Type
Word Search
Description

This word search contains the following answers:

Strong
Complex
Remember
Guess
Information
Personal
Attacher
Malicious
Password
Awareness
Policy
Identity
Algorithm
Passphrase
Memorized
Encrypted
Access
Threats
Cybercriminal
Authentication
Username
Hackers
KeePass
Secret
Security

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Cyber Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

National Cyber Security Awareness Month (NCSAM) Word Search

Type
Word Search
Description

This word search contains the following answers:

passphrase
open wi-fi
encryption
spyware
scareware
skimmers
hacker
password manager
internet safety
ransomware
virus
malware
phishing
identity theft
data breach

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

access
attack
authentication
backup
crime
data
encryption
firewall
hacker
identity
information
internet
malware
network
online
password
phishing
privacy
protection
ransomware
spam
spyware
threat
update
virus
vulnerability
wifi

    Customize    

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Type
Crossword
Description

This crossword contains the following questions and answers:

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

    Customize    

Security Awareness Word Scramble

Type
Word Scramble
Description

this word scramble contains the following answers:

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out

    Customize    

Cybersecurity Awareness Month Week 2 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Cybercriminals rely on _______ error to gain access to systems human
Your password should be ________ characters or longer eight
If it looks suspicious, it's best to ______ it delete
Do not include _______ information in your password personal
One way to guard your device is to _____ it when not in use lock
Never ______ your password share
Use ______ passwords for your various devices different
When available, use stronger _______ for an added layer of security authentication
Substitute _____ with numbers, punctuation marks or symbols when creating your password letters
Make ______ and physical back ups of your important work electronic

    Customize    

Cyber Security Awareness Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

    Customize    

CyberSecurity Awareness 2019 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

what is the part of the Internet that is not visible to regular users and is a vast network of websites & portals that are not categorized by search engines. DARK WEB
This happens when artificially created bogus clicks are used to manipulate Pay-Per-Click (PPC) advertising. The idea behind this practice is to increase the number of payable clicks, in order to generate revenue to advertisers. Cybercrooks use Botnet to create these types of scams. CLICKFRAUD
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address. SPOOFING
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. SPAM
A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. The sandbox limits the actions and resources available to the constrained item. SANDBOXING
Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. It can be a software solution or a hardware device used to capture anything that is typed on a keyboard KEYLOGGER
A trap or decoy used to distract attackers in order to prevent them from attacking actual production systems. It is a false system that is configured to look and function as a production system. HONEYPOT
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet. It is a combination of logical/technical-, physical- and personnel-focused countermeasures, safeguards and security controls. CYBERSECURITY
Any attempt to violate the security perimeter of a logical environment it can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets. CYBERATTACK
A malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user. CLICKJACKING
Malware that passes information about a computer user’s activities to an external party. SPYWARE
Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization PHISHING
An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets). DDOS
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered. RANSOMWARE
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. BREACH
A malicious application or script that can be used to take advantage of a computer’s vulnerability. EXPLOIT
the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it. ENCRYPTION
a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer. MALWARE
malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus. TROJAN
A Internet address on the World Wide Web. It usually begins with http:// followed by the rest of the name of the resource. It is the common name for a site’s web page. URL
a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks. ZOMBIE
Senior officers of the university responsible for determining how data in their area should be handled DATASTEWARDS
the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password AUTHENTICATION
Skimming is a method used by identity thieves to capture information from a cardholder. Several approaches can be used by fraudsters to procure card information with the most advanced approach involving a small device place at ATMs and other point of sale locations such as a gas station. SKIMMING
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data. HASHING
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda HACKTIVIST
‐ The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information PHARMING
a secret phrase that helps protect accounts, files, folders, and other confidential information PASSPHRASE
What is a trojan that stays dormant on a computer until it is remotely activated by another user. RAT
A term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person. SCAM
What is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people. SMISHING
A small text file placed on your computer when you visit a website, that allows the website to keep track of your visit details and store your preferences. COOKIE
acquisition and use of a person's private identifying information IDENTITY THEFT

    Customize