Data Privacy
Across
- 6. The study and application of techniques to secure communication in the presence of adversaries.
- 9. A security process where a user provides personal identifiers to gain access to a system or application.
- 11. The practice of protecting systems, networks, and programs from digital attacks.
- 12. The automated processing of personal data to evaluate or predict aspects concerning that individual.
- 13. A regulation in the EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.
- 14. The process of removing all personally identifiable information where identification of data can no longer occur.
- 15. The process of processing personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information.
Down
- 1. The process of editing or preparing a document, especially to obscure or remove confidential information.
- 2. The process of converting data into a code to prevent unauthorized access.
- 3. Small files that are stored on a user's device when they visit a website, often used to remember user preferences or track user behaviour.
- 4. An incident where unauthorized individuals gain access to confidential data.
- 5. The principle that individuals should be informed about the collection and use of their personal data.
- 7. A cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- 8. A network security system that monitors and controls incoming and outgoing network traffic based on security policies.
- 10. The process of replacing sensitive data with unique identification symbols that retain all the essential data about the data without compromising its security.