Cybersecurity karim

123456789
Across
  1. 1. secret combination of characters used to access an account
  2. 4. A security vulnerability unknown to the software vendor and immediately exploitable by attackers.
  3. 5. A video, image, or audio manipulated using artificial intelligence to create a false reality.
  4. 7. Malicious software designed to damage a computer sytem
  5. 9. An isolated environment that allows software to run safely to prevent it from harming the system.
Down
  1. 2. Malicious software that scares the user with fake security alerts to push them to install a fraudulent program.
  2. 3. A deliberately vulnerable computer system used to attract and trap hackers in order to study their techniques.
  3. 6. attempt to deceive a user in order to obtain peronal information
  4. 8. Technique used to convert a message into a secret code