AP CSP: Unit 8 - Cybersecurity and Global Impacts

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Computing Innovation

1 / 11

flashcard set

Earn XP

Description and Tags

Terms from Unit 8 of AP CSP. Keep in mind that these vocabs are based on the course vocabulary list from Code.org.

12 Terms

1

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation

New cards
6

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

New cards
9

Symmetric Key Encryption

involves one key for both encryption and decryption

New cards
10

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiverā€™s private key to encrypt a message, but the receiverā€™s private key is required to decrypt the message

New cards
11

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

New cards
12

Computer Virus Scanning Software

protects a computing system against infection

New cards

Explore top notes

note Note
studied byStudied by 2525 people
... ago
5.0(3)
note Note
studied byStudied by 36 people
... ago
5.0(5)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 91 people
... ago
5.0(2)
note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 37 people
... ago
5.0(2)
note Note
studied byStudied by 37 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (76)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 14 people
... ago
5.0(2)
flashcards Flashcard (57)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (277)
studied byStudied by 55 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 50 people
... ago
5.0(1)
robot