Attack and Risk Vectors
Across
- 3. like pretending to be a legitimate website
- 4. harmful software
- 5. or holding a PC or operation station hostage
- 6. a cybercriminal's path to breach a computer system or network
- 7. tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- 1. send fake emails
- 2. the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.