100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions

Puntuación
-
Vendido
-
Páginas
5
Grado
A+
Subido en
30-10-2024
Escrito en
2024/2025

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions Information Security - ANSWER-The techniques and policies used to ensure proper access to data CIA Triad - ANSWER-Confidentiality, Availability, Integrity Confidentiality - ANSWER-Ensuring that data is protected from unauthorized access Availability - ANSWER-The degree to which authorized users can access information for legitimate purposes Integrity - ANSWER-Ensuring that data can be modified only by appropriate mechanisms Risk Analysis - ANSWER-Determining the nature and likelihood of the risks to key data and Goal is to minimize vulnerability to threats that put a system at the most risk Preventing Unauthorized Access - ANSWER-Computers ask for authentication credentials Authentication credentials - ANSWER-Information users provide to identify themselves for computer access Examples of Authentication Credentials - ANSWER-User knowledge, Smart card, Biometrics ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 2/5 User knowledge - ANSWER-Name, password, PIN Smart card - ANSWER-A card with an embedded memory chip used for identification Biometrics - ANSWER-Human characteristics such as fingerprints, retina or voice patterns Guidelines for passwords - ANSWER-Easy to remember, hard to guess • Don't use family or pet names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email • Don't use the same password in lots of places reCAPTCHA - ANSWER-Software that helps digitize books at the same time Fingerprint analysis - ANSWER-a stronger level of verification than username and password iPhone Touch ID Malicious Code - ANSWER-A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm - ANSWER-stands alone, targets network resources Trojan Horse - ANSWER-disguised as benevolent resource Virus - ANSWER-self-replicating Logic Bomb - ANSWER-set up to execute at system event ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 3/5 Antivirus Software - ANSWER-Software installed to detect and remove malicious code Signature detection - ANSWER-recognizes known malware and removes Heuristics - ANSWER-are strategies used to identify general patterns Security Attacks - ANSWER-Password guessing, phishing, Spoofing, back door Phishing - ANSWER-Trick users into revealing security infor

Mostrar más Leer menos
Institución
AP Computer Science
Grado
AP Computer Science









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
AP Computer Science
Grado
AP Computer Science

Información del documento

Subido en
30 de octubre de 2024
Número de páginas
5
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




AP Computer Science Principles Chapter

17 Study Guide with Complete Solutions


Information Security - ANSWER✔✔-The techniques and policies used to ensure proper access to data


CIA Triad - ANSWER✔✔-Confidentiality, Availability, Integrity


Confidentiality - ANSWER✔✔-Ensuring that data is protected from unauthorized access


Availability - ANSWER✔✔-The degree to which authorized users can access information for legitimate

purposes


Integrity - ANSWER✔✔-Ensuring that data can be modified only by appropriate mechanisms


Risk Analysis - ANSWER✔✔-Determining the nature and likelihood of the risks to key data and Goal is to

minimize vulnerability to threats that put a system at the most risk


Preventing Unauthorized Access - ANSWER✔✔-Computers ask for authentication credentials


Authentication credentials - ANSWER✔✔-Information users provide to identify themselves for computer

access


Examples of Authentication Credentials - ANSWER✔✔-User knowledge, Smart card, Biometrics
Page 1/5

, ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




User knowledge - ANSWER✔✔-Name, password, PIN


Smart card - ANSWER✔✔-A card with an embedded memory chip used for identification


Biometrics - ANSWER✔✔-Human characteristics such as fingerprints, retina or voice patterns


Guidelines for passwords - ANSWER✔✔-Easy to remember, hard to guess • Don't use family or pet

names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special

characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email •

Don't use the same password in lots of places


reCAPTCHA - ANSWER✔✔-Software that helps digitize books at the same time


Fingerprint analysis - ANSWER✔✔-a stronger level of verification than username and password iPhone

Touch ID


Malicious Code - ANSWER✔✔-A computer program that attempts to bypass appropriate authorization

and/or perform unauthorized functions


Worm - ANSWER✔✔-stands alone, targets network resources


Trojan Horse - ANSWER✔✔-disguised as benevolent resource


Virus - ANSWER✔✔-self-replicating


Logic Bomb - ANSWER✔✔-set up to execute at system event

Page 2/5
$11.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Emillect West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
28
Miembro desde
1 año
Número de seguidores
2
Documentos
3004
Última venta
1 mes hace
GOLDEN ORCHIDS STORE.

On this page, you find all documents, package deals, and flashcards offered by seller Emillect.

3.0

4 reseñas

5
1
4
0
3
2
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes