Across
- 1. AI-created fake images, videos, or audio
- 3. Rules and processes for managing systems or organizations
- 5. Actions taken to protect against threats
- 8. Ability to control your own technology and data
- 10. Releasing a system or feature to users
- 11. Ability of a system to learn or reason
- 12. Fake emails or messages used to steal user data
- 13. Software designed to harm or exploit a system
Down
- 2. Cyber attacks that use AI to automate or improve attacks
- 4. Safety rules that limit what an AI system can do
- 5. Data used to authenticate a user
- 6. Controlled or executed by code
- 7. The part of code that carries out the main action
- 9. Secretly collecting sensitive information
- 11. Unauthorized use or violation of rules
