Type
Word Search
Description

details
speak
contact
safeness
cyber bullying
virus
computer
passsword
online
danger
hacker
e safety

Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

Cyber Crime Word Search

Type
Word Search
Description

protection
information
penetration
firewall
hoax
access
virus
blackhat
security
account
blackmail
bullying
catfish
crime
cyber
fake
hacker
internet
malware
phishing
safe
secure
stalker
strongpassword

Internet Safety Crossword

Type
Crossword
Description

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

E- Safety Word Search

Type
Word Search
Description

rules
trusted
post
danger
stranger
number
address
adult
online
personal
safe
internet
safety

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Internet Safety Word Search

Type
Word Search
Description

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

Online Safety Crossword

Type
Crossword
Description

Person trying to break into computer systems (6) hacker
Software you can use to avoid getting viruses (4-5) anti-virus
Person that winds someone up online on purpose (5) troll
Name that would give to an email attachement that may harm your computer (7) malware
Name for a programe that can do things to your computer without you knowing (3) bot
name for bullying behaviour that can take place over the internet, social media, mobile phones etc (5-8) cyber-bullying
software programe that helps screen out hackers, viruses and worms (8) firewall
important new versions of programes to fix problems and help protect computers (8,7) security updates
the sending of an offensive message to a specific person over the internet (7) flaming
A piece of software that can harm the computer, you would not go to the doctor for this (5) virus

E Safety Crossword

Type
Crossword
Description

You need to keep this secret and make it hard to guess password
You should never accept these from stangers friend request
Someone who hurts you feelings by sending nasty messages cyber bully
This can attack your computer virus
You should never give this out online personal information
You should never arrange to do this with people you don't know Meet up
What you should do to people who send you nasty messages Block
These are people you don't know strangers
If you see something that upsets you who should you tell? parents
You should never send this to people online picture

National Cyber Security Awareness Month (NCSAM) Word Search

Type
Word Search
Description

passphrase
open wi-fi
encryption
spyware
scareware
skimmers
hacker
password manager
internet safety
ransomware
virus
malware
phishing
identity theft
data breach

Cyber Bullying Word Search

Type
Word Search
Description

bullying
cell phones
chat room
digital media
email
Facebook
instant messaging
online communication
online games
posting
privacy setting
reputation
Snapchat
social media
social networking
texting
Twitter