The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity

Across
The perpetrator tries to actively alter a system’s data, resources or operations.
Sometimes used interchangeably with the term “trap door,” a software or hardware designer makes ones of these to allow herself (or privileged others) to circumvent computer security.
This is an independent program that replicates (reproduces) from machine to machine across network connections, often clogging networks and information systems as it spreads.
These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
Perpetrator tries to access and use a computer system’s information – without trying to alter its resources, operations or data.
These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
A harmful software that attaches itself to other programs in order to impair or destroy a computer’s ability to function normally. This software spreads like an illness.
The process of translating plaintext into ciphertext.
This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
Down
A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
An unauthorized user who seeks to maliciously disrupt or permanently damage an individual computer – or entire network of computers.
Hackers or cyber terrorists who approach computer networks using BLANK are trying to maximize the damage they can inflict by using different traits of both viruses and worms.
The activity or process, ability or capability, or state whereby information and communication systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
A person attacks you with a BLANK - once these are installed by the hacker these items install spyware, allowing the hacker to take control your computer.
This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
This type of harmful or malicious program is used to infiltrate your computer to record information about all of your computer keyboard activities.
a bridge between two computer networks.