AP Cybersecurity Unit 1: Introduction to Security

Unit 1: Introduction to Security | AP Cybersecurity Study Guide

Unit 1: Introduction to Security

Social Engineering, Password Attacks, Wi-Fi Security & AI in Cybersecurity

🎯 Learning Objectives

By the end of this unit, you will be able to:

  • Identify common indicators of social engineering tactics and explain how they influence victims
  • Recognize signs of password attacks and explain how to strengthen authentication
  • Identify types of wireless cyberattacks and explain protective measures
  • Explain how adversaries use AI to augment cyberattacks
  • Describe how cyber defenders leverage AI for protection and threat detection
Social Engineering Phishing Password Attack Evil Twin MFA Deepfake AI Threat Detection

1.1 Understanding Social Engineering

Social Engineering is the use of psychological tactics to manipulate users into revealing sensitive information (elicitation), downloading a malicious file, or clicking on a malicious link. It can be performed in person but is often done via email, text message, or social media.

Social engineering attacks are among the most effective cyberattacks because they exploit human psychology rather than technical vulnerabilities. Even the most secure systems can be compromised if an attacker can convince a user to hand over their credentials or click a malicious link.

Psychological Tactics Used by Adversaries

Adversaries use several psychological principles to manipulate their targets:

Tactic Description Example
Intimidation Threatening negative consequences if the target doesn't comply "Your account will be suspended in 24 hours unless you verify your identity now."
Urgency Creating a deadline that requires quick action "Act now! This offer expires in 10 minutes."
Authority Impersonating someone with power over the target "This is IT Support. We need your password to fix a critical issue."
Scarcity Creating a sense of limited availability "Only 2 spots left! Claim your prize before it's gone."
Familiarity Pretending to be or know someone close to the target "Hey, it's your cousin Mike. Can you send me $500?"
Consensus Making the target believe everyone else is doing it "95% of employees have already updated their credentials."

How These Tactics Influence Behavior

💡 Why Urgency Works

Urgency leverages a natural human response to react quickly to time-sensitive needs. When targets detect a sense of urgency, they feel pressured to respond quickly, which prevents them from taking time to consider whether an action is reasonable or safe. This is why phishing emails often include phrases like "immediate action required" or countdown timers.

💡 Why Intimidation Works

Intimidation leverages a natural human aversion to negative consequences. By drawing attention to possible negative outcomes (account suspension, legal action, job loss), adversaries use fear to incite targets to act without thinking critically about the request.

Possible Impacts of Social Engineering Attacks

Victims of social engineering may suffer various consequences:

🔓 Credential Theft

Victims may give adversaries secure information like a one-time password (OTP) or authentication login code, which could allow an adversary to log in to a service as the victim.

👤 Identity Information Exposure

Victims may reveal personal information (name, phone number, address, workplace, pets' names, birthdate) that could be used for impersonation. This information is often used as challenge questions to verify identity on websites.

🦠 Malware Installation

Victims may download malware or click a link that installs malware on their device, steals information from their web browser, or directs them to a website where their login credentials can be captured.

Real-World Scenario: Detecting a Phishing Email

📧 Scenario 1A: Phishing Email Analysis

Your teacher receives this email and wants to click the link. You suspect it's not legitimate:

To: ljones@school.edu
From: do-not-reply@g00gle.com
Subject: [Urgent!] Access Requested

One of your students has requested access to make a copy of a 
document. Click this link to authorize your student.

If you don't click the link, your student won't be able to 
complete their assignment.

Research shows that faster responses lead to better student outcomes.

— The Google Drive Team
🔍 Red Flags to Identify
  • Spoofed sender address: "g00gle.com" uses zeros instead of the letter 'o'
  • Urgency tactic: "[Urgent!]" in subject line pressures quick action
  • Intimidation: "If you don't click..." threatens negative consequences
  • Authority appeal: Claims to be from a trusted brand (Google)
  • Vague details: Doesn't specify which student or which document
✅ Exam Tip

When analyzing phishing scenarios on the AP exam, look for multiple social engineering tactics being used together. Most sophisticated attacks combine urgency with authority or intimidation to maximize effectiveness. Always check sender addresses character-by-character for substitutions.

