phish

12345678910
Across
  1. 2. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
  2. 7. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
  3. 8. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
  4. 9. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
  5. 10. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
Down
  1. 1. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
  2. 3. What are the software updates released to fix vulnerabilities and improve security in computer systems?
  3. 4. What process in cybersecurity involves encoding data to protect it from unauthorized access?
  4. 5. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
  5. 6. A software that is designed to detect and destroy computer viruses.