Cybersecurity Basics #1

123456789
Across
  1. 2. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
  2. 6. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
  3. 8. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
  4. 9. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
  1. 1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
  2. 3. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
  3. 4. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
  4. 5. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
  5. 7. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
  6. 9. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.