AP CS Principles · Big Idea 5: Impact of Computing44 flashcards

AP CSP Safe Computing Practices

44 flashcards covering AP CSP Safe Computing Practices for the AP-CS-PRINCIPLES Big Idea 5 section.

Safe computing practices encompass strategies and behaviors that protect data and systems from unauthorized access, misuse, and damage. This topic is defined by the College Board as part of the AP Computer Science Principles curriculum, particularly under Big Idea 5, which emphasizes the importance of responsible computing. Understanding these practices is essential for ensuring the integrity and security of information in various computing environments.

In practice exams and competency assessments, questions on safe computing practices often focus on identifying threats, recognizing safe behaviors, and understanding the implications of poor security practices. Common traps include confusing technical terms or overlooking the importance of user awareness in preventing security breaches. Test-takers may also struggle with situational questions that require applying safe computing principles to real-world scenarios.

One concrete tip that is frequently overlooked is the importance of regularly updating software and systems to protect against vulnerabilities.

Terms (44)

  1. 01

    What is a safe computing practice when using public Wi-Fi?

    Always use a virtual private network (VPN) to encrypt your connection and protect your data from potential eavesdroppers (College Board AP CED).

  2. 02

    How often should passwords be changed to maintain security?

    Passwords should be changed regularly, ideally every 3 to 6 months, to reduce the risk of unauthorized access (College Board AP CED).

  3. 03

    What is the first step when encountering a suspicious email?

    Do not click on any links or download attachments; instead, verify the sender's identity before taking further action (College Board AP CED).

  4. 04

    Under the principle of least privilege, what is required when granting access to files?

    Users should only be given access to the files necessary for their role to minimize security risks (College Board AP CED).

  5. 05

    What should a user do if their device is lost or stolen?

    Immediately report the loss to the IT department and change passwords for any accounts accessed on the device (College Board AP CED).

  6. 06

    What is the purpose of two-factor authentication?

    Two-factor authentication adds an extra layer of security by requiring not just a password but also a second form of verification (College Board AP CED).

  7. 07

    When should software updates be installed?

    Software updates should be installed as soon as they are available to protect against vulnerabilities and security threats (College Board AP CED).

  8. 08

    What is a common indicator of phishing attempts?

    Phishing attempts often include urgent language or requests for personal information to trick the user into responding (College Board AP CED).

  9. 09

    What is the best practice for creating strong passwords?

    Use a combination of upper and lower case letters, numbers, and symbols, and avoid easily guessed information like birthdays (College Board AP CED).

  10. 10

    How can users protect their personal information online?

    Users should limit the amount of personal information shared on social media and adjust privacy settings accordingly (College Board AP CED).

  11. 11

    What is the recommended action if a website appears insecure?

    Do not enter sensitive information and look for a secure connection indicated by 'https://' in the URL (College Board AP CED).

  12. 12

    What is the role of antivirus software in safe computing?

    Antivirus software helps detect and remove malware, providing a safeguard against viruses and other malicious software (College Board AP CED).

  13. 13

    When should sensitive data be encrypted?

    Sensitive data should be encrypted both in transit and at rest to protect it from unauthorized access (College Board AP CED).

  14. 14

    What is a secure method for sharing files?

    Use secure file-sharing services that offer encryption and access controls to protect shared information (College Board AP CED).

  15. 15

    What should be done with old devices before disposal?

    Old devices should be wiped clean of all data to prevent unauthorized access to personal information (College Board AP CED).

  16. 16

    What is a key benefit of using strong passwords?

    Strong passwords significantly reduce the likelihood of unauthorized access to accounts and sensitive information (College Board AP CED).

  17. 17

    What is the importance of backing up data?

    Regular data backups protect against data loss due to hardware failure, cyberattacks, or accidental deletion (College Board AP CED).

  18. 18

    What should users do if they suspect their account has been compromised?

    Immediately change the password and enable two-factor authentication if available (College Board AP CED).

