Awesome Privacy Week '25

1234567891011121314151617181920212223
Across
  1. 2. A security system that monitors and controls incoming and outgoing network traffic.
  2. 3. An extra layer of security that requires more than just a password.
  3. 4. Malicious software designed to harm or exploit computers and networks.
  4. 6. A European Union law that regulates data protection and privacy.
  5. 7. A tool that encrypts internet connections to enhance privacy.
  6. 10. A U.S. law that gives California residents rights over their personal data.
  7. 11. The practice of protecting systems, networks, and programs from digital attacks.
  8. 13. Publishing private or identifying information about someone online without consent.
  9. 16. AI-generated media that mimics real people and can be used for deception.
  10. 17. Small files stored on a user’s browser to track online activities.
  11. 19. A tool used to record every keystroke typed on a keyboard.
  12. 21. A browser feature that prevents storing history, cookies, and site data.
  13. 22. The act of removing or disguising personal identifiers from datasets.
  14. 23. A key document that explains how an individual's data is stored, used, and shared.
Down
  1. 1. The process of removing personal identifiers from datasets.
  2. 5. The process of encoding information to prevent unauthorized access.
  3. 8. Malicious software that secretly gathers user information.
  4. 9. Software vulnerability unknown to developers and exploited by hackers.
  5. 12. A cyber attack where attackers trick individuals into revealing sensitive information.
  6. 14. Theft Fraudulent use of someone's personal data to commit crimes.
  7. 15. Unauthorized access or damage to computer systems and networks.
  8. 18. Data that describes and gives information about other data.
  9. 20. Malicious software that locks users out of their data until a ransom is paid.