Cybersecurity karim
Across
- 1. secret combination of characters used to access an account
- 4. A security vulnerability unknown to the software vendor and immediately exploitable by attackers.
- 5. A video, image, or audio manipulated using artificial intelligence to create a false reality.
- 7. Malicious software designed to damage a computer sytem
- 9. An isolated environment that allows software to run safely to prevent it from harming the system.
Down
- 2. Malicious software that scares the user with fake security alerts to push them to install a fraudulent program.
- 3. A deliberately vulnerable computer system used to attract and trap hackers in order to study their techniques.
- 6. attempt to deceive a user in order to obtain peronal information
- 8. Technique used to convert a message into a secret code