Compliance And Cybersecurity

12345678910
Across
  1. 6. The process of confirming the identity of a user or device
  2. 7. A malicious software program that encrypts files for ransom
  3. 8. A set of rules or guidelines adopted by an organization.
  4. 9. Do not share a password with members
Down
  1. 1. A defensive system protecting networks from cyberattacks
  2. 2. The act of adhering to laws, regulations, and standards.
  3. 3. What does the HIPAA Privacy Rule protect?
  4. 4. The deliberate act of stealing personal information online
  5. 5. Data that is unreadable without decryption
  6. 10. Rules to guard patient data