1/48
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computing Innovation
A technology that includes a program as an integral part of its function (can be physical, software, or a computing concept like e-commerce).
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates to, or describes them.
Privacy
The ability to control what personal information is collected, used, shared, and stored about you.
Security
Protection against threats that could steal, damage, or misuse data and computing systems.
Tradeoff (Privacy vs Security)
A situation where improving security may require collecting/using more data, which can reduce privacy.
Data Collection
Gathering information about users (ex: location, clicks, searches, browsing history) to provide or improve a service.
Cookies
Small pieces of data stored by websites that can remember users and track activity.
Geolocation
Data that reveals a user's physical location.
Browsing History
A record of websites/pages a user has visited, which can be used to build a profile.
Targeted Advertising
Ads customized to a user based on collected data and inferred interests.
Digital Data Control Problem
Once data is digital (especially shared online), it becomes much harder to control or delete.
Identity Theft
When someone uses stolen personal information to pretend to be you (often for financial gain).
Phishing
A technique that tricks a user into giving personal information (like passwords or bank details).
Phishing Warning Signs
Suspicious links, urgent threats, weird sender addresses, grammar mistakes, or requests for private info.
Keylogging
Using a program to record every keystroke to steal passwords or other confidential information.
Keylogger Impact
It can capture logins, messages, and private info even if you don't "send" it.
Malware
Software intended to damage a system or take partial control of how it operates.
Malware Examples
Viruses, spyware, ransomware, trojans.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks (can be malicious or accidental).
Public Service Announcement (PSA)
A short message designed to warn or educate people about a risk (like phishing or malware).
Data Breach
When private data is accessed or stolen without authorization.
Encryption
Encoding a message to keep it secret so only authorized parties can read it.
Decryption
Reversing encryption to convert ciphertext back into readable plain text.
Cipher
A technique/algorithm used to perform encryption.
Caesar Cipher
A cipher that shifts the alphabet by a fixed number of characters.
Cracking Encryption
Decoding a message without knowing all details of the cipher/key.
Frequency Analysis
Using letter/character frequency patterns to help break substitution ciphers.
Symmetric Key Encryption
One key is used for both encryption and decryption.
Asymmetric Encryption (Public Key Encryption)
A public key encrypts, but a different private key decrypts.
Public Key
A key that can be shared; used to encrypt messages in public key encryption.
Private Key
A secret key kept by the receiver; required to decrypt messages in public key encryption.
AES (Advanced Encryption Standard)
A widely used symmetric encryption standard (common for governments and businesses).
RSA
A public-key encryption method based on math with large prime numbers (uses public/private keys).
Password
A secret string used to prove identity to access an account/system.
Good Password Strategy
Easy for you to remember but hard for others to guess based on what they know about you.
Single-Factor Authentication
Login using only one factor (example: password = something you know).
Two-Factor Authentication (2FA)
Login using two factors (example: password + phone code).
Multi-Factor Authentication (MFA)
Using at least two categories: something you know, something you have, something you are.
Knowledge Factor
Authentication based on something you know (password, PIN).
Possession Factor
Authentication based on something you have (phone, security key).
Inherence Factor
Authentication based on something you are (fingerprint, face ID).
Why MFA Is Stronger
An attacker needs multiple forms of proof, not just one stolen password.
Computer Virus
A type of malware that can spread and harm systems or data.
Virus Scanning Software
Software that helps protect a system from infection by detecting/removing malware.
Software Updates
A security habit that patches vulnerabilities so attackers can't exploit old flaws.
Security Is a Moving Target
New threats appear constantly, so protection requires updated software and good authentication.
Unintended Consequences
Effects of a computing innovation that weren't predicted (can be positive or negative).
Benefits vs Harms Analysis
Evaluating who gains advantages and who might be hurt by a technology or data policy.
Security Risk
Anything that could lead to unauthorized access, damage, or misuse of systems and data.