5.5 Blog Post Reflection

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog. ##### MIT License
    • The software can be utilized, copied, altered, and distributed with permission.
    • There are limited restrictions on the software’s usage, enabling it to be employed in both commercial and non-commercial endeavors.
    • The license permits anyone to use, modify, and distribute the software for any purpose, including commercial purposes, as long as the original copyright and license notifications are maintained. ##### GPL License
    • Users of the software are granted the liberty to utilize, modify, and distribute it for any purpose, either without charge or for a fee.
    • The source code of the software must be provided to anyone who obtains a copy of it.
    • There is no discrimination in the use and distribution of the software.
  2. In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.
    • Software licenses establish the guidelines and rules for the utilization, alteration, and distribution of software. Consideration of digital rights, such as privacy and intellectual property rights, is crucial in addressing ethical considerations. For instance, in the music industry, licensing prevents music piracy and ensures artists receive credit for their work.
    • This is significant for software developers as it gives them control over their creations and safeguards their rights to prevent others from misappropriating their data.
    • The intersection of software licenses, digital rights, and legal and ethical considerations is a complex and multifaceted topic that impacts the creation, distribution, and use of software.
  3. Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.

5.6 Blog Post Reflection

  1. Describe PII you have seen on project in CompSci Principles.
    • Projects that include PII on a project in CSP is seen on the login page. When people login to a site on our website, their information usually includes their name and their email.
  2. What are your feelings about PII and your personal exposure?
    • I think PIIs have the potential to be dangerous because people are able to stalk you online and I don’t want to be stalked. However, PII’s are necessary for login and user experience so it is important to be sure that the information you are giving is to a secure website where your information will not be stolen.
  3. Describe good and bad passwords? What is another step that is used to assist in authentication.
    • A good password is one that can not be guessed by other people and does not include any personal information.
    • A bad password is 1234 or something that can be easily guessed.
  4. Try to describe Symmetric and Asymmetric encryption.
    • Symmetric Encryption: Method of encryption where the same key is used for both encryption and decryption; is fast and efficient (SECRET KEY)
    • Asymmetric Encryption: Encryption that uses two different keys for encryption and decryption. The public key, is used for encrypting the data and shared widely, and the private key, is used for decrypting the data and must be kept confidential.
  5. Provide an example of encryption we used in AWS deployment.
    • AES-256 encryption
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • A phishing scheme I seen recently is where an unknown number texts you about a guaranteed way to make a lot of money using cryptocurrencies and asks you to click the link they have included. They say this link adds you to a giveaway where the winner gets to know the secret method to make the money. In reality the link just steals your information and the giveaway is fake.
    • Other phishing include malicious websites, voice mail messages, or email.