Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Security and Reliability
AP CPS Vocab Unit 2
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (18)
Big Data
A broad term for data sets so large or complex that traditional data processing applications are inadequate.
Moore's Law
A predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained true ever since.
Encryption
A process of encoding messages to keep them secret, so only "authorized" parties can read it.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text
Cipher
The generic term for a technique (or algorithm) that performs encryption
Caesar's Cipher
A technique for encryption that shifts the alphabet by some number of characters.
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
Computationally Hard
A "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
Antivirus Software
Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
DDoS Attack
Distributed Denial of Service Attack. Typically, a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
Firewall
Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Phishing Scam
A thief trying to trick you into sending them sensitive information. Typically, these include emails about system updates asking you send your username and password, social security number or other things.
SSL/TLS
Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection.
Virus
A program that runs on a computer to do something the owner of the computer does not intend.
asymmetric encryption
Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.
Recommended textbook explanations
Introduction to the Theory of Computation
3rd Edition
Michael Sipser
389 explanations
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th Edition
David A. Patterson, John L. Hennessy
220 explanations
Big Java
5th Edition
Cay S. Horstmann
1,008 explanations
Fundamentals of Python: First Programs
2nd Edition
Kenneth Lambert
419 explanations
Sets with similar terms
csp cram vocab unit 4: big data and privacy
20 terms
AP CSP Unit 4: Big Data and Privacy
27 terms
Code.org Unit 4
19 terms
AP Comp Sci (Chapter 4 Vocab)
28 terms
Other sets by this creator
AP GOV VOCAB
58 terms
AP Government -15 Required Supreme Court…
15 terms
Vocab Section 5 & 6
21 terms
Vocab Section 3 & 4
39 terms
Other Quizlet sets
1493 - ANTH 111 Test 1
24 terms
Ch.7 Electricity & Electrical Safety
22 terms
Epi: Screening/DiagnosticTests
23 terms
11 Econ Business Price
11 terms