Download presentation
Presentation is loading. Please wait.
1
Big Data & Privacy Review - summary
2
Big Data Moore’s ‘law’ – processor speed doubling every 2 years
How would you define “big data”? What are benefits of big data? What are some concerns about big data collection & use? How is information being collected by technology every day?
3
Privacy issues Privacy policies from apps / websites
Who gets to use / look at your data? What do we get for the privacy we give up? How are banking, shopping, browsing, & connecting online all subject to ‘prying eyes’? Does this concern you?
4
encryption Symmetric encryption – uses the same key for encrypting and decrypting Caesar cipher Random substitution cipher Strong encryption techniques have mathematical properties ensuring original message can’t be easily retrieved [computationally hard] Keys – “code” to encrypting / decrypting message
5
Encryption continued Asymmetric encryption – uses one key to encrypt and another to decrypt Public key – encrypting key is public, but needs private key to decrypt Private key – used to Modulo – remainder after division. This operation is “one way” function. [multiply divide, add subtract] – can’t reverse modulus.
6
Cybersecurity Ddos – Distributed Denial of Service
Phishing – scamming to get personal information Virus – executable program that installs on your machine – causes damage or automates
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.