Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
30-10-2024
Written in
2024/2025

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions Information Security - ANSWER-The techniques and policies used to ensure proper access to data CIA Triad - ANSWER-Confidentiality, Availability, Integrity Confidentiality - ANSWER-Ensuring that data is protected from unauthorized access Availability - ANSWER-The degree to which authorized users can access information for legitimate purposes Integrity - ANSWER-Ensuring that data can be modified only by appropriate mechanisms Risk Analysis - ANSWER-Determining the nature and likelihood of the risks to key data and Goal is to minimize vulnerability to threats that put a system at the most risk Preventing Unauthorized Access - ANSWER-Computers ask for authentication credentials Authentication credentials - ANSWER-Information users provide to identify themselves for computer access Examples of Authentication Credentials - ANSWER-User knowledge, Smart card, Biometrics ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 2/5 User knowledge - ANSWER-Name, password, PIN Smart card - ANSWER-A card with an embedded memory chip used for identification Biometrics - ANSWER-Human characteristics such as fingerprints, retina or voice patterns Guidelines for passwords - ANSWER-Easy to remember, hard to guess • Don't use family or pet names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email • Don't use the same password in lots of places reCAPTCHA - ANSWER-Software that helps digitize books at the same time Fingerprint analysis - ANSWER-a stronger level of verification than username and password iPhone Touch ID Malicious Code - ANSWER-A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm - ANSWER-stands alone, targets network resources Trojan Horse - ANSWER-disguised as benevolent resource Virus - ANSWER-self-replicating Logic Bomb - ANSWER-set up to execute at system event ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 3/5 Antivirus Software - ANSWER-Software installed to detect and remove malicious code Signature detection - ANSWER-recognizes known malware and removes Heuristics - ANSWER-are strategies used to identify general patterns Security Attacks - ANSWER-Password guessing, phishing, Spoofing, back door Phishing - ANSWER-Trick users into revealing security infor

Show more Read less
Institution
AP Computer Science
Module
AP Computer Science

Content preview

©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




AP Computer Science Principles Chapter

17 Study Guide with Complete Solutions


Information Security - ANSWER✔✔-The techniques and policies used to ensure proper access to data


CIA Triad - ANSWER✔✔-Confidentiality, Availability, Integrity


Confidentiality - ANSWER✔✔-Ensuring that data is protected from unauthorized access


Availability - ANSWER✔✔-The degree to which authorized users can access information for legitimate

purposes


Integrity - ANSWER✔✔-Ensuring that data can be modified only by appropriate mechanisms


Risk Analysis - ANSWER✔✔-Determining the nature and likelihood of the risks to key data and Goal is to

minimize vulnerability to threats that put a system at the most risk


Preventing Unauthorized Access - ANSWER✔✔-Computers ask for authentication credentials


Authentication credentials - ANSWER✔✔-Information users provide to identify themselves for computer

access


Examples of Authentication Credentials - ANSWER✔✔-User knowledge, Smart card, Biometrics
Page 1/5

, ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




User knowledge - ANSWER✔✔-Name, password, PIN


Smart card - ANSWER✔✔-A card with an embedded memory chip used for identification


Biometrics - ANSWER✔✔-Human characteristics such as fingerprints, retina or voice patterns


Guidelines for passwords - ANSWER✔✔-Easy to remember, hard to guess • Don't use family or pet

names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special

characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email •

Don't use the same password in lots of places


reCAPTCHA - ANSWER✔✔-Software that helps digitize books at the same time


Fingerprint analysis - ANSWER✔✔-a stronger level of verification than username and password iPhone

Touch ID


Malicious Code - ANSWER✔✔-A computer program that attempts to bypass appropriate authorization

and/or perform unauthorized functions


Worm - ANSWER✔✔-stands alone, targets network resources


Trojan Horse - ANSWER✔✔-disguised as benevolent resource


Virus - ANSWER✔✔-self-replicating


Logic Bomb - ANSWER✔✔-set up to execute at system event

Page 2/5

Written for

Institution
AP Computer Science
Module
AP Computer Science

Document information

Uploaded on
October 30, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
AP Computer Science Bundled Exams Questions and Answers Updated 2024
-
14 2024
$ 158.36 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Emillect West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
31
Member since
1 year
Number of followers
2
Documents
3003
Last sold
1 week ago
GOLDEN ORCHIDS STORE.

On this page, you find all documents, package deals, and flashcards offered by seller Emillect.

3.0

4 reviews

5
1
4
0
3
2
2
0
1
1

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions