cyber security Crossword Puzzles

Cyber Security 2023-09-12

Cyber Security crossword puzzle
Across
  1. party coverage -Connected towards cyber insurance.
  2. - Email
  3. - Owner identification.
  4. Security - Advanced protection.
  5. - Portable media.
  6. - Notify
  7. Authentication
  8. -Risky password.
  9. shared documents,employees.
  10. USB drives.
  11. -Communiction by emailing.
  12. security numbers- Valuable information.
Down
  1. security -Social security number.
  2. Attacks,imposters.
  3. Router
  4. - Technology
  5. - Uses WPA2 encryption.
  6. scheme- List
  7. insurance policy- Cyber attacks on your data held by vendors and other third parties.
  8. Management- Clarifying changes.
  9. - Verificaiton.
  10. Party Coverage -Legal recovery
  11. Updates- Brand new,pre-built.

23 Clues: Router- Email- NotifyUSB drives.- Technologyscheme- ListAuthentication- Verificaiton.-Risky password.- Portable media.Attacks,imposters.- Uses WPA2 encryption.- Owner identification.-Communiction by emailing.shared documents,employees.Updates- Brand new,pre-built.Party Coverage -Legal recoverySecurity - Advanced protection....

Product Security is everyones responsibility 2017-07-02

Product Security is everyones responsibility crossword puzzle
Across
  1. Insider
  2. Killchain
  3. Antivirus
  4. People
  5. cyber
  6. Firewall
  7. Encryption
  8. Confidentiality
  9. Availability
  10. Protection
Down
  1. Security
  2. Attack
  3. Threat
  4. Motivation
  5. Monitor
  6. Integrity
  7. Vulnerability
  8. Product
  9. Resilience
  10. Risk

20 Clues: RiskcyberAttackThreatPeopleInsiderMonitorProductSecurityFirewallKillchainIntegrityAntivirusMotivationResilienceEncryptionProtectionAvailabilityVulnerabilityConfidentiality

SecOps Gartner Vocabulary Crossword puzzle 2022-12-03

SecOps Gartner Vocabulary Crossword puzzle crossword puzzle
Across
  1. Endpoint detection and response
  2. Cyber security Mesh Architecture
  3. pentest as a service
  4. Security Orchestration and automated response
  5. vulnerability prioritization technology
  6. external attack surface management
  7. risk-based vulnerability management
  8. identity and access management
  9. security service edge
  10. digital forensics and incident response
  11. cyber asset attack surface management
  12. managed endpoint detection and response
  13. Extended detection and response
  14. digital risk protection service
  15. Identity Threat Detection and Response
Down
  1. Breach and Attack Simulation
  2. endpoint protection platform
  3. Vulnerability Assessment
  4. Cyber-Physical systems security
  5. Cloud Access security Broker
  6. threat intelligence platform
  7. Security Information and Event Management
  8. managed extended detection and response
  9. network detection and response
  10. threat intelligence
  11. modern security operations center
  12. exposure management
  13. data discovery and management software
  14. Managed detection and response

29 Clues: threat intelligenceexposure managementpentest as a servicesecurity service edgeVulnerability AssessmentBreach and Attack Simulationendpoint protection platformCloud Access security Brokerthreat intelligence platformnetwork detection and responseidentity and access managementManaged detection and responseEndpoint detection and response...

FITCvocab.ACB 2013-05-17

FITCvocab.ACB crossword puzzle
Across
  1. poco
  2. central-processing-unit
  3. main-system
  4. long-term-memory
  5. MB
  6. safety the safety of yourself online
  7. what-why-what-can-she/he-do
  8. catchy-phrase
  9. downloads-on-devices
  10. ©
  11. KB
Down
  1. TB
  2. the-right-thing-to-do-online
  3. short-term-memory
  4. 3G,4G
  5. online-security
  6. ear-buds
  7. online-saveing
  8. GB
  9. optical,mechanical,touchpad
  10. microsoft-word
  11. keyboard
  12. sign
  13. word

24 Clues: ©TBMBGBKBpocosignword3G,4Gear-budskeyboardmain-systemcatchy-phraseonline-saveingmicrosoft-wordonline-securitylong-term-memoryshort-term-memorydownloads-on-devicescentral-processing-unitwhat-why-what-can-she/he-dooptical,mechanical,touchpadthe-right-thing-to-do-onlinesafety the safety of yourself online

Technology Times 2017-11-02

Technology Times crossword puzzle
Across
  1. When you step away from your desk at work
  2. Name of the Cyber Security Awareness newsletter
  3. In 2013 69% of incidents reported to US-CERT
  4. Workstations are refreshed
  5. SSID for County Employees Only and County-Owned Equipment
  6. Type of service organization the Information Technology Department is
  7. New switches will support this common industry requirement
  8. When is National Cyber Security Awareness Month (NCSAM)
  9. National public awareness campaign that increased understanding of cyber threats
  10. Information you work with to protect yourself and the organization
  11. Hashtag for NCSAM
Down
  1. Frequency of the Technology Times newsletter will be published
  2. This software will upgrade from 2013 to 2017
  3. Number of core switches on the County network
  4. Publisher of the Cyber Security Awareness Newsletter
  5. Name of VPN Client
  6. Percent of increase of reported cyber incidents in 2013
  7. Work badge and identification when outside your office

18 Clues: Hashtag for NCSAMName of VPN ClientWorkstations are refreshedWhen you step away from your desk at workThis software will upgrade from 2013 to 2017In 2013 69% of incidents reported to US-CERTNumber of core switches on the County networkName of the Cyber Security Awareness newsletterPublisher of the Cyber Security Awareness Newsletter...

Technology Times 2017-11-02

Technology Times crossword puzzle
Across
  1. Information you work with to protect yourself and the organization
  2. In 2013 69% of incidents reported to US-CERT
  3. Work badge and identification when outside your office
  4. When is National Cyber Security Awareness Month (NCSAM)
  5. National public awareness campaign that increased understanding of cyber threats
  6. Hashtag for NCSAM
  7. When you step away from your desk at work
  8. Number of core switches on the County network
  9. Percent of increase of reported cyber incidents in 2013
Down
  1. Publisher of the Cyber Security Awareness Newsletter
  2. Name of the Cyber Security Awareness newsletter
  3. Name of VPN Client
  4. This software will upgrade from 2013 to 2017
  5. Frequency of the Technology Times newsletter will be published
  6. Type of service organization the Information Technology Department is
  7. SSID for County Employees Only and County-Owned Equipment
  8. New switches will support this common industry requirement
  9. Workstations are refreshed

18 Clues: Hashtag for NCSAMName of VPN ClientWorkstations are refreshedWhen you step away from your desk at workIn 2013 69% of incidents reported to US-CERTThis software will upgrade from 2013 to 2017Number of core switches on the County networkName of the Cyber Security Awareness newsletterPublisher of the Cyber Security Awareness Newsletter...

Technology Times 2017-11-02

Technology Times crossword puzzle
Across
  1. Name of VPN Client
  2. When you step away from your desk at work
  3. When is National Cyber Security Awareness Month (NCSAM)
  4. Publisher of the Cyber Security Awareness Newsletter
  5. Work badge and identification when outside your office
  6. New switches will support this common industry requirement
  7. In 2013 69% of incidents reported to US-CERT
  8. Type of service organization the Information Technology Department is
  9. SSID for County Employees Only and County-Owned Equipment
Down
  1. Frequency of the Technology Times newsletter will be published
  2. National public awareness campaign that increased understanding of cyber threats
  3. Name of the Cyber Security Awareness newsletter
  4. This software will upgrade from 2013 to 2017
  5. Workstations are refreshed
  6. Hashtag for NCSAM
  7. Information you work with to protect yourself and the organization
  8. Percent of increase of reported cyber incidents in 2013
  9. Number of core switches on the County network

18 Clues: Hashtag for NCSAMName of VPN ClientWorkstations are refreshedWhen you step away from your desk at workThis software will upgrade from 2013 to 2017In 2013 69% of incidents reported to US-CERTNumber of core switches on the County networkName of the Cyber Security Awareness newsletterPublisher of the Cyber Security Awareness Newsletter...

##FIT_Vocab.yourinitials 2013-05-15

##FIT_Vocab.yourinitials crossword puzzle
Across
  1. (optical, mechanical, touch pad)
  2. Disc Drive
  3. Decision Tool
  4. board
  5. Port
  6. port
  7. something you plug into a computer
  8. A place where you can save your work, besides a flash drive.
  9. Drive
  10. (Device)
  11. Host
Down
  1. Security
  2. Device
  3. of Office
  4. (display)
  5. Search Engine/Meta Crawlers
  6. 4G)
  7. Engine
  8. Slots
  9. Port
  10. (DSL, Cable)
  11. short term for documents
  12. Port
  13. (National Cyber Security Alliance)

24 Clues: 4G)PortPortportPortHostboardSlotsDriveDeviceEngineSecurity(Device)of Office(display)Disc Drive(DSL, Cable)Decision Toolshort term for documentsSearch Engine/Meta Crawlers(optical, mechanical, touch pad)something you plug into a computer(National Cyber Security Alliance)A place where you can save your work, besides a flash drive.

##FIT_Vocab.yourinitials 2013-05-15

##FIT_Vocab.yourinitials crossword puzzle
Across
  1. A place where you can save your work, besides a flash drive.
  2. Port
  3. Device
  4. (National Cyber Security Alliance)
  5. Decision Tool
  6. Search Engine/Meta Crawlers
  7. (display)
  8. something you plug into a computer
  9. of Office
  10. Port
  11. short term for documents
  12. Engine
  13. Slots
  14. port
Down
  1. Host
  2. Disc Drive
  3. (DSL, Cable)
  4. Security
  5. 4G)
  6. (optical, mechanical, touch pad)
  7. board
  8. Drive
  9. Port
  10. (Device)

24 Clues: 4G)HostPortPortPortportboardDriveSlotsDeviceEngineSecurity(Device)(display)of OfficeDisc Drive(DSL, Cable)Decision Toolshort term for documentsSearch Engine/Meta Crawlers(optical, mechanical, touch pad)(National Cyber Security Alliance)something you plug into a computerA place where you can save your work, besides a flash drive.

##FIT_Vocab.yourinitials 2013-05-15

##FIT_Vocab.yourinitials crossword puzzle
Across
  1. (National Cyber Security Alliance)
  2. Decision Tool
  3. (DSL, Cable)
  4. something you plug into a computer
  5. (optical, mechanical, touch pad)
  6. Port
  7. Port
  8. Engine
  9. Disc Drive
  10. Host
  11. Drive
  12. port
Down
  1. A place where you can save your work, besides a flash drive.
  2. 4G)
  3. Device
  4. Port
  5. short term for documents
  6. board
  7. Slots
  8. (display)
  9. of Office
  10. Security
  11. (Device)
  12. Search Engine/Meta Crawlers

24 Clues: 4G)PortPortPortHostportboardSlotsDriveDeviceEngineSecurity(Device)(display)of OfficeDisc Drive(DSL, Cable)Decision Toolshort term for documentsSearch Engine/Meta Crawlers(optical, mechanical, touch pad)(National Cyber Security Alliance)something you plug into a computerA place where you can save your work, besides a flash drive.

