My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyber Security

Use your cybersecurity definition list to complete the puzzle.
Horizontales
Type of malicious software designed to block access to a computer system until a sum of money is paid.
A local private computer network
The body of technologies, processes and practices designed to protect networks, computers, and data from attack or damage.
a person who uses computers to gain unauthorized access to data
A computer program that runs automatically
Software that enables a user to obtain covert information about someones computer activities by transmitting data covertly from their hard drive
a branch of forensic science encompassing the recovery and investigation of material found in digital devices
Encrypted or encoded information that is unreadable without the proper key to decrypt it
an icon, nickname or figure representing a particular person in the digital world
an assumed or nickname name that a person sometimes uses online
A device used to connect two different computer networks.
Person who operates the command and control of botnets
Verticales
The process or action of verifying the identity of a user or process.
A piece of code that is capable of copying itself and typically has a detrimental effect
The process of converting information or data into a code
A part of a computer network that is designed to block unauthorized access
A global computer network
an email-spoofing attack that targets a specific organization or individual
Illegal practice of sending emails in order to induce individuals to reveal personal information
To use a mistake or glitch in software for personal gain
a computer program that records every keystroke made by a computer user
Online Bully
Sequence of characters required for access to a computer system
A network of computers infected with malicious software and controlled as a group without the owners' knowledge
Software that is intended to damage or disable computers and computer systems.