Across
- 2. the repeated use of electronic communication technology—like cell phones, computers, tablets, and social media—to harass, threaten, humiliate, or target another person
- 3. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and with malicious intent
- 4. any data that can be used to distinguish, trace, or identify a specific individual
- 7. any data that can be used to distinguish, trace, or identify a specific individual
- 9. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems with the permission of the system owner
- 10. an IT professional who installs, maintains, monitors, and troubleshoots computer networks to ensure they operate efficiently, reliably, and securely
- 11. facts and statistics collected together for reference or analysis.
Down
- 1. the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
- 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- 5. a structured set of data held in a computer, especially one that is accessible in various ways.
- 6. search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
- 8. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and without malicious intent
