AP CSP Unit 4 Flashcards
Terms : Hide Images [1]
8753688322 | Moore's Law | the observation that computing power roughly doubles every two years. | 0 | |
8753688323 | Big Data | a broad term for datasets so large or complex that traditional data processing applications are inadequate. | 1 | |
8753688324 | One-pager | A business/corporate term for a one-page document that summarizes a large issue, topic or plan. The purpose is to distill and highlight the most important pieces of information in a digestible manner so that the reader can be quickly acquainted with the relevant details of the "big picture." | 2 | |
8753688325 | Caesar Cipher | a technique for encryption that shifts the alphabet by some number of characters | 3 | |
8753688326 | Cipher | the generic term for a technique (or algorithm) that performs encryption | 4 | |
8753688327 | Cracking Encryption | When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. | 5 | |
8753688328 | Decryption | a process that reverses encryption, taking a secret message and reproducing the original plain text | 6 | |
8753688329 | Encryption | a process of encoding messages to keep them secret, so only "authorized" parties can read it. | 7 | |
8753688330 | Random Substitution Cipher | an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. | 8 | |
8753688331 | Vigenère Cipher | a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword. | 9 | |
8753688332 | Computationally Hard | a "hard" problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time. | 10 | |
8753688333 | Symmetric Encryption | a type of encryption where the same key is used to encrypt and decrypt the message. | 11 | |
8753688334 | Asymmetric Encryption | used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. | 12 | |
8753688335 | Modulo | a mathematical operation that returns the remainder after integer division. | 13 | |
8753688336 | Private Key | In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. | 14 | |
8753688337 | Public Key Encryption | Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private. | 15 | |
8753688338 | Phishing Scam | Typically a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. | 16 | |
8753688339 | DDoS (Distributed denial of service) Attack | Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed - doing this can render web services like DNS, or routers, or certain websites useless and unresponsive. | 17 | |
8753688340 | Virus | a program that runs on a computer to do something the owner of the computer does not intend; can be used as a Bot Net to trigger a DDoS-style attack, or they can spy on your computer activity, such as capturing all the keystrokes you make at the computer, or websites you visit, etc. | 18 | |
8753688341 | Antivirus software | usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. | 19 | |
8753688342 | Firewall | software that runs on servers (often routers) that only allows traffic through according to some set of security rules. | 20 | |
8753688343 | SSL (secure sockets layer) and TLS (transport layer security) | use public key cryptography to establish a secure connection. | 21 |