Data, Algorithms, Cybersecurity, and Global Impacts

12345678910111213141516171819202122232425262728293031323334353637383940414243
Across
  1. 1. An asymmetric encryption system where a different key is used for encryption and decryption.
  2. 3. Information about an individual that identifies, links, relates, or describes them.
  3. 4. Decision problem for which an algorithm can be written to produce a correct output for all inputs.
  4. 7. An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
  5. 8. A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
  6. 11. Finite set of instructions that accomplish a specific task.
  7. 14. Data about data.
  8. 16. Problem with the goal of finding the "best" solution among many.
  9. 17. Computer programs that can block, detect, and remove virus and other malware.
  10. 19. A broad term for datasets so large or complex that traditional data processing applications are inadequate.
  11. 21. A scheme in which the key to encrypt data is different from the key to decrypt.
  12. 22. A technique for encrypting data where the same key is used to both encrypt and decrypt data.
  13. 23. A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
  14. 25. The time used to complete a task sequentially divided by the time to complete a task in parallel.
  15. 28. Copyrighted software that is given for free by the author or copyright owner.
  16. 29. An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
  17. 31. A model in which programs are run by multiple devices.
  18. 33. A process that reverses encryption, taking a secret message and reproducing the original plain text.
  19. 36. A model in which programs run in order, one command at a time.
  20. 37. The act of attempting to decode a secret message without knowing all the specifics of the cipher.
  21. 40. A technique that attempts to trick a user into providing personal information.
  22. 41. An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
  23. 42. In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
  24. 43. A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
  1. 1. General description of a task that can (or cannot) be solved with an algorithm.
  2. 2. Data that does not accurately reflect the full population or phenomenon being studied.
  3. 5. A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
  4. 6. Application of each step of an algorithm in the order in which the code statements are given.
  5. 9. A measure of how many steps are needed to complete an algorithm.
  6. 10. Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
  7. 12. Software intended to damage a computing system or to take partial control over its operation.
  8. 13. In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
  9. 15. An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
  10. 18. Problem with a yes/no answer.
  11. 20. A process of encoding messages to keep them secret, so only "authorized" parties can read it.
  12. 24. Data that can be freely used, re-used and redistributed by anyone.
  13. 26. A model in which programs are broken into small pieces, some of which are run simultaneously.
  14. 27. Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
  15. 30. Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
  16. 32. A relationship between two pieces of data.
  17. 34. The practice of obtaining input or information from a large number of people via the Internet.
  18. 35. Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
  19. 38. Process that makes the data uniform without changing its meaning.
  20. 39. A malicious program that can copy itself and gain access to a computer in an unauthorized way.