Puzzles and worksheets similar to Cyber Security Workshop Crossword

Computers Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What is the operating system owned by Google android
What is a picture that represents a person? avatar
What is the only computer company that doesn't use Windows? apple
What is a website that documents someones life or thoughts? blog
What is temporary storage? cache
What is a program for viewing the World Wide Web? browser
What is a silicon wafer ith millions of tiny circuits? chip
What is remote storage via the Internet? cloud
What is a small data file stored on your computer? cookie
What is "to do with numbers"? digital
What is the nerve center of the computer? cpu
When a computer stops working crash
to transfer information from a network download

    Customize    

QCERT-CW3 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc. Identity Theft
ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine Integrity
A local or restricted communications network, especially a private network created using World Wide Web software. Intranet
Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious Code
An authentication method that uses procedure of different types of security checks. Multi Factor
A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
Gaining unauthorized logical access to sensitive data by circumventing a system's protections Penetration
A word used to describe Tailgating Piggybacking
A fraudster fabricates a scenario where he/she will impersonate a person of authority to get access to personal information. What type of attack is it? Pretexting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
A type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder. Shoulder Surfing
A text message tactic in which individuals are tricked into revealing critical financial or personal information SMishing
A person who uses the art of manipulating people to get access to personal information Social Engineer
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
An action when a person tags along with another person who is authorized to gain entry into a restricted area or pass a certain checkpoint. Tailgating
Any malicious computer program which is used to hack into a computer by misleading users of its true intent Trojan
An attempt by hackers to damage or destroy a computer network or system. ATTACK
ensuring that data is always accessible whenever needed Availability
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots
Appears at the beginning of the web-link of a secured website HTTPS
Encrypted form of the message being sent Cypher Text
The use of electronic communication to bully a person Cyberbullying
The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. Dark Web
Approval, permission, or empowerment for someone or something to do something Authorization
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
A weakness in computer software Vulnerability
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
a corporate directive that specifies how employees should leave their working space when they leave the office Clear Desk Policy
You entered your email account credentials and you received and SMS with a code that you have to enter for verification. What is the type of this authentication? Two Factor

    Customize    

Information Security Awareness October 2018 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity using an electronic communication. phishing
A form of malicious software that threatens to publish the victim's data or perpetually block access to it until paid. ransomware
Websites and applications that enable users to create and share content. socialmedia
The global system of interconnected computer networks. internet
The knowledge users learn and posses regarding the protection of an organization awareness
Algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information. encryption
A password or passphrase should included numbers, uppercase letters, symbols and ......... letters? lowercase
A sequence of words or other text used to control access to a computer system or data. passphrase
Don't open ...... from people you don't know. attachments
A program that secretly monitors your actions. spyware
The name a person is called when they try to break into another computer system. hacker
The action or process of identifying the presence of something concealed. Detection
Software that is intended to damage or disable computers and computer systems. malware
Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup

    Customize    

Arson and Cybercrime Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Indicates at what temp the fire was burning Color of flames
Produced when a substance undergoes rapid oxidation involving heat and light. Fire
The lowest temperature to which a substance must be heated in order for the substance to give off vapors which will burn when exposed to a flame or ignition source. Flashpoint
The location where the fire started. Point of Origin
A fire started deliberately Arson
Substances, such as gasoline, paint thinner, and alcohol, that accelerate the burning process. Accelerants
Noticeable patterns created by the fire as it burns. Burn Patterns
Shows the three elements needed to produce and sustain a fire. Fire Triangle
Determine what type of material was burning Color of smoke
Occur when heavy furniture shields part of a wall Heat Shadows
Gaining access to a system by cracking a password Cracking
A program that appears to be harmless but actually provides backdoor entrance to a target computer Trojan Horse
Computer code with malicious intentions. Malware includes Trojan horses, ransomware, rootkits, scareware, spyware, viruses and worms Malware
Scam software that appears to be legitimate, to encourage download Scareware
A program that replicates rapidly within a computer causing damage to the host computer Virus
A program that spreads rapidly across computers, usually through a network Worm
Spies on activity in a computer, sending information to a third party without the owner’s consent Spyware
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website Defacement
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Using the Internet to circulate incorrect information and cause panic Misinformation spread
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax Email
Crime related to the transfer of funds over the Internet, by diverting funds, stealing financial information, etc. Electronic funds transfer fraud

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A type of social media? facebook
Short for malicious software... malware
Stops viruses from attacking your computer antivirus
A type of scam that asks for your personal details phishing
Short form of the word 'application' app
A file that is sent with an email attachment
A personal website or webpage blog
Stored websites are often known as these on your browser bookmarks
A small file which is sent to your computer when you visit a website cookie
information on computers is known as... data
A piece of hardware or software which keeps hackers out firewall
Someone who gains unauthorised access to data hacker
A global network of computers internet
The name you use to tell a computer who you are login
When you are not connected to the internet offline

