Data Security

123456789101112
Across
  1. 2. A measure taken to protect data
  2. 5. Ensuring data is accessible when needed
  3. 8. Technological tools like firewalls or encryption
  4. 10. Malware that locks data until a ransom is paid
  5. 11. Tangible security measures like locks or badges
  6. 12. Keeping information private and accessible only to authorized users
Down
  1. 1. When data is accessed or leaked without permission
  2. 3. Building products that respect user privacy and data rights
  3. 4. Relating to actions people take (like turning off location sharing)
  4. 6. The right to control who sees or uses your personal information
  5. 7. an individual or group that intentionally attempts to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes
  6. 9. Ensuring data remains accurate and unaltered