Skip to main content

Cybersecurity 101

  • Chapter
  • First Online:
Firewalls Don't Stop Dragons
  • 886 Accesses

Abstract

Before we can begin to discuss security, we really have to define some key computer terms and concepts. You do not have to memorize this stuff, and it’s okay if you don’t follow everything here. There’s a glossary at the end of this book that you can refer to for quick help, or you can return here if you want to refresh your memory. But for the rest of this book to make sense, I need to get you up to speed on the basics of how computers and the Internet work. I’m trying to cover all the bases here, so if you see a topic you already understand, feel free to skip it or just skim it. I’ve also taken the liberty of throwing in some fun little tidbits that will help to keep things interesting. There will be a wide range of people reading this book, and I just can’t take the time to fully explain everything. But in this chapter, I give you a solid base to work from.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Almost. Because computers are so tied to binary counting, they count things based on the powers of two. You frankly will probably never need to know this, but if some smart-ass tells you that 1KB is not really a thousand bytes, they’re right…it’s technically 1,024 bytes. Why? Because. Just trust me. For most purposes, you can just call it a thousand and be done with it. The same is true for the others (MB, GB, TB)—just go with thousand, million, billion, and trillion. It’s close enough.

  2. 2.

    The term Wi-Fi is just a marketing term someone made up. It was meant to sound like Hi-Fi but doesn’t really stand for “wireless fidelity.” It’s just a lot catchier than 802.11, which is the technical name.

  3. 3.

    Image source: Histoire des jouets by Henry René d’Allemagne (1902)

  4. 4.

    An acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. A Turing test, named for Alan Turing, is a test that attempts to verify that you are communicating with a real human and not a computer.

  5. 5.

    Britain’s version of the NSA, which is called Government Communications Headquarters

  6. 6.

    This is my personal decoder pin, obtained from the A Christmas Story House and Museum in Cleveland, Ohio. If you’re a fan of the movie, it’s a must-see ( https://www.achristmasstoryhouse.com/ )!

  7. 7.

    As you can see in the figure, the actual decoder pin wasn’t a true rotational cipher. But I’ve simplified it here for the purposes of our example.

  8. 8.

    Turing’s work has been wonderfully captured in the Academy Award–winning movie The Imitation Game. And if you find the history of cryptanalysis as fascinating as I do, I highly recommend you read The Code Book by Simon Singh.

  9. 9.

    Alice and Bob are well-known in the cryptographic world. These are the names used when describing communication scenarios in lieu of saying “Party A” and “Party B.”

  10. 10.

    This provides something called nonrepudiation. That’s a fancy legal term that basically means Alice can’t plausibly deny that something digitally “signed” with her private key came from someone else.

  11. 11.

    Here’s a fun workaround to giving your personal info. If your store allows you to find your loyalty card using your phone number, try your local area code plus 867-5309. If you were a 1980s teenager, you’ll recognize this as the telephone number for “Jenny” from the one-hit-wonder song by Tommy Tutone.

  12. 12.

    You can try this yourself. Go to ip2location.com .

  13. 13.

    https://www.salon.com/2014/10/30/im_terrified_of_my_new_tv_why_im_scared_to_turn_this_thing_on_and_youd_be_too

  14. 14.

    The term opt out refers to a situation where a company signs you up for something but gives you the option to back out if you make some effort. For example, they might automatically include you in some data-gathering program but allow you to “opt out” if you change some preference on your account or send them a signed form. An opt in program is the opposite: you have to explicitly ask to be in.

  15. 15.

    There’s a great documentary on the topic of these EULAs and the data being collected on all of us called Terms and Conditions May Apply.

  16. 16.

    http://benton.org/initiatives/obligations/charting_the_digital_broadcasting_future/sec2 , reference 32. Amendments to Delegations of Authority, 59 FCC 2d 491, 493 (1976)

  17. 17.

    Note that this feature will initially be available only in the European Union but should roll out to other countries soon.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Carey Parker

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Parker, C. (2018). Cybersecurity 101. In: Firewalls Don't Stop Dragons. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3852-3_2

Download citation

Publish with us

Policies and ethics