Across
- 6. Stolen personal data is used.
- 7. When data is edited without permission and it normally takes a long time to find the source.
Down
- 1. Data is stolen with the intent to compromise privacy or confidential information.
- 2. Data is destroyed
- 3. - An attack the prevents users from accessing resources.
- 4. Personal data is stolen
- 5. Data is edited without permission but the source is found quite quickly.
