FIRST PUBLISH OCTOBER 2024
AP Computer Science Principles Chapter
17 Study Guide with Complete Solutions
Information Security - ANSWER✔✔-The techniques and policies used to ensure proper access to data
CIA Triad - ANSWER✔✔-Confidentiality, Availability, Integrity
Confidentiality - ANSWER✔✔-Ensuring that data is protected from unauthorized access
Availability - ANSWER✔✔-The degree to which authorized users can access information for legitimate
purposes
Integrity - ANSWER✔✔-Ensuring that data can be modified only by appropriate mechanisms
Risk Analysis - ANSWER✔✔-Determining the nature and likelihood of the risks to key data and Goal is to
minimize vulnerability to threats that put a system at the most risk
Preventing Unauthorized Access - ANSWER✔✔-Computers ask for authentication credentials
Authentication credentials - ANSWER✔✔-Information users provide to identify themselves for computer
access
Examples of Authentication Credentials - ANSWER✔✔-User knowledge, Smart card, Biometrics
Page 1/5
, ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED
FIRST PUBLISH OCTOBER 2024
User knowledge - ANSWER✔✔-Name, password, PIN
Smart card - ANSWER✔✔-A card with an embedded memory chip used for identification
Biometrics - ANSWER✔✔-Human characteristics such as fingerprints, retina or voice patterns
Guidelines for passwords - ANSWER✔✔-Easy to remember, hard to guess • Don't use family or pet
names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special
characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email •
Don't use the same password in lots of places
reCAPTCHA - ANSWER✔✔-Software that helps digitize books at the same time
Fingerprint analysis - ANSWER✔✔-a stronger level of verification than username and password iPhone
Touch ID
Malicious Code - ANSWER✔✔-A computer program that attempts to bypass appropriate authorization
and/or perform unauthorized functions
Worm - ANSWER✔✔-stands alone, targets network resources
Trojan Horse - ANSWER✔✔-disguised as benevolent resource
Virus - ANSWER✔✔-self-replicating
Logic Bomb - ANSWER✔✔-set up to execute at system event
Page 2/5