Категории: Все - encryption - web - browsers

по Cho Cho 5 лет назад

181

Sprint 3 - Unknown

The text delves into the fundamentals of encryption, particularly focusing on the roles of private and public keys in securing information. It highlights the significance of digital signatures in authenticating messages and ensuring long-term encryption.

Sprint 3 - Unknown

The private key is never distributed

Using both the private and public key allows for: 1) simplified key distribution 2) digital signatures and 3) long-term encryption

Digital signatures provide a way for a message to be authenticated (or knowing where the message is coming from)

Private Key Encryption

The concept is that the public key and the private key are both involved in locking and unlocking the hidden information.

The public key is distributed freely

Secret Key Encryption

Shard Secret Encryption - used to securely distribute the key to both parties, but still the same key.

Symmetric Key Encryption - used for encrypting and decrypting information for the same "door"

The foundation of all secure messaging on the open internet.

Forms

In America Thomas Jefferson used a cipher wheel during the Revolutionary War

Earliest form was found in Egyptian Hieroglyphics - it was a relatively simple reconfiguration of letters, now called transposition cipher.

Julius Caesar used the rotation of letters technique, and uses the letter 3 letters later in the aplhabet.

Protecting intellectual property or valuable date

Uses

Emails

Online shopping transactions and passwords

ATM Machines

The study of hiding information.

Ensures confidentiality

Cipher - a method of hiding or revealing information
Decryption is transforming chipher text into plain text
Encrption is a way to transform plaintext into unreadable ciphertext.

Interaction

Style a certain element normally AND style it in a given state (active, hover...)

Colors

style="color:red;"

rgb(red value, green value, blue value)

color:# Enter a hexadecimal code after the #

A browser is an installation on a computer that allows anyone with access to the internet to view the same information displayed on the internet

Styling

Insert "style=" in any tag and add tag the attribute and value after. Ex) style="color:red;"

Tables

Use the table row tag () to make a new row. Use the table header tag () for the first row. Use the table data row () for every other row

It is important for browsers, such as FireFox, Safari, and Google Chrome, to be up to date in order to process any html and css changes.

The internet is a network of networks that allows people with access to it to communicate and see information

Web Design and Development

Websites

Use a URL (Uniform Resource Locator) such as www.example.com/homepage.html
The Path (homepage.html)
The Domain (www.example.com)

Browsers

The Internet

Web Development

Web developers are responsible for making the website through html and css that a web designer wants to use

Web Design

Web designers are responsible for designing the website with styles and making it appealing to others

Intro to Computer Science

Cybersecurity

Encryption Techniques
Steganography
Cryptography

This method of secret writing involves making systematic changes to the message that is to be sent

Used to hide information by means of concealing information in another type of file (hiding a picture in a docx file, etc.)
Fundamentals
When you make these websites, you need to make sure it has good security

Insider Threats

Cybersecurity is: Protecting computers against intentional misuse, A terminology that is very commonly used these days, Referring to computer/information security issues that occur because of the prevalence of the Internet

There are many security properties:

Ways to Keep Our Information/Property Safe: Biometrics, Encryption, and Digital and Mobile Forensics

Counter Measures

Preventative, Detective, Corrective

called safeguards, protections, and controls

Tools used to thwart attacks

Outsider Threats

examples: Malware: viruses and worms, Trojan horses, spyware and rootkits, Mobile codes, Social engineering, (Distributed) Denial of Service (DDoS)

Any unauthorized user who takes advantage of the vulnerabilities of a system to gain unauthorized access to the system

Availability: Authorized personnel can access information or services

Non-repudiation(The sender/creator of the information cannot deny the origin of the information)

Integrity(Attackers cannot change or destroy information)

Confidentiality(No one except for authorized personnel can read sensitive information)

Any authorized user who performs unauthorized actions that result in loss of control of computational assets

examples: users, privileged users, system administrators, network administrators, facility support personnel, temporary employees, contractors

This will involve Vulnerabilities, Threats and Attacks Threat( An object, person, or other entity that represents a constant danger to an asset)

Vulnerability( A design or programming flaw in software or in a system)

Personal Security
Improving Security

It's important to keep strong passwords to prevent stolen personal information

Daily Life

More information than we think is being collected from our daily activities

Information Stealing

Hackers can also access personal information to exploit and put you in danger

Hackers can take personal information that they can use in order to blackmail and steal money

Social Engineering
Types of Deception

Whaling

Phishing directed at higher and older executives of larger companies to steal their information or company information

Baiting

Real world "Trojan Horse"

Phishing

Information gathered from sending a fake email that looks legitimate, usually has a consequence if no information is given

Quid Pro Quo

Claiming to be technical support but will be actively trying to install malware on the computer

"Something for Something"

The manipulation of the human tendency to trust
Importance
Why Cybersecurity?

Many Threats to the Public Internet

Hackers: Steal and hack into systems that could potentially be benefitial to society

Nation States: Countries who hack into the governmental systems of other countries for benefit

Cyber Criminals: Attack systems for profit and for stealing information

Most technology in the world at the moment is insecure and needs to have some sort of protection to protect people's confidentiality, integrity, and availability

As the world becomes more and more interconnected, people will become more and more dependent on technology. When Technology fails, this dependence on technology will make us vulnerable.

HTML Development

Lists
List elements

Put text within

  • Ordered Lists: Ordered numbers
    Unordered Lists: Bullet points

    Use the tag

    Formating Text
    Images

    Use the image tag (

    Links

    Use the a tag ( )

    Paragraphs

    Uses the p tag and put the words inside (

    )

    CSS Development

    Animation
    Write the following: @keyframes exmaple { from {property:value;} to {property:value} Also, give a tag the animation name h1 { animation: example;}
    Used to filter an image over time
    Filters
    Use properties such as greyscale, hue-rotate, sepia, and invert to add uniqueness to an image.
    The Box Model
    Includes defining an image's size, padding, border, and margin in order to space out elements on a page.
    Visibility
    Use the display property to define how an element should be displayed. These values include none, inline, and block
    Use the opacity property to define how transparent or opaque an element is. Ex) opacity:.5; (the value can be between 0 and 1 with 1 being fully opaque)
    Use the visibility property to define where an element is visible or hidden. Ex) visibility:hidden;
    Special Selectors
    Pseudo-Elements

    Style certain parts of elements

    ::first-letter, ::first-line, ::before, ::after, ::selection

    Pseudo-Classes

    :hover, :link, :visited, :active

    Style elements in a certain state

    DRY (Don't Repeat Yourself Principle)
    Avoid repeated code in order to make editing it easier. For example, use commas to specify more than one tag.
    Combining Selectors
    The Next Sibling selector selects all of a certain tag that comes directly after another specific tag
    The Child tag (>) selects all tags one level inside a specific tag
    The Descendant tag ( a space) targets all tags inside of a specific tag
    Divs and Spans
    Spans act as divs, but they organize the information in a line with other data
    Divs organize information so it is easier to style as a whole, but it styles it in its own block.
    IFrames
    Use the iframe tag to insert a portion of another website that allows the user to play with and access. ()
    Multi-file Wesbites
    Add another html page by linking it anywhere on the page ex)
    Add a CSS page by putting "" in the head of the page.
    Style by id Ex) #example
    Style by class Ex) .example {
    Style by tag Ex) h1 {
    Used to style html more efficiently than the style attribute in html.