Cyber-Attacks
Across
- 3. a spoof or look-alike website
- 6. the most common way hackers gain entry to a company's computer network
- 7. personally identifiable information
- 8. everyone's responsibility to protect company information and assets
Down
- 1. an add on to enhance function of browser
- 2. software that locks up a computer system and then demands a payment to unlock it
- 4. software designed to harm computer
- 5. fraudulent emails designed to obtain PII