CYBERSECURITY - PHISHING

1234
Across
  1. 2. phishing emails may contain _____ to Malicious websites
  2. 3. Email scam or attempt to trick you into giving your password or personal information
Down
  1. 1. consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
  2. 4. Someone who seeks and exploits weaknesses in a computer system or computer network.