CyberHeist 2023-04-27

CyberHeist crossword puzzle
Across
  1. A type of software designed to protect against malware and other cyber threats.
  2. A type of cyber attack that involves taking control of a computer or network and demanding payment for release.
  3. A type of attack that bombards a network with traffic to bring it down.
  4. A security system designed to prevent unauthorised access to a network.
  5. A type of malware that encrypts files and demands payment to decrypt them.
  6. A type of cyber attack that uses stolen login credentials to access a network.
  7. Software designed to harm a computer or network.
  8. A type of cyber attack that targets physical infrastructure, such as power plants or transportation systems.
  9. A type of cyber attack that involves stealing sensitive information through a fake website or email.
  10. A type of cyber attack that targets vulnerabilities in software.
  11. The practice of accessing a computer network illegally.
Down
  1. A type of cyber attack that involves manipulating a user into taking an action that harms the network's security.
  2. A type of cyber attack that involves stealing sensitive information through an infected USB drive.
  3. A type of malware that copies itself and spreads throughout a network.
  4. A security process that requires two forms of authentication to access a network.
  5. A type of malware that can spy on a computer user's activities.
  6. A type of cyber attack that involves blocking access to a network until a ransom is paid.
  7. A form of phishing that targets high-profile individuals.
  8. A type of cyber attack that involves flooding a network with requests to disrupt its operation.
  9. A type of social engineering attack that impersonates a trusted entity to steal information. type of cyber attack that targets vulnerabilities in software.

20 Clues: Software designed to harm a computer or network.The practice of accessing a computer network illegally.A form of phishing that targets high-profile individuals.A type of malware that can spy on a computer user's activities.A type of cyber attack that targets vulnerabilities in software....

CISO Crossword Quiz - 1124 2024-10-17

CISO Crossword Quiz - 1124 crossword puzzle
Across
  1. Cyber security ________ Awareness guide Volume I, II, III is uploaded in Corporate Website of Bank under Customer Corner Tab
  2. CISO office is conducting daily _______ from 5 pm to 6 pm during the entire month on occasion of NCSAM on various Cyber Security topics
  3. Daily Email under the banner of Cyber ______ is being sent from CISO office to all staff members of Bank containing Cyber Security Tips for Creating Awareness
  4. Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________
  5. #_________ is hashtag for current year National Cyber Security Awareness Month campaign by Govt. of India
  6. Multilingual Email in ________ regional languages containing Cyber Security tips is sent to customers every month for creating Cyber Security Awareness
Down
  1. Cyber Security Awareness Material is available for Staff members in Bank’s intranet Portal _______ under the path Departments > CISO > Products
  2. Cyber ______ Diwas is observed on 1st Wednesday of every month as per guidelines of MHA, Govt of India
  3. National Cyber Security Awareness month is observed during _______ month
  4. “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month

10 Clues: National Cyber Security Awareness month is observed during _______ monthName of the Cyber Security Mascots for Union Bank of India is URkshak and U__________“ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month...

CISO Crossword Quiz - 1124 2024-10-17

CISO Crossword Quiz - 1124 crossword puzzle
Across
  1. Cyber security ________ Awareness guide Volume I, II, III is uploaded in Corporate Website of Bank under Customer Corner Tab
  2. National Cyber Security Awareness month is observed during _______ month
  3. #_________ is hashtag for current year National Cyber Security Awareness Month campaign by Govt. of India
  4. Cyber ______ Diwas is observed on 1st Wednesday of every month as per guidelines of MHA, Govt of India
  5. Daily Email under the banner of Cyber ______ is being sent from CISO office to all staff members of Bank containing Cyber Security Tips for Creating Awareness
Down
  1. CISO office is conducting daily _______ from 5 pm to 6 pm during the entire month of October on occasion of NCSAM on various Cyber Security topics
  2. “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month
  3. Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________
  4. Multilingual Email in ________ regional languages containing Cyber Security tips is sent to all the customers of Bank every month for creating Cyber Security Awareness
  5. Cyber Security Awareness Material is available for Staff members in Bank’s intranet Portal _______ under the path Departments > CISO > Products

10 Clues: National Cyber Security Awareness month is observed during _______ monthName of the Cyber Security Mascots for Union Bank of India is URkshak and U__________“ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month...

CSAM 2022 - Individual Game 1 2022-08-31

CSAM 2022 - Individual Game 1 crossword puzzle
Across
  1. "Chain" that deals with the movement of goods
  2. Exposed fragility of supply chain
  3. State with data privacy laws that QT has stores in
  4. Number of 3rd Party breaches this year
  5. QT team responsible for handling cyber security risk
  6. First state to enact a consumer privacy law
  7. EU Data Privacy acronym
Down
  1. Percentage of data breaches caused by 3rd parties
  2. QT team that responds to cyber security threats
  3. Cyber attack that fakes identity
  4. A third party that may have access to QT systems or data
  5. Malicious email attack
  6. Data type affected by data privacy laws
  7. Greatest cyber security risk (demographic)
  8. Term that means signs of malicious activity (2 words)

15 Clues: Malicious email attackEU Data Privacy acronymCyber attack that fakes identityExposed fragility of supply chainNumber of 3rd Party breaches this yearData type affected by data privacy lawsGreatest cyber security risk (demographic)First state to enact a consumer privacy law"Chain" that deals with the movement of goods...

Cyber Security 2022-05-20

Cyber Security crossword puzzle
Across
  1. Block of data transmitted across a network
  2. Software that can harm a system
  3. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  4. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
  5. Base-10 number system
  6. The fourth phase of ethical hacking
  7. The second phase of ethical hacking
  8. Malware that functions by spying on user activity without their knowledge
  9. The third phase of ethical hacking
  10. Process of encoding data to prevent theft
  11. Malware that can replicate itself to spread to other connected computers
  12. System for connecting a number of computer systems to form a local area network
  13. Performs tasks on command, allowing attackers to remotely control an affected computer
Down
  1. Operation of joining character strings end-to-end
  2. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
  3. Type of malware that corrupts and spreads between victims
  4. Software that takes advantage of a flaw in a computer system
  5. Subset of the internet with addresses sharing a common suffix
  6. Base-2 number system
  7. Base-16 number system
  8. The first phase of ethical hacking
  9. Type of cyber attack where attacker attempts to trick the victim into giving them information
  10. The creation of a child process from a parent process
  11. Attack where hacker injects false training data to corrupt the learning model
  12. Input value to a command

25 Clues: Base-2 number systemBase-10 number systemBase-16 number systemInput value to a commandSoftware that can harm a systemThe first phase of ethical hackingThe third phase of ethical hackingThe fourth phase of ethical hackingThe second phase of ethical hackingProcess of encoding data to prevent theftBlock of data transmitted across a network...

Cyber Security 2022-05-20

Cyber Security crossword puzzle
Across
  1. Base-10 number system
  2. Subset of the internet with addresses sharing a common suffix
  3. Base-16 number system
  4. Performs tasks on command, allowing attackers to remotely control an affected computer
  5. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  6. Malware that can replicate itself to spread to other connected computers
  7. Input value to a command
  8. Malware that functions by spying on user activity without their knowledge
  9. Process of encoding data to prevent theft
  10. Block of data transmitted across a network
  11. Type of cyber attack where attacker attempts to trick the victim into giving them information
  12. Type of malware that corrupts and spreads between victims
  13. System for connecting a number of computer systems to form a local area network
  14. The second phase of ethical hacking
  15. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
Down
  1. The third phase of ethical hacking
  2. Software that can harm a system
  3. Operation of joining character strings end-to-end
  4. Base-2 number system
  5. The first phase of ethical hacking
  6. The fourth phase of ethical hacking
  7. Software that takes advantage of a flaw in a computer system
  8. Attack where hacker injects false training data to corrupt the learning model
  9. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
  10. The creation of a child process from a parent process

25 Clues: Base-2 number systemBase-10 number systemBase-16 number systemInput value to a commandSoftware that can harm a systemThe third phase of ethical hackingThe first phase of ethical hackingThe fourth phase of ethical hackingThe second phase of ethical hackingProcess of encoding data to prevent theftBlock of data transmitted across a network...

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. data encryption ransom
  2. compromised computer network
  3. psychological manipulation
  4. system manager
  5. identifying threats
  6. unwanted advertisements
  7. multiple verification layers
  8. secret access keys
  9. protecting digital systems.
  10. interconnected devices
Down
  1. stolen identity
  2. data encrypt
  3. secure network connection
  4. wireless technology
  5. unauthorized access point
  6. internet address
  7. malicious digital actions
  8. digital information
  9. malicious software
  10. computer programs

20 Clues: data encryptsystem managerstolen identityinternet addresscomputer programsmalicious softwaresecret access keyswireless technologyidentifying threatsdigital informationdata encryption ransominterconnected devicesunwanted advertisementssecure network connectionunauthorized access pointmalicious digital actionspsychological manipulation...

Cyber Security 2019-12-09

Cyber Security crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing data , can inspect to see if suspicious
  2. A cyber attack intended to redirect a website's traffic to another, fake site.
  3. A reason why a password may be easy to guess and weak
  4. Code which downloads and displays adverts
  5. Measurements and calculations for human characteristics and the body
  6. If a mac address is on this, it will be able to access the system
  7. A type of hacker who gains access to data without permission and with the intent to harm the data
  8. Physical viewing an others sensitive information,by looking at people entering personal information onto a computer or a cash machine
  9. Code that is capable of copying itself to damage or destroy data
  10. A program that appears safe but is malicious and is designed to harm data. Installed by the user
Down
  1. What you may do to a computers MAC address if it is on a blacklist
  2. Also known as Pretexting
  3. Turning normal text into data that cant be read
  4. Code which allows hackers to see a computers activities
  5. Is used for a shared network /computer to ensure a person is who they claim to be
  6. A type of penetration testing that is a simulation of a black hat hacker attacking the system from outside the organisation
  7. Automatic way of telling if a machine or human is trying to access the system
  8. Code that is written with the intent to do harm
  9. Persuading an individual to share private information, usually via email or fake website
  10. Something you should do regularly to make your password harder to guess and data more protected

20 Clues: Also known as PretextingCode which downloads and displays advertsTurning normal text into data that cant be readCode that is written with the intent to do harmA reason why a password may be easy to guess and weakCode which allows hackers to see a computers activitiesCode that is capable of copying itself to damage or destroy data...

Cyber Security 2020-10-27

Cyber Security crossword puzzle
Across
  1. Software designed to block malware from entering protected networks.
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. a program that records every key struck on a keyboard and sends that information to an attacker.
  4. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
  5. The amount of data that can pass through a network or part of a network per second.
  6. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  8. or identity theft.
  9. until it is decrypted using a secret key.
  10. unsolicited emails sent to many addresses. The purpose of most spam is to make money through
  11. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  12. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  13. The process of using codes to make readable information unreadable. Encrypted information cannot be
  14. a data storage device that is used to store, back up, and transfer computer files.
  15. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Down
  1. consists of code written in a programming language that instructs computers to perform specific tasks.
  2. Extra copies of computer files that can be used to restore files that are lost or damaged.
  3. Two or more interconnected devices that can exchange data.
  4. a computer or computer program that provides specific services on a network, such as an email server
  5. port a type of connection between devices that can exchange information and power supply.
  6. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
  7. Computer programs that can block, detect, and remove viruses and other malware.
  8. A company or organization that gives users and devices access to the Internet.
  9. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  10. programs.
  11. directs emails and a web server that serves up web pages.
  12. A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

27 Clues: programs.or identity theft.until it is decrypted using a secret key.directs emails and a web server that serves up web pages.Two or more interconnected devices that can exchange data.Software designed to block malware from entering protected networks.A company or organization that gives users and devices access to the Internet....

