Cyber and digital literacy

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 5. - Knowledge of cyber risks and precautions.
  2. 7. - Writing instructions for computers.
  3. 11. - Legal regulations governing cyberspace.
  4. 13. - Right to control personal information.
  5. 15. - Internet-based currency for online transactions.
  6. 20. - Verification of a user's identity.
  7. 22. - Individuals gaining unauthorized access to systems.
  8. 24. - Global network connecting computers worldwide.
  9. 25. - Practices to maintain online safety and security.
  10. 30. - Accountability for one's online actions.
  11. 32. - Gap between those with and without access to technology.
  12. 35. - Banking services conducted over the internet.
  13. 36. - Investigation of cybercrimes.
  14. 38. - Fraudulent acquisition of someone's identity.
  15. 39. - Representation of a person's online presence.
  16. 41. - Study of human behavior in cyberspace.
  17. 42. - Platforms for online social interaction.
  18. 43. - Conflict conducted in the digital realm.
  19. 45. - Programs and applications for computers.
  20. 47. - Fraudulent attempt to obtain sensitive information.
  21. 48. - Ethical behavior in the digital world.
Down
  1. 1. - Education on protecting against cyber threats.
  2. 2. - Electronic system for online financial transactions.
  3. 3. - Gathering and analyzing digital threat information.
  4. 4. - Securing data by converting it into a code.
  5. 6. - Secret word or phrase to access a system.
  6. 7. - Harassment or intimidation online.
  7. 8. - Person raised in the digital age.
  8. 9. - Measures to protect against cyber attacks.
  9. 10. - Protection of digital systems from cyber threats.
  10. 11. - Understanding of cyber threats and safety measures.
  11. 12. - Protection against cyber-related losses.
  12. 14. - Encoding data for secure transmission.
  13. 16. - Shared values and norms in the digital community.
  14. 17. - Barrier to block unauthorized access to a network.
  15. 18. - Rights related to digital content and technology.
  16. 19. - Mobile phone with advanced capabilities.
  17. 21. - Criminal activities conducted via digital means.
  18. 23. - Potential dangers to digital systems.
  19. 26. - Promoting products or services online.
  20. 27. - Responsible use of technology.
  21. 28. - Unsolicited and often irrelevant messages.
  22. 29. - Software designed to harm or infiltrate a system.
  23. 31. - Protection of sensitive information.
  24. 33. - Ability to effectively use digital tools and technologies.
  25. 34. - Trail of data left by online activity.
  26. 37. - Deliberate exploitation of computer systems.
  27. 40. - Malicious software that replicates itself.
  28. 44. - Unique name used to identify oneself online.
  29. 46. - System of interconnected computers.