Safe Computing
Help Questions
AP Computer Science Principles › Safe Computing
Read the passage. In a Personal Data Security workshop, students learn safe computing principles: verify senders, use password managers, and keep systems updated. Privacy concerns include data brokers collecting browsing habits and location history. Security concerns include phishing, where a message imitates a bank to steal passwords, and malware, which can record keystrokes. Ethically, students should warn others and report scams, not forward them for amusement. The text notes the 2013 Target breach, where stolen payment data triggered fraud charges and distrust (U.S. Senate, 2014). How does the passage illustrate the impact of phishing on data security?
It claims phishing only affects large companies, not individual students using personal devices.
It suggests phishing improves security by forcing users to change passwords more frequently.
It argues phishing is prevented solely by buying a new phone every year for safety.
It shows fake bank messages can trick users into revealing passwords and losing account control.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses practices like verifying senders, using password managers, and understanding security threats to protect data integrity and privacy. The passage provides examples such as phishing messages that imitate banks to steal passwords, illustrating how attackers exploit trust to compromise security. Choice A is correct because it accurately captures how phishing impacts data security by showing that fake bank messages can trick users into revealing passwords, leading to account compromise - directly reflecting the passage's description of phishing. Choice B is incorrect because it contradicts the passage's implication that phishing affects individual users, not just large companies, a common error when students underestimate personal security risks. To help students: Focus on identifying specific security threats and their mechanisms. Encourage analyzing real-world examples of attacks and their consequences. Practice recognizing social engineering tactics. Watch for: underestimating personal vulnerability, misunderstanding attack methods, assuming security is only a corporate concern.
Read the passage. During a Personal Data Security seminar, a presenter defines safe computing as protecting accounts, devices, and shared data through careful habits. Privacy concerns include oversharing photos that reveal routines and locations. Security concerns include malware that quietly copies contacts and phishing emails that request “urgent” password resets. Ethical implications include seeking consent before posting others’ information and warning friends about scams. The passage mentions the 2018 Marriott breach, which exposed travel-related personal details and increased fraud risk (Information Commissioner’s Office ICO, 2020). What is the purpose of using unique passwords in the passage?
It prevents phishing by blocking all suspicious emails before they reach your inbox.
It makes it safe to store passwords in plain text notes on a shared computer.
It replaces the need to log out on public devices because sessions end automatically.
It ensures a breach of one site does not automatically compromise accounts on other sites.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses practices like using unique passwords for different accounts to prevent cascading security failures when breaches occur. The passage mentions the 2018 Marriott breach which exposed personal details and increased fraud risk, illustrating why password compartmentalization is crucial. Choice A is correct because it accurately captures the purpose of using unique passwords - ensuring that a breach of one site does not automatically compromise accounts on other sites, which directly addresses the security principle of limiting damage from individual breaches. Choice B is incorrect because it suggests storing passwords in plain text on shared computers is safe, which contradicts fundamental security practices, a common error when students misunderstand that unique passwords alone don't eliminate all security requirements. To help students: Focus on understanding defense-in-depth strategies. Encourage analyzing how password reuse creates vulnerability chains. Practice recognizing the importance of password management tools. Watch for: assuming one security measure eliminates the need for others, misunderstanding password storage best practices, underestimating breach impacts.
Read the passage. In a Personal Data Security lesson, students learn that safe computing includes recognizing social engineering, meaning manipulation that pressures quick decisions. Privacy concerns include strangers collecting details from public profiles. Security concerns include phishing calls that request verification codes and malware that captures screenshots. Ethical implications include refusing to prank-call others with spoofed numbers and reporting harassment. The passage notes that breaches often lead to account takeovers, financial loss, and emotional stress (National Institute of Standards and Technology NIST, 2018). What role does recognizing social engineering play in enhancing cybersecurity according to the passage?
It eliminates the need for device updates because manipulation cannot affect software security.
It guarantees privacy by stopping websites from collecting any information about visitors.
It works only for companies with security teams, not for individuals at home.
