Type
Crossword
Description

This crossword contains the following questions and answers:

Do not store you passwords openly, use password managers like _________________ KeePass
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A iLm!J@c)&dl>A
A secure and safe website should start with ____________________ Https
____________ are necessary components to develop positive security habits. Knowledge
When someone sends an e-mail with a link to a bogus website it is called? Phishing
This can slow down your computer AND watch everywhere you go on the internet? Spyware
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, , insurance investigators by a ___________________ to get personal information. Social Engineer
It is not allowed to use your co-workers username and password to log in to any thyssenkrupp's ___________________ resources or webistes. Network
A ________________ is a type of malware that is often disguised as legitimate software that can be employed by cyber-thieves and hackers trying to gain access to users' systems. and tricked by some form of social engineering into loading and executing Trojans on their systems. Trojan
You should not just check identity, you should also confirm____________ Authorization
Do not plug in unknown _________________ and hand it over to IT Helpdesk Portable media
Use a _________________ to store printed sensitive data. File Cabinet
Do not use the same password for your Apple-ID as you are using your _____________ 8ID
Do not allow other persons to use your computer! It may be used for _______________ Criminal Activities
Dont talk about __________ data in public! Even if you think no one is listening. Sensitive
____________ transfers are stronly encrypted and more secure using passwords. Cryptshare
Your best defense is _______________________ CommonSense
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company. Portable Media
Risk of using portable storage media can include _____________________ Malware
Always lock your laptop/pc when leaving your desk with using __________________ Windows+L

    Customize    

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Security day 30th November 2018 Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

Do not store you passwords openly, use password managers like ________ KeePass
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A iLm!J@c)&dl>A
A secure and safe website should start with ____________________ Https
____________ are necessary components to develop positive security habits? Knowledge
When someone sends an e-mail with a link to a bogus website it is called? Phishing
This can slow down your computer AND watch everywhere you go on the internet? Spyware
What type of calls are made by Social Engineers? Pretext
Information Security officer ISO
This horse can stamped your security defence for the bad guys and make you look sheepish too! Trojan
You should not just check identity, you should also confirm____________ Authorization
Do not plug in unknown _________________ and hand it over to IT Helpdesk Portable media
Use a _________________ to store printed sensitive data. FileCabinet
Do not use the same password for your AppleID as you are using your _____________ 8ID
Always lock your laptop/pc when leaving your desk with using __________________ Windows+L
Do not allow other persons to use your computer! It may be used for _______________ Criminal Activities
Dont talk about __________ data in public! Even if you think no one is listening. Sensitive
____________ transfers are stronly encrypted and more secure using passwords Cryptshare
Unknown USB sticks must be handed to ________________________ IT Department
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company. Portable storage media
Risk of using portable storage media can include _____________________ Malware Infection

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

    Customize    

Computer Basics ! Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

    Customize    

Shop safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

You put then on your face to protect your eyes safetygoggles
Long ________ must be tied back Hair
Ask for ___________ if you do not know how to do something safely Help
Number 1 propriety in the wood shop is Safety
Something everyone has to do at the end of the class Clean up
If you are not using it, make sure that it is closed and the handle is vertical Vice
It is used to nail nails into objects Hammer
It is used to make your work smooth Sandpaper
It is used to make your work look shiny after you are done Lacker
Before using any machine you must ask your Teacher
Carry all tools with the________ end down Sharp
If you are unsure about something always _____ for help Ask
You should wear ______ color clothing to the wood shop Light
You must always use a _________ if your fingers are starting to get close to the blade Pushstick
If you use your hand to brush off the table you might get a ___ Splinter
You should know where the fire _______ are located extinguisher

    Customize    

Social Media Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Created in 2004, this social network has over 1 billion users. This website is blocked in china however that doesn't stop people using it there Facebook
Reconised by its yellow ghost, this network allows users to share photos to friends and family. But watch out! they only last for 10 seconds Snapchat
bird Twitter
When bought by Facebook in 2010, this network only have 13 employees, however now is used globally Instagram
3.2 billion people use this globally. Without it, social media wouldn't be around toaday Internet
Found in Instagram, Twitter and Facebook, this symbol is used to categories different posts. Hashtag
an image, video, piece of text, etc that is copied and spread rapidly by Internet users for amusement Meme
One of the most popular dating sights globally, this network recently lost many users due to its new age limit policy (18+) Tinder
A virtual representation of an individual, online and is commonly used for profile pics. This word also means incarnation in Sanskrit Avatar
Originally used for a short description of a user, however now holds many other purposes such as holding quotes. bio
Done by pretty much many social media user, it is when an individual looks scroll through another individuals account for extended periods of time Creep
Alters a photo Filter
Small images used to describe different situations. It is the internets way of showing emotion Emojis
7 seconds is all you have! Vine
Known as the virtual scrapbook, this is used to create specific boards filled with DIY's and photos Pinterest
a musical track comprising different songs Mashup
A photo of ones self Seflie
A form of blogging; were people upload videos to youtube vlog
Blue and white, allows you to video call friends skype
Created in February 2007, this is one of the biggest forms of social media in todays society Tumblr

    Customize    

Science Safety Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

____________ goggles protect your eyes from danger safety
what do you use on your hands for safety gloves
What should you wear on your body for safety apron
What is used to exinguish a fire fire blanket
Who should you notify if you have a safety concern teacher
What should you do if you get something in your eye Wash
What do you use if you spill chemicals on you water
You should ________ pay attention always
Instead of run, what should you do in the lab Walk
If you don't __________ to the instructions, you won't know what to do LIsten
WIth _________ cut, you should report it to your teacher any
Never ____________ chemicals Inhale
With __________ burns, immerse in water and notify the teacher minor
You should never touch or step in this is if it is broken Glass
It is not safe to try these without asking a teacher experiments
_______________ the location of safety equipment know

    Customize