Puzzles and worksheets similar to Cyber Security Workshop Crossword

Crossword Puzzle on Computer Security

Type
Crossword
Description

This crossword contains the following questions and answers:

Approval, permission, or empowerment for someone or something to do something AUTHORIZATION
Any software program in which advertising banners are displayed while the program is running ADWARE
Sequence of eight bits OCTET
Basic communication language or "protocol" of the Internet TCP/IP
TCP/IP protocol specifying the transfer of text or binary files across the network FILE TRANSFER PROTOCOL
Encrypted form of the message being sent CIPHER TEXT
Process of confirming the correctness of the claimed identity AUTHENTICATION
Hidden, self-replicating section of computer software that inserts itself and becomes part of the another program VIRUS
Gaining unauthorized logical access to sensitive data by circumventing a system's protections PENETRATION
A type of digital currency BIT COIN
A type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
A list of entities that are blocked or denied access/privilege BLACKLIST
A list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
An unauthorized user able to access and misuse information HACKER
The pair of Username PASSWORD

    Customize    

Arson and Cybercrime Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Indicates at what temp the fire was burning Color of flames
Produced when a substance undergoes rapid oxidation involving heat and light. Fire
The lowest temperature to which a substance must be heated in order for the substance to give off vapors which will burn when exposed to a flame or ignition source. Flashpoint
The location where the fire started. Point of Origin
A fire started deliberately Arson
Substances, such as gasoline, paint thinner, and alcohol, that accelerate the burning process. Accelerants
Noticeable patterns created by the fire as it burns. Burn Patterns
Shows the three elements needed to produce and sustain a fire. Fire Triangle
Determine what type of material was burning Color of smoke
Occur when heavy furniture shields part of a wall Heat Shadows
Gaining access to a system by cracking a password Cracking
A program that appears to be harmless but actually provides backdoor entrance to a target computer Trojan Horse
Computer code with malicious intentions. Malware includes Trojan horses, ransomware, rootkits, scareware, spyware, viruses and worms Malware
Scam software that appears to be legitimate, to encourage download Scareware
A program that replicates rapidly within a computer causing damage to the host computer Virus
A program that spreads rapidly across computers, usually through a network Worm
Spies on activity in a computer, sending information to a third party without the owner’s consent Spyware
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website Defacement
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Using the Internet to circulate incorrect information and cause panic Misinformation spread
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax Email
Crime related to the transfer of funds over the Internet, by diverting funds, stealing financial information, etc. Electronic funds transfer fraud

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

zombie
hacktivism
spam
worm
spoofing
spyware
steganography
sniffing
phishing
ISP
firewall
encryption
domain
virus
click-jacking
adware
security
Cyber Crime

    Customize    

Internet Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Type of internet service that connects wirelessly through mobile phone services. 3G and 4G service
Device used to access the internet, computer, tablet, phone, or printer. Access device
Appears after the path, tells browser to load a specific part of the page usually begins with a #. Anchor
Maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. Bandwidth
Fast data transfer speeds, always connected and can transmit multiple signals simultaneously. Broadband service
A software application used to locate and display web pages. Browser
Usually identifies the organization in a URL. Domain name
(DNS) translated domain names into IP addresses. Domain server
Commercial transactions conducted electronically online. Ecommerce
Messages distributed by electronic means from one computer user to one or more recipients via a network. Email
Loads a specific page, separated by a /. File path
Acts as a host or network interface identification and location addressing. IP Address
Provides internet access, such as XFINITY. ISP
Device that enables a computer to transmit data, either hard wired or wireless, to the internet. Modem
Unit of data that is routed between an origin and destination. Packets
String of characters after the path, begins with a ? Parameters
Device that forwards data packets along networks. It is connected to at least two networks either LANs or WANs. Router
Most URLs begin with http or https. Scheme
A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. Search engine
To work from home, making use of the internet, e-mail, and the telephone. Telecommuting

    Customize    

Chap. 1 Java Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Programs that allow human users to accomplish specialized tasks. Application software
Uses mnemonic symbols to represent instructions and data Assembly language
Devices such as printers and scanners. Auxiliary inputoutput
Devices for long-term storage of data and programs, such as hard disks Auxiliary storage
A binary digit Bit
A sequence, consisting of 8 adjacent bits Byte
A major hardware component that consists of the arithmetic/logic unit and the control unit CPU
The actual computing machine and its support devices. Hardware
The principle of providing access to services but not to data resources. Information hiding
A list of data resources. Instance variables
Used for momentary storage of data and programs. Also called RAM. Internal Memory
Uses only binary digits, 1 and 0, to code programs. Also called first generation programming languages Machine language
Used to connect to the Internet, other computers and the rest of the world Network connection
A programming process in which a program is subdivided into objects ObjectOriented
Programs that give computer hardware system useful functionality Software
The process that a program goes through SDLC
The presence of computers, which are often hidden, in many items used in everyday life Ubiquitous computing
Supports moment-to-moment communication between a user and the compute User interface
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next Waterfall

