Big Idea 5 Flashcards
Positive Outcomes of Computing Innovations
- WWW
- Targeted Advertising
- Social media
- Machine learning
Downsides when Computing Innovations used in Unintended ways
- Cyberbullying
- Robbing of homes
- Discrimination
Cloud Computing
offers new ways for communication and collaboration between people. storing documents to the cloud essentially stores the document in a computer server in another location. many people can work on the same document at once and documents can be accessed by different divices
Digital Divide
line between the people who can use the internet and www and the people who DONT have access to the Internet and WW.
Bias in Computing Innovations
unintentionally, prejudice can be shown up in computing innovation as humans write the algorithms. (AI)
Crowdsourcing
allows people to share information and ask the crowd (anyone who can access the site) for feedback.
Legal/Ethical Concerns
- plagiarism
- illegal downloads
- copyright concerns
- sharing of personal information such as face ID
Creative Commons
provides a way for creator to share their creation for sharing and specific permissions clearly indicated by the author.
Open Source Software
software that is freely shared, updated, and supported by anyone who wants to do so. concerns arise if this is used malevolently
Open Access
sharing of huge amounts of public data (such as from the US gov) allows anyone to search for information.
Search Trends and Analytics
using what you’ve searched, companies can predict trends
Data Mining
field of study that analyzes large datasets
Machine Learning
uses algorithms to analyze Dara and predict behavior (targeted ads)
PII
Personally Identifiable Information. any information that identifies you.
- address
- age
- social security number
- medical/financial info
- fingerprint
PII Effects (+ and -)
- saving passwords makes it easier to access them again
- predict websites based on previous visits
- ads based on shopping cart
- using location to show specific ads
Multifactor Authentication
additional steps on top of password to ensure identity (knowledge, another device, biometric data (fingerprint))
Cybersecurity
protects our electronic devices and networks from attacks and unauthorized use.
Cybersecurity attacks
- downloading a computer virus: viruses attach themselves to an infected file and then spread to the code of your device
- phishing attacks: email/website that looks legitimate to infuse a person to click on the link and insert their private information
- downloading other malware
- key logging software: form of malware that captures every keystroke and transmits it to the attacker to help identify passwords
- accessing public network
Solution for computer malware
antivirus software, firewalls, and caution
Cryptography
waiting secret codes
Encryption
converting a message to a coded formate
Decryption
deciphering the encrypted message
Ciphers
coded messages that include:
key - allows creation of secret messages
algorithm - set of steps used to make the message unreadable to anyone without a key
Asymmetric Keys
two keys are needed (one to encrypt and other to decrypt)
Public Key Encryption
uses open standards, meaning the algorithms used are published and available to everyone. the public key is used to encrypt data and is published to anyone. messages are then decrypted using a private key.
One way function
the sender doesn’t need the private key to encrypt the messages, only the relieves needs it to decrypt them
CAs
Certificate Authorities which identify trusted sites
Symmetric Keys used for
Encrypting AND Decrypting Dara
Malware
software that can take control/harm a computer system
Rogue Access Point
data sent over public networks can be incepted, analyzed, modified