Icon Créer jeu Créer jeu
Obtenir Plan Académique
Obtenir Plan Académique
Obtenir Plan Académique

CyberSecurity

Mots Croisés

Complete this puzzle after completing the Cybersecurity exercises.

Téléchargez la version pour jouer sur papier

Âge recommandé: 11 ans
20 fois fait

Créé par

United States

Top 10 résultats

Il n'y a toujours pas de résultats pour ce jeu. Soyez le premier à apparaître dans le classement! pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

CyberSecurityVersion en ligne

Complete this puzzle after completing the Cybersecurity exercises.

par Jeff Henry
1

A company or organization that gives users and devices access to the Internet.

2

Computer programs that can block, detect, and remove viruses and other malware.

3

Two or more interconnected devices that can exchange data.

4

A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.

5

A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.

6

Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.

7

The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.

8

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.

9

The amount of data that can pass through a network or part of a network per second.

10

Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.

11

Software designed to block malware from entering protected networks.

12

Extra copies of computer files that can be used to restore files that are lost or damaged.

13

Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.

14

A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.

15

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.

16

Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.

2
10
14
3
15
12
8
11
4
5
6
7
9
13
1
16
educaplay suscripción