MIS Security

1234567
Across
  1. 1. ______horse, software that appears to be benign but does something other than expected.
  2. 3. protocols used for secure information transfer over the Internet
  3. 5. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
  4. 6. Write your initial here for identifier
  5. 7. enforce a security policy on data exchanged between its network and the Internet
Down
  1. 2. CryptoLocker is an example of
  2. 4. _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called