AP CSP Big Idea 5: IOC Key Terms

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

strong password

1 / 21

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

22 Terms

1

strong password

a password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user

New cards
2

encryption

the process of encoding data to prevent unauthorized access

New cards
3

decryption

the process of the process of decoding the data

New cards
4

algorithmic bias

bias embedded into algorithms and any level of software development

New cards
5

Creative Commons

a public copyright license that enables the free distribution of an otherwise copyrighted work

New cards
6

open source

programs that are made freely available and may be redistributed and modified

New cards
7

open access

online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

New cards
8

citizen science

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

New cards
9

crowdsourcing

the practice of obtaining input or information from a large number of people via the Internet

New cards
10

personally identifiable information (PII)

information about an individual that identifies, links, relates, or describes them

New cards
11

digital divide

the differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

New cards
12

Asymmetric Key Encryption

encryption that pairs a public key for encryption and a private key for decryption

New cards
13

multifactor authentication

a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are)

New cards
14

malware

software intended to damage a computing system or take partial control over its operation

New cards
15

computer virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way

New cards
16

phishing

a technique that attempts to trick a user into providing personal information

New cards
17

keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

New cards
18

rogue access point

a wireless access point that gives unauthorized access to secure networks

New cards
19

cookie

A small amount of text that tracks information about a user visiting a website.

New cards
20

certificate authority

issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.

New cards
21

freeware

Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

New cards
22

Symmetric Key Encryption

involves one key for both encryption and decryption.

New cards

Explore top notes

note Note
studied byStudied by 34 people
... ago
5.0(1)
note Note
studied byStudied by 277 people
... ago
4.0(1)
note Note
studied byStudied by 14 people
... ago
4.5(2)
note Note
studied byStudied by 19 people
... ago
4.5(2)
note Note
studied byStudied by 55 people
... ago
4.5(4)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 117 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (25)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (534)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (88)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (101)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 66 people
... ago
5.0(3)
robot