Across
- 2. Any data that can be used to identify an individual, such as name, address, phone number, or email.
- 8. The ability to control what personal information is shared online and who has access to it.
- 9. The perception others have of an individual based on their online activity, including posts, comments, and interactions.
- 10. Practices and technologies designed to protect computers, networks, and data from unauthorized access or attacks.
Down
- 1. The trail of data you leave behind when using the internet, including social media activity, browsing history, and online purchases.
- 3. The process of converting data into a secure code to protect it from unauthorized access.
- 4. The representation of an individual or organization online through their activities, posts, and interactions on social media platforms.
- 5. An incident where private information is accessed or stolen without permission.
- 6. Small files stored on a user's device by websites to track online behavior and preferences.
- 7. Information about data, such as the time and location of a photo, that helps describe or identify it.
