5.6 Safe Computing (Part B)
Collection of resourcs for 5.6B focusing on attacks/encryption/privacy
Resources
- Privacy On the Web: Citizen Lab’s report on Webloc surveillance
- Cyberattack Methodologies: Wikipedia excerpt
- Pubkey Cryptography: Asymmetric/Symmetric Cryptography
Collegeboard Terms
- PII: redudant (see 5.3)
- Multifactor Authentication (MFA) - a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
- Encryption: process of encoding data to prevent unauthorized access
- Decryption: process of decoding the data. Two common encryption approaches are: symmetric/asymmetric (symmetric = same password used for encryption + decryption)
- Computer virus: malicious program that can copy itself and gain access to a computer in an unauthorized way
- Malware: software intended to damage a computing system or to take partial control over its operation
- Phishing: technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- Keylogging: use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- Rogue Access Point: a wireless access point that gives unauthorized access to secure networks.