Summary

This document covers various aspects of privacy and security, from establishing strong passwords to understanding different types of hackers. It also explores the implications of hacking ethics, illegal hacking, and the importance of secure digital practices, including access controls.

Full Transcript

Privacy and Security: Privacy= the appropriate use of your data Security=the integrity confidentiality, and availability of your data Strong passwords: Complete passwords 8-20 characters Capital and lowercase + special characters ( $%^#&@) Numbers Different Passwords for different 2 fac...

Privacy and Security: Privacy= the appropriate use of your data Security=the integrity confidentiality, and availability of your data Strong passwords: Complete passwords 8-20 characters Capital and lowercase + special characters ( $%^#&@) Numbers Different Passwords for different 2 factor Authentication A 2 step verification process for an added layer of security - Texting your phone with a unique pin - Calling your phone with a unique pin - Ask you a security question specific to you PAssword Managers - Help manage and diversity your passwords - Be careful… you need to keep your master password safe DOn’t write passwords on apps - the more random the better Secure sites: Https:// - s= secure - http://= less secure Verify the URL Avoid lots of popups - 1 or 2 popups are okay Use your best judgment Secure Access to HArdware Webcam access Audio access Microphone access Location Privacy policies: Legal documents website have the disclose the ways they can store and share your data - Typically very long and dense documents may users do not want to read Security reminder Use your best judgment online Use password best practices Check twice to make sure a website is secure Be careful when logging on to public computers Stay up to date on the best web Which of the following are best practices for having a secure password? ​ Creating a password that is long in length ​ Incorrect Answer ​ Creating a password that has a combination of letters, numbers, and special characters ​ Using a password manager ​ Correct Answer ​ All of the above By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what. ​ Incorrect Answer ​ True. This is always the case. ​ True. Changing your settings does not affect the privacy policy. ​ Correct Answer ​ False. It depends if the privacy policy allows you to opt in or out of sharing data. ​ False. Companies do not give you the option to update your settings. HACKING ETHICS AND LEGALITY HACKER - someone who breaks through defenses and exploits weaknesses in a computer system or network. WHITE HAT + Black HAT hackers BLACKHAT HACKERS - Criminal hackers that break into secure networks to destroy, modify, or steal data - Break network functionality - Hack for personal gain or to cause harm - Criminal hackers who face serious legal consequences. White HAt HAckers - Good hackers - Have permission to hack a system - HIred for penetration testing: Use same methods as black hats FInd vulnerabilities before malicious attackers - - Contribute to robust security systems GRAY HAT HACKER - Both like black and white hack hacker. - Hack without permission-oftentimes illegally - Once vulnerabilities are found will contact the organization and request payment. BUG BOUNTY PRograms - Companies pay individuals who report vulnerabilities before malicious hackers can exploit them - Program rules may exclude certain products or hacking methods LEGAL HACKING - Examples of legal hacking: - Working as a penetration tester - Following the rules of a company’s bug bounty program - Hacking a site created explicitly as a teaching tool ( hackthissite.org) ILLEGAL HACKING - Finding and exploiting vulnerabilities for personal gain - Hacktivism ( hacking to promote a political agenda or social change) - Trying to find system vulnerabilities without permission ( grey hat hacking) - Breaking the rules of a bug bounty program. CONSEQUENCES OF ILLEGAL HACKING N the united states, a criminal hacker faces - Felony charges - Prison time ( up to 20 years) - Fine ( up to $15,000) LESSON 3:COMMON SECURITY PROBLEMS programmable technology Digital Privacy in a Transparent Society Need for secrecy Refer back cyber hygiene concepts Ask students to consider a; the ways they use when trying to keep a secret CIA Triad Toolbox Personal Security Organizational Security Personal Security HTTP vs HTTPS ( security connection) Password (PW) Fields - Chars: Very Limited number/no minimum number required - Special chars not allowed - Credential sent via email on sign-up - Emails new PW - Does not confirm PW before changing it Look for CAPTCHA CURRENT EVENTS Goal: knock a site offline or access data? How much/ what kinds of data were compromised? What is the organization doing? How is the company helping customers Brainstorm way that the problem could have been prevented OWASP: Open Web Application