Safe Computing

David Foster
7 min read
Listen to this study note
Study Guide Overview
This AP Computer Science Principles study guide covers digital information (PII, data collection, risks, safe practices), internet safety (authentication, encryption, malware, phishing, safe computing habits), and exam preparation. Key terms include strong passwords, multifactor authentication (MFA), symmetric/public key encryption, and digital certificates. The guide includes practice questions and emphasizes data privacy and security, authentication, encryption, malware, and phishing as high-priority exam topics.
#AP Computer Science Principles: Ultimate Study Guide 🚀
Hey there! Let's get you prepped and confident for your AP CSP exam. This guide is designed to be your go-to resource, especially the night before the test. We'll break down the key concepts, connect the dots, and make sure you're ready to rock!
#1. Digital Information 💾
#1.1 Information Collection & Privacy
-
Personal Data: Computers store your personal data. Location, cookies, and browsing history can identify you.
-
Tracking: Search engines track history for suggestions and targeted marketing. Devices record IP addresses and locations.
-
Personally Identifiable Information (PII): This includes age, race, phone numbers, medical/biometric data, financial info, and SSN.
Protecting PII is crucial. Be aware of what information is collected and how it's used.
-
Benefits of Data Collection:
- Enhances user experience (e.g., social media connections, faster product searches).
- Powers personalized features (e.g., TikTok's For You page).
-
Harms of Data Collection:
- Exploitation for stalking or identity theft.
- Data breaches put users at risk.
-
Think Before You Post: Information online can be used in unintended ways. Screenshots and forwarding make deletion difficult.
Be cautious about what you share online. Once it's out there, it can be hard to remove. Always think before you post!
- Example: A picture of your view can reveal where you live.
#1.2 Other Dangers of Computing
-
Viruses and Worms:
- Viruses attach to files and need activation. Worms operate independently.
- Example: ILOVEYOU virus (2000) and WannaCry worm (2017) caused billions in damages.
-
Malware: Malicious software designed to damage or control systems. Includes ransomware and adware.
-
Phishing: Tricking users into giving personal info by posing as a trusted entity.
-
Keylogging: Recording keystrokes to steal sensitive information like passwords.
-
Rogue Access Points: Unauthorized access points that can intercept data on public networks.
Never click on links or download from untrusted sources. Be wary of strange messages, even from friends.
-...

How are we doing?
Give us your feedback and let us know how we can improve