Privacy Summit 2025
Across
- 4. Federal law governing information security management
- 5. Hide one's IP address
- 9. Unique code or number assigned to an individual
- 10. Government watching
- 12. Personal info stored online
- 13. Cybersecurity sequence
- 15. Measures to prevent hacking
- 18. Threat of hacking or online attack or Reason to use strong passwords
- 20. Code for secure messaging
- 21. Alert to potential threat
- 22. Not for public view
- 24. Secure online account
Down
- 1. Requirement of FOIA
- 2. Secret information
- 3. Method of identification using fingerprints or High-tech way to unlock your phone
- 6. Protected from hacking
- 7. Nameless online user
- 8. Conceal online activity
- 11. Personal info to be guarded
- 14. Unauthorized access
- 16. Right to keep info secret
- 17. Shield from identity theft
- 19. Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
- 23. Document or file containing personal data