Quiz 2-1
Orders of magnitude of data:
1.)Megabyte 2.)gigabyte 3.)terabyte 4.)petabyte 5.)exabyte 6.)zettabyte 7.)yottabyte
The use of which of the following allows a company to set cookies on pages belonging to other sites?
3rd Party Cookies
Assume Jean does not have a Google, Gmail account. The fact that Google still has copies of many of Jean's messages is an example of what kind of surveillance?
Automatic
We often justify giving our information away freely on the Internet in exchange for
Convenience/free service
What is a data broker? Who might use the services of a data broker?
Data brokers collect, aggregate, and sell data; to them data is simply a commodity. It is a for-profit endeavor that is used to sort us into various marketable categories. Anyone seeking a list of individuals who might be interested in a certain product (health-related for example) might use the services of a data broker to get a list of potential contacts (pages 51 -53)
TRUE/FALSE: According to Schneier, collecting metadata about an individual is a harmless act.
False
TRUE/FALSE: You can have a reasonable expectation of privacy regarding information you voluntarily turn over to third parties.
False
The practice of delivering a business's ads to people who are near that business is called:
Geofencing
What occurred to cause the U.S. to tone down their language regarding the Chinese government's practice of breaking into US computer networks for espionage purposes?
Snowden revealed that the U.S. had been doing the same thing to the Chinese.
Who is Edward Snowden, and what is his significance to Schneier's story?
Snowden was a contract employee of the NSA who uncovered and revealed practices of mass, unknown surveillance by the NSA, in particular, how the NSA uses metadata to track individuals. It really forms the basis and much of the evidence for Schneier's story. (Chapters 3 and 4, plus)
In a few words, describe the relationship between governments and corporations w/ respect to surveillance.
There are several possible answers; here's one: Government surveillance piggybacks on corporate capabilities. Corporations cannot promise their customers data security because currently the government can demand access. There is an example provided in the book about Gmail and the fact that mail resides on un-encrypted servers and the company is staffed by a group of people who respond to requests for access to individual accounts.Or companies cave into demands by the government to install 'backdoor'entry into systems. (Pages 82 -87)
According to our book, what is 'big data'?
a general practice of collecting and saving all kinds of data
The primary goal of Internet surveillance by a company is:
advertising
What is a good way to explain the idea of 'data mining'?
analyzing data stores for useful information.
Briefly explain what can be derived from correlating different data sets.
combining data sets on a common key (identities) and analyzing based on those commonalities -allows data brokers or companies to infer much more about an individual's behaviors, preferences, etc. than the individual data sets alone can provide (pages 40 -42).
The practice of changing data to hide its meaning is called
encryption
The fact that Amazon knows how fast you read a Kindle book is an example of what kind of surveillance
hidden
The practice of collecting data on everyone a particular individual contacts is call a/an _________________.
hop search
The term for data that describes other data is:
metadata
The practice of presenting ads to an individual based upon their previous web searches and online purchases is called:
personalized advertising
Explain the concept of "data as content" and "metadata as context"
the 'meat' of the message. Metadata provides additional information -or context -about the data; who the author was, who the recipient of a message was, what time it was created, what time it was delivered, the size of the message, etc.(chapter 1)