Across
- 3. The data connected to a specific person that could be used to identify them.
- 6. __ is software that is created to damage or gain unauthorized access to a computer system.
- 9. You should never share or reuse these.
- 11. Always keep your passwords in a __ place.
- 12. You should utilize a __ and firewalls to keep your data protected.
- 13. Always ensure your __ is up to date.
Down
- 1. Many AI systems have been found to reflect __ in their training.
- 2. Spending too much time online can have a negative __.
- 3. The practice of sending messages pretending to be a legitimate source in hopes of receiving personal information is called __.
- 4. You should have __ factor authentication turned on.
- 5. The 20-20-20 rule is a common tool people use to ensure they are taking ___ from their screens.
- 7. Your password should __ or more characters long.
- 8. If you ever feel uncomfortable, the best thing you can do is __ or report the source.
- 9. A good example of this is "myfishfellfromthetree".
- 10. Sharing personal information can lead to this kind of theft.
