Across
- 2. Unauthorized access to data or systems
- 6. What employees must change regularly to maintain cybersecurity
- 7. Law requiring Canadian organizations to obtain consent before collecting data
- 8. The legal term for data that can identify an individual
- 10. A method of converting readable data into a coded format
- 11. The principle of limiting data collection to only what is necessary
Down
- 1. Cyberattacks often delivered through email, attempting to steal credentials
- 3. Fraudulent practice of sending fake emails pretending to be from a legitimate source
- 4. Software designed to detect and prevent malware
- 5. The act of reporting suspicious activity or data breaches
- 6. A secret word or phrase used to authenticate access to systems
- 8. Cybersecurity framework used for protecting payment data
- 9. Protection of sensitive information, also known as___
- 11. A method to authenticate users beyond just a password
