Unit 1 LA C(2)

1234567891011121314151617181920
Across
  1. 3. (8,5) - Crime involving stealing another person’s personal information
  2. 7. (7,7) - Protection of personal information stored or shared online
  3. 10. (4,6) - Incident where confidential information is accessed without permission
  4. 11. (8,10) - Process of creating, storing and maintaining secure passwords
  5. 12. (5,8) - Protection of digital systems and networks against online attacks
  6. 15. (11) - Laws and regulations controlling the use and protection of data
  7. 16. (6,8) - Monitoring and recording user activities on the internet
  8. 17. (1,10) - Online image or opinion people form about an individual or organisation
  9. 18. (4,8) - Protection of digital information from unauthorised access or damage
  10. 19. (8,8) - Small files used to monitor and record online activity
  11. 20. (6,6) - Safe and authorised method of entering a computer system or network
Down
  1. 1. (7,4,10,10) - GDPR law protecting personal data and privacy
  2. 2. (9,8) - Harmful programs intended to damage systems or steal information
  3. 4. (8,9) - Process of identifying harmful software within a system
  4. 5. (10,6) - Security system using fingerprints or other body features for identification
  5. 6. ACT (4,10,3) - UK law controlling how personal information is collected and used
  6. 8. (8,8) - Methods used to protect systems, devices and information from threats
  7. 9. (4) - Regulation designed to improve protection and control of personal data
  8. 13. (7,8) - Protection of networks and connected devices from cyber threats
  9. 14. (4,14) - Process of confirming the identity of a user accessing a system
  10. 15. (6,5) - Physical security measure preventing unauthorised entry