IST 195 1st Edition Lecture 7 Outline of Last Lecture I. Why is Big Data Helpful?a. The Four V’sII. Where does Big Data Come From?III. The Beginning of DataIV. Issues with Big DataV. Types of Big Data Outline of Current Lecture VI. StenographyVII. CryptographyVIII. AuthenticationIX. Data ThefCurrent LectureSteganography - steganography - hiding a message in another message - usually in plain site, as long as the sender and the receiver both know how it's hidden it can be successful - in 2010, there were images uncovered by the FBI that had text messages into them and posted on public websites hidden by Russian spies Cryptography - cryptography - scrambling data so it is unreadable; based on math algorithms o Kryptos wall of the CIA is a real life example of encryption - encryption technique - scrambling up the information to hide the message - decryption technique - unscrambling the information to uncover message o encryption key - the password o cipher text - the encrypted text, the disguise o clear text - the unscrambled message - symmetric cryptosystem - single key, less secure, used on the web - ex. if everyone is given a key then someone goes rogue, the key is out there for anyone - asymmetric cryptosystem - uses one key to encrypt and decrypt, more secure - key - the password used to hide and reveal your cypher text - substitution - shifing the code over to encrypt the message - transposition - message is encrypted by moving small pieces of it around These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.Authentication - multifactor authentication - not just relying on a username and/or password, helping out security (based on something you know, have or are) Data Thef - Point of Sale Hack - databases are very hard to break into, so as credit cards are being swiped theinformation is also being sent to a hacker (ex. Target and Home Depot) - monitor your
View Full Document