Cyber-Attacks

12345678
Across
  1. 3. a spoof or look-alike website
  2. 6. the most common way hackers gain entry to a company's computer network
  3. 7. personally identifiable information
  4. 8. everyone's responsibility to protect company information and assets
Down
  1. 1. an add on to enhance function of browser
  2. 2. software that locks up a computer system and then demands a payment to unlock it
  3. 4. software designed to harm computer
  4. 5. fraudulent emails designed to obtain PII