Cybersecurity Crossword

1234567
Across
  1. 2. What type of hacker exploits systems for personal gain and bad intention
  2. 6. What is used to hide messages so only authorized people can understand?
  3. 7. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. 1. Using deceptive measures to manipulate someone in disclosing personal information
  2. 3. Data, information , device anything that is of value
  3. 4. Acquiring unauthorized access to system or data
  4. 5. An incident where attackers steal information without authorization?