Cybersecurity

12345678910111213
Across
  1. 4. A term that defines when a system is accessed by an unauthorized person.
  2. 5. Hackers that are authorized by companies to find flaws in systems in order to patch them.
  3. 7. Protection of computer systems, networks, and data from attacks.
  4. 8. Information that can be identified as belonging to someone or information that can be used to identify someone.
  5. 12. The person in charge of maintaining a network.
  6. 13. Hackers that maliciously violate computer security for personal gain.
Down
  1. 1. Where data is stored.
  2. 2. Digitally harassing, humiliating, embarrassing, and/or threatening someone.
  3. 3. Information stored digitally.
  4. 6. A person who attempts to use things in a way other than it's original intention.
  5. 9. Revealing, or threatening to reveal, a person's personal data in order to harass and/or intimidate.
  6. 10. A flaw in a computer system, operating system, or software.
  7. 11. Hackers that may sometimes violate laws and are socially or politically motivative.