hacker
prevent
compromised
victim
encrypt
network
was down
vulnerable
stopped working
when a protected thing is no longer secure
make computer data impossible to read unless the user has a password
connected computers and devices for sharing information
person or organization who is attacked as a result of a crime
stop something from happening
weak or easily attacked
person who secretly looks at and changes information on a computer system