    Customize    

will Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Information that is instantly published to a web site blog
real-time, synchronous, text-based communication via computer chat
A single character in a numbering system. In decimal, digits are 0 through 9 digit
(dots per inch) the way the resolution of display and printing is measured dip
A method of identifying computer addresses Domain name
a way of storing your favorite sites on the Internet BookMark
A type of text code in Hypertext Markup Language which, when embedded in a document, allows that document to be read and distributed across the Internet HTML
The hypertext transfer protocol (http) that enables html documents to be read on the Internet HTTP
A global network of thousands of computer networks linked by data lines and wireless systems Internet
a computer language, developed by Sun Microsystems, that lets you encode applications, such as animated objects or computer programs, on the Internet JAVA
A device that connects your computer to the Internet, when you are not connected via a LAN Modem
A destructive computer program that replicates itself throughout your computer's hard drive and and memory WORM
A term that applies to programs/applets (macros and intelligent agents) used on the Internet Web Bot
A universal resource locator (a computer address) that identifies the location and type of resource on the Web URL
The command to log on to another computer on the Internet Telnet
The Web's integration of audio, video, graphics and text Multimedia
A software program that allows users to access the Internet Browser
A hypermedia information storage system which links computer-based resources around the world Wide World Web (WWW)
specialized software, such as AltaVista and Yahoo, that lets WWW browser users search for information on the Web by using keywords, phrases, and boolean logic Search Engine
open source, server-side HTML scripting languaage used to create dynamic Web pages PHP

    Customize    

Online Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Person trying to break into computer systems (6) hacker
Software you can use to avoid getting viruses (4-5) anti-virus
Person that winds someone up online on purpose (5) troll
Name that would give to an email attachement that may harm your computer (7) malware
Name for a programe that can do things to your computer without you knowing (3) bot
name for bullying behaviour that can take place over the internet, social media, mobile phones etc (5-8) cyber-bullying
software programe that helps screen out hackers, viruses and worms (8) firewall
important new versions of programes to fix problems and help protect computers (8,7) security updates
the sending of an offensive message to a specific person over the internet (7) flaming
A piece of software that can harm the computer, you would not go to the doctor for this (5) virus

    Customize    

CSC Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Generic term for unwanted e-mail SPAM
Small files that Web sites put on your computer hard drive when you first visit; used to track your activity COOKIES
The activity of defrauding an online account holder of information by posing as a legitimate company email PHISHING
Cracking method that attempts to guess user credentials through repeated attempts BRUTEFORCE
A network security system that controls incoming and outgoing network traffic based on a set of rules FIREWALL
Software that covertly sends information about computer activities without user permission SPYWARE
Method to protect data by scrambling it to make it unreadable to unauthorized users ENCRYPTION
Minimum number of characters for a CSC password EIGHT
Malicious software designed to block access to a computer system until a sum of money is paid RANSOMEWARE
First point of contact for CSC IT related issues ITHELPDESK
Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes SOCIALENGINEERING

    Customize    

Computer Forensics Word Search

Type
Word Search
Description

This word search contains the following answers:

standalone
zettabyte
yottabyte
keylogger
forensic image
decryption
encryption
caches
cookies
chainofcustody
wannacry
worm
trojan
virus
unallocated cluster
active files
Acquisition
programming
hacker
criminal
investigator
xry
prodiscover
encase
computer forensic

    Customize    

TCS Big Day Tech Crosswards Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

does not eliminate servers SERVERLESSCOMPUTING
a small program that allows a peripheral device such as a printer or scanner to connect to your PC DEVICEDRIVER
to load and initialise the operating system on a computer BOOT
a wireless communications technology intended to replace cables BLUETOOTH
Translating a source program into a machine language COMPILING
Number system used by computers. Uses sixteen digits HEXADECIMALSYSTEM
Code used for representing characters in the computer ASCII
approval, permission, or empowerment for someone or something to do something AUTHORIZATION
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQLINJECTION
pseudo IP address that always refer back to the local host and never sent out to a network LOOPBACKADDRESS
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers GATEWAY
protocol used for sending e‑mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one‑by‑one BRUTEFORCE
e‑mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website PHISHING
encrypted form of the message being sent CIPHERTEXT
hidden, self‑replicating section of computer software that inserts itself and becomes part of the another program VIRUS
security identification device like facial recognition and fingerprints BIOMETRICDEVICE
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form DIGITALFORENSICS
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next WATERFALL
What is a network security system used to stop unauthorised access called? FIREWALL

    Customize