Type
Crossword
Description

What is it called when someone tries to get your bank details through email? Phishing
What would you use to stop viruses from harming your computer? anti-virus
What is it called when someone is being mean to you on your computer? Trolling
What do you call annoying junk mail? Spam
What do you call something that is designed to disrupt or damage your computer? Malware
Who should you talk to if someone is telling to do stuff you don't want to do? Parents
What do you do if someone is causing you grief on a social network? Report
What would name and date of birth class as? Personal information
What should you do if someone is cyber bullying you? Block
If you have an online friend, what should you not use? webcam
What should you do with all social networking accounts? Private
Never be friends with someone who's above the age of what? eighteen
What site would you report something or someone to? CEOP
What should you always keep secret? password
What should you install to keep your computer safe from hackers? Firewall
What symbol is used on a website that is secure? padlock
What do you call an online offer that is very unrealistic? Scam
What do you call software that tracks your username and password when you enter it? Spyware
When copying information or images off the internet you must check for what legal information? copyright
What shouldn't you open from people you don't know? Emails

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Internet Safety Crossword

Type
Crossword
Description

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Workplace Safety Crossword

Type
Crossword
Description

You must be 16 years old to work on a ___________ site Construction
__________ hazards are germs that come from living things Biological
Helps you learn the policies, rules, and procedures to help do your job safely Training
. Someone who works closely with you on a day-today basis and makes sure you follow safety rules Supervisor
_____________ Health and Safety Act Occupational
A biological hazard often found in hospitals Needles
Someone who helps other people and works without pay Volunteer
What you do frequently to your hands before working with food Wash
Things that should be followed in order to stay safe Rules
Minor injury that could result from picking up heavy boxes Sprain
It is your ______________ to work safely and report hazards Responsibility
Hand protection needed when working with food, chemicals, etc. Gloves
What you do when you don’t understand instructions or if you think your work is unsafe Ask
To avoid a serious shock, this should never be mixed with water Electricity
Workplace ___________ Materials Information System (WHMIS) Hazardous
Head protection Hardhat
What you wear in a science lab to protect your eyes from chemicals Goggles

Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

Digital Citizenship crossword

Type
Crossword
Description

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

E Safety Crossword

Type
Crossword
Description

You need to keep this secret and make it hard to guess password
You should never accept these from stangers friend request
Someone who hurts you feelings by sending nasty messages cyber bully
This can attack your computer virus
You should never give this out online personal information
You should never arrange to do this with people you don't know Meet up
What you should do to people who send you nasty messages Block
These are people you don't know strangers
If you see something that upsets you who should you tell? parents
You should never send this to people online picture

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Science Safety Crossword Puzzle

Type
Crossword
Description

____________ goggles protect your eyes from danger safety
what do you use on your hands for safety gloves
What should you wear on your body for safety apron
What is used to exinguish a fire fire blanket
Who should you notify if you have a safety concern teacher
What should you do if you get something in your eye Wash
What do you use if you spill chemicals on you water
You should ________ pay attention always
Instead of run, what should you do in the lab Walk
If you don't __________ to the instructions, you won't know what to do LIsten
WIth _________ cut, you should report it to your teacher any
Never ____________ chemicals Inhale
With __________ burns, immerse in water and notify the teacher minor
You should never touch or step in this is if it is broken Glass
It is not safe to try these without asking a teacher experiments
_______________ the location of safety equipment know