Across
- 2. Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return (1 point)
- 4. The best practice when receiving email from external party (2 points)
- 6. Any information that when used alone or combine with other information, identifies an individual (1 point)
- 7. The practice of manipulating people to gain confidential information through deception (1 point)
Down
- 1. Lilly’s code of business conduct (2 points)
- 3. Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity (1 point)
- 4. Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites (1 point)
- 5. A program that was established to identify & manage potential risk posed to Lilly by associated third party (1 point)
