AP CSP Unit 3

0.0(0)
studied byStudied by 1 person
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:00 AM on 1/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

46 Terms

1
New cards

Asymmetric/Public key encryption

A type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption.

2
New cards

Bandwidth

The maximum rate of data transfer across a network path, measured in bits per second.

3
New cards

Caesar Cipher

A substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

4
New cards

Cipher

An algorithm for performing encryption or decryption.

5
New cards

Computing Device

An electronic device that processes data according to a set of instructions (software).

6
New cards

Computing Innovation

The introduction of new technologies or methods that improve computing processes or capabilities.

7
New cards

Computing Network

A group of interconnected computing devices that can communicate and share resources.

8
New cards

Computing System

A combination of hardware and software that performs computing tasks.

9
New cards

Cracking Encryption

The process of deciphering encrypted data without access to the key.

10
New cards

Datastream

A continuous flow of data that is transmitted over a network.

11
New cards

DDoS

an attack that aims to make a service unavailable by overwhelming it with traffic from multiple sources.

12
New cards

Decryption

The process of converting encrypted data back into its original form.

13
New cards

Digital Divide

The gap between individuals who have access to modern information and communication technology and those who do not.

14
New cards

Domain Name

A human-readable address used to access websites, which is translated into an IP address by DNS.

15
New cards

DNS

a system that translates domain names into IP addresses.

16
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

17
New cards

Fault Tolerant

The ability of a system to continue operating properly in the event of a failure of some of its components.

18
New cards

HTTP

the protocol used for transmitting web pages over the Internet.

19
New cards

HTTPS

an extension of HTTP that uses encryption for secure communication over a computer network.

20
New cards

Internet

A global network of interconnected computers that communicate using standardized protocols.

21
New cards

IP

Internet protocol that has a set of rules for addressing and sending packets across the internet

22
New cards

IP Address

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

23
New cards

Keylogging

The act of recording the keystrokes made by a user on a keyboard, often used maliciously to capture sensitive information. A Malware that tracks whats being typed.

24
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system. (Keylogger, Spyware, Adware, Trojan horse, Root Kit, Worm, Virus)

25
New cards

Man in the Middle

A security breach where a third party intercepts and potentially alters the communication between two parties.

26
New cards

Multifactor Authentication

A security process that requires multiple forms of verification to gain access to a resource.

27
New cards

Packet

A formatted unit of data carried by a packet-switched network.

28
New cards

Packet Metadata

Information about a packet that describes its origin, destination, and other attributes, but not the content itself.

29
New cards

Password Attacks/Theft

Attempts to gain unauthorized access to a system by cracking or stealing passwords.

30
New cards

Path

The route that data takes from one point to another in a network.

31
New cards

Phishing Attacks

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communications.

32
New cards

Symmetric/Private key encryption

A type of encryption where the same key is used for both encryption and decryption.

33
New cards

Protocol

A set of rules governing the exchange of data between devices in a network.

34
New cards

Ransomware

A type of malware that encrypts a user's files and demands payment for the decryption key.

35
New cards

Redundancy

The inclusion of extra components or systems to ensure reliability and availability in case of failure.

36
New cards

Rogue Access Point

an unauthorized network access point created to trick users into connecting so attackers can intercept data.

37
New cards

Router

A device that forwards data packets between computer networks, directing traffic on the Internet.

38
New cards

Scalability

The capability of a system to handle a growing amount of work or its potential to accommodate growth.

39
New cards

Social Engineering

The psychological manipulation of people into performing actions or divulging confidential information.

40
New cards

SSL

a protocol that encrypts data sent over the internet to protect it from being intercepted.

41
New cards

TCP

protocol that ensures data transfer reliably and correctly

42
New cards

TLS

modern encryption protocol that secures data transmitted over the internet, replacing SSL.

43
New cards

UDP

a protocol that sends packets quickly without guaranteeing order or delivery, prioritizing speed over reliability.

44
New cards

wifi

A technology that allows electronic devices to connect to a wireless local area network (WLAN).

45
New cards

World Wide Web

system of interlinked documents and resources accessed via the Internet.

46
New cards

Zero Day Exploits

Attacks that occur on the same day a vulnerability is discovered, before a fix is available.