Across
- 3. Adhering to data protection regulations.
- 4. The potential for loss or damage.
- 5. The technique of obscuring specific data within a database to protect sensitive information.
- 6. A weakness that can be exploited.
- 8. A network security system that monitors and controls incoming and outgoing network traffic.
- 11. A copy of data stored separately to protect against data loss.
- 12. A type of cyber attack where attackers trick individuals into providing sensitive information.
- 13. Verifying the identity of a user or system before granting access.
Down
- 1. An event that compromises data security.
- 2. Ensuring that information is accessible only to those authorized to have access.
- 7. Data Loss Prevention, strategies to prevent data breaches.
- 9. The process of converting information into a secure format to prevent unauthorized access.
- 10. Maintaining the accuracy and completeness of data.
- 11. An unauthorized access or exposure of sensitive data.
