Puzzles and worksheets similar to I.T.WordSearch

I.T Wordsearch

Type
Word Search
Description

Cyber Security
Cyber attack
Data privacy
Exploitation
Unauthorised
Information
Ransomeware
Authorised
Chromebook
Computer
Internet
Networks
Password
Phishing
Security
Services
Figures
Malware
Offence
Scammer
Spyware
Violate
Viruses
Adware
Coding
Hacker
Laptop
Trojan
Crime
Cyber
Error
Phone
Worms
Data
Info
Scam
User
ICT

Cyber Awareness Month Crossword

Type
Crossword
Description

Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks

CYBER-SECURITY Crossword

CYBER-SECURITY Crossword
Type
Crossword
Description

E-mail name based on discusting meat product
Best method to address unwanted links and emails
Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cybercrime.
A Virus that encrypts your data and you have to pay to receive the encryption key.
E-mail address to report Cyber-Security concerns
(TWO WORDS) What are rapid and regular network patching, internal firewalls, backups secured off-line, and dual factor authentication a part of?
The technique of sneeking in a security door behind someone who is authorized (Name also used to describe what is done before football games in the parking lot).
(TWO WORDS) When someone uses your personal informaton to obtain gain.
Hardware or software used in an attempt to block cyber attacks (word also used in fire prevention).
(TWO WORDS) A program that surfs the web has artificial intelligence to hack networks
New upgrade for KRGC that allows for users to use any Wi-Fi and any safe website as it encrypts user activity and keeps activity behind a cloud.
Meaning of first "O" in acronym OODA
Meaning of second "O" in acronym OODA
Meaning of "D" in acronym OODA
Meaning of "A" in acronym OODA
Malware that replicates rapidly to slow a system down to make it crash
(TWO WORDS) What you should do if you see ANY anomaly

Cyber Security Awareness Word Search

Cyber Security Awareness Word Search
Type
Word Search
Description

CONFIDENTIALITY
AUTHENTICATION
AUTHORIZATION
VULNERABILITY
CRYPTOGRAPHY
AVAILABILITY
CONTAINMENT
CERTIFICATE
DECRYPTION
COMPLIANCE
BIOMETRICS
HARVESTING
RANSOMWARE
ENCRYPTION
FORENSICS
BEHAVIOUR
KEYLOGGER
INTEGRITY
AWARENESS
SPOOFING
INTERNET
HONEYPOT
BACKDOOR
USERNAME
MALEWARE
FIREWALL
PASSWORD
SECURITY
PHISHING
HASHING
EXPLOIT
CONTROL
MONITOR
NETWORK
SPYWARE
PRIVACY
CIPHER
VECTOR
ADWARE
POLICY
TROJAN
THREAT
BOTNET
ATTACK
BREACH
HACKER
HTTPS
EMAIL
AUDIT
ASSET
CLOUD
VIRUS
CODE
WORM
WIFI
FTP

Cybertitans Word Search

Type
Word Search
Description

forensic questions
prohibited files
password length
command prompt
administrator
packet tracer
smartie fight
user auditing
cybertitans
semi finals
powershell
the office
alexander
automatic
wireshark
firewall
terminal
account
binbash
malware
spyware
updates
windows
brenna
server
ubuntu
cisco
lydia
moana
tariq
sudo
ben
mp3

ransomware Word Search

ransomware Word Search
Type
Word Search
Description

social engineer
online safety
ransomware
antivirus
keylogger
firewall
computer
password
security
Phishing
spyware
malware
Hacking
adware
cyber
virus
scam
worm

Cyber Security Word Search

Cyber Security Word Search
Type
Word Search
Description

authentication
vulnerability
information
encryption
protection
ransomware
firewall
identity
internet
password
phishing
malware
network
privacy
spyware
access
attack
backup
hacker
online
threat
update
crime
virus
data
spam
wifi

Cyber Security Terms Word Search

Cyber Security Terms Word Search
Type
Word Search
Description

Virtual Private Network
Ethical Hacking
Computer Crime
Incognito Mode
Clickjacking
Trojan Horse
Pen Testing
Encryption
Ransomware
IP Address
Antivirus
Cloaking
Phishing
Firewall
Software
Darknet
Network
Malware
Exploit
Adware
Botnet
Breach
Domain
Fraud
HTTPS
Virus
Cloud
BYOD
DDoS
Worm

Distributed System Crossword

Distributed System Crossword
Type
Crossword
Description

encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified

Systems Security Bingo Cards

Systems Security Bingo Cards
Type
Bingo Cards
Description

Virus
Worm
Trojan
Spyware
Adware
Pharming
Shouldering
Phishing
Blagging
Data Interception & Theft
SQL Injection
Brute Force
DDOS
Anti-malware software
Firewall
Network Policy
Password
Encryption
Access levels

    Customize