Imp. of Misuse and Cybersecurity
Across
- 2. internally produced software
- 3. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
Down
- 1. an unauthorized attempt to access a system, device and/or network via the Internet