The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity 2018

Across
Controlling 3rd party risks
Public key or identity
Security bug TLS protocol
Any software intentionally designed to cause damage to a computer, server or computer network
Process and technology used to detect compliance and risk issues associated with an organization's financial and operational environment
Authorized access to a computer or network
Many computers infected by malicious software and centrally controlled
Personally identifiable information
Down
Computer worm targeting Microsoft Windows
Skilled computer expert
Secure Shell. a secure replacement for FTP and Telnet that allows a user to connect to another computer and run commands on it using a terminal
State of being exposed to the possibility of being attacked or harmed
Unauthorized copying, transfer or retrieval of data
Restricted information
Malware used to steal banking information