Across
- 2. relationship between two pieces of data
- 7. attack in which a user is tricked into revealing private information
- 8. choosing a smaller subset of data to use for analysis
- 10. protections against threats and unauthorized usage of personal information
- 12. process of encoding messages to keep them secret so that only "authorized" parties can read it
- 14. type of encryption that involves one key for both encryption and decryption
- 15. development of computer systems with algorithms that enable them to learn and adapt based on patterns and inferences from data
- 18. wireless access point that provides an attacker with unauthorized access to the traffic going over a secure network
- 19. type of machine learning where a machine uses labeled input data to map a known target output generally used for solving classification and regression problems
- 21. research conducted in whole or part by distributed individuals using their own computing devices
- 22. type of machine learning where the machine is trained to make decisions in a specific way, usually through trial and error with rewards
- 24. type of encryption that pairs a public key for encryption and private key for decryption
- 25. use of a program to record every keystroke made by a computer in order to gain fraudulent access to confidential info
- 26. data that does not accurately reflect the full population being studied
- 27. small amount of text that tracks information about a user visiting a website
Down
- 1. process that takes a secret message and reproduces the original
- 3. the theory and development of computer systems able to perform tasks and solve problems in a similar manner to human intelligence
- 4. software intended to damage a computing system or take partial control over its operation
- 5. system that requires at least two steps to unlock protected information where each step adds a new layer of security
- 6. type of machine learning where a machine learns from unlabeled data and discovers patterns and features to produce an output
- 9. systematic and repeatable errors in a computer system that create unfair outcomes
- 11. policy allowing people to have public access to documents for reading for data for analysis
- 13. initial data to teach a machine or algorithm to predict outcomes and solve problems
- 16. the right to control how personal information is accessed, used, or shared
- 17. practice of obtaining input or information from a large number of people via the internet
- 20. type of computer malware that can make copies of itself
- 23. a process that makes the data uniform without changing its meaning
