AP CSP--Unit 9 (Data) and Unit 10 (Cybersecurity and Global Impact)--A+CR
Across
- 10. practice of obtaining information by enlisting a number of people, either paid or unpaid, typically via the internet
- 12. software intended to damage a computing system or to take partial control over its operation
- 13. idea that some data should be freely available to everyone to use and republish as they wish without restrictions
- 17. use of a program to record every keystrike made by a user in order to gain fraudulent access to confidential information
- 18. large, more complex data sets, especially from new data sources
- 21. simulation in machine that are programmed to think like humans and mimic their actions; term may also be applied to any machine that exhibits traits associated with a human mind
- 22. uses ONE key for both encryption and decryption
- 24. an application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
- 25. attempting to decode a secret message without knowing the specifics of the cipher
- 28. data that does not accurately reflect the full population or phenomenon being studied
- 29. relationship between two pieces of data, typically referring to the amount that one influences the other
Down
- 1. protects a computing system against infection
- 2. process of encoding messages to keep them secret, so only "authorized" parties can read it
- 3. research conducted in whole or part by distributed individuals, many of whom may not be professionals, who contribut relevant data to research by using their own computers; a special type of crowdsourcing
- 4. technique for encryption that shifts the alphabet by some number of characters
- 5. wireless access point that gives unauthorized access to secure networks
- 6. process that makes the data uniform without changing its meaning
- 7. details about an individual that identifies, links, relates, or describes him/her
- 8. includes a program as an integral part of its function; can be physical, non-physical computing software, or non-physical computing concepts
- 9. method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something he knows), possession (something he has), and inherence (something he is); each step provides a new layer of security
- 11. choosing a smaller subset of a data set to use for analysis
- 14. process that reverses encryption; takes a secret message and reproduces the original plain text
- 15. the collection of facts and patterns extracted from data
- 16. uses TWO keys, one for encryption and another for decryption; sender does not need receiver's private key to encrypt message, but receiver's private key is required to decrypt the message
- 19. technique that attempts to trick a user into providing personal information that can then be used to access sensitive online resources
- 20. the tendency of a statistic to overestimate or underestimate a parameter
- 23. generic term for a technique (algorithm) that performs encryption
- 26. data about data
- 27. reason why something happens