Data Security

12345678910111213
Across
  1. 2. Maintaining the accuracy and completeness of data.
  2. 3. An unauthorized access or exposure of sensitive data.
  3. 5. Ensuring that information is accessible only to those authorized to have access.
  4. 10. Adhering to data protection regulations.
  5. 11. A copy of data stored separately to protect against data loss.
  6. 12. A weakness that can be exploited.
Down
  1. 1. The process of converting information into a secure format to prevent unauthorized access.
  2. 4. The technique of obscuring specific data within a database to protect sensitive information.
  3. 6. A network security system that monitors and controls incoming and outgoing network traffic.
  4. 7. Verifying the identity of a user or system before granting access.
  5. 8. An event that compromises data security.
  6. 9. Data Loss Prevention, strategies to prevent data breaches.
  7. 13. The potential for loss or damage.