Across
- 2. A violation of privacy where an individual's data is exposed or stolen.
- 4. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
- 5. A legal framework that governs the use of electronic signatures in contracts.
- 7. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
- 9. The unauthorized copying or distribution of software or digital content.
Down
- 1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
- 3. The practice of protecting computers, networks, and data from unauthorized access or attacks.
- 5. A method of writing in code so that only authorized parties can access it.
- 6. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
- 8. The unlawful act of accessing a computer system without authorization.
