Type
Crossword
Description

This crossword contains the following questions and answers:

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

INFO Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

Job Interview Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Document used to present a person's education and skills resume
paper sent in with a resume with additional information Cover Letter
a conversation where questions are asked and answers are given interview
outward behavior demeanor
appropriate attire for an interview suit
what a person does to get ready for a successful interview preparation
a very important factor in giving a first impression appearance
how many pages your cover letter should have one
something that should be included in your resume education
the principle that hard work is held in high regard work ethic
gather information about the company you're interviewing with research
the first way an employer sees you, it's a very important factor first impression

Cybersecurity Awareness Month Week 2 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Cybercriminals rely on _______ error to gain access to systems human
Your password should be ________ characters or longer eight
If it looks suspicious, it's best to ______ it delete
Do not include _______ information in your password personal
One way to guard your device is to _____ it when not in use lock
Never ______ your password share
Use ______ passwords for your various devices different
When available, use stronger _______ for an added layer of security authentication
Substitute _____ with numbers, punctuation marks or symbols when creating your password letters
Make ______ and physical back ups of your important work electronic

HIPAA Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY

Identity Theft Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of... Personal Information
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen. Identity
________ _________ and alerts can help to prevent mail theft. Electronic Statements
________ all unnecessary paperwork. DO NOT throw it in the garbage can. Shred
Do not leave wallets and purses in your _____. car
To protect yourself from online theft, use ________ internet sites. secure
If you become a victim of fraud, file a police report with your ______ jurisdiction. local
To protect members from Identity Theft, talk to them about _________ _______ of fraud. warning signs
Protect member's information by ___________ ID. verifying
Be cautious with use of your ____. SSN
A thief can use your identity by using your _______ card and/or ATM card to drain your funds. credit
A thief can use your identity to create ___________ ________ made with your account information on them. counterfeit checks
A thief may ______ benefits under your name. claim
To help protect yourself, ______ your credit report yearly. check
To prevent theft, do not write important ___________ down and keep it in an easily accessible. information
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards. card
______ ______ is when a person obtains and uses your personal information without your permission for financial gain. Identity theft
America First strives to keep its ________ safe by informing them of possible risks. members
If you obtain a stolen ID from a fraudulent member, do not give the ID ______. back
Always follow __________ procedures. security

Workplace Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

You must be 16 years old to work on a ___________ site Construction
__________ hazards are germs that come from living things Biological
Helps you learn the policies, rules, and procedures to help do your job safely Training
. Someone who works closely with you on a day-today basis and makes sure you follow safety rules Supervisor
_____________ Health and Safety Act Occupational
A biological hazard often found in hospitals Needles
Someone who helps other people and works without pay Volunteer
What you do frequently to your hands before working with food Wash
Things that should be followed in order to stay safe Rules
Minor injury that could result from picking up heavy boxes Sprain
It is your ______________ to work safely and report hazards Responsibility
Hand protection needed when working with food, chemicals, etc. Gloves
What you do when you don’t understand instructions or if you think your work is unsafe Ask
To avoid a serious shock, this should never be mixed with water Electricity
Workplace ___________ Materials Information System (WHMIS) Hazardous
Head protection Hardhat
What you wear in a science lab to protect your eyes from chemicals Goggles