cyber security

12345678
Across
  1. 2. Data that identifies a specific individual
  2. 6. It is evaluating computer networks and systems vulnerabilities in securities.
  3. 8. It is information security and the psychological manipulation of people.
Down
  1. 1. An action that has been done but is not intended by the person.
  2. 3. the collection of information
  3. 4. When you obtain something by using persuasion
  4. 5. It is when you show responsibility for your actions.
  5. 7. facts provided about something/someone