Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

TCS Big Day Tech Crosswards Crossword

Type
Crossword
Description

does not eliminate servers SERVERLESSCOMPUTING
a small program that allows a peripheral device such as a printer or scanner to connect to your PC DEVICEDRIVER
to load and initialise the operating system on a computer BOOT
a wireless communications technology intended to replace cables BLUETOOTH
Translating a source program into a machine language COMPILING
Number system used by computers. Uses sixteen digits HEXADECIMALSYSTEM
Code used for representing characters in the computer ASCII
approval, permission, or empowerment for someone or something to do something AUTHORIZATION
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQLINJECTION
pseudo IP address that always refer back to the local host and never sent out to a network LOOPBACKADDRESS
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers GATEWAY
protocol used for sending e‑mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one‑by‑one BRUTEFORCE
e‑mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website PHISHING
encrypted form of the message being sent CIPHERTEXT
hidden, self‑replicating section of computer software that inserts itself and becomes part of the another program VIRUS
security identification device like facial recognition and fingerprints BIOMETRICDEVICE
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form DIGITALFORENSICS
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next WATERFALL
What is a network security system used to stop unauthorised access called? FIREWALL

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Crossword Puzzle on Computer Security

Type
Crossword
Description

Approval, permission, or empowerment for someone or something to do something AUTHORIZATION
Any software program in which advertising banners are displayed while the program is running ADWARE
Sequence of eight bits OCTET
Basic communication language or "protocol" of the Internet TCP/IP
TCP/IP protocol specifying the transfer of text or binary files across the network FILE TRANSFER PROTOCOL
Encrypted form of the message being sent CIPHER TEXT
Process of confirming the correctness of the claimed identity AUTHENTICATION
Hidden, self-replicating section of computer software that inserts itself and becomes part of the another program VIRUS
Gaining unauthorized logical access to sensitive data by circumventing a system's protections PENETRATION
A type of digital currency BIT COIN
A type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
A list of entities that are blocked or denied access/privilege BLACKLIST
A list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
An unauthorized user able to access and misuse information HACKER
The pair of Username PASSWORD

Digital Technology Crossword

Type
Crossword
Description

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

Internet Vocabulary Crossword

Type
Crossword
Description

Type of internet service that connects wirelessly through mobile phone services. 3G and 4G service
Device used to access the internet, computer, tablet, phone, or printer. Access device
Appears after the path, tells browser to load a specific part of the page usually begins with a #. Anchor
Maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. Bandwidth
Fast data transfer speeds, always connected and can transmit multiple signals simultaneously. Broadband service
A software application used to locate and display web pages. Browser
Usually identifies the organization in a URL. Domain name
(DNS) translated domain names into IP addresses. Domain server
Commercial transactions conducted electronically online. Ecommerce
Messages distributed by electronic means from one computer user to one or more recipients via a network. Email
Loads a specific page, separated by a /. File path
Acts as a host or network interface identification and location addressing. IP Address
Provides internet access, such as XFINITY. ISP
Device that enables a computer to transmit data, either hard wired or wireless, to the internet. Modem
Unit of data that is routed between an origin and destination. Packets
String of characters after the path, begins with a ? Parameters
Device that forwards data packets along networks. It is connected to at least two networks either LANs or WANs. Router
Most URLs begin with http or https. Scheme
A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. Search engine
To work from home, making use of the internet, e-mail, and the telephone. Telecommuting

Crossword - Exercise 1

Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
An attempt by hackers to damage or destroy a computer network or system. Attack
Someone who seeks and exploits weaknesses in a computer system or computer network. Hacker
The process of confirming the correctness of the claimed identity Authentication
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website Phishing
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Security
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
Are small files that Web sites put on your computer hard disk drive when you first visit Cookies
A technology that allows us to access our files through the internet from anywhere in the world. Cloud
Appears at the beginning of the web-link of a secured website HTTPS
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A data classification mode that describes certain data or document as a secret Reporting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
The art of manipulating people to get access to sensitive information Social Engineering
A software that is a type of utility used for scanning and removing harmful software from your computer Antivirus
Any software program in which advertising banners are displayed while the program is running Adware
The use of electronic communication to bully a person Cyberbullying
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

System Software Crossword

Type
Crossword
Description

Output that is used to make changes to input or processing. Feedback
Data that is shaped into a meaningful manner and is used in decision-making. Information
Raw facts that occur in the physical environment or organisation Data
System software that helps the user in the creation, controlling development, usage and maintenance of the databases of computer systems. DBMS
Software consists of the programs for data/ information processing Software
A network that crosses metropolitan, regional or national boundaries WAN
A set of programs controlling the computer hardware and acting as an interface with the application programs. Operating System
Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing Router
A standard set of rules and procedures for the control of communications in a network. Protocol
Involves translating what a user wants to accomplish into a code that the computer can understand and execute. Programming
Converting/ transforming of data into useful outputs Processing
Hardware components that enable a computer system to communicate information to humans or other machines so that it can be used. Output Devices
Transactions that are accumulated and processed later as a group or in a batch. Batch Processing
Telecommunication device that connects one local area network to another one that uses the same telecommunications protocol. Bridge
A hidden program that inserts itself into a computer’s systems Computer Virus
Can be compared with the human brain. It obtains instructions from memory, interprets them and notifies the other components to perform them CPU
The ability to confer with a group of people simultaneously using telephone or e-mail group communication software Teleconferencing
A formal collection of people and other resources assembled together in order to establish a set of goals. Organisation
Telecommunication device that serves as an entrance to another network Gateway
Data is processed immediately after being captured OLTP

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable