crossword_cyber
Type
Crossword
Description

It is important to have antivirus installed on your computer and on your _______.
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted
A software that is designed and destroy computer viruses
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
Choose a password that is easy for you _______________ but hard for you someone to guess
Also known as malicious software any; any program or file that is harmful to a computer user
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
What you should do to all papers with PII or other sensitive information
An adversary is considered a _________
What you must do to emails containing Critical Information
What a weakness in our practices or defense is called
any software program in which advertising banners are displayed while the program is running
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
any malicious computer program which is used to hack into a computer by misleading users of its true intent
______ ______ is when a person obtains and uses your personal information without your permission for financial gain
what is it called if people are nasty to you online?

Internet Safety Crossword

Internet Safety Crossword
Type
Crossword
Description

Trying to steal other people's sensitive information
Trying to break into computer systems
Software programs designed to corrupt computers
Software protecting computers from danger
Being pursued by someone through the anonymity of social media
Symbol to look for before entering ANY personal details
Being harrassed or threatened online
Most commonly used password
Protection for your computer
Files sent through email

Cyber Security Crossword

Cyber Security Crossword
Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running.
designed to detect and destroy computer viruses.
an attempt by hackers to damage or destroy a computer network or system.
a method, often secret, of bypassing normal authentication in a product
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
are small files that Web sites put on your computer hard disk drive when you first visit
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
someone who seeks and exploits weaknesses in a computer system or computer network.
global system of interconnected computer networks that use the Internet protocol suite
a local or restricted communications network, especially a private network created using World Wide Web software.
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
any malicious computer program which is used to hack into a computer by misleading users of its true intent
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a standalone malware computer program that replicates itself in order to spread to other computers.

Technology Crossword Puzzle

Technology Crossword Puzzle
Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
The combination of typeface and other qualities, such as size, pitch, and spacing.
A word or group of words that act as a way to cross reference to other documents or files on the computer.
A device that feeds data into a computer, such as a keyboard or mouse.
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
Usually comprises the display device, circuitry, casing, and power supply.
Sending an email, posting photos on a social media site and using your webcam.
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways.
Usually consists of eight bits.
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
copy (data) from one computer system to another, typically over the Internet.
The collection of physical parts of a computer system.
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
A measure of the amount of computational work that a computer system performs.

E-Safety Crossword

E-Safety Crossword
Type
Crossword
Description

What do you call a program that is sent to harm your computer
What is it called to break into another computer system
What software can we use to protect out computer ---- virus?
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number?
In stead of using a photo of yourself, you should create an...?
an email message sent to a large number of people without their consent, usually promoting a product or service
what is a computer program sent to gather information from your computer called?
What is a network security system used to stop unauthorised access called?
what should you use to protect your user area?
A password should included numbers, uppercase letters, symbols and ......... letters?
what is it called if people are nasty to you online?
Dont open ...... from people you dont know
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service.
A program that can do things without the user of the computer having to give it instructions.
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer.
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops.
a program that secretly monitors your actions.
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites.
when copying information or images off the internet you must check for what legal information?
you need to check that the information you get off the web is R.......

Computer Safety Crossword

Computer Safety Crossword
Type
Crossword
Description

Small circuit board that controls processing within a computer
Physical parts of a computer
A program that contains instructions for a computer
Applications are also known as
Consists of information
Refers to the method used to enter or transmit your message to a computer
Information or data retrieved or received from a computer
"Brain of the computer"
Input/Output device that reads data from and writes data to a disK
Output device that displays text and graphics on a screen
Input device used for commands and navigation
Input device with an arrangement of letters, etc.
First line of defense
An unauthorized user able to access and misuse information
A destructive program loaded onto a computer
Defamation by written or printed words or pictures
Defamation by oral utterance
A program that allows users to view web pages and online information
Sotware that has been written to detect, isolate, and destroy viruses
A web address
Any word, phrase, or picure that, when clicked, take the user to another location
Electronic mail
Playing video and sound in real time
Retrieving somehting fromt he internet and storing it on a disk drive
Using material antoher person has created and claims it as your own

IT&S Cyber Security Crossword Puzzle

IT&S Cyber Security Crossword Puzzle
Type
Crossword
Description

A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person

OPSEC is not Puzzling Crossword

OPSEC is not Puzzling Crossword
Type
Crossword
Description

What you should do to your anti-virus software on a regular basis
What you should do to all papers with PII or other sensitive information
Where you should keep your badge when off-site
An adversary is considered a _________
"Computer1234" would be a bad example of this
Actions that mitigate a threat
An option to protect your credit
What potential harm from poor OPSEC is called
What you must do to emails containing Critical Information
What a weakness in our practices or defenses is called
The type of information that OPSEC protects
The number of steps in the OPSEC process
The Freedom of Information Act is for what type of information
It is very important to use privacy settings on _______________
What you should remove each time you walk away from your NMCI computer
What you cannot take with your smartphone or camera anywhere onsite
What you should practice whenever you discuss your work with anyone
OPSEC is a _______ effort
What is the abbreviation of the list that shows the commands Critical Information
The kind of email account you can't use to conduct Government business

INFO Security Crossword

INFO Security Crossword
Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char>
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char>
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char>
any data classified as personal, private or sensitive information <4 char>
function of one way encryption that is normally used to check integrity of data <4 char>
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char>
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char>
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char>
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char>
an internet scam that targets unsuspecting users through email <8 char>
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char>
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char>
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char>
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char>
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char>
spoofing, tampering etc are examples of a security _____ <6 char>
a way of injecting malicious scripts into web pages <18 char>
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char>
this malware targets microsoft windows based system and prevents it from booting <5 char>
group of experts that handle computer security incidents

Cyber Security Awareness Crossword

Cyber Security Awareness Crossword
Type
Crossword
Description

Cyber security is a shared __________.
This is commonly assigned to bank customers for use with ATMs and for use with debit cards.
A malicious code that can infect your system.
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
You should never share your __________.
A clean desk policy is important in order to protect __________ information from being revealed.
You should _____ a device before stepping away from it.
Any data that could potentially be used to identify a particular person.
You should be careful when downloading __________ because it could be malicious.
You should _____ your administrator if an incident occurs.
For a password to be secure, it should contain upper and lower case letters, numbers, and __________.
It is important to have antivirus installed on your computer and on your _______.
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted.

Crossword - Exercise 1

Crossword - Exercise 1
Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account
An attempt by hackers to damage or destroy a computer network or system.
Someone who seeks and exploits weaknesses in a computer system or computer network.
The process of confirming the correctness of the claimed identity
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
A standalone malware computer program that replicates itself in order to spread to other computers.
Are small files that Web sites put on your computer hard disk drive when you first visit
A technology that allows us to access our files through the internet from anywhere in the world.
Appears at the beginning of the web-link of a secured website
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
A data classification mode that describes certain data or document as a secret
A government agency in Qatar that handles all reported incidents related to cyber attacks
The art of manipulating people to get access to sensitive information
A software that is a type of utility used for scanning and removing harmful software from your computer
Any software program in which advertising banners are displayed while the program is running
The use of electronic communication to bully a person
A phone call tactic in which individuals are tricked into revealing critical financial or personal information
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet.