Across
- 3. a set of data that describes and gives information about other data.
- 4. The information about a particular person that exists on the Internet as a result of their online activity
- 8. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- 9. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- 12. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- 15. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- 16. the use of electronic communication to bully a person
- 17. Protection of computer systems, networks, and data from digital attacks.
- 18. The protection of information from people who are not authorized to view it.
Down
- 1. a computer security specialist who breaks into protected systems and networks to test and assess their security
- 2. A widely-accepted security measure that should be guaranteed in every secure system
- 5. having the ability to find information, evaluate information credibility, and use information effectively
- 6. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- 7. protecting your data online
- 10. Identity theft, stealing money, stealing private information, controlling private computers.
- 11. how company’s use your data
- 13. The assurance that systems and data are accessible by authorized users when and where needed
- 14. Aims at ensuring that information is protected from unauthorized or unintentional alteration