Data Privacy Crossword-2020

123456789101112131415
Across
  1. 3. Process of cleaning, restructuring and enriching the raw data available into a more usable format. which will help the scientist quicken the process of decision making?
  2. 5. The strategy for wipeout or mitigate of the reason behind the threat is planned and dead?
  3. 7. ________ enhances privacy by replacing most identifying fields within a data record by one or more artificial identifier?
  4. 9. Privacy Assesment that every organization should conduct diligently?
  5. 10. Process of making copies of data or data files to use in the event the original data or data files are lost or destroyed?
  6. 11. When any data has to be transmitted over the computer network, it is broken down into smaller units at the sender’s node called?
  7. 13. Data, generated from characteristics of humans?
  8. 15. _________ is a security protocol to prevent "eavesdrop" on wireless data transmissions?
Down
  1. 1. Who is responsible for overseeing a company's data protection strategy and its implementation to ensure compliance with GDPR requirements?
  2. 2. Unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?
  3. 4. Name the mechanism which provides the highest level of data protection?
  4. 6. Computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use?
  5. 8. A cryptographic hash function containing a string of digits created by a one-way hashing formula?
  6. 12. Which is foundational to EU data protection law?
  7. 14. Browser is used for Privacy purpose?