Upgrade to remove ads
Computer Security and Reliability
AP CSP Unit 4: Big Data and Privacy
Terms in this set (27)
a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.
A business/corporate term for a one-page document that summarizes a large issue, topic or plan.
the intentional or unintentional release of secure or private/confidential information to an untrusted environment
a technique for encryption that shifts the alphabet by some number of characters
the generic term for a technique (or algorithm) that performs encryption
decoding a secret message without knowing all the specifics of the cipher
a process that reverses encryption, taking a secret message and reproducing the original plain text
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
random substitution cipher
an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
a problem so difficult that a computer cannot arrive at a solution in a reasonable amount of time.
used in public key encryption, it an algorithm in which the key to encrypt data is different from the key to decrypt.
a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3
public key encryption
allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.
a Caesar cipher that changes the amount of letters shifted for every letter; the amount is determined by a key
text needed to decrypt a message (assuming the decryption technique is also known)
typically an attack on a target server whereby a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed
typically a thief trying to trick you into sending them sensitive information; often uses fake emails and/or websites
program that runs on a computer to do something the owner of the computer does not intend
software that runs on servers (often routers) that only allows traffic through according to some set of security rules
secure sockets layer - a layer of HTTP that uses public key cryptography to establish a secure connection
transport layer security- a layer of HTTP that uses public key cryptography to establish a secure connection
an electronic document used to prove the ownership of a public key.
enlisting the help of multiple people via the web to work on a particular task
algorithms that use large data samples to predict behaviors or patterns
private key encryption
algorithm whereby encryption and decryption of text is done with a secret piece of text (the private key)
algorithm where the same key is used to encrypt and decrypt
a mapping between input and output that can't be reversed
THIS SET IS OFTEN IN FOLDERS WITH...
Code.org Unit 1 Vocabulary
CSP Unit 1 The Internet
AP CSP Unit 5
AP CSP Unit 4 Vocab
YOU MIGHT ALSO LIKE...
csp cram vocab unit 4: big data and privacy
APCSP Unit 4
Code.org Unit 4
AP Computer Science Principles - Unit 4: Big Data…
OTHER SETS BY THIS CREATOR
Blown to Bits Chapter 5
Aaron's Travels: (Tech) Solutions at VCS
Unit 2 Chapter 1: Encoding and Compressing Complex…
OTHER QUIZLET SETS
MO - Horse 2015-2019 Key
GI Emergencies and Acute Abdomen- Burman
ECE 231 Midterm Assignment 2
Lit Terms pt.100