How to use
Use by
Use by
Use by
How to Use
How to make
Parts of
Parts of
How to get to them
Definition of
Definition of
Displayed in
Accessed using
Displayed on
Part of
Part of
Made with
How to Write
How to Write
Includes
Type of
Type of
How to make
How to make
How to Write
Topic of
Topic of
Topic of
How to Write It
How to use
Definition of
Use of
Definition of
Type of
Type of
Type of
Definition of
Types of
Types of
Definition of
Type of
Type of
Part of
Type of
Type of
Type of
Part of
Part of
How to add
How to do
How to do
Topic of
Topic of
Topic of
Topic of
Part of
Rules of
Part of
How to Organize
Topic of
Part of
Type of
Type of
Type of
Uses of
Sprint Topic of
Sprint Topic of
Sprint Topic of
Uses
Topic of
Contains
Includes
Searched on
Uses
Topic of
Sprint Topic of
Part of
Uses
Types of
Topic of
Uses of them
Also done with
Includes
Topic of
Definition of
Includes
Uses
Definition of
Uses
Uses

Intro to Computer Science

CSS Development

Used to style html more efficiently than the style attribute in html.

Style by tag Ex) h1 {

Style by class Ex) .example {

Style by id Ex) #example

Multi-file Wesbites

Add a CSS page by putting "<link rel="stylesheet" type="text/css" href="style.css">" in the head of the page.

Add another html page by linking it anywhere on the page ex) <a href="example.html"></a>

IFrames

Use the iframe tag to insert a portion of another website that allows the user to play with and access. (<iframe src="..."></iframe>)

Divs and Spans

Divs organize information so it is easier to style as a whole, but it styles it in its own block.

Spans act as divs, but they organize the information in a line with other data

Combining Selectors

The Descendant tag ( a space) targets all tags inside of a specific tag

The Child tag (>) selects all tags one level inside a specific tag

The Next Sibling selector selects all of a certain tag that comes directly after another specific tag

DRY (Don't Repeat Yourself Principle)

Avoid repeated code in order to make editing it easier. For example, use commas to specify more than one tag.

Special Selectors

Pseudo-Classes

Style elements in a certain state

:hover, :link, :visited, :active

Pseudo-Elements

::first-letter, ::first-line, ::before, ::after, ::selection

Style certain parts of elements

Visibility

Use the visibility property to define where an element is visible or hidden. Ex) visibility:hidden;

Use the opacity property to define how transparent or opaque an element is. Ex) opacity:.5; (the value can be between 0 and 1 with 1 being fully opaque)

Use the display property to define how an element should be displayed. These values include none, inline, and block

The Box Model

Includes defining an image's size, padding, border, and margin in order to space out elements on a page.

Filters

Use properties such as greyscale, hue-rotate, sepia, and invert to add uniqueness to an image.

Animation

Used to filter an image over time

Write the following: @keyframes exmaple {
from {property:value;}
to {property:value}

Also, give a tag the animation name
h1 {
animation: example;}

HTML Development

Formating Text

Paragraphs

Uses the p tag and put the words inside (<p> </p>)

Links

Use the a tag (<a> </a>)

Images

Use the image tag (<img src="">

Lists

Unordered Lists:
Bullet points

Use the tag <ul> </ul>

Ordered Lists:
Ordered numbers

Use the tag <ol> </ol>

List elements

Put text within <li> </li>

Cybersecurity

Importance

Why Cybersecurity?

As the world becomes more and more interconnected, people will become more and more dependent on technology. When Technology fails, this dependence on technology will make us vulnerable.

Most technology in the world at the moment is insecure and needs to have some sort of protection to protect people's confidentiality, integrity, and availability

Many Threats to the Public Internet

Cyber Criminals: Attack systems for profit and for stealing information

Nation States: Countries who hack into the governmental systems of other countries for benefit

Hackers: Steal and hack into systems that could potentially be benefitial to society

Social Engineering

The manipulation of the human
tendency to trust

Types of Deception

Quid Pro Quo

"Something for Something"

Claiming to be technical support but will be actively trying to install malware on the computer

Phishing

Information gathered from sending a
fake email that looks legitimate, usually
has a consequence if no information is given

