Data Security

1234567
Across
  1. 2. Enables users to view and use data
  2. 6. Used to validate a user’s access and make sure they claim who they are
  3. 7. A stricter type of authentication
Down
  1. 1. What you use with a username to log in
  2. 3. The total of all data exposed to a person during a single sign in
  3. 4. the fraudulent practice of sending emails to reveal personal information
  4. 5. a type of malicious software designed to block access to a computer system until a sum of money is paid
  5. 6. A periodical review of security actions and user activity