  19. 19

    What is the significance of user education in safe computing?

    Educating users about safe computing practices reduces the risk of security breaches caused by human error (College Board AP CED).

  20. 20

    How can users verify the authenticity of a website?

    Check for a secure connection (https://) and look for trust seals or certificates from recognized authorities (College Board AP CED).

  21. 21

    What is a common method for securing mobile devices?

    Setting up a passcode or biometric authentication helps secure mobile devices against unauthorized access (College Board AP CED).

  22. 22

    What should be done before clicking on a link in an email?

    Hover over the link to check the actual URL and ensure it matches the expected destination (College Board AP CED).

  23. 23

    What is the purpose of a firewall in network security?

    A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules (College Board AP CED).

  24. 24

    What is a recommended practice for managing passwords?

    Use a password manager to securely store and generate complex passwords (College Board AP CED).

  25. 25

    How can users identify secure websites?

    Look for 'https://' in the URL and a padlock icon in the address bar, indicating a secure connection (College Board AP CED).

  26. 26

    What should be done with suspicious attachments?

    Do not open them; instead, delete the email and report it to IT if applicable (College Board AP CED).

  27. 27

    What is the recommended frequency for reviewing account activity?

    Users should review their account activity regularly, ideally monthly, to detect any unauthorized transactions (College Board AP CED).

  28. 28

    What is the best practice for handling sensitive information?

    Always encrypt sensitive information before sharing or storing it to protect it from unauthorized access (College Board AP CED).

  29. 29

    What is a common characteristic of malware?

    Malware is designed to disrupt, damage, or gain unauthorized access to computer systems (College Board AP CED).

  30. 30

    What should users do if they receive a suspicious phone call asking for personal information?

    Do not provide any information; hang up and contact the organization directly using a verified number (College Board AP CED).

  31. 31

    What is the importance of digital citizenship?

    Digital citizenship promotes responsible and ethical use of technology, ensuring safety and respect online (College Board AP CED).

  32. 32

    What is a secure way to dispose of paper documents containing sensitive information?

    Shred the documents to prevent unauthorized access to the information they contain (College Board AP CED).

  33. 33

    What is the role of encryption in data security?

    Encryption transforms data into a secure format that can only be read by authorized users with the decryption key (College Board AP CED).

  34. 34

    What action should be taken if a user suspects a security breach?

    Report the incident to the appropriate IT personnel immediately to mitigate potential damage (College Board AP CED).

  35. 35

    What is a common sign of a computer virus?

    Frequent crashes, slow performance, or unexpected behavior can indicate a virus infection (College Board AP CED).

  36. 36

    What is the purpose of security patches?

    Security patches fix vulnerabilities in software to protect against potential threats and attacks (College Board AP CED).

  37. 37

    What should users do to protect their online accounts?

    Use unique passwords for each account and enable two-factor authentication whenever possible (College Board AP CED).

  38. 38

    What is a recommended practice for using social media?

    Limit the amount of personal information shared publicly to reduce the risk of identity theft (College Board AP CED).

  39. 39

    What is the significance of a secure backup plan?

    A secure backup plan ensures data can be restored in case of loss due to hardware failure or cyber incidents (College Board AP CED).

  40. 40

    What is a common form of social engineering?

    Phishing is a common form of social engineering where attackers deceive individuals into providing personal information (College Board AP CED).

  41. 41

    What should users do if they encounter a suspicious website?

    Avoid interacting with the site and report it to the appropriate authorities (College Board AP CED).

  42. 42

    What is the importance of using secure connections?

    Secure connections protect data transmitted over the internet from being intercepted by unauthorized parties (College Board AP CED).

  43. 43

    What is a common practice for securing home networks?

    Change the default password for the router and enable WPA3 encryption for the wireless network (College Board AP CED).

  44. 44

    What is the purpose of a security audit?

    A security audit assesses an organization's security policies and practices to identify vulnerabilities and improve defenses (College Board AP CED).