Printable Cybersecurity Crosswords

Navigate the complex realm of Cybersecurity, safeguarding digital information from threats and attacks. Its technical jargon and evolving landscape make for modern, brain-teasing crossword clues.

7 puzzles — click Print on any puzzle below

Cybersecurity

Medium · 11×11 · 13 words
1
2
3
4
5
6
7
8
9
10
11
12

Across

  1. 1. Wireless network protocol, often a target for eavesdropping
  2. 2. Software update designed to fix bugs or improve security
  3. 4. Money demanded by cybercriminals to restore access
  4. 6. An attempt to compromise a computer system
  5. 9. A secret word or phrase used to gain access
  6. 12. Convert information into a code to prevent unauthorized access

Down

  1. 1. Self-replicating malware that spreads across networks
  2. 3. One who gains unauthorized access to computer systems
  3. 5. Software designed to damage or disable computer systems
  4. 7. A potential danger that could exploit a vulnerability
  5. 8. Software that enables a user to obtain secret information about another's computer activities
  6. 10. To protect against threats
  7. 11. A systematic review of security measures

Cybersecurity

Hard · 11×11 · 13 words
1
2
3
4
5
6
7
8
9
10
11
12

Across

  1. 1. Overwhelm with requests, denying service, sending many 'Ds'.
  2. 3. Army of compromised machines, a network of digital servants.
  3. 4. Vulnerability, offering no time for defense, initially.
  4. 8. A hook for credentials, a sly attempt for a fish.
  5. 10. Self-replicating program, wriggles through networks.
  6. 11. Small fix, a covering for a hole, changing the fabric.
  7. 12. Simulating assault, might test with a writing tool.

Down

  1. 2. Unscramble data, to undo what 'crypt' meant.
  2. 3. Security gap, a break in the wall, by the shore maybe.
  3. 5. Seclusion, a right to be alone, keeps "vicar" safe.
  4. 6. Secretly code, perhaps putting "rent" around a "cry".
  5. 7. Take advantage of a flaw, gaining from it slyly.
  6. 9. Private connection over public network, very protected nook.

Cybersecurity

Hard · 11×11 · 12 words
1
2
3
4
5
6
7
8
9
10
11
12

Across

  1. 2. Hidden tools for the admin of the underworld
  2. 4. An earth crawler that spreads without needing a host
  3. 5. Scrambled eggs, but for your sensitive data
  4. 7. Unwanted canned meat filling up your digital inbox
  5. 9. Angling for credentials using deceptive digital bait
  6. 11. A piece of cloth used to mend a software tear
  7. 12. A network tool acting like a canine capturing traffic

Down

  1. 1. A broken wall representing a compromised database
  2. 3. Recording strikes to steal the secret strikes
  3. 6. A private underground passage for secure data transit
  4. 8. A secret way of writing, or a zero
  5. 10. A chopped up mess acting as a one-way digest

Cybersecurity

Medium · 11×11 · 14 words
1
2
3
4
5
6
7
8
9
10
11
12
13
14

Across

  1. 2. Three-letter acronym for a private tunnel routed securely through the public internet.
  2. 4. A one-way mathematical function used to secure passwords and verify file integrity.
  3. 6. Cryptographic seasoning added to passwords before they are scrambled and stored.
  4. 7. Acronym for a security policy requiring a password plus a phone prompt to log in.
  5. 10. Software that holds your digital files hostage in exchange for cryptocurrency.
  6. 11. The digital string needed to successfully unlock and decipher encrypted data.
  7. 12. Greek-inspired threat that hides its true, destructive nature inside a benign shell.
  8. 13. A zombie army of hijacked computers waiting for a central command.
  9. 14. An acronym for an attack that floods a site with traffic until it crashes.

Down

  1. 1. One who might wear a black or white hat in the digital realm.
  2. 3. The classic, often easily guessed string of characters protecting user accounts.
  3. 5. Eavesdropping tool that inspects and logs packets passing through a network.
  4. 8. Turn plain text into a mathematically scrambled secret.
  5. 9. The heavy-hitting, destructive part of a cyber attack that executes after delivery.

Cybersecurity

Medium · 11×11 · 15 words
1
2
3
4
5
6
7
8
9
10
11
12
13
14

Across

  1. 4. Standalone replicating malware
  2. 5. Physical or digital key for access
  3. 6. Flood of unsolicited messages
  4. 7. Casting a line for credentials
  5. 11. Payment demanded to unlock data
  6. 13. Code that spreads by infecting files
  7. 14. Secretly monitor network traffic

Down

  1. 1. Unauthorized exposure of data
  2. 2. Malware that hides its own existence
  3. 3. Spy program recording your keystrokes
  4. 8. Forge an email address or caller ID
  5. 9. Attack that floods a site with traffic
  6. 10. Server acting as a middleman
  7. 12. Device connected to a network
  8. 13. Tool for a secure encrypted connection

Cybersecurity

Easy · 11×11 · 14 words
1
2
3
4
5
6
7
8
9
10
11
12
13
14

Across

  1. 4. The right to keep your personal information hidden from others
  2. 5. A dishonest online scheme designed to steal money or information
  3. 8. Sending fake emails to trick people into giving up personal information
  4. 12. Criminal deception intended to result in financial gain
  5. 13. Unwanted or junk email sent to a large number of people
  6. 14. A powerful computer that manages network resources and data

Down

  1. 1. A spare copy of a file saved in case the original is lost
  2. 2. An incident where data is accessed without authorization
  3. 3. Digital information stored or processed by a computer
  4. 6. Internet-based servers used for storing and processing data
  5. 7. To convert data into a secret code to prevent unauthorized reading
  6. 9. A person who uses computers to gain unauthorized access to data
  7. 10. Protected against threats, danger, or unauthorized access
  8. 11. A harmful program that can copy itself and infect a computer

Cybersecurity

Medium · 11×11 · 11 words
1
2
3
4
5
6
7
8
9
10
11

Across

  1. 1. Overwhelming a server with traffic from multiple sources
  2. 4. Software or data that takes advantage of a bug
  3. 8. Malicious assault on computer systems or networks
  4. 10. Fraudulent attempt to obtain sensitive information
  5. 11. Initial day of a newly discovered vulnerability

Down

  1. 2. Protected from unauthorized access
  2. 3. Network of compromised computers controlled by a malicious party
  3. 5. Individual who gains unauthorized access to systems
  4. 6. Website traffic redirection to a fake site
  5. 7. Tool used to identify network vulnerabilities
  6. 9. Unsolicited bulk email

More Printable Crosswords