Data Security

12345678910111213
Across
  1. 3. Adhering to data protection regulations.
  2. 4. The potential for loss or damage.
  3. 5. The technique of obscuring specific data within a database to protect sensitive information.
  4. 6. A weakness that can be exploited.
  5. 8. A network security system that monitors and controls incoming and outgoing network traffic.
  6. 11. A copy of data stored separately to protect against data loss.
  7. 12. A type of cyber attack where attackers trick individuals into providing sensitive information.
  8. 13. Verifying the identity of a user or system before granting access.
Down
  1. 1. An event that compromises data security.
  2. 2. Ensuring that information is accessible only to those authorized to have access.
  3. 7. Data Loss Prevention, strategies to prevent data breaches.
  4. 9. The process of converting information into a secure format to prevent unauthorized access.
  5. 10. Maintaining the accuracy and completeness of data.
  6. 11. An unauthorized access or exposure of sensitive data.