are hidden until you start studying
Study Notes
Protecting Personally Identifiable Information (PII)
- PII can be collected through devices, websites, and detection hardware and software that track movements and location.
- Safeguarding PII is a key responsibility of citizenship in a digital world.
Authentication Measures
- One-step authentication measures use email and password to secure information.
- Strong passwords should be:
- At least 8-12 characters long
- Include capitalized letters
- Include lowercase letters
- Include numbers
- Include symbols
- Avoid personal identifiable information (e.g. birthday or name)
- Not be words found in a dictionary
- Multi-factor authentication provides more than one layer of security, using a minimum of two steps to access a virtual space.
- Examples of multi-factor authentication include:
- Choosing and identifying a security image
- reCAPTCHA identification
- Identifying pictures with a common image in them
- Answering security questions
Disadvantages of Accessible PII
- Negative consequences of accessible PII include:
- Credit card information getting into the wrong hands
- Web browsers tracking search history and preferences
- Location information being collected
- Information being used to stalk or steal identities
Protecting PII
- All systems have flaws, so software is needed to protect against cyber attacks.
- Recommendations for protection software include:
- Kaspersky Anti-Virus
- AVG Anti-Virus
- Norton 360 Deluxe Malware Protection
- ESET Cybersecurity
- Limit permission settings when allowing websites access to personal information.
- Password managers can generate complex, random passwords for online accounts.
Cybersecurity Awareness
- Be aware of where your digital footprint is to keep data secure.
- Cyber attacks include dictionary attacks, brute force attacks, and more.
- Hackers can be categorized as:
- White hat hackers (ethical hackers who test systems and protect against attacks)
- Black hat hackers (criminals who use their skills for personal gain)
- Grey hat hackers (individuals with a combination of white and black hat ethics)
Types of Attacks
- Malware refers to malicious software, including viruses, worms, spyware, and ransomware.
- Viruses are specialized computer programs that replicate and insert their code into a new host.
- Phishing is a type of cyber attack that uses disguised emails to trick recipients into providing personal information.
- Keylogging attacks use software or hardware to track keystrokes and gain access to usernames, passwords, and other information.
Public Network Insecurities
- Public networks are especially dangerous to cybersecurity because data can be easily accessed by hackers.
- Rogue access points can be created by hackers to steal personal information.
Digital Files
- Digital files have benefits, including:
- Time-saving in editing and transferring files
- Better efficiency in record-keeping
- Easier access to files
- However, digital files also have limitations and risks, including:
- Security breaches
- File insecurity
- Losing or corrupting information
File Security
- File security is a feature of the file system that controls access and limits what users can do to files.
- Effects of file insecurity include losing, overriding, or corrupting information.
- Steps to ensure file security include:
- Keeping computers and devices updated
- Using strong passwords
- Using anti-virus software
- Encrypting hard drives and mobile devices
- Restricting access to files
Five Pillars of Cybersecurity
- The five pillars are:
- Confidentiality (ensuring information is not disclosed to the wrong individuals)
- Integrity (ensuring information is not damaged or modified during transmission)
- Availability (ensuring services are accessible to users)
- Non-repudiation (proving the identities of the sender and recipient)
- Authentication (confirming identities before allowing access to cyber services)### Password Entropy
- Formula to calculate password entropy: log2(SL)
- S: Size of the pool of unique possible symbols
- L: Password Length
- Example: 6-character password with 26 possible symbols (all lowercase letters)
- Possible combinations: 26^6 = 308,915,776
- Bits of entropy: log2(26^6) = 28.2
Encryption and Decryption
- Encryption: process of changing plaintext (original message) to ciphertext (encrypted text) for security
- Decryption: process of converting ciphertext back to plaintext using a key
Downfalls of Computing
- Intentional misuse (cybercrime): using computing to commit crimes, e.g. fraud, hacking, identity theft, malware, phishing, cyberstalking
- Unintentional negative side effects: programmer bias, algorithmic bias, privacy infringement, inequitable access to technology and the internet
Cyber Attacks
- Dictionary attacks: using algorithms to try common words and variations for passwords
