Puzzles and worksheets similar to Passwords Word Search

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

CyberSecurity Awareness 2019 Crossword

Type
Crossword
Description

what is the part of the Internet that is not visible to regular users and is a vast network of websites & portals that are not categorized by search engines. DARK WEB
This happens when artificially created bogus clicks are used to manipulate Pay-Per-Click (PPC) advertising. The idea behind this practice is to increase the number of payable clicks, in order to generate revenue to advertisers. Cybercrooks use Botnet to create these types of scams. CLICKFRAUD
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address. SPOOFING
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. SPAM
A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. The sandbox limits the actions and resources available to the constrained item. SANDBOXING
Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. It can be a software solution or a hardware device used to capture anything that is typed on a keyboard KEYLOGGER
A trap or decoy used to distract attackers in order to prevent them from attacking actual production systems. It is a false system that is configured to look and function as a production system. HONEYPOT
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet. It is a combination of logical/technical-, physical- and personnel-focused countermeasures, safeguards and security controls. CYBERSECURITY
Any attempt to violate the security perimeter of a logical environment it can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets. CYBERATTACK
A malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user. CLICKJACKING
Malware that passes information about a computer user’s activities to an external party. SPYWARE
Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization PHISHING
An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets). DDOS
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered. RANSOMWARE
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. BREACH
A malicious application or script that can be used to take advantage of a computer’s vulnerability. EXPLOIT
the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it. ENCRYPTION
a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer. MALWARE
malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus. TROJAN
A Internet address on the World Wide Web. It usually begins with http:// followed by the rest of the name of the resource. It is the common name for a site’s web page. URL
a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks. ZOMBIE
Senior officers of the university responsible for determining how data in their area should be handled DATASTEWARDS
the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password AUTHENTICATION
Skimming is a method used by identity thieves to capture information from a cardholder. Several approaches can be used by fraudsters to procure card information with the most advanced approach involving a small device place at ATMs and other point of sale locations such as a gas station. SKIMMING
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data. HASHING
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda HACKTIVIST
‐ The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information PHARMING
a secret phrase that helps protect accounts, files, folders, and other confidential information PASSPHRASE
What is a trojan that stays dormant on a computer until it is remotely activated by another user. RAT
A term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person. SCAM
What is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people. SMISHING
A small text file placed on your computer when you visit a website, that allows the website to keep track of your visit details and store your preferences. COOKIE
acquisition and use of a person's private identifying information IDENTITY THEFT

Crossword - Exercise 1

Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
An attempt by hackers to damage or destroy a computer network or system. Attack
Someone who seeks and exploits weaknesses in a computer system or computer network. Hacker
The process of confirming the correctness of the claimed identity Authentication
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website Phishing
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Security
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
Are small files that Web sites put on your computer hard disk drive when you first visit Cookies
A technology that allows us to access our files through the internet from anywhere in the world. Cloud
Appears at the beginning of the web-link of a secured website HTTPS
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A data classification mode that describes certain data or document as a secret Reporting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
The art of manipulating people to get access to sensitive information Social Engineering
A software that is a type of utility used for scanning and removing harmful software from your computer Antivirus
Any software program in which advertising banners are displayed while the program is running Adware
The use of electronic communication to bully a person Cyberbullying
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots

Computer Crime Crossword

Type
Crossword
Description

What stops people from illegally distributing and copying material? Copyright
what software is designed to disrupt, damage, or gain authorised access to a computer system? Malware
what program is designed to breach the security of a computer system? TrojanHorse
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film? Virus
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you Fraud
when someone sends emails posing as a company asking for personal information Phishing
messages from crooks trying to steal your money or your identity EMAILSCAM
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox. SPAMFILTER
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying
when someone or a robot gets into your device and steals personal information like pictures and bank details Hacking
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites. Vandalism

Knowledge About Virus Crossword

Type
Crossword
Description

The malicious computer program that spread and do harm to computer, which can be launch through infected program or by the use of infected disk or USB drive virus
The malicious computer program is hidden under the useful application, and later cause harm to the computer trojan horse
A standalone malicious computer program that replicates, spread, and do harm to other computers through exploiting vulnerabilities worm
An attempt by hackers to damage or destroy a computer network or system attack
A software that cause harm to computer malware
A software that encrypts data and require payment to decrypt it ransomware
A software that display advertisement according to information stolen from the spyware adware
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive spyware
A software that tracks the key struck on the keyboard keylogger
A technology that get into the operating system to hide a malicious program component rootkit
A software that is designed to detect and destroy computer viruses antivirus
The process of making copies of data to guarantee accessibility when the original data are lost or destroyed backup
The ability to ensure reliable access of information whenever needed availability
The ability to ensure the authenticity of information—the information is trustworthy and accurate integrity
The ability to ensure authorized people can get access to the information only confidentiality
A text message tactic in which individuals are tricked into revealing critical financial or personal information Smsishing
A phone call tactic in which individuals are tricked into revealing critical financial or personal information vishing
The activity of defrauding an online account holder of financial information by posing as a legitimate company phishing
Someone who seeks and exploits weaknesses in a computer system or computer network hacker
Computer robot that performs a wide variety of automated tasks bot
a method, often secret, of bypassing normal authentication in a product back door
Bundles of malicious programs that combine the functionality of different types of malware blended threat
A way of virus propagation in which the malicious code is place in the medium (e.g. CD, DVD…), and will be read by the computer first before the operating system (OS) is read. master boot record
A way of virus propagation in which the malicious code overwrites or inserted in the executable file file infection
A way of virus propagation in which the malicious code is hidden in an automated input sequence macro infection
The technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

Securing Your Devices Word Search

Type
Word Search
Description

Stay Informed
Vulnerability
Cookies
Close Accounts
Privacy Settings
Encryption
Malware
Antivirus
Authentication
Biometrics
Breach
Clear Cache
Click Bait
Computer
Data
Devices
Hacking
Internet
Laptop
Malicious Actor
Managers
Mixed case letters
Multi Factor
Network Security
Numbers
Passphrase
Phishing
Phone
PUA
Ransomware
Risk
Router
Security Key
Sign Out
Social Media
Software
Special Characters
Strong Password
Tablet
Trojan Horse
Unique
Verification
Virus
VPN

Crossword Puzzle on Computer Security

Type
Crossword
Description

Approval, permission, or empowerment for someone or something to do something AUTHORIZATION
Any software program in which advertising banners are displayed while the program is running ADWARE
Sequence of eight bits OCTET
Basic communication language or "protocol" of the Internet TCP/IP
TCP/IP protocol specifying the transfer of text or binary files across the network FILE TRANSFER PROTOCOL
Encrypted form of the message being sent CIPHER TEXT
Process of confirming the correctness of the claimed identity AUTHENTICATION
Hidden, self-replicating section of computer software that inserts itself and becomes part of the another program VIRUS
Gaining unauthorized logical access to sensitive data by circumventing a system's protections PENETRATION
A type of digital currency BIT COIN
A type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
A list of entities that are blocked or denied access/privilege BLACKLIST
A list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
An unauthorized user able to access and misuse information HACKER
The pair of Username PASSWORD

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus