Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Crossword Puzzle on Computer Security

Type
Crossword
Description

Approval, permission, or empowerment for someone or something to do something AUTHORIZATION
Any software program in which advertising banners are displayed while the program is running ADWARE
Sequence of eight bits OCTET
Basic communication language or "protocol" of the Internet TCP/IP
TCP/IP protocol specifying the transfer of text or binary files across the network FILE TRANSFER PROTOCOL
Encrypted form of the message being sent CIPHER TEXT
Process of confirming the correctness of the claimed identity AUTHENTICATION
Hidden, self-replicating section of computer software that inserts itself and becomes part of the another program VIRUS
Gaining unauthorized logical access to sensitive data by circumventing a system's protections PENETRATION
A type of digital currency BIT COIN
A type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
A list of entities that are blocked or denied access/privilege BLACKLIST
A list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
An unauthorized user able to access and misuse information HACKER
The pair of Username PASSWORD

TCS Big Day Tech Crosswards Crossword

Type
Crossword
Description

does not eliminate servers SERVERLESSCOMPUTING
a small program that allows a peripheral device such as a printer or scanner to connect to your PC DEVICEDRIVER
to load and initialise the operating system on a computer BOOT
a wireless communications technology intended to replace cables BLUETOOTH
Translating a source program into a machine language COMPILING
Number system used by computers. Uses sixteen digits HEXADECIMALSYSTEM
Code used for representing characters in the computer ASCII
approval, permission, or empowerment for someone or something to do something AUTHORIZATION
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQLINJECTION
pseudo IP address that always refer back to the local host and never sent out to a network LOOPBACKADDRESS
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers GATEWAY
protocol used for sending e‑mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one‑by‑one BRUTEFORCE
e‑mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website PHISHING
encrypted form of the message being sent CIPHERTEXT
hidden, self‑replicating section of computer software that inserts itself and becomes part of the another program VIRUS
security identification device like facial recognition and fingerprints BIOMETRICDEVICE
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form DIGITALFORENSICS
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next WATERFALL
What is a network security system used to stop unauthorised access called? FIREWALL

Digital Technology Crossword

Type
Crossword
Description

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

Internet Vocabulary Crossword

Type
Crossword
Description

Type of internet service that connects wirelessly through mobile phone services. 3G and 4G service
Device used to access the internet, computer, tablet, phone, or printer. Access device
Appears after the path, tells browser to load a specific part of the page usually begins with a #. Anchor
Maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. Bandwidth
Fast data transfer speeds, always connected and can transmit multiple signals simultaneously. Broadband service
A software application used to locate and display web pages. Browser
Usually identifies the organization in a URL. Domain name
(DNS) translated domain names into IP addresses. Domain server
Commercial transactions conducted electronically online. Ecommerce
Messages distributed by electronic means from one computer user to one or more recipients via a network. Email
Loads a specific page, separated by a /. File path
Acts as a host or network interface identification and location addressing. IP Address
Provides internet access, such as XFINITY. ISP
Device that enables a computer to transmit data, either hard wired or wireless, to the internet. Modem
Unit of data that is routed between an origin and destination. Packets
String of characters after the path, begins with a ? Parameters
Device that forwards data packets along networks. It is connected to at least two networks either LANs or WANs. Router
Most URLs begin with http or https. Scheme
A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. Search engine
To work from home, making use of the internet, e-mail, and the telephone. Telecommuting

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

System Software Crossword

Type
Crossword
Description

Output that is used to make changes to input or processing. Feedback
Data that is shaped into a meaningful manner and is used in decision-making. Information
Raw facts that occur in the physical environment or organisation Data
System software that helps the user in the creation, controlling development, usage and maintenance of the databases of computer systems. DBMS
Software consists of the programs for data/ information processing Software
A network that crosses metropolitan, regional or national boundaries WAN
A set of programs controlling the computer hardware and acting as an interface with the application programs. Operating System
Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing Router
A standard set of rules and procedures for the control of communications in a network. Protocol
Involves translating what a user wants to accomplish into a code that the computer can understand and execute. Programming
Converting/ transforming of data into useful outputs Processing
Hardware components that enable a computer system to communicate information to humans or other machines so that it can be used. Output Devices
Transactions that are accumulated and processed later as a group or in a batch. Batch Processing
Telecommunication device that connects one local area network to another one that uses the same telecommunications protocol. Bridge
A hidden program that inserts itself into a computer’s systems Computer Virus
Can be compared with the human brain. It obtains instructions from memory, interprets them and notifies the other components to perform them CPU
The ability to confer with a group of people simultaneously using telephone or e-mail group communication software Teleconferencing
A formal collection of people and other resources assembled together in order to establish a set of goals. Organisation
Telecommunication device that serves as an entrance to another network Gateway
Data is processed immediately after being captured OLTP

Cybersecurity Awareness Crossword

Type
Crossword
Description

A form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself Virus
The process of verifying the identity of a user authentication
A collection of computers compromised by malicious code and controlled across a network botnet
Data in its encrypted form ciphertext
The unauthorized transfer of information from a network exfiltration
Device or program that limits network traffic firewall
An unauthorized user who attempts to access an information system hacker
An unauthorized act of bypassing the security mechanisms of a network intrusion
Software that tracks keystrokes keylogger
Software that compromises the operation of a system by performing an unauthorized function malware
A string of characters used to authenticate a user password
A digital form of social engineering to deceive individuals into providing sensitive information phishing
Indiscriminately sent unsolicited bulk messages spam
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself worm

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Introduction to Web Design- Crossword 1

Type
Crossword
Description

A list of websites that have been visited recently. Browser History
visual communication combinin images, words, and ideas to convey information to an audience. Graphic Design
allows user to navigate by clicking with a mouse instead of typing User Interface
a programming language used for creating web pages HTML
Specially formatted documents that can contain links, images, and other media. Readable by web browsers HTML Files
A vast computer network linking smaller computer networks worldwide Internet
two or more connected computers that share resources in a certain location Local Area Network
a set of computers which are connected to each other and operate as part of the same system, able to exchange information and messages Network
A small program that can be downloaded which allows users to enhance their browser; this allows extra activities of the web for example, the Quicktime plug-in allows visitors to watch movies and Shocwave plug-in allows users to play games. Plug In
a specialized website that allows you to search through the billions of websites on the World Wide Web to find exactly what you want. Search Engine
A list of websites where the search words are found Search Result
a computer on a network that runs specialized software and stores information in order to "serve" it to the other networked computers Server
a web page's unique address on the World Wide Web that tells the browser exactly where to find the web pages web" which emphasize machine-facilitate understanding of information which will provide a more productive and intuitive user experience. URL
Text or images on a webpage where users can click to travel to another web destination. The mouse pointer turns into a hand when you hover over a link. Web Links
A single document (which can include images, videos, charts, etc.) viewable through a web browser Web Page
a collection of webpages Website
two or more computers or LANS located apart from each other that are connected together for the purposes of sharing information Wide Area Network
the information that is found on the Internet World Wide Web