Description

e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Voice phishing is a form of criminal phone fraud, using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward. It is sometimes referred to as ___________
A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
the practice of spying on the user of a cash-dispensing machine or other electronic device in order to obtain their personal identification number, password, etc
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
A very common password that the average users uses
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense
software that aims to gather information about a person or organization, sometimes without their knowledge, that may send such information to another entity without the consumer's consent
A ________is said to have occurred when a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
The short name, usually meaningful in some way, associated with a particular computer user
An algorithmic technique that takes a file and changes its contents into something unreadable to those outside the chain of communication.
another term for malicious software
___________ is designed to display advertisements on your computer and redirect your search requests to advertising websites to collect marketing data about you.
A politically- or ideologically-motivated cyber attack or hack

Customize
Add, edit, delete clues, and customize this puzzle.

CYBER-SECURITY

Crossword

crossword_cyber

Crossword

I.T Wordsearch

Word Search

I.T.WordSearch

Word Search

Technology vocab

Crossword

Frequently Asked Questions

What is a crossword?

Crossword puzzles have been published in newspapers and other publications since 1873. They consist of a grid of squares where the player aims to write words both horizontally and vertically.

Next to the crossword will be a series of questions or clues, which relate to the various rows or lines of boxes in the crossword. The player reads the question or clue, and tries to find a word that answers the question in the same amount of letters as there are boxes in the related crossword row or line.

Some of the words will share letters, so will need to match up with each other. The words can vary in length and complexity, as can the clues.

Who is a crossword suitable for?

The fantastic thing about crosswords is, they are completely flexible for whatever age or reading level you need. You can use many words to create a complex crossword for adults, or just a couple of words for younger children.

Crosswords can use any word you like, big or small, so there are literally countless combinations that you can create for templates. It is easy to customise the template to the age or learning level of your students.

How do I create a crossword template?

For the easiest crossword templates, WordMint is the way to go!

Pre-made templates

For a quick and easy pre-made template, simply search through WordMint’s existing 500,000+ templates. With so many to choose from, you’re bound to find the right one for you!

Create your own from scratch

  • Log in to your account (it’s free to join!)
  • Head to ‘My Puzzles’
  • Click ‘Create New Puzzle’ and select ‘Crossword’
  • Select your layout, enter your title and your chosen clues and answers
  • That’s it! The template builder will create your crossword template for you and you can save it to your account, export as a word document or pdf and print!

How do I choose the clues for my crossword?

Once you’ve picked a theme, choose clues that match your students current difficulty level. For younger children, this may be as simple as a question of “What color is the sky?” with an answer of “blue”.

Are crosswords good for students?

Crosswords are a great exercise for students' problem solving and cognitive abilities. Not only do they need to solve a clue and think of the correct answer, but they also have to consider all of the other words in the crossword to make sure the words fit together.

Crosswords are great for building and using vocabulary.

If this is your first time using a crossword with your students, you could create a crossword FAQ template for them to give them the basic instructions.

Can I print my crossword template?

All of our templates can be exported into Microsoft Word to easily print, or you can save your work as a PDF to print for the entire class. Your puzzles get saved into your account for easy access and printing in the future, so you don’t need to worry about saving them at work or at home!

Can I create crosswords in other languages?

Crosswords are a fantastic resource for students learning a foreign language as they test their reading, comprehension and writing all at the same time. When learning a new language, this type of test using multiple different skills is great to solidify students' learning.

We have full support for crossword templates in languages such as Spanish, French and Japanese with diacritics including over 100,000 images, so you can create an entire crossword in your target language including all of the titles, and clues.