IEEE Data Privacy Day

12345678910111213141516171819202122232425
Across
  1. 1. Unauthorized access, collection, use, disclosure or disposal of personal information is called a privacy ___.
  2. 4. Tricking people into revealing their account details, specifically done online.
  3. 7. The process of transformation of data into an unrecognizable form, using some specific set of rules.
  4. 8. The process of specifying access rights to data resources.
  5. 9. A value needed to both encrypt and decrypt data.
  6. 10. Stored data about physical characteristics of users, often used to verify identities.
  7. 13. To ___ your Facebook account, it must first be deactivated.
  8. 14. A service that, when connected to, replaces all your traffic's IP address with its own.
  9. 15. Wrapping your credit cards with this prevents them from being scanned without your knowledge.
  10. 17. A method or tool hidden in some system that allows undetected bypassing of security measures and access to the system.
  11. 20. Physical copies of confidential data are problematic in regards to ___.
  12. 22. Personal data relevant to ethnicity, religion, political belief, sexual preference, etc. is called ___ data.
  13. 23. For your personal data to be legally used by others, you must provide ___.
  14. 24. Ensuring the security of a system involves penetration ___.
Down
  1. 2. The process of requesting access to a protected data resource by proving your identity.
  2. 3. A system whose security is open for exploitation is said to be ___.
  3. 5. Software that can be installed on your system without your knowledge and used to gather information on you.
  4. 6. Automatic embedding of location data when you take photos.
  5. 11. The science that includes cryptography and cryptanalysis.
  6. 12. This feature of Facebook, introduced as an overhaul of the "wall" in 2011, came under criticism for violating user privacy.
  7. 16. Hackers could compromise a private database using a type of attack called SQL ___.
  8. 18. Taking unauthorized control of a connection that someone else has established (Think planes).
  9. 19. A ___ signature identifies the sender of some data and verifies that the data has not changed during transmission.
  10. 21. A file that keeps a records of activities performed on a system.
  11. 25. Manipulating people into revealing confidential information is called ___ engineering.