Page 45 - Computing Book 7
P. 45

All About Cloud                                                                      Class 7


               WEP Wired Equivalent Privacy
               WEP was developed for wireless networks and approved as a Wi-Fi security standard in September
               1999. WEP was supposed to offer the same security level as wired networks, however, there are a
               lot of well-known security issues in WEP, which is also easy to break and hard to configure. Despite
               all the work that has been done to improve the WEP system it still is a highly vulnerable solution.

               WPA. Wi-Fi Protected Access:
               For the time the 802.11i wireless security standard was in development, WPA was used as a
               temporary security enhancement for WEP. One year before WEP was officially abandoned, WPA was
               formally adopted. Most modern WPA applications use a pre-shared key (PSK), most often referred to
               as WPA Personal, and the Temporal Key Integrity Protocol (TKIP) for encryption. WPA Enterprise
               uses an authentication server for keys and certificates generation. Still, WPA2, WPA’s newest
               version, is more secure and even better than WPA. WPA2 is the latest and strongest wireless security
               and encryption standard. Almost all modern routers support it and you should definitely use this
               option to protect your home network.

               Digital Citizenship:
               You probably have heard that it is important to be a good citizen. So, what would it mean to be a
               good digital citizen? The word digital refers to any type of technology that you use.
                   •  If you are a citizen, this means you belong to a group of people. So you could be a citizen of
                       your classroom or your neighbourhood.
                   •  Being a digital citizen means you are a part of the group of people that use technology to
                       communicate.
                   •  There are rules that you need to follow when you are a digital citizen, to protect yourself and
                       to protect others.

               Personal Data:
               Personal data, also known as personal information, personally identifying information (PII), or
               Sensitive Personal Information (SPI) is any information relating to identifying a person.
               Some examples of PII are:
                   •  Names: Your full name, your maiden name, and your mother’s maiden name
                   •  Personal ID numbers: NIC#, driver’s license#, passport#, patient ID#, taxpayer ID# etc
                   •  Addresses: Your street address and email address
                   •  Biometrics: Retina scans, fingerprints, facial geometry, or voice signatures
                   •  Vehicle ID or title numbers
                   •  Technology asset information: Media Access Control (MAC) or Internet Protocol (IP)
                       addresses that are tied to a certain individual
               We must never give our name, address, telephone number or other personal data to strangers or
               unknown websites to avoid identity theft or to protect our financials.

               Intellectual Property (IP) is a category of property that includes intangible creations of the human
               intellect. There are many types of intellectual property, the most well-known types are Copyright,
               Patents, Trademarks, Industrial design rights, Plant variety rights etc.




               The City School/Academics/Computing Curriculum/Class7/2020-2021                  Page 44 of 95
   40   41   42   43   44   45   46   47   48   49   50