- Brute force attacks: using software to generate many password guesses based on user information
- Denial of Service (DoS) attacks: overwhelming a network server with traffic to prevent legitimate access
- Distributed Denial of Service (DDoS) attacks: using multiple devices to attack a single target
Unintended Consequences
- Programmer bias: unintended consequences due to programmers' own biases and limited testing
- Algorithmic bias: systematic errors in computer systems that create unfair outcomes
- Privacy infringement: collection and use of personal data without consent
- Digital Divide: unequal access to technology and the internet due to infrastructure, geographic barriers, government restrictions, and socioeconomic status
Solutions to the Digital Divide
- Increase affordability of internet access and devices
- Develop more infrastructure for global connectivity
- Create informational resources for low-cost devices and internet access
Programmer Responsibilities
- Code of Ethics: guidelines for programmers to promote accountability and transparency
- Mitigating negative impacts of computing: programmer bias, algorithmic bias, privacy infringement, and digital divide
Legal Issues in Computing
- Digital Millennium Copyright Act (DMCA): protects copyrighted material online and provides safe harbor for web hosts and ISPs
- Intellectual property: creative works or inventions that can be patented, copyrighted, or trademarked
- Plagiarism: taking someone else's work or ideas without proper citation
- Creative Commons: non-profit organization promoting open sharing and collaboration of creative works
- Open Source: materials and software allowing others to build upon and adapt
- Open Access: providing free online access to informational materials and research for the greater good### History of Cryptography
- During World War II, the German army used the Enigma machine to encrypt messages to their generals.
- The Polish Cipher Bureau broke the code, allowing Allied code breakers to decrypt the German messages and predict the German army's movements.
Modern Cryptography
- Cryptography is the science of storing data securely in the digital age.
- Four important categories must be maintained when storing information virtually: confidentiality, authenticity, integrity, and ownership.
- Cryptography uses concepts like encryption and decryption to store data securely.
Encryption Explained
- Encryption is the process of changing a message or information to hide its true meaning.
- Plaintext (original message) is turned into ciphertext (encrypted text) for security.
- An encrypted message requires a key to be decrypted.
- Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications.
Decryption Explained
- Decryption takes the encrypted message and converts it back to the original plaintext.
- The key is needed to decrypt the message.
Encoding and Decoding
- Encoding refers to the algorithm that changes plaintext into ciphertext.
- Decoding algorithms are used to convert ciphertext back into plaintext.
- Encoding and decoding algorithms are consistent and public information.
- Encryption keys are needed to secure the encoded data.
Symmetric Key Encryption
- Symmetric key encryption uses one key for both encryption and decryption.
- Advantages: fast and efficient for secure data storage.
- Disadvantages: trust issues and key security can be a challenge since the key can exist with multiple parties or companies.
Public Key Encryption
- Public key encryption uses different keys for encryption and decryption.
- A public key is used to encrypt a message, and a private key is used to decrypt it.
- Example: Bob sends a message to Alice, encrypting it with her public key, and she decrypts it with her private key.
Why is Encryption Necessary?
- Encryption is necessary to protect sensitive information from unauthorized access.
- Examples: ATM transactions, military communications, and website data storage.
Encryption Methods
- Transposition Encryption: changes the position of letters in a message.
- Substitution Encryption: replaces letters in a message with new letters, characters, or numbers (cipher text).
- Examples of Substitution Encryption: T9 Texting and Caesar Cipher.
Substitution Methods
- T9 Texting: uses numbers associated with letters on a telephone keypad to write words.
- Caesar Cipher: a simple encryption method that shifts letters in the plaintext by a certain number of positions.
- Caesar Cipher uses a shift as its key, and the shift determines the letter substitution.
Caesar Cipher Shift
- The shift in the Caesar Cipher determines the letter substitution.
- Example: if the shift is 3, A is substituted for D, B for E, and so on.
- If the shift is 5, F would correspond to A, G to B, and so on through the alphabet.
