Across
- 2. A device or software that prevents unauthorized access to a network.
- 4. The reliability of a system to remain functional without downtime.
- 5. An intentional process of making data permanently unusable.
- 6. Hiding or covering something.
- 8. A technique to protect personal data in datasets.
- 10. An attack where a user is tricked into revealing personal information.
- 12. The illegal copying and distribution of software.
- 13. A secure method for transmitting data over a public network, often used for remote work.
- 15. Process for labeling data by security or compliance requirements.
- 17. Transforms plaintext into unreadable text.
- 18. A technique used to hide or obfuscate sensitive information in documents, emails, etc.
Down
- 1. A DLP strategy that prevents data from being copied, shared, or printed outside defined boundries.
- 3. The duration files are kept before deletion.
- 4. Feature ensuring users see only what they are allowed to.
- 7. A detailed record of data access or modifications, often used for monitoring and security purposes.
- 9. The act of disguising information.
- 10. A secret word or phrase used to protect accounts.
- 11. A regulatory requirement for protecting personal data, especially in the EU.
- 14. A set of rules that govern how data is used and shared.
- 16. The act of ensuring that data remains accurate and unaltered.
