Passwords Word Search

Type
Word Search
Description

This word search contains the following answers:

Strong
Complex
Remember
Guess
Information
Personal
Attacher
Malicious
Password
Awareness
Policy
Identity
Algorithm
Passphrase
Memorized
Encrypted
Access
Threats
Cybercriminal
Authentication
Username
Hackers
KeePass
Secret
Security

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

Phishing
Worm
Ransomware
Virus
Malware
Firewall
DataBreach
Exploit
IPaddress
Domain
Private
Virtual
Bitcoin
DDoS
Safety
Computer
Security
Identity Theft
Darkweb
Internet
Online
Backdoor
Hacker

    Customize    

Securing Your Devices Word Search

Type
Word Search
Description

This word search contains the following answers:

Stay Informed
Vulnerability
Cookies
Close Accounts
Privacy Settings
Encryption
Malware
Antivirus
Authentication
Biometrics
Breach
Clear Cache
Click Bait
Computer
Data
Devices
Hacking
Internet
Laptop
Malicious Actor
Managers
Mixed case letters
Multi Factor
Network Security
Numbers
Passphrase
Phishing
Phone
PUA
Ransomware
Risk
Router
Security Key
Sign Out
Social Media
Software
Special Characters
Strong Password
Tablet
Trojan Horse
Unique
Verification
Virus
VPN

    Customize    

On-Line Security Word Search

Type
Word Search
Description

This word search contains the following answers:

identity theft
key logger
firewall
digital footprint
data breach
cyber security
hacker
ransomware
attack
phishing
password
spyware
Trojan horse

    Customize    

Cyber Sercurity Word Search

Type
Word Search
Description

This word search contains the following answers:

Forged URL
Backup Files
Secure WiFi
HTTPS
Good Habits
Internal Threats
Hoaxes
Spyware
Bad Invoice
Bad Link
Bad Address
Fake Antivirus
Email Phishing
Phone Phishing
Keyloggers
Whaling
Hackers
Encrypted
Password
Mobile Security
Malware
Ransomware
Virus
Trojan
Spear Phishing
Pharming
Phishing

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Cyber Crime Word Search

Type
Word Search
Description

This word search contains the following answers:

protection
information
penetration
firewall
hoax
access
virus
blackhat
security
account
blackmail
bullying
catfish
crime
cyber
fake
hacker
internet
malware
phishing
safe
secure
stalker
strongpassword

    Customize    

Computer Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

Attachment
Spam
Email
Hacker
Bowser
Social
Password
Phishing
Firewall
Viruses
Illegal
Downloading
Internet
Software
Spyware

    Customize    

InfoSec Crossword Word Search

Type
Word Search
Description

This word search contains the following answers:

confidential
encryption
integrity
internet
malware
password
phishing
policy
proxy
ransomware
tailgating
vulnerability

    Customize    

Cyber-Security Word Search

Type
Word Search
Description

This word search contains the following answers:

cybercriminal
email
fraud
idenity theft
internet
online shopping
pharming
phishing
safety
Social Security

    Customize