AP Comp Sci Principles - Computer Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

50 Terms

1
New cards

information security

the techniques and policies used to ensure proper access to data

2
New cards

confidentiality

ensuring that data is protected from unauthorized access

3
New cards

integrity

ensuring that data can be modified by the appropriate mechanisms

4
New cards

availability

the degree at which authorized users can access information for legitimate purposes

5
New cards

risk analysis

determining the nature and likelihood of the risks to key data, goal is to minimize vulnerability to threats that put a system at the most risk

6
New cards

authentication credentials

information users provide to identify themselves for computer access

7
New cards

user authentication

the process of verifying the credentials of a particular user of a computer or software system

8
New cards

user knowledge, smart card, biometrics

types of authentication

9
New cards

user knowledge

name, password, PIN

10
New cards

smart card

a card with an embedded memory chip used for identification

11
New cards

biometrics

human characteristics such as fingerprints, retina, face, or voice patterns

12
New cards

password criteria

a set of rules that must be followed when creating a password

13
New cards

six

a password must contain _____ or more characters

14
New cards

uppercase, lowercase

a password must contain one _____ letter and one _____ letter

15
New cards

digit, special character

a password must contain one _____ and one _____

16
New cards

password management software

a program that helps a user manage passwords in a secure manner

17
New cards

CAPTCHA

software that verifies that the user is a human not a computer by asking the user to identify characters or pictures that are difficult for a program to recognize

18
New cards

reCAPTCHA

software that helps digitize books

19
New cards

malicious code (malware)

a computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions

20
New cards

virus

a malicious, self replicating program that embeds itself in another program, when the host is executed the ___ runs as well, causes problems by corrupting or deleting files

21
New cards

virus host

the infected file is referred to as the _____

22
New cards

worm

malicious, stand alone code that often targets network resources, self replicating but does not require a host, causes problems on the network by sending copies of itself to other programs, usually consuming bandwidth

23
New cards

trojan horse

malicious program disguised as a benevolent resource, will appear to be helpful but actually causes problems when executed, difficult to track down, appears to be beneficial

24
New cards

logic bomb

malicious program that is set up to execute when a specific system event occurs, ex: on a certain date or when a certain program is run

25
New cards

virus, worm, trojan horse, logic bomb

types of malicious code/malware

26
New cards

security attacks

attempts to gain inappropriate access or exploit development flaws

27
New cards

password guessing

attempt to gain access to a computer system by methodically trying to determine a users password, impractical for humans to try but computer programs can try thousands quickly

28
New cards

phishing

using a web page to masquerade as part of a trusted system to trick users into revealing security information, usually you receive an email that claims to be from a company and might ask you to log in to your account to fix an issue

29
New cards

spoofing

an attack on a computer system in which a malicious user masquerades as an authorized user

30
New cards

back door

a program feature that gives special and unauthorized access to a software system to anyone who knows it exists, it can be put there deliberately or exist unintentionally

31
New cards

buffer overflow

a defect in a computer program that could cause a system to crash and leave the user with heightened privileges, an area of memory of a particular size, crashes when user tries to put more information than it can store

32
New cards

denial of service

an attack on a network a network resource that prevents authorized users from accessing the system, caused my flooding a website or network with communication packets that keep it so busy it cannot deal with authorized users, may even cause the system to crash

33
New cards

man in the middle

a security attack in which network communication is intercepted in an attempt to obtain key data

34
New cards

password guessing, phishing, spoofing, back door, buffer overflow, denial of service, man in the middle

types of security attacks

35
New cards

anti-virus software

software designed to detect, remove, or prevent malicious code and software being on a computer system

36
New cards

signature detection

looks for recognizable patterns of particular malware within executable code

37
New cards

heuristics

looks for more general patterns than the strict signature detection approach, so that it hopefully can detect an entire family of similar malware

38
New cards

cryptography

the field of study related to encoded information

39
New cards

encryption

the process of converting plaintext to cipher text

40
New cards

decryption

the process of converting cipher text to plaintext

41
New cards

cipher

an algorithm used to encrypt or decrypt text

42
New cards

key

the set of parameters that guide a cipher

43
New cards

substitution cipher

a cipher that substitutes one character for another

44
New cards

caesar cipher

a substitution cipher that shifts characters a certain number of positions in the alphabet

45
New cards

transposition ciphers

a cipher that rearranges the order of existing characters in a message in a certain way

46
New cards

cryptanalysis

the process of decrypting a message without knowing the cipher or key used to encrypt it

47
New cards

substitution and transposition

______________ ciphers are easy to break

48
New cards

public-key cryptography

an approach in which each user has two related keys, one public and one private, one's public key is distributed freely, a person encrypts an outgoing message using the receiver's public key, only the receiver's private key can decrypt the message

49
New cards

digital signature

data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity of the message

50
New cards

digital certificate

a representation of a sender's authenticated public key used to minimize malicious forgeries