Cyber security 2024-09-18

Cyber security crossword puzzle
Across
  1. The measurement and analysis of physical characteristics, such as fingerprints or facial recognition, used to verify a person's identity.
  2. A type of software that displays unwanted advertisements on a user's screen, often in the form of pop-ups, and may track browsing activities.
  3. A malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity, usually through email or other forms of communication.
  5. A standalone malware program that replicates itself to spread to other computers, often causing harm to networks by consuming bandwidth.
  6. A trial-and-error method used to decode encrypted data, such as passwords, by systematically checking all possible combinations.
  7. An additional layer of security requiring users to provide two forms of identification to verify their identity, usually a password and a code sent to their device.
  8. An attack designed to overwhelm a system or network by flooding it with traffic, rendering it unable to provide services to legitimate users.
  9. The act of gaining unauthorized access to computers, networks, or data, often to exploit vulnerabilities for malicious purposes.
  10. A cyberattack where users are redirected from a legitimate website to a fraudulent one without their knowledge, often used to steal login credentials.
  11. A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access.
  12. A DoS attack launched from multiple sources simultaneously, making it harder to stop and causing greater disruption to the target system or network.
Down
  1. A server that acts as an intermediary between a user's device and the internet, used to hide the user's IP address or bypass network restrictions.
  2. A service that encrypts a user's internet connection and masks their IP address, providing privacy and security when using public networks.
  3. A manipulation technique used to trick individuals into giving up confidential information, often through psychological manipulation rather than technical exploits.
  4. A type of malware disguised as legitimate software, used to access systems by tricking users into loading and executing the malware on their systems.
  5. A cryptographic protocol designed to provide secure communication over a computer network, often viewed as the successor to SSL.
  6. Software that secretly collects information about a user's activities without their knowledge, often for advertising or theft purposes.
  7. A protocol for establishing authenticated and encrypted links between networked computers, often used to secure communication over the internet.
  8. A secret combination of characters used to verify a user's identity and grant access to a computer system or network.
  9. The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information.
  10. A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
  11. A unique identifier assigned to an individual for accessing a computer system, often used in conjunction with a password.

23 Clues: A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access.A secret combination of characters used to verify a user's identity and grant access to a computer system or network.The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information....

Cyber Security 2023-04-18

Cyber Security crossword puzzle
Across
  1. Malicious software spread over a network.
  2. Someone who breaks into a device.
  3. Illegally exploit vulnerable networks.
  4. workers use their own devices.
  5. A disguised type of malware.
  6. Media manipulation to seem real.
  7. a secure internet connection
  8. Malware that collects/transmits private information.
  9. viruses that try for money.
  10. Systems that prevent unauthorized access.
  11. cyber attacks using sensitive information.
  12. Hyperlinks that seem real.
Down
  1. a group of bad computers
  2. software designed to damage computers.
  3. Online harassment.
  4. Manipulating a system.
  5. Security measures using physiology and behavior.
  6. Unwanted Ads on a device.
  7. Scrambled data for authorized users.
  8. Hidden malware when clicked on.

20 Clues: Online harassment.Manipulating a system.a group of bad computersUnwanted Ads on a device.Hyperlinks that seem real.viruses that try for money.A disguised type of malware.a secure internet connectionworkers use their own devices.Hidden malware when clicked on.Media manipulation to seem real.Someone who breaks into a device....

Cyber Security 2023-04-05

Cyber Security crossword puzzle
Across
  1. A malware synonymous with EternalBlue
  2. Best cybersecurity tool
  3. Unauthorised access of someone's gadgets
  4. Lock icon in the browser address bar for a URL
  5. Man made universe which we can't live without
  6. Hackers demand ransom in this currency
  7. Most dangerous computer virus in history
  8. Type of malware that threatens to expose information
  9. Malicious code infecting your system
  10. Best practices to keep your system secure
Down
  1. Key to open your account
  2. Ensures business continuity in CIA triad
  3. Target contacted by email or telephone or message
  4. People and management problem
  5. Browser for the dark web
  6. Social media platform is a hackers’ favourite
  7. Unnecessary mail chocking the network
  8. Malicious software which is installed in your system when you click a link
  9. Operating system for cybersecurity
  10. Computer virus that destroyed photos, audio files and documents

20 Clues: Best cybersecurity toolKey to open your accountBrowser for the dark webPeople and management problemOperating system for cybersecurityMalicious code infecting your systemA malware synonymous with EternalBlueUnnecessary mail chocking the networkHackers demand ransom in this currencyEnsures business continuity in CIA triad...

cyber security 2025-08-26

cyber security crossword puzzle
Across
  1. A fake email scam designed to steal personal information.
  2. Unauthorized access to sensitive systems or data.
  3. Software or hardware that records everything typed.
  4. An update that fixes security vulnerabilities in software.
  5. A network of compromised computers controlled remotely.
  6. Malware that attaches to files and spreads when they open.
  7. Malware disguised as legitimate software.
  8. A vulnerability that hackers exploit before it’s patched.
  9. General term for malicious software.
Down
  1. The process of converting data into a secret code.
  2. Attack that overwhelms a system with massive fake traffic.
  3. Software that secretly gathers user information.
  4. Hidden access point into a system left by attackers.
  5. Malware that hides itself deep in the operating system.
  6. Code or tool that takes advantage of a vulnerability.
  7. Login method requiring two forms of authentication.
  8. One-way process of turning data into a fixed-length string.
  9. Self-replicating program that spreads without human help.
  10. Malware that locks files and demands payment.
  11. Network security system that blocks unauthorized access.

20 Clues: General term for malicious software.Malware disguised as legitimate software.Malware that locks files and demands payment.Software that secretly gathers user information.Unauthorized access to sensitive systems or data.The process of converting data into a secret code.Software or hardware that records everything typed....

Cyber security 2017-02-23

Cyber security crossword puzzle
Across
  1. firewall clue
  2. pentest clue
  3. packet clue
  4. nixer clue
  5. cyberowl clue
  6. ml clue
  7. riz clue
  8. audit clue
  9. ntp clue
  10. iot clue
  11. mitm clue
  12. gdpr clue
  13. tcpip clue
Down
  1. botnet clue
  2. owasp clue
  3. ce clue
  4. ddos clue
  5. red team clue
  6. bchain clue
  7. risk clue
  8. mirai clue
  9. crypto clue
  10. network clue
  11. iasme clue
  12. dns clue

25 Clues: ce clueml clueriz cluedns cluentp clueiot clueddos cluerisk cluemitm cluegdpr clueowasp cluenixer cluemirai clueiasme clueaudit cluetcpip cluebotnet cluebchain cluepacket cluecrypto cluepentest cluenetwork cluered team cluefirewall cluecyberowl clue

Cyber Security. 2017-06-30

Cyber Security. crossword puzzle
Across
  1. Obtaining access to another system without permission.
  2. software that lets a user to obtain information about another's computer activities.
  3. is a software that blocks access to the victim's data and threatens to publish or delete it until ransom is paid.
  4. is the attempt to obtain sensitive information such as usernames, passwords, and credit card details.
  5. a person who gains unauthorized access to computer files or networks in order to further social or political ends.
  6. the action of protecting, or the state of being protected.•a person or thing that protects someone or something.
  7. software which is specifically designed to damage a computer system.
  8. the process of converting information or data into a code, especially to prevent unauthorized access.
  9. network of computers infected with malicious software and controlled as a group without the owners' knowledge.
  10. software that gets into your devise without you knowing.
  11. Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction.
  12. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  13. Irrelevant messages sent over the Internet, typically to large numbers of users, for advertising.
Down
  1. •a string of characters that allows access to a computer, interface, or system.
  2. A group or system of interconnected people or things.
  3. is a cyber attack redirecting a website's traffic to another from a fake site.It can be conducted by changing the hosts file on the computer.
  4. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.
  5. a situation involving exposure to danger.
  6. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message.
  7. software that attaches itself to all you contacts and sends itself to others in an endless cycle.
  8. network an online community of people with a common interest who use a website or other technologies to communicate with each other and share information, resources You tend to be in a community with friends, colleagues and family.
  9. the fraudulent practice of using another person's name and personal information in order to obtain credit, loans.
  10. logger a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  11. an attempt by hackers to damage or destroy a computer network or system.
  12. Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
  13. a person who uses computers to gain unauthorized access to data.
  14. In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable for the user.

27 Clues: a situation involving exposure to danger.A group or system of interconnected people or things.Obtaining access to another system without permission.software that gets into your devise without you knowing.a person who uses computers to gain unauthorized access to data.software which is specifically designed to damage a computer system....

Cyber Security 2020-09-09

Cyber Security crossword puzzle
Across
  1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
  2. Chief Information Security Officer
  3. Avoid sending personal information via
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  6. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
  7. A malicious program designed to record which keys are pressed on a computer keyboard
  8. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
  9. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
  10. Unwanted advertising that comes to your email address
  11. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  12. An unauthorized person seeking to maliciously disrupt or damage a computer
  13. A string of words that must be used to gain access to a computer system or service
  14. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  15. An Internet scam that targets unsuspecting users through email
Down
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  2. Always _ _ _ _ your computer when you leave your desk
  3. Small files that Web sites put on your computer hard disk drive when you first visit
  4. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
  5. Domino's is known for selling
  6. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
  7. Global system of interconnected computer networks that use the Internet protocol suite
  8. media Websites and applications that enable users to create and share content or to participate in social networking
  9. An acronym that stands for distributed denial of service – a form of cyber attack
  10. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  11. A characteristic or specific weakness that renders an organization or asset open to exploitation.
  12. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  13. An attempt by hackers to damage or destroy a computer network or system
  14. A type of malware designed to block access to a computer system or data until a sum of money is paid
  15. A system invented by Google that uses a test to establish if a user is a human or a robot
  16. A regular system update that is designed to cover security blunders that have been discovered

31 Clues: Domino's is known for sellingChief Information Security OfficerAvoid sending personal information viaAlways _ _ _ _ your computer when you leave your deskUnwanted advertising that comes to your email addressLock your _ _ _ _ _ _ _ _ and mobile phone when not in useInformation security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _...

Cyber security 2023-09-09

Cyber security crossword puzzle
Across
  1. software that holds your data hostage
  2. helps make sure that a user types in the correct url to get into a desired website
  3. where a bunch of false information paper on ur screen forcing u to click on it causing for ur device to get infected
  4. one option that can help protect your business against losses resulting from a cyber attack
  5. a way of fighting against Phishing attacks by verifying the emails that are being sent
  6. the act of imitating to be someone reputable and convince another person to reveal information
  7. one of the most safest way to secure wireless connections
  8. convert data into a code to prevent unauthorized access
  9. a system to block unauthorized data
Down
  1. the act of protecting systems from digital attacks
  2. when data has been leaked or obtained in an illegal way
  3. a service that hosts websites for clients, it facilitates maintenance of a site and makes it accessible on the World Wide Web
  4. a action of trying to steal someone information
  5. a series of letter that only a trusted person would know it provides security to accounts
  6. a way to identify email from spoofers
  7. designed to disrupt, damage, or gain unauthorized access to a computer system.
  8. group of Computers that share user information
  9. when a person attempts to want to help u out wit a problem in ur computer
  10. a group of private computers that infect malicious software
  11. act of passing as someone, once you have accessed his private information

20 Clues: a system to block unauthorized datasoftware that holds your data hostagea way to identify email from spoofersgroup of Computers that share user informationa action of trying to steal someone informationthe act of protecting systems from digital attackswhen data has been leaked or obtained in an illegal way...

