Type
Crossword
Description

security identification device like facial recognition and fingerprints BiometricDevice
zombie army or a network of private computers infected with malicious software botnet
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form digitalforensics
an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software cracker
an attempt to make a machine or network resource unavailable to its intended users DoSattack
the environmentally responsible and eco-friendly use of computers and their resources. greencomputing
the activity of defrauding an online account holder of financial information by posing as a legitimate company phishing
a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own. scriptkiddie
A scam where an intruder tries to gain access to a users system by pretending to be them spoofing
A computer that has been taken over by a hacker, virus, or trojan program zombie

Computer and Internet Terms Crossword

Type
Crossword
Description

spyware spyware
spoofing spoofing
social engineering social engineering
script kiddie script kiddie
DoS Attack Dos Attack
cyberextortionist cyberextortionist
cracker cracker
botnet botnet
biometric device biometric device
backdoor backdoor

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Security Chat Crossword

Type
Crossword
Description

Illegal access, unless you're the door man Back Door
Iris or finger print scans biometric device
Unknowingly attack on one or more computers Dos attack
Computer searching for illegal activities digital forensics
Lets not waste anymore than we need to green computing
Lack of skills and software script kiddie
Don't divulge information to anyone social engineering
Are the websites legit spoofing
Can we or should we watch this show by live streaming filtering software
Do you know what your computer is doing while you surf the net? zombie

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Computer Networks Crossword

Type
Crossword
Description

What is it called when computers and other devices that are connected to share hardware, software, and data? Computer Network
A real time, face to face meeting between individuals not in the physically in the same place is called? Videoconference
A phone, such as a cellular or satellite phone, that uses a wireless network. mobile phone
The act of working from a remote location bu using computers and networking technology. telecommute
The use of networking technology to provide medical information and services telemedicine
A network that uses a central device connected directly to several other devices star network
In a client-server network, a computer that is dedicated to processing client requests. server
A location that provides wireless Internet access. hotspot
A network in which computers and other devices are connected to the network via physical cables Wired Network
A network in which computers and other devices are connected without physical cables Wireless Network
A network that uses a central cable to which all network devices connect. Bus Network
In a client server network, a computer or other device that requests and uses network resources. Client
To retrieve files from a server download
to transfer files to a server upload
a private network that is set up similarly to the internet and is accesses via a Web browser Intranet
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period. bandwidth
An intranet that is at least partially accessible to authorized outsiders. Extranet
The amount of data that is transferred under real life conditions. Throughput
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient. Broadcasting
A networking standard for very short-range wireless connections Bluetooth

CyberSecurity Awareness 2019 Crossword

Type
Crossword
Description

what is the part of the Internet that is not visible to regular users and is a vast network of websites & portals that are not categorized by search engines. DARK WEB
This happens when artificially created bogus clicks are used to manipulate Pay-Per-Click (PPC) advertising. The idea behind this practice is to increase the number of payable clicks, in order to generate revenue to advertisers. Cybercrooks use Botnet to create these types of scams. CLICKFRAUD
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address. SPOOFING
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. SPAM
A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. The sandbox limits the actions and resources available to the constrained item. SANDBOXING
Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. It can be a software solution or a hardware device used to capture anything that is typed on a keyboard KEYLOGGER
A trap or decoy used to distract attackers in order to prevent them from attacking actual production systems. It is a false system that is configured to look and function as a production system. HONEYPOT
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet. It is a combination of logical/technical-, physical- and personnel-focused countermeasures, safeguards and security controls. CYBERSECURITY
Any attempt to violate the security perimeter of a logical environment it can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets. CYBERATTACK
A malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user. CLICKJACKING
Malware that passes information about a computer user’s activities to an external party. SPYWARE
Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization PHISHING
An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets). DDOS
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered. RANSOMWARE
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. BREACH
A malicious application or script that can be used to take advantage of a computer’s vulnerability. EXPLOIT
the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it. ENCRYPTION
a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer. MALWARE
malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus. TROJAN
A Internet address on the World Wide Web. It usually begins with http:// followed by the rest of the name of the resource. It is the common name for a site’s web page. URL
a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks. ZOMBIE
Senior officers of the university responsible for determining how data in their area should be handled DATASTEWARDS
the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password AUTHENTICATION
Skimming is a method used by identity thieves to capture information from a cardholder. Several approaches can be used by fraudsters to procure card information with the most advanced approach involving a small device place at ATMs and other point of sale locations such as a gas station. SKIMMING
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data. HASHING
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda HACKTIVIST
‐ The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information PHARMING
a secret phrase that helps protect accounts, files, folders, and other confidential information PASSPHRASE
What is a trojan that stays dormant on a computer until it is remotely activated by another user. RAT
A term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person. SCAM
What is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people. SMISHING
A small text file placed on your computer when you visit a website, that allows the website to keep track of your visit details and store your preferences. COOKIE
acquisition and use of a person's private identifying information IDENTITY THEFT

CYBER AWARENESS CROSSWORD

Type
Crossword
Description

An agreement between two or more entities to allow access to data or information. Details the controls that are to be put in place to protect the data, including how the data will be used, stored, shared and disposed of. DAA
A cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. The algorithm is a sixteen round block cipher which uses a 64bit block and a 56bit key. DES
Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. DOS
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures the organisation is to follow in the event of a disaster. DRP
A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. (United States of America Federal.) FIPS
A message authentication code that makes use of a cryptographic key along with a hash function. HMAC
The ability of the anti-virus software to detect patterns of behavior on the machine Heuristic Scanning
A system that monitors a network for malicious activities such as security threats or policy IPS
A software update comprised code inserted (or patched) into the code of an executable program. Patch
The security-oriented probing of a computer system or network to seek out vulnerabilities Pen Test
A software program that provides cryptographic privacy and authentication for data communication. PGP
A hacker gains access to a group of computers and then uses them to carry out a variety of attacks on other computers Botnet attack
Cross-site request forgery (or “sea-surf”) attack. Malware from someone who appears to be a trusted user of a site XSRF attack
Distributed denial of service attack. Flooding a network or website or network with requests, making it impossible for legitimate users to access the site DDoS attack
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax email
Recording the keystrokes made by an authorized user Key logging
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes Pharming
Directing users to a bogus site through an email that appears legitimate; information entered on the phony site is captured for fraudulent purposes Phishing
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Making small, undetectable changes over an extended period of time; “penny shaving” is a type of salami attack Salami attack
Scam software that appears to be legitimate, to encourage download Scareware
Phishing using text messages rather than emails Smishing
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges; often used in DDoS attacks Spoofing
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes Vishing
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink XXS attack
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website defacement