This week’s topics include encoding and encryption.
Encoding / Decoding uses an algorithm, but no special “key”, per se. Once someone knows the algorithm (mathematic formula), one can decode the message.
Encryption / Decryption uses an algorithm, but adds a special “key”. A simple password, such as used on your Wireless Access Point when using WPA2, can make the encryption unbreakable because the outside party doesn’t have knowledge of the password that is used as part of the WPA2 encryption. No password = No decryption. (unless you social engineer to get the password)
So, this past week there was a case where a journalist was reviewing data from a publicly-available web site in Missouri, but they noticed that there was a lot of extra data. They used the “View Source” capability of the website, and then noticing a lot of data, ran that data through a decoder program, and then realized that the teachers’ SSNs were being sent to the website.
There are a few questions:
Is this “hacking”?
Who should be liable – the journalist, or the state?
Week 8 Handouts