Cyber Security 2023-09-11

Cyber Security crossword puzzle
Across
  1. Facts/statistics and information
  2. Technique to acquire sensitive data
  3. A private network that is virtual
  4. Operating Information used by a computer
  5. Power to enforce obedience
  6. Criminals that use technology
  7. Something that gives safety
  8. Having protection from danger
  9. Proving something is true
  10. Malware designed to deny access to files on your computer
Down
  1. Violation of something
  2. Being responsible for something
  3. Protocol designed to protect communication over a network
  4. State of being exposed to and attack
  5. Converting data or information into code
  6. Compliance with rules/standards
  7. A person who pretends to be someone else
  8. A fraud
  9. Sending emails with a fake senders address
  10. Digital currency

20 Clues: A fraudDigital currencyViolation of somethingProving something is truePower to enforce obedienceSomething that gives safetyCriminals that use technologyHaving protection from dangerBeing responsible for somethingCompliance with rules/standardsFacts/statistics and informationA private network that is virtualTechnique to acquire sensitive data...

Cyber Security 2024-02-20

Cyber Security crossword puzzle
Across
  1. Unsolicited bulk emails
  2. Deceptive email tactic
  3. Software for detecting and removing malware
  4. Harmful software
  5. Unauthorized access seeker
  6. Verification process
  7. Newly discovered vulnerability
  8. Secure data transmission protocol
  9. Secure network connection
  10. Network of infected computers controlled remotely
  11. Denial of Service attack
Down
  1. Malicious software demanding payment
  2. Weakness in a system's security
  3. Access code
  4. Network security barrier
  5. Identity verification using unique physical traits
  6. Protection of internet-connected systems and data
  7. Software update
  8. Data protection method
  9. Malware disguised as legitimate software

20 Clues: Access codeSoftware updateHarmful softwareVerification processDeceptive email tacticData protection methodUnsolicited bulk emailsNetwork security barrierDenial of Service attackSecure network connectionUnauthorized access seekerNewly discovered vulnerabilityWeakness in a system's securitySecure data transmission protocol...

Cyber Security 2024-08-11

Cyber Security crossword puzzle
Across
  1. - Open-access
  2. - Protective-measure
  3. - Connected-system
  4. - Origin-info
  5. - Innovation-tools
  6. - Behavior-rules
  7. - Correct-form
  8. - Technique-used
  9. - Grasp-meaning
  10. - Personal-boundaries
  11. - Obtain-asset
  12. - Secure-code
  13. - Lawful-acts
  14. - Showcase-example
  15. - Community-rules
  16. - Valuable-item
  17. - Identify-threats
  18. - Official-regulations
  19. - Knowledge-data
  20. - Recognized-known
Down
  1. - Societal-norms
  2. - No-cost
  3. - Represent-example
  4. - Investigate-topic
  5. - Problematic-matters
  6. - Guidelines-rules
  7. - Digital-responsibility
  8. - Protection-law
  9. - Free-access
  10. - Available-choices
  11. - Permissible-actions
  12. - Distributing-resource
  13. - Learner-individual
  14. - Tech-based
  15. - Progress-innovation
  16. - Safety-measures
  17. - Reference-source
  18. - Stop-risks
  19. - Morally-right
  20. - Evaluate-differences

40 Clues: - No-cost- Tech-based- Stop-risks- Open-access- Origin-info- Free-access- Secure-code- Lawful-acts- Correct-form- Obtain-asset- Grasp-meaning- Valuable-item- Morally-right- Societal-norms- Behavior-rules- Protection-law- Technique-used- Knowledge-data- Safety-measures- Community-rules- Connected-system- Guidelines-rules- Innovation-tools...

Cyber Security 2024-08-29

Cyber Security crossword puzzle
Across
  1. Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
  2. tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
  3. Jenis malware yang merekam aktivitas pengguna di komputer
  4. Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
  5. Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
  6. jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
  7. proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
  8. Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
  9. Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
  1. Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
  2. proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
  3. proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
  4. Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
  5. Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
  6. Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
  7. Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
  8. Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
  9. Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
  10. Jenis malware yang menyebarkan dirinya melalui email atau lampiran
  11. Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain

20 Clues: Jenis malware yang merekam aktivitas pengguna di komputerTeknik manipulasi psikologis untuk mendapatkan informasi sensitifJenis malware yang menyebarkan dirinya melalui email atau lampiranJenis malware yang menyamarkan diri sebagai program yang baik dan bergunaPerangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer...

Cyber Security 2025-03-16

Cyber Security crossword puzzle
Across
  1. Identity to access a website
  2. Secretly collects private info
  3. Locks you out system until paid
  4. Process to verify someone's identity
  5. Way to send messages over internet
  6. A software update to fix vulnerabilities
  7. Combination of stuff for security
  8. Software designed with intent to harm
  9. Disguises as legitimate software but bad
Down
  1. Programs that attach and spread files
  2. Attempt by Hackers to compromise data
  3. Detects, prevents, and removes malware
  4. Bad guy who steals info
  5. A trick to get private info
  6. Scrambles info to protect it
  7. Barrier between a trusted network
  8. Intrusively displays unwanted advertisements
  9. Overloads a network to kill it
  10. Self replicating program that spreads independently
  11. Network of malware infected computers

20 Clues: Bad guy who steals infoA trick to get private infoIdentity to access a websiteScrambles info to protect itSecretly collects private infoOverloads a network to kill itLocks you out system until paidBarrier between a trusted networkCombination of stuff for securityWay to send messages over internetProcess to verify someone's identity...

cyber security 2025-05-08

cyber security crossword puzzle
Across
  1. Copying someone’s work and claiming it as your own.
  2. Unwanted bulk emails sent to many people.
  3. The online record you leave behind.
  4. Ethical rules to follow while using the internet.
  5. Illegal copying or sharing of software.
  6. Unethical act of harassing someone online.
  7. A person who breaks into systems.
  8. Falsely pretending to be someone to steal info.
  9. A person who breaks into systems to cause harm or steal data.
  10. The unique ID every device has on a network.
  11. A malicious program that spreads by itself.
  12. Ethical use of technology and internet.
Down
  1. Fake websites or emails used to trick users.
  2. The act of accessing a system without permission.
  3. A small file that stores user data in the browser.
  4. A malicious trick where users click on invisible or disguised elements.
  5. A legal right that protects original digital works.
  6. A system that filters network traffic for safety.
  7. Secret word used to access an account.
  8. Transforming information to hide its meaning.

20 Clues: A person who breaks into systems.The online record you leave behind.Secret word used to access an account.Illegal copying or sharing of software.Ethical use of technology and internet.Unwanted bulk emails sent to many people.Unethical act of harassing someone online.A malicious program that spreads by itself....

cyber security 2022-11-28

cyber security crossword puzzle
Across
  1. / something special to a person and they can do it with a pen or pencil for important documents
  2. / malware
  3. / a slimy snake like insect that lives in mud and is basically prey to every other living organism
  4. /opposite of spyware
  5. / the opposite of decryption
  6. / a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
  7. patch
  8. logger /something that records what keys on the keyboard are clicked
  9. / making something easier to understand in cyber security terms opposite of encryption
  10. / a giant hollow horse statue made in the olden days and it has trojan in its name
Down
  1. / opposite of virus
  2. / botnet
  3. / ware made for spying
  4. firewall / a type of firewall
  5. / a type of virus
  6. pack/ a pack of service
  7. / rookit
  8. / an undead creature
  9. it is ransomware
  10. / the door at the back of the house

20 Clues: patch/ rookit/ malware/ botnetit is ransomware/ a type of virus/ opposite of virus/opposite of spyware/ an undead creature/ ware made for spyingpack/ a pack of service/ the opposite of decryptionfirewall / a type of firewall/ the door at the back of the houselogger /something that records what keys on the keyboard are clicked...

Cyber Security 2023-02-10

Cyber Security crossword puzzle
Across
  1. or identity theft.
  2. A company or organization that gives users and devices access to the Internet
  3. often by using emails or fake websites that look like they are from trusted organizations.
  4. Someone who uses computers and computer networks to disrupt services or share secret information in
  5. Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  6. until it is decrypted using a secret key
  7. Consists of code written in a programming language that instructs computers to perform specific tasks.
  8. computers are usually used to cause damage that couldn’t be achieved with a single computer
  9. Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be
  2. Attempting to trick people into revealing sensitive information, such as passwords and credit card
  3. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
  4. Extra copies of computer files that can be used to restore files that are lost or damaged
  5. A distributed denial of service attack attempts to make an online service, like a website, unavailable by
  6. software Computer programs that can block, detect, and remove viruses and other malware
  7. A computer or computer program that provides specific services on a network, such as an email server
  8. It then demands a ransom if the victim wants his or her files back.
  9. Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
  10. it with a flood of traffic from a team of computers.
  11. effort to draw attention to political or social issues.
  12. directs emails and a web server that serves up web pages.
  13. Software designed to block malware from entering protected networks
  14. programs.
  15. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
  16. The amount of data that can pass through a network or part of a network per second

25 Clues: programs.or identity theft.until it is decrypted using a secret keyit with a flood of traffic from a team of computers.effort to draw attention to political or social issues.directs emails and a web server that serves up web pages.It then demands a ransom if the victim wants his or her files back....

Cyber security 2025-08-26

Cyber security crossword puzzle
Across
  1. – Blocks unauthorized network traffic
  2. – Tracks browsing activity
  3. – Secure private network tunnel
  4. – Harmful software program
  5. – Network of infected computers
  6. – Disguised harmful program
  7. – Secret login credential
  8. – Fixes software vulnerability
  9. – Fake email scam attempt
  10. – Self-replicating malware
Down
  1. – Records keystrokes secretly
  2. – Extra login verification step
  3. – Collects user information secretly
  4. – Scrambles data for security
  5. – Locks files for payment
  6. – Protects against malware
  7. – Translates domain to IP
  8. – Unwanted bulk email
  9. – Hides malicious software
  10. – Breaks into systems

20 Clues: – Unwanted bulk email– Breaks into systems– Locks files for payment– Secret login credential– Translates domain to IP– Fake email scam attempt– Tracks browsing activity– Harmful software program– Protects against malware– Hides malicious software– Self-replicating malware– Disguised harmful program– Records keystrokes secretly...

