CIA Triad - Computers
Practicing safety while using computers is essential. Cyber security should always be a first thought before you use any computer device, especially if it connects to a network!
Advertisements
Login to be the first to rate this puzzle!
ACCESS
ASSURANCE
ATTACKER
AUTHENTICATION
AVAILABILITY
BLACKHATS
CODE
COMPUTER
CONFIDENTIALITY
CYBER
INFORMATION
INTEGRITY
KNOWLEDGE
MALICIOUS
NETWORK
RESPONSIBILITY
SECURITY
TECHNOLOGY
VULNERABLE
WHITEHATS
| Y | A | V | A | I | L | A | B | I | L | I | T | Y | Q | U |
| V | T | U | U | B | N | R | S | J | S | W | O | C | U | Y |
| G | E | I | T | L | S | T | Z | S | P | S | O | K | T | V |
| O | C | N | L | H | N | C | E | L | U | M | E | I | W | M |
| W | H | F | A | A | E | E | B | G | P | R | L | C | S | N |
| G | N | O | Y | L | I | N | R | U | R | I | A | U | C | R |
| B | O | R | T | N | W | T | T | A | B | I | O | N | E | A |
| L | L | M | I | L | E | E | N | I | B | I | T | K | C | Q |
| A | O | A | R | N | R | T | S | E | C | L | C | Y | Y | E |
| C | G | T | U | E | C | N | W | I | D | A | E | D | B | W |
| K | Y | I | C | F | O | O | L | O | T | I | T | G | E | T |
| H | A | O | E | P | Y | A | D | T | R | A | F | I | R | R |
| A | H | N | S | C | M | I | A | E | Q | K | O | N | O | D |
| T | S | E | E | G | D | E | L | W | O | N | K | W | O | N |
| S | R | O | W | H | I | T | E | H | A | T | S | K | E | C |
Advertisements
Advertisements