My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

A Spotlight on Cybersecurity

Horizontales
state-sponsored attacks against a nation's foes.
A device used to communicate between distant computers and networks using a coaxial cable.
are used to get usernames and password.
threat actors who engage in criminal activity by means of computers or the internet.
refers to different tactics used by cyber attackers to trick people into doing or providing something they want
an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are.
threat actors that use the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve ideological gains through threat or intimidation
A company providing and maintains internet connection to residential or commercial areas.
an identity and arrangement in which a person may use a computer or network services.
integrated components for collecting, storing, and processing data and for providing intelligence, knowledge, and digital products.
A computer that serves different kinds of information (data) to the users.
when the same data exists in different formats in multiple places.
an account with additional authorization beyond a regular user's account.
a device used to build a network connection between attached computers, allowing the computers to talk to each other.
software that safeguards a computer from malware that is designed to hack into devices.
Verticales
a device that allows people to connect wireless devices on a wireless LAN, to a wired network.
any information processed or stored by a computer system.
a person operating an application or information system.
an interruption in an authorized user's access to a computer network, typically one caused with malicious intent; a loss of data availability. (DOS)
Commonly known as a computer virus, malicious software is a computer code created to disrupt, disable, or take control of your computer system.
a text based interface to the underlying operating system; also referred to as the command line.
a computer designed to move data between computer networks; routers insure traffic between computers goes where it needs to go using the shortest route possible.
the action of making new or secret information known; if unauthorized disclosure occurs this is a loss of data confidentiality.
the idea of connecting ordinary things like lights, doors, and switches to a computer network to make them intelligent.
threat actor from an enterprise's own employees, contractors, or partners.
any data, device, or component such as hardware, software, or confidential information that is valuable to a person or company.
cybersecurity event that results in a loss of confidentiality, integrity, or availability.
a service that creates a safe, encrypted online connection.