Across
- 4. A term that defines when a system is accessed by an unauthorized person.
- 5. Hackers that are authorized by companies to find flaws in systems in order to patch them.
- 7. Protection of computer systems, networks, and data from attacks.
- 8. Information that can be identified as belonging to someone or information that can be used to identify someone.
- 12. The person in charge of maintaining a network.
- 13. Hackers that maliciously violate computer security for personal gain.
Down
- 1. Where data is stored.
- 2. Digitally harassing, humiliating, embarrassing, and/or threatening someone.
- 3. Information stored digitally.
- 6. A person who attempts to use things in a way other than it's original intention.
- 9. Revealing, or threatening to reveal, a person's personal data in order to harass and/or intimidate.
- 10. A flaw in a computer system, operating system, or software.
- 11. Hackers that may sometimes violate laws and are socially or politically motivative.
