Page 25 - Cyber Safety C-5
P. 25
21 st #Critical Thinking
Century
Skills #Information Literacy
Solve the crossword!
Across
2. Harmful software that enters a device 1 T
through unsafe downloads or links.
2 M A R
5. Posing as friendly to cause harm or
meet in person.
6. Blocks malicious traffic from accessing J
your device.
7. Having the chance to use technology
and the Internet when needed. 3 C
4 P H
5 O I R O
S
6 F A
G
Y
7 D T L S
N
Down
1. Program disguised as legitimate software but secretly causes harm.
3. Harassment or bullying through online interactions.
4. A fraudulent attempt to steal personal information by impersonating a trusted entity.
Hidden Threats in the Online World 23

