Across
- 2. Relating to digital technology.
- 5. Bullying online.
- 10. Protection from harm.
- 12. Protecting digital systems.
- 15. Control over personal information.
- 16. Malicious software.
- 20. Connected to the internet.
- 21. Fraudulent information request.
- 28. Having knowledge and using technology safely and effective
- 29. Malicious self-replicating code.
- 30. Software to access websites.
- 31. Unique characteristics of an individual.
- 32. Interconnected computers.
- 34. Intentional attack on systems.
- 38. Global computer network.
- 40. Secret access code.
- 42. Traces of online activity.
- 43. Unsolicited messages.
- 45. Criminal activities online.
- 46. Hardware with a function.
- 48. Deceptive scheme.
- 49. Information in digital form.
- 50. Computer programs.
Down
- 1. Relating to society.
- 3. the ability to analyze and evaluate infomation.
- 4. A cyber attack that redirects website traffic to a fraudulent site
- 6. Organized and meaningful data.
- 7. Unauthorized system access.
- 8. Moral principles online.
- 9. Traces of online activity.
- 11. Verifying user identity.
- 13. Making a copy of data to protect against loss or damage
- 14. Practices for cybersecurity.
- 17. Communication channels.
- 18. Protecting systems from attacks.
- 19. Converting data into code.
- 22. Ability to use digital tools.
- 23. Understanding cybersecurity threats.
- 24. Laws governing cyberspace.
- 25. Membership in a country.
- 26. Unauthorized use of personal information.
- 27. Network security system.
- 33. A secret codr used to access a computer system or online account
- 34. Data stored by websites.
- 35. Knowledge or perception of a situation.
- 36. Dual authentication.
- 37. Software to detect and remove viruses.
- 39. Device forwarding data.
- 41. Physical computer components.
- 44. Measures for protection.
- 47. Unauthorized data access.