Page 45 - Computing Book 7
P. 45
All About Cloud Class 7
WEP Wired Equivalent Privacy
WEP was developed for wireless networks and approved as a Wi-Fi security standard in September
1999. WEP was supposed to offer the same security level as wired networks, however, there are a
lot of well-known security issues in WEP, which is also easy to break and hard to configure. Despite
all the work that has been done to improve the WEP system it still is a highly vulnerable solution.
WPA. Wi-Fi Protected Access:
For the time the 802.11i wireless security standard was in development, WPA was used as a
temporary security enhancement for WEP. One year before WEP was officially abandoned, WPA was
formally adopted. Most modern WPA applications use a pre-shared key (PSK), most often referred to
as WPA Personal, and the Temporal Key Integrity Protocol (TKIP) for encryption. WPA Enterprise
uses an authentication server for keys and certificates generation. Still, WPA2, WPA’s newest
version, is more secure and even better than WPA. WPA2 is the latest and strongest wireless security
and encryption standard. Almost all modern routers support it and you should definitely use this
option to protect your home network.
Digital Citizenship:
You probably have heard that it is important to be a good citizen. So, what would it mean to be a
good digital citizen? The word digital refers to any type of technology that you use.
• If you are a citizen, this means you belong to a group of people. So you could be a citizen of
your classroom or your neighbourhood.
• Being a digital citizen means you are a part of the group of people that use technology to
communicate.
• There are rules that you need to follow when you are a digital citizen, to protect yourself and
to protect others.
Personal Data:
Personal data, also known as personal information, personally identifying information (PII), or
Sensitive Personal Information (SPI) is any information relating to identifying a person.
Some examples of PII are:
• Names: Your full name, your maiden name, and your mother’s maiden name
• Personal ID numbers: NIC#, driver’s license#, passport#, patient ID#, taxpayer ID# etc
• Addresses: Your street address and email address
• Biometrics: Retina scans, fingerprints, facial geometry, or voice signatures
• Vehicle ID or title numbers
• Technology asset information: Media Access Control (MAC) or Internet Protocol (IP)
addresses that are tied to a certain individual
We must never give our name, address, telephone number or other personal data to strangers or
unknown websites to avoid identity theft or to protect our financials.
Intellectual Property (IP) is a category of property that includes intangible creations of the human
intellect. There are many types of intellectual property, the most well-known types are Copyright,
Patents, Trademarks, Industrial design rights, Plant variety rights etc.
The City School/Academics/Computing Curriculum/Class7/2020-2021 Page 44 of 95