1.2 Suspicious Wi-Fi Login Detection

One of the most common attack vectors against home and business networks is online password attacks—attempts to gain unauthorized access by guessing or brute-forcing login credentials.

Online Password Attack: An attack where adversaries try logging in to a device or service using common passwords, common password patterns, or stolen passwords. Unlike offline attacks, these occur in real-time against an active authentication system.

Signs of an Online Password Attack

Monitoring authentication logs can reveal attack attempts. Look for these indicators:

Indicator What It Suggests Example
Many failed login attempts in short duration Brute force or dictionary attack in progress 15 failed attempts in 10 minutes from same IP
Login attempts at unusual times Automated attack or attacker in different timezone Login attempts at 3:00 AM on weekday
Login attempts from unknown devices Unauthorized access attempt Device named "Laptop1" not matching family naming convention

Real-World Scenario: Router Log Analysis

📊 Scenario 1B: Analyzing a Wi-Fi Authorization Log

Your internet games are running slowly. You check your Wi-Fi router's authorization log:

Entry Date/Time Device Name Device Address Result
1 03-03-25 09:25:34 Rivera Tablet 1 192.168.78.15 Success
2 03-03-25 10:08:17 Rivera E-Reader 1 192.168.78.23 Success
3 03-05-25 17:03:10 Rivera Gaming Device 1 192.168.78.62 Success
4-14 03-10-25 02:17:23 to 02:31:52 Laptop 1 213.47.12.73 11 Failures
15 03-10-25 02:33:44 Laptop 1 213.47.12.73 Success ⚠️
16 03-10-25 19:47:48 Rivera Phone 1 192.168.78.51 Success
🚨 Analysis: Attack Detected!
  • Naming pattern violation: "Laptop 1" doesn't follow the "Rivera" naming convention
  • External IP address: 213.47.12.73 is not in the local 192.168.x.x range
  • Unusual time: Attempts occurred at 2:17 AM
  • Multiple failures then success: Classic brute-force pattern—11 failures followed by successful login
  • Rapid attempts: All failures occurred within ~15 minutes

Why Password Attacks Work: Common Password Patterns

Many users create predictable passwords, making them vulnerable to attack:

❌ Weak Password Patterns
  • Starting with one or two words + two-digit year + special character at end
    Fluffy2023!
  • Including family or pet names
    MaxTheDog
  • Including personally significant dates
    Birthday0315
  • Using dictionary words with simple substitutions
    P@ssw0rd
✓ Strong Password Practices
  • Longer passwords (12+ characters)
  • Random combinations without personal significance
  • Mix of uppercase, lowercase, numbers, symbols
  • Special characters spread throughout, not just at end
  • Use a password manager to generate and store

Strengthening Authentication

🔐 Multifactor Authentication (MFA)

MFA requires the user to provide extra proof of identity—such as a one-time code sent to their phone—in addition to the password. Even if an adversary steals the password, they can't log in without the second factor.

Authentication factors include:

  • Something you know: Password, PIN, security question
  • Something you have: Phone, security key, smart card
  • Something you are: Fingerprint, face scan, voice recognition
✅ Exam Tip

The AP exam often presents log file analysis questions. Practice identifying: (1) naming convention violations, (2) IP address anomalies (local vs external), (3) time-based patterns, and (4) success after multiple failures. These are classic indicators of compromise (IoCs).

1.3 The Dangers of Public Wi-Fi

Public Wi-Fi networks at coffee shops, airports, and hotels present significant security risks. Adversaries can exploit these networks to intercept data, steal credentials, and compromise devices.