It helps users resist pressure tactics, reducing the chance they disclose passwords or codes.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses recognizing social engineering tactics, which the passage defines as manipulation that pressures quick decisions, a critical skill for protecting against human-targeted attacks. The passage emphasizes how social engineering relates to security concerns like phishing calls that request verification codes, showing how attackers exploit human psychology rather than technical vulnerabilities. Choice A is correct because it accurately captures the role of recognizing social engineering in enhancing cybersecurity by helping users resist pressure tactics, thereby reducing the chance they disclose passwords or codes - directly addressing the manipulation tactics described in the passage. Choice B is incorrect because it claims recognizing social engineering eliminates the need for device updates, misunderstanding that social and technical security measures serve different purposes, a common error when students compartmentalize security concepts. To help students: Focus on understanding how attackers exploit human psychology. Encourage analyzing pressure tactics and urgency in suspicious communications. Practice recognizing manipulation techniques across different contexts. Watch for: assuming technical measures alone provide complete security, misunderstanding the human element in security, underestimating social engineering risks.
Read the passage. A student technology club discusses Personal Data Security: safe computing includes logging out on shared devices, using screen locks, and verifying app sources. Privacy concerns include someone accessing saved accounts on a public computer. Security concerns include malware from unofficial app stores and phishing links sent through group chats. Ethical implications include protecting classmates’ work and not viewing files left open. The text recalls the 2012 LinkedIn breach, where leaked passwords were later reused for other attacks (Krebs, 2016). Based on the passage, how can individuals improve their data security?
Click group-chat links immediately to show responsiveness and avoid missing announcements.
Store passwords in a shared spreadsheet so friends can recover accounts easily.
Install apps only from trusted sources and log out when using public devices.
Leave accounts signed in on shared computers so classmates can print documents quickly.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses practices like logging out on shared devices, using screen locks, and verifying app sources to protect data integrity and privacy in shared environments. The passage emphasizes both personal security measures and ethical considerations when using shared resources, noting how the 2012 LinkedIn breach led to password reuse attacks. Choice B is correct because it accurately captures safe computing practices by combining two key principles from the passage - installing apps only from trusted sources (addressing malware concerns) and logging out when using public devices (addressing privacy concerns on shared computers). Choice A is incorrect because leaving accounts signed in on shared computers directly contradicts the passage's emphasis on logging out to protect privacy, a common error when students prioritize convenience over security in shared environments. To help students: Focus on identifying comprehensive security practices for different contexts. Encourage analyzing risks specific to shared computing environments. Practice recognizing the importance of both software security and user behavior. Watch for: prioritizing convenience in shared spaces, misunderstanding multi-user security risks, assuming trust eliminates security needs.
Read the passage. A parent night presentation covers Personal Data Security: safe computing includes using passphrases, checking privacy settings, and backing up important files. Privacy concerns include children posting school schedules that reveal when homes are empty. Security concerns include ransomware, a type of malware that locks files until payment, and phishing emails that pretend to be cloud storage notices. Ethical implications include not paying scammers immediately and reporting incidents to service providers. The passage references WannaCry’s disruption and costly recovery efforts across organizations (Europol, 2017). How does the passage illustrate the impact of ransomware on data security?
It suggests ransomware is prevented solely by public posting, because attackers avoid attention.
It claims ransomware only deletes advertisements, so victims rarely notice any meaningful changes.
It argues ransomware strengthens privacy by encrypting files for free without any negative effects.
It shows ransomware locks files and pressures payment, disrupting access to essential personal data.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses understanding various security threats including ransomware, which the passage defines as a type of malware that locks files until payment is made. The passage specifically references WannaCry's disruption and costly recovery efforts, illustrating the severe impact ransomware can have on both individuals and organizations. Choice A is correct because it accurately captures how ransomware impacts data security by showing that it locks files and pressures payment, disrupting access to essential personal data - directly reflecting the passage's description of ransomware as malware that locks files until payment. Choice D is incorrect because it mischaracterizes ransomware as strengthening privacy through free encryption, completely misunderstanding that ransomware is a malicious attack, a common error when students confuse legitimate encryption with malicious file locking. To help students: Focus on understanding different types of malware and their impacts. Encourage analyzing the difference between protective encryption and malicious file locking. Practice recognizing the financial and operational impacts of security breaches. Watch for: confusing security features with attacks, misunderstanding malware purposes, underestimating ransomware impacts.
Read the passage. A health class connects safe computing to everyday life: use secure passwords, confirm links, and limit app permissions. Privacy concerns include fitness apps sharing location patterns that reveal home addresses. Security concerns include phishing that imitates school notices and malware that steals stored photos. Ethical implications include reporting found devices rather than searching private messages. The text references the 2021 Facebook data leak, where scraped profiles enabled targeted scams and harassment (FTC, 2021). How does the passage illustrate the impact of oversharing on privacy?
It suggests oversharing is harmless if posts include humor and avoid technical language.
