Across
- 2. Rules for online behavior
- 3. Unintended data use
- 5. The result of encryption.
- 6. Used to encrypt and decrypt data.
- 8. Software that damages computers
- 11. Data collected about you
- 13. Unwanted email
- 14. To convert encrypted data back to its original form.
- 16. Code that scrambles data
- 18. The goal of encryption.
- 19. Automated decision making
Down
- 1. Illegal access to computer systems
- 2. Online identity theft
- 3. between those who have and don't have tech access
- 4. Protecting computer systems
- 7. Study of ethical choices in computing
- 9. A process used in encryption.
- 10. The process of encoding data.
- 12. A system or way of doing something, like encryption.
- 15. What is protected by encryption.
- 17. To convert data into a code.