Cyber Security 2025-10-11

Cyber Security crossword puzzle
Across
  1. A malicious code that attaches itself to clean files and spreads to other files
  2. A cryptographic value used to verify data authenticity and integrity
  3. Software that secretly gathers user information without permission
  4. A secure connection that encrypts data between a device and a network
  5. Software designed to harm or exploit any programmable device or network
  6. Authentication method based on unique biological traits like fingerprints
  7. An attack that floods a system with traffic, causing a denial of service
  8. A software vulnerability unknown to the vendor and unpatched
  9. The process of converting data into a coded form to prevent unauthorized access
  10. A type of malware disguised as legitimate software
  11. Malware that locks or encrypts data and demands payment to restore access
  12. A network of infected computers controlled remotely by hackers
  13. A secret way of bypassing normal authentication to access a system
  14. A self-replicating program that spreads through networks
  15. A test used to differentiate between humans and automated bots
  16. System that monitors network traffic for suspicious activity
Down
  1. Any attempt to damage, steal, or disrupt data or computer systems
  2. Manipulating people into revealing confidential information
  3. A tool used to store and manage multiple passwords securely
  4. A person who gains unauthorized access to computer systems
  5. Software that detects and removes malicious programs
  6. The process of verifying the identity of a user or system
  7. A secret word or phrase used to access a system or account
  8. A cyber attack that tricks users into revealing personal information through fake emails or websites
  9. The release of sensitive or confidential information to unauthorized people
  10. Settings that determine what network traffic is allowed or blocked
  11. An update designed to fix vulnerabilities in software
  12. A distributed version of a DoS attack using multiple computers
  13. The key used to encode or decode encrypted data
  14. A network security system that monitors and controls incoming and outgoing traffic

30 Clues: The key used to encode or decode encrypted dataA type of malware disguised as legitimate softwareSoftware that detects and removes malicious programsAn update designed to fix vulnerabilities in softwareA self-replicating program that spreads through networksThe process of verifying the identity of a user or system...

Cyber Security 2020-09-09

Cyber Security crossword puzzle
Across
  1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
  2. Chief Information Security Officer
  3. To protect personal information, avoid sending it via
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  6. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
  7. A malicious program designed to record which keys are pressed on a computer keyboard
  8. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
  9. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
  10. Unwanted advertising that comes to your email address
  11. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  12. An unauthorized person seeking to maliciously disrupt or damage a computer
  13. a string of words that must be used to gain access to a computer system or service
  14. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  15. An Internet scam that targets unsuspecting users through email
Down
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  2. Always _______your computer when you leave your desk
  3. Small files that Web sites put on your computer hard disk drive when you first visit
  4. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
  5. Domino's is known for selling
  6. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
  7. Global system of interconnected computer networks that use the Internet protocol suite
  8. media websites and applications that enable users to create and share content or to participate in social networking
  9. An acronym that stands for distributed denial of service – a form of cyber attack
  10. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  11. A characteristic or specific weakness that renders an organization or asset open to exploitation.
  12. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  13. An attempt by hackers to damage or destroy a computer network or system
  14. A type of malware designed to block access to a computer system or data until a sum of money is paid
  15. A system invented by Google that uses a test to establish if a user is a human or a robot
  16. A regular system update that is designed to cover security blunders that have been discovered

31 Clues: Domino's is known for sellingChief Information Security OfficerAlways _______your computer when you leave your deskTo protect personal information, avoid sending it viaUnwanted advertising that comes to your email addressLock your _ _ _ _ _ _ _ _ and mobile phone when not in useInformation security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _...

Cyber Security 2023-11-29

Cyber Security crossword puzzle
Across
  1. The outer boundary of a network, often protected by firewalls and other security measures.
  2. Authentication based on unique physical or behavioral traits
  3. A self-replicating malware that spreads across networks.
  4. A decoy system designed to attract and detect cyber-attacks.
  5. Security Operations Center, a centralized unit for monitoring and managing security
  6. The process of converting data into a code to prevent unauthorized access.
  7. Weakness in a system that can be exploited by attackers.
  8. The process of converting input data into a fixed-size string of characters, often used for data integrity.
  9. Distributed Denial of Service, a cyber-attack that overwhelms a system with traffic.
Down
  1. The device or node where a network connection is terminated.
  2. Malicious software that encrypts data and demands a payment for its release
  3. Software designed to harm or exploit computer systems.
  4. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity.
  5. A software update designed to fix vulnerabilities or improve functionality.
  6. A technology that ensures secure communication over an untrusted network
  7. This network security device acts as a barrier to block unauthorized access.
  8. Unauthorized interception of network traffic to capture and analyze data.
  9. A systematic examination of security measures to identify vulnerabilities.
  10. A security event that compromises the confidentiality, integrity, or availability of data.
  11. Faking the source of network packets to deceive a system

20 Clues: Software designed to harm or exploit computer systems.A self-replicating malware that spreads across networks.Weakness in a system that can be exploited by attackers.Faking the source of network packets to deceive a systemThe device or node where a network connection is terminated.Authentication based on unique physical or behavioral traits...

Cyber Security 2023-04-18

Cyber Security crossword puzzle
Across
  1. Middle man wifi network attack.
  2. Hacker hired to test security.
  3. Scrambling data to prevent theft.
  4. Malicious elements that trick users.
  5. Website temporarily shutting down.
  6. Malicious commands.
  7. Network of infected computers.
  8. Malware that 'spies' on users.
Down
  1. Software designed to hurt computer systems.
  2. Verifies your identity.
  3. Online harassment.
  4. Cyber attack that includes fake sensitive info.
  5. Protects a device from attack.
  6. AI images showing Trump's Arrest.
  7. Used during the encryption process.
  8. Private network that uses encryption.
  9. Unique device network identifier.
  10. Demands ransom to regain access to computers.
  11. Hacker changes IP address of email.
  12. Higher risk of business security breach.

20 Clues: Online harassment.Malicious commands.Verifies your identity.Protects a device from attack.Hacker hired to test security.Network of infected computers.Malware that 'spies' on users.Middle man wifi network attack.AI images showing Trump's Arrest.Scrambling data to prevent theft.Unique device network identifier.Website temporarily shutting down....

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. Something that protects your information
  2. A way of baiting for access to personal information
  3. A tool used to link two or more packet-switched networks or subnetworks
  4. A device to gain access to the internet
  5. A way of computing devices
  6. a way of identifying someone on the internet/ online services
  7. an operating system for mobile devices
  8. No cable internet
  9. images saved to your devices, pngs, screenshots ect.
Down
  1. to make sure something is valid from the information that is being input
  2. 8 characters that allow you to have access to something
  3. Converts into code or cipher to block unauthorized access
  4. listening in between a conversation to gain personal information about your security breaches to accounts or info online
  5. Term for having information that is collected
  6. A fraud or a way of stealing ones information
  7. online web; people across the world have access using a device
  8. a link that you pressed that attacks your software and holds onto your data
  9. disrupts and damages the computer system
  10. Attacks your computer and affects the data that is stored negatively
  11. A program or other operating information used by a computer

20 Clues: No cable internetA way of computing devicesan operating system for mobile devicesA device to gain access to the internetSomething that protects your informationdisrupts and damages the computer systemTerm for having information that is collectedA fraud or a way of stealing ones informationA way of baiting for access to personal information...

Cyber Security 2025-03-27

Cyber Security crossword puzzle
Across
  1. Private
  2. Light
  3. Local
  4. Interconnected
  5. External
  6. Packet
  7. Personal
  8. Frequency
  9. Communication
  10. Layers
  11. Mobility
  12. Shortwave
  13. Centralized
  14. Cable
Down
  1. High-speed
  2. Spectrum
  3. Gateway
  4. Signal
  5. Wi-Fi
  6. Transmission
  7. Light
  8. Network
  9. Dial-up
  10. Wide
  11. Conductor

25 Clues: WideLightLocalWi-FiLightCableSignalPacketLayersPrivateGatewayNetworkDial-upSpectrumExternalPersonalMobilityFrequencyShortwaveConductorHigh-speedCentralizedTransmissionCommunicationInterconnected

Cyber Security 2025-08-20

Cyber Security crossword puzzle
Across
  1. Network of infected computers controlled remotely
  2. Software that blocks unauthorized access
  3. Disguised malicious program
  4. Self-replicating malicious program
  5. Verification of identity
  6. Unauthorized access to data
  7. A scam to steal sensitive information via email
  8. Tool that records keystrokes
  9. Secret combination of characters used for access
  10. Malicious software that spreads across systems
Down
  1. Code that takes advantage of a system weakness
  2. Malware that demands money to restore access
  3. Attack targeting computer systems
  4. Software that secretly monitors activity
  5. Program designed to detect malicious software
  6. Software update fixing security vulnerabilities
  7. Malicious software designed to self-replicate
  8. Process of converting data into a coded form
  9. Secure private connection over the Internet
  10. Someone who breaks into computer systems

20 Clues: Verification of identityDisguised malicious programUnauthorized access to dataTool that records keystrokesAttack targeting computer systemsSelf-replicating malicious programSoftware that blocks unauthorized accessSoftware that secretly monitors activitySomeone who breaks into computer systemsSecure private connection over the Internet...

Cyber Security 2025-08-27

Cyber Security crossword puzzle
Across
  1. Secures internet connection
  2. Network of infected computers
  3. Decoy system for hackers
  4. Blocks unauthorized access
  5. Hides malicious processes
  6. Unknown software flaw
  7. Locks data for payment
  8. Converts data to code
  9. Secretly monitors activity
  10. Overloads servers with traffic
Down
  1. Fixes software vulnerabilities
  2. Scrambles data for secrecy
  3. Hidden access point
  4. Records typed keystrokes
  5. Encrypts web communications
  6. Fake emails trick users
  7. Malicious software program
  8. Extra login verification
  9. Detects and removes malware
  10. Self-replicating malware

20 Clues: Hidden access pointUnknown software flawConverts data to codeLocks data for paymentFake emails trick usersDecoy system for hackersRecords typed keystrokesExtra login verificationSelf-replicating malwareHides malicious processesScrambles data for secrecyBlocks unauthorized accessMalicious software programSecretly monitors activity...

Cyber Security 2022-10-12

Cyber Security crossword puzzle
Across
  1. Multifactor Authentication is often shorten to _ _ _
  2. The means by which an individual provides his/her permission for the use or disclosure of their PII.
  3. Information Technology help desk through which service requests, information security incidents, and general IT questions may be directed to.
  4. A small file placed on a computer by a website assigning a unique ID to the device
  5. What all employees are when they handle Personally Identifiable Information
  6. What you are if you complete this crossword by the end of the week.
  7. The style of cyber attack where a criminal attempts to get you to click on a link in an email.
  8. The process by which an individual’s access to accounts and data is reviewed on a routine basis.
  9. Recently published CHS notice relating to how CHS handles employees personal data.
Down
  1. The style of cyber attack where a criminal holds a company's data hostage until they pay a ransom.
  2. A California law detailing data protection and privacy regulations for all individual citizens of California (Abr)
  3. The name of an account with elevated privileges to administer a system or application.
  4. Data which is limited to individuals with a need-to-know. May be subject to legal or contractual confidentiality requirements.
  5. Data which is subject to legislative, legal, and industry regulations and must be Handled with the highest sensitivity and may be subject to breach notification laws.
  6. CHS approved Password Manager.
  7. Complete this phrase "Where to Store, What to _____"
  8. The type of engineering which targets "bugs in the human hardware"
  9. Permission entitled to an individual allowing them to use a system or view data.
  10. A European Union (EU) law detailing data protection and privacy regulations for all individual citizens of the EU and the European Economic Area (EEA)(Abr)
  11. Data which CHS has made available and approved for public dissemination.

