8753688322 | Moore's Law | the observation that computing power roughly doubles every two years. | 0 | |
8753688323 | Big Data | a broad term for datasets so large or complex that traditional data processing applications are inadequate. | 1 | |
8753688324 | One-pager | A business/corporate term for a one-page document that summarizes a large issue, topic or plan. The purpose is to distill and highlight the most important pieces of information in a digestible manner so that the reader can be quickly acquainted with the relevant details of the "big picture." | 2 | |
8753688325 | Caesar Cipher | a technique for encryption that shifts the alphabet by some number of characters | 3 | |
8753688326 | Cipher | the generic term for a technique (or algorithm) that performs encryption | 4 | |
8753688327 | Cracking Encryption | When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. | 5 | |
8753688328 | Decryption | a process that reverses encryption, taking a secret message and reproducing the original plain text | 6 | |
8753688329 | Encryption | a process of encoding messages to keep them secret, so only "authorized" parties can read it. | 7 | |
8753688330 | Random Substitution Cipher | an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. | 8 | |
8753688331 | Vigenère Cipher | a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword. | 9 | |
8753688332 | Computationally Hard | a "hard" problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time. | 10 | |
8753688333 | Symmetric Encryption | a type of encryption where the same key is used to encrypt and decrypt the message. | 11 | |
8753688334 | Asymmetric Encryption | used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. | 12 | |
8753688335 | Modulo | a mathematical operation that returns the remainder after integer division. | 13 | |
8753688336 | Private Key | In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. | 14 | |
8753688337 | Public Key Encryption | Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private. | 15 | |
8753688338 | Phishing Scam | Typically a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. | 16 | |
8753688339 | DDoS (Distributed denial of service) Attack | Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed - doing this can render web services like DNS, or routers, or certain websites useless and unresponsive. | 17 | |
8753688340 | Virus | a program that runs on a computer to do something the owner of the computer does not intend; can be used as a Bot Net to trigger a DDoS-style attack, or they can spy on your computer activity, such as capturing all the keystrokes you make at the computer, or websites you visit, etc. | 18 | |
8753688341 | Antivirus software | usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. | 19 | |
8753688342 | Firewall | software that runs on servers (often routers) that only allows traffic through according to some set of security rules. | 20 | |
8753688343 | SSL (secure sockets layer) and TLS (transport layer security) | use public key cryptography to establish a secure connection. | 21 |
AP CSP Unit 4 Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!