Type
Crossword
Description

You should complete one of these regularly to ensure your PC is not at risk Scan
A program that helps stop viruses infect your computer Antivirus
A program that causes harm to computers Virus
Software that is designed to disrupt, damage or gain access to a computer system Malware
A type of malware that misleads users in its intent Trojan horse
A computer, connected to the internet that has been compromised Zombie
A group of internet connected devices that are all running bots, often to cause harmful attacks Botnet
A program that runs all the time, monitoring your keystrokes Keylogging
A computer program used to test and debug a program Debugger
A network security system which blocks unauthorised access, but permits outward communication Firewall
A type of malware that threatens to publish a victim's data or block them, unless a ransom is paid Ransomware
Someone who accesses a computer or system illegally or without authorisation Hacker
The process of a virus entering a computer Infection
A malware computer program that replicates itself in order to spread to other computers Worm

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

Computer Basics ! Crossword

Type
Crossword
Description

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Computer Crossword Puzzle

Type
Crossword
Description

A screen that displays an image that is being generated by a computer. monitor
The set of keys that are used to type words on a computer or typewriter. keyboard
A small device that is connected to a computer that you move with your hand to help you click on items on the computer screen. mouse
A machine that is used for printing documents, pictures, etc. printer
An electronic device that can intensify speeches, music, etc., and made audible throughout a room, hall, or the like. speaker
A set of facts or figures that can be displayed through a computer, especially in columns. table
or the Central Processing Unit is the component of a computer system that processes and exchanges data with the peripherals. CPU
The main circuit board of a computer that holds together many of the important components of a computer. motherboard
are on a keyboard to help you enter information on the computer. Keys
where you can find the images on your electronic device. Screen
where you can find the physical components of an electronic device. hardware
a computer program where you can look up and information on the internet. Browser
A group of files or documents that are stored together by a title on your computer. folders
A brief comment or explanation. notes
A small picture on a computer screen that represents a program or function that can be opened. icons
Booting a computer system again usually due to a problem. reboot
A special kind of cord that enables you to connect a computer to another device. USB
An disk that contains usually a video recording or computer data. DVD
To look up something. search

Computer Crime Crossword

Type
Crossword
Description

What stops people from illegally distributing and copying material? Copyright
what software is designed to disrupt, damage, or gain authorised access to a computer system? Malware
what program is designed to breach the security of a computer system? TrojanHorse
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film? Virus
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you Fraud
when someone sends emails posing as a company asking for personal information Phishing
messages from crooks trying to steal your money or your identity EMAILSCAM
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox. SPAMFILTER
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying
when someone or a robot gets into your device and steals personal information like pictures and bank details Hacking
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites. Vandalism

Crossword - Exercise 1

Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
An attempt by hackers to damage or destroy a computer network or system. Attack
Someone who seeks and exploits weaknesses in a computer system or computer network. Hacker
The process of confirming the correctness of the claimed identity Authentication
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website Phishing
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Security
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
Are small files that Web sites put on your computer hard disk drive when you first visit Cookies
A technology that allows us to access our files through the internet from anywhere in the world. Cloud
Appears at the beginning of the web-link of a secured website HTTPS
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A data classification mode that describes certain data or document as a secret Reporting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
The art of manipulating people to get access to sensitive information Social Engineering
A software that is a type of utility used for scanning and removing harmful software from your computer Antivirus
Any software program in which advertising banners are displayed while the program is running Adware
The use of electronic communication to bully a person Cyberbullying
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots

Knowledge About Virus Crossword

Type
Crossword
Description

The malicious computer program that spread and do harm to computer, which can be launch through infected program or by the use of infected disk or USB drive virus
The malicious computer program is hidden under the useful application, and later cause harm to the computer trojan horse
A standalone malicious computer program that replicates, spread, and do harm to other computers through exploiting vulnerabilities worm
An attempt by hackers to damage or destroy a computer network or system attack
A software that cause harm to computer malware
A software that encrypts data and require payment to decrypt it ransomware
A software that display advertisement according to information stolen from the spyware adware
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive spyware
A software that tracks the key struck on the keyboard keylogger
A technology that get into the operating system to hide a malicious program component rootkit
A software that is designed to detect and destroy computer viruses antivirus
The process of making copies of data to guarantee accessibility when the original data are lost or destroyed backup
The ability to ensure reliable access of information whenever needed availability
The ability to ensure the authenticity of information—the information is trustworthy and accurate integrity
The ability to ensure authorized people can get access to the information only confidentiality
A text message tactic in which individuals are tricked into revealing critical financial or personal information Smsishing
A phone call tactic in which individuals are tricked into revealing critical financial or personal information vishing
The activity of defrauding an online account holder of financial information by posing as a legitimate company phishing
Someone who seeks and exploits weaknesses in a computer system or computer network hacker
Computer robot that performs a wide variety of automated tasks bot
a method, often secret, of bypassing normal authentication in a product back door
Bundles of malicious programs that combine the functionality of different types of malware blended threat
A way of virus propagation in which the malicious code is place in the medium (e.g. CD, DVD…), and will be read by the computer first before the operating system (OS) is read. master boot record
A way of virus propagation in which the malicious code overwrites or inserted in the executable file file infection
A way of virus propagation in which the malicious code is hidden in an automated input sequence macro infection
The technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security