Across
- 1. A key document that explains how an individual's data is stored, used, and shared.
- 2. A security system that monitors and controls incoming and outgoing network traffic.
- 3. An extra layer of security that requires more than just a password.
- 4. A cyber attack where attackers trick individuals into revealing sensitive information.
- 7. The process of removing personal identifiers from datasets.
- 8. The act of removing or disguising personal identifiers from datasets.
- 10. A tool used to record every keystroke typed on a keyboard.
- 13. The practice of protecting systems, networks, and programs from digital attacks.
- 16. Data that describes and gives information about other data.
- 18. Theft Fraudulent use of someone's personal data to commit crimes.
- 19. A browser feature that prevents storing history, cookies, and site data.
- 22. Malicious software that locks users out of their data until a ransom is paid.
Down
- 1. AI-generated media that mimics real people and can be used for deception.
- 5. Unauthorized access or damage to computer systems and networks.
- 6. Small files stored on a user’s browser to track online activities.
- 9. Malicious software designed to harm or exploit computers and networks.
- 11. The process of encoding information to prevent unauthorized access.
- 12. Malicious software that secretly gathers user information.
- 14. A U.S. law that gives California residents rights over their personal data.
- 15. Publishing private or identifying information about someone online without consent.
- 17. A tool that encrypts internet connections to enhance privacy.
- 20. A European Union law that regulates data protection and privacy.
- 21. Software vulnerability unknown to developers and exploited by hackers.
