Cybersecurity Wordsearch
- Louise Llewellyn-jones
- Dec 22, 2023
- 3 min read
Updated: Jun 14, 2024
At this joy and fun filled time of year, it's easy to become complacent to the many different cybersecurity threats facing our critical national infrastructure. So with that in mind, we've put together this cyber themed wordsearch competition to put your knowledge to the test.
Simply hunt down the 12 hidden cyber threats and 12 CNI target sectors in the wordsearch below, and email them to us using the contact us page. You could win yourself a bottle of champagne, just in time for New Years Eve!
Each word you find counts as a competition entry. And if you manage to find all 24 words, a secret word can be found using some the remaining letters. Email us this secret word and you could win a special mystery prize! Winners will be selected at random. Good luck!

In the drop-down lists below, you'll find some clues along with the rules. Good luck!
Cybersecurity Threats:
An attempt to overwhelm a system or network with traffic, making it unavailable to legitimate users. (3 words = 6,2,7 letters)
A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key. (1 word = 10 letters)
These attacks target third-party vendors that provide goods or services to critical infrastructure organizations. By compromising a vendor, attackers can gain access to the critical infrastructure organization's networks and systems. (2 words = 6,5 letters)
These attacks intercept communications between two parties, allowing the attacker to eavesdrop on the conversation or modify the data being exchanged. (4 words = 3,2,3,6 letters)
These attacks target websites or other online resources that are frequented by employees of critical infrastructure organizations. By compromising these websites, attackers can infect the employees' devices with malware or gain access to their credentials (2 words = 8,4 letters)
These attacks attempt to trick victims into revealing sensitive information, such as passwords, to gain access to critical networks and systems. (1 word = 8 letters)
These attacks use psychological manipulation to trick victims into taking actions that reveal sensitive information or install malware that enables the attacker to gain unauthorized access to critical systems (2 words = 6,11 letters)
These highly sophisticated attacks exploit vulnerabilities in software that are unknown to the software vendor. These attacks are difficult to defend against because there is no patch available to fix the vulnerability (2 words = 4,3 letters)
This threat is when groups of attackers that are highly skilled and resourced, target critical infrastructure organizations and can remain undetected for long periods of time (2 words = 8,10 letters)
These threats come from within an organization and can be intentional or accidental. Intentional threats may be motivated by financial gain, revenge, or ideology. Accidental threats may be caused by carelessness or poor security practices. (1 word = 7 letters)
These attacks are designed to bring actual damage to critical infrastructure facilities or equipment to disrupt operations. (1 word = 8 letters)
The cybersecurity landscape is constantly evolving, and new threats are emerging all the time. These type of threats are called (________). (1 word = 8 letters)