Across
- 3. Process of cleaning, restructuring and enriching the raw data available into a more usable format. which will help the scientist quicken the process of decision making?
- 5. The strategy for wipeout or mitigate of the reason behind the threat is planned and dead?
- 7. ________ enhances privacy by replacing most identifying fields within a data record by one or more artificial identifier?
- 9. Privacy Assesment that every organization should conduct diligently?
- 10. Process of making copies of data or data files to use in the event the original data or data files are lost or destroyed?
- 11. When any data has to be transmitted over the computer network, it is broken down into smaller units at the sender’s node called?
- 13. Data, generated from characteristics of humans?
- 15. _________ is a security protocol to prevent "eavesdrop" on wireless data transmissions?
Down
- 1. Who is responsible for overseeing a company's data protection strategy and its implementation to ensure compliance with GDPR requirements?
- 2. Unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?
- 4. Name the mechanism which provides the highest level of data protection?
- 6. Computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use?
- 8. A cryptographic hash function containing a string of digits created by a one-way hashing formula?
- 12. Which is foundational to EU data protection law?
- 14. Browser is used for Privacy purpose?
