phish
Across
- 1. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
- 4. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
- 6. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
- 9. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
Down
- 2. What process in cybersecurity involves encoding data to protect it from unauthorized access?
- 3. What are the software updates released to fix vulnerabilities and improve security in computer systems?
- 5. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
- 7. A software that is designed to detect and destroy computer viruses.
- 8. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
- 10. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?