Checkpoint Flashcards
What are cookies?
Cookies are files on a user’s computer.
It started with the objective of saving storage from the website server
Instead of using their server, they would use each personal computer, without caring if they were accessing our storage or not. They only cared about their information.
They did not care about OUR / USER privacy or CONTENT
They are downloaded the 1st time you access a website with your user ID
It is used in future visits to identify the user with the user ID
The European union created a law to protect people’s DATA and PRIVACY - GDPR (General data protection regulation)
Now, the site has to tell / inform you
* let user know what information they access
* who they share the information with
* with what purpose they use the info
* each website can only access their website related cookie file
Now we know that website’s or companies use this data
* login
* not to loose shopping cart info / items
* Saving preferneces on website
* advertise what user’s like
* share with partner companies - 3RD PARTY COOKIES
DANGER
Pay attention to 3rd party cookies - check that info is not being shared without your concent
They are not needed if you want to visit the websitre
can be refused and website works normally
What data can be used?
the website users visit and links clicked
what browser is used by user
information about the operating system
Where you are located geographically
How they entered website
Time spent on website
Pages visited (number and which ones)
Companies then seperate their audience into sectors
Mobile APPs permissions
App permissions are required for every app that finds its way to the Google Play Store or Apple App Store, explaining what parts of your phone the app requests access to, even blocking you from using the app in some cases if you deny approval
App permissions basically explain what features of your device the app will access when you are using it or may possibly run in the background
It might require your camera, location, or your media files. Instagram… facebook
Most apps will require only the features it needs to function, but some apps can request a ridiculous amount of permissions before usage
Permission Types when downloading
Body Sensors.
This allows an app to access your health information such as your heart rate or step counts. These are normally required for fitness trackers such as a Fitbit wristband or Smartwatch to function.
Calendar.
The app will have access to your calendar events, with the ability to read and edit your existing appointments. Social networking apps typically need calendar access, but not too many other apps should. We normally recommend using the default calendar app that comes with your phone or Google Calendar for better safety rather than a third-party calendar app.
Camera.
The app can access your camera to take pictures and record videos. This one is crucial because if the app does not have a camera function in it, it should not require access to your camera. Through an app that maliciously requires your camera, a hacker could take control and record video without you even knowing it.
Contacts.
The app can read and possibly edit your personal contact list. By allowing access to your contact list to an app, you are giving away not only your information but potentially several others, so if an app require access to your contact list, be very careful about allowing access, especially if it really doesn’t need it.
Location.
The app requires your GPS whereabouts, which may include exact locations and times via cellular connections and Wi-Fi hotspots. Giving away your exact location could make your home a target for thieves. Apps that require location access normally give you the option to “only access location while using the app,” which Is the recommended option.
Microphone.
The app would use your microphone to record audio. Just like the camera, this is another crucial one because malicious apps could record full private conversations and place them in the hands of a hacker.
Phone.
This permission allows the app access to your phone number and network information. Several other apps that utilize a Voice Over IP (VoIP) connection, such as Facebook Messenger or LINE, will require this permission. Be wary of apps that could make phone calls without your consent.
SMS (Text Messaging).
This permission also includes MMS (multimedia messages), and allows the app to read, write, and send messages. Apps such as Google Hangouts typically as for this permission but if there isn’t any reason for messaging through another app, think twice before allowing access.
Storage.
This allows an app to access your internal storage or SD card. Photo, social, and music apps tend to require this permission more as there is content being loaded on to the device. However, be careful on this one as well because there is a chance a malicious app could swipe your private photos or other files on your device.
Hardware vs software
Computer hardwareare the physical components that make up thecomputersystem.
Hardwareis useless withoutsoftwareto run on it.
Softwareare instructions (programs) that tellcomputer hardwarewhat to do.
Softwareis useless unless there ishardwareto run it on.
Components functions
Any system is built with several different component
Each component has it’s function
These functions are related with the task they fulfil
The functions are:
Input
Output
Storage
Processing
Input devices
Input devices enables the user to send data, information, or control signals to a computer
In other words:
Allow the user to control the computer
Output devices
Output devices enables the user to understand what is happening on the computer by displaying the result of the processing.
The output can be in different ways:
Text;
Images;
Hard copies;
Audio or video.
Storage
Storage saves the data, instructions and all sort of files (school work, photographs, etc).
Without storage the computer would not be able to remember anything and we would not be able to save our files on it
Processing
Processing is the key reason why the computers are used.
The Central Processing Unit CPU (processor) carries out all the important functions of a computer
It receives instructions from both the hardware (input devices) and active software (programs, games, …) and produces output accordingly
Considered the thinking device (BRAIN) of the computer
What is a sensor?
A sensor is an input device that detects, reads, measures or responds to a physical stimulus, such as light, heat, pressure, or motion, and converts it into an electrical signal that can be processed and analyzed.
How do they work?
Sensors typically use one or more physical or chemical properties to detect a stimulus, such as changes in temperature, pressure, or light intensity.
They send this reading to the microprocessor/computer that is going to decide what to do, depending on the user configuration/settings.
That decision is then sent to the actuator (Who shall perform an action).
Where can we find them?
Sensors are used in a wide range of applications, from medical devices and automotive systems to smart homes and industrial automation.
They play a critical role in collecting and analyzing data, enabling better decision-making and improving safety and efficiency.
Types of Sensors
Temperature sensors, measure temperature;
Pressure sensors, measure the pressure of gases or liquids;
Light sensors, measure the brightness, light reflected;
Humidity sensors, measure the air humidity;
pH sensors, measure the pH;
Magnetic sensors, measure the magnetic field, or disturbances on the field;
Proximity sensors, measure the distance;
Infra-Red sensors, various applications (temp., radiation, motion).
Actuators
Heating and cooling systems: Air Conditioning systems in buildings and refrigeration systems in food storage.
Alarms and notifications: warning systems for overheating and hypothermia.
A pressure sensor in a car may activate a warning light on the dashboard if the tire pressure is too low.
Lighting systems: automatic adjustment of brightness and color temperature in LED lighting.
Device screen: automatic adjustment of brightness and adapt the screen.
Security systems: turn on the light when movement is detected, ring the buzzer.
Automatic door systems: motor opening and closing based on sensor readings
Peripheral
is all hardware components attached to a device. They are not needed for the computer to work.
Peripheral are manipulated by the computer systems