Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Type
Crossword
Description

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

Cyber Crime Word Search

Type
Word Search
Description

protection
information
penetration
firewall
hoax
access
virus
blackhat
security
account
blackmail
bullying
catfish
crime
cyber
fake
hacker
internet
malware
phishing
safe
secure
stalker
strongpassword

Computer Safety Word Search

Type
Word Search
Description

Attachment
Spam
Email
Hacker
Bowser
Social
Password
Phishing
Firewall
Viruses
Illegal
Downloading
Internet
Software
Spyware

Computer Crimes Word Search

Type
Word Search
Description

Firewall
Video cameras
Security guards
Biometric systems
Archiving
Locks
Passwords
Antivirus software
Encryption
Cyber crime
Illegal
Identity theft
Internet fraud
Computer fraud
Worm
Virus creation
Software piracy
Phishing
Electronic eavesdropping
Industrial espionage
Hacking
Cyber bullying
Crime
Computer

InfoSec Crossword Word Search

Type
Word Search
Description

confidential
encryption
integrity
internet
malware
password
phishing
policy
proxy
ransomware
tailgating
vulnerability

Cyber Security Word Search

Type
Word Search
Description

Phishing
Worm
Ransomware
Virus
Malware
Firewall
DataBreach
Exploit
IPaddress
Domain
Private
Virtual
Bitcoin
DDoS
Safety
Computer
Security
Identity Theft
Darkweb
Internet
Online
Backdoor
Hacker

Securing Your Devices Word Search

Type
Word Search
Description

Stay Informed
Vulnerability
Cookies
Close Accounts
Privacy Settings
Encryption
Malware
Antivirus
Authentication
Biometrics
Breach
Clear Cache
Click Bait
Computer
Data
Devices
Hacking
Internet
Laptop
Malicious Actor
Managers
Mixed case letters
Multi Factor
Network Security
Numbers
Passphrase
Phishing
Phone
PUA
Ransomware
Risk
Router
Security Key
Sign Out
Social Media
Software
Special Characters
Strong Password
Tablet
Trojan Horse
Unique
Verification
Virus
VPN

On-Line Security Word Search

Type
Word Search
Description

identity theft
key logger
firewall
digital footprint
data breach
cyber security
hacker
ransomware
attack
phishing
password
spyware
Trojan horse

Cyber-Security Word Search

Type
Word Search
Description

cybercriminal
email
fraud
idenity theft
internet
online shopping
pharming
phishing
safety
Social Security