CYBER AND DIGITAL LITERACY

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 2. Unauthorized use of personal information.
  2. 4. Practices for maintaining cybersecurity.
  3. 5. Potential harm from cyber threats.
  4. 6. Protecting networks from unauthorized access.
  5. 7. Understanding cybersecurity risks.
  6. 10. Potential dangers to digital systems.
  7. 11. Rules governing cybersecurity practices.
  8. 12. Safeguarding data from unauthorized access.
  9. 14. Measures to protect against cyber threats.
  10. 15. Malicious software designed to harm systems.
  11. 16. response Reacting to and mitigating cyber incidents.
  12. 17. Individuals working in cybersecurity roles.
  13. 19. Fraudulent attempt to obtain sensitive information.
  14. 20. Ability to use digital tools effectively.
  15. 22. Bullying using electronic means.
  16. 24. Ensuring a healthy digital lifestyle.
  17. 26. Measures to protect digital assets.
  18. 28. Security event affecting digital systems.
  19. 30. Learning about cybersecurity practices.
  20. 31. Criminal activities conducted online.
  21. 32. Manipulating individuals to divulge information.
  22. 34. Self-replicating malicious code.
  23. 37. Practice of protecting digital systems.
  24. 38. Practices for staying safe online.
  25. 40. Dual verification for user identity.
  26. 42. Secret code for accessing systems.
  27. 43. Legal regulations governing cyberspace.
  28. 44. Converting data into a code to secure it.
  29. 45. Deceptive attempt to acquire sensitive information.
  30. 46. Traces of online activity.
  31. 47. Virtual Private Network for secure connections.
  32. 48. a type of malicious software that self-replicates and spreads to other computer systems
  33. 49. Unsolicited and often irrelevant messages.
Down
  1. 1. Unauthorized access to sensitive data.
  2. 3. Responsible behavior online.
  3. 5. Covertly obtaining information from digital systems.
  4. 8. Gathering and analyzing data to prevent cyber threats.
  5. 9. the state of being protected from harm, danger, or risk,
  6. 13. Verifying user identity.
  7. 18. Intentional assault on computer systems.
  8. 21. Protecting network endpoints from threats.
  9. 23. Malware that encrypts data for ransom.
  10. 25. Moral principles guiding online behavior.
  11. 27. Encrypted and protected communication channels.
  12. 29. Global network connecting computers worldwide.
  13. 32. Safely navigating the internet.
  14. 33. Storing and accessing data over the internet.
  15. 35. Maintaining a healthy digital lifestyle.
  16. 36. Ability to withstand and recover from cyber attacks.
  17. 39. are individuals or groups with advanced technical skills who use their expertise to gain unauthorized access to computer systems,
  18. 41. Control over personal data usage.