Business Ethics/Cyber Security
Across
- 6. practice of protecting critical systems
- 9. work place manners
- 10. the number of steps in the decision making process
- 11. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- 1. exchange of information between a sender and receiver
- 2. these hackers send an email or text with a link to click
- 3. guidelines for how a business should conduct themselves
- 4. positive internet behavior
- 5. a policy users must agree to follow in order to gain internet access
- 7. a set of moral principles
- 8. the most common form of communication in a business
- 11. these hackers ask for money