Across
- 3. (8,5) - Crime involving stealing another person’s personal information
- 7. (7,7) - Protection of personal information stored or shared online
- 10. (4,6) - Incident where confidential information is accessed without permission
- 11. (8,10) - Process of creating, storing and maintaining secure passwords
- 12. (5,8) - Protection of digital systems and networks against online attacks
- 15. (11) - Laws and regulations controlling the use and protection of data
- 16. (6,8) - Monitoring and recording user activities on the internet
- 17. (1,10) - Online image or opinion people form about an individual or organisation
- 18. (4,8) - Protection of digital information from unauthorised access or damage
- 19. (8,8) - Small files used to monitor and record online activity
- 20. (6,6) - Safe and authorised method of entering a computer system or network
Down
- 1. (7,4,10,10) - GDPR law protecting personal data and privacy
- 2. (9,8) - Harmful programs intended to damage systems or steal information
- 4. (8,9) - Process of identifying harmful software within a system
- 5. (10,6) - Security system using fingerprints or other body features for identification
- 6. ACT (4,10,3) - UK law controlling how personal information is collected and used
- 8. (8,8) - Methods used to protect systems, devices and information from threats
- 9. (4) - Regulation designed to improve protection and control of personal data
- 13. (7,8) - Protection of networks and connected devices from cyber threats
- 14. (4,14) - Process of confirming the identity of a user accessing a system
- 15. (6,5) - Physical security measure preventing unauthorised entry
