Across
- 2. The SEI has made significant contributions to this engineering discipline, focused on software systems and their architecture.
- 5. The SEI is headquartered in this U.S. city.
- 6. The SEI's _____ Lab advances the streamlined development of trustworthy and human-centered AI engineering practices.
- 7. The SEI contributes to efforts that secure the software supply _____, preventing threats from entering through dependencies.
- 13. The SEI is a federally funded research and development center affiliated with this university.
- 14. The SEI developed a widely used maturity model for software development called the _____ Maturity Model.
- 16. The SEI's research includes work in this area of artificial intelligence, where computers learn from data.
- 17. The SEI developed a body of knowledge and practices to guide secure software development, known as _____ Secure Coding Standards.
- 18. The SEI’s CERT Division was established in response to a major internet worm named after this person.
Down
- 1. The pillars that guide the SEI’s approach to AI engineering are human-centered, scalable, and _____ and secure AI.
- 3. The SEI is known for its work in software _____, ensuring reliability and performance.
- 4. The SEI has expertise in this type of engineering, which deals with ensuring software performs reliably over time.
- 8. The AJ Awards are named after Angel _____, founder of the SEI and co-founder of the CMU Robotics Institute.
- 9. This methodology, developed at SEI, helps organizations improve their software processes.
- 10. The SEI researches and develops cutting-edge technologies for the U.S. Department of _____.
- 11. The SEI framework for evaluating software security is called the _____ Framework.
- 12. The SEI has played a role in improving processes in this popular software development methodology, which emphasizes incremental progress.
- 15. The SEI created an _____ to ensure that organizations develop, adopt, and use AI effectively and safely to safeguard the security of the nation.
- 17. SEI researchers focus on software resilience, ensuring that systems can withstand and recover from this type of attack.
