iSEC Dimensions, CrossWord

123456789101112131415161718
Across
  1. 2. A device or software that prevents unauthorized access to a network.
  2. 4. The reliability of a system to remain functional without downtime.
  3. 5. An intentional process of making data permanently unusable.
  4. 6. Hiding or covering something.
  5. 8. A technique to protect personal data in datasets.
  6. 10. An attack where a user is tricked into revealing personal information.
  7. 12. The illegal copying and distribution of software.
  8. 13. A secure method for transmitting data over a public network, often used for remote work.
  9. 15. Process for labeling data by security or compliance requirements.
  10. 17. Transforms plaintext into unreadable text.
  11. 18. A technique used to hide or obfuscate sensitive information in documents, emails, etc.
Down
  1. 1. A DLP strategy that prevents data from being copied, shared, or printed outside defined boundries.
  2. 3. The duration files are kept before deletion.
  3. 4. Feature ensuring users see only what they are allowed to.
  4. 7. A detailed record of data access or modifications, often used for monitoring and security purposes.
  5. 9. The act of disguising information.
  6. 10. A secret word or phrase used to protect accounts.
  7. 11. A regulatory requirement for protecting personal data, especially in the EU.
  8. 14. A set of rules that govern how data is used and shared.
  9. 16. The act of ensuring that data remains accurate and unaltered.