Across
- 6. Limiting the risks or impacts of a cyber threat.
- 7. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
- 8. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
- 9. You should never share this.
- 10. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
- 1. When should you report an IT breach or potential breach?
- 2. A cyberattack attempting to discover your personal information.
- 3. Federal law protecting patient privacy.
- 4. The US Food and Drug Administration.
- 5. Whose responsibility is cybersecurity?