PSC 2224 Week 3 Notes
PSC 2224 Week 3 Notes PSC 2224
Popular in Policy in the Cyber Age
Popular in Political Science
This 2 page Class Notes was uploaded by Caroline Jok on Tuesday September 20, 2016. The Class Notes belongs to PSC 2224 at George Washington University taught by Silvana Rubino-Hallman in Fall 2016. Since its upload, it has received 7 views. For similar materials see Policy in the Cyber Age in Political Science at George Washington University.
Reviews for PSC 2224 Week 3 Notes
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 09/20/16
Policy in the Cyber Age – Week 3 Technology Grasping Technology : What is a byte • basic unit of information of computer storage and processing, 8 adjacent binary bits, (0,1) -> Store information & allow it to be shared. How are emails transmitted: • Simple mail transfer protocol > Domain server (identifies address) > sent through mail transfer agent > received on your server • You press send: Protocols that have been defined o A protocol is rules/standards for how a process is completed/goal is achieved. o The internet is possible because of collaboration. How does Twitter/Instagram/SnapChat/Facebook Work? • Shared via network, although it is not a physical network of connectivity that is hardwired. • You can measure the network affect that is associated with the permanency of that network. Can you delete electronic documents? How can you redact text in electronic documents? • No, it's extremely hard to be certain that something has been permanently deleted "deleted" documents is just writing 0's over the entire file, but it's all on the disk. • • Redact: gets rid of the text and gets rid of the metadata that is connected to the text. • There used to be a barrier to copying: space. How does encryption work? • Scrambled and sent with the key to unscramble it. • It is a mediation of the transmission, codes at the output and decodes only if you have the key at the arrival point. • Companies used to sell private encryption keys, but buying more of these actually makes the world less secure because that power is being transferred. • Most emails encrypt as a result of wikiLeaks • Private companies became concerned with protecting private security so that they could still be viable options for communications. The government has asked that they have access to information - this is a highly debated point. IP address: • Unique address that everything can be traced back to and by which devices communicate. What are cookies: • Small files of data stored to your computer that allow for sites to track and save information about you. What is the most secure way to protect information? • A combination integration of information. • Biometric data can be hacked and obtained • Otherwise? Physical copies that have never been run through any electronic devices. How are pictures shared? Can they be altered/protected? • They are shared as data files (bits) • They can be altered, but it requires changing the bits themselves is what is needed to alter the picture itself. How does GPS work? • Triangulation with Satellite communication. How do location apps work? • Geolocation with cell towers. What is the difference? • For the most part geolocation is much more precise. What is an RFID? • Radio-Frequency Identification Movie: Low and behold
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'