-
Notifications
You must be signed in to change notification settings - Fork 83
Tri 3 TPT 2.0 Safe Computing 5.6
suneelanaidu edited this page Mar 8, 2022
·
8 revisions
As we create Web Site and post information we are adding to Searchable PII. However, there is a dichotomy as a site **like LinkedIn is a place where we want to be know for our accomplishments. But beware, the person that looks at your LinkedIn will, most likely, look at things like Instagram or Facebook.
- Things that will be known by everyone: Name, Email (suggest a junk email), Picture, High School attended, College Attended, Properties you own, State-City of residence, all State-City of previous residence, Credit Report
- Gray are items, more cautious: Birthdate, Place of Birth, Street Address, Phone Number, Maiden names of Mother and Grandmother, Drivers License Number
- Things that you should strive to keep absolutely secret: Credentials for Access, Two-Factor Authentication on Financial accounts, Social Security Number, Tax records
- Multi-factor authentication often requires you to enter a code that has been texted or emailed to you. Other types of authentication are biometrics (finger print or facial recognition).
- Malware is often sent in attachments to things in email. Often they request you to click on an attachment and it starts the process of adding a virus to your computer.
- Phishing is where unknown sources try to entice you into a response, like click here and receive $500. Often such systems impersonate someone like Amazon asking for login information.
- Most of my financials or critical system use Multi Factor authentication
- Biometrics is something that is used secure systems, fingerprints or facial recognition
- Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
- SSL Uses both Asymmetric and Symmetric Encryption
- Virus or Malware are opposite of Increasing Security
- Phishing is a way to get a Virus on your machine, or a way to get you to input PII
- Describe PII you have seen on project in CompSci Principles.
- What are your feelings about PII and your exposure?
- Describe good and bad passwords? What is another step that is used to assist in authentication.
- Try to describe Symmetric and Asymmetric encryption.
- Provide and example of encryption we used in deployment.
- Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.