AP CSP--Unit 9 (Data) and Unit 10 (Cybersecurity and Global Impact)--A+CR

1234567891011121314151617181920212223242526272829
Across
  1. 10. practice of obtaining information by enlisting a number of people, either paid or unpaid, typically via the internet
  2. 12. software intended to damage a computing system or to take partial control over its operation
  3. 13. idea that some data should be freely available to everyone to use and republish as they wish without restrictions
  4. 17. use of a program to record every keystrike made by a user in order to gain fraudulent access to confidential information
  5. 18. large, more complex data sets, especially from new data sources
  6. 21. simulation in machine that are programmed to think like humans and mimic their actions; term may also be applied to any machine that exhibits traits associated with a human mind
  7. 22. uses ONE key for both encryption and decryption
  8. 24. an application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
  9. 25. attempting to decode a secret message without knowing the specifics of the cipher
  10. 28. data that does not accurately reflect the full population or phenomenon being studied
  11. 29. relationship between two pieces of data, typically referring to the amount that one influences the other
Down
  1. 1. protects a computing system against infection
  2. 2. process of encoding messages to keep them secret, so only "authorized" parties can read it
  3. 3. research conducted in whole or part by distributed individuals, many of whom may not be professionals, who contribut relevant data to research by using their own computers; a special type of crowdsourcing
  4. 4. technique for encryption that shifts the alphabet by some number of characters
  5. 5. wireless access point that gives unauthorized access to secure networks
  6. 6. process that makes the data uniform without changing its meaning
  7. 7. details about an individual that identifies, links, relates, or describes him/her
  8. 8. includes a program as an integral part of its function; can be physical, non-physical computing software, or non-physical computing concepts
  9. 9. method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something he knows), possession (something he has), and inherence (something he is); each step provides a new layer of security
  10. 11. choosing a smaller subset of a data set to use for analysis
  11. 14. process that reverses encryption; takes a secret message and reproduces the original plain text
  12. 15. the collection of facts and patterns extracted from data
  13. 16. uses TWO keys, one for encryption and another for decryption; sender does not need receiver's private key to encrypt message, but receiver's private key is required to decrypt the message
  14. 19. technique that attempts to trick a user into providing personal information that can then be used to access sensitive online resources
  15. 20. the tendency of a statistic to overestimate or underestimate a parameter
  16. 23. generic term for a technique (algorithm) that performs encryption
  17. 26. data about data
  18. 27. reason why something happens