CIA Triad - Computers
Practicing safety while using computers is essential. Cyber security should always be a first thought before you use any computer device, especially if it connects to a network!
Advertisements
Login to be the first to rate this puzzle!
ASSURANCE
ATTACKER
AUTHENTICATION
AVAILABILITY
BLACKHATS
CODE
COMPUTER
CONFIDENTIALITY
CYBER
HACKING
INFORMATION
INTEGRITY
KNOWLEDGE
MALICIOUS
NETWORK
RESPONSIBILITY
SECURITY
TECHNOLOGY
VULNERABLE
WHITEHATS
C | O | D | E | E | L | B | A | R | E | N | L | U | V | D |
Y | O | Y | T | I | L | I | B | A | L | I | A | V | A | W |
T | H | N | L | A | S | S | U | R | A | N | C | E | Y | Q |
I | A | V | F | C | O | M | P | U | T | E | R | D | D | O |
R | C | B | G | I | N | F | O | R | M | A | T | I | O | N |
U | K | Q | J | Z | D | A | T | T | A | C | K | E | R | K |
C | I | W | H | I | T | E | H | A | T | S | W | X | R | T |
E | N | A | T | L | L | K | N | O | W | L | E | D | G | E |
S | G | M | B | K | H | N | E | T | W | O | R | K | Y | N |
R | E | S | P | O | N | S | I | B | I | L | I | T | Y | F |
R | A | U | T | H | E | N | T | I | C | A | T | I | O | N |
E | U | M | A | L | I | C | I | O | U | S | L | T | Z | P |
B | X | H | J | Y | T | I | R | G | E | T | N | I | A | C |
Y | M | Z | A | Y | G | O | L | O | N | H | C | E | T | W |
C | Y | B | B | L | A | C | K | H | A | T | S | Y | U | Y |
Advertisements
Advertisements