Cyber and DIGITAL LITERACY

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 1. - Criminal activities conducted via digital means.
  2. 4. - Measures to protect against cyber attacks.
  3. 7. - Secret word or phrase to access a system.
  4. 8. - Fraudulent acquisition of someone's identity.
  5. 9. - Rights related to digital content and technology.
  6. 10. - Securing data by converting it into a code.
  7. 11. - Shared values and norms in the digital community.
  8. 13. - Gathering and analyzing digital threat information.
  9. 14. - Practices to maintain online safety and security.
  10. 17. - Gap between those with and without access to technology.
  11. 19. - Protection against cyber-related losses.
  12. 20. - Study of human behavior in cyberspace.
  13. 23. - Understanding of cyber threats and safety measures.
  14. 25. - Malicious software that replicates itself.
  15. 26. - Software designed to harm or infiltrate a system.
  16. 27. - Promoting products or services online.
  17. 28. - Programs and applications for computers.
  18. 29. - Writing instructions for computers.
  19. 33. - System of interconnected computers.
  20. 34. - Potential dangers to digital systems.
  21. 39. - Person raised in the digital age.
  22. 40. - Knowledge of cyber risks and precautions.
  23. 41. - Mobile phone with advanced capabilities.
  24. 42. - Encoding data for secure transmission.
  25. 43. - Right to control personal information.
  26. 44. - Education on protecting against cyber threats.
  27. 45. - Global network connecting computers worldwide.
  28. 47. - Accountability for one's online actions.
  29. 48. - Banking services conducted over the internet.
  30. 49. - Unique name used to identify oneself online.
Down
  1. 2. - Ethical behavior in the digital world.
  2. 3. - Protection of sensitive information.
  3. 5. - Investigation of cybercrimes.
  4. 6. - Verification of a user's identity.
  5. 12. - Ability to effectively use digital tools and technologies.
  6. 15. - Harassment or intimidation online.
  7. 16. - Barrier to block unauthorized access to a network.
  8. 18. - Conflict conducted in the digital realm.
  9. 20. - Deliberate exploitation of computer systems.
  10. 21. - Protection of digital systems from cyber threats.
  11. 22. - Internet-based currency for online transactions.
  12. 24. - Platforms for online social interaction.
  13. 30. - Representation of a person's online presence.
  14. 31. - Fraudulent attempt to obtain sensitive information.
  15. 32. - Individuals gaining unauthorized access to systems.
  16. 35. - Unsolicited and often irrelevant messages.
  17. 36. - Legal regulations governing cyberspace.
  18. 37. - Responsible use of technology.
  19. 38. - Electronic system for online financial transactions.
  20. 46. footprint - Trail of data left by online activity.