CYBER & DIGITAL LITERACY crossword puzzle

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 6. Status of a member in a community.
  2. 8. Protection for computer systems.
  3. 10. Knowledge or perception.
  4. 11. Legal standards governing the internet.
  5. 12. Global network connecting millions of computers.
  6. 14. Connected to the internet.
  7. 16. Moral guidelines for digital behavior.
  8. 18. Relating to society.
  9. 22. Data conveyed or represented.
  10. 23. Protection against cyber threats.
  11. 25. Attempt to damage or disrupt computers.
  12. 26. Software to access the internet.
  13. 28. Practices for maintaining system health.
  14. 29. Communication outlets or tools.
  15. 31. Protection against threats.
  16. 33. Programs and other operating information.
  17. 37. Skills to effectively use digital technology.
  18. 38. Conversion of data into secure code.
  19. 39. Verification of credentials.
  20. 42. Group of connected computers.
  21. 43. Pertaining to computers or electronics.
  22. 45. Software that detects and removes malware.
  23. 46. Barrier against network intrusion.
  24. 47. Collected information.
Down
  1. 1. Barrier against network intrusion.
  2. 2. Fraudulent attempt to obtain sensitive information.
  3. 3. Investigating digital crimes
  4. 4. Secrecy of personal information.
  5. 5. Ethics in techonology use.
  6. 7. Stealing personal information for fraud.
  7. 9. Tool made for a specific use.
  8. 11. Understanding of online safety risks.
  9. 13. Etiquette in online communication.
  10. 15. Personal characteristics defining an individual.
  11. 16. Data files stored on computers.
  12. 17. Physical parts of a computer.
  13. 19. Harassment using electronic means.
  14. 20. Device that forwards data packets.
  15. 21. Protection from harm or danger.
  16. 24. Verification of credentials.
  17. 27. Crime involving computers.
  18. 30. Unauthorized access to data.
  19. 31. Deceptive scheme or trick.
  20. 32. Unsolicited digital messages.
  21. 34. Record of one's online activity.
  22. 35. Secret code for access.
  23. 36. Trace left by activity.
  24. 40. Enhanced security method requiring two steps.
  25. 41. People who break into computers.
  26. 44. Malicious software.