Risk Interest Group

1234567891011121314151617
Across
  1. 3. Access Control List defining allowed/denied permissions.
  2. 6. Single software instance serves multiple customers with isolation.
  3. 8. Public Key Infrastructure that manages certificates and trust.
  4. 9. Algorithm that performs encryption and decryption.
  5. 11. Cryptographic proof of data integrity and signer authenticity.
  6. 14. Learning Algorithms that learn patterns from data to make predictions/decisions.
  7. 15. AI Models that create new content (text, images, code) from learned patterns.
  8. 16. Language Processing AI field enabling computers to understand and generate human language.
  9. 17. Cloud model delivering virtualized compute, storage, and networking.
Down
  1. 1. Automated coordination/management of services, containers, and workloads.
  2. 2. Model memorizes noise in training data, hurting generalization.
  3. 4. Authority Trusted entity that issues and validates digital certificates.
  4. 5. Learning Machine learning using deep neural networks with many layers.
  5. 7. Packaging apps and dependencies into portable, isolated containers.
  6. 10. Controls network traffic based on security policies.
  7. 12. Security Information and Event Management for log aggregation and analytics.
  8. 13. Transforming plaintext into ciphertext using cryptographic keys.