Across
- 2. A measure taken to protect data
- 5. Ensuring data is accessible when needed
- 8. Technological tools like firewalls or encryption
- 10. Malware that locks data until a ransom is paid
- 11. Tangible security measures like locks or badges
- 12. Keeping information private and accessible only to authorized users
Down
- 1. When data is accessed or leaked without permission
- 3. Building products that respect user privacy and data rights
- 4. Relating to actions people take (like turning off location sharing)
- 6. The right to control who sees or uses your personal information
- 7. an individual or group that intentionally attempts to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes
- 9. Ensuring data remains accurate and unaltered
