Across
- 2. Details like your name, address, phone number, or passwords
- 4. Knowing how to find, evaluate, and use digital information safely
- 7. The personal trail of info you leave behind when using the internet
- 8. Protecting networks, devices, and data from attacks or damage
- 9. Controls that help you decide who can see your posts or account info
- 10. A second security step that confirms your identity, like a code sent to your phone
Down
- 1. The version of yourself you create or share online
- 3. An online message or email meant to trick you into sharing private data
- 5. When private information is accessed or stolen without permission
- 6. How others view you based on what they see about you online
