Across
- 4. A security method that uses physical characteristics like fingerprints or facial recognition to secure devices or accounts.
- 7. Making sure information and systems can be used when needed.
- 8. Creating a copy of your digital information (files, folders, databases, applications, etc.) and storing it in a separate location.
- 11. Ensuring information stays correct and unchanged.
- 12. Records that document each visitor's entry and exit, typically capturing essential information such as the visitor's name, the date and time of arrival, the purpose of their visit, who they are visiting, and their departure time.
- 13. Strange actions or performance on a computer that could signal a cyberattack.
- 14. The process of sending data from one device or location to another.
- 19. A long-term cyberattack where hackers secretly gather information.
- 22. A type of phishing attack where malicious links or deceptive content are embedded within an image in an email or on a website, rather than in plain text.
- 23. A digital service or system that enables users to store, access, and distribute electronic files with others.(GDPR) An EU law protecting the personal data and privacy of individuals within the European Union, with global impact.
- 24. A senior-level executive responsible for establishing and maintaining an organization's information security program. They are the ultimate authority and expert on data protection within the company.
Down
- 1. A team of cybersecurity experts who monitor, detect, and respond to threats targeting an organization’s networks, systems, and data.
- 2. The act of adhering to rules, regulations, laws, standards, and ethical guidelines that are applicable to an organization, industry, or individual.
- 3. designed to detect and remove computer viruses.
- 5. The process of deleting stored data from websites in your web browser. This helps remove personal information, login details, and browsing history, enhancing privacy and security.
- 6. Rules that define and control who (users, applications, services) can access specific resources (data, applications, infrastructure) and what actions they are allowed to perform within the cloud environment.
- 9. A security process that requires users to provide two or more verification factors to gain access to an online account, application, network, or other resource.
- 10. A Canadian federal law that governs how private-sector organizations collect, use, and disclose personal information during commercial activities.
- 15. Electronic keys that grant or restrict entry to specific areas or resources.
- 16. A US-based law protecting the privacy and security of individuals' health information.
- 17. A misleading or exaggerated headline, image, or link designed to attract clicks, often by creating curiosity or excitement.
- 18. A computer program that automatically performs tasks, often used to send spam or create fake accounts.
- 20. Errors in computer programs that cause problems or slow performance.
- 21. A feature in cloud storage and file-sharing platforms that allows users to generate a unique web link (URL) to a specific file or folder stored in the cloud. This link can then be shared with others, granting them access to view, download, and sometimes even edit the content, depending on the permissions set by the owner.
- 24. A security tool used by websites to differentiate humans from computer programs or bots.
