My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cyber Security Terms Every Adult Should Be Aware Of

Across
A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
A form of malicious code that displays unsolicited advertising on your computer.
A defensive technology (that can be either hardware or software-based)designed to keep the bad guys out. Technically speaking, _________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
A piece of information about your visit to a website that some websites record automatically on your computer.
An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
The process of using codes to make readable information unreadable. This type of information cannot be read until it is decrypted using a secret key.
The amount of data that can pass through a network or part of a network per second.