Icon New game New game

Cybersecurity Challenge

Crossword Puzzle

Test your knowledge on digital protection strategies and concepts.

Download the paper version to play

1 times made

Created by

Mexico

Top 10 results

  1. 1
    00:07
    time
    0
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Crossword Puzzle

Cybersecurity ChallengeOnline version

Test your knowledge on digital protection strategies and concepts.

by Rom Gar
1

A system designed to prevent unauthorized access to or from a private network.

2

Software intentionally designed to cause damage to a computer, server, or network.

3

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

4

The process of converting information into a code to prevent unauthorized access.

5

Software designed to detect and destroy computer viruses and other malicious software.

6

An incident where unauthorized access is gained to data or systems.

7

A type of malicious software that blocks access to data until a ransom is paid.

8

A weakness in a system that can be exploited by threats to gain unauthorized access.

9

A secret word or phrase used to authenticate a user's identity.

10

Criminal activities conducted through digital means, such as hacking or identity theft.

11

The process of verifying the identity of a user or system

3
1
4
11
10
6
8
5
7
9
2
educaplay suscripción