My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyber Awareness Week Puzzle 2

Horizontales
When data is exposed it is a
Software that supports a computer basic function, executing applications etc.
Two or more credentials to authenticate your identity
Identification used by a person to access a computer
Malware program that includes a backdoor for administrative control
A series of virtual connections between the client machine and web server
The conversion on digital data into an unreadable format to anyone except those possessing a key
"WWW" means what as it relates to the Internet
A malicious program that spreads by inserting it self into other programs
A wireless computer connection
An arrangement of intersecting horizonal and vertical lines
An interruption in an authorized user's access to a computer network caused by overloading the circuits
Social engineering attack using email
Verticales
Internet search engine
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company
an attempt by hackers to damage or destroy a computer network or system
A wireless access point
The team responsible for computer and network protection
a malicious, self-replicating software program
Tricking people into divulging personal information or other confidential data
A piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer.
You need a username and ______ to access a computer and or application
Another name for malicious software programs designed to damage or do other unwanted actions on a computer system
Any computer network where there is no physical wired connection between sender and receiver
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A group of World Wide Web pages usually containing hyperlinks to each other and made available online
Storing and accessing data and programs over the Internet instead of your computer's hard drive.