Understanding the Value of Data

123456789101112131415161718192021222324
Across
  1. 1. Washington data classification for information that could cause significant harm if disclosed.
  2. 5. Security method requiring more than one verification step.
  3. 6. Network barrier that blocks unauthorized traffic.
  4. 8. The right of individuals to control personal information about themselves.
  5. 10. Manipulating people into revealing confidential information.
  6. 12. Disguising communication to appear from a trusted source.
  7. 13. The act of assigning a security category to information.
  8. 14. Systematic review to ensure compliance with security rules.
  9. 15. Washington data classification for information that could cause limited harm if disclosed.
  10. 16. Common acronym for data such as Social Security numbers, addresses, and birth dates.
  11. 17. Security principle ensuring data is accessible when needed.
  12. 19. Data label meaning information should only be shared with authorized users.
  13. 20. Software update that fixes bugs or security holes.
  14. 22. A label for data requiring extra care to protect.
  15. 24. Fraudulent attempt to obtain sensitive information, often by email.
Down
  1. 2. Temporary digital code used for secure login.
  2. 3. Process of converting information into a code to prevent unauthorized access.
  3. 4. The person or office responsible for classifying and protecting information.
  4. 7. A weakness that could be exploited in a system or process.
  5. 8. A secret string of characters used for authentication.
  6. 9. Security technique restricting who can view or use resources.
  7. 11. Security principle ensuring information is only accessible to those with permission.
  8. 18. Incident where unauthorized individuals gain access to protected data.
  9. 21. Adhering to laws, regulations, and security policies.
  10. 23. Security principle ensuring data is accurate and unaltered.