Across
- 2. A security system that monitors and controls incoming and outgoing network traffic.
- 3. An extra layer of security that requires more than just a password.
- 4. Malicious software designed to harm or exploit computers and networks.
- 6. A European Union law that regulates data protection and privacy.
- 7. A tool that encrypts internet connections to enhance privacy.
- 10. A U.S. law that gives California residents rights over their personal data.
- 11. The practice of protecting systems, networks, and programs from digital attacks.
- 13. Publishing private or identifying information about someone online without consent.
- 16. AI-generated media that mimics real people and can be used for deception.
- 17. Small files stored on a user’s browser to track online activities.
- 19. A tool used to record every keystroke typed on a keyboard.
- 21. A browser feature that prevents storing history, cookies, and site data.
- 22. The act of removing or disguising personal identifiers from datasets.
- 23. A key document that explains how an individual's data is stored, used, and shared.
Down
- 1. The process of removing personal identifiers from datasets.
- 5. The process of encoding information to prevent unauthorized access.
- 8. Malicious software that secretly gathers user information.
- 9. Software vulnerability unknown to developers and exploited by hackers.
- 12. A cyber attack where attackers trick individuals into revealing sensitive information.
- 14. Theft Fraudulent use of someone's personal data to commit crimes.
- 15. Unauthorized access or damage to computer systems and networks.
- 18. Data that describes and gives information about other data.
- 20. Malicious software that locks users out of their data until a ransom is paid.