Types of Adversaries

Adversaries can be classified by their skill levels and motivations:

Adversary Type Skill Level Characteristics
Low-Skilled Adversaries
(Script Kiddies)
Low Rely on malicious cyber tools created by others that can be purchased online. The tools exploit known vulnerabilities. Don't understand how the tools work internally.
High-Skilled Adversaries High Can create new malicious tools or modify existing ones. Can discover undocumented vulnerabilities (zero days). Adapt to new defensive techniques.
💡 Adversary Motivations

Adversaries have varied motivations including: greed (financial gain), desire for recognition (reputation in hacker communities), dedication to a cause (hacktivism), revenge (disgruntled employees), politics (nation-state actors), or beliefs (ideological hackers).

Wireless Cyberattacks

👿 Evil Twin Attack

An adversary sets up their own wireless access point (WAP) with a service set identifier (SSID) similar or identical to a target network. This fake network is called the "evil twin."

How it works: Victims unknowingly connect to the evil twin, allowing the adversary to capture all their network traffic.

Example

Legitimate network: "Sunshine Coffee Wi-Fi"
Evil twin: "Sunshine Wi-Fi" or "Sunshine Coffee Free Wi-Fi"

📡 Jamming Attack (Denial of Service)

An adversary floods an area with a strong electromagnetic (EM) signal in the same frequency range as the wireless network, which prevents legitimate traffic between the access point and users.

Type: This is a Denial of Service (DoS) attack—it makes a system unavailable to authorized users.

🚗 War Driving Attack

Adversaries try to detect wireless network beacons while driving or walking around a target area. If a wireless signal is detected, the adversary can:

  • Gather information about the type of wireless network used
  • Find areas where the wireless signal extends outside the physical building
  • Identify potential entry points for attacks

Real-World Scenario: Evil Twin Attack

☕ Scenario 1C: The Coffee Shop Attack

You bring a friend to Sunshine Coffee to study. Your friend joins a free Wi-Fi network and logs into a streaming music app. After a few minutes, the music stops and they're logged out. When they try to log back in, it says their password is invalid.

You check their Wi-Fi settings and see they connected to "Sunshine Wi-Fi"—but the real coffee shop network is "Guest Wi-Fi".

🚨 What Happened

Your friend connected to an adversary's evil twin network. The adversary:

  1. Captured all your friend's network traffic (including username and password)
  2. Logged in to the streaming service as your friend
  3. Changed the password, locking your friend out

Protecting Yourself from Wireless Attacks

🛡️ Protective Measures

  • Verify network names exactly - Character by character, confirm you're connecting to the legitimate network
  • Avoid unprotected networks - Networks that don't require a password are higher risk
  • Use a VPN - A Virtual Private Network encrypts all your traffic, so even if intercepted, it can't be read
  • Disable auto-connect - Prevent your device from automatically joining known networks
  • Use HTTPS websites - Look for the lock icon; encrypted connections protect your data
Virtual Private Network (VPN): A technology that encrypts all network traffic between your device and a VPN server, creating a secure "tunnel" through which your data travels. Even if an adversary intercepts your traffic on an evil twin network, they cannot read the encrypted content.

1.4 AI-Based Cybersecurity Attacks

Artificial intelligence is transforming the cybersecurity landscape—unfortunately, this includes empowering adversaries with new and more effective attack methods. Understanding how AI is weaponized helps defenders prepare appropriate countermeasures.

How Adversaries Use AI

🎭 Voice and Image Cloning (Deepfakes)

Adversaries can use AI-powered tools that leverage existing voice and image samples of a person to create a digital avatar that can impersonate them.

Impact: Financial loss from impersonation scams, sharing of sensitive information with fake identities, and bypassing voice-based authentication systems.

📧 AI-Generated Phishing

Adversaries can use generative AI tools (like large language models/LLMs) to create convincing phishing messages in any target language.

Why this matters: Traditional phishing was often written by non-native speakers, making unnatural language a detection signal. AI-generated phishing reads naturally, eliminating this red flag.

🔍 AI-Powered Reconnaissance

Adversaries can use AI-powered tools to scan the internet and gather information posted on social media and public websites about potential targets.

Usage: Building detailed profiles for spear-phishing, finding security questions answers, identifying relationships for impersonation attacks.