Protecting Personally Identifiable Information (PII)
- PII can be collected through devices, websites, and detection hardware and software that track movements and location.
- Safeguarding PII is a key responsibility of citizenship in a digital world.
Authentication Measures
- One-step authentication measures use email and password to secure information.
- Strong passwords should be:
- At least 8-12 characters long
- Include capitalized letters
- Include lowercase letters
- Include numbers
- Include symbols
- Avoid personal identifiable information (e.g. birthday or name)
- Not be words found in a dictionary
- Multi-factor authentication provides more than one layer of security, using a minimum of two steps to access a virtual space.
- Examples of multi-factor authentication include:
- Choosing and identifying a security image
- reCAPTCHA identification
- Identifying pictures with a common image in them
- Answering security questions
Disadvantages of Accessible PII
- Negative consequences of accessible PII include:
- Credit card information getting into the wrong hands
- Web browsers tracking search history and preferences
- Location information being collected
- Information being used to stalk or steal identities
Protecting PII
- All systems have flaws, so software is needed to protect against cyber attacks.
- Recommendations for protection software include:
- Kaspersky Anti-Virus
- AVG Anti-Virus
- Norton 360 Deluxe Malware Protection
- ESET Cybersecurity
- Limit permission settings when allowing websites access to personal information.
- Password managers can generate complex, random passwords for online accounts.
Cybersecurity Awareness
- Be aware of where your digital footprint is to keep data secure.
- Cyber attacks include dictionary attacks, brute force attacks, and more.
- Hackers can be categorized as:
- White hat hackers (ethical hackers who test systems and protect against attacks)
- Black hat hackers (criminals who use their skills for personal gain)
- Grey hat hackers (individuals with a combination of white and black hat ethics)
Types of Attacks
- Malware refers to malicious software, including viruses, worms, spyware, and ransomware.
- Viruses are specialized computer programs that replicate and insert their code into a new host.
- Phishing is a type of cyber attack that uses disguised emails to trick recipients into providing personal information.
- Keylogging attacks use software or hardware to track keystrokes and gain access to usernames, passwords, and other information.
Public Network Insecurities
- Public networks are especially dangerous to cybersecurity because data can be easily accessed by hackers.
- Rogue access points can be created by hackers to steal personal information.
Digital Files
- Digital files have benefits, including:
- Time-saving in editing and transferring files
- Better efficiency in record-keeping
- Easier access to files
- However, digital files also have limitations and risks, including:
- Security breaches
- File insecurity
- Losing or corrupting information
File Security
- File security is a feature of the file system that controls access and limits what users can do to files.
- Effects of file insecurity include losing, overriding, or corrupting information.
- Steps to ensure file security include:
- Keeping computers and devices updated
- Using strong passwords
- Using anti-virus software
- Encrypting hard drives and mobile devices
- Restricting access to files
Five Pillars of Cybersecurity
- The five pillars are:
- Confidentiality (ensuring information is not disclosed to the wrong individuals)
- Integrity (ensuring information is not damaged or modified during transmission)
- Availability (ensuring services are accessible to users)
- Non-repudiation (proving the identities of the sender and recipient)
- Authentication (confirming identities before allowing access to cyber services)### Password Entropy
- Formula to calculate password entropy: log2(SL)
- S: Size of the pool of unique possible symbols
- L: Password Length
- Example: 6-character password with 26 possible symbols (all lowercase letters)
- Possible combinations: 26^6 = 308,915,776
- Bits of entropy: log2(26^6) = 28.2
Encryption and Decryption
- Encryption: process of changing plaintext (original message) to ciphertext (encrypted text) for security
- Decryption: process of converting ciphertext back to plaintext using a key
Downfalls of Computing
- Intentional misuse (cybercrime): using computing to commit crimes, e.g. fraud, hacking, identity theft, malware, phishing, cyberstalking
- Unintentional negative side effects: programmer bias, algorithmic bias, privacy infringement, inequitable access to technology and the internet
Cyber Attacks
- Dictionary attacks: using algorithms to try common words and variations for passwords
