Across
- 2. monitors incoming and outgoing network traffic based on a set of security rules
- 4. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
- 5. an unauthorized attempt to access a system, device and/or network via the Internet
- 8. receiving lots of junk email
- 9. a person gains unauthorized access to financial accounts and changed the details of those accounts to their advantage
Down
- 1. stolen information is later used to conduct cash transfers or online purchases without the owner knowing
- 3. internally produced software
- 5. focuses on stopping threats that attempt to access a computer or other systems in the network
- 6. spreading both beneficial and harmful material using computer systems
- 7. involve the use of websites and email messages that try to trick you into entering your personal information