CYBERSECURITY - PHISHING
Across
- 2. phishing emails may contain _____ to Malicious websites
- 3. Email scam or attempt to trick you into giving your password or personal information
Down
- 1. consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
- 4. Someone who seeks and exploits weaknesses in a computer system or computer network.