Cyber Security Word Search
Type
Word Search
Description

fraud training
responsibility
cybersecurity
confidential
cybercrime
encryption
ransomware
passwords
firewall
internet
hackers
monitor
network
privacy
protect
breach
logout
report
safety
secure
threat
email
scams
theft

Security Awareness Word Scramble

Security Awareness Word Scramble
Type
Word Scramble
Description

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out

Cyber Security Awareness Word Search

Cyber Security Awareness Word Search
Type
Word Search
Description

CONFIDENTIALITY
AUTHENTICATION
AUTHORIZATION
VULNERABILITY
CRYPTOGRAPHY
AVAILABILITY
CONTAINMENT
CERTIFICATE
DECRYPTION
COMPLIANCE
BIOMETRICS
HARVESTING
RANSOMWARE
ENCRYPTION
FORENSICS
BEHAVIOUR
KEYLOGGER
INTEGRITY
AWARENESS
SPOOFING
INTERNET
HONEYPOT
BACKDOOR
USERNAME
MALEWARE
FIREWALL
PASSWORD
SECURITY
PHISHING
HASHING
EXPLOIT
CONTROL
MONITOR
NETWORK
SPYWARE
PRIVACY
CIPHER
VECTOR
ADWARE
POLICY
TROJAN
THREAT
BOTNET
ATTACK
BREACH
HACKER
HTTPS
EMAIL
AUDIT
ASSET
CLOUD
VIRUS
CODE
WORM
WIFI
FTP

National Cyber Security Awareness Month (NCSAM) Word Search

National Cyber Security Awareness Month (NCSAM) Word Search
Type
Word Search
Description

password manager
internet safety
identity theft
data breach
passphrase
open wi-fi
encryption
ransomware
scareware
skimmers
phishing
spyware
malware
hacker
virus

Cyber Security Word Search

Cyber Security Word Search
Type
Word Search
Description

authentication
vulnerability
information
encryption
protection
ransomware
firewall
identity
internet
password
phishing
malware
network
privacy
spyware
access
attack
backup
hacker
online
threat
update
crime
virus
data
spam
wifi

Cyber Security Word Search

Cyber Security Word Search
Type
Word Search
Description

cybersquatting
encryption
firewalls
bookmarks
Antivirus
identity
spoofing
Provider
phishing
internet
griefing
spyware
malware
service
Cookies
online
fraud
cache
theft
scam
data

Information Security Game Word Search

Information Security Game Word Search
Type
Word Search
Description

social engineer
authentication
responsibility
access badge
confidential
phone fraud
encryption
awareness
copyright
policies
security
password
tailgate
internet
firewall
account
secured
protect
privacy
logout
piracy
backup
login
theft
virus
email
spam
hoax
surf
key

Cyber-Security Word Search

Cyber-Security Word Search
Type
Word Search
Description

online shopping
Social Security
cybercriminal
idenity theft
internet
pharming
phishing
safety
email
fraud

Fraud Watch Network Word Search

Fraud Watch Network Word Search
Type
Word Search
Description

Social Security
Cyber Security
identity theft
Credit Report
Intimidation
Credibility
Anti-virus
Con Artist
Safeguard
Firewalls
Profiling
Scarcity
Watchdog
Phishing
Imposter
Hackers
Crime
scams
Fraud
AARP

Cyber Security Word Search

Cyber Security  Word Search
Type
Word Search
Description

steganography
click-jacking
Cyber Crime
hacktivism
encryption
spoofing
sniffing
phishing
firewall
security
spyware
zombie
domain
adware
virus
spam
worm
ISP

IT&S Cyber Security Crossword Puzzle

IT&S Cyber Security Crossword Puzzle
Type
Crossword
Description

A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person