Across
- 1. Synthetic media generated by AI
- 4. They wear different hat colors (black hat, white hat, blue hat, etc. hat, etc.)
- 5. Your online data trail
- 7. Artificial Intelligence
- 8. Fraudulent communication attack
- 9. Used to prevent, identify and remove malicious software
- 10. Software app programmed to do certain tasks
Down
- 2. Converting information into a code to prevent unauthorized access.
- 3. Use of two authentication methods to log in.
- 6. Identity verification process