It claims oversharing prevents malware by keeping accounts too public for attackers.
It argues oversharing only matters for celebrities, not ordinary students using social media.
It explains that location patterns can reveal routines, making identity theft and stalking easier.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses understanding privacy risks, including how oversharing personal information can lead to serious consequences like identity theft and stalking. The passage specifically mentions fitness apps sharing location patterns that reveal home addresses as a privacy concern, illustrating how seemingly innocent data can be exploited. Choice A is correct because it accurately captures how oversharing impacts privacy by explaining that location patterns can reveal routines, making identity theft and stalking easier - directly reflecting the passage's example of fitness apps exposing home addresses through location data. Choice B is incorrect because it suggests oversharing only matters for celebrities, contradicting the passage's focus on everyday users, a common error when students underestimate their own privacy risks. To help students: Focus on identifying how personal data can be aggregated and misused. Encourage analyzing seemingly harmless information sharing. Practice recognizing privacy implications of location and routine data. Watch for: underestimating personal vulnerability, misunderstanding data aggregation risks, assuming privacy only matters for high-profile individuals.
Read the passage. A manufacturing company connects factory machines to an internal network for monitoring. Safe computing principles require secure configuration, limited access, and continuous patching, meaning installing updates that fix known flaws. Privacy concerns arise when employee badge data is stored alongside machine logs. Security concerns arise when attackers can disrupt production or steal design files. The company uses intrusion detection, meaning software that alerts staff about unusual network behavior. It also performs employee training on suspicious links and unexpected login prompts. A breach occurs when an unpatched server is exploited, and attackers move through the network. Production stops for two days, causing missed orders and overtime costs. The company also faces reputational damage and must review its controls (CISA, 2023). What is the purpose of patching in the passage?
It replaces intrusion detection, because updates automatically alert staff about unusual network behavior.
It guarantees production never stops, because patched systems cannot be misconfigured by users.
It hides employee badge data by deleting logs, which eliminates privacy concerns without any tradeoffs.
It fixes known weaknesses in software, reducing the chance attackers exploit outdated systems successfully.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing requires continuous maintenance including patching, which the passage defines as 'installing updates that fix known flaws.' The passage demonstrates how an unpatched server was exploited, leading to production stoppage and significant business impact, illustrating why timely patching is critical. Choice A is correct because it accurately describes how patching fixes known weaknesses in software, reducing the chance attackers exploit outdated systems, which directly addresses the vulnerability that led to the breach where 'an unpatched server is exploited.' Choice C is incorrect because it makes unrealistic guarantees about production continuity and ignores that patching addresses software vulnerabilities, not user configuration errors, demonstrating a common misconception about the scope of security measures. To help students: Focus on understanding the purpose and limitations of each security measure. Encourage analyzing how vulnerabilities are discovered and fixed through the patching process. Practice distinguishing between different types of security controls and their specific purposes. Watch for: making absolute claims about security, confusing different security measures' functions, missing the ongoing nature of security maintenance.
Based on the text, a shipping company follows safe computing principles by updating systems, using secure configurations, and monitoring access. Privacy concerns involve protecting customer addresses and delivery histories from unnecessary exposure. Security concerns involve preventing attackers from changing routes or stealing payment details. The company uses encryption, which turns readable data into coded text without the key. It also runs employee training on phishing, explaining that phishing uses fake messages to trick workers. The company performs regular backups, which are saved copies used for recovery. A breach occurs when backups are stored without encryption on a cloud folder with a public link. Attackers download the files and post samples online, causing reputational damage and customer complaints. The company pays for incident response, faces contractual penalties, and must notify affected customers (NIST, 2020). Which example best demonstrates the ethical implications of safe computing?
Leaders buy faster laptops, because higher performance always prevents data exposure and legal penalties.
Leaders encrypt backups and restrict links, because preventing foreseeable customer harm outweighs minor inconvenience.
Leaders ignore public links, because customers should expect their addresses to be shared online anyway.
Leaders rely on a firewall alone, because encryption and training are unnecessary for cloud backups.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses ethical responsibilities to protect user data beyond mere compliance, considering the real harm that can result from data breaches. The passage emphasizes how unencrypted backups with public links led to reputational damage and customer complaints, illustrating the importance of proactive security measures. Choice A is correct because it demonstrates ethical computing by showing leaders encrypting backups and restricting links to prevent foreseeable customer harm, even if it causes minor inconvenience, which aligns with the passage's emphasis on ethical implications including preventing foreseeable harm. Choice B is incorrect because it shows negligence and disregard for customer privacy, directly contradicting the ethical principle of protecting customer data from unnecessary exposure mentioned in the passage. To help students: Focus on identifying ethical responsibilities beyond legal requirements. Encourage analyzing the balance between convenience and security. Practice recognizing how technical decisions have ethical implications. Watch for: confusing legal compliance with ethical responsibility, missing the human impact of security decisions, overlooking preventable vulnerabilities.
