Converting data into unreadable form to prevent unauthorized access
Name of the mathematical algorithm that we used generate paired keys to encrypt and decrypt messages.
Personally Identifiable Information
What is PII ?
Simplifying complex systems by focusing on essential features while hiding unnecessary details.
What is Abstraction?
What is 1?
Converting encrypted data to human-readable form
Decryption
The key do you use to encrypt a message so that only the recipient can read it
Fingerprint, Retinal scan, DNA
What are examples of Biometric PII?
Moving related segments of your code into functions (procedures).
What is Procedural Abstraction?
A structure containing a group of related data
What is a list?
This form of text file stores a packet of data on your device to keep track of your visits and activity on a website
What is a cookie?
Using a pre-shared "key" to restrict message access to only the intended recipient(s)
What is Symmetric Encryption?
wifi access point with unauthorized access to secure network
What is a rogue access point?
Two advantages that abstraction provides your code?
What are:
Reduce complexity
Easy to reuse
Easier to read
Easier to maintain
Easier to collaborate
Procedure to add a value at the end of a list
What is APPEND?
This form of software is intended to damage or take control over a host computer or operation
What is Malware?
Trusted entity that providing a digital document to verify identity (key ownership)
What is a Certificate Authority?
Action of seeding fraudulent emails from supposedly good companies to try and extract personal information from the victim.
Five advantages that abstraction gives your code
What are:
Reduce complexity
Easy to reuse
Easier to read
Easier to maintain
Easier to collaborate
name <-- ["T","A","P"] tap
INSERT(name, 2, "R")
DISPLAY(name)
What is TRAP?
(not TARP! AP starts with index=1)
Restricting message access to specific person without sharing the "key" you used to encrypt it
What is Asymmetric Encryption?
The key you use to encrypt your message so your recipient can verify that you sent the message.
Software that records what a user types
What is a Keystroke Logger?
Two examples of abstraction
What are:
Importing functions from a separate file
Procedural abstraciton
Data abstraction
A list
A function
transportList <-- ["Bus", "Taxi", "Ferry"]
transport <-- transportList[2]
letter <-- transport[1]
What is the letter "T" ?