Across
- 2. What type of hacker exploits systems for personal gain and bad intention
- 6. What is used to hide messages so only authorized people can understand?
- 7. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- 1. Using deceptive measures to manipulate someone in disclosing personal information
- 3. Data, information , device anything that is of value
- 4. Acquiring unauthorized access to system or data
- 5. An incident where attackers steal information without authorization?