Across
- 1. Unauthorized access, collection, use, disclosure or disposal of personal information is called a privacy ___.
- 4. Tricking people into revealing their account details, specifically done online.
- 7. The process of transformation of data into an unrecognizable form, using some specific set of rules.
- 8. The process of specifying access rights to data resources.
- 9. A value needed to both encrypt and decrypt data.
- 10. Stored data about physical characteristics of users, often used to verify identities.
- 13. To ___ your Facebook account, it must first be deactivated.
- 14. A service that, when connected to, replaces all your traffic's IP address with its own.
- 15. Wrapping your credit cards with this prevents them from being scanned without your knowledge.
- 17. A method or tool hidden in some system that allows undetected bypassing of security measures and access to the system.
- 20. Physical copies of confidential data are problematic in regards to ___.
- 22. Personal data relevant to ethnicity, religion, political belief, sexual preference, etc. is called ___ data.
- 23. For your personal data to be legally used by others, you must provide ___.
- 24. Ensuring the security of a system involves penetration ___.
Down
- 2. The process of requesting access to a protected data resource by proving your identity.
- 3. A system whose security is open for exploitation is said to be ___.
- 5. Software that can be installed on your system without your knowledge and used to gather information on you.
- 6. Automatic embedding of location data when you take photos.
- 11. The science that includes cryptography and cryptanalysis.
- 12. This feature of Facebook, introduced as an overhaul of the "wall" in 2011, came under criticism for violating user privacy.
- 16. Hackers could compromise a private database using a type of attack called SQL ___.
- 18. Taking unauthorized control of a connection that someone else has established (Think planes).
- 19. A ___ signature identifies the sender of some data and verifies that the data has not changed during transmission.
- 21. A file that keeps a records of activities performed on a system.
- 25. Manipulating people into revealing confidential information is called ___ engineering.
