Across
- 3. Personal ______ is any ______ that can be used to identify an individual, either on its own or in combination with other _______.
- 6. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- 8. A social _____ is someone who tries to manipulate or trick others into providing sensitive information or taking certain actions.
- 9. Do Your Part to be Security ______
- 11. Avoid sharing personal ____ information online.
- 12. If you suspect a phishing email, you should ____ to cybersecurity.
Down
- 1. Avoid Connecting to ____ WIFI.
- 2. A type of phishing attack where malware are embedded in __ codes
- 4. An easy tool to keep track of passwords
- 5. Passwords with longer ______ are more difficult to crack.
- 7. Text Message from someone pretending to be our CEO asking for a gift card
- 10. Only download company ______ software