Across
- 4. A technique that identifies anomalies by learning normal system behavior.
- 6. A strategy that uses decoy systems to mislead potential attackers.
- 9. A method that detects patterns without pre‐labelled data.
- 12. A general term for software designed to damage or exploit systems.
- 13. The process of converting unstructured text into structured threat intelligence.
- 15. An algorithm that groups similar data points without prior labels.
- 16. A process of embedding hidden messages within non-secret data.
- 18. A generative model used in adversarial defense strategies.
- 19. A decentralized ledger technology that records transactions securely.
- 23. A deceptive email tactic aiming to steal sensitive information.
- 25. A vulnerability exploited before any patch becomes available.
- 26. A method used to scramble data so only authorised parties can read it.
- 27. A process that identifies deviations from normal system behavior.
- 30. A simulated attack conducted to assess a system’s security.
- 32. An attack strategy that manipulates inputs to avoid detection.
- 33. A computing paradigm with the potential to break current cryptographic systems.
- 34. A short-lived digital key that grants temporary access to a system.
- 36. The process of integrating security measures early in the development cycle.
- 37. An autoencoder variant adept at detecting long-term attack patterns.
- 38. A security barrier that filters incoming and outgoing network traffic.
- 40. A security model that denies trust by default.
- 42. A learning technique that uses labelled training data.
- 46. Short abbreviation for a cyberattack that persists undetected.
- 47. A technique that examines user actions to detect irregular behavior.
- 48. A systematic method for testing systems to uncover vulnerabilities.
Down
- 1. The standard established for normal system behavior to flag outliers.
- 2. A type of malware that locks files until a ransom is paid.
- 3. A learning approach where systems adapt through trial and error.
- 5. A GAN-based framework that sanitizes adversarial inputs.
- 7. A decoy system designed to lure attackers away from real assets.
- 8. Coordinated automation of multi-step incident response workflows.
- 10. Neural networks that automatically extract complex features from data.
- 11. An approach combining CNN and RNN for enhanced threat detection.
- 14. A neural network variant particularly effective at visual data analysis.
- 17. The process of confirming a user’s or device’s identity.
- 20. A practice that limits user rights to only what is necessary.
- 21. A technique for extracting actionable intelligence from text.
- 22. The practice of quantifying and managing potential security risks.
- 23. A technique that maps adversarial inputs to a learned data manifold.
- 24. The security centre challenged by overwhelming daily alerts.
- 28. A sequence of operations used to process or secure data.
- 29. A model that integrates spatial and temporal data for threat detection.
- 31. A framework that maps tactics and techniques in cyberattacks.
- 35. A tool that suggests security-focused improvements during code writing.
- 36. The process of cleansing inputs by projecting them onto benign data.
- 39. A software solution that detects and removes malicious programs.
- 41. A network model that captures sequential dependencies in data.
- 43. A device that directs data between networks while managing traffic.
- 44. Abbreviation for analytics that monitor user behavior for anomalies.
- 45. A system designed to monitor network traffic for suspicious activities.
