Type
Word Search
Description

This word search contains the following answers:

ZERODAYATTACK
VULNERABILITY
UPTIME
HOAX
WORM
TRESPASS
TRAPDOOR
THEFT
SURGE
SPYWARE
SPOOFING
SPIKE
SHOULDERSURFING
SPAM
SCRIPTKIDDIE
RANSOMWARE
MALWARE
PHREAKER
PHISHING
PHARMING
JAILBREAK
VIRUS
MTTR
MTBF
MTTF
SNIFFER
PACKETMONKEY
NOVISE
ESPIONAGE
MEDIA
DNS
HACKIVIST
FAULT
EXPLOIT
DOWNTIME
CYBERACTIVIST
DATABASE
CRACKER
BOT
BACKDOOR
ATTACK
ADWAR

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

zombie
hacktivism
spam
worm
spoofing
spyware
steganography
sniffing
phishing
ISP
firewall
encryption
domain
virus
click-jacking
adware
security
Cyber Crime

    Customize    

Computer and Internet Terms Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

spyware spyware
spoofing spoofing
social engineering social engineering
script kiddie script kiddie
DoS Attack Dos Attack
cyberextortionist cyberextortionist
cracker cracker
botnet botnet
biometric device biometric device
backdoor backdoor

    Customize    

Cyber Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

Administrator
password
encrypt
Intercept
social engineering
shoulder surfing
man in the middle
pharming
phishing
spyware
virus
worms
trojan horse
ransomware
rootkit
denial of service
botnet
malware

    Customize    

Cyber Sercurity Word Search

Type
Word Search
Description

This word search contains the following answers:

Forged URL
Backup Files
Secure WiFi
HTTPS
Good Habits
Internal Threats
Hoaxes
Spyware
Bad Invoice
Bad Link
Bad Address
Fake Antivirus
Email Phishing
Phone Phishing
Keyloggers
Whaling
Hackers
Encrypted
Password
Mobile Security
Malware
Ransomware
Virus
Trojan
Spear Phishing
Pharming
Phishing

    Customize    

Cyber Security Knowledge Word Search

Type
Word Search
Description

This word search contains the following answers:

SPOOF
HACKER
SPYWARE
DARK WEB
FIREWALL
ADWARE
VPN
VIRUS
CLOUD
BREACH
EXPLOIT
VULNERABILITIES
PATCHING
CEO FRAUD
RANSOMWARE
MALWARE
PHISHING
SOCIAL ENGINEERING

    Customize    

Security Risks Bingo Cards

Type
Bingo Cards
Description

These bingo cards contain the following answers:

adware
malware
grey hat hacking
black hat hacking
phishing
pharming
identity theft
spyware
email spam
bug
bot
virus
worm
trojan
rootkit
piggy backing

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

access
attack
authentication
backup
crime
data
encryption
firewall
hacker
identity
information
internet
malware
network
online
password
phishing
privacy
protection
ransomware
spam
spyware
threat
update
virus
vulnerability
wifi

    Customize    

2018 Goodwill Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

vulnerability
intrusion
keylogger
backup
shred
spam
malicious
password
awareness
whaling
spyware
internet
hacker
firewall
cybersecurity
antivirus
encryption
email
spoofing
security
Goodwill
ransomware
phishing
virus

    Customize    

6.01 Security Threats Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A hacker who discovers and exposes security flaws in applications & operating systems so that manufacturers can fix them before they become widespread problems. whitehat
A hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose. blackhat
Unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition malware
A piece of code that spreads from one computer to another by attaching itself to other files. virus
A piece of code that spreads from one computer to another on its own, not by attaching itself to another file. worm
An insidious type of malware that is itself a software attack and can pave way for a number of other types of attacks. trojanhorse
A piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date. logicbomb
Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain. spyware
Software that automatically displays or downloads advertisements when it is used. adware
Code intended to take full or partial control of a system at the lowest levels. rootkit
An email-based threat that presents various advertising materials, promotional content, or get-rich-quick schemes to users. spam
Malicious software that prevents you from using your computer. ransomware
A type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines. socialengineeringattack
Human-based attack where the goal is to look over the shoulder of an individual to obtain passwords or PINs. shouldersurfing
Human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. spoofing

    Customize