Online and Computer Safety Word Search

Created
May 15, 2019
Type
Word Search
Description

This word search contains the following answers:

Cookies
Nonrepudiation
Key
Digital Certificate
Authentication
Encryption
Illicit Server
Spim
Malware
Spyware
Downloading
Trojan
Firewall
Email
Worms
Software
Internet
Illegal
Viruses
Phishing
Password
Browser
Hacker
Spam
Attachment

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

More Crosswords, Word Searches, and Puzzles

Computer Safety Word Search

Created
Nov 9, 2016
Type
Word Search
Description

This word search contains the following answers:

Attachment
Spam
Email
Hacker
Bowser
Social
Password
Phishing
Firewall
Viruses
Illegal
Downloading
Internet
Software
Spyware

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Crossword

Created
Apr 25, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Internet Safety Crossword

Created
Feb 22, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Terms Word Search

Created
Apr 12, 2016
Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Digital Literacy Word Search

Created
Aug 24, 2015
Type
Word Search
Description

This word search contains the following answers:

Alphanumeric
Charts
Columns
CPU
Database
Edit
Email
Firewall
Format
Hardware
Input
Internet
Intranet
Logon
Modem
Monitor
Network
Online
Operating system
Output
Phishing
Presentation
Save
Software
Spreadsheet
Storage device
Tables
USB
Virus
Word processing

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Puzzle Word Search

Created
May 24, 2017
Type
Word Search
Description

This word search contains the following answers:

Blog
Browser
Domainame
Download
DVD
Email
FireWall
Flash Memory
FlashDrive
HardDrive
Internet
IP
ISP
Login
Macro
Malware
NetWork
Offline
Online
Password
PC
Printer
Program
Ram
Server
Social Network
SoftWare
URL
USB
Website

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

E-Safety Crossword

Created
Nov 15, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Awareness Word Search

Created
Sep 21, 2018
Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Safety Crossword

Created
Feb 9, 2018
Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Internet and Viruses Word Search

Created
May 11, 2015
Type
Word Search
Description

This word search contains the following answers:

DNS
antivirus software
worm
trojan horse
boot sector virus
file virus
logic bomb
time bomb
trigger event
spyware
adware
virus
cookies
upload
download
favorites
homepage
Browser

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying