Unit 10 Flashcards
Computing Innovation
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Personally Identifiable Information (PII):
information about an individual that identifies, links, relates, or describes them.
Most digital technology needs some kind of PII to work
advertise to you by creating detailed profiles of who you are and what you like
PII can be used to steal the identity of a person, or stalk them online. Information that is often posted on social media can be combined to create a profile on you.
10.3 takeaways
slide 6
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Malware
oftware intended to damage a computing system or to take partial control over its operation
Rogue Access Point
a wireless access point that gives unauthorized access to secure networks. (starbucks2) (airport/traveling)
10.4 takeaways
Our private data powers a lot of computing innovations in ways we like. It makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data.
Not every effect of a computing innovation is anticipated in advance.
This data can also be used by companies, governments, or criminals in ways that we didn’t intend or that threatens our privacy.
Encryption
a process of encoding messages to keep them secret, so only “authorized” parties can read it.
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text.
Symmetric Key Encryption
involves one key for both encryption and decryption.
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
Multifactor Authentication
a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
Computer Virus Scanning Software
protects a computing system against infection.
Cipher
the generic term for a technique (or algorithm) that performs encryption