Page 83 - Cyber Safety C-5
P. 83
21 st
Century #Critical Thinking
Skills
Solve the crossword!
Across
3. The process of converting information into a code to prevent unauthorised access.
4. A secret code made of letters, numbers or symbols to protect your accounts.
5. Individuals who attempt to access systems or data without permission for malicious
purposes.
1 S
2 H
3 E I
G A
4 P D
5 H
Down
1. The process of updating and matching data across multiple devices or platforms.
2. Unwanted and harmful behaviour directed at a person, often online.
Passwords and Posts 81

