Across
- 2. How companies use your data
- 4. Identity theft, stealing money, stealing private information, controlling private computers.
- 6. A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- 7. Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- 8. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
- 1. Protection of computer systems, networks, and data from digital attacks.
- 2. The information about a particular person that exists on the Internet as a result of their online activity.
- 3. A computer security specialist who breaks into protected systems and networks to test and assess their security
- 4. The use of electronic communication to bully a person
- 5. Legal document outlining how a company can collect and use your data