Across
- 4. The regulation that protects EU residents’ data
- 7. What is the technique that replace, remove or transform information that identifies individuals, and keep that information separate
- 9. Which country enforces the PDPA?
- 11. What is the process of verifying user identity?
- 12. A form of malware designed to extort
- 13. What is the second word in the CIA Trian
- 15. What is the process of removing personal identifiers from data?
- 16. The type of data protected under GDPR
Down
- 1. What is the most common method of stealing passwords?
- 2. Which cyber attack attempts to guess passwords repeatedly?
- 3. What is a security weakness in software called?
- 5. What is the unauthorized tracking of user behaviour online?
- 6. Which country enforces the CCPA?
- 8. medical records, sexual orientation, biometrics are examples of ……. personal information
- 10. The process of encoding information in a manner that permits access and comprehension solely by authorised parties.
- 14. What is a common attack that floods a network with traffic?
