CIA Triad - Computers
Practicing safety while using computers is essential. Cyber security should always be a first thought before you use any computer device, especially if it connects to a network!
Advertisements
Login to be the first to rate this puzzle!
ASSURANCE
ATTACKER
AUTHENTICATION
AVAILABILITY
BLACKHATS
CODE
CONFIDENTIALITY
ETHICS
HACKING
INFORMATION
INTEGRITY
KNOWLEDGE
MALICIOUS
NETWORK
RESPONSIBILITY
SECURITY
TECHNOLOGY
THREATS
VULNERABLE
WHITEHATS
| H | Y | V | U | L | N | E | R | A | B | L | E | D | O | C |
| J | A | L | W | B | L | A | C | K | H | A | T | S | O | Y |
| N | S | S | H | P | E | G | D | E | L | W | O | N | K | T |
| B | C | J | I | H | A | C | K | I | N | G | F | S | D | I |
| N | O | I | T | A | M | R | O | F | N | I | W | S | E | L |
| S | T | A | E | R | H | T | I | R | D | E | B | Q | M | I |
| Y | U | O | H | W | Z | Z | E | E | T | H | I | C | S | B |
| T | H | L | A | Z | Q | K | N | E | T | W | O | R | K | I |
| A | A | B | T | U | C | T | Y | T | I | R | U | C | E | S |
| N | A | G | S | A | I | N | T | E | G | R | I | T | Y | N |
| N | O | I | T | A | C | I | T | N | E | H | T | U | A | O |
| W | J | T | L | S | U | O | I | C | I | L | A | M | D | P |
| P | A | I | A | S | S | U | R | A | N | C | E | T | P | S |
| Q | T | E | C | H | N | O | L | O | G | Y | S | B | K | E |
| Y | A | V | A | I | L | A | B | I | L | I | T | Y | O | R |
Advertisements
Advertisements