Across
- 1. Data that can be used to identify, locate, or contact individuals
- 3. Converting data into a secure form using algorithms
- 4. Uses a pair of keys, a public key for encryption and a private key for decryption
- 10. A cyber-attack where attackers impersonate legitimate entities
- 12. Research not done by scientists
- 14. Free and unrestricted online access
- 15. Outsourcing ideas to large groups of people via the internet
- 18. AI branch; enables computers to learn
- 19. Consequences that extend beyond original goals
- 21. Monitoring and recording keystrokes on a computer or device
- 22. Generic term for various types of malicious software
Down
- 2. Legal rights and protections for creations of the mind
- 5. Malicious software that infects a computer
- 6. Transformative technologies, systems, and ideas using computation
- 7. Prejudice that influence human decision making or behavior
- 8. Free source code
- 9. Gap between those who have access to modern communication and those who don't
- 11. Allows creators to share their works with specific permission
- 13. Two or more forms of verification
- 16. Electronic documents that verify the authenticity of a website
- 17. Uses a single key to both encrypt and decrypt data
- 20. Unauthorized wireless access point installed on a network