- Brute force attacks: using software to generate many password guesses based on user information
- Denial of Service (DoS) attacks: overwhelming a network server with traffic to prevent legitimate access
- Distributed Denial of Service (DDoS) attacks: using multiple devices to attack a single target
Unintended Consequences
- Programmer bias: unintended consequences due to programmers' own biases and limited testing
- Algorithmic bias: systematic errors in computer systems that create unfair outcomes
- Privacy infringement: collection and use of personal data without consent
- Digital Divide: unequal access to technology and the internet due to infrastructure, geographic barriers, government restrictions, and socioeconomic status
Solutions to the Digital Divide
- Increase affordability of internet access and devices
- Develop more infrastructure for global connectivity
- Create informational resources for low-cost devices and internet access
Programmer Responsibilities
- Code of Ethics: guidelines for programmers to promote accountability and transparency
- Mitigating negative impacts of computing: programmer bias, algorithmic bias, privacy infringement, and digital divide
Legal Issues in Computing
- Digital Millennium Copyright Act (DMCA): protects copyrighted material online and provides safe harbor for web hosts and ISPs
- Intellectual property: creative works or inventions that can be patented, copyrighted, or trademarked
- Plagiarism: taking someone else's work or ideas without proper citation
- Creative Commons: non-profit organization promoting open sharing and collaboration of creative works
- Open Source: materials and software allowing others to build upon and adapt
- Open Access: providing free online access to informational materials and research for the greater good### History of Cryptography
- During World War II, the German army used the Enigma machine to encrypt messages to their generals.
- The Polish Cipher Bureau broke the code, allowing Allied code breakers to decrypt the German messages and predict the German army's movements.
Modern Cryptography
- Cryptography is the science of storing data securely in the digital age.
- Four important categories must be maintained when storing information virtually: confidentiality, authenticity, integrity, and ownership.
- Cryptography uses concepts like encryption and decryption to store data securely.
Encryption Explained
- Encryption is the process of changing a message or information to hide its true meaning.
- Plaintext (original message) is turned into ciphertext (encrypted text) for security.
- An encrypted message requires a key to be decrypted.
- Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications.
Decryption Explained
- Decryption takes the encrypted message and converts it back to the original plaintext.
- The key is needed to decrypt the message.
Encoding and Decoding
- Encoding refers to the algorithm that changes plaintext into ciphertext.
- Decoding algorithms are used to convert ciphertext back into plaintext.
- Encoding and decoding algorithms are consistent and public information.
- Encryption keys are needed to secure the encoded data.
Symmetric Key Encryption
- Symmetric key encryption uses one key for both encryption and decryption.
- Advantages: fast and efficient for secure data storage.
- Disadvantages: trust issues and key security can be a challenge since the key can exist with multiple parties or companies.
Public Key Encryption
- Public key encryption uses different keys for encryption and decryption.
- A public key is used to encrypt a message, and a private key is used to decrypt it.
- Example: Bob sends a message to Alice, encrypting it with her public key, and she decrypts it with her private key.
Why is Encryption Necessary?
- Encryption is necessary to protect sensitive information from unauthorized access.
- Examples: ATM transactions, military communications, and website data storage.
Encryption Methods
- Transposition Encryption: changes the position of letters in a message.
- Substitution Encryption: replaces letters in a message with new letters, characters, or numbers (cipher text).
- Examples of Substitution Encryption: T9 Texting and Caesar Cipher.
Substitution Methods
- T9 Texting: uses numbers associated with letters on a telephone keypad to write words.
- Caesar Cipher: a simple encryption method that shifts letters in the plaintext by a certain number of positions.
- Caesar Cipher uses a shift as its key, and the shift determines the letter substitution.
Caesar Cipher Shift
- The shift in the Caesar Cipher determines the letter substitution.
- Example: if the shift is 3, A is substituted for D, B for E, and so on.
- If the shift is 5, F would correspond to A, G to B, and so on through the alphabet.
