Risk Interest Groups

123456789101112131415161718
Across
  1. 2. Machine learning using deep neural networks with many layers. (2 Words - between words)
  2. 3. Packaging apps and dependencies into portable, isolated containers.
  3. 5. Controls network traffic based on security policies.
  4. 6. Transforming plaintext into ciphertext using cryptographic keys.
  5. 8. Model memorizes noise in training data, hurting generalization.
  6. 12. Security Information and Event Management for log aggregation and analytics.
  7. 13. — Security model enforcing continuous verification and least privilege
  8. 15. AI field enabling computers to understand and generate human language. (3 Words - between words)
  9. 17. Public Key Infrastructure that manages certificates and trust.
  10. 18. Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
  1. 1. Trusted entity that issues and validates digital certificates. (2 Words - between words)
  2. 4. Single software instance serves multiple customers with isolation. (2 Words - between words)
  3. 7. Automated coordination/management of services, containers, and workloads.
  4. 9. Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
  5. 10. Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
  6. 11. Algorithm that performs encryption and decryption.
  7. 14. Access Control List defining allowed/denied permissions.
  8. 16. Cloud model delivering virtualized compute, storage, and networking.