Based on the text, safe computing in a hospital billing office includes strong access control, timely updates, and careful handling of patient data. The office keeps insurance records on a shared drive, and only certain roles should open them. Privacy concerns grow when staff store files on personal devices, because control and auditing weaken. Security concerns grow when systems skip updates, because attackers exploit known weaknesses. The hospital adds data encryption, meaning files become unreadable without an authorized key. It also uses two-factor authentication, which requires a password plus a second check, such as a code. Ethical computing requires protecting vulnerable patients and avoiding unnecessary data collection. A breach occurs when an employee uses a simple password and reuses it on a social site. Attackers guess the password, enter the billing system, and expose thousands of records. The hospital pays notification costs, faces regulatory fines, and loses community trust (Health and Human Services HHS, 2021). What is the purpose of two-factor authentication in the passage?
It adds a second verification step, reducing harm when a password is guessed or stolen.
It prevents device theft by locking office doors, which stops outsiders from entering buildings.
It encrypts every file automatically, so passwords become unnecessary for accessing patient records.
It works only when users reuse passwords, because repetition helps systems recognize legitimate logins.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing encompasses authentication methods like two-factor authentication, which adds an extra layer of security beyond passwords. The passage provides the example of requiring 'a password plus a second check, such as a code' to illustrate how two-factor authentication works in protecting patient data. Choice A is correct because it accurately describes how two-factor authentication adds a second verification step, reducing harm when a password is guessed or stolen, which directly addresses the vulnerability exploited in the breach where attackers guessed a simple, reused password. Choice B is incorrect because it confuses two-factor authentication with encryption - authentication controls access while encryption scrambles data, and the passage clearly distinguishes these as separate security measures. To help students: Focus on understanding different security layers and their specific purposes. Encourage students to identify how each security measure addresses different vulnerabilities. Practice distinguishing between authentication (verifying identity) and encryption (protecting data). Watch for: confusing different security technologies, misunderstanding how security measures complement rather than replace each other, overlooking the specific vulnerability each measure addresses.
Read the passage. A city library uses an online portal for patrons to reserve books and pay small fees. Safe computing principles include protecting accounts, limiting stored data, and monitoring for misuse. Privacy concerns involve reading histories and contact information, which can reveal sensitive preferences. Security concerns include account takeover and unauthorized purchases. The library adds rate limiting, meaning the system slows repeated login attempts to deter guessing. It also adopts two-factor authentication for staff accounts. A breach occurs when attackers repeatedly guess weak patron passwords, then change email addresses and lock users out. The library resets accounts, refunds fees, and faces reputational damage due to lost trust (FTC, 2022). What is the purpose of rate limiting in the passage?
It slows repeated login attempts, making password guessing harder and reducing account takeover risk.
It replaces refunds after breaches, because technical controls remove legal duties to notify patrons.
It encrypts patron reading histories, so staff no longer need passwords to access the portal.
It increases guessing speed, because faster logins help legitimate users remember weak passwords.
Explanation
This question tests understanding of safe computing principles as discussed in AP Computer Science Principles, focusing on their practical and ethical implications. Safe computing includes defensive measures like rate limiting, which the passage defines as 'the system slows repeated login attempts to deter guessing.' The passage shows how attackers exploited weak passwords through repeated guessing, demonstrating why rate limiting is an important defense against brute force attacks. Choice A is correct because it accurately describes how rate limiting slows repeated login attempts, making password guessing harder and reducing account takeover risk, which directly addresses the attack method used in the breach where 'attackers repeatedly guess weak patron passwords.' Choice C is incorrect because it claims rate limiting increases guessing speed to help users, which is the opposite of its actual purpose and would make systems more vulnerable to the exact attack described in the passage. To help students: Focus on understanding how technical controls defend against specific attack methods. Encourage analyzing the relationship between attack techniques and defensive measures. Practice identifying how security measures balance usability with protection. Watch for: misunderstanding security measures as helping attackers, confusing the purpose of defensive controls, missing the connection between vulnerabilities and countermeasures.