Page 23 - Cyber Safety C-8
P. 23

21 st
                                                                                           Century   #Information Literacy
                                                                                            Skills


                 Solve the crossword!
                 ACROSS
                 4.  Ensuring that information remains accurate, complete, and unaltered. Techniques include
                    checksums, digital signatures, and version control.
                 5.  collection of technologies, processes, and practices designed to protect digital systems, networks,
                    programs, and data from cyber attacks.
                 DOWN

                 1.  Ensuring that information and systems are accessible when required.
                 2.  A program designed to damage devices, steal data, or gain unauthorised access.
                 3.  Ensuring that information is accessed only by authorised individuals.

                                           1
                                            A





                                                                  2
                                                                  M



                                                    3
                                                     C








                                                    4
                                                      I            E                     Y


                                       5
                                        C            E                                       Y




















                                                     Y



                                                                                               A Modern Necessity  21
   18   19   20   21   22   23   24   25   26   27   28