Digital privacy and security

12345678910111213
Across
  1. 2. Attacks that often involve fraudulent emails
  2. 3. A foundation of information
  3. 4. Options available to customise the privacy of your device
  4. 6. A longer, more complex password that is meaningful to the user
  5. 10. Unauthorised access or disclosure of sensitive information
  6. 12. Process of verifying someone's identity
  7. 13. The right to control personal information and limit access
Down
  1. 1. A security method that requires users to provide multiple forms of identity
  2. 5. Malicious Software designed to harm or disrupt your computer
  3. 7. The practice of guarding personal data from harm or loss
  4. 8. To keep safe
  5. 9. Not having permission or approval
  6. 11. Small text files stored on your computer by websites you visit