AI & IT key words

1234567891011121314151617181920
Across
  1. 1. Software that acts as a bridge between an operating system or database and applications
  2. 4. a secret method of bypassing normal authentication or encryption in a computer system
  3. 6. the delay before a transfer of data begins following an instruction.
  4. 9. A secure "tunnel" used to encrypt a user's connection to a network.
  5. 12. A program that looks legitimate but contains a hidden malicious function.
  6. 13. A highly targeted phishing attack aimed at senior executives or "big fish" (CEOs, CFOs) to steal large sums of money or highly sensitive data
  7. 16. The act of following laws, regulations, and ethical guidelines (like GDPR)
  8. 19. Malware that locks your files and demands money for the key.
  9. 20. An incident where data is stolen, accessed, or exposed by an unauthorized person.
Down
  1. 2. A set of tools used by hackers to gain deep, hidden control over a computer.
  2. 3. A collection of compromised computers controlled remotely to perform massive attacks.
  3. 5. Software that secretly monitors a user's activity and collects personal info.
  4. 7. A security measure where a computer or network is physically isolated from the unsecured internet or other local networks.
  5. 8. A simulated cyberattack performed to evaluate the security of a system.
  6. 10. An isolated environment where suspicious code can be executed safely without risk to the system.
  7. 11. The action of reducing the severity, seriousness, or paintfulness of a security risk.
  8. 14. A set of rules that defines how data is transmitted between devices.
  9. 15. The maximum rate of data transfer across a given path
  10. 17. A deceptive technique using fake emails to steal sensitive data or login credentials.
  11. 18. Technical term for body measurements and calculations related to human characteristics used for identification