{"id":64,"date":"2009-11-09T11:29:05","date_gmt":"2009-11-09T05:59:05","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=64"},"modified":"2025-04-02T18:21:38","modified_gmt":"2025-04-02T12:51:38","slug":"data-science-career-faqs","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/","title":{"rendered":"THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) &#8211; I"},"content":{"rendered":"<p>One starting point for solving home computer security problems is being aware of how the Internet and some of its technologies work. If you know how they work, you can evaluate solutions to the problems that come up. You can also use the Internet more safely and responsibly. In this section, we\u2019ll talk about two topics: trust and information in the clear as it crosses the Internet. This week\u2019s topic being \u201cInformation in the clear\u201d.<\/p>\n<p><strong>Information in the Clear<\/strong><\/p>\n<p>When you have a conversation with someone in your living space, everybody within earshot can hear the words and probably understand them. If your conversation is especially loud and your windows open, even passersby can hear. If you want privacy, you and your conversation partner need to go to another room and close the doors and windows.<\/p>\n<p>The Internet works much the same way, except the room is much, much bigger. When you send email, browse a web site, or chat online with someone, the conversation between you and that person does not go directly from your computer to his or her computer. Instead, it goes from your computer to another computer to still another computer and so on, eventually reaching his or her computer. Think of all of these computers as an Internet \u201croom.\u201d<\/p>\n<p>Anyone, or, more accurately, any program, in that Internet room that can hear that conversation can also probably understand it. Why? Because just like the conversation at home, most Internet conversations are in the clear, meaning that the information exchanged between computer systems is not concealed or hidden in any way.<\/p>\n<p>Again, this is how the Internet works. You need to know that the information sent across the Internet may be at <a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#risk\" target=\"new\" rel=\"noopener noreferrer\"><strong><em>risk<\/em><\/strong><\/a> of others listening in, capturing what you send, and using it for their own benefit.<\/p>\n<p>Source: <a href=\"http:\/\/www.cert.org\/\">http:\/\/www.cert.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One starting point for solving home computer security problems is being aware of how the Internet and some of its technologies work. If you know how they work, you can evaluate solutions to the problems that come up. You can also use the Internet more safely and responsibly. In this section, we\u2019ll talk about two topics: trust and information in the clear as it crosses the Internet. This week\u2019s topic being \u201cInformation in the clear\u201d. Information in the Clear When you have a conversation with someone in your living space, everybody within earshot can hear the words and probably understand them. If your conversation is especially loud and your windows open, even passersby can hear. If you want privacy, you and your conversation partner need to go to another room and close the doors and windows. The Internet works much the same way, except the room is much, much bigger. When you send email, browse a web site, or chat online with someone, the conversation between you and that person does not go directly from your computer to his or her computer. Instead, it goes from your computer to another computer to still another computer and so on, eventually reaching [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-64","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How &quot;Information in the Clear&quot; Impacts Your Online Security<\/title>\n<meta name=\"description\" content=\"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How &quot;Information in the Clear&quot; Impacts Your Online Security\" \/>\n<meta property=\"og:description\" content=\"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2009-11-09T05:59:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T12:51:38+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) &#8211; I\",\"datePublished\":\"2009-11-09T05:59:05+00:00\",\"dateModified\":\"2025-04-02T12:51:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/\"},\"wordCount\":318,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/\",\"name\":\"How \\\"Information in the Clear\\\" Impacts Your Online Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2009-11-09T05:59:05+00:00\",\"dateModified\":\"2025-04-02T12:51:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/data-science-career-faqs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) &#8211; I\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How \"Information in the Clear\" Impacts Your Online Security","description":"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/","og_locale":"en_US","og_type":"article","og_title":"How \"Information in the Clear\" Impacts Your Online Security","og_description":"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.","og_url":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2009-11-09T05:59:05+00:00","article_modified_time":"2025-04-02T12:51:38+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) &#8211; I","datePublished":"2009-11-09T05:59:05+00:00","dateModified":"2025-04-02T12:51:38+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/"},"wordCount":318,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/","url":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/","name":"How \"Information in the Clear\" Impacts Your Online Security","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2009-11-09T05:59:05+00:00","dateModified":"2025-04-02T12:51:38+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Understand the risks of unencrypted data online. Learn why your information may be exposed and how to protect it effectively.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/data-science-career-faqs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) &#8211; I"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":12488,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/64\/revisions\/12488"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}