Imp. of Misuse and Cybersecurity

1234567891011
Across
  1. 3. involve the use of websites and email messages that try to trick you into entering your personal information
  2. 5. battery which supplies equipment with electricity during power outage
  3. 7. monitors incoming and outgoing network traffic based on a set of security rules
  4. 11. internally produced software
Down
  1. 1. involves trying to electronically break into a system without authorization
  2. 2. hardware device keystroke loggers implanted in the keyboard
  3. 3. spreading both beneficial and harmful material using computer systems
  4. 4. preserves file that you no longer need
  5. 6. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
  6. 8. making copies of files
  7. 9. an electronic threat that does not require a host program
  8. 10. receiving lots of junk email