csp chapter 5

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:51 AM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

34 Terms

1
New cards

heuristic approach

approach that gives results that are “good enough” when an exact answer isn’t necessary

2
New cards

traveling salesman problem (TSP)

to map out shortest route for visiting a list of cities and returning to original city

  • computationally hard

  • NP problem

3
New cards

computationally hard

even computers would take very long amounts of time to find the exact solution

4
New cards

NP problem

“nondeterministic polynomial time”

  • can be verified, but not solved in an efficient amount of time

5
New cards

P problem

problem that can be both solved and verified

6
New cards

hackers

“black hats” - exploit weaknesses on a computer or network

7
New cards

white hat hackers

explore vulnerabilities on a computer or network to fix weaknesses and make data more secure

8
New cards

CIA triad

  • confidentiality

    • private data should remain private and companies should take steps so hackers cannot access this information

  • integrity

    • data should be protected from being altered or deleted by hackers

  • availability

    • all data should be accessible by authorized parties at appropriate times

9
New cards

malware

  • malicious software

  • installed w/ intention of causing damage to computer or network

10
New cards

virus

program that infects other programs and usually spreads to other programs or computers by copying itself repeatedly

  • spread due to user behavior

  • need application to use as a host

11
New cards

worms

standalone pieces of malware that disrupt networks

  • human interaction is not necessary for worms to copy themselves repeatedly

12
New cards

logic bomb

malicious code that doesn’t execute until certain conditions are met

  • code that will delete or encrypt data after a fixed amount of time

13
New cards

trojan horse

malware designed to hide its true intent

  • serve as backdoors to infected computers

14
New cards

backdoor

secret way to bypass traditional access to a device or network

  • not always bad

15
New cards

distributed denial-of-service attack (DDoS)

  • hackers flood a site w/ fake requests making the site’s resources unavailable for legitimate users

  • must employ a large network of internet bots (botnet) to carry out these attacks

16
New cards

botnet

large network of internet robots controlled by a command and control server, often used for DDoS attacks

17
New cards

phishing

using “bait” to trick users into entering sensitive information

18
New cards

spear phishing

targets a specific person or group using pre-existing knowledge

19
New cards

password strength

main way to increase password strength: make it longer

  • combine 4 or more random words into a long word

20
New cards

hashing

process of running data through function that returns a fixed length value

  • one way function: easy to do, hard to undo

  • MD5, SHA-256, bcrypt (good)

21
New cards

salting passwords

random set of characters added to password

  • good for avoiding use of lookup and rainbow tables

22
New cards

multi-factor authentication (two-factor authentication)

combine something the user knows, has, and is

  • knows: password, SSN, knowledge

  • has: phone, physical ID, physical authentication

  • is: fingerprint, face, iris, DNA

23
New cards

encryption

taking text and converting it so it’s illegible

  • decryption does the opposite

24
New cards

cipher

pair of algorithms that give details on how to encrypt/decrypt data

25
New cards

diffie-hellman encryption

first public key encryption protocol - considered key exchange algorithm (swaps private keys needed for other encryption algorithms)

26
New cards

RSA

  • followed diffie-hellman

  • allows for digital signatures

27
New cards

TLS and SSL

  • uses public key by authenticating digital certificate (trusted third party that verifies control of site)

  • transport layer security and secure sockets layer (TLS is newer but referred to as SSL)

28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards