Information Security Challenge
Across
- 2. A privacy principle that limits the collection, processing, and retention of personal data to only what is strictly necessary for a specific purpose.
- 4. A formal review of systems and processes to ensure security and compliance.
- 5. A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
- 9. In data security, this process replaces sensitive information with a unique identifier or symbol, making the original data inaccessible without a secure mapping.
- 10. A security risk that originates from within an organization, often involving employees or contractors who misuse their access to harm systems or data.
Down
- 1. Following laws, regulations, and internal policies to ensure proper governance and avoid legal or security risks.
- 3. An unexpected event that compromises the integrity or availability of data.
- 6. Security Protecting data and systems hosted on remote servers.
- 7. A type of malicious software that can replicate and spread.
- 8. this principle ensures that data remains accurate, consistent, and unaltered except by authorized processes.