100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
30-10-2024
Written in
2024/2025

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions Information Security - ANSWER-The techniques and policies used to ensure proper access to data CIA Triad - ANSWER-Confidentiality, Availability, Integrity Confidentiality - ANSWER-Ensuring that data is protected from unauthorized access Availability - ANSWER-The degree to which authorized users can access information for legitimate purposes Integrity - ANSWER-Ensuring that data can be modified only by appropriate mechanisms Risk Analysis - ANSWER-Determining the nature and likelihood of the risks to key data and Goal is to minimize vulnerability to threats that put a system at the most risk Preventing Unauthorized Access - ANSWER-Computers ask for authentication credentials Authentication credentials - ANSWER-Information users provide to identify themselves for computer access Examples of Authentication Credentials - ANSWER-User knowledge, Smart card, Biometrics ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 2/5 User knowledge - ANSWER-Name, password, PIN Smart card - ANSWER-A card with an embedded memory chip used for identification Biometrics - ANSWER-Human characteristics such as fingerprints, retina or voice patterns Guidelines for passwords - ANSWER-Easy to remember, hard to guess • Don't use family or pet names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email • Don't use the same password in lots of places reCAPTCHA - ANSWER-Software that helps digitize books at the same time Fingerprint analysis - ANSWER-a stronger level of verification than username and password iPhone Touch ID Malicious Code - ANSWER-A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm - ANSWER-stands alone, targets network resources Trojan Horse - ANSWER-disguised as benevolent resource Virus - ANSWER-self-replicating Logic Bomb - ANSWER-set up to execute at system event ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 3/5 Antivirus Software - ANSWER-Software installed to detect and remove malicious code Signature detection - ANSWER-recognizes known malware and removes Heuristics - ANSWER-are strategies used to identify general patterns Security Attacks - ANSWER-Password guessing, phishing, Spoofing, back door Phishing - ANSWER-Trick users into revealing security infor

Show more Read less
Institution
AP Computer Science
Course
AP Computer Science









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
AP Computer Science
Course
AP Computer Science

Document information

Uploaded on
October 30, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




AP Computer Science Principles Chapter

17 Study Guide with Complete Solutions


Information Security - ANSWER✔✔-The techniques and policies used to ensure proper access to data


CIA Triad - ANSWER✔✔-Confidentiality, Availability, Integrity


Confidentiality - ANSWER✔✔-Ensuring that data is protected from unauthorized access


Availability - ANSWER✔✔-The degree to which authorized users can access information for legitimate

purposes


Integrity - ANSWER✔✔-Ensuring that data can be modified only by appropriate mechanisms


Risk Analysis - ANSWER✔✔-Determining the nature and likelihood of the risks to key data and Goal is to

minimize vulnerability to threats that put a system at the most risk


Preventing Unauthorized Access - ANSWER✔✔-Computers ask for authentication credentials


Authentication credentials - ANSWER✔✔-Information users provide to identify themselves for computer

access


Examples of Authentication Credentials - ANSWER✔✔-User knowledge, Smart card, Biometrics
Page 1/5

, ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




User knowledge - ANSWER✔✔-Name, password, PIN


Smart card - ANSWER✔✔-A card with an embedded memory chip used for identification


Biometrics - ANSWER✔✔-Human characteristics such as fingerprints, retina or voice patterns


Guidelines for passwords - ANSWER✔✔-Easy to remember, hard to guess • Don't use family or pet

names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special

characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email •

Don't use the same password in lots of places


reCAPTCHA - ANSWER✔✔-Software that helps digitize books at the same time


Fingerprint analysis - ANSWER✔✔-a stronger level of verification than username and password iPhone

Touch ID


Malicious Code - ANSWER✔✔-A computer program that attempts to bypass appropriate authorization

and/or perform unauthorized functions


Worm - ANSWER✔✔-stands alone, targets network resources


Trojan Horse - ANSWER✔✔-disguised as benevolent resource


Virus - ANSWER✔✔-self-replicating


Logic Bomb - ANSWER✔✔-set up to execute at system event

Page 2/5

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Emillect West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
28
Member since
1 year
Number of followers
2
Documents
3004
Last sold
1 month ago
GOLDEN ORCHIDS STORE.

On this page, you find all documents, package deals, and flashcards offered by seller Emillect.

3.0

4 reviews

5
1
4
0
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions