Moore’s Law
The observation that computing power roughly doubles every two years.
Designing a Data System
Maintain privacy of the information stored in the data set.
Scalability of the system.
Structuring the metadata of the information for analysis.
Challenges of Researchers working with Big Data
The collection of the data is more important than how the researcher is going to use it.
Challenges of Researchers working with Big Data
With the amounts of data present, many researchers look for trends that support their hypotheses rather than let the data lead them
Challenges of Researchers working with Big Data
Large data sets require special analytical tools (servers and other equipment) that some researchers may not have and/or may not realize they need to use.
Challenges of Researchers working with Big Data
Large data sets usually come from multiple sources which means that collection techniques may have differed. A researcher not taking this into consideration may come to incorrect conclusions.
Caesar’s Cipher
A technique for encryption that shifts the alphabet by some number of characters.
Random Substitution Cipher
An encoding technique that maps each letter of the alphabet randomly to different letters or characters.
Big Data
There is so much data that traditional data processing applications are inadequate.
Vigenère Cipher (Vee-zha-nair)
A method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.
One cannot solve using frequency analysis directly
The key length is variable and potentially very long
Computationally Hard
A “hard” problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
Public Key Encryption is built upon this
Modulo (or “MOD”)
The name of the mathematical operation.
Modulo gives the remainder from dividing two numbers.
For example: 17 MOD 13 is 4
Asymmetric Encryption
A type of cryptographic based on algorithms that require two keys
one of which is secret (or private)
one of which is public (freely known to others)
Public Key
A value that can be used to encrypt a message.
However, only when combined with a mathematically-related private key, can the message be decrypted.
Private Key
The complementary key to a key which is freely known to others that is used to decrypt a message.
Features of Public Key Encryption
A key (private) for decrypting is never made public. Using public key guarantees that only the intended recipient can decrypt the message. Allows secure communication without establishing a “shared” encryption key ahead of time.
Symmetric Encryption
A method of encryption involving one key for both encryption and decryption
DDoS Attack - Distributed Denial of Service Attack
Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
Firewall
Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Phishing Scam
A thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.
Digital Certificates
Used to verify the ownership of encrypted keys used in secured communication.
Antivirus Software
Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
SSL (Secure Socket Layer)/TLS (Transport Layer Security)
an encryption layer of HTTP that uses public key cryptography to establish a secure connection