Type
Crossword
Description

spyware spyware
spoofing spoofing
social engineering social engineering
script kiddie script kiddie
DoS Attack Dos Attack
cyberextortionist cyberextortionist
cracker cracker
botnet botnet
biometric device biometric device
backdoor backdoor

Cyber Security Awareness Word Search

Type
Word Search
Description

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

Security Chat Crossword

Type
Crossword
Description

Illegal access, unless you're the door man Back Door
Iris or finger print scans biometric device
Unknowingly attack on one or more computers Dos attack
Computer searching for illegal activities digital forensics
Lets not waste anymore than we need to green computing
Lack of skills and software script kiddie
Don't divulge information to anyone social engineering
Are the websites legit spoofing
Can we or should we watch this show by live streaming filtering software
Do you know what your computer is doing while you surf the net? zombie

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Glossary Crossword

Type
Crossword
Description

security identification device like facial recognition and fingerprints BiometricDevice
zombie army or a network of private computers infected with malicious software botnet
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form digitalforensics
an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software cracker
an attempt to make a machine or network resource unavailable to its intended users DoSattack
the environmentally responsible and eco-friendly use of computers and their resources. greencomputing
the activity of defrauding an online account holder of financial information by posing as a legitimate company phishing
a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own. scriptkiddie
A scam where an intruder tries to gain access to a users system by pretending to be them spoofing
A computer that has been taken over by a hacker, virus, or trojan program zombie

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

Computer Basics ! Crossword

Type
Crossword
Description

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

CyberSecurity Awareness 2019 Crossword

Type
Crossword
Description

what is the part of the Internet that is not visible to regular users and is a vast network of websites & portals that are not categorized by search engines. DARK WEB
This happens when artificially created bogus clicks are used to manipulate Pay-Per-Click (PPC) advertising. The idea behind this practice is to increase the number of payable clicks, in order to generate revenue to advertisers. Cybercrooks use Botnet to create these types of scams. CLICKFRAUD
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address. SPOOFING
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. SPAM
A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. The sandbox limits the actions and resources available to the constrained item. SANDBOXING
Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. It can be a software solution or a hardware device used to capture anything that is typed on a keyboard KEYLOGGER
A trap or decoy used to distract attackers in order to prevent them from attacking actual production systems. It is a false system that is configured to look and function as a production system. HONEYPOT
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet. It is a combination of logical/technical-, physical- and personnel-focused countermeasures, safeguards and security controls. CYBERSECURITY
Any attempt to violate the security perimeter of a logical environment it can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets. CYBERATTACK
A malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user. CLICKJACKING
Malware that passes information about a computer user’s activities to an external party. SPYWARE
Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization PHISHING
An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets). DDOS
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered. RANSOMWARE
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. BREACH
A malicious application or script that can be used to take advantage of a computer’s vulnerability. EXPLOIT
the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it. ENCRYPTION
a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer. MALWARE
malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus. TROJAN
A Internet address on the World Wide Web. It usually begins with http:// followed by the rest of the name of the resource. It is the common name for a site’s web page. URL
a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks. ZOMBIE
Senior officers of the university responsible for determining how data in their area should be handled DATASTEWARDS
the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password AUTHENTICATION
Skimming is a method used by identity thieves to capture information from a cardholder. Several approaches can be used by fraudsters to procure card information with the most advanced approach involving a small device place at ATMs and other point of sale locations such as a gas station. SKIMMING
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data. HASHING
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda HACKTIVIST
‐ The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information PHARMING
a secret phrase that helps protect accounts, files, folders, and other confidential information PASSPHRASE
What is a trojan that stays dormant on a computer until it is remotely activated by another user. RAT
A term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person. SCAM
What is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people. SMISHING
A small text file placed on your computer when you visit a website, that allows the website to keep track of your visit details and store your preferences. COOKIE
acquisition and use of a person's private identifying information IDENTITY THEFT

Agility 2017 Crossword

Type
Crossword
Description

Used to speed up deployments and streamline operations iapps
The worlds first search engine for internet-connect devices Shodan
An Extensible alternative to HTML XML
The most disruptive botnet created to date MIRai
A mechanism whereby a browser uses a raw data channel to communicate with a server websockets
Don't get stung by their App Sec top 10 owasp
Journalist recently hit with record DDoS krebs
F5's event driven scripting language irules
F5's Developer community devcentral
. An attack designed to disrupt the availability of systems or services 13. F5's event driven scripting language DDOS
This very conference Agility
Best known form of digital currency bitcoin
The algorithm use to disguise data or code cipher
Hackers newest minions are what type of device IOT
Software used to disrupt a computer and/or gather sensitive data malware

Computer Terms Word Scramble

Type
Word Scramble
Description

Windows Media Player
software
Google Chrome
Control Panel
Internet Explorer
search engine
desktop
Device
monitor
attachment
youtube
cross- reference
Printer
paragraph
wikipedia
document
Hyphenation
footnote
Powerpoint
Hardware
data
home page
keyboard
Font
Symbols

Computer Terms Word Search

Type
Word Search
Description

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word