Page 83 - Cyber Safety C-5
P. 83

21 st
                                                                                               Century   #Critical Thinking
                                                                                               Skills

                 Solve the crossword!
                 Across

                 3.  The process of converting information into a code to prevent unauthorised access.
                 4.  A secret code made of letters, numbers or symbols to protect your accounts.

                 5.  Individuals who attempt to access systems or data without permission for malicious
                    purposes.
                                                     1 S







                                                             2 H



                                                3 E                             I

                                                     G        A



                                                4 P                            D




                                            5 H







                 Down

                 1.  The process of updating and matching data across multiple devices or platforms.
                 2.  Unwanted and harmful behaviour directed at a person, often online.






















                                                                                              Passwords and Posts  81
   78   79   80   81   82   83   84   85   86   87   88