Attack and Risk Vectors

1234567
Across
  1. 3. like pretending to be a legitimate website
  2. 4. harmful software
  3. 5. or holding a PC or operation station hostage
  4. 6. a cybercriminal's path to breach a computer system or network
  5. 7. tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
  1. 1. send fake emails
  2. 2. the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.