0

Cybersecurity: Summary

Viruses and Malware -- a computer security vulnerability wherein one computer could send another instructions to delete everything on it or take it over, or impersonate another's identity by guessing, cracking, or extracting a password.  
These vulnerabilities will never be rid of, because they are built in the internet's very architecture.

Photo from checkpoint.com




Public-Key Cryptography

  • Begins with a publicly available number
  • Addition of secret numbers, Private number A, to be mixed using;
  • Modular Math, or mathematical operations, with a another number;
  • Private Number B, to create a secret key.

For example, one's email service will use this secret key to transform and scramble your message. It will then transmit your coded message to your recipient, wich will also use this secret key to reverse the transformations and reveal the message you've sent.


Hacking -- "creative" problem-solving that takes advantage of the property of things in unexpected ways. 

Computer Hacking -- "creative" problem-solving that takes advantage of the property of computers and networks in unexpected ways. 

When one hears the word "hacker," it initially gives off a negative connotation, but the role of a hacker is flexible; Hackers can be a range of people, from criminals for theft, government for surveillance workers, to hacktivists for political agendas. Whether they're good or bad depends on why they hack in the first place. 
0

Encryption: Essential Questions

1. How is encryption accomplished to safeguard data exchange?

Photo from cdn.pixel.privacy.com
According to us.norton.com, Encryption is the process of converting ordinary text, such as a typed email or message, into an unreadable format called “cipher text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.

When the intended recipient accesses the message, the information is translated back in the form of decryption.

To unlock the message, both the sender and the recipient have to use a “secret” encryption key — a collection of algorithms that scramble and unscramble data back to a readable format.


2. What methods are used to compress data?

There two methods used to compress data, lossy and lossless compression.


3. What is lossy and lossless data compression?

According to ukessays.com, Lossless data compression makes use of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. This can be contrasted to lossy data compression, which does not allow the exact original data to be reconstructed from the compressed data.


4. What ethical dilemmas are created from access to data?

When one is give access to data, this means we have a plethora of information such as charts, recipes, art, records, music, etc. at our disposal. One major ethical dilemma that may arise from this is the means one of accessing data (and disclosed data), and the manner and usage of such.
Mary Ann Baily from nap.edu outlined positions at both extremes of the policy debate over data access, then made the case for pursuing a middle ground—striking a balance between the right to be left alone and the obligation to cooperate in the pursuit of communal goals.