Skip to content

Tri 3 TPT 2.0 Safe Computing 5.6

suneelanaidu edited this page Mar 8, 2022 · 8 revisions

Safe Computing

Personal Identifiable Information (PII)

As we create Web Site and post information we are adding to Searchable PII. However, there is a dichotomy as a site **like LinkedIn is a place where we want to be know for our accomplishments. But beware, the person that looks at your LinkedIn will, most likely, look at things like Instagram or Facebook.

PII considerations

  • Things that will be known by everyone: Name, Email (suggest a junk email), Picture, High School attended, College Attended, Properties you own, State-City of residence, all State-City of previous residence, Credit Report
  • Gray are items, more cautious: Birthdate, Place of Birth, Street Address, Phone Number, Maiden names of Mother and Grandmother, Drivers License Number
  • Things that you should strive to keep absolutely secret: Credentials for Access, Two-Factor Authentication on Financial accounts, Social Security Number, Tax records

Beware, Establish practices for your own Safety

  • Multi-factor authentication often requires you to enter a code that has been texted or emailed to you. Other types of authentication are biometrics (finger print or facial recognition).
  • Malware is often sent in attachments to things in email. Often they request you to click on an attachment and it starts the process of adding a virus to your computer.
  • Phishing is where unknown sources try to entice you into a response, like click here and receive $500. Often such systems impersonate someone like Amazon asking for login information.

Factors to Increase Security of System (recommend Watch 5.6 Video 2)

  • Most of my financials or critical system use Multi Factor authentication
  • Biometrics is something that is used secure systems, fingerprints or facial recognition
  • Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  • Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • SSL Uses both Asymmetric and Symmetric Encryption

Nefarious Uses of Internet

  • Virus or Malware are opposite of Increasing Security
  • Phishing is a way to get a Virus on your machine, or a way to get you to input PII

GitHub Pages actions:

  1. Describe PII you have seen on project in CompSci Principles.
  2. What are your feelings about PII and your exposure?
  3. Describe good and bad passwords? What is another step that is used to assist in authentication.
  4. Try to describe Symmetric and Asymmetric encryption.
  5. Provide and example of encryption we used in deployment.
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
Clone this wiki locally