Across
- 4. TECHNOLOGY SOLUTIONS: Helps mitigate risk by preventing unauthorized access or hacking
- 8. PERSONA: Online version of yourself that is shaped by your actions and overall presence on the internet.
- 9. : Processed, organized and structured data
- 12. ATTACK : Disrupts normal function of a server by overwhelming the target with a flood of internet traffic
- 15. SOFTWARE : A tool designed to help individuals enhance their efficiency in various tasks.
- 16. PRIVACY ACT: Is a law that aims to protect the personal information of individuals and ensure that data is collected, processed, and stored responsibly and securely.
- 17. BREACH : Information is stolen or taken away without the knowledge of the owner
- 19. : First General-purpose Electronic Computer
- 21. NAME: A unique web address people type into their browser to visit a website
- 22. Holds the victim's data threatening to keep it locked unless victims pays a ransom
Down
- 1. : Is the biggest world-wide communication network of computers
- 2. ATTACK: Dupes a victim into opening an email or sms
- 3. REALITY: A technology that adds digital elements on top of the real world
- 5. CIRCUITS : Third Generation of Computer
- 6. OFFICE: a remote work arrangement that provides professional services without a dedicated physical space.
- 7. BERNERS LEE: Father of WEB
- 10. ENGINE: A system designed to help users find information stored on WWW
- 11. SECURITY: The electronic precautions to guarantee safety
- 12. DIVIDE: refers to the gap between individuals, households, communities, or countries that have access to ICT
- 13. One of the earliest packet-switching network and served as the precursor to the modern internet
- 14. LOVELACE : World's First Programmer
- 18. : Is technologies and tools to facilitate the way information is created, stored and processed.
- 20. THREAT: Is a threat that originate from within an organization
- 23. BROWSER: A software application that gives access to information on the WWW
