Crossword Puzzle 2

12345678910
Across
  1. 3. A step-by-step procedure for solving a problem or accomplishing a task.
  2. 5. A network of compromised computers controlled by a hacker.
  3. 7. A subset of AI that enables systems to learn from data without explicit programming.
  4. 8. An AI system inspired by the human brain, used for complex pattern recognition. VULNERABILITY A weakness in a system that can be exploited by an attacker. CLOUD COMPUTING Delivering on-demand computing services over the internet
  5. 9. A deceptive attempt to obtain sensitive information like usernames and passwords.
  6. 10. Converting data into a code to prevent unauthorized access.
Down
  1. 1. Software designed to damage or disable computer systems.
  2. 2. The process of verifying a user's identity.
  3. 4. A system designed to prevent unauthorized access to or from a private network.
  4. 5. Security measures based on unique physical characteristics.
  5. 6. A group of connected computers allowing sharing of resources.