Cybersecurity
Across
- 3. the use of a computer to gain unauthorized access to data in a system.
- 5. The state of being protected against the criminal or unauthorized use of electronic data.
- 8. a person who uses computers to gain unauthorized access to data.
- 9. Tells a computer what actions to take
- 10. what movie character was on the signs?
Down
- 1. Where did this story take place?
- 2. A broad range of information, or an opinion, that could identify an individual.
- 4. breach results in information being accessed without authorization.
- 6. What was hacked in this story?
- 7. A part of a computer system or network which is designed to block unauthorized access