CIA Triad - Computers
Practicing safety while using computers is essential. Cyber security should always be a first thought before you use any computer device, especially if it connects to a network!
Advertisements
Login to be the first to rate this puzzle!
ASSURANCE
ATTACKER
AUTHENTICATION
AVAILABILITY
BLACKHATS
CODE
COMPUTER
CONFIDENTIALITY
CYBER
HACKING
INFORMATION
INTEGRITY
KNOWLEDGE
MALICIOUS
NETWORK
RESPONSIBILITY
SECURITY
TECHNOLOGY
VULNERABLE
WHITEHATS
| Z | T | Y | T | I | L | I | B | A | L | I | A | V | A | C |
| G | S | E | C | U | R | I | T | Y | X | H | A | D | O | Y |
| D | V | U | L | N | E | R | A | B | L | E | S | N | L | B |
| G | Z | M | A | L | I | C | I | O | U | S | F | H | Y | E |
| N | O | I | T | A | M | R | O | F | N | I | E | J | A | R |
| I | I | N | E | T | W | O | R | K | D | N | N | C | A | O |
| K | B | B | C | S | T | A | H | E | T | I | H | W | K | R |
| C | U | F | L | T | T | K | N | O | W | L | E | D | G | E |
| A | U | T | H | E | N | T | I | C | A | T | I | O | N | T |
| H | Z | Y | P | B | I | N | T | E | G | R | I | T | Y | U |
| K | F | P | U | A | S | S | U | R | A | N | C | E | I | P |
| Q | J | P | L | A | T | T | A | C | K | E | R | S | N | M |
| S | Z | I | D | B | L | A | C | K | H | A | T | S | Z | O |
| Z | T | E | C | H | N | O | L | O | G | Y | E | D | O | C |
| Y | Y | T | I | L | I | B | I | S | N | O | P | S | E | R |
Advertisements
Advertisements