037-1
Across
- 2. Unauthorized access to sensitive data.
- 4. Pertaining to the digital world and security.
- 7. Individuals who exploit security vulnerabilities.
- 8. A scandal involving unauthorized data access.
- 10. Investigation of digital evidence.
- 12. To make something less secure or vulnerable.
- 15. Financial information affected by the breach.
- 16. Wrongful deception to gain something.
- 19. Information that was compromised.
- 20. Ongoing observation to detect irregularities.
- 22. Notification of a potential security issue.
- 23. Personal information targeted by cybercriminals.
- 24. Legal resolution and compensation related to the breach.
- 25. Credentials potentially compromised in the breach.
Down
- 1. State of having sensitive data made public.
- 3. Type of information that could be stolen.
- 5. A software update for fixing vulnerabilities.
- 6. Individuals affected by the data breach.
- 9. Unintentional release of confidential information.
- 11. To protect against unauthorized access.
- 13. A technique used to obtain sensitive information fraudulently.
- 14. The company involved in the 2017 breach.
- 17. To gain unauthorized access to a system.
- 18. Process of encoding data for security.
- 21. Rules governing data protection.