cyber security

12345678910
Across
  1. 7. threat through natural disasters
  2. 9. reviewing or reading data, information or system documentations without permission of the owner
  3. 10. sending to much traffic to a particular computer system
Down
  1. 1. allowing information to pass to any person or organisation without permission
  2. 2. crimes that can only be carried out using computer networks or systems
  3. 3. users can be denied access to services or data which they require and have the permission
  4. 4. cause problems with companies for political reasons
  5. 5. the technician or network manager will take the steps required to remove or reduce the vulnerability
  6. 6. gaining access to computer systems
  7. 8. a remote security scanning tool