unit 10 Flashcards
PII
Personally Identifiable Information
what is PII
information about an individual that identifies, links, relates, or describes them
what does technology enable?
the collection, use, and exploitation about, by and for individuals, groups, and institutions
what can be used to create knowledge about an individual?
geolocation, cookies, and browsing history
what do most digital technology need to work?
some sort of PII (street navigation needs location)
what is another reason why a website would collect more data?
to improve their services
services and websites collect info that can be used to do what?
advertise to you by creating detailed profiles of who you are and what you like
what can search engines do? what can this be used for?
record and maintain a history of searches made by users;
info can be used to suggest websites or for target marketing
once data is made digital and shared online, what happens to it?
it is much harder to control
what can PII used to do in a negative way?
steal the identity of a person, or stalk them online
what happens with information that is often posted social media?
can be combined to create a profile on you
phishing
a technique that attempts to trick a user into providing personal information and then be used to access sensitive online info like bank accounts and emails
keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential info
malware
software intended to damage a computing system or take partial control over its operation
rogue access point
a wireless access point that gives unauthorized access to secure networks
encryption
a process of encoding messages to keep them secret, so only “authorized” parties can read it
decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
cipher
the generic term for a technique (or algorithm) that performs encryption
Caesar’s Cipher
a technique for encryption that shifts the alphabet by some number of characters
cracking encryption
when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption
symmetric key encryption
involved one key for both encryption and decryption
public key encryption/asymmetric encryption
pairs a public key for encryption and a private key for decryption
sender does not need receiver’s private key to encrypt a message, but receiver’s private key is required to decrypt the message
what can you do to protect you data?
use multifactor authentication
update software
single factor authentication
something you know (password)