20 Clues: CHS approved Password Manager.Multifactor Authentication is often shorten to _ _ _Complete this phrase "Where to Store, What to _____"The type of engineering which targets "bugs in the human hardware"What you are if you complete this crossword by the end of the week.Data which CHS has made available and approved for public dissemination....

Cyber security 2023-04-28

Cyber security crossword puzzle
Across
  1. Software designed to harm or exploit any device or network it infects.
  2. A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
  3. Software designed to detect and remove viruses and other types of malware.
  4. detection system Software that monitors a network or system for signs of unauthorized access or activity.
  5. attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
  6. authentication A security measure that requires two forms of identification to access an account.
  7. breach The unauthorized access, use, or disclosure of sensitive information.
  8. engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
  9. force attack A method of guessing a password by trying every possible combination until the correct one is found.
  10. security The practice of securing a network from unauthorized access or attacks.
  11. An update to software that fixes a vulnerability or bug.
  12. Criminal activity that involves the use of digital devices or networks.
  13. testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
  1. exploit An attack that exploits a previously unknown vulnerability in a software application or system.
  2. The process of verifying the identity of a user or system.
  3. A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
  4. Method of converting plain text into a code that can only be read by authorized parties.
  5. A weakness or flaw in a system that can be exploited by attackers.
  6. Network security system that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems and networks from digital attacks, theft, and damage.

20 Clues: An update to software that fixes a vulnerability or bug.The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.Software designed to harm or exploit any device or network it infects.Criminal activity that involves the use of digital devices or networks....

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. to save a state of something to restore later
  2. to lie
  3. resources
  4. to gain control of
  5. pops up that appears on websites to lead you to other websites
  6. combination of letters used to lock a file or account
  7. National Institution of Standards and Technology at the US department of Commerce
  8. applications or programs
  9. to fix something
  10. to delete
  11. to identify
  12. enter your account using your credentials
Down
  1. criminals of the internet
  2. Change something to a newer version of it
  3. malware that negatively modifies your computer
  4. to return something to a previous state
  5. not given permission
  6. Get rid of
  7. to inform someone of something
  8. to protect something from outsiders
  9. a program specifically designed to fulfill a purpose for users

21 Clues: to lieresourcesto deleteGet rid ofto identifyto fix somethingto gain control ofnot given permissionapplications or programscriminals of the internetto inform someone of somethingto protect something from outsidersto return something to a previous stateChange something to a newer version of itenter your account using your credentials...

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. to save a state of something to restore later
  2. to lie
  3. resources
  4. to gain control of
  5. pops up that appears on websites to lead you to other websites
  6. combination of letters used to lock a file or account
  7. National Institution of Standards and Technology at the US department of Commerce
  8. applications or programs
  9. to fix something
  10. to delete
  11. to identify
  12. enter your account using your credentials
Down
  1. criminals of the internet
  2. Change something to a newer version of it
  3. malware that negatively modifies your computer
  4. to return something to a previous state
  5. not given permission
  6. Get rid of
  7. to inform someone of something
  8. to protect something from outsiders
  9. a program specifically designed to fulfill a purpose for users

21 Clues: to lieresourcesto deleteGet rid ofto identifyto fix somethingto gain control ofnot given permissionapplications or programscriminals of the internetto inform someone of somethingto protect something from outsidersto return something to a previous stateChange something to a newer version of itenter your account using your credentials...

Cyber Security 2024-03-15

Cyber Security crossword puzzle
Across
  1. Internet protocol
  2. Physical Components of a pc
  3. collective network of devices
  4. only numbers combined t
  5. social engineering attack involving email
  6. picture puzzles are common security
  7. several security methods is called
  8. Distributed Denial of service
  9. Controls and monitors traffic
  10. malware, that replicates inside files
Down
  1. process of proving you are
  2. an intentional harmful file
  3. global network of remote servers
  4. pretends to be something else
  5. in the middle attack
  6. Process of protecting information
  7. letters, numbers,special characters combined
  8. group of interconnected computing devices
  9. Programs, operating systems
  10. virtual private network

20 Clues: Internet protocolin the middle attackonly numbers combined tvirtual private networkprocess of proving you arean intentional harmful filePhysical Components of a pcPrograms, operating systemspretends to be something elsecollective network of devicesDistributed Denial of serviceControls and monitors trafficglobal network of remote servers...

Cyber Security 2025-10-11

Cyber Security crossword puzzle
Across
  1. Any software designed to harm a computer
  2. A fake email or message that tries to steal your information
  3. The name used to identify a user on a computer or website
  4. Software that secretly watches what you do on your computer
  5. Software that protects a computer from viruses
  6. A tool that helps you remember strong passwords
  7. A secret word used to log in to a computer or website
  8. The global network that connects computers worldwide
  9. The action of signing out from a computer or website
  10. A collection of web pages available on the internet
  11. A clickable text or image that can lead to another webpage
  12. Installing the latest version of software for better security
Down
  1. A piece of electronic equipment like a laptop or phone
  2. A common way hackers send phishing messages
  3. A virus that locks your files and asks for money to unlock them
  4. A method of keeping data secret by changing its form
  5. An attempt to damage or steal data from computers
  6. A security system that blocks unwanted network traffic
  7. A person who breaks into computer systems
  8. Information stored on a computer
  9. Copying a file from the internet to your computer
  10. A harmful program that spreads from one computer to another
  11. Keeping personal information safe and secure
  12. A copy of important files kept in case something goes wrong
  13. A group of connected computers

25 Clues: A group of connected computersInformation stored on a computerAny software designed to harm a computerA person who breaks into computer systemsA common way hackers send phishing messagesKeeping personal information safe and secureSoftware that protects a computer from virusesA tool that helps you remember strong passwords...

Cyber Security 2020-11-07

Cyber Security crossword puzzle
Across
  1. A code to send a secret message
  2. Short for “Sending Particularly Annoying Messages.”
  3. protecting digital devices against attacks
  4. smaller pieces of info sent through the internet
  5. Copying a file from one computer to another
  6. software that secretly collects info about you
  7. info about you cause of online activity
  8. A name you type so you can use a computer
Down
  1. an attacker uses a list of words as potential passwords
  2. A secret word that allows you access
  3. software made to damage your computer or network
  4. cyberattack from hacker w/ bad links
  5. when an attacker tries many
  6. a place where data stops along the way
  7. A person who secretly gets access to a computer Network A system of computers that are connected
  8. data that describe another piece of data
  9. cyberattack where hacker pretends to know you
  10. A system of symbols used to create a secret message
  11. passwords in hopes of guessing correctly
  12. A system of rules and correct steps to follow

20 Clues: when an attacker tries manyA code to send a secret messageA secret word that allows you accesscyberattack from hacker w/ bad linksa place where data stops along the wayinfo about you cause of online activitydata that describe another piece of datapasswords in hopes of guessing correctlyA name you type so you can use a computer...

cyber security 2020-11-08

cyber security crossword puzzle
Across
  1. processes commands to a computer program in the form of lines of text.
  2. of computer program that helps a user perform numerical functions
  3. a machine that processes something.
  4. server used to store a computer username, password, and other information.
  5. store away in hiding or for future use.
  6. that can be used to implement
  7. and organize files and folders
Down
  1. communication
  2. Web, Browser, and Internet
  3. process of mathematical modelling
  4. process of making apps more secure by finding, fixing, and enhancing the security of apps
  5. that provides legally binding guidelines for the use and distribution of software
  6. hardware device that has the capability of permitting access to a network via a user interface,
  7. threats like viruses, malware, and spyware across email, apps, the cloud, and the web
  8. element of a computer operating system used to group files
  9. group of Microsoft-recommended configuration settings
  10. A widely released and frequent software update
  11. one of the command-line interface programs used to execute commands in Windows operating systems
  12. that supports a computer's basic functions
  13. set of instructions, data or programs used to operate computers and execute specific tasks.

20 Clues: communicationWeb, Browser, and Internetthat can be used to implementand organize files and foldersprocess of mathematical modellinga machine that processes something.store away in hiding or for future use.that supports a computer's basic functionsA widely released and frequent software updategroup of Microsoft-recommended configuration settings...

Cyber security 2022-11-17

Cyber security crossword puzzle
Across
  1. A separate program or a feature incorporated within a browser that stops popup advertisements from appearing
  2. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
  3. A malware payload that allows an attacker to execute virtually any command on the victim's computer
  4. Malware that prevents a user's device from properly operating until a fee is paid
  5. Software code that gives access to a program or service that circumvents normal security protections.
  6. A logical computer network of zombies under the control of an attacker
  7. An attacker that sends unsolicited messages to Bluetooth-enable deceives
  8. Software that helps prevent computers from becoming infected by different types of spyware
  9. A database of viruses that is used to identify an infected file
  10. An infected computer that is under the remote control of an attacker
Down
  1. A general term used to describe software that spies on users by gathering information without consent
  2. Software that is a cumulative package of all patches and feature updates
  3. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard
  4. A publicly released software security update intended to repair a vulnerability
  5. A copy is files from a computer's hard drive saved on other digital media that is stored in a secure location
  6. A malicious program designed to enter a computer via a network to take advantage of a vulnerabity in an application or an operating system
  7. Computer code that lies dormant until it is triggered by specific logical event
  8. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  9. Hardware or software designed to limit the spread of malware
  10. Removing the built-in limitations and protection google android devices

20 Clues: Hardware or software designed to limit the spread of malwareA database of viruses that is used to identify an infected fileAn infected computer that is under the remote control of an attackerA logical computer network of zombies under the control of an attackerRemoving the built-in limitations and protection google android devices...

Cyber Security 2023-09-09

Cyber Security crossword puzzle
Across
  1. the protection of data and systems.
  2. insurance that provides liability.
  3. training to help educate about possible cyber threats.
  4. software designed with malicious intent to steal/destroy data.
  5. a type of malware used to encrypt files and obtain data.
  6. protecting connected devices and networks from unauthorized access.
  7. the conversion of readable data to encoded data.
  8. protects data from physical actions.
  9. insurance that covers losses money.
  10. a group of steps that show how to execute a test.
  11. an organization to help businesses manage cybersecurity risks.
  12. a set of requirements to help create strong passwords.
Down
  1. when someone pretends to be something to steal data.
  2. changes made to a software to improve it.
  3. helps cover a business's losses from a cyber attack.
  4. saving data in a different secure and safe place in case data is lost.
  5. encrypted security used to protect Wi-Fi networks.
  6. stealing information from an unaware person through the internet.
  7. a strategy made to protect businesses from threats.
  8. an attack used to obtain sensitive data by acting as a trusted source.

20 Clues: insurance that provides liability.the protection of data and systems.insurance that covers losses money.protects data from physical actions.changes made to a software to improve it.the conversion of readable data to encoded data.a group of steps that show how to execute a test.encrypted security used to protect Wi-Fi networks....

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. to save a state of something to restore later
  2. to lie
  3. resources
  4. to gain control of
  5. pops up that appears on websites to lead you to other websites
  6. combination of letters used to lock a file or account
  7. National Institution of Standards and Technology at the US department of Commerce
  8. applications or programs
  9. to fix something
  10. to delete
  11. to identify
  12. enter your account using your credentials
Down
  1. criminals of the internet
  2. Change something to a newer version of it
  3. malware that negatively modifies your computer
  4. to return something to a previous state
  5. not given permission
  6. Get rid of
  7. to inform someone of something
  8. to protect something from outsiders
  9. a program specifically designed to fulfill a purpose for users

21 Clues: to lieresourcesto deleteGet rid ofto identifyto fix somethingto gain control ofnot given permissionapplications or programscriminals of the internetto inform someone of somethingto protect something from outsidersto return something to a previous stateChange something to a newer version of itenter your account using your credentials...

