Description

what is the part of the Internet that is not visible to regular users and is a vast network of websites & portals that are not categorized by search engines.
This happens when artificially created bogus clicks are used to manipulate Pay-Per-Click (PPC) advertising. The idea behind this practice is to increase the number of payable clicks, in order to generate revenue to advertisers. Cybercrooks use Botnet to create these types of scams.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. The sandbox limits the actions and resources available to the constrained item.
Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. It can be a software solution or a hardware device used to capture anything that is typed on a keyboard
A trap or decoy used to distract attackers in order to prevent them from attacking actual production systems. It is a false system that is configured to look and function as a production system.
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet. It is a combination of logical/technical-, physical- and personnel-focused countermeasures, safeguards and security controls.
Any attempt to violate the security perimeter of a logical environment it can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets.
A malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user.
Malware that passes information about a computer user’s activities to an external party.
Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization
An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
A malicious application or script that can be used to take advantage of a computer’s vulnerability.
the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it.
a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer.
malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus.
A Internet address on the World Wide Web. It usually begins with http:// followed by the rest of the name of the resource. It is the common name for a site’s web page.
a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks.
Senior officers of the university responsible for determining how data in their area should be handled
the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password
Skimming is a method used by identity thieves to capture information from a cardholder. Several approaches can be used by fraudsters to procure card information with the most advanced approach involving a small device place at ATMs and other point of sale locations such as a gas station.
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda
‐ The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information
a secret phrase that helps protect accounts, files, folders, and other confidential information
What is a trojan that stays dormant on a computer until it is remotely activated by another user.
A term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
What is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people.
A small text file placed on your computer when you visit a website, that allows the website to keep track of your visit details and store your preferences.
acquisition and use of a person's private identifying information

Customize
Add, edit, delete clues, and customize this puzzle.

CYBER-SECURITY

Crossword

I.T Wordsearch

Word Search

Technology vocab

Crossword

Computing

Crossword

Wearable

Crossword

Frequently Asked Questions

What is a crossword?

Crossword puzzles have been published in newspapers and other publications since 1873. They consist of a grid of squares where the player aims to write words both horizontally and vertically.

Next to the crossword will be a series of questions or clues, which relate to the various rows or lines of boxes in the crossword. The player reads the question or clue, and tries to find a word that answers the question in the same amount of letters as there are boxes in the related crossword row or line.

Some of the words will share letters, so will need to match up with each other. The words can vary in length and complexity, as can the clues.

Who is a crossword suitable for?

The fantastic thing about crosswords is, they are completely flexible for whatever age or reading level you need. You can use many words to create a complex crossword for adults, or just a couple of words for younger children.

Crosswords can use any word you like, big or small, so there are literally countless combinations that you can create for templates. It is easy to customise the template to the age or learning level of your students.

How do I create a crossword template?

For the easiest crossword templates, WordMint is the way to go!

Pre-made templates

For a quick and easy pre-made template, simply search through WordMint’s existing 500,000+ templates. With so many to choose from, you’re bound to find the right one for you!

Create your own from scratch

  • Log in to your account (it’s free to join!)
  • Head to ‘My Puzzles’
  • Click ‘Create New Puzzle’ and select ‘Crossword’
  • Select your layout, enter your title and your chosen clues and answers
  • That’s it! The template builder will create your crossword template for you and you can save it to your account, export as a word document or pdf and print!

How do I choose the clues for my crossword?

Once you’ve picked a theme, choose clues that match your students current difficulty level. For younger children, this may be as simple as a question of “What color is the sky?” with an answer of “blue”.

Are crosswords good for students?

Crosswords are a great exercise for students' problem solving and cognitive abilities. Not only do they need to solve a clue and think of the correct answer, but they also have to consider all of the other words in the crossword to make sure the words fit together.

Crosswords are great for building and using vocabulary.

If this is your first time using a crossword with your students, you could create a crossword FAQ template for them to give them the basic instructions.

Can I print my crossword template?

All of our templates can be exported into Microsoft Word to easily print, or you can save your work as a PDF to print for the entire class. Your puzzles get saved into your account for easy access and printing in the future, so you don’t need to worry about saving them at work or at home!

Can I create crosswords in other languages?

Crosswords are a fantastic resource for students learning a foreign language as they test their reading, comprehension and writing all at the same time. When learning a new language, this type of test using multiple different skills is great to solidify students' learning.

We have full support for crossword templates in languages such as Spanish, French and Japanese with diacritics including over 100,000 images, so you can create an entire crossword in your target language including all of the titles, and clues.