Puzzles and worksheets similar to Cyber Security Word Search

Cyber Security Awareness - Phishing Word Search

Type
Word Search
Description

This word search contains the following answers:

awareness
detection
man-in-the-middle
misspellings
prevention
response
social engineering
social media
spam
spear
spoofing
targeted
url redirection
vishing
whaling

    Customize    

key words Word Search

Type
Word Search
Description

This word search contains the following answers:

Worm
Adware
spyware
trojan horse
phising
Think you know
encryption
internet safety
e-safety
Anti virus
password
Firewalls
VPN
child line
virus
spam

    Customize    

Cyber Crime Word Search

Type
Word Search
Description

This word search contains the following answers:

protection
information
penetration
firewall
hoax
access
virus
blackhat
security
account
blackmail
bullying
catfish
crime
cyber
fake
hacker
internet
malware
phishing
safe
secure
stalker
strongpassword

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

Single Sign On
encryption
ransomware
pharming
exploit
ddos attack
cyberattack
worm
vulnerability
spyware
firewall
antivirus
malware
authentication
key logger
phishing
social engineering
password

    Customize    

online fraud protection Word Search

Type
Word Search
Description

This word search contains the following answers:

cyber
trustworthy
Attackers
unauthorized
security settings
downloading
anti-virus
spyware
Fraudulent Emails
Fraudsters
credentials
prevent
Social media
account access
identity theft
operating system
wireless network
password
Rogue
Phishing

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

Phishing
Worm
Ransomware
Virus
Malware
Firewall
DataBreach
Exploit
IPaddress
Domain
Private
Virtual
Bitcoin
DDoS
Safety
Computer
Security
Identity Theft
Darkweb
Internet
Online
Backdoor
Hacker

    Customize    

Digital Citizenship Vocabulary Word Search

Type
Word Search
Description

This word search contains the following answers:

social networks
web browser
WWW
viral virus
URL
Spyware
Spam
social media
Sexting
Server
server farm
SSL
malware
identity theft
Hacked
https
http
Digital addiction
Database
Adware

    Customize    

Internet and Viruses Word Search

Type
Word Search
Description

This word search contains the following answers:

DNS
antivirus software
worm
trojan horse
boot sector virus
file virus
logic bomb
time bomb
trigger event
spyware
adware
virus
cookies
upload
download
favorites
homepage
Browser

    Customize