Security Understanding Technology by CS50 at Harvard English
Security Understanding Technology by CS50 at Harvard English
or SSDs.
Who knows?
be multiple platters--
or electronically in an SSD?
And so an operating
all at once.
You're more
a computer typically
altogether.
So what's the implication?
information on your
either to securely
or to do it to an entire
of private information.
or outlook.com or something
to reprove to Google or
Microsoft or Facebook
is somehow authenticated.
doesn't actually
in reasonably recently,
of understanding HTTP,
So on every subsequent
of the club.
so to speak.
theoretically, if he or she
Browser history.
breadcrumbs as to where
letting a roommate or a
So if you're like, oh
address that.
are deleted?
So what's an alternative?
typically, a different-colored
I want my history to be
So essentially, this is
a website, or you're
first.
or a fingerprint sensor
often.
knowing.
form of authentication,
a password or passcode.
On a phone, it might
Unfortunately, using
0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
specifically passcode
or five or 10 times or
number of possibilities
a sixth or a seventh.
If we introduce letters of
So that's 62 possibilities.
Use five.
Use six.
Use 12.
Use 20.
to be really secure,
or 100-character password?
So in fact, if your
password is "password,"
Or if your password is
or required at least
six-character passwords.
"Qwerty," brilliant.
So that's brilliant.
it's in a dictionary.
And if it's in a
dictionary, an adversary
So instead of saying an L in a
Or instead of an A in a password,
So generally, thinking of
If you're accidentally
So if you're doing
So you're trusting, to
or values or information
to my email account.
meanwhile, is checked
more technically--
is my password.
to email me my password,
it comes to authentication?
websites is hacked?
It might be dozens, if
So this is amazing,
on any website.
So trade-offs to be
authentication, where
two-factor authentication
is a password or a passcode.
And historically, we
I am [email protected], and
should be something
literally something
So theoretically, it stays
So theoretically, they
authentication,
or two-step authentication,
So if an adversary gains
access to my password,
they have.
And so long as they also haven't stolen
and so forth.
can increasingly do is
All right.
especially when so
wireless especially.
in some form.
on that network.
or sniffed, so to speak, by
someone else in the nearby area,
might actually be on
company, or go to a university,
is indeed encrypted.
permutations thereof,
because of an algorithm
company or university
or frankly, there's
even.
Where?
to put it simply.
is necessary to scramble
quite limited.
So a trade-off there.
It's not.
It's just software.
historically, a lot of
to other networks
defense as well,
Mac OS or Windows,
because at least
It's deliberate.
Hello.
So I now becomes H
an example of something
a rotational cipher.
actually sending.
would be unencrypted.
key cryptography.
is predicated, of course,
a mathematical relationship
mathematically, they
to amazon.com or gmail.com,
generate.
do have a number of
protections-- software,
Report Phishing.
And so this is so
or whoever's HTML.
leads, generally,
at BankOfAmerica.com.
typographical errors.
tended to be under
of bugs in software,
to one's security,
or other companies.
installed it on a computer,
Microsoft or Google,
Hopefully none.
monitor.