AP Comp. Sci. Cyber Security Vocab

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

cybersecurity

Use of techniques or skills to protect data, networks, and systems from attacks

2
New cards

phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

3
New cards

keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

4
New cards

malware

software intended to damage a computing system or to take partial control over its operation (short for malicious software)

5
New cards

rogue access point

a wireless access point that gives unauthorized access to secure networks

6
New cards

multi factor authentication

requires more than one distinct authentication factor for successful authentication

7
New cards

HTTP: hypertext transfer protocol

the protocol used for transmitting web pages over the Internet. Send “get requests” to worldwide servers for websites and HTML code is sent in response

8
New cards

computer virus scanning software (anti-virus software)

protects a computing system against infection

9
New cards

encryption

 a process of encoding messages to keep them secret, so only "authorized" parties can read it.

10
New cards

decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

11
New cards

cipher

the generic term for a technique (or algorithm) that performs encryption

12
New cards

caesar’s cipher

a technique for encryption that shifts the alphabet by some number of characters

13
New cards

cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher

14
New cards

symmetric encryption

involves one key for both encryption and decryption

15
New cards

asymmetric encryption (public key encryption)

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

16
New cards

certificate authority

is an organization that acts to validate the identities of entities and binds them to cryptographic keys through the issuance of electronic documents known as digital certificates

17
New cards

digital certificate

an electronic document that is tied to a cryptographic key pair and authenticates the identity of a website, individual, organization, user, device or server

18
New cards

SSL (Secure Sockets Layers)

Uses encryption for transfer of data

19
New cards

TSL (Transport Layer Security)

encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see what you transmit. (Improved SSL)

20
New cards

protocol

is a well known set of rules and standards on how to handle the information

21
New cards

linear search

checks each element in the list until a target value is found

22
New cards

binary search

checks the midpoint value in the list and compares the target value to the midpoint value

23
New cards

lossless compression

a process for reducing the number of bits needed to represent something without losing any information. this process is reversible

24
New cards

lossy compression

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible

25
New cards

metadata

data about data