AP CSP: Unit 8 - Cybersecurity and Global Impacts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

Terms from Unit 8 of AP CSP. Keep in mind that these vocabs are based on the course vocabulary list from Code.org.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

2
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

3
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

6
New cards

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

7
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

8
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

9
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption

10
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

11
New cards

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

12
New cards

Computer Virus Scanning Software

protects a computing system against infection