Cyber Security
Across
- 2. - Open-access
- 3. - Protective-measure
- 6. - Connected-system
- 10. - Origin-info
- 11. - Innovation-tools
- 13. - Behavior-rules
- 16. - Correct-form
- 17. - Technique-used
- 18. - Grasp-meaning
- 20. - Personal-boundaries
- 22. - Obtain-asset
- 23. - Secure-code
- 25. - Lawful-acts
- 27. - Showcase-example
- 31. - Community-rules
- 33. - Valuable-item
- 35. - Identify-threats
- 36. - Official-regulations
- 38. - Knowledge-data
- 39. - Recognized-known
Down
- 1. - Societal-norms
- 4. - No-cost
- 5. - Represent-example
- 7. - Investigate-topic
- 8. - Problematic-matters
- 9. - Guidelines-rules
- 12. - Digital-responsibility
- 14. - Protection-law
- 15. - Free-access
- 19. - Available-choices
- 21. - Permissible-actions
- 24. - Distributing-resource
- 26. - Learner-individual
- 27. - Tech-based
- 28. - Progress-innovation
- 29. - Safety-measures
- 30. - Reference-source
- 32. - Stop-risks
- 34. - Morally-right
- 37. - Evaluate-differences