Puzzles and worksheets similar to Cyber Security Word Search

Cyber Crime Word Search

Type
Word Search
Description

This word search contains the following answers:

protection
information
penetration
firewall
hoax
access
virus
blackhat
security
account
blackmail
bullying
catfish
crime
cyber
fake
hacker
internet
malware
phishing
safe
secure
stalker
strongpassword

    Customize    

Cyber Security Awareness - Phishing Word Search

Type
Word Search
Description

This word search contains the following answers:

awareness
detection
man-in-the-middle
misspellings
prevention
response
social engineering
social media
spam
spear
spoofing
targeted
url redirection
vishing
whaling

    Customize    

computer safety Word Search

Type
Word Search
Description

This word search contains the following answers:

google crome
google
microsoft
windows 7
Anti-virus software
computer
computer safety
encryption
firewall
gigabytes
Hacking
hardwere
motherbord
passwords
Phishing
processor
safety
secure passwords
Spyware
username
Worm

    Customize    

Cyber Security Knowledge Word Search

Type
Word Search
Description

This word search contains the following answers:

SPOOF
HACKER
SPYWARE
DARK WEB
FIREWALL
ADWARE
VPN
VIRUS
CLOUD
BREACH
EXPLOIT
VULNERABILITIES
PATCHING
CEO FRAUD
RANSOMWARE
MALWARE
PHISHING
SOCIAL ENGINEERING

    Customize    

Computer Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

Attachment
Spam
Email
Hacker
Bowser
Social
Password
Phishing
Firewall
Viruses
Illegal
Downloading
Internet
Software
Spyware

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

System security & malware Word Search

Type
Word Search
Description

This word search contains the following answers:

Levels of access
anti spyware
anti virus
brute force
encryption
firewall
key logger
malware
security
spyware
sql injections
strong passwords
Trojan
viruses
worms

    Customize    

Computer Terminology Word Search

Type
Word Search
Description

This word search contains the following answers:

zip
viral
read-only
resolution
protocol
processor
operating system
online
megahertz
megabyte
java
jpeg
gateway
encryption
cybersecurity
cybercrime
content
cookie
chip
computing
cache
bandwidth
browser
compatible
Bluetooth
attachment
analog
broadband
spam
firewall
reboot
bytes
bits
malware
worm
trojan
spyware
disk space
virus
memory

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

Single Sign On
encryption
ransomware
pharming
exploit
ddos attack
cyberattack
worm
vulnerability
spyware
firewall
antivirus
malware
authentication
key logger
phishing
social engineering
password

    Customize