CYBERSECURITY
CYBERSECURITY
AWARENESS
AWARENESS
MONTH
MONTH
Double Puzzle
anagrams and
Solve the anagrams and use
use the
the circled
circled letters
lettersin
in the
the top
top part
part to
to complete
complete
the final phrase
phrase at
at the
the bottom.
bottom. Each
Each circled
circled letter
letter is
is used
used just
just once.
once.
Double Puzzle Answer Key
Find the Cyber Terms!
CYBERSECURITY
AWARENESS
MONTH
Word Search Answer Key
Key
CYBERSECURITY
AWARENESS
MONTH
Crossword
Crossword
Down
1. Malware that “infects” a computer by corrupting or erasing information
1. Malware that infects a computer by corrupting or erasing information and
Across
Across and sending
sending it toithackers.
to hackers
5.5.Spoofing
Spoofing is
is when bad actors
when bad actorscreate
createa afake
fake _______
blank and phish
and send send phish
emails to 2.2.Always
Always ______ your
blank your devices
devices and and software
software when when the newest
the newest version version is
is available!
emails toaimitate
imitate a business
business.
available!
7.7.IfIfyou
youreceive
receive aa suspicious
suspiciousblank ____,hover
hover over
over it with
it with your
your mouse
mouse before
before 3. When a cybercriminal tries to take your information by sneaking into your
3.computer.
When a cybercriminal tries to take your information by sneaking into
clickingtotomake
clicking makesure
sure itit is
is real!
real!
your computer
10. Bad software installed on a computer to damage or harm it. Examples 4. When multiple devices are connected together to share information, they are
10. Bad software installed on a computer to damage or harm it (Ex. 4.together
When multiple devices are connected together to share information,
in a blank.
are viruses, Ransomware, Spyware, etcetera.
Viruses, Ransomware, Spyware, etc.) they are together in a _______
12. A blank breach is when a hacker successfully breaks into a system and 6. Any tech used to keep bad actors out. It burns the hackers.
12. A ____
exposes breach
private is when a hacker successfully breaks into a system
information. 6. Any tech used to keep bad actors out - it burns the hackers!
and exposes private information 8. Always use long and unique blank for each of your online accounts.
14. Wireless short-range connection for devices in the same network. Phones, 8. Always use long and unique _________ for each of your online accounts
computers
14. Wirelessetcetera.
short-range connection for devices in the same network 9. This sends an email or text when logging in to make sure it is really you.
9. This sends an email or text when logging in to make sure it is really you!
(Phones, Computers, etc.)
16. A piece of data about your online history that creates a trail of crumbs. 11. The online network we use to share information around the world. You use it
Not chocolate chip, though. 11. The online network we use to share information around the world - you
everyday.
16. A piece of data about your online history that creates a trail of use it every day!
crumbs - not chocolate chip, though!
17. blank colon forward slash forward slash before a link website U R L 13. When a hacker pretends to be a real person to fool you into clicking on a fake
means it is encrypted and secure. 13. When
link or file.a Usually
hackeranpretends
email or to bemessage.
text a real person to fool you into clicking on
17. _____:// before a link website URL means it is encrypted and secure a fake link or file (usually an email or text message)
18. A big surprise problem in your computer. Sometimes it is small like an 15. Private network to make you anonymous on the internet.
antAor
18. big likeproblem
surprise a cricket. in your computer - sometimes it is small like an 15. Private network to make you anonymous on the internet
ant, or big like a cricket! 16. Global network for servers to share and store information. It doesn’t rain from
16.
theGlobal network for servers to share and store information. It doesn’t
sky though!
rain from the sky though!
Crossword Answer Key