Across
- 2. Type of second factor authentication that uses a fingerprint or facial recognition
- 3. A document that outlines an organization's approach to handling data
- 5. The anonymization technique that alters data so the individual cannot be re-identified
- 6. This network technology creates a secure connection over a public network, ensuring privacy and anonymity
- 7. The process of converting data into a code to prevent unauthorized access
- 8. A type of attack where multiple compromised systems attack a single target
- 10. Number 1 worst password choice for 2023
Down
- 1. A manipulation tactic used to deceive individuals into divulging confidential information or performing actions
- 4. An individual’s right to control how their personal information is collected and used
- 6. Type of phishing that involves a phone call or voicemail
- 9. Presenting a second factor of authentication to log in
