Type
Word Search
Description

This word search contains the following answers:

awareness
detection
man-in-the-middle
misspellings
prevention
response
social engineering
social media
spam
spear
spoofing
targeted
url redirection
vishing
whaling

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

zombie
hacktivism
spam
worm
spoofing
spyware
steganography
sniffing
phishing
ISP
firewall
encryption
domain
virus
click-jacking
adware
security
Cyber Crime

    Customize    

online fraud protection Word Search

Type
Word Search
Description

This word search contains the following answers:

cyber
trustworthy
Attackers
unauthorized
security settings
downloading
anti-virus
spyware
Fraudulent Emails
Fraudsters
credentials
prevent
Social media
account access
identity theft
operating system
wireless network
password
Rogue
Phishing

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

phishing
viruses
spam
griefer
cyber bullying
identity theft
filtering
bookmark
malicious code
file sharing
chat rooms
instant messaging
cyber security

    Customize    

Cyber Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

    Customize    

2018 Goodwill Security Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

vulnerability
intrusion
keylogger
backup
shred
spam
malicious
password
awareness
whaling
spyware
internet
hacker
firewall
cybersecurity
antivirus
encryption
email
spoofing
security
Goodwill
ransomware
phishing
virus

    Customize    

Cyber-Security Word Search

Type
Word Search
Description

This word search contains the following answers:

cybercriminal
email
fraud
idenity theft
internet
online shopping
pharming
phishing
safety
Social Security

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize    

Cyber Sercurity Word Search

Type
Word Search
Description

This word search contains the following answers:

Forged URL
Backup Files
Secure WiFi
HTTPS
Good Habits
Internal Threats
Hoaxes
Spyware
Bad Invoice
Bad Link
Bad Address
Fake Antivirus
Email Phishing
Phone Phishing
Keyloggers
Whaling
Hackers
Encrypted
Password
Mobile Security
Malware
Ransomware
Virus
Trojan
Spear Phishing
Pharming
Phishing

    Customize    

Technology Bingo Cards

Type
Bingo Cards
Description

These bingo cards contain the following answers:

Trojan Horse
public domain
plagiarism
spam
cookies
spyware
identity theft
computer ethics
copyright
spoofing
phishing
restore
encryption
license agreement
backup
adware
firewall
piracy
cyber crime
hacker
antivirus software
worm
rogue security software
rootkit

    Customize    

Security Word Scramble

Type
Word Scramble
Description

this word scramble contains the following answers:

phishing
ransomware
data breach
cybersecurity
websense
security awareness
employee ID
spam
mail-abuse@noridian.com
encryption
piggybacking
suspicious link
password
security badge
Social engineering

    Customize