2.
Details like a phone number, email, or address used to get in touch with a person or organization.
3.
Negative or unfavorable feedback from customers about a product or service.
4.
The highest rating a customer can give, indicating exceptional satisfaction with a product or service.
5.
Any personal data that could cause harm if disclosed, such as your Social Security number or medicalrecords.
6.
False or inaccurate information that is spread without the intent to cause harm.
7.
The use of digital devices to harass, threaten, or humiliate someone.
8.
policy: A legal document that explains how a website or company collects, uses, and protects user data.
9.
theft: When someone uses your personal or financial information without your permission to commit fraud.
10.
Malicious software that secretly monitors a user's activity and collects sensitive information without consent.
11.
A digital certificate that authenticates a website's identity and enables an encrypted, secure connection.
12.
A general term for any software designed to cause damage, disrupt systems, or steal information.
13.
A type of malicious software that encrypts a victim's files and demands a ransom payment to restore access.
14.
A type of malware that attaches to a program or file and