Unit 4 Flashcards

(23 cards)

1
Q

Moore’s Law

A

The observation that computing power roughly doubles every two years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designing a Data System

A

Maintain privacy of the information stored in the data set.
Scalability of the system.
Structuring the metadata of the information for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenges of Researchers working with Big Data

A

The collection of the data is more important than how the researcher is going to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Challenges of Researchers working with Big Data

A

With the amounts of data present, many researchers look for trends that support their hypotheses rather than let the data lead them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenges of Researchers working with Big Data

A

Large data sets require special analytical tools (servers and other equipment) that some researchers may not have and/or may not realize they need to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Challenges of Researchers working with Big Data

A

Large data sets usually come from multiple sources which means that collection techniques may have differed. A researcher not taking this into consideration may come to incorrect conclusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Caesar’s Cipher

A

A technique for encryption that shifts the alphabet by some number of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Random Substitution Cipher

A

An encoding technique that maps each letter of the alphabet randomly to different letters or characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Big Data

A

There is so much data that traditional data processing applications are inadequate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vigenère Cipher (Vee-zha-nair)

A

A method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.
One cannot solve using frequency analysis directly
The key length is variable and potentially very long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computationally Hard

A

A “hard” problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
Public Key Encryption is built upon this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Modulo (or “MOD”)

A

The name of the mathematical operation.
Modulo gives the remainder from dividing two numbers.
For example: 17 MOD 13 is 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric Encryption

A

A type of cryptographic based on algorithms that require two keys
one of which is secret (or private)
one of which is public (freely known to others)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public Key

A

A value that can be used to encrypt a message.

However, only when combined with a mathematically-related private key, can the message be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Private Key

A

The complementary key to a key which is freely known to others that is used to decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Features of Public Key Encryption

A
A key (private) for decrypting is never made public.
Using public key guarantees that only the intended recipient can decrypt the message.
Allows secure communication without establishing a “shared” encryption key ahead of time.
17
Q

Symmetric Encryption

A

A method of encryption involving one key for both encryption and decryption

18
Q

DDoS Attack - Distributed Denial of Service Attack

A

Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

19
Q

Firewall

A

Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.

20
Q

Phishing Scam

A

A thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.

21
Q

Digital Certificates

A

Used to verify the ownership of encrypted keys used in secured communication.

22
Q

Antivirus Software

A

Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.

23
Q

SSL (Secure Socket Layer)/TLS (Transport Layer Security)

A

an encryption layer of HTTP that uses public key cryptography to establish a secure connection