Across
- 1. - Criminal activities conducted via digital means.
- 4. - Measures to protect against cyber attacks.
- 7. - Secret word or phrase to access a system.
- 8. - Fraudulent acquisition of someone's identity.
- 9. - Rights related to digital content and technology.
- 10. - Securing data by converting it into a code.
- 11. - Shared values and norms in the digital community.
- 13. - Gathering and analyzing digital threat information.
- 14. - Practices to maintain online safety and security.
- 17. - Gap between those with and without access to technology.
- 19. - Protection against cyber-related losses.
- 20. - Study of human behavior in cyberspace.
- 23. - Understanding of cyber threats and safety measures.
- 25. - Malicious software that replicates itself.
- 26. - Software designed to harm or infiltrate a system.
- 27. - Promoting products or services online.
- 28. - Programs and applications for computers.
- 29. - Writing instructions for computers.
- 33. - System of interconnected computers.
- 34. - Potential dangers to digital systems.
- 39. - Person raised in the digital age.
- 40. - Knowledge of cyber risks and precautions.
- 41. - Mobile phone with advanced capabilities.
- 42. - Encoding data for secure transmission.
- 43. - Right to control personal information.
- 44. - Education on protecting against cyber threats.
- 45. - Global network connecting computers worldwide.
- 47. - Accountability for one's online actions.
- 48. - Banking services conducted over the internet.
- 49. - Unique name used to identify oneself online.
Down
- 2. - Ethical behavior in the digital world.
- 3. - Protection of sensitive information.
- 5. - Investigation of cybercrimes.
- 6. - Verification of a user's identity.
- 12. - Ability to effectively use digital tools and technologies.
- 15. - Harassment or intimidation online.
- 16. - Barrier to block unauthorized access to a network.
- 18. - Conflict conducted in the digital realm.
- 20. - Deliberate exploitation of computer systems.
- 21. - Protection of digital systems from cyber threats.
- 22. - Internet-based currency for online transactions.
- 24. - Platforms for online social interaction.
- 30. - Representation of a person's online presence.
- 31. - Fraudulent attempt to obtain sensitive information.
- 32. - Individuals gaining unauthorized access to systems.
- 35. - Unsolicited and often irrelevant messages.
- 36. - Legal regulations governing cyberspace.
- 37. - Responsible use of technology.
- 38. - Electronic system for online financial transactions.
- 46. footprint - Trail of data left by online activity.