Unit 4 Review APCSP

1234567891011121314151617181920
Across
  1. 3. Method of encryption that does not require a secure channel to exchange keys
  2. 5. Pop Up Advertisements
  3. 6. Identifying and correcting errors and inconsistencies in data
  4. 8. Attempt to trick a user into divulging their private information
  5. 12. software intended to damage a computing system or to take partial control over its operation
  6. 15. Steals data and sends it back to malware creators
  7. 16. Social Media,Phones, Laptops, WWW, email are all types of...
  8. 18. Name, birthday, social security, address, etc.
  9. 19. System that monitors incoming and outgoing network traffic
  10. 20. What people look for when analyzing big data?
Down
  1. 1. Exhausting all possible combinations
  2. 2. Wireless access point that gives unauthorized access to secure networks.
  3. 4. Finding solutions to problems that would otherwise take forever to solve using only human capabilities
  4. 7. Practice of engaging a group for a common goal
  5. 9. Pair of keys used to encrypt and decrypt
  6. 10. Protects a computer by scanning files and identifying malware
  7. 11. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  8. 13. Holding an computer hostage by encrypting data
  9. 14. Attacks that cause a website to slow down by flooding it with requests
  10. 17. Authentication that requires at least two steps to unlock protected information