Across
- 3. Laws in Europe that regulate how companies can collect personal data
- 6. Flaw or weakness in a system or device
- 8. Type of authentication that requires 2 ways to identify a user
- 9. Type of data that stores users medical records
- 11. General term used to describe an individual or a group of hackers
- 12. Process of measuring what is happening within the system
- 13. The ability to find information, evaluate information credibility, and use information effectively
- 14. Software that prevents users from accessing their files or network until a ransom is paid.
- 16. Type of data that stores users bank account and credit card numbers
- 18. Videos, images, or audio recordings that have been convincingly altered using artificial intelligence
- 20. The science of making machines that can "think" and “create” like humans.
- 22. Type of software that is designed to intentionally harm or damage a computer or network.
- 23. The assurance that systems and data are accessible by authorized users when and where needed
- 25. The protection of information from people who are not authorized to view it
- 28. Software that secretly gathers information about a person or organization and sends it to an attacker
- 29. Type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
- 31. Cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company
- 33. Authentication that uses an individual’s physical characteristics to verify their identity
- 34. Ensures that one cannot deny having sent or received a message
- 37. Type of data that store a users fingerprint or facial recognition
- 38. Potential for a cybercriminal to exploit a vulnerability
- 39. Specific group of hackers who are motivated by their ideological views.
- 40. A long password be made of a sentence or a series of words
- 41. The information about a particular person that exists on the Internet as a result of their online activity
- 42. Software that make it easy to have strong, unique passwords for all of your accounts
Down
- 1. AI algorithms can help flag anomalies in data
- 2. Current or former employees who seek revenge on a company by abusing their access to files and passwords
- 4. Any information that can be used to identify an individual (aka Personal Data)
- 5. Network security device that monitors and filters incoming and outgoing network traffic.
- 7. Systems that suggest the next video or song based on your patterns and the patterns of other similar consumers
- 10. Process of enforcing policies and user privileges
- 15. Aims at ensuring that information is protected from unauthorized or unintentional alteration
- 17. External mechanism of control. Rules set in place by someone else.
- 19. Hackers that are sponsored by a country.
- 21. Group of hackers with ideological views but act with the intent to harm, typically resulting in violence
- 24. Potential for loss when an attack happens
- 26. Hackers that attack computers for the fun and challenge of it all
- 27. Legal document outlining how a company can collect and use your data
- 30. Process of identifying a user and granting them access
- 32. Laws in California that protect consumers and regulates companies that collect and sell data
- 35. Network of physical devices embedded with electronics which enables things to connect and exchange data
- 36. Internal system of controls. Knowing the difference between right and wrong.
