College Board 5.5 and 5.6
Legal and Ethical Concerns and Safe Computing
5.5
-
When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
Open Source:
MIT: allows you to code freely and distribute closed source versions. Credit for MIT licensing is adding the authors name in comments
GPL: allows you to code freely,but can't distribute closed source versions. -
In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.
A software License helps distribute software, some with copyright protection, and some without.
Digital rights help protect the content that is being distributed online, like movies and music
Legal and Ethically: accepting terms and conditions, not copyrighting music, not pirating movies or images.
- Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.
5.6
-
Describe PII you have seen on project in CompSci Principles.
the private and public key, maybe a login feature -
What are your feelings about PII and your personal exposure?
I think PII's are necessary and can enhance user experience, but it is best to keep your information as safe as possible by not giving random websites or people information like you location or financial information. -
Describe good and bad passwords? What is another step that is used to assist in authentication.
A good password is one that only you know that is unique and doesn't really have a relation to anything (random). Another step that is used to assist identification is username and maybe even email. -
Try to describe Symmetric and Asymmetric encryption.
Symmetric encryption is encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information
Asymmetric cryptography is a process that uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use. -
Provide an example of encryption we used in AWS deployment.
port numbers -
Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
sending you a message that you won some type of lottery or contest and giving you a link to go to to retrieve the reward, when it is just trying to steal your information.