5.6 Safe Computing
GitHub Pages actions:
- Describe PII you have seen on project in CompSci Principles.
- In the project last tri in csp, we have our name, email on the contact info and our name and picture in the about us page.
- What are your feelings about PII and your exposure?
- I was pretty cautious and careful about not to give out my PII so I don’t really reveal too much PII online.
- Describe good and bad passwords? What is another step that is used to assist in authentication.
- A good password should contain a mixture of numbers, letters (uppercase and lowercase), special characters and the more characters, the better. Bad password is easy, short, and contains no special characters, which people can easily guessed the password.
- Another step that is used to assist in authentication is email/message verification code authentication.
- Try to describe Symmetric and Asymmetric encryption.
- Symmetric encryption only has one key used to encrypt and decrypt information while Asymmetric encryption used two keys, a public key and a private key to prevent unauthorized access to the information.
- Provide an example of encryption we used in deployment.
- I think we didn’t incoperate any encryption in our previous deployment.
- Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
- A email that trick you to click a link or attachment, and if you click the link, a virus or keylloger may be installed in your computer and will steal your information later on. Message that’s alerting you for suspicious activity and asks you click on a link.