💻 AI-Assisted Malware Development

Adversaries can use AI-enhanced coding tools to:

  • Write new malware faster
  • Modify existing application code for malicious purposes
  • Find vulnerabilities in large code bases

🤖 Prompt Injection & Data Extraction

Adversaries can craft prompts that extract secure or sensitive information from LLMs. This information may come from user input or the large datasets used to train the models.

📰 Training Data Poisoning

Adversaries can publish websites or modify existing websites to contain false information so that it will be included in the training sets for LLMs, causing the models to repeat false information.

Real-World Scenario: AI Voice Clone Scam

📞 Scenario 1D: The Bail Money Scam

You receive a call from a frantic relative: "Are you okay? Did you get the money I sent?" They explain you called them earlier, claiming you'd been arrested and needed bail money. You explain you never called them—you've been home all day.

What really happened:

  1. An adversary found your social media account with video posts
  2. They scraped voice samples from your posts
  3. They used AI voice cloning to create a fake version of your voice
  4. They called your relative, impersonated you, and convinced them to wire money

Protecting Against AI-Augmented Attacks

🛡️ Defensive Measures

  • Establish shared secrets: Create a secret word or phrase known only to you and close family/friends to verify identity in high-stakes situations
  • Enable MFA: If an adversary clones your voice for authentication, a second factor can still prevent access
  • Don't enter sensitive data into AI tools: Some AI tools feed user input back into training; adversaries could extract it
  • Verify AI output: Cross-check information from AI with reputable, non-AI sources
  • Be cautious with friend requests: Verify that online connections are who they claim to be
⚠️ Family Safety Tip

Establish a family "safe word" that only family members know. If someone claims to be a family member asking for money or sensitive information, ask for the safe word before taking action. This simple measure can prevent AI voice clone scams.

1.5 Leveraging AI in Cyber Defense

While adversaries use AI offensively, cyber defenders are leveraging the same technologies to protect networks, applications, and data. AI enables faster detection, smarter analysis, and more effective response to threats.

AI for Protecting Systems

🔧 Security Configuration Review

AI tools can review current security configurations (like firewall rules and access controls) and recommend more secure options.

Important: Recommendations should always be checked by a knowledgeable security technician before being implemented. AI can suggest, but humans must verify.

🐛 Code Vulnerability Analysis

AI-powered tools can analyze application code to identify vulnerabilities and recommend mitigations. This helps catch security issues before software is deployed.

Important: Recommendations should always be reviewed by a knowledgeable programmer before being implemented.

📋 Detection Rule Suggestions

AI-powered tools can suggest rules for automated detection systems, helping security teams identify new attack patterns more quickly.

Important: Detection rules should always be reviewed by a knowledgeable detection engineer before being added to a system.

AI for Threat Detection and Response

The Scale Problem: Networks generate millions of digital events daily. Humans cannot carefully examine all events to identify malicious activity hidden within normal traffic. AI solves this by analyzing events at machine speed.

⚡ Rapid Event Analysis

AI-powered tools can be trained to quickly analyze digital events and sort malicious activity from harmless events. What would take humans days to review, AI can process in seconds.

🚨 Automated Alerting and Response

AI-powered tools can be programmed to:

  • Alert human cybersecurity personnel when likely malicious activity is detected
  • Take specific corrective actions automatically based on the type of threat
  • Block suspicious IP addresses or quarantine infected systems

🕐 Faster Incident Response

AI-powered tools enable threat-detection and response teams to catch malicious activity and intervene quickly to prevent loss, harm, damage, and destruction to digital infrastructure and data.

Real-World Scenario: AI Code Review

💻 Scenario 1E: Securing a Web Application

Your company is developing a new web application for customer orders. Before launching, you use an AI-powered tool to review the code for security vulnerabilities.

Results: The AI flags several vulnerabilities where user input is being copied directly into database requests. Adversaries could exploit these to access the warehouse database or modify data.

Recommendation: The AI suggests code changes to validate and sanitize user inputs before passing commands to the database.

