Across
- 3. Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
- 12. Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
- 14. Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
- 16. Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
- 17. The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
- 20. Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- 22. The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
- 24. Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
- 26. The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
- 28. The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
- 29. The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
- 31. Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
- 35. Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
- 36. Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
- 37. Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
- 40. A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
- 41. The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
- 42. The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
- 43. The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
- 44. Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
- 45. Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
- 47. Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
- 48. Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
- 49. Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
- 1. Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
- 2. Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
- 4. The global network of interconnected computers that allows for the exchange of data and communication.
- 5. Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- 6. The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
- 7. Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
- 8. Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
- 9. The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
- 10. The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
- 11. Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
- 13. Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
- 15. Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
- 18. Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
- 19. The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
- 21. The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
- 23. Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
- 25. Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
- 27. Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
- 30. Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
- 32. Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
- 33. The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
- 34. Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
- 38. Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
- 39. Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
- 41. Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
- 46. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.