5.5

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.

  • Creative Commons Zero v1.0 Universal: example of free use material
  • MIT license: same as above, but giving author credit
  • Open Source GPL License: allow use, but unable to release their own versions

In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.

There are many different perspectives and viewpoints for copyright. For one, people or companies may not want others to use their work without permission because they lose profit. On the other hand, a small creator may not want copyright because it helps them grow and spread. Finally, some argue that copyright is generally ineffective, people always find a way to copy.

Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.

I chose Creative Commons Zero v1.0 Universal because I do not intend to profit from any of the work in my repository. I hope I can reach other CSP students who are interested in creating code inspired by my work. I did this by removing previous LICENSE file and creating a new one with correct license.

5.6

Describe PII you have seen on project in CompSci Principles.

Some PII I have seen in CSP is name, age, date of birth, graduation year from API activity.

What are your feelings about PII and your personal exposure?

I feel that a safe amount of PII on the internet can be helpful, such as LinkedIn info to help reach out to employers. Obviously, info such as credit cards and passwords are harmful, malicious actions can be taken with them.

Describe good and bad passwords? What is another step that is used to assist in authentication.

Good passwords include a wide variety of symbols(upper/lowercase, numbers, symbols) becuase it takes more time to brute force. Two-factor authentication is a helpful authentication method, which includes confirming login externally, such as through email or code.

Try to describe Symmetric and Asymmetric encryption.

Symmetric encyrption uses a single key for encrytion and decrytion, while asymmetric encryption creates two keys, public and private, one for encryption and one for decryption.

Provide an example of encryption we used in AWS deployment.

One example of encryption in AWS was the public/private key creation to ensure confidentiality and security.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

One time, my mom thought she won free watches but in reality she had clicked on a malicious link. Luckily, my siblings and I caught the mistake before she could input any sensitive information, like credit card number.