AP CSP: Unit 8 - Cybersecurity and Global Impacts

studied byStudied by 0 people
0.0(0)
get a hint
hint

Computing Innovation

1 / 11

Tags and Description

Terms from Unit 8 of AP CSP. Keep in mind that these vocabs are based on the course vocabulary list from Code.org.

12 Terms

1

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation

New cards
6

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

New cards
9

Symmetric Key Encryption

involves one key for both encryption and decryption

New cards
10

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

New cards
11

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

New cards
12

Computer Virus Scanning Software

protects a computing system against infection

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 73 people
Updated ... ago
4.0 Stars(2)
note Note
studied byStudied by 47 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard51 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard90 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard20 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard223 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)