Cyber Security 2025-03-13

Cyber Security crossword puzzle
Across
  1. Blocks unauthorized network access
  2. Guessing passwords repeatedly
  3. Simulated hacking for security testing
  4. Secret for decrypting data
  5. Overloads a website’s server
  6. Software designed to harm systems
  7. Shared for encrypted messages
  8. Exploit with no known fix
  9. Disguised as harmless software
  10. Code inserted into databases
  11. Encrypts internet traffic for privacy
Down
  1. Locks files, demands payment
  2. Records what you type
  3. Converts data into secret code
  4. Secretly monitors user activity
  5. Tricking people for access
  6. Network of hacked computers
  7. Extra login security step
  8. Scrambles data into fixed code
  9. Fraudulent emails tricking users

20 Clues: Records what you typeExtra login security stepExploit with no known fixSecret for decrypting dataTricking people for accessNetwork of hacked computersLocks files, demands paymentOverloads a website’s serverCode inserted into databasesGuessing passwords repeatedlyShared for encrypted messagesConverts data into secret code...

Cyber security 2025-08-13

Cyber security crossword puzzle
Across
  1. | Abbreviation for Virtual Private Network, used for secure internet connections.
  2. | Software that secretly monitors user activity.
  3. | Faking the sending address of an email to trick recipients.
  4. | Copy of data stored separately for recovery in case of loss.
  5. | Malicious tool that records keystrokes.
  6. | Unwanted or unsolicited emails.
  7. | Process of converting information into code to prevent unauthorized access.
  8. | Two-factor authentication, adds extra security to logins.
  9. | Software designed to damage or gain unauthorized access to a system.
  10. | Malicious program that spreads itself to other computers.
Down
  1. | Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  2. | Program that detects and removes malicious software.
  3. | Small data stored on a user’s browser to track activity.
  4. | Security system that controls incoming and outgoing network traffic.
  5. | A secret word or phrase for authentication.
  6. | Network of infected computers controlled by a hacker.
  7. | Malicious software that blocks access to data until a payment is made.
  8. | Malicious program disguised as legitimate software.
  9. | A person who gains unauthorized access to data.
  10. | Multi-factor authentication for added account protection.

20 Clues: | Unwanted or unsolicited emails.| Malicious tool that records keystrokes.| A secret word or phrase for authentication.| Software that secretly monitors user activity.| A person who gains unauthorized access to data.| Malicious program disguised as legitimate software.| Program that detects and removes malicious software....

Cyber Security 2025-08-16

Cyber Security crossword puzzle
Across
  1. Software that displays unwanted ads.
  2. A fix for software vulnerability.
  3. Overwhelms a server with traffic.
  4. Unsolicited junk email messages.
  5. Website data stored on browser.
  6. Decoy system to trap attackers.
  7. Disguised malicious software program.
  8. General term for bad software.
  9. Algorithm for encrypting information.
  10. Secretly monitors your activity.
  11. Gains unauthorized computer access.
  12. Creates a private, secure connection.
Down
  1. Self-replicating malicious computer code.
  2. Network traffic security guard.
  3. Your secret key for access.
  4. Scrambles data for your privacy.
  5. Deceptive emails steal your info.
  6. Records all of your keystrokes.
  7. Unauthorized access to data.
  8. Holds your personal files hostage.

20 Clues: Your secret key for access.Unauthorized access to data.General term for bad software.Network traffic security guard.Website data stored on browser.Records all of your keystrokes.Decoy system to trap attackers.Scrambles data for your privacy.Unsolicited junk email messages.Secretly monitors your activity.A fix for software vulnerability....

Cybersecurity Crossword Puzzle 2025-03-13

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Unwanted email messages
  2. Hides internet browsing activity
  3. Software flaw exposing systems
  4. Software detecting cyber threats
  5. Person tricked into hacking
  6. Secret key for authentication
  7. Authentication requiring two factors
  8. Tracks and records keystrokes
  9. Deceptive attack to steal info
Down
  1. Unauthorized code execution attack
  2. Fake email for stealing data
  3. Attack security vulnerabilities
  4. Malicious software category
  5. Scrambles data for security
  6. Multiple accounts, one password
  7. Cybersecurity framework for networks
  8. Malicious program holding data hostage
  9. Unauthorized access attempt
  10. Digital fingerprint identifier
  11. Cyber attack flooding network packets

20 Clues: Unwanted email messagesMalicious software categoryScrambles data for securityPerson tricked into hackingUnauthorized access attemptFake email for stealing dataSecret key for authenticationTracks and records keystrokesSoftware flaw exposing systemsDigital fingerprint identifierDeceptive attack to steal infoAttack security vulnerabilities...

Cyber security 2025-03-31

Cyber security crossword puzzle
Across
  1. Datenverlust
  2. Zugangerhalten
  3. betrügerisch
  4. Schwachstellen
  5. löschen
  6. hack
  7. zerstören
  8. Ausfallzeit
  9. schützen
Down
  1. unbefugt
  2. Identitätsdiebstal
  3. betroffen sein
  4. abzielen
  5. Datenschutz
  6. Leck
  7. Schadsoftware
  8. verschlüsseln
  9. vertraulich
  10. Passworttresor

19 Clues: LeckhacklöschenunbefugtabzielenschützenzerstörenDatenschutzvertraulichAusfallzeitDatenverlustbetrügerischSchadsoftwareverschlüsselnZugangerhaltenbetroffen seinSchwachstellenPassworttresorIdentitätsdiebstal

Cyber security 2022-09-14

Cyber security crossword puzzle
Across
  1. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
  2. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  3. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
  4. One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
  5. Software that can only be run for a limited amount of time before it expires.
  6. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  7. A secret word or phrase that is used to access a computer system or service.
  8. Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
  9. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
  1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. Code that is embedded into the hardware of a computer.
  3. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  5. The core of a computer’s operating system that houses the most essential functions of the computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  8. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  9. Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.

19 Clues: Code that is embedded into the hardware of a computer.A secret word or phrase that is used to access a computer system or service.Software that can only be run for a limited amount of time before it expires.A hacking attack that makes the device mine cryptocurrency, in addition to its normal use....

CYBER SECURITY 2025-12-03

CYBER SECURITY crossword puzzle
Across
  1. people you connect with
  2. something harmful
  3. repeated unwanted behaviour
  4. a fully grown person
  5. code to access an account
  6. taking advantage of someone
  7. people related to you
  8. informal name used online
  9. exchange of messages
  10. information or understanding
Down
  1. a place or position
  2. text sent to someone
  3. portable computer
  4. uploading something online
  5. support or assistance
  6. something you have gone through
  7. a tool or electronic item
  8. injury or damage
  9. a written response online

19 Clues: injury or damageportable computersomething harmfula place or positiontext sent to someonea fully grown personexchange of messagessupport or assistancepeople related to youpeople you connect withcode to access an accounta tool or electronic iteminformal name used onlinea written response onlineuploading something onlinerepeated unwanted behaviour...

Cyber security 2022-09-14

Cyber security crossword puzzle
Across
  1. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
  2. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  3. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
  4. One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
  5. Software that can only be run for a limited amount of time before it expires.
  6. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  7. A secret word or phrase that is used to access a computer system or service.
  8. Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
  9. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
  1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. Code that is embedded into the hardware of a computer.
  3. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  5. The core of a computer’s operating system that houses the most essential functions of the computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  8. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  9. Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.

19 Clues: Code that is embedded into the hardware of a computer.A secret word or phrase that is used to access a computer system or service.Software that can only be run for a limited amount of time before it expires.A hacking attack that makes the device mine cryptocurrency, in addition to its normal use....

Cyber security 2022-09-14

Cyber security crossword puzzle
Across
  1. The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
  2. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  3. A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
  4. One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
  5. Software that can only be run for a limited amount of time before it expires.
  6. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  7. A secret word or phrase that is used to access a computer system or service.
  8. Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
  9. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
  1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. Code that is embedded into the hardware of a computer.
  3. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  5. The core of a computer’s operating system that houses the most essential functions of the computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  8. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  9. Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.

19 Clues: Code that is embedded into the hardware of a computer.A secret word or phrase that is used to access a computer system or service.Software that can only be run for a limited amount of time before it expires.A hacking attack that makes the device mine cryptocurrency, in addition to its normal use....

Cyber Security 2021-02-19

Cyber Security crossword puzzle
Across
  1. an crime perpetrated using computers and networks.
  2. a form of bullying or harassment using computer -based communication.
  3. piracy, the unauthorized reproduction, distribution or use of software products.
  4. A ___________ monitors a network, blocking dangerous content such as viruses.
  5. Security, Activities related to identifying , assessing and managing vulnerabilities, threats and attacks on a computer system.
  6. A ____________________ is a piece of data sent from a website and stored on the user's computer by the user's web browser which the user is browsing.
  7. of Service Attack, A cyber attack where the intent is to prevent a service being delivered by the targeted system.
  8. Actual action that causes harm or damage.
  9. the attempt to obtain sensitive information such as usernames, passwords, and credit card details by sending emails pretending to be from a legitimate organization.
  10. and Waterproof Storage,
  11. any data or resources that can be accessed via a network or the space where the Internet operates.
Down
  1. An action taken to counteract a threat.
  2. , Exposure to the possibility of being attacked or harmed.
  3. a statement of an intention to inflict harm or damage.
  4. the right of a persons to choose freely under what circumstances and to what extent they will reveal information about themselves.
  5. theft, The deliberate use of someone else's identity, usually to gain a financial advantage.
  6. The legal rights that gives the creator of an original work exclusive rights over its use and distribution.
  7. Measures,
  8. Misuse, any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  9. Theft, the unauthorized copying or removal of data from the legitimate owner's computer system.

20 Clues: Measures,and Waterproof Storage,An action taken to counteract a threat.Actual action that causes harm or damage.an crime perpetrated using computers and networks.a statement of an intention to inflict harm or damage., Exposure to the possibility of being attacked or harmed.a form of bullying or harassment using computer -based communication....

Cyber Security 2025-03-14

Cyber Security crossword puzzle
Across
  1. Blocks unauthorized network access
  2. Misleading link for attention
  3. To fix security vulnerabilities
  4. Encrypts internet traffic securely
  5. Fraudulent emails stealing data
  6. Clickable web address
  7. Copies data for recovery
  8. Identifies a system user
  9. Harmful software, includes viruses
  10. Stores website user data
Down
  1. Wireless internet connection
  2. Converts data into unreadable code
  3. Test to block bots
  4. Gains unauthorized system access
  5. Secretly collects user information
  6. Used to secure accounts
  7. Exits an account safely
  8. Unwanted email messages
  9. Detects and removes malware

19 Clues: Test to block botsClickable web addressUsed to secure accountsExits an account safelyUnwanted email messagesCopies data for recoveryIdentifies a system userStores website user dataDetects and removes malwareWireless internet connectionMisleading link for attentionTo fix security vulnerabilitiesFraudulent emails stealing data...

