AP CSP: Unit 8 - Cybersecurity and Global Impacts

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

flashcard set

Earn XP

Description and Tags

Terms from Unit 8 of AP CSP. Keep in mind that these vocabs are based on the course vocabulary list from Code.org.

12 Terms

1

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation

New cards
6

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

New cards
9

Symmetric Key Encryption

involves one key for both encryption and decryption

New cards
10

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

New cards
11

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

New cards
12

Computer Virus Scanning Software

protects a computing system against infection

New cards
robot