Passwords Word Search

Created
Jul 26, 2016
Type
Word Search
Description

This word search contains the following answers:

Strong
Complex
Remember
Guess
Information
Personal
Attacher
Malicious
Password
Awareness
Policy
Identity
Algorithm
Passphrase
Memorized
Encrypted
Access
Threats
Cybercriminal
Authentication
Username
Hackers
KeePass
Secret
Security

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

More Crosswords, Word Searches, and Puzzles

Cyber Security Crossword

Created
Apr 25, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

IT&S Cyber Security Crossword Puzzle

Created
Jun 2, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Created
Oct 5, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Awareness Word Search

Created
Sep 21, 2018
Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

National Cyber Security Awareness Month (NCSAM) Word Search

Created
Oct 2, 2017
Type
Word Search
Description

This word search contains the following answers:

passphrase
open wi-fi
encryption
spyware
scareware
skimmers
hacker
password manager
internet safety
ransomware
virus
malware
phishing
identity theft
data breach

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Word Search

Created
Oct 2, 2017
Type
Word Search
Description

This word search contains the following answers:

access
attack
authentication
backup
crime
data
encryption
firewall
hacker
identity
information
internet
malware
network
online
password
phishing
privacy
protection
ransomware
spam
spyware
threat
update
virus
vulnerability
wifi

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Crossword

Created
Mar 23, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

OPSEC is not Puzzling Crossword

Created
Nov 14, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Information Security Awareness October 2018 Crossword

Created
Sep 21, 2018
Type
Crossword
Description

This crossword contains the following questions and answers:

The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity using an electronic communication. phishing
A form of malicious software that threatens to publish the victim's data or perpetually block access to it until paid. ransomware
Websites and applications that enable users to create and share content. socialmedia
The global system of interconnected computer networks. internet
The knowledge users learn and posses regarding the protection of an organization awareness
Algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information. encryption
A password or passphrase should included numbers, uppercase letters, symbols and ......... letters? lowercase
A sequence of words or other text used to control access to a computer system or data. passphrase
Don't open ...... from people you don't know. attachments
A program that secretly monitors your actions. spyware
The name a person is called when they try to break into another computer system. hacker
The action or process of identifying the presence of something concealed. Detection
Software that is intended to damage or disable computers and computer systems. malware
Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

OnGuardians Crossword

Created
Jun 16, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

Attempt to damage, disrupt, or gain unauthorized access to a computer system or electronic communications network. cyberattack
Broad term applying to sensitive information. confidential
Type of sensitive information protected by law or regulation. protected
Malicious software which can infect computers, smartphones, tablets, and network servers until a sum of money is paid. ransomware
Transfer file by email. attachment
Computing resources delivered as a service over a network. cloud
Type of network typically used to connect family and friends. social
Type of password balances easy to remember yet hard to guess. smart
A sequence of words or other text used to control access to a computer system, program or data. passphrase
Information embedded in an electronic document. metadata
A U.S. law designed to provide privacy standards & security requirements for health information (acronym). HIPAA
Act that established penalties for Business Associates that violate HIPAA requirements (acronym). HITECH
The practice of sending spoofed email messages with the intention of collecting information for malicious purposes. Phishing
Type of security restricting printing or copying of documents, locking doors, and erasing whiteboards. Physical
A type of behavior intended to trick people into disclosing confidential information. Social Engineering

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying