5.5 Legal and Ethical Concerns
-
When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
- MIT License
- Permission is granted to use, copy, modify, and distribute the software
- minimal restrictions on the use of the software and allows it to be used in commercial and non-commercial projects
- allows anyone to use, modify, and distribute the licensed software for any purpose, including commercial use, as long as the original copyright and license notices are included
- GPL License
- Freedom to use, modify, and distribute the software: Users of the software are free to use it for any purpose, make changes to it, and distribute it, either for free or for a fee
- source code of the software must be made available to anyone who receives a copy of the software
- no discrimination
- MIT License
-
In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.
- Software licenses determine the terms and conditions under which software can be used, modified, and distributed.
- Digital rights, such as privacy and intellectual property rights, are important in considering ethical concerns. For example, in the case of music, licensing can prevent music from being pirated so that artists can take credit for their work.
- This is important for software coders because it allows creators to control their creations and protect their rights to avoid other people stealing their data.
- Software licenses, digital rights, and legal and ethical considerations are all complex and interrelated topics that impact the development, distribution, and use of software.
-
Make a license for your personal
- An MIT License allows for greater flexibility in the use of the software. GPL license is requires derivative works be licensed under the same terms as the original software. We chose the MIT license for greater flexibility. It is easier to distribute code, which can be beneficial to other users.
5.6 Safe Computing
-
Describe PII you have seen on project in CompSci Principles.
- Projects that include PII on a project in CSP is seen on the login page. When people login to a site on our website, their information includes their name and their email.
-
What are your feelings about PII and your personal exposure?
- I think PIIs have the potential to be dangerous because people are able to stalk you online and I don’t want to be stalked. However, PII’s are necessary for login and user experience so it is important to be sure that the information you are giving is to a secure website where your information will not be stolen.
-
Describe good and bad passwords? What is another step that is used to assist in authentication.
- A good password is one that can not be guessed by other people and does not include any personal information.
- A bad password is 1234567890 or something that can be easily guessed.
-
Try to describe Symmetric and Asymmetric encryption.
-
Symmetric Encryption: Method of encryption where the same key is used for both encryption and decryption; is fast and efficient (SECRET KEY)
-
Asymmetric Encryption: encryption that uses two different keys for encryption and decryption. The public key, is used for encrypting the data and shared widely, and the private key, is used for decrypting the data and must be kept confidential.
-
-
Provide an example of encryption we used in AWS deployment.
- AES-256 encryption
-
Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
- A phishing scheme I have seen are people scamming personal information through fake lotteries. People send text messages saying you won $100 dollars and will ask for your address and other personal info. This is bad.
- Other phishing include malicious websites, voice mail messages, or email.