Compliance And Cybersecurity
Across
- 6. The process of confirming the identity of a user or device
- 7. A malicious software program that encrypts files for ransom
- 8. A set of rules or guidelines adopted by an organization.
- 9. Do not share a password with members
Down
- 1. A defensive system protecting networks from cyberattacks
- 2. The act of adhering to laws, regulations, and standards.
- 3. What does the HIPAA Privacy Rule protect?
- 4. The deliberate act of stealing personal information online
- 5. Data that is unreadable without decryption
- 10. Rules to guard patient data