Skip to content

Latest commit

 

History

History
137 lines (82 loc) · 2.54 KB

File metadata and controls

137 lines (82 loc) · 2.54 KB

Lecture 14

Privacy and security; shell scripting


Lab DMs

Need a few volunteers.

  • You'll be the Dungeon Master (DM), for folks familiar with D&D
  • Should be a good storyteller / comfortable thinking on your feet
  • 15-30 minutes of prep required
    • A doc will be shared with you

  • How many of those things had you done already?
  • Who did the Next Steps?
  • Any surprises or discoveries, pleasant or unpleasant?

Did these change how anyone thought about their smart devices?


Privacy vs. security

What's the difference?


doors and windows

Doors vs. windows anaolgy


Why are we talking about this?


  • Where has security come up in your Project?
  • Has privacy come up?

  • Type in whatever email you use most for online accounts
  • How many did you get?

  • Treats Privacy as a subset of Security (Confidentiality)
  • What would make a system have higher needs for one vs. another?
  • "High-water mark"

Types of (sensitive) personal information

  • Personally identifiable information (PII)
  • Protected health information (PHI)
  • Payment card industry (PCI) data


Security toolkit

2FA/MFA

  • What does it mean?
  • Why is it important?

Password managers

  • Who uses one?
  • What do they do?
  • Why are they important/useful?

SSO

  • What is it?
    • What does it mean to consumers?
  • Any downsides?
  • Why is it important?

Encryption

  • How does it work? (high level)
  • Why does it matter?

Advanced command line

  • Pipes
  • curl
  • find
  • xargs
  • grep
  • sed

Multiple commands

Common for setup or administrative tasks.


Continue on Project Part 8