My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity & More

Author: Tio Dave
Across
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.
A form of malware that does not require an end user to take an action in order for it to be activated.
A bro's sib.
A form of malware that requires an end user to take an action in order for it to be activated.
The partner of yang.
There are 8 of these in a byte.
A type of malware that enables cybercriminals to gain access and control machines without being detected.
Green eggs and _______.
A unit of digital information that most commonly consists of 8 bits.
A cyber-attack in which the perpetrator seeks to make a machine or network resource available to its intended users by temporarily or indefinitely disruptive services of a host connected to a network.
A type of malicious software designed to block access to a computer system until a sum of money is paid.
A unit of information equal to one billion bytes.
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
The forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Reddish brittle coating formed on iron especially when chemically attacked by moist air and composed essentially of hydrated ferrous oxide.
A seemingly useful program that contains concealed instructions which when activated perform an illicit or malicious action (such as destroying data files).
An insidious spyware that can record and steal consecutive strokes that the user enters into a device.
A method employing encryption to provide secure access to a remote computer over the Internet.
A Jewish scholar or teacher, especially one who studies or teaches Jewish law.
A form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
A link between components or devices connected to a computer.
AKA sasquatch.
Its capital is Salem.
One of the founders of Microsoft.
A synonym for salamander.
Along with 17-across, it is 1 trillion bytes.
A synonym for sweet potato.