Digital privacy and security
Across
- 2. Attacks that often involve fraudulent emails
- 3. A foundation of information
- 4. Options available to customise the privacy of your device
- 6. A longer, more complex password that is meaningful to the user
- 10. Unauthorised access or disclosure of sensitive information
- 12. Process of verifying someone's identity
- 13. The right to control personal information and limit access
Down
- 1. A security method that requires users to provide multiple forms of identity
- 5. Malicious Software designed to harm or disrupt your computer
- 7. The practice of guarding personal data from harm or loss
- 8. To keep safe
- 9. Not having permission or approval
- 11. Small text files stored on your computer by websites you visit