Cyber Security Word Scramble
Type
Word Scramble
Description

password
authentication
phishing
encryption
firewall
cryptography
incident response
applications
software
infrastructure
network
privileges
security
vulnerability

Cyber Security Crossword

Cyber Security Crossword
Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running.
designed to detect and destroy computer viruses.
an attempt by hackers to damage or destroy a computer network or system.
a method, often secret, of bypassing normal authentication in a product
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
are small files that Web sites put on your computer hard disk drive when you first visit
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
someone who seeks and exploits weaknesses in a computer system or computer network.
global system of interconnected computer networks that use the Internet protocol suite
a local or restricted communications network, especially a private network created using World Wide Web software.
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
any malicious computer program which is used to hack into a computer by misleading users of its true intent
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a standalone malware computer program that replicates itself in order to spread to other computers.

Cyber Security Word Search

Cyber Security  Word Search
Type
Word Search
Description

steganography
click-jacking
Cyber Crime
hacktivism
encryption
spoofing
sniffing
phishing
firewall
security
spyware
zombie
domain
adware
virus
spam
worm
ISP

IT&S Cyber Security Crossword Puzzle

IT&S Cyber Security Crossword Puzzle
Type
Crossword
Description

A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person

Cyber Security Word Search

Cyber Security Word Search
Type
Word Search
Description

authentication
vulnerability
information
encryption
protection
ransomware
firewall
identity
internet
password
phishing
malware
network
privacy
spyware
access
attack
backup
hacker
online
threat
update
crime
virus
data
spam
wifi

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017
Type
Crossword
Description

a list of entities that are blocked or denied access/privilege
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization
specialized techniques for gathering, retaining and analyzing data as evidence for investigations
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information
a list of organizations that are considered trustworthy or allowed access/privilege
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users.
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker.
a type of digital currency
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access.
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual
The name of the leader who you would report security incidents to
The name of the leader who you would report privacy incidents to
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz
Duo-Security is considered what type of authentication when logging in remotely?
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only)
To report a compliance incident, who do you contact?
Quartz policy and procedure S014 outlines what type of policy?
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
What process do you need to go through for approval before files can be exchanged externally?
You are required to wear this item at all times while on Company premises
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint

INFO Security Crossword

INFO Security Crossword
Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char>
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char>
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char>
any data classified as personal, private or sensitive information <4 char>
function of one way encryption that is normally used to check integrity of data <4 char>
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char>
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char>
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char>
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char>
an internet scam that targets unsuspecting users through email <8 char>
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char>
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char>
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char>
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char>
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char>
spoofing, tampering etc are examples of a security _____ <6 char>
a way of injecting malicious scripts into web pages <18 char>
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char>
this malware targets microsoft windows based system and prevents it from booting <5 char>
group of experts that handle computer security incidents

Computer Crimes Word Search

Computer Crimes Word Search
Type
Word Search
Description

Electronic eavesdropping
Industrial espionage
Antivirus software
Biometric systems
Security guards
Software piracy
Identity theft
Internet fraud
Computer fraud
Virus creation
Cyber bullying
Video cameras
Cyber crime
Encryption
Archiving
Passwords
Firewall
Phishing
Computer
Illegal
Hacking
Locks
Crime
Worm

Cybersecurity Worksheet

Cybersecurity Worksheet
Type
Matching Worksheet
Description

Something or someone that may result in harm to asset
Probability of a threat exploiting a vulnerability
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset
Tool or technique that takes advantage of a vulnerability
Process of identifying, assessing, and reducing risk to an acceptable level
Security feature designed to restrict who has access to a network, IS, or data.
The process of generating, recording, and reviewing a chronological record of system events to determine their accuracy
Transforming data into scrambled code to protect it from being understood by unauthorized users
Readable text
Encrypted text
Software or hardware device that controls access to a private network from a public network (Internet) by analyzing data packets entering or exiting it
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level

Cyber Security Awareness Word Search

Cyber Security Awareness Word Search
Type
Word Search
Description

CONFIDENTIALITY
AUTHENTICATION
AUTHORIZATION
VULNERABILITY
CRYPTOGRAPHY
AVAILABILITY
CONTAINMENT
CERTIFICATE
DECRYPTION
COMPLIANCE
BIOMETRICS
HARVESTING
RANSOMWARE
ENCRYPTION
FORENSICS
BEHAVIOUR
KEYLOGGER
INTEGRITY
AWARENESS
SPOOFING
INTERNET
HONEYPOT
BACKDOOR
USERNAME
MALEWARE
FIREWALL
PASSWORD
SECURITY
PHISHING
HASHING
EXPLOIT
CONTROL
MONITOR
NETWORK
SPYWARE
PRIVACY
CIPHER
VECTOR
ADWARE
POLICY
TROJAN
THREAT
BOTNET
ATTACK
BREACH
HACKER
HTTPS
EMAIL
AUDIT
ASSET
CLOUD
VIRUS
CODE
WORM
WIFI
FTP

Security Awareness Word Scramble

Security Awareness Word Scramble
Type
Word Scramble
Description

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out