Security Project LIVING IN A DIGITAL WORLD “Fortification PRincipes Hackers only need to “ get it right” once Those developing and deploying the system need to get it right every time. CYBERSECURITY EMPLOYMENT OUTLOOK 2017 median pay $95,510 Bachelor’s degree Job outlook, 2016-26: 28% growth ( MUCH faster than average ); 7% for all occupations SQLi and XSS Practice doing SQL queries so they are familiar with the basics of this type of programming Foundation for SQLi and XSS , which are STILL some of the most prevalent styles of cyber attacks WORDS TO KNOW FOR QUIZZ: - Data security - Hacking ethics: - Phishing: baiting - malware : designed to hurt and exploit you - Weak passwords - File and folder management: How organized you are with your files and folder - Cloud storage: Cloud storage saves data on multiple servers at different locations - Logal storage: Local storage response time will be quicker than cloud storage response. - Cloud storage saves data on multiple servers at different locations. Local storage response time will be quicker than cloud storage response. Locally stored data may only be accessible from the office, while cloud storage can be accessed anywhere. Cloud storage is more cost-effective. - Access control: permission setting rights to show that only authorized users can access/ edit the file. READ ONLY - Digital divide: some communities have internet access and some don’t ( gap between individuals and communities between who have access to internet , ect. - FILE MANAGEMENT PART 1 File: a chunk of a certain kind of data Folder: place you can put files IMPACT OF THE INTERNET Collaboration Communication - Dissemination of information Crowdsourcing Anonymity Censorship Communication: Email Video calls Social media Citizen Science Foldit - Online game where players attempt to solve the folding structure of important proteins - Payers produced an accurate model of an AIDS causing virus in 10 days Had been unsolved by computer simulations and researchers for 15 years Distributing computing Folding@home Donate computing power rather than personal puzzle solving time - Harness the power of thousands of personal computers volunteering processing time - Compute exponentially more simulations than a single computer coil - Breakthrough in understanding Alzheimer’s disease Huntington’s disease Cancer HIV E-commerce Online shopping - Buy directly from retailers - Easily purchase from other people who don’t have the funds to run a physical store - Able to find the best product at the lowest price Rather than being disadvantaged by location or lack of knowledge. Crowdfunding - Kickstarter - Iniegogo - Tilit Access to Information Open databases of scientific publications o Free and subscription based o Scientific papers are no longer only for those at research institutions, anyone can learn Wikileaks o Transparency of information o Potential danger in classified secrets being public What is the purpose of the Digital Millennium Copyright Act? ANswer: to protect copyright holders from online theft Future of Computing Traditional computers: Use von Nuemann’s architecture Built using electric circuit boards Mechanical in nature Deterministic New kinds of computers: DNA computers ( DNA , genetic code , protein , Quantum computers ( for quantum mechanics) DNA computers First introduced in 1994 by Leonard Adleman USe enzymes and DNA strands to perform specific computations Can store billions times more data Can perform calculations in true parallel - Traditional computers give the illusion of parallelism Most useful for solving complex math problems, not casual computing Quantum computers 1981- paul Benioff first applied quantum theory to computing Non-deterministic - Rather than bits being either 1 or 10, bits can be 1 and 0 or somewhere in between Truly parallel Can perform trillions of math operations per second - Traditional computer perform only illions Still mostly theoretical Artificial intelligence A branch of computer science dealing with the simulation of intelligent behavior in computers Intelliegent Human BEhavior Computers can already do many intelligent things - MAthematical computation - Classifying pictures - Play games But some are still really hard for computers - Emotions - Reasoning based on context - Detecting irony or sarcasm - Reading body language As you watch, consider the following questions: 1. What types of jobs will AI affect the most? The type of jobs that Ai would affect the most are, labor intensive lr require data analysis in the financial industry 2. How has AI impacted the health industry? Impact that Ai has on the health industry is by processing huge amounts of data and up to date research to help doctors diagnose and treat patients. 3. What is the risk of autonomous weapons? The risk of autonomous weapons is that people will use them for bad reasons like mass destruction..

Use Quizgecko on...
Browser
Browser