Impact of Computing Flashcards
What is Keylogging?
The use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other private info.
Keylogger is a tool to capture every keystroke(records key that is struck) from a computer
What is Phishing?
A technique that attempts to trick a user into providing personal information. The personal info can be used to access sensitive online resources such as bank accounts and emails
What is Malware?
Software intended to damage a computing system or to take partial control over its operation
It can spread viruses, steal personal or financial data and hijack Computers.
Examples include Bug, Virus, Worms, Bots, etc.
How does asymmetric (public key) encryption keep data secure?
Asymmetric encryption uses computationally hard problems with a secret (private) and shared (public) key. With asymmetric encryption, a message encrypted with one’s public key can only be deciphered by one private key and vice versa
What is Multifactor Authentication?
Multi-factor authentication is when you use two or more authentication. factors to verify your identity. These factors include Something you know, such as a password, passphrase, or personal identification number (PIN) (Something you have, such as a token or smartcard.)
What is the difference between the World Wide Web and the Internet?
The internet is a global connection of the internets while the world wide web accesses information FROM the internet
What is the digital divide
It refers to the differing access to computing devices based on the Internet, based on geographical, socioeconomic or demographic backgrounds.
What is crowdsourcing?
The practice of taking input or info form a large number of people via the internet
What is PII?
Personal identifiable info about a person that identifies, links relate or describes them.
What is multifactor authetication
A two-step process authentication, using knowledge (password), possession, (phone access code), inheritance(fingerprint, face id)
Explain Encryption and Decryption
A private key is used for encryption and public for description.
What is a Public Key/Private Key
a key is basically a code/formula that encrypts or decrypts a word, sentence, password
Public and private keys form the basis for public-key cryptography, also known as asymmetric cryptography. In public-key cryptography, every public key matches only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can only decode it using their matching private key.
Example:
What is citizen science?
We use our own computing devices, apps, to send info, (report, transmit, ) to larger causes that benefit society( ex; recording air quality to the factories(big)
What is Rouge access point
A rogue access point can intercept a packet, change its contents, and then forward the changed packet to the website server.
What is symmetric encryption/asymmetric encryption?
Symmetric––uses the same key is used to both encrypt and decrypt the data. ex Ceaser Cipher. Asymmetric––uses different keys for encryption and decryption, allowing computers over the Internet to securely communicate with each other.