100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Class notes INSY 2303 - Subject Digital Security

Rating
-
Sold
-
Pages
6
Uploaded on
12-03-2025
Written in
2024/2025

Ace INSY 2303 (Introduction to Computer Applications) without spending a dime on the textbook! These comprehensive, high-quality notes cover all 8 topics from the course, including exclusive content from Cengage, meaning you won’t need to purchase any additional materials. Every lecture is carefully summarized with detailed explanations, real-world applications, and step-by-step guides on essential software like Excel, Access, and more, making even the trickiest concepts easy to understand. Unlike scattered PowerPoints or lengthy textbook chapters, these notes are structured for maximum efficiency, helping you focus only on what’s actually tested. You’ll get key takeaways, exam-ready content, and insider tips to ensure you score the highest possible grade. These notes have helped students consistently achieve A’s, making them the ultimate shortcut to success in this class. Whether you’re struggling to keep up with lectures or just want to guarantee an easy A, this is the only resource you’ll need. Don’t waste time and money—get your hands on these game-changing notes today and take control of your GPA!

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
March 12, 2025
Number of pages
6
Written in
2024/2025
Type
Class notes
Professor(s)
Siddhi ramanand nair
Contains
All classes

Subjects

Content preview

Basic Security
Monday, March 25, 2024 1:19 PM



I. Encryption
a. Encryption - transforms a message or data file that its contents are hidden
from unauthorized readers
b. Plaintext - original message no yet been encrypted
c. Ciphertext - an encypted message or file
d. Decryption - the reverse process of encryption. Ciphertext to plaintext
e. Cryptographic algorithms - a procedure for encryption or decryption
f. Cryptographic key - a word or number or phrase that must be known to
encrypt or decry[t data
g. AES = standard encryption used worldwide
II. Authentication
a. User authentication - any technique used to verify or confirm a person's
identity
i. Requires techniques like passwords, PINs, fingerprints, etc to
prevent unauthorized access to the data
b. Two factor authentication - increases security by verifying identity based
on two components, like password and verification code
c. Iphones and ipads, locked to require a login password each time the
device is used
d. Authentication options for ios devices include short passcodes, facial
recognition, fingerprint scans
e. Androids have an overwhelming # of security settings
i. Do not automatically encrypt data stored on the device when user
activates the login
1) Configuring a password and activating encryption are two
separate steps
f. Windows - offers several sign -in options that can be configured using the
Accounts option on the settings screen
g. Macs offer several password settings
h. macOS - Filevault automatically encrypts data stored locally
III. Passwords
a. Strong password is hard to hack
b. Conventional wisdom tells that strong passwords are at least 8 characters
in length and include 1 or more uppercase letters, numbers, and symbols.
i. They create passwords that' difficult to crack but impossible to
remember
c. Brute force attack - password cracking software to generate every
possible combination of letters, numerals, and symbols
i. Exhausts all possible combination to discover password, can run for
days
d. Dictionary attack - helps hackers guess password by stepping through a
dictionary containing word lists in common lang like engl, span, Fren,
Germ
i. Effective b/c many users choose easy passwords to remember
e. Schemes users devise to create passwords are obvi to hackers and
programmers who create password cracking tools
f. Weak passwords include:
i. Words from dicti, words in other languages
ii. Doubled words like passpass
iii. Default passwords like admin, system, guest
iv. Sequences of numbers like dates or # nums
v. Any sequence that includes a username like dfoiheio12345
1) Or conventional capitalization
g. Password entropy - a measure in bits of a password's unpredictability
i. Entropy - theoretical concept
ii. Security measures may be in place to prevent hacking tools from
trying continously
h. Long, random passwords are more secure, but diff to remember
IV. Password manager
a. Password manager (keychain) - keep track of passwords so users don't


Digital Security Page 1

, a. Password manager (keychain) - keep track of passwords so users don't
need to memorize
b. Strength meter- indicates password security
i. Pswrd stored locally are tied to device they're created
ii. Password managers store encrypted paswrd in cloud




Digital Security Page 2
$15.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
suhanabhimani

Also available in package deal

Thumbnail
Package deal
ALL 8 Topics covered in Cengage and Insy 2303 class notes
-
8 2025
$ 123.92 More info

Get to know the seller

Seller avatar
suhanabhimani University Of Texas - Arlington
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
9 months
Number of followers
0
Documents
8
Last sold
-
GPA Boosters

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions