Across
- 3. Access Control List defining allowed/denied permissions.
- 6. Single software instance serves multiple customers with isolation.
- 8. Public Key Infrastructure that manages certificates and trust.
- 9. Algorithm that performs encryption and decryption.
- 11. Cryptographic proof of data integrity and signer authenticity.
- 14. Learning Algorithms that learn patterns from data to make predictions/decisions.
- 15. AI Models that create new content (text, images, code) from learned patterns.
- 16. Language Processing AI field enabling computers to understand and generate human language.
- 17. Cloud model delivering virtualized compute, storage, and networking.
Down
- 1. Automated coordination/management of services, containers, and workloads.
- 2. Model memorizes noise in training data, hurting generalization.
- 4. Authority Trusted entity that issues and validates digital certificates.
- 5. Learning Machine learning using deep neural networks with many layers.
- 7. Packaging apps and dependencies into portable, isolated containers.
- 10. Controls network traffic based on security policies.
- 12. Security Information and Event Management for log aggregation and analytics.
- 13. Transforming plaintext into ciphertext using cryptographic keys.
