Type
Word Search
Description

This word search contains the following answers:

parental controls
cloud storage
backup
Trojan horse
virus
lifelock
security
firewall
apple
virus protection promise
identity
wifi privacy
protect
threats
spyware
ransomware
malware
dark web monitoring

    Customize    

Cyber Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

access
attack
authentication
backup
crime
data
encryption
firewall
hacker
identity
information
internet
malware
network
online
password
phishing
privacy
protection
ransomware
spam
spyware
threat
update
virus
vulnerability
wifi

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

National Cyber Security Awareness Month (NCSAM) Word Search

Type
Word Search
Description

This word search contains the following answers:

passphrase
open wi-fi
encryption
spyware
scareware
skimmers
hacker
password manager
internet safety
ransomware
virus
malware
phishing
identity theft
data breach

    Customize    

Computer Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Cyber Sercurity Word Search

Type
Word Search
Description

This word search contains the following answers:

Forged URL
Backup Files
Secure WiFi
HTTPS
Good Habits
Internal Threats
Hoaxes
Spyware
Bad Invoice
Bad Link
Bad Address
Fake Antivirus
Email Phishing
Phone Phishing
Keyloggers
Whaling
Hackers
Encrypted
Password
Mobile Security
Malware
Ransomware
Virus
Trojan
Spear Phishing
Pharming
Phishing

    Customize    

Cyber Security Knowledge Word Search

Type
Word Search
Description

This word search contains the following answers:

SPOOF
HACKER
SPYWARE
DARK WEB
FIREWALL
ADWARE
VPN
VIRUS
CLOUD
BREACH
EXPLOIT
VULNERABILITIES
PATCHING
CEO FRAUD
RANSOMWARE
MALWARE
PHISHING
SOCIAL ENGINEERING

    Customize    

System security & malware Word Search

Type
Word Search
Description

This word search contains the following answers:

Levels of access
anti spyware
anti virus
brute force
encryption
firewall
key logger
malware
security
spyware
sql injections
strong passwords
Trojan
viruses
worms

    Customize    

Computer Science Vocab Word Search

Type
Word Search
Description

This word search contains the following answers:

ZIP FILE
WINDOWS
BROWSER
WEB
VIRUS
USERNAME
USB
UPLOAD
HORSE
TROJAN
TERAFLOP
SPYWARE
SOUNDCARD
SMILEY
SERVER
SCROLL
SAVE
RESOLUTION
REBOOT
PRINTER
PORT
PERIPHERAL
PCI
PASSWORD
OPEN
NETIQUETTE
MULTIMEDIA
MODEM
MENU
LINUX
KEYBOARD
JPEG
JAVA
INPUT
HARDWARE
HACKER
GIGABYTE
FREEWARE
FONT
FIREWIRE
FAQ
ETHERNET
EMOTICON
DRIVER
DOWNLOASD
DOCUMENT
DISK
DESKTOP
DATABASE
CYBERSPACE
CRASH
CPU
COPY
CHIP
CACHE
BUG
BIOS
BANDWIDTH
ASCII

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize