Information Security Challenge

12345678910
Across
  1. 2. A privacy principle that limits the collection, processing, and retention of personal data to only what is strictly necessary for a specific purpose.
  2. 4. A formal review of systems and processes to ensure security and compliance.
  3. 5. A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
  4. 9. In data security, this process replaces sensitive information with a unique identifier or symbol, making the original data inaccessible without a secure mapping.
  5. 10. A security risk that originates from within an organization, often involving employees or contractors who misuse their access to harm systems or data.
Down
  1. 1. Following laws, regulations, and internal policies to ensure proper governance and avoid legal or security risks.
  2. 3. An unexpected event that compromises the integrity or availability of data.
  3. 6. Security Protecting data and systems hosted on remote servers.
  4. 7. A type of malicious software that can replicate and spread.
  5. 8. this principle ensures that data remains accurate, consistent, and unaltered except by authorized processes.