Data Privacy

123456789101112131415
Across
  1. 6. The study and application of techniques to secure communication in the presence of adversaries.
  2. 9. A security process where a user provides personal identifiers to gain access to a system or application.
  3. 11. The practice of protecting systems, networks, and programs from digital attacks.
  4. 12. The automated processing of personal data to evaluate or predict aspects concerning that individual.
  5. 13. A regulation in the EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.
  6. 14. The process of removing all personally identifiable information where identification of data can no longer occur.
  7. 15. The process of processing personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information.
Down
  1. 1. The process of editing or preparing a document, especially to obscure or remove confidential information.
  2. 2. The process of converting data into a code to prevent unauthorized access.
  3. 3. Small files that are stored on a user's device when they visit a website, often used to remember user preferences or track user behaviour.
  4. 4. An incident where unauthorized individuals gain access to confidential data.
  5. 5. The principle that individuals should be informed about the collection and use of their personal data.
  6. 7. A cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  7. 8. A network security system that monitors and controls incoming and outgoing network traffic based on security policies.
  8. 10. The process of replacing sensitive data with unique identification symbols that retain all the essential data about the data without compromising its security.