Process: The software development team reviews the AI's recommendations, implements appropriate fixes, and tests the application before deployment.

💡 Human-AI Collaboration

Notice the common theme: AI suggests and assists, but humans review and decide. This human-in-the-loop approach combines AI's speed and pattern recognition with human judgment and context awareness. The AP exam emphasizes that AI tools are aids to cybersecurity professionals, not replacements for them.

✅ Exam Tip

The AP Cybersecurity exam includes "Collaborate" as one of the four core skills, specifically mentioning collaboration "with AI." Understand both the benefits of AI tools (speed, scale, pattern detection) and their limitations (require human review, can be wrong, need training data).

📝 Unit 1 Practice Questions

Test your understanding with these exam-style questions. Click "Show Answer" to check your work.

1 Multiple Choice

A user receives an email claiming their account will be suspended unless they click a link within 24 hours. Which psychological tactic is PRIMARILY being used?

  • A) Authority
  • B) Consensus
  • C) Scarcity
  • D) Urgency combined with Intimidation

Answer: D

Explanation: This attack combines two tactics: urgency (24-hour deadline) and intimidation (threat of account suspension). The time pressure prevents careful consideration while the negative consequence motivates immediate action. This combination is extremely common in phishing attacks.

2 Multiple Choice

An adversary sets up a wireless access point named "Airport_Free_WiFi" near an airport that already has a legitimate network called "Airport Free Wi-Fi". What type of attack is this?

  • A) Jamming attack
  • B) War driving attack
  • C) Evil twin attack
  • D) Brute force attack

Answer: C

Explanation: An evil twin attack involves creating a fake wireless access point with an SSID similar or identical to a legitimate network. Users who connect to the evil twin have their traffic captured by the adversary. Note the subtle difference in naming (underscores vs spaces).

3 Multiple Choice

Which of the following is an indicator that a password attack may be occurring on a Wi-Fi network?

  • A) A single successful login from a known device
  • B) Multiple failed login attempts in a short period from an unknown device
  • C) Slow internet speeds during peak usage hours
  • D) A device connecting at the same time every day

Answer: B

Explanation: Multiple failed login attempts in a short period from an unknown device is a classic indicator of a brute force or dictionary password attack. The attacker is trying multiple password combinations. The device being unknown adds to the suspicion.

4 Multiple Choice

An adversary who uses pre-built hacking tools purchased online without understanding how they work would be classified as:

  • A) A high-skilled adversary
  • B) A low-skilled adversary (script kiddie)
  • C) A nation-state actor
  • D) An insider threat

Answer: B

Explanation: Low-skilled adversaries (also called "script kiddies") rely on malicious cyber tools created by others without understanding how the tools work internally. They typically exploit known vulnerabilities using readily available tools.

5 Multiple Choice

How can AI-powered tools help adversaries create more effective phishing messages?

  • A) By automatically sending messages to millions of recipients
  • B) By generating grammatically correct messages in any target language
  • C) By encrypting the phishing messages
  • D) By blocking spam filters

Answer: B

Explanation: AI (specifically Large Language Models) can generate phishing messages that read as if written by a native speaker in any language. This eliminates the grammatical errors that were traditionally a red flag for identifying phishing attempts.

6 Multiple Choice

Which defense would BEST protect against an AI voice cloning scam where an adversary impersonates a family member?

  • A) Using a VPN when browsing the internet
  • B) Enabling multifactor authentication on all accounts
  • C) Establishing a secret word known only to family members
  • D) Never posting videos on social media

Answer: C

Explanation: A shared secret word that only family members know can be used to verify identity. When someone claiming to be a family member asks for money or help, you can request the secret word. An AI voice clone cannot know this private information.

7 Multiple Choice

When AI-powered tools suggest security configuration changes, what is the recommended best practice?

