AI & IT key words
Across
- 1. Software that acts as a bridge between an operating system or database and applications
- 4. a secret method of bypassing normal authentication or encryption in a computer system
- 6. the delay before a transfer of data begins following an instruction.
- 9. A secure "tunnel" used to encrypt a user's connection to a network.
- 12. A program that looks legitimate but contains a hidden malicious function.
- 13. A highly targeted phishing attack aimed at senior executives or "big fish" (CEOs, CFOs) to steal large sums of money or highly sensitive data
- 16. The act of following laws, regulations, and ethical guidelines (like GDPR)
- 19. Malware that locks your files and demands money for the key.
- 20. An incident where data is stolen, accessed, or exposed by an unauthorized person.
Down
- 2. A set of tools used by hackers to gain deep, hidden control over a computer.
- 3. A collection of compromised computers controlled remotely to perform massive attacks.
- 5. Software that secretly monitors a user's activity and collects personal info.
- 7. A security measure where a computer or network is physically isolated from the unsecured internet or other local networks.
- 8. A simulated cyberattack performed to evaluate the security of a system.
- 10. An isolated environment where suspicious code can be executed safely without risk to the system.
- 11. The action of reducing the severity, seriousness, or paintfulness of a security risk.
- 14. A set of rules that defines how data is transmitted between devices.
- 15. The maximum rate of data transfer across a given path
- 17. A deceptive technique using fake emails to steal sensitive data or login credentials.
- 18. Technical term for body measurements and calculations related to human characteristics used for identification