Type
Crossword
Description

Cybercriminals rely on _______ error to gain access to systems human
Your password should be ________ characters or longer eight
If it looks suspicious, it's best to ______ it delete
Do not include _______ information in your password personal
One way to guard your device is to _____ it when not in use lock
Never ______ your password share
Use ______ passwords for your various devices different
When available, use stronger _______ for an added layer of security authentication
Substitute _____ with numbers, punctuation marks or symbols when creating your password letters
Make ______ and physical back ups of your important work electronic

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Cyber Security Awareness Crossword

Type
Crossword
Description

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

Passwords Word Search

Type
Word Search
Description

Strong
Complex
Remember
Guess
Information
Personal
Attacher
Malicious
Password
Awareness
Policy
Identity
Algorithm
Passphrase
Memorized
Encrypted
Access
Threats
Cybercriminal
Authentication
Username
Hackers
KeePass
Secret
Security

Information Security and Privacy Crossword Puzzle

Type
Crossword
Description

These need to be strong enough that others won't guess them Passwords
Keep it _________ and Secure Safe
When clicking on a suspicious link in an email you could be caught ____________ phishing
If you suspect a privacy or security breach, you must report it ______________ Immediately
This type of agreement is needed when a vendor needs to access PHI to do work on our behalf Business Associate
This is used to access Partners information remotely VPN
Privacy and Security Regulations HIPAA
Before stepping away from your computer, always click on the yellow ___________ so no one else can access your information Lock
Report a lost device immediately by contacting the Service Desk
When this is installed on your computer, it can lead to spreading a virus across the network Malware
When travelling with a laptop in your vehicle, always keep it in the ___________ Trunk
Where not to keep your laptop or other work information when travelling in a car seat
Name of the repository for Partners Policies Archer
What is the name of the Partners Chief Information Security and Privacy Officer? Jigar Kadakia
Even accessing patient _________ in Epic, without a business need to know is a violation of policy demographic information

Cybersecurity Basics Crossword

Type
Crossword
Description

If you receive a suspicious email that you believe to be a phishing attempt, report it to _______@cfpb..gov SUSPECT
______ uses cell phone text messages to induce people to divulge their personal information. SMSHING
A ______ is intentional deception made for personal gain or to damage an individual through email. SPOOFING
Email __________ is the creation of email messages with a forged sender address. SPAM
Unauthorized and/or unsolicited electronic mass mailings. SPAM
The CIA _____________ is a model designed to guide policies for information security within an organization. CIA stands for confidentiality, integrity, and availability. TRIAD
_______is a form of criminal phone fraud, using social engineering over a telephone system to gain access to private, personal, and financial information to steal identities, money, or access. VISHING
_____ is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. PHISHING
The use of technology to promote a political agenda or a social change. HACKTIVISM
Users should take appropriate steps to __________________ their access credentials (i.e. passwords, badges, tokens, etc.) against loss, theft, or unauthorized or improper disclosure. SAFEGUARD
Involves creating written or generated codes that allow information to be kept secret. CRYPTOGRAPHY
______ or Multi Factor Authentication is an authentication method in which a user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA
_____________ is a type of malware that threatens to publish data or perpetually block access to it unless a ransom is paid. RANSOMWARE
Credential ________________ attacks do not attempt to brute force or guess any passwords - the attacker simply automates the logins for thousands to millions of previously discovered credential pairs using standard web automation tools. STUFFING
An ______ is a formal declaration by a Designated Approving Authority (DAA) that authorizes operation of a Business Product and explicitly accepts the risk to agency operations. ATO
Users must physically _______________ CFPB information resources when left unattended. Recommended precations include, but are not limited to, placing sensitive information or devices that contain such information in a locked case, desk drawer, office, or a locked automobile trunk, or securing laptops to a fixed object with a locked cable. PROTECT
Password ______ is an attack that attempts to access a large number of accounts with a few commonly used passwords. SPRAYING

Computer Safety Crossword

Type
Crossword
Description

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

technology Crossword

Type
Crossword
Description

company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email

Crossword - Exercise 1

Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
An attempt by hackers to damage or destroy a computer network or system. Attack
Someone who seeks and exploits weaknesses in a computer system or computer network. Hacker
The process of confirming the correctness of the claimed identity Authentication
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website Phishing
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Security
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
Are small files that Web sites put on your computer hard disk drive when you first visit Cookies
A technology that allows us to access our files through the internet from anywhere in the world. Cloud
Appears at the beginning of the web-link of a secured website HTTPS
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A data classification mode that describes certain data or document as a secret Reporting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
The art of manipulating people to get access to sensitive information Social Engineering
A software that is a type of utility used for scanning and removing harmful software from your computer Antivirus
Any software program in which advertising banners are displayed while the program is running Adware
The use of electronic communication to bully a person Cyberbullying
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots