Information Security

1234567
Across
  1. 1. Malicious Software
  2. 3. Malware that attaches to programs
  3. 5. Designed to lessen the risk of cyber attack
  4. 6. Protect with up to date software, encrypted information, limited employee access
Down
  1. 2. Protect with strong passwords and password storage
  2. 4. Protection of ownership and reputation
  3. 7. Acceptable Use Policy