Across
- 2. I am a type of cyber attack that doesn't rely on complex code, but on tricking you. I send you a fake email that looks real, hoping you will bite the hook and give me your password.
- 4. I am the political consulting firm that harvested the private data of millions of Facebook users without their consent to build 'psychographic profiles' for voters.
- 6. I am a hacker, but I wear a 'White Hat'. Companies like Google and Facebook pay me a reward when I find a flaw in their system before the bad guys do. What is the name of this reward program?
Down
- 1. I am one of two methods used to protect businesses from cybercrime
- 3. I am the most fundamental command you use when you want to ask the database to show you information. I am not 'GET', I am not 'TAKE'. I am the first word in a query to retrieve specific columns.
- 5. I am the term used when data becomes so large, fast, and complex that traditional computers cannot handle it. I am often defined by the '3 Vs': Volume, Velocity, and Variety.
