Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

OPSEC Word Search

Type
Word Search
Description

This word search contains the following answers:

DRAGON
PURPLE
OSINT
VULNERABILITY
FOUO
INDICATOR
PROTECT
COUNTERMEASURES
THREAT
PRIVACY ACT
ADVERSARY
ENCRYPTION
HUMINT
ESSENTIAL SECRECY
RISK
SHRED
CIL
OPSEC

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

HIPAA Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY

    Customize    

Workplace Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

You must be 16 years old to work on a ___________ site Construction
__________ hazards are germs that come from living things Biological
Helps you learn the policies, rules, and procedures to help do your job safely Training
. Someone who works closely with you on a day-today basis and makes sure you follow safety rules Supervisor
_____________ Health and Safety Act Occupational
A biological hazard often found in hospitals Needles
Someone who helps other people and works without pay Volunteer
What you do frequently to your hands before working with food Wash
Things that should be followed in order to stay safe Rules
Minor injury that could result from picking up heavy boxes Sprain
It is your ______________ to work safely and report hazards Responsibility
Hand protection needed when working with food, chemicals, etc. Gloves
What you do when you don’t understand instructions or if you think your work is unsafe Ask
To avoid a serious shock, this should never be mixed with water Electricity
Workplace ___________ Materials Information System (WHMIS) Hazardous
Head protection Hardhat
What you wear in a science lab to protect your eyes from chemicals Goggles

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Cyber Security Awareness Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

    Customize    

Science Safety Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

____________ goggles protect your eyes from danger safety
what do you use on your hands for safety gloves
What should you wear on your body for safety apron
What is used to exinguish a fire fire blanket
Who should you notify if you have a safety concern teacher
What should you do if you get something in your eye Wash
What do you use if you spill chemicals on you water
You should ________ pay attention always
Instead of run, what should you do in the lab Walk
If you don't __________ to the instructions, you won't know what to do LIsten
WIth _________ cut, you should report it to your teacher any
Never ____________ chemicals Inhale
With __________ burns, immerse in water and notify the teacher minor
You should never touch or step in this is if it is broken Glass
It is not safe to try these without asking a teacher experiments
_______________ the location of safety equipment know

    Customize    

First Aid - CPR Review Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Law that protects people who give care without anything in return goodsamaritan
A person is responsive and showing signs of a life-threatening condition but refuses care; what should you do? call
The steps to follow in an emergency checkcallcare
How do you know an emergency may be occuring? senses
Which bodily substance isolation practice includes barrier items like gloves? PPE
How many seconds should your check a person for breathing? ten
M represents what part when using the SAMPLE acronym medications
What is the acronym that identifies a life-threatening condition CABC
How do you open an airway? headtiltchinlift
How do you check for consciousness? tapandshout
What are the three Cs for treating burns ceasecoolcover
What skill should you apply to a victim showing no obvious signs of life? CPR
A person just involved in a tramatic situation may begin to display signs of what condition? shock
A person experiencing a lack of blood flow to the brain is a symptom of what condition? stroke
What acronym should you consider when evaluating for a brain attack? fast
What condition is a severe alleric reaction known as? anaphylaxis

    Customize    

Cybersecurity Awareness Month Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

Forged emails from "Kristof" Emailspoofing
Harbor's password management system Lastpass
A form of social engineering in which an individual lies to obtain private information Pretexting
Think before you _____. Click
A software band-aide Update
Techniques that show superior results Bestpractices
A common form of criminally fraudulent social engineering experienced by Harbor Phishing
Practice of examining large databases in order to generate new information Datamining
Taking someone else's PII to establish false credentials and commit fraud Identitytheft
Harbor's VPN GlobalProtect
Something to be skeptical of in emails Links
The focus of the Information Security Working Group InformationSecurity
How Ralph breaks the internet Virus
Inbox for reporting suspicious emails ITService
To convert information using unreadable code to prevent unauthorized access Encrypt
Who bears responsibility for data security? Everyone
A vulnerable Harbor issued device Smartphone

    Customize    

COMPUTER PARTS Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

WHAT IS THE SCREEN OF A COMPUTER CALLED MONITOR
WHAT DO YOU TYPE ON TO MAKE WORDS APPEAR ON THE MONITOR KEYBOARD
WHAT DO YOU USE TO NAVIGATE AROUND YOUR COMPUTER MOUSE
WHAT DEVICE ALLOWS YOU TO MAKE A PAPER COPY OF THE INFORMATION ON YOUR COMPUTER PRINTER
WHAT DEVICE MAKES SOUND FROM YOUR COMPUTER AUDIBLE SPEAKER
WHAT IS A SET OF FACTS OR FIGURES SYSTEMATICALLY DISPLAYED, ESPECIALLY IN COLUMNS TABLE
WHAT PART OF A COMPUTER EXECUTES ALL GIVEN COMMANDS CPU
WHAT IS THE MOST PRIMARY PART OF A COMPUTER MOTHERBOARD
WHAT ALLOWS YOU TO TYPE ON THE KEYBOARD KEYS
WHERE ARE THE IMAGES YOU CHOOSE, OR WANT TO SEE, DISPLAYED SCREEN
WHAT TOOL(s) COMPRISES A COMPUTER SYSTEM HARDWARE
WHAT CATEGORY DOES GOOGLE FALL INTO BROWSER
WHAT ORGANIZES ALL OF YOUR COMPUTERS INFORMATION FOLDERS
WHAT CATEGORY DO COMMENTS/ OPINIONS FALL UNDER NOTES
WHAT REPRESENTS A COMMAND ON YOUR DEVICE ICON
WHAT WORD DESCRIBES RESTARTING YOUR DEVICE REBOOT
WHAT ITEM IS ESSENTIAL FOR CONNECTING EXTERNAL DEVICES TO YOUR COMPUTER USB
WHAT CIRCULAR DISK HOLDS LARGE AMOUNTS OF DATA DVD
WHAT WORD DESCRIBES HOW YOU WOULD ELECTRONICALLY RETREIVE DATA SEARCH

    Customize