Cyber Security

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 2. - Open-access
  2. 3. - Protective-measure
  3. 6. - Connected-system
  4. 10. - Origin-info
  5. 11. - Innovation-tools
  6. 13. - Behavior-rules
  7. 16. - Correct-form
  8. 17. - Technique-used
  9. 18. - Grasp-meaning
  10. 20. - Personal-boundaries
  11. 22. - Obtain-asset
  12. 23. - Secure-code
  13. 25. - Lawful-acts
  14. 27. - Showcase-example
  15. 31. - Community-rules
  16. 33. - Valuable-item
  17. 35. - Identify-threats
  18. 36. - Official-regulations
  19. 38. - Knowledge-data
  20. 39. - Recognized-known
Down
  1. 1. - Societal-norms
  2. 4. - No-cost
  3. 5. - Represent-example
  4. 7. - Investigate-topic
  5. 8. - Problematic-matters
  6. 9. - Guidelines-rules
  7. 12. - Digital-responsibility
  8. 14. - Protection-law
  9. 15. - Free-access
  10. 19. - Available-choices
  11. 21. - Permissible-actions
  12. 24. - Distributing-resource
  13. 26. - Learner-individual
  14. 27. - Tech-based
  15. 28. - Progress-innovation
  16. 29. - Safety-measures
  17. 30. - Reference-source
  18. 32. - Stop-risks
  19. 34. - Morally-right
  20. 37. - Evaluate-differences