Baiting

Real world
"Trojan Horse"

Whaling

Phishing directed at higher and older executives of larger companies to steal their information or company information

Personal Security

Information Stealing

Hackers can take personal information that they can use in order to blackmail and steal money

Hackers can also access personal information to exploit and put you in danger

Daily Life

More information than we think
is being collected from our daily
activities

Improving Security

It's important
to keep strong
passwords to
prevent stolen
personal
information

Fundamentals

When you make these websites, you need to make sure it has good security

This will involve Vulnerabilities, Threats and Attacks
Threat( An object, person, or other entity that represents a constant danger
to an asset)

Vulnerability( A design or programming flaw in software or in a system)

Insider Threats

Any authorized user who performs unauthorized actions
that result in loss of control of computational assets

examples: users, privileged users, system administrators, network
administrators, facility support personnel, temporary employees,
contractors

Cybersecurity is: Protecting computers against intentional misuse, A terminology that is very commonly used these days, Referring to computer/information security issues that occur because
of the prevalence of the Internet

There are many security properties:

Confidentiality(No one except for authorized personnel can read sensitive information)

Integrity(Attackers cannot change or destroy information)

Non-repudiation(The sender/creator of the information cannot deny the origin of the
information)

Availability: Authorized personnel can access information or services

Outsider Threats

Any unauthorized user who takes advantage of the
vulnerabilities of a system to gain unauthorized access
to the system

examples: Malware: viruses and worms, Trojan horses, spyware and rootkits, Mobile codes, Social engineering, (Distributed) Denial of Service (DDoS)

Counter Measures

Tools used to thwart attacks

called safeguards, protections, and controls

Preventative, Detective, Corrective

Ways to Keep Our Information/Property
Safe: Biometrics, Encryption, and Digital and Mobile Forensics

Steganography

Used to hide information by means of concealing information in another type of file (hiding a picture in a docx file, etc.)

Cryptography

This method of secret writing involves making systematic changes to the message that is to be sent

Cryptography

Encryption Techniques

Web Design and Development

Web Design

Web designers are responsible for designing the website with styles and making it appealing to others

Web Development

Web developers are responsible for making the website through html and css that a web designer wants to use

The Internet

Browsers

Websites

Use a URL (Uniform Resource Locator) such as www.example.com/homepage.html

The Domain (www.example.com)

The Path (homepage.html)

The internet is a network of networks that allows people with access to it to communicate and see information

It is important for browsers, such as FireFox, Safari, and Google Chrome, to be up to date in order to process any html and css changes.

Tables

Use the table row tag (<tr>) to make a new row. Use the table header tag (<th>) for the first row. Use the table data row (<td>) for every other row

Styling

Insert "style=" in any tag and add tag the attribute and value after. Ex) style="color:red;"

A browser is an installation on a computer that allows anyone with access to the internet to view the same information displayed on the internet

Colors

color:#
Enter a hexadecimal code after the #

rgb(red value, green value, blue value)

style="color:red;"

Interaction

Style a certain element normally AND style it in a given state (active, hover...)

The study of hiding information.

Ensures confidentiality

Cipher - a method of hiding or revealing information

Encrption is a way to transform plaintext into unreadable ciphertext.

Decryption is transforming chipher text into plain text

Uses

ATM Machines

Online shopping transactions and passwords

Emails

Protecting intellectual property or valuable date

Julius Caesar used the rotation of letters technique, and uses the letter 3 letters later in the aplhabet.

Earliest form was found in Egyptian Hieroglyphics - it was a relatively simple reconfiguration of letters, now called transposition cipher.

Forms

In America Thomas Jefferson used a cipher wheel during the Revolutionary War

The foundation of all secure messaging on the open internet.

Symmetric Key Encryption - used for encrypting and decrypting information for the same "door"

Shard Secret Encryption - used to securely distribute the key to both parties, but still the same key.

Secret Key Encryption

Private Key Encryption

The concept is that the public key and the private key are both involved in locking and unlocking the hidden information.

The public key is distributed freely

Using both the private and public key allows for: 1) simplified key distribution 2) digital signatures and 3) long-term encryption

Digital signatures provide a way for a message to be authenticated (or knowing where the message is coming from)

The private key is never distributed