Cyber Safety

12345678910111213
Across
  1. 3. The data connected to a specific person that could be used to identify them.
  2. 6. __ is software that is created to damage or gain unauthorized access to a computer system.
  3. 9. You should never share or reuse these.
  4. 11. Always keep your passwords in a __ place.
  5. 12. You should utilize a __ and firewalls to keep your data protected.
  6. 13. Always ensure your __ is up to date.
Down
  1. 1. Many AI systems have been found to reflect __ in their training.
  2. 2. Spending too much time online can have a negative __.
  3. 3. The practice of sending messages pretending to be a legitimate source in hopes of receiving personal information is called __.
  4. 4. You should have __ factor authentication turned on.
  5. 5. The 20-20-20 rule is a common tool people use to ensure they are taking ___ from their screens.
  6. 7. Your password should __ or more characters long.
  7. 8. If you ever feel uncomfortable, the best thing you can do is __ or report the source.
  8. 9. A good example of this is "myfishfellfromthetree".
  9. 10. Sharing personal information can lead to this kind of theft.