    Customize    

Chapter 1 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Worldwide collection of computers linked together for use by businesses, governments, educational institutions, other organizations, and individuals using modems, phone lines, television cables, satellite links, fiber-optic connections, radio waves, and other communications devices and media internet
any device, such as a computer, tablet or smarphone, connected to a network node
A collection of two or more computers linked together to share resources and information. Network
A term used to describe the ever-growing number of devices connecting to a network, including televisions and appliances. Internet of things
Allow data to move from one computer to another. Data lines
Collection of high-speed data lines that link major computer systems located around the world. Internet backbone
A company that has a permanent connection to the internet backbone. Internet Service Provider
The service that provides access to information stored on web servers, the high-capacity, high-performance computers that power the web. World Wide Web
A collection of linked files. Webpages
A related collection of webpages created and maintained by a person, company, educational institution, or other orgainzation. Website
The main page and the first document users see when they access the website. Home Page
An element that connects one webpage to another webpage ont he same server or to any other web server in the world. hyperlink
A set of rules that defines how a client workstation can communicate with a server. protocol
The host computer that stores resources and files for websites. server
The fundamental protocol used on the web to exchange and transfer webpages. Hypertext Transfer Protocol
Used to exchange files from one computer to another over the Internet. File Transfer Protocol
Ensures data is sent to the correct location. Internet Protocol
Created to resolve the situation where most people have difficulty remembering and ising IP addresses Domain Name System
Program that interprets and displays webpages so you can view and interact with them. Web Browser
The address of a document or other file accessible on the Internet and identifies the network location of a website. Uniform Resource Locator
An area of the Internet a partricular organization or person manages. Domain
A private network that uses Internet technologies to share business information with select corporate partners or key customers Extranet
The buying and selling of goods and services on the internet Electronic Commerce
A web-based software application designed to facilitate online learning. Learning Management System
Allows you to create one website that provides an optimal viewing experience across a range of devices. Responsive Design

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

full electronic participation in society digital access
the buying and selling of goods and services using the Internet and mobile networks Digital commerce
communication by computer Digital communication
the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet digital literacy
a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Virus
modifying or altering computer software and hardware hacking
basic set of rules you should follow in order to make the internet better for others, and better for you Digital etiquette
the electronic responsibility for actions, deeds which is either ethical or unethical Digital law
the branch of digital citizenship that focuses on using technology safely and appropriately digital health
having the right and freedom to use all types of digital technology while using the technology in an acceptable and appropriate manner Digital rights
the protection of your digital identity – the network or Internet equivalent of your physical identity Digital security
websites and applications that enable users to create and share content or to participate in social networking. Social media
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. copyright
audio, video, and photo content that has been encoded (digitally compressed Digital media
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. cyberbullying

    Customize    

Ms. Etherington Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Backup
a tag used to categorize posts on Twitter (tweets) according to topics. Hashtag
a typeface in which characters have no serifs Helvetica
A publicly accessible system of networks that connects computers around the world via the TCP/IP protocol. Internet
The main printed circuit board in a complex electronic device, such as a personal computer, usually containing thecentral processing unit, the main system memory, and other components essential to the device's operation Motherboard
a device that can be slotted into a computer to allow the use of audio components for multimedia applications. SoundCard
the programs and other operating information used by a computer. Software
a printed circuit board controlling output to a display screen. VideoCard
a computer designed for use by one person at a time. Personal Computer
In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. Optical Disk Drive
RAM (random access memory) is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. Random Access Memory
All the parts of a computer you can touch Hardware
a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Hard Drive
An underlying base or foundation especially for an organization or system. Infrastructure
an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. World Wide Web

    Customize    

Hardware and Software Puzzel Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A small piece of silicon that includes data and important info, used in computers and other machines too. Microchip
A piece of equipment that must be connected to a device to save a specific document. USB stick
Used for putting designs into a computer with an electronic pen. Graphics Tablet
Physical computer eguipment such as keyboard. Hardware
Computer programs such as windows. Software
Information that enters a device from another machine. Input
Something produced in a device that leaves it. Output
Used for typing information onto a document. Keyboard
A screen that shows an image or information. Monitor
A personal computer. PC
The part of a computer that controls and performs all its operations. Processor
Used for copying a picture or document into a computer. Scanner
A flat surface on a computer that shows images contains apps and information. Sreen
Machine that lets out documents or images you have created. Printer
Sends or recieves info from a disk. Drive

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize