Across
- 2. Malicious software, including but not limited to viruses, trojan horse applications, rootkits, and backdoors.
- 4. A small piece of data sent from a website and stored in your web browser as a record of browser activity.
- 6. Cyber attackers use fraudulent messages or websites to get information from unsuspecting users.
- 8. Consent that requires you to act.
- 9. Snippets of code used on web pages to gather information about website visitors and track their activity.
- 10. Locking your credit data until you give permission for it to be released.
- 12. Data such as fingerprint, DNA or handwriting.
Down
- 1. Automated processing of personal data to analyze personal preferences, activity, and so on.
- 3. A process by which personal data is irreversibly altered in such a way that a person can no longer be identified.
- 5. Software that selectively blocks incoming or outgoing network communications based on security rules
- 7. Any event that has resulted in (or could result in) unauthorized use, access, or disclosure of personal data.
- 11. The process of transforming readable data (clear text) into a form that is unreadable.
