To do: April 18
Safe Computing MC Practice #2: Which of the following best explains how symmetric encryption algorithms are typically used?
Safe Computing MC Practice #2: Which of the following best explains how symmetric encryption algorithms are typically used?
Safe Computing MC Practice #3: In public key cryptography, the sender uses the recipientโs public key to encrypt a message. Which of the following is needed to decrypt the message?
A) The senderโs public key
B) The senderโs private key
C) The recipientโs public key
D) The recipientโs private key
Safe Computing MC Practice #3: In public key cryptography, the sender uses the recipientโs public key to encrypt a message. Which of the following is needed to decrypt the message?
A) The senderโs public key
B) The senderโs private key
C) The recipientโs public key
D) The recipientโs private key
Simulations
More on Simulations
Programmers might simulate:
The speed and scale at which simulations allow ideas to be tested and refined has had far-reaching impact, and it will only continue to grow in importance as computing power and computational models improve.
Hypothesis
Flip a coin until you get 5 total heads. How many flips did it take? ๏ฟฝ๏ฟฝ๏ฟฝ
Hypothesis
1. The most flips it took someone (including you) to get 5 total heads __________
๏ฟฝ2. The fewest flips it took someone (including you) to get 5 total heads __________๏ฟฝ
Actual (Experimental) Data
1. The most flips it took someone (including you) to get 5 total heads __________
๏ฟฝ2. The fewest flips it took someone (including you) to get 5 total heads __________๏ฟฝ
Hypothesis
What if you flipped a coin until you got 10,000 total heads. How many flips do you think it would take?๏ฟฝ3. The most flips I think it would take someone to get 10,000 total heads: __________
๏ฟฝ4. The fewest flips I think it would take someone to get 10,000 total heads __________๏ฟฝ
๏ฟฝ
Simulation
How would we simulate the flipping of a coin?
Program: let's look at the results of the simulation of this experiment: the experimental data
Click on link in Hub
https://studio.code.org/projects/applab/VBg87lUXG7kVYAHPf6JBYuZNBp1ofsC-Auj4KVC9wrE
Updating your Hypothesis
1. How close were your guesses on the high and low bounds for the number of flips to get 10,000 heads?
2. Were you at all surprised by this result? If they were different from what you predicted why might this be the case?๏ฟฝ
Importance of Simulations
Go over homework:
Rogue access point: a wireless access point that gives unauthorized access to secure networks. Data sent over public networks can be intercepted, analyzed, and modified.
https://www.professormesser.com/security-plus/sy0-501/rogue-access-points/
Takeaway:
A good password is easy to remember for the user, but hard for someone else (unauthorized) to guess based on knowledge they have about you.
Unit 10 Lesson 10 - Warm Up
How good is your password?
Hard for a computer!
What makes a secure password?
https://howsecureismypassword.net
Please do NOT use your real password.
Unit 10 Lesson 10 - Warm Up
1. Create a few passwords using 8 lowercase ASCII characters (a-z). Whatโs the longest amount of time-to-crack you can generate?
2. Using any characters on the keyboard, whatโs the longest amount of time-to-crack you can generate with an 8-character password?
3. As you try passwords, what seems to be the single most significant factor in making a password difficult to crack? Why do you think this is?
Complete #4 and 5
What can I do to protect my data?
Unit 10 Lesson 10 - Activity
Single Factor Authentication
Unit 10 Lesson 10 - Activity
Example:
Password
Something you know
Two Factor Authentication
Unit 10 Lesson 10 - Activity
Example:
Password
Example:
Phone
Something you know
Something you possess
Multifactor Authentication - at least two of these:
Unit 10 Lesson 10 - Activity
Example:
Password
Example:
Phone
Something you know
Something you possess
Example:
Fingerprint
Something you are
What can I do to protect my data?
Unit 10 Lesson 10 - Activity
Unit 10 Lesson 10 - Wrap Up
Vocabulary:
Multifactor Authentication: a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
Computer Virus Scanning Software: protects a computing system against infection.
Safe Computing MC Practice: Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?
A) When a user resets a password for an online bank account, the user is required to enter the new password twice.
B) When multiple people have a shared online bank account, they are each required to have their own unique username and password.
C) After entering a password for an online bank account, a user must also enter a code that is sent to the userโs phone via text message.
D) An online bank requires users to change their account passwords multiple times per year without using the same password twice.
Safe Computing MC Practice: Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?
A) When a user resets a password for an online bank account, the user is required to enter the new password twice.
B) When multiple people have a shared online bank account, they are each required to have their own unique username and password.
C) After entering a password for an online bank account, a user must also enter a code that is sent to the userโs phone via text message.
D) An online bank requires users to change their account passwords multiple times per year without using the same password twice.
Prompt:
What strategies do you use when creating a good password?
Note: Please don't actually reveal any of your current passwords in your response.
Unit 10 Lesson 10 - Warm Up
Homework
Mock exam part 1 tomorrow (Tuesday)
Mock exam part 2 on Wednesday