Puzzles and worksheets similar to Cyber Security Workshop Crossword

technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Knowledge About Virus Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

The malicious computer program that spread and do harm to computer, which can be launch through infected program or by the use of infected disk or USB drive virus
The malicious computer program is hidden under the useful application, and later cause harm to the computer trojan horse
A standalone malicious computer program that replicates, spread, and do harm to other computers through exploiting vulnerabilities worm
An attempt by hackers to damage or destroy a computer network or system attack
A software that cause harm to computer malware
A software that encrypts data and require payment to decrypt it ransomware
A software that display advertisement according to information stolen from the spyware adware
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive spyware
A software that tracks the key struck on the keyboard keylogger
A technology that get into the operating system to hide a malicious program component rootkit
A software that is designed to detect and destroy computer viruses antivirus
The process of making copies of data to guarantee accessibility when the original data are lost or destroyed backup
The ability to ensure reliable access of information whenever needed availability
The ability to ensure the authenticity of information—the information is trustworthy and accurate integrity
The ability to ensure authorized people can get access to the information only confidentiality
A text message tactic in which individuals are tricked into revealing critical financial or personal information Smsishing
A phone call tactic in which individuals are tricked into revealing critical financial or personal information vishing
The activity of defrauding an online account holder of financial information by posing as a legitimate company phishing
Someone who seeks and exploits weaknesses in a computer system or computer network hacker
Computer robot that performs a wide variety of automated tasks bot
a method, often secret, of bypassing normal authentication in a product back door
Bundles of malicious programs that combine the functionality of different types of malware blended threat
A way of virus propagation in which the malicious code is place in the medium (e.g. CD, DVD…), and will be read by the computer first before the operating system (OS) is read. master boot record
A way of virus propagation in which the malicious code overwrites or inserted in the executable file file infection
A way of virus propagation in which the malicious code is hidden in an automated input sequence macro infection
The technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security

    Customize    

Computer Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

    Customize    

INFO Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

    Customize    

Chapter 1 - Introduction to Computers Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Long Term Memory RAM
Lightweight computer that uses touchscreen Tablet
A computer and network connection Interface
Security device that controls access from the Internet Firewall
Small disk files that contain software codes System Files
Input device that emits an electronic signal Light Pen
Input device used to capture video images in real time Webcam
Use finely focused laser beam to read and write data Compact Discs
Converts characters, images and text to digital data Scanner
A wireless computer mounted on a mobile cart Computer on wheels
Easily transported wireless computer Laptop
Magnetic storage media inside a computer Hard Drive
Another word meaning quality of the image Resolution
Uses tiny nozzles to spray ink on paper Ink jet printer
A type of programming language COBOL
A type of software FOSS
Network lined up on a single cable Bus Network
Routes data between networks using IP address Router
Network that can reach across wide geographic areas Wide area network
Sends signal from router to PC Wireless

    Customize    

System Software Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Output that is used to make changes to input or processing. Feedback
Data that is shaped into a meaningful manner and is used in decision-making. Information
Raw facts that occur in the physical environment or organisation Data
System software that helps the user in the creation, controlling development, usage and maintenance of the databases of computer systems. DBMS
Software consists of the programs for data/ information processing Software
A network that crosses metropolitan, regional or national boundaries WAN
A set of programs controlling the computer hardware and acting as an interface with the application programs. Operating System
Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing Router
A standard set of rules and procedures for the control of communications in a network. Protocol
Involves translating what a user wants to accomplish into a code that the computer can understand and execute. Programming
Converting/ transforming of data into useful outputs Processing
Hardware components that enable a computer system to communicate information to humans or other machines so that it can be used. Output Devices
Transactions that are accumulated and processed later as a group or in a batch. Batch Processing
Telecommunication device that connects one local area network to another one that uses the same telecommunications protocol. Bridge
A hidden program that inserts itself into a computer’s systems Computer Virus
Can be compared with the human brain. It obtains instructions from memory, interprets them and notifies the other components to perform them CPU
The ability to confer with a group of people simultaneously using telephone or e-mail group communication software Teleconferencing
A formal collection of people and other resources assembled together in order to establish a set of goals. Organisation
Telecommunication device that serves as an entrance to another network Gateway
Data is processed immediately after being captured OLTP

    Customize    

Digital Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

Computer Networks Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What is it called when computers and other devices that are connected to share hardware, software, and data? Computer Network
A real time, face to face meeting between individuals not in the physically in the same place is called? Videoconference
A phone, such as a cellular or satellite phone, that uses a wireless network. mobile phone
The act of working from a remote location bu using computers and networking technology. telecommute
The use of networking technology to provide medical information and services telemedicine
A network that uses a central device connected directly to several other devices star network
In a client-server network, a computer that is dedicated to processing client requests. server
A location that provides wireless Internet access. hotspot
A network in which computers and other devices are connected to the network via physical cables Wired Network
A network in which computers and other devices are connected without physical cables Wireless Network
A network that uses a central cable to which all network devices connect. Bus Network
In a client server network, a computer or other device that requests and uses network resources. Client
To retrieve files from a server download
to transfer files to a server upload
a private network that is set up similarly to the internet and is accesses via a Web browser Intranet
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period. bandwidth
An intranet that is at least partially accessible to authorized outsiders. Extranet
The amount of data that is transferred under real life conditions. Throughput
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient. Broadcasting
A networking standard for very short-range wireless connections Bluetooth

    Customize