AP CSP: Unit 8 - Cybersecurity and Global Impacts

0.0(0)
Studied by 14 people
0%Big Idea 5 Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

Terms from Unit 8 of AP CSP. Keep in mind that these vocabs are based on the course vocabulary list from Code.org.

Last updated 4:06 PM on 5/15/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

2
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

3
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

6
New cards

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

7
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

8
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

9
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption

10
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

11
New cards

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

12
New cards

Computer Virus Scanning Software

protects a computing system against infection

Explore top notes

Explore top flashcards

flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)
flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)