Cyber Security Word Search

Type: Word Search

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Similar Puzzles and Bingo Cards

National Cyber Security Awareness Month (NCSAM) Word Search

Type
Word Search
Description

passphrase
open wi-fi
encryption
spyware
scareware
skimmers
hacker
password manager
internet safety
ransomware
virus
malware
phishing
identity theft
data breach

Cyber Security Word Search

Type
Word Search
Description

zombie
hacktivism
spam
worm
spoofing
spyware
steganography
sniffing
phishing
ISP
firewall
encryption
domain
virus
click-jacking
adware
security
Cyber Crime

Technology Bingo Cards

Type
Bingo Cards
Description

Trojan Horse
public domain
plagiarism
spam
cookies
spyware
identity theft
computer ethics
copyright
spoofing
phishing
restore
encryption
license agreement
backup
adware
firewall
piracy
cyber crime
hacker
antivirus software
worm
rogue security software
rootkit

    Customize    

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

online fraud protection Word Search

Type
Word Search
Description

cyber
trustworthy
Attackers
unauthorized
security settings
downloading
anti-virus
spyware
Fraudulent Emails
Fraudsters
credentials
prevent
Social media
account access
identity theft
operating system
wireless network
password
Rogue
Phishing

Cyber Security Word Search

Type
Word Search
Description

access
attack
authentication
backup
crime
data
encryption
firewall
hacker
identity
information
internet
malware
network
online
password
phishing
privacy
protection
ransomware
spam
spyware
threat
update
virus
vulnerability
wifi

Computer Crimes Word Search

Type
Word Search
Description

Firewall
Video cameras
Security guards
Biometric systems
Archiving
Locks
Passwords
Antivirus software
Encryption
Cyber crime
Illegal
Identity theft
Internet fraud
Computer fraud
Worm
Virus creation
Software piracy
Phishing
Electronic eavesdropping
Industrial espionage
Hacking
Cyber bullying
Crime
Computer

Cyber-Security Word Search

Type
Word Search
Description

cybercriminal
email
fraud
idenity theft
internet
online shopping
pharming
phishing
safety
Social Security

Fraud Watch Network Word Search

Type
Word Search
Description

AARP
Safeguard
Hackers
Firewalls
Anti-virus
Crime
Cyber Security
Intimidation
Credibility
Scarcity
Profiling
Social Security
Credit Report
Con Artist
Watchdog
Phishing
Imposter
scams
identity theft
Fraud

Digital Citizenship Terms Word Search

Type
Word Search
Description

google
communication
software
hardware
vulnerable
plagiarism
firewall
identity
citation
digital footprint
scheme
scam
persistent
identity theft
social media
website
phishing
deceiving
malware
internet
flaming
anonymous
cyberbullying
bias
defaming
harassing
digital citizenship