apcsp

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Computing information

is any data a computer uses, like text, numbers, or images. It helps with tasks like storing files, sending messages, or making decisions. Example: A phone saving contacts.

2
New cards

PII

personal identificable data, is the data that identifies a person, like a name, address, or social security

3
New cards

Phishing

is a scam where someone tricks you into giving personal information, like passwords or credit card numbers, usually through fake email or websites. Example: A fake bank email asking you to log in

4
New cards

keylogging

is when a program secretly records everything you type, like passwords or messages. Example: A hacker using a keylogger to steal your login info.

5
New cards

Malware

is harmful software that damages or steals data from computers. Example: A virus that deletes files or a spyware that tracks your activity.

6
New cards

Rogue Acess Point

Is an unauthorized WI-Fi hotspot that can steala data or allow hackers into network. Example: a fake public Wi-Fi that captures PAsswords.

7
New cards

Encryption

is the process of converting data into a secret code to prevent unauthorized access.

8
New cards

Decryption

is the process of converting encrypted data into its original form os it can be read.

9
New cards

Symmetric Key Encryption

Uses the same key for both encrypting and decrypting data.

10
New cards

Public key encryption

uses two keys: a public key to encrypt data and a private key to decrypt it