Privacy
Across
- 2. East German secret police known for extensive citizen surveillance.
- 6. Measures implemented to safeguard information from unauthorized access.
- 11. Potential threats or dangers to individual information security.
- 13. Retrieving sensitive information from discarded materials.
- 14. Process of gathering information, especially through digital means.
- 15. Concerns related to the protection of individuals' location data, where applications may collect and share location information without user knowledge or consent.
- 17. Information relating to an individual person. This can include usernames and identifiers as well as sensitive information.
- 18. Managing and regulating personal information.
- 19. Unauthorized access of sensitive information due to a security incident. Often involves misuse of compromised information.
- 20. Where an organization may inadequately verify the identity of individuals accessing sensitive information. These can lead to data breaches.
Down
- 1. Process of creating a unique identifier for each computer based on its configuration.
- 3. Entities that trade in the illegal or questionably obtained data.
- 4. Concerns about search engines storing and analyzing user queries.
- 5. Advanced tools and applications, for the purpose of monitoring and tracking individuals.
- 7. Fraudulent practice where an entity or individual pretends to be someone else.
- 8. First principle for ethical treatment of personal information. Individuals informed about data collection.
- 9. Software downloaded without user's knowledge that collects information about a person's computer activity. Often tracks web surfing or more nefarious credit card numbers etc...
- 10. When activities in cyberspace are linked to devices that can be traced to the user.
- 12. Unachievable state of total personal secrecy.
- 16. Level of knowledge or consciousness among the general public regarding certain practices, events, or technologies.