Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged protection

Rss Feed Group items tagged

chetchetchetchet

The state of privacy in America | Pew Research Center - 1 views

  •  
    To any future college students: Be careful of what you type on the internet or reveal about yourself in an online forum. Despite the shocking revelations of the size and scope of the government's surveillance programs revealed by Edward Snowden, the majority of Americans don't understand the kind of information the government has on them, have taken few steps to protect their online data, and believe that such programs don't go far enough in tackling terrorism. Ironically, these same Americans also overwhelmingly believe that consumers have lost protection of their data to companies who have used their clients' privacy as a commodity. I would advise you to be careful of what you post online, and follow a few steps, such as passwords, encryption, and clearing your cookies, to help protect at least some of your data online and allow you to remain private. These programs continue to this day, and it's important that you protect what little privacy remains.
  •  
    What are the mechanisms behind surveillance? How precisely are people surveilled in the US?
Riley Dankovich

Russian Hackers Behind World’s Biggest Internet Security Breach - NBC News.com - 0 views

  •  
    This video talks about a hack done by a group of Russian hackers that gained access to 1.2 billion records, and discusses the idea that perhaps passwords are no longer the best way to protect our information. It's a quick video, but what was interesting to me was that I hadn't even considered that something other than the current password system could protect our information.
Derek Bruff

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | W... - 1 views

  •  
    "Since the dawn of the information age, we've bought into the idea that a password, so long as it's elaborate enough, is an adequate means of protecting all this precious data. But in 2012 that's a fallacy, a fantasy, an outdated sales pitch. And anyone who still mouths it is a sucker-or someone who takes you for one."
rmusicant

Security Cameras In School: Protective Or Invasive? - 1 views

  •  
    More and more schools are installing security cameras in halls, classrooms and buses. Administrators say it helps protect students and staff, but some argue the practice is invasive. Guests discuss the use of surveillance cameras in schools and where to draw the line between safety and privacy.
jojodong

How to Protect Your Information Online - 0 views

  •  
    Advice: always assume that you are being hacked; use strong passwords; don't trust security questions to protect your data
jacobsb

FERPA Compliance: Protecting Student Data through Encryption - Virtru - 0 views

  •  
    Schools have a responsibility to protect your information, but it can be vulnerable to release or data breaches. Be careful when giving out personal information and try to educate yourself on your rights as a student so that you can best protect yourself.
Hannah Lee

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
Emily Dinino

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
rmusicant

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
giordas

Online Privacy: Technical, Political, or Both? When it comes to encryption, there's sol... - 1 views

  •  
    What really stood out to me about this article was that they said the NSA actually pays more attention to those people who use encryption. So, in order to protect ourselves and also avoid prying NSA eyes, we should encourage people to stand in solidarity with encryption. I thought this was really interesting because I always thought that encryption would undoubtedly make everything more secure, but here they're saying that it actually attracts attention (which isn't necessarily a good thing).
  •  
    When I was a kid, I read an issue of Superman in which he faces Batman's villain, the Joker. At one point, the Joker tells Superman that he's kidnapped all of Superman's best friends (Lois Lane, Jimmy Olsen, and so on) and locked them inside lead-lined caskets, hidden throughout Metropolis. Since the caskets are air-tight, they only have an hour to live, and Superman can't find them because his x-ray vision can't see through lead! That's what the Joker said. Actually, since Superman can't see through lead, those caskets *stood out* when he scanned the city with his x-ray vision, and he rescued all his friends in short order. Same basic idea.
Derek Bruff

Security In A Box | Tools and tactics for your digital security - 2 views

shared by Derek Bruff on 12 Nov 14 - No Cached
  •  
    Security in-a-box is a collection of guides and free tools to secure your computer, protect your information or maintain the privacy of your Internet communication. It was created to meet the digital security and privacy needs of advocates and human rights defenders.
charlotteneuhoff

The government has protected your security and privacy better than you think - 3 views

  •  
    This article goes over America's security and privacy trade-off, especially after 9/11. The author argues that we have done an excellent job keeping a balance between these two approaches and, while actions such as the Paris attack may make us question if we should add more security, there is no reason to take away the privacy we have as since 9/11 we have been doing a good job of valuing both of these aspects.
jerrywji

Protecting Your Digital Life in 9 Easy Steps - 0 views

  •  
    The first piece of advice in the article for protecting personal information is to download Signal, the encrypted messaging service we discussed in class.
leahrstr

Setting Up Your Tech on the Assumption You'll Be Hacked - 3 views

  •  
    Advice: Be careful with what information is stored on online devices. Always assume that the information can be leaked so you are never too vulnerable to an attack. Keep a strong password to protect your information
Derek Bruff

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
1 - 20 of 29 Next ›
Showing 20 items per page