Data Security
Across
- 2. Maintaining the accuracy and completeness of data.
- 3. An unauthorized access or exposure of sensitive data.
- 5. Ensuring that information is accessible only to those authorized to have access.
- 10. Adhering to data protection regulations.
- 11. A copy of data stored separately to protect against data loss.
- 12. A weakness that can be exploited.
Down
- 1. The process of converting information into a secure format to prevent unauthorized access.
- 4. The technique of obscuring specific data within a database to protect sensitive information.
- 6. A network security system that monitors and controls incoming and outgoing network traffic.
- 7. Verifying the identity of a user or system before granting access.
- 8. An event that compromises data security.
- 9. Data Loss Prevention, strategies to prevent data breaches.
- 13. The potential for loss or damage.