CYBER AND DIGITAL LITERALLY

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 3. Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
  2. 12. Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
  3. 14. Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
  4. 16. Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
  5. 17. The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
  6. 20. Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  7. 22. The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
  8. 24. Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
  9. 26. The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
  10. 28. The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
  11. 29. The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
  12. 31. Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
  13. 35. Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
  14. 36. Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
  15. 37. Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
  16. 40. A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
  17. 41. The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
  18. 42. The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
  19. 43. The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
  20. 44. Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
  21. 45. Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
  22. 47. Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
  23. 48. Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
  24. 49. Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
  1. 1. Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
  2. 2. Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
  3. 4. The global network of interconnected computers that allows for the exchange of data and communication.
  4. 5. Online platforms and websites that enable users to create, share, and interact with content and connect with others.
  5. 6. The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
  6. 7. Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
  7. 8. Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
  8. 9. The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
  9. 10. The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
  10. 11. Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
  11. 13. Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
  12. 15. Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
  13. 18. Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
  14. 19. The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
  15. 21. The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
  16. 23. Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
  17. 25. Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
  18. 27. Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
  19. 30. Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
  20. 32. Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
  21. 33. The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
  22. 34. Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
  23. 38. Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
  24. 39. Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
  25. 41. Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
  26. 46. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.