{"id":6210,"date":"2021-10-18T13:24:00","date_gmt":"2021-10-18T17:24:00","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/?p=6210"},"modified":"2021-10-19T09:18:45","modified_gmt":"2021-10-19T13:18:45","slug":"week-8-encoding-vs-encryption","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/2021\/10\/18\/week-8-encoding-vs-encryption\/","title":{"rendered":"Week 8 &#8211; Encoding vs Encryption"},"content":{"rendered":"<p>This week&#8217;s topics include encoding and encryption.<\/p>\n<p>Encoding \/ Decoding uses an algorithm, but no special &#8220;key&#8221;, per se.\u00a0 Once someone knows the algorithm (mathematic formula), one can decode the message.<\/p>\n<p>Encryption \/ Decryption uses an algorithm, but adds a special &#8220;key&#8221;.\u00a0 A simple password, such as used on your Wireless Access Point when using WPA2, can make the encryption unbreakable because the outside party doesn&#8217;t have knowledge of the password that is used as part of the WPA2 encryption.\u00a0 No password = No decryption.\u00a0 (unless you social engineer to get the password)<\/p>\n<p>So, this past week there was a case where a journalist was reviewing data from a publicly-available web site in Missouri, but they noticed that there was a lot of extra data. They used the &#8220;View Source&#8221; capability of the website, and then noticing a lot of data, ran that data through a decoder program, and then realized that the teachers&#8217; SSNs were being sent to the website.<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/analysis\/bug-bounties\/row-over-data-leak-disclosure-by-journalist-further-erodes-researchers-government-trust?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=SCUS_Newswire_%7B%7Bnow%7Cdate%3A%25Y%25m%25d%7D%7D&amp;hmSubId=%7B%7Bcontact.cms_id_encrypted%7D%7D&amp;email_hash=%7B%7Bcontact.email%7Cmd5%7D%7D&amp;mkt_tok=MTg4LVVOWi02NjAAAAGAMdGE84NyOuWSkQAkRRVgvKTI4Hio2k0G3pOThTKVcemIoPgRSztR2U22O4d07kdOKet3vQBf0-j4nqQrlopC7Hin_C0PMF-Blrg_hg\">Link to Article<\/a><\/p>\n<p>There are a few questions:<\/p>\n<p>Is this &#8220;hacking&#8221;?<\/p>\n<p>Who should be liable &#8211; the journalist, or the state?<\/p>\n<p>&nbsp;<\/p>\n<p>Week 8 <a href=\"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/files\/2021\/10\/MIS5211_2021-Intro-to-Ethical-Hacking-Week-8-Handouts.pdf\">Handouts<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week&#8217;s topics include encoding and encryption. Encoding \/ Decoding uses an algorithm, but no special &#8220;key&#8221;, per se.\u00a0 Once someone knows the algorithm (mathematic formula), one can decode the message. Encryption \/ Decryption uses an algorithm, but adds a special &#8220;key&#8221;.\u00a0 A simple password, such as used on your Wireless Access Point when using [&hellip;]<\/p>\n","protected":false},"author":17045,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[805939],"tags":[],"class_list":{"0":"post-6210","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-malware","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/posts\/6210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/users\/17045"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/comments?post=6210"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/posts\/6210\/revisions"}],"predecessor-version":[{"id":6216,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/posts\/6210\/revisions\/6216"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/media?parent=6210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/categories?post=6210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec701fall2021\/wp-json\/wp\/v2\/tags?post=6210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}