Leo's github page

CSP 2022 Tri 3


Project maintained by lleosunn Hosted on GitHub Pages — Theme by mattgraham
Home Test Prep Data Structures Create Task

5.6 Safe Computing


Notes

Actions

Describe PII you have seen on project in CompSci Principles.

When we did CRUD last tri, with the information of the person in the database.

What are your feelings about PII and your exposure?

I try my best to make strong passwords but I don’t think too much about security.

Describe good and bad passwords? What is another step that is used to assist in authentication.

A good password will be one of different characters and symbols. A bad password is one that is too predictable. Another step that is used to assist in authentication is multi-factor authentication. For exaomple, this could be a 6 digit code that is sent to your email or phone number.

Try to describe Symmetric and Asymmetric encryption.

Symmetric: uses a public key to encrypt and decrypt

Asymmetric: uses a public key to encyrpt and a private key to decrypt

Provide and example of encryption we used in deployment.

An example of encryption we used in deployment is through the use of an ssl certificate.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

I have never fell for a phishing scheme but I have seen email phishing a lot. I was made sure to delete the emails and not click on the links. Another type of phishing technique is deceptive phishing.