Cybersecurity

12345678910111213
Across
  1. 4. collecting a user's private information.
  2. 5. A collection of organized data.
  3. 6. uses information illegally to harm and gain personal info
  4. 7. Protecting computer systems.
  5. 8. A weakness in a system that can be made use of by a threat actor.
  6. 10. Someone who uses advanced computer skills to gain access to computer systems.
  7. 13. uses information with permission for good reasons such as improving security.
Down
  1. 1. a collection of connected computers that can share resources
  2. 2. Any data that can identify a person directly or by collecting other data.
  3. 3. The process to manage, maintain and secure computer.
  4. 9. A security event where sensitive info is being stolen.
  5. 11. discover vulnerabilities in systems without the person's permission.
  6. 12. information processed by a computer.