Across
- 6. Status of a member in a community.
- 8. Protection for computer systems.
- 10. Knowledge or perception.
- 11. Legal standards governing the internet.
- 12. Global network connecting millions of computers.
- 14. Connected to the internet.
- 16. Moral guidelines for digital behavior.
- 18. Relating to society.
- 22. Data conveyed or represented.
- 23. Protection against cyber threats.
- 25. Attempt to damage or disrupt computers.
- 26. Software to access the internet.
- 28. Practices for maintaining system health.
- 29. Communication outlets or tools.
- 31. Protection against threats.
- 33. Programs and other operating information.
- 37. Skills to effectively use digital technology.
- 38. Conversion of data into secure code.
- 39. Verification of credentials.
- 42. Group of connected computers.
- 43. Pertaining to computers or electronics.
- 45. Software that detects and removes malware.
- 46. Barrier against network intrusion.
- 47. Collected information.
Down
- 1. Barrier against network intrusion.
- 2. Fraudulent attempt to obtain sensitive information.
- 3. Investigating digital crimes
- 4. Secrecy of personal information.
- 5. Ethics in techonology use.
- 7. Stealing personal information for fraud.
- 9. Tool made for a specific use.
- 11. Understanding of online safety risks.
- 13. Etiquette in online communication.
- 15. Personal characteristics defining an individual.
- 16. Data files stored on computers.
- 17. Physical parts of a computer.
- 19. Harassment using electronic means.
- 20. Device that forwards data packets.
- 21. Protection from harm or danger.
- 24. Verification of credentials.
- 27. Crime involving computers.
- 30. Unauthorized access to data.
- 31. Deceptive scheme or trick.
- 32. Unsolicited digital messages.
- 34. Record of one's online activity.
- 35. Secret code for access.
- 36. Trace left by activity.
- 40. Enhanced security method requiring two steps.
- 41. People who break into computers.
- 44. Malicious software.