Across
- 5. Data cleansing will eliminate data that are ________.
- 6. DNC Registry allows one to opt out of receiving __________ calls and messages
- 9. Operational _______ refers to business disruption as a result of data breach.
- 11. Operational security is also known as _______ security.
- 12. A common form of MFA is two-factor __________.
- 13. What type of system is required to keep customers' data secure?
- 15. One way to ethically gain customer data is through a ________ survey.
- 16. DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
- 1. ______ loggers steal login credentials and sensitive enterprise data.
- 2. Patch updates could be delayed due to undiscovered __________ before a major software update.
- 3. One of the consequences of security breach is ______ damage.
- 4. Trojans are malicious programs disguised as ________ ones.
- 7. PDDA stands for Personal Data ________ Act
- 8. Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
- 10. Too much data is also known as data ______.
- 14. They key concepts of PDPA are consent, reasonableness and ________.
