APCSP Unit 8 Vocab - Cybersecurity and Global Impacts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

aaahhhhahaaaa thats hot thats hot

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards
Computing Innovation
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
2
New cards
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them such as name, address, email, or social security number.
3
New cards
Credentials
Information used to verify a user's identity, such as usernames and passwords.
4
New cards
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
5
New cards
Spear Phishing
A targeted phishing attack aimed at a specific individual or organization, often using personalized information.
6
New cards

Keylogging/Keylogger

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
7
New cards
Intercept
To capture data as it is being transmitted over a network without the sender's or receiver's knowledge.
8
New cards
Malware
software intended to damage a computing system or to take partial control over its operation
9
New cards
Trojan Horse
A type of malware that disguises itself as a legitimate program to gain access to a user's system.
10
New cards
Virus
A type of self-replicating malware that attaches itself to clean files and spreads throughout a computer system.
11
New cards
Worm
A standalone malware that replicates itself to spread to other computers, often using network connections.
12
New cards
Spyware
Software that secretly monitors and collects user data, often without their consent.
13
New cards
Ransomware
A type of malware that encrypts a user's data and demands payment for the decryption key.
14
New cards
Access Point
A device that allows wireless devices to connect to a wired network.
15
New cards
Rogue Access Point
a wireless access point that gives unauthorized access to secure networks.
16
New cards
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
17
New cards
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text.
18
New cards
Symmetric Key Encryption
involves one key for both encryption and decryption.
19
New cards
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
20
New cards
Multi-factor Authentication
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
21
New cards
Computer Virus Scanning Software
protects a computing system against infection.
22
New cards

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters.

23
New cards
Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher.

24
New cards
Firewall
A security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
25
New cards
Security Patch
An update to software designed to fix vulnerabilities and improve security.
26
New cards
Data Security
The protection of digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
27
New cards
E-commerce
The buying and selling of goods and services over the Internet.
28
New cards
Breach
An incident where unauthorized access to data occurs, potentially compromising its integrity or confidentiality.
29
New cards
Regulations
Official rules or laws designed to control how organizations handle data, particularly sensitive information like PII.
30
New cards
Cookies
Small pieces of data sent from a server to a user's web browser, used to track user activity and preferences on a website.
31
New cards
Tracking
The process of monitoring user behavior online, often through the use of cookies and other data collection methods.
32
New cards
Geolocation
The identification of the real-world geographic location of an object, often determined through GPS or IP address.
33
New cards
Anonymization
The process of removing personally identifiable information from data sets, making it impossible to identify individuals.
34
New cards
Trilateration
A method used to determine the position of an object by measuring its distance from three or more reference points.
35
New cards
Session Cookies
Cookies that are stored temporarily and deleted once the user closes their web browser.
36
New cards
Persistent Cookies
Cookies that remain on a user's device for a specified period, allowing user preferences to be saved across sessions.
37
New cards
IP Address
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
38
New cards
Virtual Private Network (VPN)
A service that encrypts a user's internet connection to secure their online activities and protect their privacy.