Cyber Security Awareness Crossword Puzzle

Download and print this Cyber Security Awareness crossword puzzle.

PDF will include puzzle sheet and the answer key.

 

Browse all Computers / IT Puzzles

QUESTIONS LIST: ddos : a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic is known as a _ attack, trojan : what is the term for a malicious program that disguises itself as legitimate software?, validation : what is the term for the process of validating the identity of a user or system?, web : _ filter is a security measure that prevents users from accessing unauthorized websites, authentication : a security measure that requires users to enter a username and password in order to access a computer system is called _ , injection : sql _ is a type of attack that attempts to exploit a vulnerability in a web application, vulnerabilities : what is the term for a weakness in a system's security that could be exploited by a threat?, ssl : a protocol for secure data transmission on the internet, phishing : a type of attack that tricks a user into revealing their personal information is called, multi factor : _ authentication is a security measure that requires users to enter two or more pieces of information to authenticate themselves, exploit : a type of attack that attempts to gain unauthorized access to a computer system by exploiting a vulnerability in the operating system, hacker : a person who tries to gain unauthorized access to computer systems, botnet : a network of computers that are infected with malware and controlled by a single attacker, encryption : what is the process of converting data into an unreadable format to protect it from unauthorized access?, switch : a l2 device that is used to connect multiple systems within a network, ids : a security measure that is used to detect and prevent unauthorized access to a computer system is called _ , virus : a software program that replicates itself and spreads from one computer to another is called, worm : type of malware that attaches itself to a legitimate file and then executes when the file is opened is called, mac : what is the term for a unique identifier assigned to a network device?, snort : popular ids used to check malicious activity in network company, ping : what is the method used to measure minimum time needed to send smallest possible amount of data and receive response between two host.