Across
- 1. Malicious Software
- 3. Malware that attaches to programs
- 5. Designed to lessen the risk of cyber attack
- 6. Protect with up to date software, encrypted information, limited employee access
Down
- 2. Protect with strong passwords and password storage
- 4. Protection of ownership and reputation
- 7. Acceptable Use Policy
