Business Ethics/Cyber Security

1234567891011
Across
  1. 6. practice of protecting critical systems
  2. 9. work place manners
  3. 10. the number of steps in the decision making process
  4. 11. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
  1. 1. exchange of information between a sender and receiver
  2. 2. these hackers send an email or text with a link to click
  3. 3. guidelines for how a business should conduct themselves
  4. 4. positive internet behavior
  5. 5. a policy users must agree to follow in order to gain internet access
  6. 7. a set of moral principles
  7. 8. the most common form of communication in a business
  8. 11. these hackers ask for money