Data Security

123456789101112131415
Across
  1. 2. The process of converting information into a secure format to prevent unauthorized access.
  2. 6. A weakness that can be exploited.
  3. 8. Verifying the identity of a user or system before granting access.
  4. 11. Maintaining the accuracy and completeness of data.
  5. 14. The technique of obscuring specific data within a database to protect sensitive information.
  6. 15. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. 1. Adhering to data protection regulations.
  2. 3. An event that compromises data security.
  3. 4. A copy of data stored separately to protect against data loss.
  4. 5. Ensuring that information is accessible only to those authorized to have access.
  5. 7. Software designed to harm or exploit any device, service, or network.
  6. 9. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. 10. An unauthorized access or exposure of sensitive data.
  8. 12. The potential for loss or damage.
  9. 13. A network security system that monitors and controls incoming and outgoing network traffic.