RU ITEC41

1234567891011121314151617181920
Across
  1. 4. Converting data into a secure format to prevent unauthorized access.
  2. 7. Protection of data and systems from cyber threats.
  3. 10. Ensuring information is only accessible to authorized individuals.
  4. 11. Safeguarding data from unauthorized access or damage.
  5. 13. Legal rights over creations, such as digital content.
  6. 14. Legal entitlements related to digital privacy and data.
  7. 17. A weakness that can be exploited in a system.
  8. 18. Deceptive attempts to acquire sensitive information, often via email.
  9. 19. Software designed to disrupt or damage systems.
  10. 20. Unauthorized access to or exposure of data.
Down
  1. 1. Limiting access to data or systems based on authorization.
  2. 2. The accuracy and consistency of data.
  3. 3. Responsibility for actions and decisions, especially regarding data.
  4. 5. Permission granted for the use of personal data.
  5. 6. Illegal activities conducted through digital means.
  6. 8. The trace of an individual's online activity.
  7. 9. Defense against digital threats and attacks.
  8. 12. Monitoring or tracking of online activity.
  9. 15. Unauthorized access to systems or networks.
  10. 16. The right to keep personal information secure and undisclosed.