My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Group Challenge

Author: Tio Dave
Across
The degree of protection against criminal activity, danger, damage, and/or loss.
Large-scale, distributed measurement and control systems.
Contains general principles to guide the proper use of the Internet.
Segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
A type of biometric recognition technique used to enable user authentication.
Unsolicited email, usually advertising for products and services.
A system that prevents a specific type of information from moving between un-trusted networks.
The probability a threat will impact an information resource.
A type of software deployed as a deliberate threat to an information system.
Typically a password, known only to the attacker, that allows them to access a computer system at will, without having to go through any security procedures.
Software that uses your computer as a launch pad for spammers..
Segment of computer code that performs malicious actions, and will replicate, or spread, by itself (without requiring another computer programs).
Requires a user to agree to follow it to be provided access to a corporate email, information system, and the Internet.
One of the types of signals used in Morse code.
A group of binary digits (or bits). Usually grouped in eights.
Classic movie starring Donald Sutherland and Jane Fonda.
Area located between two firewalls. Typically used to handle web page requests and emails.
The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
True or False: acting ethically and legally are always the same thing.
The deliberate assumption of another person's identity, usually to gain access to their financial information, or to frame them for a crime.
Entails perpetrators finding out as much information about an individual as possible to improve their changes that phishing techniques will be able to obtain sensitive, personal information.
Down
Segment of computer code that performs malicious actions by attaching to another computer program.
A characteristic of malware that makes it particularly dangerous to information systems.
An encryption standard used for secure transactions -- e.g., credit card purchases, on-line banking.
Software programs that hide in other computer programs and reveal their designed behavior only when activated.
Embedded in an ID card, and used to enable end user authentication.
Use deception to acquire sensitive personal information by masquerading as official-looking emails or instant messages.
A characteristic of hack attempts that often proves to be successful.
A type of chess piece also commonly known as a castle.
Software that causes pop-up advertisements to appear on your screen.
A type of computer memory that can be accessed randomly.
An official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
Small amounts of information that Web sites store on your computer, temporarily, or more or less permanently.
The ability of a company to identify, search, gather, seize, or export digital information in response to a litigation, audit, investigation, or information inquiry.
An attacker first takes over many computers, typically by using malicious software. This in turn is used to deliver a coordinated stream of information requests to a target computer, causing it to crash.
A private network that uses a public network (usually the Internet) to connect users.
The transparent layer forming the front of the eye.
A type of biometric scan used to enable end user authentication.
Mark Zuckerberg's favorite color.
A male deer.