My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity Awareness Month Crossword Puzzle

Horizontales
A challenge-response test used to determine whether the user is a human or a computer program
Right to keep personal information confidential
Self-replicating malware that spreads on its own
Using technology to harass/intimidate someone
Fraudulent scheme to trick victims
Laptop, desktop or mobile device on a network
Information security triad
Previously unknown vulnerability or threat
Using 2+ methods to verify identity
Using physical characteristics for identification
Restricting data access to authorized users only
Software update to fix bugs and security flaws
Attack trying to overload systems and disrupt connectivity
Publicly revealing someone's personal information
Unauthorized access and theft of sensitive data
Software that displays unwanted ads
Authorized test to find security weaknesses
Virtual private network for secure remote access
A person who gains unauthorized access to computer systems or networks.
Understanding cyber risks and best practices
Accuracy and completeness of data
Verticales
Restoring systems after damage/failure
Malware disguised as legitimate software
Network of infected devices controlled by hackers
Malware that infects and spreads by replicating
Facility to monitor and defend against cyber threats
A digital form of currency that uses cryptography to secure its transactions
The right to keep personal information confidential
Irrelevant or unsolicited bulk messages
The process of verifying the identity of a user.
Meeting laws, regulations and standards
Property of data being accessible when needed
Creating fake URLs that look real to access accounts
Criminal activity involving computers/internet
Process of encoding data to prevent unauthorized access
Secret sequence of characters for authentication
Creating a false identity online to trick someone
Program that tracks keystrokes
Malware that encrypts data until ransom is paid
Network security device that controls incoming and outgoing traffic
Network of compromised devices controlled by attackers
Illegal access of a computer system
Data to understand and respond to cyber threats
Process of dealing with a cyber attack