  • A) Implement all suggestions automatically without review
  • B) Ignore AI suggestions and rely only on human analysis
  • C) Have a knowledgeable security technician review before implementing
  • D) Only implement suggestions that don't require system changes

Answer: C

Explanation: AI tools should assist human decision-making, not replace it. All AI recommendations should be reviewed by knowledgeable professionals before implementation. This human-in-the-loop approach combines AI's speed with human judgment and contextual understanding.

8 Free Response

Analyze the following email for social engineering tactics. Identify at least THREE specific indicators that suggest this is a phishing attempt, and explain which psychological tactics are being used.

From: security-alert@amaz0n-verify.com
Subject: [ACTION REQUIRED] Your Account Has Been Compromised!

Dear Valued Customer,

We have detected unusual activity on your Amazon account. Someone 
may have accessed your account from an unrecognized device.

To prevent your account from being permanently disabled, you MUST 
verify your identity within 12 hours by clicking the link below:

[Verify My Account Now]

If you do not take action, your account will be suspended and all 
pending orders will be cancelled.

This is an automated security message. Do not reply.

Amazon Security Team

Sample Response:

Indicator 1 - Spoofed Domain: The sender address "amaz0n-verify.com" uses a zero instead of the letter 'o' and is not an official Amazon domain. Legitimate Amazon emails come from amazon.com domains.

Indicator 2 - Urgency Tactic: The email creates artificial time pressure with "within 12 hours" and "ACTION REQUIRED." This urgency prevents the recipient from carefully considering whether the email is legitimate.

Indicator 3 - Intimidation Tactic: The email threatens negative consequences ("permanently disabled," "account will be suspended," "orders will be cancelled") to frighten the recipient into complying without thinking.

Indicator 4 - Vague Claims: The email mentions "unusual activity" and "unrecognized device" without providing specific details that a legitimate security alert would include.

Indicator 5 - Authority Tactic: The email impersonates a trusted brand (Amazon) and claims to be from the "Security Team" to establish credibility.

9 Free Response

A user is traveling and needs to connect to public Wi-Fi at a coffee shop to check their bank account. Describe THREE specific actions they should take to protect themselves, and explain why each action helps.

Sample Response:

Action 1 - Verify the Network Name: The user should ask an employee for the exact network name and verify it character-by-character before connecting. This protects against evil twin attacks where adversaries create networks with similar names to capture traffic.

Action 2 - Use a VPN: The user should enable a Virtual Private Network before accessing sensitive information. A VPN encrypts all traffic between the device and the VPN server, so even if an adversary intercepts the traffic, they cannot read the encrypted content.

Action 3 - Verify HTTPS/Check for the Lock Icon: Before entering banking credentials, the user should verify the website uses HTTPS (indicated by a lock icon in the browser). This ensures the connection between the browser and the bank's server is encrypted, providing an additional layer of protection.

Optional Action 4 - Avoid Unprotected Networks: If the network doesn't require a password, the user should avoid connecting entirely and use cellular data instead, as unprotected networks offer no encryption at the network level.

10 Free Response

Explain how AI is used by BOTH adversaries and defenders in cybersecurity. Provide ONE example of how adversaries use AI offensively and ONE example of how defenders use AI to protect systems.

Sample Response:

Adversary Use of AI: Adversaries use AI-powered voice cloning tools to create digital avatars that can impersonate real people. By gathering voice samples from a target's social media posts, adversaries can generate realistic voice clones and use them to conduct phone scams—for example, calling a target's relatives and pretending to be the target to request emergency money. This is effective because the voice sounds authentic, bypassing the natural skepticism people might have toward written requests.

Defender Use of AI: Defenders use AI-powered threat detection systems to analyze millions of network events that occur daily. The AI can quickly sort through these events and distinguish between normal traffic and potentially malicious activity. When likely malicious activity is detected, the AI can alert human security personnel or automatically take corrective actions like blocking suspicious IP addresses. This is valuable because humans cannot manually review the volume of events that modern networks generate, but AI can process them at machine speed while identifying patterns that indicate attacks.

AP Cybersecurity Study Guide | APCSExamPrep.com

AP® is a registered trademark of the College Board, which was not involved in the production of this guide.

Contact form