CYBER AND DIGITAL LITERACY
Across
- 5. - Knowledge of cyber risks and precautions.
- 7. - Writing instructions for computers.
- 11. - Legal regulations governing cyberspace.
- 13. - Right to control personal information.
- 15. - Internet-based currency for online transactions.
- 20. - Verification of a user's identity.
- 22. - Individuals gaining unauthorized access to systems.
- 24. - Global network connecting computers worldwide.
- 25. - Practices to maintain online safety and security.
- 30. - Accountability for one's online actions.
- 32. - Gap between those with and without access to technology.
- 35. - Banking services conducted over the internet.
- 36. - Investigation of cybercrimes.
- 38. - Fraudulent acquisition of someone's identity.
- 39. - Representation of a person's online presence.
- 41. - Study of human behavior in cyberspace.
- 42. - Platforms for online social interaction.
- 43. - Conflict conducted in the digital realm.
- 45. - Programs and applications for computers.
- 47. - Fraudulent attempt to obtain sensitive information.
- 48. - Ethical behavior in the digital world.
Down
- 1. - Education on protecting against cyber threats.
- 2. - Electronic system for online financial transactions.
- 3. - Gathering and analyzing digital threat information.
- 4. - Securing data by converting it into a code.
- 6. - Secret word or phrase to access a system.
- 7. - Harassment or intimidation online.
- 8. - Person raised in the digital age.
- 9. - Measures to protect against cyber attacks.
- 10. - Protection of digital systems from cyber threats.
- 11. - Understanding of cyber threats and safety measures.
- 12. - Protection against cyber-related losses.
- 14. - Encoding data for secure transmission.
- 16. - Shared values and norms in the digital community.
- 17. - Barrier to block unauthorized access to a network.
- 18. - Rights related to digital content and technology.
- 19. - Mobile phone with advanced capabilities.
- 21. - Criminal activities conducted via digital means.
- 23. - Potential dangers to digital systems.
- 26. - Promoting products or services online.
- 27. - Responsible use of technology.
- 28. - Unsolicited and often irrelevant messages.
- 29. - Software designed to harm or infiltrate a system.
- 31. - Protection of sensitive information.
- 33. - Ability to effectively use digital tools and technologies.
- 34. - Trail of data left by online activity.
- 37. - Deliberate exploitation of computer systems.
- 40. - Malicious software that replicates itself.
- 44. - Unique name used to identify oneself online.
- 46. - System of interconnected computers.