Imp. of Misuse and Cybersecurity

123
Across
  1. 2. internally produced software
  2. 3. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
Down
  1. 1. an unauthorized attempt to access a system, device and/or network via the Internet