Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
30-10-2024
Geschreven in
2024/2025

AP Computer Science Principles Chapter 17 Study Guide with Complete Solutions Information Security - ANSWER-The techniques and policies used to ensure proper access to data CIA Triad - ANSWER-Confidentiality, Availability, Integrity Confidentiality - ANSWER-Ensuring that data is protected from unauthorized access Availability - ANSWER-The degree to which authorized users can access information for legitimate purposes Integrity - ANSWER-Ensuring that data can be modified only by appropriate mechanisms Risk Analysis - ANSWER-Determining the nature and likelihood of the risks to key data and Goal is to minimize vulnerability to threats that put a system at the most risk Preventing Unauthorized Access - ANSWER-Computers ask for authentication credentials Authentication credentials - ANSWER-Information users provide to identify themselves for computer access Examples of Authentication Credentials - ANSWER-User knowledge, Smart card, Biometrics ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 2/5 User knowledge - ANSWER-Name, password, PIN Smart card - ANSWER-A card with an embedded memory chip used for identification Biometrics - ANSWER-Human characteristics such as fingerprints, retina or voice patterns Guidelines for passwords - ANSWER-Easy to remember, hard to guess • Don't use family or pet names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email • Don't use the same password in lots of places reCAPTCHA - ANSWER-Software that helps digitize books at the same time Fingerprint analysis - ANSWER-a stronger level of verification than username and password iPhone Touch ID Malicious Code - ANSWER-A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm - ANSWER-stands alone, targets network resources Trojan Horse - ANSWER-disguised as benevolent resource Virus - ANSWER-self-replicating Logic Bomb - ANSWER-set up to execute at system event ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER 2024 Page 3/5 Antivirus Software - ANSWER-Software installed to detect and remove malicious code Signature detection - ANSWER-recognizes known malware and removes Heuristics - ANSWER-are strategies used to identify general patterns Security Attacks - ANSWER-Password guessing, phishing, Spoofing, back door Phishing - ANSWER-Trick users into revealing security infor

Meer zien Lees minder
Instelling
AP Computer Science
Vak
AP Computer Science

Voorbeeld van de inhoud

©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




AP Computer Science Principles Chapter

17 Study Guide with Complete Solutions


Information Security - ANSWER✔✔-The techniques and policies used to ensure proper access to data


CIA Triad - ANSWER✔✔-Confidentiality, Availability, Integrity


Confidentiality - ANSWER✔✔-Ensuring that data is protected from unauthorized access


Availability - ANSWER✔✔-The degree to which authorized users can access information for legitimate

purposes


Integrity - ANSWER✔✔-Ensuring that data can be modified only by appropriate mechanisms


Risk Analysis - ANSWER✔✔-Determining the nature and likelihood of the risks to key data and Goal is to

minimize vulnerability to threats that put a system at the most risk


Preventing Unauthorized Access - ANSWER✔✔-Computers ask for authentication credentials


Authentication credentials - ANSWER✔✔-Information users provide to identify themselves for computer

access


Examples of Authentication Credentials - ANSWER✔✔-User knowledge, Smart card, Biometrics
Page 1/5

, ©EMILLECT 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED

FIRST PUBLISH OCTOBER 2024




User knowledge - ANSWER✔✔-Name, password, PIN


Smart card - ANSWER✔✔-A card with an embedded memory chip used for identification


Biometrics - ANSWER✔✔-Human characteristics such as fingerprints, retina or voice patterns


Guidelines for passwords - ANSWER✔✔-Easy to remember, hard to guess • Don't use family or pet

names • Don't make it accessible • Use combination uppercase/lowercase letters, digits and special

characters • Don't leave computer when logged in • Don't ever tell anyone • Don't include in an email •

Don't use the same password in lots of places


reCAPTCHA - ANSWER✔✔-Software that helps digitize books at the same time


Fingerprint analysis - ANSWER✔✔-a stronger level of verification than username and password iPhone

Touch ID


Malicious Code - ANSWER✔✔-A computer program that attempts to bypass appropriate authorization

and/or perform unauthorized functions


Worm - ANSWER✔✔-stands alone, targets network resources


Trojan Horse - ANSWER✔✔-disguised as benevolent resource


Virus - ANSWER✔✔-self-replicating


Logic Bomb - ANSWER✔✔-set up to execute at system event

Page 2/5

Geschreven voor

Instelling
AP Computer Science
Vak
AP Computer Science

Documentinformatie

Geüpload op
30 oktober 2024
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€10,75
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Emillect West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
31
Lid sinds
1 jaar
Aantal volgers
2
Documenten
3003
Laatst verkocht
1 week geleden
GOLDEN ORCHIDS STORE.

On this page, you find all documents, package deals, and flashcards offered by seller Emillect.

3,0

4 beoordelingen

5
1
4
0
3
2
2
0
1
1

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen