Type
Crossword
Description

This crossword contains the following questions and answers:

Do not store you passwords openly, use password managers like ________ KeePass
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A iLm!J@c)&dl>A
A secure and safe website should start with ____________________ Https
____________ are necessary components to develop positive security habits? Knowledge
When someone sends an e-mail with a link to a bogus website it is called? Phishing
This can slow down your computer AND watch everywhere you go on the internet? Spyware
What type of calls are made by Social Engineers? Pretext
Information Security officer ISO
This horse can stamped your security defence for the bad guys and make you look sheepish too! Trojan
You should not just check identity, you should also confirm____________ Authorization
Do not plug in unknown _________________ and hand it over to IT Helpdesk Portable media
Use a _________________ to store printed sensitive data. FileCabinet
Do not use the same password for your AppleID as you are using your _____________ 8ID
Always lock your laptop/pc when leaving your desk with using __________________ Windows+L
Do not allow other persons to use your computer! It may be used for _______________ Criminal Activities
Dont talk about __________ data in public! Even if you think no one is listening. Sensitive
____________ transfers are stronly encrypted and more secure using passwords Cryptshare
Unknown USB sticks must be handed to ________________________ IT Department
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company. Portable storage media
Risk of using portable storage media can include _____________________ Malware Infection

    Customize    

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Security day 2018 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Do not store you passwords openly, use password managers like _________________ KeePass
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A iLm!J@c)&dl>A
A secure and safe website should start with ____________________ Https
____________ are necessary components to develop positive security habits. Knowledge
When someone sends an e-mail with a link to a bogus website it is called? Phishing
This can slow down your computer AND watch everywhere you go on the internet? Spyware
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, , insurance investigators by a ___________________ to get personal information. Social Engineer
It is not allowed to use your co-workers username and password to log in to any thyssenkrupp's ___________________ resources or webistes. Network
A ________________ is a type of malware that is often disguised as legitimate software that can be employed by cyber-thieves and hackers trying to gain access to users' systems. and tricked by some form of social engineering into loading and executing Trojans on their systems. Trojan
You should not just check identity, you should also confirm____________ Authorization
Do not plug in unknown _________________ and hand it over to IT Helpdesk Portable media
Use a _________________ to store printed sensitive data. File Cabinet
Do not use the same password for your Apple-ID as you are using your _____________ 8ID
Do not allow other persons to use your computer! It may be used for _______________ Criminal Activities
Dont talk about __________ data in public! Even if you think no one is listening. Sensitive
____________ transfers are stronly encrypted and more secure using passwords. Cryptshare
Your best defense is _______________________ CommonSense
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company. Portable Media
Risk of using portable storage media can include _____________________ Malware
Always lock your laptop/pc when leaving your desk with using __________________ Windows+L

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Shop safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

You put then on your face to protect your eyes safetygoggles
Long ________ must be tied back Hair
Ask for ___________ if you do not know how to do something safely Help
Number 1 propriety in the wood shop is Safety
Something everyone has to do at the end of the class Clean up
If you are not using it, make sure that it is closed and the handle is vertical Vice
It is used to nail nails into objects Hammer
It is used to make your work smooth Sandpaper
It is used to make your work look shiny after you are done Lacker
Before using any machine you must ask your Teacher
Carry all tools with the________ end down Sharp
If you are unsure about something always _____ for help Ask
You should wear ______ color clothing to the wood shop Light
You must always use a _________ if your fingers are starting to get close to the blade Pushstick
If you use your hand to brush off the table you might get a ___ Splinter
You should know where the fire _______ are located extinguisher

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Computer Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Science Safety Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

____________ goggles protect your eyes from danger safety
what do you use on your hands for safety gloves
What should you wear on your body for safety apron
What is used to exinguish a fire fire blanket
Who should you notify if you have a safety concern teacher
What should you do if you get something in your eye Wash
What do you use if you spill chemicals on you water
You should ________ pay attention always
Instead of run, what should you do in the lab Walk
If you don't __________ to the instructions, you won't know what to do LIsten
WIth _________ cut, you should report it to your teacher any
Never ____________ chemicals Inhale
With __________ burns, immerse in water and notify the teacher minor
You should never touch or step in this is if it is broken Glass
It is not safe to try these without asking a teacher experiments
_______________ the location of safety equipment know

    Customize    

Digital Photography: Terms Review Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

The size of the opening in the lens determining the depth of focus. aperture
A graph that helps illustrate the dark, light, and color values captured by the camera sensor. histogram
A setting that helps determine how sensitive your camera is to light ISO
Two words used to describe a type of photograph that is taken using a slow shutter speed to achieve artistic blur. LongExposure
This mode is ideal because it allows you to control all aspects of shooting quality. Manual
A common problem seen in under lit images with an ISO that is too high. Grain
This file format is best for true photographers to shoot in because it preserves the highest quality without RAW
Better photo compositions can be achieved when an image is divided into 3 parts horizontally and vertically. ruleofthirds
This setting determines how long or short your cameras capture time is. shutterspeed
This eye-opening allows you to preview your image. Viewfinder
The screen on the back of your camera that allows you to view settings and preview images. LCDDisplay
A setting you'll need to adjust based on the temperature of your light source. WhiteBalance
Your camera's storage. SDCard
A common image file type that is universally readable but does not preserve all captured image data. JPEG
This determines the sharpness of an object based on the adjustment made directly to the lens. Focus
An idea that suggests a subject's nose should be pointed toward the empty space in the frame. breathingroom
A discipline of photography that emphasizes detail normally not recognized. Macro
A discipline of photography that focuses on an individual and captures their essences. Portrait
A phrase that often appears as an acronym and the name to which we give the type of cameras we use in this class. DigitalSinglelensreflex

    Customize