Across
- 3. involve the use of websites and email messages that try to trick you into entering your personal information
- 5. battery which supplies equipment with electricity during power outage
- 7. monitors incoming and outgoing network traffic based on a set of security rules
- 11. internally produced software
Down
- 1. involves trying to electronically break into a system without authorization
- 2. hardware device keystroke loggers implanted in the keyboard
- 3. spreading both beneficial and harmful material using computer systems
- 4. preserves file that you no longer need
- 6. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
- 8. making copies of files
- 9. an electronic threat that does not require a host program
- 10. receiving lots of junk email