AP Computer Science Principles

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Personally Identifiable Information (PII)

1 / 18

19 Terms

1

Personally Identifiable Information (PII)

Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data.

New cards
2

Data breach

The unauthorized access or retrieval of confidential or otherwise protected data.

New cards
3

Cookies

Packets of data stored on a user's device by a website to track visits and activities, facilitating quicker access and better user experience.

New cards
4

Phishing

The practice of sending fraudulent emails that appear to be from legitimate companies to induce individuals to share sensitive information.

New cards
5

Malware

Software intended to damage a computing system or to take partial control over its operation.

New cards
6

Keylogger

A program that records every keystroke made by a user to gain access to passwords and confidential information.

New cards
7

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.

New cards
8

Private Key Encryption

An encryption method where the sender and receiver share a private key to use in the encryption algorithm.

New cards
9

Symmetric Key Encryption

A process where a single key is used for both the encryption and decryption of data.

New cards
10

Public Key Encryption

A method of paired key encryption where the key to encrypt data is public, while the decryption key is kept secret.

New cards
11

Paired Keys

Two keys that are related so that one encrypts data, which can be decrypted only by the other key.

New cards
12

Asymmetric Encryption

An encryption method that uses a public key and a private key, belonging to one owner.

New cards
13

Certificate Authority

An organization that issues digital certificates verifying the ownership of a public key.

New cards
14

SSL Certificate

A digital document used to verify the authenticity of a server or public key issued by a certificate authority.

New cards
15

Authorization

Permission given to access information.

New cards
16

Authentication

Confirming your identity using knowledge or information only known to you.

New cards
17

Multi-factor Authentication

A method of access control where a user must present multiple pieces of evidence for authentication.

New cards
18

The Digital Divide

The gap between those who have access to computing devices and the internet and those who do not, often based on socioeconomic and demographic factors.

New cards
19

Computing Innovations

Advancements in computing technology that impact how tasks are completed and access to educational and professional opportunities.

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(2)
note Note
studied byStudied by 37 people
... ago
4.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
5.0(1)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
4.0(1)

Explore top flashcards

flashcards Flashcard (30)
studied byStudied by 63 people
... ago
5.0(2)
flashcards Flashcard (54)
studied byStudied by 34 people
... ago
5.0(1)
flashcards Flashcard (73)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 616 people
... ago
4.0(4)
flashcards Flashcard (56)
studied byStudied by 47 people
... ago
5.0(3)
flashcards Flashcard (33)
studied byStudied by 241 people
... ago
4.7(3)
flashcards Flashcard (38)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (242)
studied byStudied by 6 people
... ago
5.0(1)
robot