AI and Cybersecurity

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 4. A technique that identifies anomalies by learning normal system behavior.
  2. 6. A strategy that uses decoy systems to mislead potential attackers.
  3. 9. A method that detects patterns without pre‐labelled data.
  4. 12. A general term for software designed to damage or exploit systems.
  5. 13. The process of converting unstructured text into structured threat intelligence.
  6. 15. An algorithm that groups similar data points without prior labels.
  7. 16. A process of embedding hidden messages within non-secret data.
  8. 18. A generative model used in adversarial defense strategies.
  9. 19. A decentralized ledger technology that records transactions securely.
  10. 23. A deceptive email tactic aiming to steal sensitive information.
  11. 25. A vulnerability exploited before any patch becomes available.
  12. 26. A method used to scramble data so only authorised parties can read it.
  13. 27. A process that identifies deviations from normal system behavior.
  14. 30. A simulated attack conducted to assess a system’s security.
  15. 32. An attack strategy that manipulates inputs to avoid detection.
  16. 33. A computing paradigm with the potential to break current cryptographic systems.
  17. 34. A short-lived digital key that grants temporary access to a system.
  18. 36. The process of integrating security measures early in the development cycle.
  19. 37. An autoencoder variant adept at detecting long-term attack patterns.
  20. 38. A security barrier that filters incoming and outgoing network traffic.
  21. 40. A security model that denies trust by default.
  22. 42. A learning technique that uses labelled training data.
  23. 46. Short abbreviation for a cyberattack that persists undetected.
  24. 47. A technique that examines user actions to detect irregular behavior.
  25. 48. A systematic method for testing systems to uncover vulnerabilities.
Down
  1. 1. The standard established for normal system behavior to flag outliers.
  2. 2. A type of malware that locks files until a ransom is paid.
  3. 3. A learning approach where systems adapt through trial and error.
  4. 5. A GAN-based framework that sanitizes adversarial inputs.
  5. 7. A decoy system designed to lure attackers away from real assets.
  6. 8. Coordinated automation of multi-step incident response workflows.
  7. 10. Neural networks that automatically extract complex features from data.
  8. 11. An approach combining CNN and RNN for enhanced threat detection.
  9. 14. A neural network variant particularly effective at visual data analysis.
  10. 17. The process of confirming a user’s or device’s identity.
  11. 20. A practice that limits user rights to only what is necessary.
  12. 21. A technique for extracting actionable intelligence from text.
  13. 22. The practice of quantifying and managing potential security risks.
  14. 23. A technique that maps adversarial inputs to a learned data manifold.
  15. 24. The security centre challenged by overwhelming daily alerts.
  16. 28. A sequence of operations used to process or secure data.
  17. 29. A model that integrates spatial and temporal data for threat detection.
  18. 31. A framework that maps tactics and techniques in cyberattacks.
  19. 35. A tool that suggests security-focused improvements during code writing.
  20. 36. The process of cleansing inputs by projecting them onto benign data.
  21. 39. A software solution that detects and removes malicious programs.
  22. 41. A network model that captures sequential dependencies in data.
  23. 43. A device that directs data between networks while managing traffic.
  24. 44. Abbreviation for analytics that monitor user behavior for anomalies.
  25. 45. A system designed to monitor network traffic for suspicious activities.