5.5 - 5.6s Blog Post

5.5 Legal and Ethical Concerns

License Communities, License Types Guide

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
    • Software licenses and options are agreements that specify how users may use, distribute, and modify software. The most typical software licenses include MIT, GNU, etc. With GNU, anyone can access your material for free.
  2. Blog discussions and personal analysis of software licenses/options, digital rights, and other legal and ethical considerations from this College Board topic.
    • Software licenses and options are agreements between software creators and users that determine how the software can be used, distributed, and modified.
  3. Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.
    • My own personal blog puts the repository under the open source GPL license. We also made the group repository license an open source GPL license. We chose this license because we want the code to be open to everyone, but we don’t allow anyone to redistribute the closed source code.

      5.6 Safe Computing

  4. Describe PII you have seen on project in CompSci Principles.
    • Some Personal Identifiable Information that I have seen on github is names, emails, photos, education, and for some, birth date, addresses and phone numbers.
  5. What are your feelings about PII and your personal exposure?
    • Due to PII, I think you should be careful about what you post online. It’s okay to share names and email addresses, but you shouldn’t share anything personal like social security numbers or passwords. But this his PII helps companies tailor their own his website to our interests and increase the popularity of their own his website.
  6. Describe good and bad passwords? What is another step that is used to assist in authentication.
    • A good password is long, contains numbers and special keys, and is completely irrelevant to the user. Another step you can use for authentication is two-factor authentication by sending an email.
  7. Try to describe Symmetric and Asymmetric encryption.
    • Symmetric encryption means that a private key encrypts and decrypts information. Asymmetric cryptography uses two keys, a public key and a private key, to encrypt and decrypt information.
  8. Provide an example of encryption we used in AWS deployment.
    • An example of encryption we used in AWS deployment is the SSL encryption. And this uses both the symmetric and the asymmetric encryption.
  9. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • Most phishing emails I receive end up in spam, so I haven’t learned the hard way about phishing schemes. However, when I saw the email, it turned out to be a phishing scam. But a friend of mine got hacked on Discord and he sent me the file and I almost clicked on it. Some phishing techniques send emails pretending to be from large companies. Also by hacking the user’s account and sending the link to anyone they know.