Across
- 2. Multifactor Authentication is often shorten to _ _ _
- 3. The means by which an individual provides his/her permission for the use or disclosure of their PII.
- 10. Information Technology help desk through which service requests, information security incidents, and general IT questions may be directed to.
- 12. A small file placed on a computer by a website assigning a unique ID to the device
- 15. What all employees are when they handle Personally Identifiable Information
- 16. What you are if you complete this crossword by the end of the week.
- 17. The style of cyber attack where a criminal attempts to get you to click on a link in an email.
- 18. The process by which an individual’s access to accounts and data is reviewed on a routine basis.
- 19. Recently published CHS notice relating to how CHS handles employees personal data.
Down
- 1. The style of cyber attack where a criminal holds a company's data hostage until they pay a ransom.
- 3. A California law detailing data protection and privacy regulations for all individual citizens of California (Abr)
- 4. The name of an account with elevated privileges to administer a system or application.
- 5. Data which is limited to individuals with a need-to-know. May be subject to legal or contractual confidentiality requirements.
- 6. Data which is subject to legislative, legal, and industry regulations and must be Handled with the highest sensitivity and may be subject to breach notification laws.
- 7. CHS approved Password Manager.
- 8. Complete this phrase "Where to Store, What to _____"
- 9. The type of engineering which targets "bugs in the human hardware"
- 11. Permission entitled to an individual allowing them to use a system or view data.
- 13. A European Union (EU) law detailing data protection and privacy regulations for all individual citizens of the EU and the European Economic Area (EEA)(Abr)
- 14. Data which CHS has made available and approved for public dissemination.
