Security and Privacy Week

12345678910
Across
  1. 2. Type of second factor authentication that uses a fingerprint or facial recognition
  2. 3. A document that outlines an organization's approach to handling data
  3. 5. The anonymization technique that alters data so the individual cannot be re-identified
  4. 6. This network technology creates a secure connection over a public network, ensuring privacy and anonymity
  5. 7. The process of converting data into a code to prevent unauthorized access
  6. 8. A type of attack where multiple compromised systems attack a single target
  7. 10. Number 1 worst password choice for 2023
Down
  1. 1. A manipulation tactic used to deceive individuals into divulging confidential information or performing actions
  2. 4. An individual’s right to control how their personal information is collected and used
  3. 6. Type of phishing that involves a phone call or voicemail
  4. 9. Presenting a second factor of authentication to log in