0% found this document useful (0 votes)
875 views6 pages

Secure Our World Cybersecurity Awareness Month Puzzles

Uploaded by

fr3d3l
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
875 views6 pages

Secure Our World Cybersecurity Awareness Month Puzzles

Uploaded by

fr3d3l
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CYBERSECURITY

CYBERSECURITY
AWARENESS
AWARENESS
MONTH
MONTH

Double Puzzle
anagrams and
Solve the anagrams and use
use the
the circled
circled letters
lettersin
in the
the top
top part
part to
to complete
complete
the final phrase
phrase at
at the
the bottom.
bottom. Each
Each circled
circled letter
letter is
is used
used just
just once.
once.
Double Puzzle Answer Key
Find the Cyber Terms!
CYBERSECURITY
AWARENESS
MONTH

Word Search Answer Key


Key
CYBERSECURITY
AWARENESS
MONTH

Crossword
Crossword

Down
1. Malware that “infects” a computer by corrupting or erasing information
1. Malware that infects a computer by corrupting or erasing information and
Across
Across and sending
sending it toithackers.
to hackers
5.5.Spoofing
Spoofing is
is when bad actors
when bad actorscreate
createa afake
fake _______
blank and phish
and send send phish
emails to 2.2.Always
Always ______ your
blank your devices
devices and and software
software when when the newest
the newest version version is
is available!
emails toaimitate
imitate a business
business.
available!

7.7.IfIfyou
youreceive
receive aa suspicious
suspiciousblank ____,hover
hover over
over it with
it with your
your mouse
mouse before
before 3. When a cybercriminal tries to take your information by sneaking into your
3.computer.
When a cybercriminal tries to take your information by sneaking into
clickingtotomake
clicking makesure
sure itit is
is real!
real!
your computer
10. Bad software installed on a computer to damage or harm it. Examples 4. When multiple devices are connected together to share information, they are
10. Bad software installed on a computer to damage or harm it (Ex. 4.together
When multiple devices are connected together to share information,
in a blank.
are viruses, Ransomware, Spyware, etcetera.
Viruses, Ransomware, Spyware, etc.) they are together in a _______
12. A blank breach is when a hacker successfully breaks into a system and 6. Any tech used to keep bad actors out. It burns the hackers.
12. A ____
exposes breach
private is when a hacker successfully breaks into a system
information. 6. Any tech used to keep bad actors out - it burns the hackers!
and exposes private information 8. Always use long and unique blank for each of your online accounts.
14. Wireless short-range connection for devices in the same network. Phones, 8. Always use long and unique _________ for each of your online accounts
computers
14. Wirelessetcetera.
short-range connection for devices in the same network 9. This sends an email or text when logging in to make sure it is really you.
9. This sends an email or text when logging in to make sure it is really you!
(Phones, Computers, etc.)
16. A piece of data about your online history that creates a trail of crumbs. 11. The online network we use to share information around the world. You use it
Not chocolate chip, though. 11. The online network we use to share information around the world - you
everyday.
16. A piece of data about your online history that creates a trail of use it every day!
crumbs - not chocolate chip, though!
17. blank colon forward slash forward slash before a link website U R L 13. When a hacker pretends to be a real person to fool you into clicking on a fake
means it is encrypted and secure. 13. When
link or file.a Usually
hackeranpretends
email or to bemessage.
text a real person to fool you into clicking on
17. _____:// before a link website URL means it is encrypted and secure a fake link or file (usually an email or text message)
18. A big surprise problem in your computer. Sometimes it is small like an 15. Private network to make you anonymous on the internet.
antAor
18. big likeproblem
surprise a cricket. in your computer - sometimes it is small like an 15. Private network to make you anonymous on the internet
ant, or big like a cricket! 16. Global network for servers to share and store information. It doesn’t rain from
16.
theGlobal network for servers to share and store information. It doesn’t
sky though!
rain from the sky though!
Crossword Answer Key

You might also like