James HW 1/25
Across
- 2. he development of computer systems capable of performing tasks that normally require human intelligence.
- 5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 6. The simulated cyberattack on a computer system to evaluate its security.
- 9. a method or algorithm for transforming plaintext (readable data) into ciphertext (encoded or encrypted data) to secure communication or protect information.
- 10. The process of verifying the identity of a user, system, or application before granting access.
Down
- 1. Large and complex datasets that are difficult to manage and analyze using traditional data processing applications.
- 3. The practice of protecting computer systems, networks, and data from security breaches and unauthorized access.
- 4. The study and practice of techniques for securing communication and data through the use of codes and ciphers.
- 7. Malicious software that attaches itself to a host program and can replicate itself to spread to other programs.
- 8. A form of social engineering where attackers trick individuals into divulging sensitive information by pretending to be a trustworthy entity.
- 11. A collection of computers and other devices connected for the purpose of sharing resources and information