Most computers and the computer systems store the information of their users. Information like your location, cookies, and browsing history which can be used to identify your personal data.
A key tenet of safe computing is protecting your personally identifiable information, or (PII).
There are quite a few benefits for websites and applications to collect their user’s information.
On the other hand, people are generally concerned about the rise of information collection, and with good reason. Without strong protections, this collection of information could be exploited.
For example, some personal information about your location and travel routes might be used for stalking purposes. Other pieces of personal information, especially your social security number, can be used to steal your identity. Companies that collect personal information could put their users at risk if they’re hit by a data breach.
What is 1 benefit and harm of information collecting?
answer: One benefit is that you can have a personalized experience, and one harm is that private information of you can be collected.
Another type of information on the internet that might harm you is the information you put online yourself. There’s potentially a lot of information you can find out about someone just by looking at their social media accounts or by combining information posted on different accounts. You might be revealing things you aren’t comfortable with by accident.
As an example: Keen-eyed viewers can sometimes tell where someone lives based on a picture of the view outside of their window.
Information placed online can be used in unintended ways. A nasty message or unwise post can come back to bite you if it’s sent to prospective employers or college admissions officers. Thanks to the power of screenshots and forwarding, it can also be very difficult to delete information once it’s out there.
It’s a good idea, in general, to think carefully before you put anything on the internet. When in doubt, defer to the side of caution.
In 2000, the ILOVEYOU virus, named for the fake love-letter email it attached itself to, caused over ten billion dollars of damage across the world. In 2017, the WannaCry worm attack caused a similar amount of damage by encrypting hard drive files and holding them for ransom.
Computer viruses are a type of malware , short for malicious software, is intended to damage or take partial control over a computing system.
Scammers online can take advantage of human error to gain potentially harmful information. Phishing, for example, works by tricking users into providing their personal information by posing as a trustworthy group. For example, you might get a fake email from someone pretending to be your bank that says your credit card or bank account has an issue and they need your username and password to fix it.
The information you send over public networks, like the Wifi network at a coffee store, has the potential to be intercepted, analyzed, and modified. One of the ways this can happen is through a , a wireless access point that gives unauthorized access to a secure network.
A key way to practice safe computing is to be wary. You never want to open or click any links in an email that you don’t recognize the sender of. (Hackers can also gain access to people’s accounts, so also be wary if you get a strange message from a friend.) Furthermore, be careful about what you download onto your devices; only download from websites you trust.
Fortunately, these concerns haven’t gone unnoticed, and today there are many systems in place to help protect you on the internet.
measures keep people from gaining unauthorized access to your accounts. We’re going to look at two of them here: making a and implementing a multi-factor method.
A passphrase is a password that’s easy for you to remember but difficult for someone else to guess, regardless of how well they know you. You don’t want to use a generic phrase to create your password (“password,” “12345,”) or something that could be easily guessed (your name, the name of your family members, etc.) Strong passwords often use a variety of characters, such as uppercase letters, numbers, and symbols (M4r13_cur13).
This website can help you determine how strong your password is, and also highlights what makes a password weak or strong.
You’re mostly in charge of creating your own strong passwords, although many companies have implemented requirements for passwords to make them stronger. (They may require you to have a capital letter in your password, for example, or a symbol).
On the other hand, multifactor is provided by the website you’re using, although you can generally choose to opt-in or out of it. Multifactor is a way to control who gets access to your accounts by requiring multiple (at least two) methods of verification.
Typically, these proofs will fall into one of three categories, and they’ll usually be in two separate categories.
A multifactor system can provide multiple verification options for user convenience, as well as security. For example, a login system for your email account might let you choose between sending a verification code to another email or to your phone in order to get in. That way you can still get into your account even if you don’t have your phone on-hand,
The more layers of verification you have, the more secure your account generally is, although there are limits and exceptions to the rule.
Encryption, another way of protecting people’s data, is the process of encoding data to prevent unwanted access. (Decryption is the process of decoding data.) Traditionally, encryption was used to send and receive secret messages between spies or military generals. Coding mechanisms like the Caesar Cipher and the French Great Cipher became famous.
Both of these encryption methods use a key, or a secret piece of information, to keep their messages secret. Only the person the message is intended for should know the key.
For example, the Caesar Cipher works by shifting all the letters in a message down or up a given alphabet. In this case, the key is the number of letters that the message is shifted by. In the image below, all the letters are shifted up by 3: E becomes B, D becomes A, and so on. Therefore, the key is 3.
Today, you can use the computer to decode such simple codes quickly, and therefore more complex methods of encryption are needed.
Using the image above, decode this message: Zeofpqjxp fp qeb ybpq elifxyv
answer: Christmas is the best holiday
The system relies on digital certificates. These are issued by Certificate Authorities (CAs) to trusted sites. They allow other computers to verify that a website is what it says it is. These certificates are essential to the system because they foster trust between websites. Think of the certificates to be a little like the signature on a check—once we see that signature, we know that the check is trustworthy.
What are the two common approaches to encryption?
answer: Symmetric/Asymmetric encryption are two common approaches to encryption