Description

An agreement between two or more entities to allow access to data or information. Details the controls that are to be put in place to protect the data, including how the data will be used, stored, shared and disposed of.
A cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. The algorithm is a sixteen round block cipher which uses a 64bit block and a 56bit key.
Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet.
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures the organisation is to follow in the event of a disaster.
A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. (United States of America Federal.)
A message authentication code that makes use of a cryptographic key along with a hash function.
The ability of the anti-virus software to detect patterns of behavior on the machine
A system that monitors a network for malicious activities such as security threats or policy
A software update comprised code inserted (or patched) into the code of an executable program.
The security-oriented probing of a computer system or network to seek out vulnerabilities
A software program that provides cryptographic privacy and authentication for data communication.
A hacker gains access to a group of computers and then uses them to carry out a variety of attacks on other computers
Cross-site request forgery (or “sea-surf”) attack. Malware from someone who appears to be a trusted user of a site
Distributed denial of service attack. Flooding a network or website or network with requests, making it impossible for legitimate users to access the site
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result
Recording the keystrokes made by an authorized user
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes
Directing users to a bogus site through an email that appears legitimate; information entered on the phony site is captured for fraudulent purposes
Restricts access to a computer; owner must pay ransom to have it removed
Making small, undetectable changes over an extended period of time; “penny shaving” is a type of salami attack
Scam software that appears to be legitimate, to encourage download
Phishing using text messages rather than emails
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges; often used in DDoS attacks
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one

Customize
Add, edit, delete clues, and customize this puzzle.

CSC Cyber Security

Crossword

CYBER-SECURITY

Crossword

I.T Wordsearch

Word Search

Technology vocab

Crossword

Computing

Crossword

Frequently Asked Questions

What is a crossword?

Crossword puzzles have been published in newspapers and other publications since 1873. They consist of a grid of squares where the player aims to write words both horizontally and vertically.

Next to the crossword will be a series of questions or clues, which relate to the various rows or lines of boxes in the crossword. The player reads the question or clue, and tries to find a word that answers the question in the same amount of letters as there are boxes in the related crossword row or line.

Some of the words will share letters, so will need to match up with each other. The words can vary in length and complexity, as can the clues.

Who is a crossword suitable for?

The fantastic thing about crosswords is, they are completely flexible for whatever age or reading level you need. You can use many words to create a complex crossword for adults, or just a couple of words for younger children.

Crosswords can use any word you like, big or small, so there are literally countless combinations that you can create for templates. It is easy to customise the template to the age or learning level of your students.

How do I create a crossword template?

For the easiest crossword templates, WordMint is the way to go!

Pre-made templates

For a quick and easy pre-made template, simply search through WordMint’s existing 500,000+ templates. With so many to choose from, you’re bound to find the right one for you!

Create your own from scratch

  • Log in to your account (it’s free to join!)
  • Head to ‘My Puzzles’
  • Click ‘Create New Puzzle’ and select ‘Crossword’
  • Select your layout, enter your title and your chosen clues and answers
  • That’s it! The template builder will create your crossword template for you and you can save it to your account, export as a word document or pdf and print!

How do I choose the clues for my crossword?

Once you’ve picked a theme, choose clues that match your students current difficulty level. For younger children, this may be as simple as a question of “What color is the sky?” with an answer of “blue”.

Are crosswords good for students?

Crosswords are a great exercise for students' problem solving and cognitive abilities. Not only do they need to solve a clue and think of the correct answer, but they also have to consider all of the other words in the crossword to make sure the words fit together.

Crosswords are great for building and using vocabulary.

If this is your first time using a crossword with your students, you could create a crossword FAQ template for them to give them the basic instructions.

Can I print my crossword template?

All of our templates can be exported into Microsoft Word to easily print, or you can save your work as a PDF to print for the entire class. Your puzzles get saved into your account for easy access and printing in the future, so you don’t need to worry about saving them at work or at home!

Can I create crosswords in other languages?

Crosswords are a fantastic resource for students learning a foreign language as they test their reading, comprehension and writing all at the same time. When learning a new language, this type of test using multiple different skills is great to solidify students' learning.

We have full support for crossword templates in languages such as Spanish, French and Japanese with diacritics including over 100,000 images, so you can create an entire crossword in your target language including all of the titles, and clues.