Protecting Personally Identifiable Information (PII)
- PII can be collected through devices, websites, and detection hardware and software that track movements and location.
- Safeguarding PII is a key responsibility of citizenship in a digital world.
Authentication Measures
- One-step authentication measures use email and password to secure information.
- Strong passwords should be:
- At least 8-12 characters long
- Include capitalized letters
- Include lowercase letters
- Include numbers
- Include symbols
- Avoid personal identifiable information (e.g. birthday or name)
- Not be words found in a dictionary
- Multi-factor authentication provides more than one layer of security, using a minimum of two steps to access a virtual space.
- Examples of multi-factor authentication include:
- Choosing and identifying a security image
- reCAPTCHA identification
- Identifying pictures with a common image in them
- Answering security questions
Disadvantages of Accessible PII
- Negative consequences of accessible PII include:
- Credit card information getting into the wrong hands
- Web browsers tracking search history and preferences
- Location information being collected
- Information being used to stalk or steal identities
Protecting PII
- All systems have flaws, so software is needed to protect against cyber attacks.
- Recommendations for protection software include:
- Kaspersky Anti-Virus
- AVG Anti-Virus
- Norton 360 Deluxe Malware Protection
- ESET Cybersecurity
- Limit permission settings when allowing websites access to personal information.
- Password managers can generate complex, random passwords for online accounts.
Cybersecurity Awareness
- Be aware of where your digital footprint is to keep data secure.
- Cyber attacks include dictionary attacks, brute force attacks, and more.
- Hackers can be categorized as:
- White hat hackers (ethical hackers who test systems and protect against attacks)
- Black hat hackers (criminals who use their skills for personal gain)
- Grey hat hackers (individuals with a combination of white and black hat ethics)
Types of Attacks
- Malware refers to malicious software, including viruses, worms, spyware, and ransomware.
- Viruses are specialized computer programs that replicate and insert their code into a new host.
- Phishing is a type of cyber attack that uses disguised emails to trick recipients into providing personal information.
- Keylogging attacks use software or hardware to track keystrokes and gain access to usernames, passwords, and other information.
Public Network Insecurities
- Public networks are especially dangerous to cybersecurity because data can be easily accessed by hackers.
- Rogue access points can be created by hackers to steal personal information.
Digital Files
- Digital files have benefits, including:
- Time-saving in editing and transferring files
- Better efficiency in record-keeping
- Easier access to files
- However, digital files also have limitations and risks, including:
- Security breaches
- File insecurity
- Losing or corrupting information
File Security
- File security is a feature of the file system that controls access and limits what users can do to files.
- Effects of file insecurity include losing, overriding, or corrupting information.
- Steps to ensure file security include:
- Keeping computers and devices updated
- Using strong passwords
- Using anti-virus software
- Encrypting hard drives and mobile devices
- Restricting access to files
Five Pillars of Cybersecurity
- The five pillars are:
- Confidentiality (ensuring information is not disclosed to the wrong individuals)
- Integrity (ensuring information is not damaged or modified during transmission)
- Availability (ensuring services are accessible to users)
- Non-repudiation (proving the identities of the sender and recipient)
- Authentication (confirming identities before allowing access to cyber services)### Password Entropy
- Formula to calculate password entropy: log2(SL)
- S: Size of the pool of unique possible symbols
- L: Password Length
- Example: 6-character password with 26 possible symbols (all lowercase letters)
- Possible combinations: 26^6 = 308,915,776
- Bits of entropy: log2(26^6) = 28.2
Encryption and Decryption
- Encryption: process of changing plaintext (original message) to ciphertext (encrypted text) for security
- Decryption: process of converting ciphertext back to plaintext using a key
Downfalls of Computing
- Intentional misuse (cybercrime): using computing to commit crimes, e.g. fraud, hacking, identity theft, malware, phishing, cyberstalking
- Unintentional negative side effects: programmer bias, algorithmic bias, privacy infringement, inequitable access to technology and the internet
Cyber Attacks
- Dictionary attacks: using algorithms to try common words and variations for passwords
