Type
Crossword
Description

a vulnerability intentionally left in the security of a computer system or its software by its designers back door
data that has been encrypted ciphertext
looking through trash for access codes or other sensitive information dumpster diving
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users hijacking
using a password or user ID obtained in one attack to commit another attack leapfrog attack
a device that records the telephone numbers of calls received by a particular telephone pen register
a person who combines phone phreaking with computer hacking phracker
a person who hacks telephone systems, usually for the purpose of making free phone calls phreaker
slang for pirated software warez
The payload is the part of the malware program that actually executes its designed task. Payload
An individual who does not possess, or just doesn’t use, their own skills and know-how to hack or crack a computer system or network, but uses a pre-written program or piece of code, a script, to do the dirty work. While they may not possess the computing talent, they can be just as dangerous! Script Kiddie
is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network Wardriving
Parallel websites that allow children to get around filtering software and access sites that have been blocked Circumventor Sites
A hostile, strongly worded message that may contain obscene language. Flame
An attack in which an unauthorized actor, often a nation-state, employs highly sophisticated technology and/or tactics to gain and maintain surreptitious access to a network. Advanced Persistent Threat
The exploitation of computers and computer networks as a means of protest to promote political ends. Hacktivism
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax email
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes Pharming
Creates access points in a computer for a cybercriminal, so that they can enter undetected Rootkit
Making small, undetectable changes over an extended period of time Salami attack
Scam software that appears to be legitimate, to encourage download Scareware
Phishing using text messages rather than emails Smishing
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges Spoofing
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes Vishing
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website defacement
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink XXS attack
is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. Most devices on a network respond to this by sending a reply to the source IP address. This can slow down the victim’s computer to the point where it becomes impossible to work on Smurf Attack
is defined as deliberately trying to change or alter a system’s logic, data, or control information to cause the system to perform unauthorized functions or services. Tamper
is defined as any communication between a single sender and a single receiver over a network. The term exists in contradiction to multicast, communication between a single sender and multiple receivers, and any cast, communication between any sender and the nearest of a group of receivers in a network. Unicast
is marking areas, usually on sidewalks with chalk, that receive wireless signals to advertise an open Wi-Fi network. It was inspired by hobo symbols and were conceived by a group of friends in June 2002. They were publicised by Matt Jones who designed the set of icons and produced a downloadable document containing them. War Chalking
is a computer network authentication protocol and is ticket-based allowing nodes to communicate over a non-secure. Massachusetts Institute of Technology (MIT) developed to protect network services provided by the Project Athena. This protocol is based on the earlier Needham–Schroeder symmetric key protocol. These protocol messages are protected against snooping and replay attacks. Kerberos
A virus or physical device that logs information sent to a visual display to capture private or personal information. Screen scraper
Server that acts as an intermediary between users and others servers, validating user requests. Proxy server
Malware from someone who appears to be a trusted user of a site XSRF attack
Flooding a network or website or network with requests, making it impossible for legitimate users to access the site DDoS attack

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

Digital Technology Crossword

Type
Crossword
Description

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

CYBER AWARENESS CROSSWORD

Type
Crossword
Description

An agreement between two or more entities to allow access to data or information. Details the controls that are to be put in place to protect the data, including how the data will be used, stored, shared and disposed of. DAA
A cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. The algorithm is a sixteen round block cipher which uses a 64bit block and a 56bit key. DES
Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. DOS
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures the organisation is to follow in the event of a disaster. DRP
A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. (United States of America Federal.) FIPS
A message authentication code that makes use of a cryptographic key along with a hash function. HMAC
The ability of the anti-virus software to detect patterns of behavior on the machine Heuristic Scanning
A system that monitors a network for malicious activities such as security threats or policy IPS
A software update comprised code inserted (or patched) into the code of an executable program. Patch
The security-oriented probing of a computer system or network to seek out vulnerabilities Pen Test
A software program that provides cryptographic privacy and authentication for data communication. PGP
A hacker gains access to a group of computers and then uses them to carry out a variety of attacks on other computers Botnet attack
Cross-site request forgery (or “sea-surf”) attack. Malware from someone who appears to be a trusted user of a site XSRF attack
Distributed denial of service attack. Flooding a network or website or network with requests, making it impossible for legitimate users to access the site DDoS attack
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax email
Recording the keystrokes made by an authorized user Key logging
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes Pharming
Directing users to a bogus site through an email that appears legitimate; information entered on the phony site is captured for fraudulent purposes Phishing
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Making small, undetectable changes over an extended period of time; “penny shaving” is a type of salami attack Salami attack
Scam software that appears to be legitimate, to encourage download Scareware
Phishing using text messages rather than emails Smishing
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges; often used in DDoS attacks Spoofing
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes Vishing
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink XXS attack
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website defacement

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Introduction to Web Design- Crossword 1

Type
Crossword
Description

A list of websites that have been visited recently. Browser History
visual communication combinin images, words, and ideas to convey information to an audience. Graphic Design
allows user to navigate by clicking with a mouse instead of typing User Interface
a programming language used for creating web pages HTML
Specially formatted documents that can contain links, images, and other media. Readable by web browsers HTML Files
A vast computer network linking smaller computer networks worldwide Internet
two or more connected computers that share resources in a certain location Local Area Network
a set of computers which are connected to each other and operate as part of the same system, able to exchange information and messages Network
A small program that can be downloaded which allows users to enhance their browser; this allows extra activities of the web for example, the Quicktime plug-in allows visitors to watch movies and Shocwave plug-in allows users to play games. Plug In
a specialized website that allows you to search through the billions of websites on the World Wide Web to find exactly what you want. Search Engine
A list of websites where the search words are found Search Result
a computer on a network that runs specialized software and stores information in order to "serve" it to the other networked computers Server
a web page's unique address on the World Wide Web that tells the browser exactly where to find the web pages web" which emphasize machine-facilitate understanding of information which will provide a more productive and intuitive user experience. URL
Text or images on a webpage where users can click to travel to another web destination. The mouse pointer turns into a hand when you hover over a link. Web Links
A single document (which can include images, videos, charts, etc.) viewable through a web browser Web Page
a collection of webpages Website
two or more computers or LANS located apart from each other that are connected together for the purposes of sharing information Wide Area Network
the information that is found on the Internet World Wide Web

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

Cyberbullying Crossword

Type
Crossword
Description

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim