Understanding the Value of Data
Across
- 1. Washington data classification for information that could cause significant harm if disclosed.
- 5. Security method requiring more than one verification step.
- 6. Network barrier that blocks unauthorized traffic.
- 8. The right of individuals to control personal information about themselves.
- 10. Manipulating people into revealing confidential information.
- 12. Disguising communication to appear from a trusted source.
- 13. The act of assigning a security category to information.
- 14. Systematic review to ensure compliance with security rules.
- 15. Washington data classification for information that could cause limited harm if disclosed.
- 16. Common acronym for data such as Social Security numbers, addresses, and birth dates.
- 17. Security principle ensuring data is accessible when needed.
- 19. Data label meaning information should only be shared with authorized users.
- 20. Software update that fixes bugs or security holes.
- 22. A label for data requiring extra care to protect.
- 24. Fraudulent attempt to obtain sensitive information, often by email.
Down
- 2. Temporary digital code used for secure login.
- 3. Process of converting information into a code to prevent unauthorized access.
- 4. The person or office responsible for classifying and protecting information.
- 7. A weakness that could be exploited in a system or process.
- 8. A secret string of characters used for authentication.
- 9. Security technique restricting who can view or use resources.
- 11. Security principle ensuring information is only accessible to those with permission.
- 18. Incident where unauthorized individuals gain access to protected data.
- 21. Adhering to laws, regulations, and security policies.
- 23. Security principle ensuring data is accurate and unaltered.