Imp. of Misuse and Cybersecurity

12
Across
  1. 2. internally produced software
Down
  1. 1. damage can occur when there is a planned attempt to bypass all legitimate access restrictions