Icon Créer jeu Créer jeu

Cybersecurity Crossword Challenge

Mots Croisés

Test your knowledge of essential concepts in digital protection and information security.

Téléchargez la version pour jouer sur papier

12 fois fait

Créé par

India

Top 10 résultats

  1. 1
    viktor
    viktor
    11:04
    temps
    100
    but
  2. 2
    00:13
    temps
    0
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

Cybersecurity Crossword ChallengeVersion en ligne

Test your knowledge of essential concepts in digital protection and information security.

par Ashwith Godishala
1

A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules.

2

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

3

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

4

The process of converting information or data into a code to prevent unauthorized access.

5

A type of malicious software that blocks access to a computer system until a sum of money is paid.

6

A type of malware that disguises itself as legitimate software to gain access to a user's system.

7

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

8

Software designed to detect and destroy computer viruses and other malicious software.

7
6
8
5
1
3
2
4
1

A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules.

2

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

3

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

4

The process of converting information or data into a code to prevent unauthorized access.

5

A type of malicious software that blocks access to a computer system until a sum of money is paid.

6

A type of malware that disguises itself as legitimate software to gain access to a user's system.

7

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

7
3
1
5
4
6
2
educaplay suscripción