Save
AP Computer Science Principles
Big Idea 4: Computer Systems and Networks
4.3 Cybersecurity
Save
Share
Learn
Content
Leaderboard
Share
Learn
Cards (27)
What is the primary purpose of cybersecurity?
Protect systems from attacks
What is malware designed to do?
Harm or disrupt systems
Using strong passwords is a preventive measure against
cybersecurity
threats.
True
Being cautious of suspicious emails is a preventive measure against
phishing
attacks.
True
What three types of characters should be included in a strong password?
Letters, numbers, and symbols
What is the purpose of encryption in cybersecurity?
Protect sensitive information
Which physical security measure corresponds to firewalls in cybersecurity?
Alarms and security guards
What does a VPN do in cybersecurity?
Secure encrypted connection
What type of information does HIPAA protect in the United States?
Sensitive health information
Match the cybersecurity legislation/policy with its description:
GDPR ↔️ Regulates the collection of personal data
HIPAA ↔️ Protects patient health information
CMMC ↔️ Sets cybersecurity standards for defense contractors
NIST Cybersecurity Framework ↔️ Provides guidelines for managing risk
Cybersecurity measures include firewalls, encryption, and access
controls
What does DDoS stand for?
Distributed Denial-of-Service
What does encryption convert data into?
Secret code
Order the key cybersecurity practices for safeguarding digital assets:
1️⃣ Use strong passwords
2️⃣ Keep software updated
3️⃣ Implement firewalls
4️⃣ Encrypt data
5️⃣ Restrict access privileges
Firewalls act as a
barrier
between a computer and the internet.
True
Match the cybersecurity practice with its physical security equivalent:
Strong passwords ↔️ Locks and keys
Software updates ↔️ Regular maintenance
Antivirus software detects and prevents malicious software like viruses, worms, and
trojans
The General Data Protection Regulation (GDPR) is a European Union law that regulates the collection and processing of
personal
data.
The
NIST Cybersecurity Framework
provides guidelines for managing cybersecurity risk.
True
Cybersecurity protects digital assets, while
physical
security protects physical assets.
True
Phishing involves deceptive attempts to obtain sensitive
information
Firewalls protect networks from unauthorized
access
Strong passwords use a combination of letters, numbers, and
symbols
Keeping software updated helps patch vulnerabilities that could be exploited by
cybercriminals
Access control limits user privileges to only the functions they
need
Arrange the following cybersecurity tools based on their primary purpose:
1️⃣ Firewalls (Monitor and control network traffic)
2️⃣ Antivirus/Anti-malware Software (Detect and remove malicious software)
3️⃣ Encryption (Convert data into secret code)
4️⃣ Virtual Private Networks (VPNs) (Establish secure connection)
5️⃣ Intrusion Detection/Prevention Systems (Detect malicious activity)
6️⃣ Security Information and Event Management (SIEM) (Analyze security data)
Cybersecurity legislation and policies ensure the security and privacy of
digital
information.
True
See similar decks
4.3 Cybersecurity
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
82 cards
4.3 Cybersecurity
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
82 cards
4.3 Cybersecurity
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
27 cards
4.3 Cybersecurity
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
61 cards
4.3 Cybersecurity
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
82 cards
AP Computer Science Principles
1196 cards
Big Idea 4: Computer Systems and Networks
AP Computer Science Principles
252 cards
4.1 Computer Components
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
65 cards
AP Computer Science A
1898 cards
1.4.1 Threats to Computer Systems and Networks
OCR GCSE Computer Science > 1.4 Network Security
33 cards
4.2 The Internet
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
70 cards
3.4 Computer systems
AQA GCSE Computer Science
208 cards
4.1 Computer Networks
Edexcel GCSE Computer Science > Topic 4: Networks
243 cards
4.1.4 Network protocols:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
26 cards
4.1.2 Network topologies:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
40 cards
4.1.5 Network security:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
59 cards
4.4 Parallel and Distributed Computing
AP Computer Science Principles > Big Idea 4: Computer Systems and Networks
90 cards
OCR GCSE Computer Science
1937 cards
4.1.3 Network hardware:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
74 cards
3.5.5 Network security
AQA GCSE Computer Science > 3.5 Fundamentals of computer networks
23 cards
Edexcel GCSE Computer Science
2949 cards