Across
- 1. A security process that verifies a person's identity based on their unique physical or behavioral characteristics.
- 3. The process of gathering and measuring information from various sources.
- 7. Software that secretly gathers information about a person or organization without their knowledge.
- 9. A type of malware that self-replicates and spreads to other files and systems.
- 10. Prejudice in favor of or against one thing, person, or group compared with another, usually in an unfair way.
- 12. Deliberate malicious attempts to breach an organization's or individual's information system.
- 14. Information that can be used to identify, contact, or locate a single person.
- 19. A security method requiring a user to provide two or more verification factors to gain access.
Down
- 2. A subset of MFA that requires exactly two different authentication factors.
- 4. The practice of protecting systems, networks, and programs from digital attacks.
- 5. The fraudulent practice of sending emails or other messages to deceive individuals into revealing personal information.
- 6. The trail of data you create while using the internet.
- 8. The process of verifying the identity of a user or system.
- 11. The process of reviewing a person's social media accounts as part of a background check.
- 13. A trial-and-error method used to guess a password or login information.
- 15. Bias Systematic errors in an AI's output due to flawed assumptions in the machine learning process.
- 16. A set of rules or instructions a computer follows to solve a problem or complete a task.
- 17. A type of malware that locks a user's files and demands a ransom for their release.
- 18. Software designed to cause damage or gain unauthorized access to a computer system.
