Big Idea 5.6 Safe Computing
5.6 Hacks Questions
1. Describe PII you have seen on project in CompSci Principles.
A Personal Identifiable Information is an "about me" page, as well as links to my YouTube channel and github profile.
2. What are your feelings about PII and your exposure?
I think that sites that release PII about everyone (like address, state/cite of residence, email/contact info) are kind of creepy, and I know that I am vulnerable to being on those sites.
3. Describe good and bad passwords? What is another step that is used to assist in authentication.
Good passwords are passwords that are unlikely to be guessed by others and use a variety of words, capitalizations, numbers, and symbols. Biometrics also make great passwords. Another step that's used to assist in authentication is two-factor authentication that has been texted or emailed to you directly every time a log-in attempt is made.
4. Try to describe Symmetric and Asymmetric encryption.
- symmetric = only one type of key is used to both encrypt and decrypt electronically stored info
- asymmetric = uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use
- I think my personal fastpages repo uses an asymmetric key
5. Provide and example of encryption we used in deployment.
We used a public key and private key to activate our fastpages repositories when we first created them.
6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
I heard of a family member getting phished through an email from "PayPal" which asked them for all their personal information, including their social security number. Another phishing technique is sending emails or text messages with links that ask you to claim something, but when you click them, they start adding a virus to the device or attempt to steal your PII.