AP Computer Science Principles Unit 8

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:02 PM on 1/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

49 Terms

1
New cards

Computing Innovation

A technology that includes a program as an integral part of its function (can be physical, software, or a computing concept like e-commerce).

2
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates to, or describes them.

3
New cards

Privacy

The ability to control what personal information is collected, used, shared, and stored about you.

4
New cards

Security

Protection against threats that could steal, damage, or misuse data and computing systems.

5
New cards

Tradeoff (Privacy vs Security)

A situation where improving security may require collecting/using more data, which can reduce privacy.

6
New cards

Data Collection

Gathering information about users (ex: location, clicks, searches, browsing history) to provide or improve a service.

7
New cards

Cookies

Small pieces of data stored by websites that can remember users and track activity.

8
New cards

Geolocation

Data that reveals a user's physical location.

9
New cards

Browsing History

A record of websites/pages a user has visited, which can be used to build a profile.

10
New cards

Targeted Advertising

Ads customized to a user based on collected data and inferred interests.

11
New cards

Digital Data Control Problem

Once data is digital (especially shared online), it becomes much harder to control or delete.

12
New cards

Identity Theft

When someone uses stolen personal information to pretend to be you (often for financial gain).

13
New cards

Phishing

A technique that tricks a user into giving personal information (like passwords or bank details).

14
New cards

Phishing Warning Signs

Suspicious links, urgent threats, weird sender addresses, grammar mistakes, or requests for private info.

15
New cards

Keylogging

Using a program to record every keystroke to steal passwords or other confidential information.

16
New cards

Keylogger Impact

It can capture logins, messages, and private info even if you don't "send" it.

17
New cards

Malware

Software intended to damage a system or take partial control of how it operates.

18
New cards

Malware Examples

Viruses, spyware, ransomware, trojans.

19
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks (can be malicious or accidental).

20
New cards

Public Service Announcement (PSA)

A short message designed to warn or educate people about a risk (like phishing or malware).

21
New cards

Data Breach

When private data is accessed or stolen without authorization.

22
New cards

Encryption

Encoding a message to keep it secret so only authorized parties can read it.

23
New cards

Decryption

Reversing encryption to convert ciphertext back into readable plain text.

24
New cards

Cipher

A technique/algorithm used to perform encryption.

25
New cards

Caesar Cipher

A cipher that shifts the alphabet by a fixed number of characters.

26
New cards

Cracking Encryption

Decoding a message without knowing all details of the cipher/key.

27
New cards

Frequency Analysis

Using letter/character frequency patterns to help break substitution ciphers.

28
New cards

Symmetric Key Encryption

One key is used for both encryption and decryption.

29
New cards

Asymmetric Encryption (Public Key Encryption)

A public key encrypts, but a different private key decrypts.

30
New cards

Public Key

A key that can be shared; used to encrypt messages in public key encryption.

31
New cards

Private Key

A secret key kept by the receiver; required to decrypt messages in public key encryption.

32
New cards

AES (Advanced Encryption Standard)

A widely used symmetric encryption standard (common for governments and businesses).

33
New cards

RSA

A public-key encryption method based on math with large prime numbers (uses public/private keys).

34
New cards

Password

A secret string used to prove identity to access an account/system.

35
New cards

Good Password Strategy

Easy for you to remember but hard for others to guess based on what they know about you.

36
New cards

Single-Factor Authentication

Login using only one factor (example: password = something you know).

37
New cards

Two-Factor Authentication (2FA)

Login using two factors (example: password + phone code).

38
New cards

Multi-Factor Authentication (MFA)

Using at least two categories: something you know, something you have, something you are.

39
New cards

Knowledge Factor

Authentication based on something you know (password, PIN).

40
New cards

Possession Factor

Authentication based on something you have (phone, security key).

41
New cards

Inherence Factor

Authentication based on something you are (fingerprint, face ID).

42
New cards

Why MFA Is Stronger

An attacker needs multiple forms of proof, not just one stolen password.

43
New cards

Computer Virus

A type of malware that can spread and harm systems or data.

44
New cards

Virus Scanning Software

Software that helps protect a system from infection by detecting/removing malware.

45
New cards

Software Updates

A security habit that patches vulnerabilities so attackers can't exploit old flaws.

46
New cards

Security Is a Moving Target

New threats appear constantly, so protection requires updated software and good authentication.

47
New cards

Unintended Consequences

Effects of a computing innovation that weren't predicted (can be positive or negative).

48
New cards

Benefits vs Harms Analysis

Evaluating who gains advantages and who might be hurt by a technology or data policy.

49
New cards

Security Risk

Anything that could lead to unauthorized access, damage, or misuse of systems and data.