Cybersecurity karim

12345678910
Across
  1. 1. secret combination of characters used to access an account
  2. 5. attempt to deceive a user in order to obtain peronal information
  3. 7. Technique used to convert a message into a secret code
  4. 8. A security vulnerability unknown to the software vendor and immediately exploitable by attackers.
  5. 10. A video, image, or audio manipulated using artificial intelligence to create a false reality.
Down
  1. 2. Malicious software that scares the user with fake security alerts to push them to install a fraudulent program.
  2. 3. An isolated environment that allows software to run safely to prevent it from harming the system.
  3. 4. Malicious software designed to damage a computer sytem
  4. 6. A deliberately vulnerable computer system used to attract and trap hackers in order to study their techniques.
  5. 9. Volatile memory used by the processor during execution.