Essential Knowledge:

**IOC-2.A.5** Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions. **IOC-2.A.6** Search engines can use search history to suggest websites or for targeted marketing. **IOC-2.A.7** Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual. **IOC-2.B** Explain how computing resources can be protected and can be misused. **IOC-2.C** Explain how unauthorized access to computing resources is gained.

Safe Computing

**IOC-2.A.5** Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions. **IOC-2.A.6** Search engines can use search history to suggest websites or for targeted marketing. **IOC-2.A.7** Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.

Personal Identifiable Information (PII)

Personal Identifiable Information (PII): Information about someone that can be used to identify them.

Credit card, medical, and biometric information can not be shared without your consent.

Others can use it to steal your identity, money, or other personal information.

Search engines collect information without you knowing. They collect information about a user’s devices, networks, and websites visited and often use it to suggest things for you. The information we put out there is often there permanently.

Good and bad things about PII

Good:

Bad:

Risk to Privacy

Popcorn Hack 1:

List at least three apps or websites that might use PII:

Authentication

**IOC-2.B** Explain how computing resources can be protected and can be misused.

Authentication measures protect devices and information from unauthorized access

Authentication measures:

Strong Passwords:

Multi-Factor Authentication

Encryption and Decryption:

Digital certificates:

A certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communication and are based on a trust model. It makes sure that the decryption key that people recieve are issued by users or owners that own a true trusted key.

Popcorn Hack 2:

Create an encrypted code using symmetric encryption, and provide the code, and the actual message:

import numpy as np

#Generate a completely random scrambled alphabet
ab_ori = np.array(['a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z'])
ab_scramble = np.array(['a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z'])
np.random.shuffle(ab_scramble)

message = 'parastratiosphecomyia stratiosphecomyioides'
encryption = ''

#Substitute letters in original message with the scrambled alphabet
for index in message:
    if index != ' ':
        encryption += ab_scramble[np.where(ab_ori == index)[0]][0]
        
decryption = ''
#Decrypt - spaces will be lost but the message is still readable, and cannot be guessed based on typography
for index in encryption:
    decryption += ab_ori[np.where(ab_scramble == index)[0]][0]

print(encryption)
print(decryption)

#Of course, the key still needs to be sent to the recipient, creating a security gap.
nhfhmjfhjadmntgcduyahmjfhjadmntgcduyadavgm
parastratiosphecomyiastratiosphecomyioides

Risk Factors

**IOC-2.C** Explain how computing resources can be protected and can be misused.

Popcorn Hack 3:

Go to a website that checks your password and make a strong password.

Using individual keyboard characters as units of entropy with a full character set: P40ANf@?g1a_ (est. 48000 years to guess randomly)

Although arguably if units of entropy are the only measure needed and the password is meant to be usable, an alternate approach (xkcd.com/936) may result in something like this: corner_resign_freeze_bulletin_incongruous (6.2x10^20 years to guess randomly character-by-character)

Homework

Please answer these questions and send them to Daniel Lee on Slack. Graded on accuracy.

What is Personal Identifiable Information (PII), and list three examples of it?