Across
- 3. A step-by-step procedure for solving a problem or accomplishing a task.
- 5. A network of compromised computers controlled by a hacker.
- 7. A subset of AI that enables systems to learn from data without explicit programming.
- 8. An AI system inspired by the human brain, used for complex pattern recognition. VULNERABILITY A weakness in a system that can be exploited by an attacker. CLOUD COMPUTING Delivering on-demand computing services over the internet
- 9. A deceptive attempt to obtain sensitive information like usernames and passwords.
- 10. Converting data into a code to prevent unauthorized access.
Down
- 1. Software designed to damage or disable computer systems.
- 2. The process of verifying a user's identity.
- 4. A system designed to prevent unauthorized access to or from a private network.
- 5. Security measures based on unique physical characteristics.
- 6. A group of connected computers allowing sharing of resources.
