Across
- 2. Information _________ is the right to have some control over how your personal information is collected and used.
- 5. The method by which information is converted into secret code that hides the information's true meaning
- 7. Data as processed, stored, or transmitted by a computer
- 9. A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
- 10. Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
- 1. Intrusive software that is designed to damage and destroy computers and computer systems
- 3. The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
- 4. When somebody sends an e-mail with a link to a bogus website it is called ___________
- 6. An organized collection of structured information, or data, typically stored electronically in a computer system
- 8. Smallest unit of data