Cyber Security Challenge: Remote Financial Data Privacy

1234567891011121314151617
Across
  1. 2. This type of software is specifically developed to identify and eliminate computer viruses.
  2. 4. This term describes an event that compromises the security, confidentiality, or integrity of personal data, often involving a breach of privacy.
  3. 7. This term refers to unwanted emails, often sent for advertising purposes and distributed widely to numerous recipients.
  4. 13. This security approach involves confirming a user's identity by requiring multiple forms of evidence before granting system access.
  5. 14. This technology is a secure network that allows data transmission over public networks as if the devices were directly connected to a private network.
  6. 17. This principle involves restricting the availability of information solely to individuals who are authorized to access it.
Down
  1. 1. This term described a harmful action that intentionally disrupts or damages computer networks or systems.
  2. 3. This type of malware is designed to restrict access to a computer system and demands a ransom to be paid for its removal.
  3. 5. These plans and procedures help an organization bounce back after unexpected events like flood or cyber attacks.
  4. 6. Ensuring the essential operations continue uninterrupted, even during crises, is the essence of this practice.
  5. 8. This process involves transforming data or information into a secret code to prevent unauthorized access.
  6. 9. This cybersecurity measure involves backup systems and resources, offering added security and reliability, especially with remote financial data.
  7. 10. This advanced security technology facilitates password-free authentication, enhancing user verification in online transactions.
  8. 11. This system acts as a protective barrier to prevent unauthorized access to or from a private network.
  9. 12. This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle.
  10. 15. This term describes an incident where there is unauthorized access or disclosure of personal information, compromising your privacy.
  11. 16. This technique is a deceptive method used to obtain sensitive information by posing as a legitimate entity in digital communications.