Across
- 2. artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
- 5. The practice of protecting systems, networks, and programs from digital attacks
- 6. a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
- 1. When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
- 3. how many KUB(TYREX) stations in PTTEP YADANA Asset in total
- 4. What is the minimum number of characters for PTTEP YADANA Asset user accounts
