James HW 1/25

1234567891011
Across
  1. 2. he development of computer systems capable of performing tasks that normally require human intelligence.
  2. 5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. 6. The simulated cyberattack on a computer system to evaluate its security.
  4. 9. a method or algorithm for transforming plaintext (readable data) into ciphertext (encoded or encrypted data) to secure communication or protect information.
  5. 10. The process of verifying the identity of a user, system, or application before granting access.
Down
  1. 1. Large and complex datasets that are difficult to manage and analyze using traditional data processing applications.
  2. 3. The practice of protecting computer systems, networks, and data from security breaches and unauthorized access.
  3. 4. The study and practice of techniques for securing communication and data through the use of codes and ciphers.
  4. 7. Malicious software that attaches itself to a host program and can replicate itself to spread to other programs.
  5. 8. A form of social engineering where attackers trick individuals into divulging sensitive information by pretending to be a trustworthy entity.
  6. 11. A collection of computers and other devices connected for the purpose of sharing resources and information