The text delves into the fundamentals of encryption, particularly focusing on the roles of private and public keys in securing information. It highlights the significance of digital signatures in authenticating messages and ensuring long-term encryption.
Using both the private and public key allows for: 1) simplified key distribution 2) digital signatures and 3) long-term encryption
Digital signatures provide a way for a message to be authenticated (or knowing where the message is coming from)
Private Key Encryption
The concept is that the public key and the private key are both involved in locking and unlocking the hidden information.
The public key is distributed freely
Secret Key Encryption
Shard Secret Encryption - used to securely distribute the key to both parties, but still the same key.
Symmetric Key Encryption - used for encrypting and decrypting information for the same "door"
The foundation of all secure messaging on the open internet.
Forms
In America Thomas Jefferson used a cipher wheel during the Revolutionary War
Earliest form was found in Egyptian Hieroglyphics - it was a relatively simple reconfiguration of letters, now called transposition cipher.
Julius Caesar used the rotation of letters technique, and uses the letter 3 letters later in the aplhabet.
Protecting intellectual property or valuable date
Uses
Emails
Online shopping transactions and passwords
ATM Machines
The study of hiding information.
Ensures confidentiality
Cipher - a method of hiding or revealing information
Decryption is transforming chipher text into plain text
Encrption is a way to transform plaintext into unreadable ciphertext.
Interaction
Style a certain element normally AND style it in a given state (active, hover...)
Colors
style="color:red;"
rgb(red value, green value, blue value)
color:#
Enter a hexadecimal code after the #
A browser is an installation on a computer that allows anyone with access to the internet to view the same information displayed on the internet
Styling
Insert "style=" in any tag and add tag the attribute and value after. Ex) style="color:red;"
Tables
Use the table row tag () to make a new row. Use the table header tag () for the first row. Use the table data row () for every other row
It is important for browsers, such as FireFox, Safari, and Google Chrome, to be up to date in order to process any html and css changes.
The internet is a network of networks that allows people with access to it to communicate and see information
Web Design and Development
Websites
Use a URL (Uniform Resource Locator) such as www.example.com/homepage.html
The Path (homepage.html)
The Domain (www.example.com)
Browsers
The Internet
Web Development
Web developers are responsible for making the website through html and css that a web designer wants to use
Web Design
Web designers are responsible for designing the website with styles and making it appealing to others
Intro to Computer Science
Cybersecurity
Encryption Techniques
Steganography
Cryptography
This method of secret writing involves making systematic changes to the message that is to be sent
Used to hide information by means of concealing information in another type of file (hiding a picture in a docx file, etc.)
Fundamentals
When you make these websites, you need to make sure it has good security
Insider Threats
Cybersecurity is: Protecting computers against intentional misuse, A terminology that is very commonly used these days, Referring to computer/information security issues that occur because
of the prevalence of the Internet
There are many security properties:
Ways to Keep Our Information/Property
Safe: Biometrics, Encryption, and Digital and Mobile Forensics
Counter Measures
Preventative, Detective, Corrective
called safeguards, protections, and controls
Tools used to thwart attacks
Outsider Threats
examples: Malware: viruses and worms, Trojan horses, spyware and rootkits, Mobile codes, Social engineering, (Distributed) Denial of Service (DDoS)
Any unauthorized user who takes advantage of the
vulnerabilities of a system to gain unauthorized access
to the system
Availability: Authorized personnel can access information or services
Non-repudiation(The sender/creator of the information cannot deny the origin of the
information)
Integrity(Attackers cannot change or destroy information)
Confidentiality(No one except for authorized personnel can read sensitive information)
Any authorized user who performs unauthorized actions
that result in loss of control of computational assets
examples: users, privileged users, system administrators, network
administrators, facility support personnel, temporary employees,
contractors
This will involve Vulnerabilities, Threats and Attacks
Threat( An object, person, or other entity that represents a constant danger
to an asset)
Vulnerability( A design or programming flaw in software or in a system)
Personal Security
Improving Security
It's important
to keep strong
passwords to
prevent stolen
personal
information
Daily Life
More information than we think
is being collected from our daily
activities
Information Stealing
Hackers can also access personal information to exploit and put you in danger
Hackers can take personal information that they can use in order to blackmail and steal money
Social Engineering
Types of Deception
Whaling
Phishing directed at higher and older executives of larger companies to steal their information or company information
Baiting
Real world
"Trojan Horse"
Phishing
Information gathered from sending a
fake email that looks legitimate, usually
has a consequence if no information is given
Quid Pro Quo
Claiming to be technical support but will be actively trying to install malware on the computer
"Something for Something"
The manipulation of the human
tendency to trust
Importance
Why Cybersecurity?
Many Threats to the Public Internet
Hackers: Steal and hack into systems that could potentially be benefitial to society
Nation States: Countries who hack into the governmental systems of other countries for benefit
Cyber Criminals: Attack systems for profit and for stealing information
Most technology in the world at the moment is insecure and needs to have some sort of protection to protect people's confidentiality, integrity, and availability
As the world becomes more and more interconnected, people will become more and more dependent on technology. When Technology fails, this dependence on technology will make us vulnerable.
HTML Development
Lists
List elements
Put text within
Ordered Lists:
Ordered numbers
Unordered Lists:
Bullet points
Use the tag
Formating Text
Images
Use the image tag (
Links
Use the a tag ()
Paragraphs
Uses the p tag and put the words inside (
)
CSS Development
Animation
Write the following: @keyframes exmaple {
from {property:value;}
to {property:value}
Also, give a tag the animation name
h1 {
animation: example;}
Used to filter an image over time
Filters
Use properties such as greyscale, hue-rotate, sepia, and invert to add uniqueness to an image.
The Box Model
Includes defining an image's size, padding, border, and margin in order to space out elements on a page.
Visibility
Use the display property to define how an element should be displayed. These values include none, inline, and block
Use the opacity property to define how transparent or opaque an element is. Ex) opacity:.5; (the value can be between 0 and 1 with 1 being fully opaque)
Use the visibility property to define where an element is visible or hidden. Ex) visibility:hidden;