Information Security Event Puzzle
Across
- 5. process of giving someone the ability to access a resource
- 6. process of restarting a computer
- 8. the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data
- 10. computer program with a graphical user interface for displaying and navigating between web pages
- 11. the process of converting information or data into a code, especially to prevent unauthorized access
- 12. a ______ password contains letters numbers and special characters
Down
- 1. any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment
- 2. information that, when used alone or with other relevant data, can identify an individual
- 3. facts and statistics collected together for reference or analysis
- 4. a form of social engineering and a scam where attackers deceive people into revealing sensitive information[1] or installing malware such as viruses, worms, adware, or ransomware
- 6. computers short term memory
- 7. the capacity of data/information which can be carried through a channel (typically from website or server) in a given time interval
- 9. the connection of at least two computer systems, either by a cable or a wireless connection
- 10. process of making copies of data or data files to use in the event the original data or data files are lost or destroyed