Impacts of Cyber Security Attacks

1234567
Across
  1. 6. Stolen personal data is used.
  2. 7. When data is edited without permission and it normally takes a long time to find the source.
Down
  1. 1. Data is stolen with the intent to compromise privacy or confidential information.
  2. 2. Data is destroyed
  3. 3. - An attack the prevents users from accessing resources.
  4. 4. Personal data is stolen
  5. 5. Data is edited without permission but the source is found quite quickly.