Across
- 4. collecting a user's private information.
- 5. A collection of organized data.
- 6. uses information illegally to harm and gain personal info
- 7. Protecting computer systems.
- 8. A weakness in a system that can be made use of by a threat actor.
- 10. Someone who uses advanced computer skills to gain access to computer systems.
- 13. uses information with permission for good reasons such as improving security.
Down
- 1. a collection of connected computers that can share resources
- 2. Any data that can identify a person directly or by collecting other data.
- 3. The process to manage, maintain and secure computer.
- 9. A security event where sensitive info is being stolen.
- 11. discover vulnerabilities in systems without the person's permission.
- 12. information processed by a computer.
