zuai-logo
zuai-logo
  1. AP Computer Science Principles
FlashcardFlashcardStudy GuideStudy Guide
Question BankQuestion Bank

Safe Computing

David Foster

David Foster

7 min read

Listen to this study note

Study Guide Overview

This AP Computer Science Principles study guide covers digital information (PII, data collection, risks, safe practices), internet safety (authentication, encryption, malware, phishing, safe computing habits), and exam preparation. Key terms include strong passwords, multifactor authentication (MFA), symmetric/public key encryption, and digital certificates. The guide includes practice questions and emphasizes data privacy and security, authentication, encryption, malware, and phishing as high-priority exam topics.

#AP Computer Science Principles: Ultimate Study Guide 🚀

Hey there! Let's get you prepped and confident for your AP CSP exam. This guide is designed to be your go-to resource, especially the night before the test. We'll break down the key concepts, connect the dots, and make sure you're ready to rock!

#1. Digital Information 💾

#1.1 Information Collection & Privacy

  • Personal Data: Computers store your personal data. Location, cookies, and browsing history can identify you.

  • Tracking: Search engines track history for suggestions and targeted marketing. Devices record IP addresses and locations.

  • Personally Identifiable Information (PII): This includes age, race, phone numbers, medical/biometric data, financial info, and SSN.

Key Concept

Protecting PII is crucial. Be aware of what information is collected and how it's used.

  • Benefits of Data Collection:

    • Enhances user experience (e.g., social media connections, faster product searches).
    • Powers personalized features (e.g., TikTok's For You page).
  • Harms of Data Collection:

    • Exploitation for stalking or identity theft.
    • Data breaches put users at risk.
  • Think Before You Post: Information online can be used in unintended ways. Screenshots and forwarding make deletion difficult.

Exam Tip

Be cautious about what you share online. Once it's out there, it can be hard to remove. Always think before you post!

  • Example: A picture of your view can reveal where you live.

#1.2 Other Dangers of Computing

  • Viruses and Worms:

    • Viruses attach to files and need activation. Worms operate independently.
    • Example: ILOVEYOU virus (2000) and WannaCry worm (2017) caused billions in damages.
  • Malware: Malicious software designed to damage or control systems. Includes ransomware and adware.

  • Phishing: Tricking users into giving personal info by posing as a trusted entity.

  • Keylogging: Recording keystrokes to steal sensitive information like passwords.

  • Rogue Access Points: Unauthorized access points that can intercept data on public networks.

Common Mistake

Never click on links or download from untrusted sources. Be wary of strange messages, even from friends.

-...

Feedback stars icon

How are we doing?

Give us your feedback and let us know how we can improve

Previous Topic - Legal and Ethical Concerns

Question 1 of 12

What piece of information is NOT considered Personally Identifiable Information (PII)? 🤔

Your phone number

Your browsing history

Your favorite book

Your social security number