My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity Words & Terms 2

Horizontales
The_____ _____ Network is a wireless network of wearable computing devices. The devices may be embedded inside the body, implants, or may be surface-mounted on the body in a fixed position, wearable technology, or may be accompanied devices which humans can carry in different positions, in clothes pockets, by hand or in various bags.
The process of tagging a photo, video or other types of media with coordinates such as marking its location.
This term refers to encrypted online content that is not indexed by conventional search engines.
Technologies or computers integrated into articles of clothing or accessories. The most prominent example, the Apple watch. These are know as _____.
The Ability to enter a name and password only once to get to several password protected systems in one working period is know as _____
This kind of "wireless communication"is fundamental to IoT connectivity. Many IoT devices have RF transceiver chipsets to transmit data long distances using minimal power.
This technology, known as BTLE, offers low-cost, safe, wireless connectivity and solves many of the earlier Bluetooth's pairing and performance headaches. This is the least expensive way to add short range wireless connectivity to mobile and IoT devices.
____ is a worldwide network of servers used by people who want to greatly increase their privacy and internet freedom. After all, this browser ensures your data traffic passes through different servers (nodes) located all over the world. This makes it a lot more difficult for online entities to track users.
A general term for a program that secretly monitors your actions. While they are sometimes sinister, like a remote-control program used by a hacker, software companies have been known to use spyware to gather data about customers.
A form of internet fraud whereby a payment page on a website is compromised when malware is injected onto the page via compromising a third-party script service in order to steal payment information
A data _____is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Verticales
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
A _____ Image File may raise concern about posting photos online because the data saved with the photo file my include the geolocation including date and time the photo was taken.
The worlds most valuable resource is no longer oil. Today, the worlds most valuable resource is ____.
By default, this web browser has more protective privacy setting than Chrome and Edge.
_____ computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. These devices are completely connected and constantly available.
The U.S. Department of Homeland Security banned this anti-virus and products from all government departments on 13 September 2017, alleging that Kaspersky Lab had worked on secret projects with Russia's Federal Security Service (FSB)
This term refers to how much of your personal, financial and browsing information remains private when you’re online.
A type of e-skimmer that injects a piece of malicious code that infultrates the point-of-sale for online and e-commerce websites.
Identifying a person's current, physical location by obtaining GPS data from their smartphones or other GPS-enabled devices.
_____, is the digital platform behind Bitcoin and other cryptocurrencies. It is intended to create faster, more efficient ways to transmit, receive, and track orders using secure data.
____trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
This type of communication is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other wireless technologies, such as Bluetooth