Cyber Security Crossword Puzzle
Cyber Security crossword puzzle printable. Download, print and start playing. You can add your own words to customize or start creating from scratch.
Recommended: Check out this Advance Crossmaker Maker to create commercial use printable puzzles.
Title
Words List(answer : question or clue)
Shuffle questions
Puzzle Size:
Font / Cell Box Style
TIP: Use update button to toggle answers or apply styles like font, cell spacing, cell shades, puzzle size or paper output without generating the new puzzle.

Make sure to regenerate the puzzle to apply any changes.
Select an option:
Output:
Download Print
Try this another Crossword Puzzle Maker with different layouts.
Download will include unfilled worksheet and an answer key sheet.
QUESTIONS LIST: password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these when receiving emails from an unknown or untrusted source , fingerprint: a way to unlock your mobile phone instead of a password , breach: a security incident where sensitive and personal information is copied, transmitted, viewed or stolen, cyber attack: an attempt by hackers to damage or destroy a computer network or system , virus: a small program designed to cause damage to your computer by gaining access to it, antivirus: software designed to detect and destroy computer viruses , phishing: type of cyber-attack where attacker attempts to trick the victim into giving them information , smishing: a data file that is no longer usable, usually from infection of a virus , password manager: application to keep passwords secure , scam:a dishonest or fraudulent scheme that attempts to take money or something of value from people, malware: software which specifically disrupts or damages a computer, or gains access to a user’s system , helpdesk: who to contact if an email looks suspicious , computer: what should you lock when you leave your desk?