Imp. of Misuse and Cybersecurity

123456789
Across
  1. 2. monitors incoming and outgoing network traffic based on a set of security rules
  2. 4. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
  3. 5. an unauthorized attempt to access a system, device and/or network via the Internet
  4. 8. receiving lots of junk email
  5. 9. a person gains unauthorized access to financial accounts and changed the details of those accounts to their advantage
Down
  1. 1. stolen information is later used to conduct cash transfers or online purchases without the owner knowing
  2. 3. internally produced software
  3. 5. focuses on stopping threats that attempt to access a computer or other systems in the network
  4. 6. spreading both beneficial and harmful material using computer systems
  5. 7. involve the use of websites and email messages that try to trick you into entering your personal information