Data Security
Across
- 2. The process of converting information into a secure format to prevent unauthorized access.
- 6. A weakness that can be exploited.
- 8. Verifying the identity of a user or system before granting access.
- 11. Maintaining the accuracy and completeness of data.
- 14. The technique of obscuring specific data within a database to protect sensitive information.
- 15. Data Loss Prevention, strategies to prevent data breaches.
Down
- 1. Adhering to data protection regulations.
- 3. An event that compromises data security.
- 4. A copy of data stored separately to protect against data loss.
- 5. Ensuring that information is accessible only to those authorized to have access.
- 7. Software designed to harm or exploit any device, service, or network.
- 9. A type of cyber attack where attackers trick individuals into providing sensitive information.
- 10. An unauthorized access or exposure of sensitive data.
- 12. The potential for loss or damage.
- 13. A network security system that monitors and controls incoming and outgoing network traffic.