CROSSWORD PUZZLE

Created
Apr 3, 2019
Type
Crossword
Description

This crossword contains the following questions and answers:

It is defined as the result of a system being secure but not secured sufficiently, thereby increasing the likelihood of a threat. RISK
It is a weakness or breach in your network or equipment (e.g. modems, routers, access points). Vulnerability
It is the actual means of causing an incident; for instance, a virus attack is deemed a threat. Threat
It is uses the same key for both encryption and decryption. Symmetric
It employs different keys for the two processes. Asymmetric
The hats hacker are motivated by political agendas, personal greed, or malice. Black
The hats hackers strive to foil the former. White
It refers to tricking someone into inviting an attacker into a securely protected area. Trojan horse
We consider any software that is designed to track data of your browsing habits and, based on that, show you advertisements and pop-ups. Adware
It works similarly to adware, but is installed on your computer without your knowledge. Spyware
This are pieces of software that are designed to be spread from one computer to another. Computer virus
This are pieces of malware programs that replicate quickly and spread from one computer to another. Computer worm
An attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. DoS
An attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful. DDoS
A method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers. Phishing
A collection of software tools that enables remote control and administration-level access over a computer or computer networks. Rootkit
An attacks are designed to target data-driven applications by exploiting security vulnerabilities in the application’s software. SQL Injection
The process or action of proving or showing something to be true, genuine, or valid Authentication
A security with a warrant attached to it. Host Security
A security technique that regulates who or what can view or use resources in a computing environment Access control

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

More Crosswords, Word Searches, and Puzzles

Cyber Security Crossword

Created
Apr 25, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Basics ! Crossword

Created
Aug 12, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Technology Crossword Puzzle

Created
Aug 4, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

technology Crossword

Created
May 17, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

IT&S Cyber Security Crossword Puzzle

Created
Jun 2, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Safety Crossword

Created
Jan 9, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Basics Crossword

Created
Aug 12, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

It has the ability to store, retrieve, and process data. Also it is an electronic device that manipulates information, or data computer
uses an electronic eye to detect movement and is easier to clean. Optical mouse
what is any set of instructions that tells the hardware what to do and how to do it. Software
what is the computers main circuit board motherboard
Ram is an acronym of... random access memory
what do most computers have located on the motherboard in order for you to insert various expansion cords expansion slots
is the most important software that runs on a computer operating system
the type of software that allows you to perform specific tasks application
what is it called when you have more than on app open at the same time mutli-tasking
if your battery isn't charged then the problem may be that your _________ isn't pulled in. fill in the blank with the best vocabulary. AC adapter
applications for a desktop pr laptop computers are sometimes called.... desktop applications
a wireless ethernet connection wifi
allows you to write a letter, design a flyer, and create many other types of documents word processors
what internet service provider uses a broadband connection,which makes it much faster than dial up DSL
what does mbps stand for Megabits per second
a hardware device that allows you to connect several computers and other devices to a single Internet connection, router
is a computer that serves up information to other computers on a network. server
common operating app for typing research papers on computer Microsoft Windows
is the science of equipment design and how specific equipment usage and placement can reduce a user's discomfort and increase productivity Computer ergonomics
where your software, documents, and other files are stored hard drive

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Digital Technology Crossword

Created
Mar 23, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

CROSSWORD PUZZLE Copy

Created
Apr 3, 2019
Type
Crossword
Description

This crossword contains the following questions and answers:

It is defined as the result of a system being secure but not secured sufficiently, thereby increasing the likelihood of a threat. RISK
It is a weakness or breach in your network or equipment (e.g. modems, routers, access points). Vulnerability
It is the actual means of causing an incident; for instance, a virus attack is deemed a threat. Threat
It is uses the same key for both encryption and decryption. Symmetric
It employs different keys for the two processes. Asymmetric
The hats hacker are motivated by political agendas, personal greed, or malice. Black
The hats hackers strive to foil the former. White
It refers to tricking someone into inviting an attacker into a securely protected area. Trojan horse
We consider any software that is designed to track data of your browsing habits and, based on that, show you advertisements and pop-ups. Adware
It works similarly to adware, but is installed on your computer without your knowledge. Spyware
This are pieces of software that are designed to be spread from one computer to another. Computer virus
This are pieces of malware programs that replicate quickly and spread from one computer to another. Computer worm
An attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. DoS
An attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful. DDoS
A method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers. Phishing
A collection of software tools that enables remote control and administration-level access over a computer or computer networks. Rootkit
An attacks are designed to target data-driven applications by exploiting security vulnerabilities in the application’s software. SQL Injection
The process or action of proving or showing something to be true, genuine, or valid Authentication
A security with a warrant attached to it. Host Security
A security technique that regulates who or what can view or use resources in a computing environment Access control

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

OPSEC is not Puzzling Crossword

Created
Nov 14, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying