Across
- 2. The act of adhering to data regulations, industry standards, and internal rules as enforced by data governance
- 6. An unauthorized access or disclosure of sensitive company information?
- 8. The technology that secures data by scrambling it so only authorized parties can read it?
- 10. Numerical standards or measures are used to track and assess business performance?
Down
- 1. The security system that protects your network from unauthorized access
- 3. A harmful software that can infect your computer
- 4. The data type that is typically organized in spread sheets and databases.
- 5. A security feature, that includes multiple verifications steps to log in
- 7. A computing model allows data and applications to be accessed over the internet rather than stored locally
- 9. Emails , messages that appear genuine ,but is actually malicious
