Across
- 2. Machine learning using deep neural networks with many layers. (2 Words - between words)
- 3. Packaging apps and dependencies into portable, isolated containers.
- 5. Controls network traffic based on security policies.
- 6. Transforming plaintext into ciphertext using cryptographic keys.
- 8. Model memorizes noise in training data, hurting generalization.
- 12. Security Information and Event Management for log aggregation and analytics.
- 13. — Security model enforcing continuous verification and least privilege
- 15. AI field enabling computers to understand and generate human language. (3 Words - between words)
- 17. Public Key Infrastructure that manages certificates and trust.
- 18. Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
- 1. Trusted entity that issues and validates digital certificates. (2 Words - between words)
- 4. Single software instance serves multiple customers with isolation. (2 Words - between words)
- 7. Automated coordination/management of services, containers, and workloads.
- 9. Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
- 10. Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
- 11. Algorithm that performs encryption and decryption.
- 14. Access Control List defining allowed/denied permissions.
- 16. Cloud model delivering virtualized compute, storage, and networking.
