Cybersecurity karim
Across
- 1. secret combination of characters used to access an account
- 5. attempt to deceive a user in order to obtain peronal information
- 7. Technique used to convert a message into a secret code
- 8. A security vulnerability unknown to the software vendor and immediately exploitable by attackers.
- 10. A video, image, or audio manipulated using artificial intelligence to create a false reality.
Down
- 2. Malicious software that scares the user with fake security alerts to push them to install a fraudulent program.
- 3. An isolated environment that allows software to run safely to prevent it from harming the system.
- 4. Malicious software designed to damage a computer sytem
- 6. A deliberately vulnerable computer system used to attract and trap hackers in order to study their techniques.
- 9. Volatile memory used by the processor during execution.