Type
Crossword
Description

This crossword contains the following questions and answers:

advertisement and or ads adware
secret way to control a computer backdoor
sent to spam botnet
rules to follow Code of Conduct
scans finger fingerprint scanner
gain access to date hacker
disrupt or damage computer malware
usage of green materials green computing
protection of computer firewall
small files stored on computer cookie
break into a copyright cracker
converting info into a code encryption

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Cyber Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

Unit 1 vocabulary Word Search

Type
Word Search
Description

This word search contains the following answers:

worm
virus
adware
cookies
spam
encryption
cybercrime
spoofing
computer forensics
vandalism
piracy
copyright
phishing
quarantine
firewall
hacker
punctual
honesty
plagiarize
intergrity

    Customize    

Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

    Customize    

Technology Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

zombie
hacktivism
spam
worm
spoofing
spyware
steganography
sniffing
phishing
ISP
firewall
encryption
domain
virus
click-jacking
adware
security
Cyber Crime

    Customize    

Computer and Internet Terms Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

spyware spyware
spoofing spoofing
social engineering social engineering
script kiddie script kiddie
DoS Attack Dos Attack
cyberextortionist cyberextortionist
cracker cracker
botnet botnet
biometric device biometric device
backdoor backdoor

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

6.01 Security Threats Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A hacker who discovers and exposes security flaws in applications & operating systems so that manufacturers can fix them before they become widespread problems. whitehat
A hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose. blackhat
Unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition malware
A piece of code that spreads from one computer to another by attaching itself to other files. virus
A piece of code that spreads from one computer to another on its own, not by attaching itself to another file. worm
An insidious type of malware that is itself a software attack and can pave way for a number of other types of attacks. trojanhorse
A piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date. logicbomb
Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain. spyware
Software that automatically displays or downloads advertisements when it is used. adware
Code intended to take full or partial control of a system at the lowest levels. rootkit
An email-based threat that presents various advertising materials, promotional content, or get-rich-quick schemes to users. spam
Malicious software that prevents you from using your computer. ransomware
A type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines. socialengineeringattack
Human-based attack where the goal is to look over the shoulder of an individual to obtain passwords or PINs. shouldersurfing
Human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. spoofing

    Customize    

Cybersecurity Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Symbol to look for before entering ANY personal details Padlock
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system Malware
A person who uses computers to gain unauthorised access to data Hacker
The secure version of HTTP HTTPS
A name used in conjunction with a password to gain access to a computer system or a network service Username
Files sent through email Attachments
Trying to steal other people's senstive information Phishing
A piece of software or hardware that blocks certain types of traffic Firewall
Software and services that run on the Internet instead of your computer Cloud

    Customize