Hakcs

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.

  • Notes:Open source means that a Github project must be public, closed source means it can be private. The Open Source MIT License means this is open source, it is also possible to distribute the closed source version but requires credit, such as adding the author’s name in the comments. The open source GPL license means that the project is open source but the closed source version cannot be distributed.

In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.

  • We can use the open source MIT license, Creative Commons zero-level open source resources, while complying with the license terms, we need to cite the source, have copyright awareness, infringement will make us pay unnecessary costs.

Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.

  • I used the open source MIT license as this allows me to freely use the code and make and distribute closed source versions

BigIdea 5.6 Safe Computing

Describe PII you have seen on project in CompSci Principles.

  • Personal phone number, email address, street address.

What are your feelings about PII and your personal exposure?’

  • The exposure of PII will lead to the exposure of personal privacy information, and even the bank card is stolen, and the debt of tens of thousands of dollars on the card for no reason, etc.

Describe good and bad passwords? What is another step that is used to assist in authentication.

  • A good password is stronger than a bad password because good passwords often use more complex things, such as complex patterns, symbols, numbers and letters alternated, etc. Another step for secondary identity is to send email verification

Try to describe Symmetric and Asymmetric encryption.

  • Symmetric encryption uses only one key to encrypt or decrypt information, asymmetric cryptography uses a bunch of related keys, a public key and a private key, to prevent unauthorized access

Provide an example of encryption we used in AWS deployment.

  • Customer code is not stored in CodeDeploy, using encryption at rest and encryption in transit, and encryption keys

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

  • Email Phishing, Business Email Compromise, Voice Phishing, SMS Phishing, Spear Phishing.