Page 23 - Cyber Safety C-8
P. 23
21 st
Century #Information Literacy
Skills
Solve the crossword!
ACROSS
4. Ensuring that information remains accurate, complete, and unaltered. Techniques include
checksums, digital signatures, and version control.
5. collection of technologies, processes, and practices designed to protect digital systems, networks,
programs, and data from cyber attacks.
DOWN
1. Ensuring that information and systems are accessible when required.
2. A program designed to damage devices, steal data, or gain unauthorised access.
3. Ensuring that information is accessed only by authorised individuals.
1
A
2
M
3
C
4
I E Y
5
C E Y
Y
A Modern Necessity 21

