View on GitHub

Tri3-IndivRepo

Alex Do's Individual Repository for Tri 3 Data Structures

Home N@TM TPT Notes Create Task Replit

Week 2: (3/21/22 ~ 3/25/22)

Notes:

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.

GitHub offers many licenses when you create a GitHub repository. Some examples include: Academic Free License, Apache License, Creative Commons License Family, MIT License, etc. All of these licenses have to do with computing and all fall under the topic of Legal and Ethical Concerns.

Make a license for your personal and Team project. Document license you picked and why.

For both personal and Team project, I chose MIT license because it is the most reliable license and allows for most people to use it freely

TPT 5.6 Safe Computing

Notes:

Virus & Malware

Encryption & Decryption

Phishing

Describe PII you have seen on project in CompSci Principles.

In Trimester 2, my team worked on the CRUD Project. In the project, we used CRUD and databases to store Personally Identifiable Information (PII) such as names, ages, usernames, emails, phone numbers, passwords, etc.

What are your feelings about PII and your exposure?

PII should not be displayed if it contains sensitive information. For example, I would not want to have my password displayed for anyone to see.

Describe good and bad passwords? What is another step that is used to assist in authentication.

Good passwords should contain 10 or more characters, a symbol, a number, and both lowercase and uppercase letters. Bad passwords lack these aspects and are usually not complex. Good Password: @l3x9@$$w0r6 Bad Password: alexpassword You can also authenticate your identity with your username, your driver license, and your face

Try to describe Symmetric and Asymmetric encryption.

Symmetric encryption: method of encrypting a message so that only the sender and receiver can read it

Asymmetric encryption: also known as public-key encryption, uses one public key and one private key to encrypt and decrypt a message and protect it from unauthorized access

Provide and example of encryption we used in deployment.

SSL Enscryption would be an exmaple we used in deployment

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

There were some phone calls that were phishing calls, but I never fell because I already knew it was a phishing call. Some phishing techniques include the fake invoice scam, the email account upgrade scam, the paypal scam, and other things