Cybersecurity

12345678910
Across
  1. 3. the use of a computer to gain unauthorized access to data in a system.
  2. 5. The state of being protected against the criminal or unauthorized use of electronic data.
  3. 8. a person who uses computers to gain unauthorized access to data.
  4. 9. Tells a computer what actions to take
  5. 10. what movie character was on the signs?
Down
  1. 1. Where did this story take place?
  2. 2. A broad range of information, or an opinion, that could identify an individual.
  3. 4. breach results in information being accessed without authorization.
  4. 6. What was hacked in this story?
  5. 7. A part of a computer system or network which is designed to block unauthorized access