Cyber Security Challenge: Remote Financial Data Privacy
Across
- 2. This type of software is specifically developed to identify and eliminate computer viruses.
- 4. This term describes an event that compromises the security, confidentiality, or integrity of personal data, often involving a breach of privacy.
- 7. This term refers to unwanted emails, often sent for advertising purposes and distributed widely to numerous recipients.
- 13. This security approach involves confirming a user's identity by requiring multiple forms of evidence before granting system access.
- 14. This technology is a secure network that allows data transmission over public networks as if the devices were directly connected to a private network.
- 17. This principle involves restricting the availability of information solely to individuals who are authorized to access it.
Down
- 1. This term described a harmful action that intentionally disrupts or damages computer networks or systems.
- 3. This type of malware is designed to restrict access to a computer system and demands a ransom to be paid for its removal.
- 5. These plans and procedures help an organization bounce back after unexpected events like flood or cyber attacks.
- 6. Ensuring the essential operations continue uninterrupted, even during crises, is the essence of this practice.
- 8. This process involves transforming data or information into a secret code to prevent unauthorized access.
- 9. This cybersecurity measure involves backup systems and resources, offering added security and reliability, especially with remote financial data.
- 10. This advanced security technology facilitates password-free authentication, enhancing user verification in online transactions.
- 11. This system acts as a protective barrier to prevent unauthorized access to or from a private network.
- 12. This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle.
- 15. This term describes an incident where there is unauthorized access or disclosure of personal information, compromising your privacy.
- 16. This technique is a deceptive method used to obtain sensitive information by posing as a legitimate entity in digital communications.