zuai-logo
zuai-logo
  1. AP Computer Science Principles
FlashcardFlashcardStudy GuideStudy GuideQuestion BankQuestion BankGlossaryGlossary

Glossary

A

Authentication

Criticality: 3

The process of verifying the identity of a user or system to ensure they are who they claim to be.

Example:

When you log into your email, entering your password is part of the authentication process.

B

Benefits of Data Collection

Criticality: 2

Advantages gained from gathering and analyzing user information, such as improved user experience or personalized services.

Example:

A streaming service uses data collection to recommend movies you might enjoy, enhancing your viewing experience.

C

Caesar Cipher

Criticality: 1

A simple substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

Example:

If you use a Caesar Cipher with a shift of 3, 'HELLO' becomes 'KHOOR'.

Certificate Authorities (CAs)

Criticality: 2

Trusted third-party organizations that issue and manage digital certificates, verifying the identity of entities online.

Example:

When you visit a secure website, a Certificate Authority (CA) like Let's Encrypt has issued its digital certificate, confirming its legitimacy.

D

Data Backups

Criticality: 2

Copies of data stored in a separate location to protect against data loss due to hardware failure, cyberattacks, or accidental deletion.

Example:

Saving all your important school projects to a cloud service or external hard drive is a form of data backup.

Decryption

Criticality: 3

The process of converting encrypted, coded information back into its original, readable form using a specific key.

Example:

After receiving an encrypted message, your device performs decryption to reveal the original text.

Device Security

Criticality: 2

Measures taken to protect physical computing devices and the data they contain from unauthorized access, theft, or damage.

Example:

Using a strong passcode and enabling remote wipe features on your smartphone are aspects of good device security.

Digital Certificates

Criticality: 3

Electronic documents used to verify the ownership of a public key and confirm the identity of a website or individual.

Example:

The padlock icon in your browser indicates that a website has a valid digital certificate, confirming its identity.

E

Encryption

Criticality: 3

The process of transforming information into a secure code to prevent unauthorized access, making it unreadable without the correct key.

Example:

When you send a secure message online, encryption scrambles the text so only the intended recipient can read it.

F

Firewalls

Criticality: 2

Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

Example:

A firewall acts like a guard at your computer's gate, blocking suspicious connections from entering or leaving.

French Great Cipher

Criticality: 1

A complex historical cipher system used by the French, known for its sophisticated substitution and permutation techniques.

Example:

The French Great Cipher was so intricate that it took centuries for parts of it to be fully deciphered.

H

Harms of Data Collection

Criticality: 2

Risks associated with gathering and storing user information, including privacy breaches, identity theft, or exploitation.

Example:

A company experiencing a data breach is a significant harm of data collection, as customer information could be exposed.

I

Inheritance (Verification Category)

Criticality: 2

A category of authentication factor based on something the user is, typically biometric data like fingerprints, facial scans, or voice recognition.

Example:

Unlocking your phone with your fingerprint uses inheritance as a verification method.

Internet Connection Security

Criticality: 2

Practices and technologies used to protect data transmitted over the internet, especially on public or unsecured networks.

Example:

Being cautious about using free public Wi-Fi and using a VPN are examples of good internet connection security.

K

Keylogging

Criticality: 2

The covert recording of keystrokes made on a keyboard, typically to steal passwords or other sensitive information.

Example:

A hacker might install keylogging software on a public computer to capture usernames and passwords typed by unsuspecting users.

Knowledge (Verification Category)

Criticality: 2

A category of authentication factor based on something the user knows, such as a password, PIN, or security question answer.

Example:

Your secret answer to a security question like 'What was your first pet's name?' is a form of knowledge verification.

M

Malware

Criticality: 3

A broad term for any software designed to disrupt, damage, or gain unauthorized access to a computer system.

Example:

Ransomware, which locks your files until you pay a fee, is a type of malware.

Multifactor Authentication (MFA)

Criticality: 3

A security system that requires a user to provide two or more verification factors from different categories to gain access.

Example:

Logging into an account that requires both your password and a code sent to your phone uses multifactor authentication (MFA).

P

Permissions

Criticality: 2

Controls that determine what actions a user or application is allowed to perform on a system or with specific data.

Example:

When an app asks for permissions to access your camera or location, it's requesting authorization to use those features.

Personal Data

Criticality: 3

Information about an individual, often collected online, that can reveal aspects of their identity or behavior.

Example:

When you use a fitness app, it collects your daily steps and heart rate as personal data.

Personally Identifiable Information (PII)

Criticality: 3

Any data that can be used to identify a specific individual, either directly or indirectly.

Example:

Your full name, date of birth, and home address are all examples of personally identifiable information (PII).

Phishing

Criticality: 3

A deceptive attempt to trick individuals into revealing sensitive information by impersonating a trustworthy entity, often via email.

Example:

Receiving an email that looks like it's from your bank asking for your login details is a classic example of phishing.

Possession (Verification Category)

Criticality: 2

A category of authentication factor based on something the user has, such as a physical token, smartphone, or smart card.

Example:

Receiving a one-time login code via text message on your phone is an example of possession as a verification factor.

Public Key Encryption

Criticality: 3

An encryption method that uses a pair of keys: a public key for encryption and a private key for decryption.

Example:

When you send a secure message to a website, you use its public key encryption to scramble the message, and only the website's private key can unscramble it.

R

Rogue Access Points

Criticality: 2

An unauthorized wireless access point installed on a network, often by an attacker, to intercept network traffic.

Example:

Connecting to a free Wi-Fi hotspot named 'Free_Public_WiFi' in a coffee shop might actually be a rogue access point set up to steal your data.

S

Software Updates

Criticality: 2

Patches or new versions released by software developers to fix bugs, improve performance, and address security vulnerabilities.

Example:

Regularly installing software updates on your phone helps protect it from newly discovered security flaws.

Strong Passwords

Criticality: 3

Passwords that are difficult to guess or crack, typically long and composed of a mix of uppercase and lowercase letters, numbers, and symbols.

Example:

'MyDogSparky!2025' is a much stronger password than 'sparky123'.

Symmetric Key Encryption

Criticality: 3

An encryption method where the same secret key is used for both encrypting and decrypting the data.

Example:

Imagine two friends using a shared secret codebook; this is similar to how symmetric key encryption works.

T

Tracking

Criticality: 3

The process of monitoring an individual's online activities, location, or behavior, often for targeted advertising or analytics.

Example:

Websites use cookies to enable tracking of your browsing history, allowing them to suggest products you might like.

Trust Model

Criticality: 2

A framework or system that establishes how trust is managed and verified within a network or security infrastructure, often involving digital certificates.

Example:

Your web browser uses a trust model to decide if a website's digital certificate is valid and safe to connect to.

V

Virus and Malware Scanning Software

Criticality: 2

Programs designed to detect, prevent, and remove malicious software from a computer system.

Example:

Running virus and malware scanning software like Windows Defender helps keep your computer free from harmful programs.

Viruses

Criticality: 3

Malicious software that attaches itself to legitimate programs and requires user action to spread and activate.

Example:

An email attachment containing a virus might infect your computer only after you click to open it.

W

Worms

Criticality: 3

Self-replicating malicious software that can spread independently across networks without requiring user interaction.

Example:

A worm could spread rapidly through a company's network, infecting multiple computers without anyone clicking a link.