Across
- 4. Snippets of code used on web pages to gather information about website visitors and track their activity.
- 5. Automated processing of personal data to analyze personal preferences, activity, and so on.
- 8. The process of transforming readable data (clear text) into a form that is unreadable.
- 9. Software that selectively blocks incoming or outgoing network communications based on security rules
- 11. A process by which personal data is irreversibly altered in such a way that a person can no longer be identified.
Down
- 1. Data such as fingerprint, DNA or handwriting.
- 2. Consent that requires you to act.
- 3. A small piece of data sent from a website and stored in your web browser as a record of browser activity.
- 4. Cyber attackers use fraudulent messages or websites to get information from unsuspecting users.
- 6. Any event that has resulted in (or could result in) unauthorized use, access, or disclosure of personal data.
- 7. Locking your credit data until you give permission for it to be released.
- 10. Malicious software, including but not limited to viruses, trojan horse applications, rootkits, and backdoors.
