1 of 33

To do: April 18

  • Grab a coin! (dime, quarter, penny, etc)
  • Take out your IN.
  • Pick up a handout.

2 of 33

Safe Computing MC Practice #2: Which of the following best explains how symmetric encryption algorithms are typically used?

  • Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
  • Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
  • Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
  • Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.

3 of 33

Safe Computing MC Practice #2: Which of the following best explains how symmetric encryption algorithms are typically used?

  • Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
  • Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
  • Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
  • Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.

4 of 33

Safe Computing MC Practice #3: In public key cryptography, the sender uses the recipientโ€™s public key to encrypt a message. Which of the following is needed to decrypt the message?

A) The senderโ€™s public key

B) The senderโ€™s private key

C) The recipientโ€™s public key

D) The recipientโ€™s private key

5 of 33

Safe Computing MC Practice #3: In public key cryptography, the sender uses the recipientโ€™s public key to encrypt a message. Which of the following is needed to decrypt the message?

A) The senderโ€™s public key

B) The senderโ€™s private key

C) The recipientโ€™s public key

D) The recipientโ€™s private key

6 of 33

Simulations

  • Computer simulations are used to model real-world phenomena on a computer and has changed countless fields.
  • Scientists from all disciplines rely on computer simulation, rather than real-life experiments, to rapidly test their hypotheses in simulated environments.

7 of 33

More on Simulations

Programmers might simulate:

  • users moving across their sites to ensure they can handle spikes in traffic
  • video game and virtual reality technology is built around the ability to simulate some aspects of the real world.

The speed and scale at which simulations allow ideas to be tested and refined has had far-reaching impact, and it will only continue to grow in importance as computing power and computational models improve.

8 of 33

Hypothesis

Flip a coin until you get 5 total heads. How many flips did it take? ๏ฟฝ๏ฟฝ๏ฟฝ

9 of 33

Hypothesis

1. The most flips it took someone (including you) to get 5 total heads __________

๏ฟฝ2. The fewest flips it took someone (including you) to get 5 total heads __________๏ฟฝ

10 of 33

Actual (Experimental) Data

1. The most flips it took someone (including you) to get 5 total heads __________

๏ฟฝ2. The fewest flips it took someone (including you) to get 5 total heads __________๏ฟฝ

11 of 33

Hypothesis

What if you flipped a coin until you got 10,000 total heads. How many flips do you think it would take?๏ฟฝ3. The most flips I think it would take someone to get 10,000 total heads: __________

๏ฟฝ4. The fewest flips I think it would take someone to get 10,000 total heads __________๏ฟฝ

๏ฟฝ

12 of 33

Simulation

How would we simulate the flipping of a coin?

13 of 33

Program: let's look at the results of the simulation of this experiment: the experimental data

14 of 33

Updating your Hypothesis

1. How close were your guesses on the high and low bounds for the number of flips to get 10,000 heads?

2. Were you at all surprised by this result? If they were different from what you predicted why might this be the case?๏ฟฝ

15 of 33

Importance of Simulations

  • Simulations are an increasingly important tool for a variety of disciplines.
  • Weather and traffic predictions are based on computer models that simulate weather patterns or people moving through a city.
  • Scientific research, whether in physics, chemistry, or biology, increasingly uses simulations to develop new hypotheses and test ideas before spending the time and money to run a live experiment.

16 of 33

Go over homework:

  • Submit today's notes (warm-up and definition)
  • AP Classroom - Safe Computing practice problems #1-12
    • Complete online
    • Show work for each question in IN
    • Submit work to Hub

Rogue access point: a wireless access point that gives unauthorized access to secure networks. Data sent over public networks can be intercepted, analyzed, and modified.

https://www.professormesser.com/security-plus/sy0-501/rogue-access-points/

17 of 33

18 of 33

Takeaway:

A good password is easy to remember for the user, but hard for someone else (unauthorized) to guess based on knowledge they have about you.

Unit 10 Lesson 10 - Warm Up

19 of 33

How good is your password?

  • Cracking a password means that the number of possible keys must be so large, that even a computer trying billions of possible keys per second is unlikely to arrive at the correct key in a reasonable amount of time.
  • Choosing a good password is meaningful because we want the key to be hard for a computer to guess.

20 of 33

Hard for a computer!

  • We know that a good encryption algorithm reduces the problem of cracking it to simply guessing the key.
  • We want the key to be Computationally Hard to guess - in other words, hard for a computer to guess.
  • Computationally Hard typically means that arriving at the solution would take a computer a prohibitively long time - as in centuries or eons.

21 of 33

What makes a secure password?

https://howsecureismypassword.net

Please do NOT use your real password.

Unit 10 Lesson 10 - Warm Up

22 of 33

1. Create a few passwords using 8 lowercase ASCII characters (a-z). Whatโ€™s the longest amount of time-to-crack you can generate?

2. Using any characters on the keyboard, whatโ€™s the longest amount of time-to-crack you can generate with an 8-character password?

3. As you try passwords, what seems to be the single most significant factor in making a password difficult to crack? Why do you think this is?

23 of 33

Complete #4 and 5

24 of 33

What can I do to protect my data?

Unit 10 Lesson 10 - Activity

  • Use Multifactor Authentication

25 of 33

Single Factor Authentication

Unit 10 Lesson 10 - Activity

Example:

Password

Something you know

26 of 33

Two Factor Authentication

Unit 10 Lesson 10 - Activity

Example:

Password

Example:

Phone

Something you know

Something you possess

27 of 33

Multifactor Authentication - at least two of these:

Unit 10 Lesson 10 - Activity

Example:

Password

Example:

Phone

Something you know

Something you possess

Example:

Fingerprint

Something you are

28 of 33

What can I do to protect my data?

Unit 10 Lesson 10 - Activity

  • Use Multifactor Authentication
  • Update Your Software

29 of 33

Unit 10 Lesson 10 - Wrap Up

Vocabulary:

Multifactor Authentication: a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

Computer Virus Scanning Software: protects a computing system against infection.

30 of 33

Safe Computing MC Practice: Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

A) When a user resets a password for an online bank account, the user is required to enter the new password twice.

B) When multiple people have a shared online bank account, they are each required to have their own unique username and password.

C) After entering a password for an online bank account, a user must also enter a code that is sent to the userโ€™s phone via text message.

D) An online bank requires users to change their account passwords multiple times per year without using the same password twice.

31 of 33

Safe Computing MC Practice: Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

A) When a user resets a password for an online bank account, the user is required to enter the new password twice.

B) When multiple people have a shared online bank account, they are each required to have their own unique username and password.

C) After entering a password for an online bank account, a user must also enter a code that is sent to the userโ€™s phone via text message.

D) An online bank requires users to change their account passwords multiple times per year without using the same password twice.

32 of 33

Prompt:

What strategies do you use when creating a good password?

Note: Please don't actually reveal any of your current passwords in your response.

Unit 10 Lesson 10 - Warm Up

33 of 33

Homework

  • Submit passwords handout
  • Write 3 new key words and definitions in your IN glossary
    • simulations, multi-factor authentication, computer virus scanning software

Mock exam part 1 tomorrow (Tuesday)

Mock exam part 2 on Wednesday