Icon Crear Crear

Cybersecurity Crossword Challenge

Crucigrama

Test your knowledge of essential concepts in digital protection and information security.

Descarga la versión para jugar en papel

12 veces realizada

Creada por

India

Top 10 resultados

  1. 1
    viktor
    viktor
    11:04
    tiempo
    100
    puntuacion
  2. 2
    00:13
    tiempo
    0
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Crucigrama

Cybersecurity Crossword ChallengeVersión en línea

Test your knowledge of essential concepts in digital protection and information security.

por Ashwith Godishala
1

A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules.

2

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

3

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

4

The process of converting information or data into a code to prevent unauthorized access.

5

A type of malicious software that blocks access to a computer system until a sum of money is paid.

6

A type of malware that disguises itself as legitimate software to gain access to a user's system.

7

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

8

Software designed to detect and destroy computer viruses and other malicious software.

7
6
8
5
1
3
2
4
1

A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules.

2

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

3

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

4

The process of converting information or data into a code to prevent unauthorized access.

5

A type of malicious software that blocks access to a computer system until a sum of money is paid.

6

A type of malware that disguises itself as legitimate software to gain access to a user's system.

7

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

7
3
1
5
4
6
2
educaplay suscripción