- Brute force attacks: using software to generate many password guesses based on user information
- Denial of Service (DoS) attacks: overwhelming a network server with traffic to prevent legitimate access
- Distributed Denial of Service (DDoS) attacks: using multiple devices to attack a single target
Unintended Consequences
- Programmer bias: unintended consequences due to programmers' own biases and limited testing
- Algorithmic bias: systematic errors in computer systems that create unfair outcomes
- Privacy infringement: collection and use of personal data without consent
- Digital Divide: unequal access to technology and the internet due to infrastructure, geographic barriers, government restrictions, and socioeconomic status
Solutions to the Digital Divide
- Increase affordability of internet access and devices
- Develop more infrastructure for global connectivity
- Create informational resources for low-cost devices and internet access
Programmer Responsibilities
- Code of Ethics: guidelines for programmers to promote accountability and transparency
- Mitigating negative impacts of computing: programmer bias, algorithmic bias, privacy infringement, and digital divide
Legal Issues in Computing
- Digital Millennium Copyright Act (DMCA): protects copyrighted material online and provides safe harbor for web hosts and ISPs
- Intellectual property: creative works or inventions that can be patented, copyrighted, or trademarked
- Plagiarism: taking someone else's work or ideas without proper citation
- Creative Commons: non-profit organization promoting open sharing and collaboration of creative works
- Open Source: materials and software allowing others to build upon and adapt
- Open Access: providing free online access to informational materials and research for the greater good### History of Cryptography
- During World War II, the German army used the Enigma machine to encrypt messages to their generals.
- The Polish Cipher Bureau broke the code, allowing Allied code breakers to decrypt the German messages and predict the German army's movements.
Modern Cryptography
- Cryptography is the science of storing data securely in the digital age.
- Four important categories must be maintained when storing information virtually: confidentiality, authenticity, integrity, and ownership.
- Cryptography uses concepts like encryption and decryption to store data securely.
Encryption Explained
- Encryption is the process of changing a message or information to hide its true meaning.
- Plaintext (original message) is turned into ciphertext (encrypted text) for security.
- An encrypted message requires a key to be decrypted.
- Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications.
Decryption Explained
- Decryption takes the encrypted message and converts it back to the original plaintext.
- The key is needed to decrypt the message.
Encoding and Decoding
- Encoding refers to the algorithm that changes plaintext into ciphertext.
- Decoding algorithms are used to convert ciphertext back into plaintext.
- Encoding and decoding algorithms are consistent and public information.
- Encryption keys are needed to secure the encoded data.
Symmetric Key Encryption
- Symmetric key encryption uses one key for both encryption and decryption.
- Advantages: fast and efficient for secure data storage.
- Disadvantages: trust issues and key security can be a challenge since the key can exist with multiple parties or companies.
Public Key Encryption
- Public key encryption uses different keys for encryption and decryption.
- A public key is used to encrypt a message, and a private key is used to decrypt it.
- Example: Bob sends a message to Alice, encrypting it with her public key, and she decrypts it with her private key.
Why is Encryption Necessary?
- Encryption is necessary to protect sensitive information from unauthorized access.
- Examples: ATM transactions, military communications, and website data storage.
Encryption Methods
- Transposition Encryption: changes the position of letters in a message.
- Substitution Encryption: replaces letters in a message with new letters, characters, or numbers (cipher text).
- Examples of Substitution Encryption: T9 Texting and Caesar Cipher.
Substitution Methods
- T9 Texting: uses numbers associated with letters on a telephone keypad to write words.
- Caesar Cipher: a simple encryption method that shifts letters in the plaintext by a certain number of positions.
- Caesar Cipher uses a shift as its key, and the shift determines the letter substitution.
Caesar Cipher Shift
- The shift in the Caesar Cipher determines the letter substitution.
- Example: if the shift is 3, A is substituted for D, B for E, and so on.
- If the shift is 5, F would correspond to A, G to B, and so on through the alphabet.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.