CISO Crossword Quiz - 1525

12345678
Across
  1. 1. The front line of defense in information security needed for accessing resources in a computer system
  2. 4. A copy of the information held on a device (such as photos and documents) which is stored somewhere else
  3. 5. A ____ breach is when a hacker successfully breaks into a system and exposes private information
  4. 6. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking a link
  5. 7. A location on the internet where you can save your data securely(rather than on your computer or device)
  6. 8. A mechanism for creating a secure connection between a computing device & a computer network
Down
  1. 1. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of
  2. 2. If you receive a suspicious ____, hover over it with your mouse before clicking to make sure it is real
  3. 3. Which act outlines the consent, purpose limitation & accountability in the processing of digital personal data
  4. 6. A replacement for passwords that provides more secure sign-ins to websites and apps across a user's device