AP CSP Unit 8 Vocab CYBERSECURITY

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

2
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

3
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

4
New cards

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

5
New cards

Deepfakes

Sophisticated audio and video manipulation will enable cybercriminals to impersonate individuals and organizations, leading to social engineering attacks and financial fraud.

6
New cards

AI-Driven Phishing

AI will be used to create highly personalized and targeted phishing campaigns, making them harder to detect.

7
New cards

Ransomware

Holds data hostage for payment. attacks will continue to evolve, with attackers leveraging AI to automate and scale their operations, and focusing on data exfiltration and triple extortion tactics.

8
New cards

Shadow AI

Unsanctioned AI models used by employees without proper governance pose a significant risk to data security.

9
New cards

AI-Generated Documents

Criminals may use AI to create synthetic identities and documents to bypass identity verification processes.

10
New cards

Geopolitical Tensions and Cyber Espionage

Escalating geopolitical tensions could lead to cyberattacks targeting critical infrastructure, including energy grids, water supplies, and transportation networks.

11
New cards

Supply Chain Risks

Organizations will need to focus on securing their supply chains, as cyberattacks targeting vendors and suppliers can have a cascading effect on their operations.

12
New cards

Cloud Security

Cloud vulnerabilities and misconfigurations will continue to be a major source of data breaches, requiring organizations to strengthen their cloud security posture.

13
New cards

Talent Shortage

The demand for cybersecurity professionals will continue to outpace the supply, creating a significant talent gap that organizations need to address.

14
New cards

Emerging Technologies

The rise of technologies like quantum computing and 5G will create new cybersecurity challenges and opportunities.

15
New cards

Regulatory Landscape

Governments and regulators are stepping up to address cyber resilience, with regulations like the European Union's NIS2 directive and sector-specific regulations like DORA.

16
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

17
New cards

Encryption

a process of encoding messages to keep them secret, so only 'authorized' parties can read it

18
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message

19
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption

20
New cards

Computer Virus Scanning Software

protects a computing system against infection

21
New cards

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

22
New cards

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).