Across
- 4. Unauthorized access, use, and modification to software, computer system, and/or network.
- 7. an authentication process that permits a user to use one set of login credentials.
- 8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 9. A video, image, or audio recording created using AI that makes it look like someone said or did something they didn’t.
- 13. Technology that allows computers to perform tasks that normally require human intelligence
- 15. The ability to verify the identity of an entity/individual.
- 16. Using technology to perform tasks automatically without human involvement.
Down
- 1. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- 2. The information used to teach an AI model how to recognize patterns or make decisions.
- 3. A type of AI where computers learn from data and improve their performance over time without being directly programmed for every step.
- 5. AI that creates new content such as text, images, music, or video.
- 6. When an AI gives false or made-up information but presents it as if it were true.
- 9. privacy Protecting personal information from being collected or used without permission.
- 10. The input or instruction given to an AI system to guide its response.
- 11. When an AI system produces unfair or inaccurate results because of the data it was trained on.
- 12. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information
- 14. Protection of information from being shared to unauthorized systems, entities, or individuals.
