RU ITEC41
Across
- 4. Converting data into a secure format to prevent unauthorized access.
- 7. Protection of data and systems from cyber threats.
- 10. Ensuring information is only accessible to authorized individuals.
- 11. Safeguarding data from unauthorized access or damage.
- 13. Legal rights over creations, such as digital content.
- 14. Legal entitlements related to digital privacy and data.
- 17. A weakness that can be exploited in a system.
- 18. Deceptive attempts to acquire sensitive information, often via email.
- 19. Software designed to disrupt or damage systems.
- 20. Unauthorized access to or exposure of data.
Down
- 1. Limiting access to data or systems based on authorization.
- 2. The accuracy and consistency of data.
- 3. Responsibility for actions and decisions, especially regarding data.
- 5. Permission granted for the use of personal data.
- 6. Illegal activities conducted through digital means.
- 8. The trace of an individual's online activity.
- 9. Defense against digital threats and attacks.
- 12. Monitoring or tracking of online activity.
- 15. Unauthorized access to systems or networks.
- 16. The right to keep personal information secure and undisclosed.