My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Crossword Game

Horizontales
Ensuring that information and the systems that process and store it are available and accessible when needed by authorized users.
A security mechanism that requires users to provide two or more different factors to verify their identity during the authentication process.
Refers to unsolicited, often irrelevant or inappropriate, and usually mass-distributed messages sent over the internet.
Ensuring that information is only accessible to authorized individuals and is protected from unauthorized disclosure.
A secret or confidential word, phrase, or sequence of characters used to authenticate the identity of a user, granting them access to a particular system, account, or resource.
A type of malicious software (malware) disguised as a legitimate program or file.
Program that designed to detect and remove viruses from computer systems.
The practice of protecting information from unauthorized access, disclosure, alteration, or destruction.
A method of manipulating individuals to divulge confidential information, perform actions, or provide access to sensitive systems by exploiting human psychology rather than technical vulnerabilities.
Verticales
Maintaining the accuracy and reliability of information by safeguarding it against unauthorized tampering, alterations, or corruption.
The process of creating copies or duplicates of data to ensure its availability and recovery in the event of data loss, corruption, accidental deletion, or system failures.
Refers to the uncertainty or chance of something undesirable happening that may result in harm, loss, damage, or deviation from a desired outcome.
Individuals with advanced computer skills who use their technical knowledge to gain unauthorized access to computer systems, networks, and data.
Type of cyber-attack where attackers use deceptive techniques to trick individuals into providing sensitive information such as usernames, passwords, credit card details, or other personal information.
Is a cloud-based file storage and synchronization service that allows users to store files and data in the cloud.
A technology that allows devices to connect to the internet and communicate wirelessly within a local area network (LAN).
A virtual private network that allows users to connect remotely to another network, such as their workplace network or home Wi-Fi.
The delivery of computing services, including storage, processing power, software, and other resources, over the internet.