Cybersecurity Awareness Month 2024-07-26

Cybersecurity Awareness Month crossword puzzle
Across
  1. A fence provides this
  2. From white to red
  3. Virtual storage in the sky
  4. Malicious software holding data hostage
  5. Digital mischief-maker
  6. Verifying Identity
  7. Artificial or Real?
  8. Identity verification through unique traits Yellow Data
Down
  1. Digital bouncer for unauthorized data
  2. AI-generated deception
  3. Deceptive online lure
  4. Computer ninja with a keyboard
  5. Personal secret sentence for entry
  6. Your computer is under the weather
  7. Security theft exposing data
  8. Cyber vigilance
  9. Wireless internet access point
  10. Voice trickery that sounds fishy!
  11. BIG catch for cyber criminals
  12. Security in scrambled letters
  13. Interconnected web of computers

21 Clues: Cyber vigilanceFrom white to redVerifying IdentityArtificial or Real?Deceptive online lureA fence provides thisAI-generated deceptionDigital mischief-makerVirtual storage in the skySecurity theft exposing dataBIG catch for cyber criminalsSecurity in scrambled lettersComputer ninja with a keyboardWireless internet access point...

CYBER SECURITY CROSSWORD 2018-01-24

CYBER SECURITY CROSSWORD crossword puzzle
Across
  1. wireless networks
  2. Surname of the VST Manager
  3. The one who can initiate a new data download
  4. a flaw or weakness in system cyber security procedures
  5. Applications which can cause loss of availability for business data
  6. space The complex environment resulting from the interaction of people,software and services on the internet
  7. The room where cyber security awareness posters are posted
Down
  1. The Engineer to provide communication and/or support if cyber incident is also related with HQ equipment
  2. Interconnection points between various systems on the IT network
  3. The process in order to identify critical threats
  4. Person in charge for checking satellite connection
  5. The technique through which an external source transmits manipulated data which the GPS receives as legitimate
  6. Combination of consequences and frequency of a risk assessment procedure
  7. another word for junk email
  8. Communication over public channels
  9. The response team which deals with cyber threats

16 Clues: wireless networksSurname of the VST Manageranother word for junk emailCommunication over public channelsThe one who can initiate a new data downloadThe response team which deals with cyber threatsThe process in order to identify critical threatsPerson in charge for checking satellite connectiona flaw or weakness in system cyber security procedures...

Digital Technology Terminologies 2023-02-27

Digital Technology Terminologies crossword puzzle
Across
  1. defense Cyber security role of DND & AFP.
  2. Pertains to right & wrong conduct.
  3. safety Practices for a safe web surfing.
  4. security The protection of internet-connected systems from cyberattacks.
  5. protection Cyber security role of DICT & CICC.
  6. To identify possible risks of harmful online behaviors.
Down
  1. To translate understanding into actions as to online safety.
  2. enforcement Cyber security role of NBI & PNP.
  3. ethics The online environment right & wrong conduct.
  4. wellness Online behavior awareness for cyberspace protection.
  5. community Cyber security role of NICA.
  6. To analyze, evaluate & reflect on the online situation.

12 Clues: Pertains to right & wrong conduct.community Cyber security role of NICA.safety Practices for a safe web surfing.defense Cyber security role of DND & AFP.enforcement Cyber security role of NBI & PNP.protection Cyber security role of DICT & CICC.ethics The online environment right & wrong conduct....

XC Participation 2024-08-30

XC Participation crossword puzzle
Across
  1. UI redress attack
  2. hidden method of bypassing security
  3. perform malicious actions
  4. designed to prevent unauthorized access
  5. carry out cyberattacks
  6. common cyber security terms
  7. The exposure of confidential information
  8. collection of all vulnerable points
  9. cyber attack that locks users
  10. social engineering attack
  11. method for guessing a password
Down
  1. list of permissions
  2. scrambling data
  3. encrypted form of the message
  4. Software that displays advertisements
  5. intelligence exhibited by machines
  6. a write-only database
  7. tackle the threat of malware
  8. cloud-based storage
  9. short for malicious software
  10. Distributed Denial of Service

21 Clues: scrambling dataUI redress attacklist of permissionscloud-based storagea write-only databasecarry out cyberattacksperform malicious actionssocial engineering attackcommon cyber security termstackle the threat of malwareshort for malicious softwareencrypted form of the messagecyber attack that locks usersDistributed Denial of Service...

Cyber Security 2017-06-30

Cyber Security crossword puzzle
Across
  1. a piece of code which is capable of corrupting
  2. dangers that happen on the internet
  3. a virus that can spread information from one
  4. a software that can take your personal
  5. includes sharing of data and services
  6. an interconnection of computers and devices
  7. when junkmails keeps appearing and it never
  8. computer system
  9. in
Down
  1. the intentional paralysing of a computer network
  2. the interception of a private communication
  3. to another
  4. software the can damage your system
  5. flooding it with data
  6. to data
  7. person who uses computers to gain unauthorized
  8. a malware computer program that replicates
  9. to spread to other computers

18 Clues: into datato anothercomputer systemflooding it with datato spread to other computersdangers that happen on the internetsoftware the can damage your systemincludes sharing of data and servicesa software that can take your personala malware computer program that replicatesthe interception of a private communication...

Cyber Security 2025-04-28

Cyber Security crossword puzzle
Across
  1. A harmful program that can replicate itself and spread to other computers, often damaging files or systems.
  2. Malware that locks or encrypts a user's files and demands payment to restore access.
  3. Theft When someone illegally uses another person's personal information (like their name or credit card) to commit fraud or theft.
  4. A trick where fake emails, messages, or websites try to steal personal information like passwords or credit card numbers.
  5. The process of converting information into a secret code to prevent unauthorized access.
  6. Malicious software designed to harm, exploit, or otherwise illegally access a computer system.
  7. Small pieces of data stored by websites on a user's device to remember information like login details or site preferences.
  8. A security system that blocks unauthorized access to or from a private network.
  9. (Virtual Private Network) A service that creates a secure, encrypted connection over the internet to protect private data and browsing activity.
Down
  1. Authentication A security process where a user must provide two forms of identification to log in, like a password and a code sent to their phone.
  2. Footprint The trail of data a person leaves behind when using the internet, such as posts, comments, and personal information.
  3. A dishonest scheme meant to trick people into giving away money or private information online.
  4. A test used by websites to confirm that a user is a human and not a bot, often by identifying objects in images or typing distorted text.
  5. Gaining unauthorized access to a computer system or network, usually to steal or manipulate information.
  6. Software that secretly gathers information about a user without their knowledge, often for spying or stealing purposes.
  7. Protecting personal information from being accessed or shared without permission.
  8. The act of publicly revealing private information about a person without their consent, often to harm or intimidate them.
  9. Software A program that detects, prevents, and removes malicious software from a computer.

18 Clues: A security system that blocks unauthorized access to or from a private network.Protecting personal information from being accessed or shared without permission.Malware that locks or encrypts a user's files and demands payment to restore access.The process of converting information into a secret code to prevent unauthorized access....

Cyber security 2023-11-28

Cyber security crossword puzzle
Across
  1. Desktop is also known as.
  2. Hiding one piece of data with in another.
  3. The crime that related to computers and networks.
  4. A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
  5. Secretly watches computer activity.
  6. Phishing is malware that asks for ______ details.
  7. Any program, website, or file that is defined to damage or gain unauthorized access to a device.
  8. The practice of protecting systems, networks and programs from digital attacks.
Down
  1. Someone who breaks into a computer system.
  2. URLs that mislead the user into down leading a virus and visiting a harmful website.
  3. Illegal production of copyrighted material is often referred as ____.
  4. Information is also known as.
  5. A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
  6. Type of bullying that takes place online.
  7. ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
  8. An online threat that hides itself in computers and mobile device.
  9. Software that protects computer from virus related harm.
  10. Copying the data without the permission of owner of the computer/computers system/ computer network.

18 Clues: Desktop is also known as.Information is also known as.Secretly watches computer activity.Hiding one piece of data with in another.Type of bullying that takes place online.Someone who breaks into a computer system.The crime that related to computers and networks.Phishing is malware that asks for ______ details....

Cyber Security 2025-04-28

Cyber Security crossword puzzle
Across
  1. Small pieces of data stored by websites on a user's device to remember information like login details or site preferences.
  2. A trick where fake emails, messages, or websites try to steal personal information like passwords or credit card numbers.
  3. Malware that locks or encrypts a user's files and demands payment to restore access.
  4. A harmful program that can replicate itself and spread to other computers, often damaging files or systems.
  5. Malicious software designed to harm, exploit, or otherwise illegally access a computer system.
  6. Footprint The trail of data a person leaves behind when using the internet, such as posts, comments, and personal information.
  7. Software that secretly gathers information about a user without their knowledge, often for spying or stealing purposes.
  8. The process of verifying that someone is who they claim to be, usually before allowing access to systems, accounts, or information.
Down
  1. Software A program that detects, prevents, and removes malicious software from a computer.
  2. The act of publicly revealing private information about a person without their consent, often to harm or intimidate them.
  3. Theft When someone illegally uses another person's personal information (like their name or credit card) to commit fraud or theft.
  4. A test used by websites to confirm that a user is a human and not a bot, often by identifying objects in images or typing distorted text.
  5. A security system that blocks unauthorized access to or from a private network.
  6. Gaining unauthorized access to a computer system or network, usually to steal or manipulate information.
  7. Protecting personal information from being accessed or shared without permission.
  8. A dishonest scheme meant to trick people into giving away money or private information online.
  9. The process of converting information into a secret code to prevent unauthorized access.
  10. (Virtual Private Network) A service that creates a secure, encrypted connection over the internet to protect private data and browsing activity.

18 Clues: A security system that blocks unauthorized access to or from a private network.Protecting personal information from being accessed or shared without permission.Malware that locks or encrypts a user's files and demands payment to restore access.The process of converting information into a secret code to prevent unauthorized access....

Cyber Security 2023-02-08

Cyber Security crossword puzzle
Across
  1. you should do auto- _ _ _ _ _ _ _ to your operating system and applications to keep them up to date.
  2. plain text is turned into cipher text so that if it is intercepted it cannot be understood. you must have the key to be able to decrypt the code.
  3. disguises itself as legitimate software. allows the creator to get 'backdoor' access to remotely see files.
  4. multiple computers flood a network with data requests so that it is unusable.
  5. malicious software. designed to cause harm to a computer.
  6. a combination of letters, symbols and number which allows you to access an account.
  7. self replicating malware. often downloaded from email attachments. will delete and modify files.
  8. emails that do not contain a hyperlink. the sender will create a fake story and convince you to send them money/ details.
  9. monitors incoming and outgoing data. blocks access to unsafe websites.
Down
  1. malicious software which makes pop-ups appear on your computer.
  2. software which locks and encrypts all of your files. you will then be told to pay a certain amount of money to get your files back.
  3. software which spies on your actions. keylogging can be used to monitor your keystrokes and access your passwords.
  4. processed facts and figures. they have meaning.
  5. looking over someone to find out their passwords.
  6. a system designed to tell a human apart from a bot. you typically have to select images of the same item e.g. traffic lights.
  7. fake emails pretending to be real. often from a bank asking you to click on a hyperlink and enter details.
  8. infects an entire network of computers and takes up bandwidth which makes the network run very slowly.
  9. raw facts and figures. unprocessed.

18 Clues: raw facts and figures. unprocessed.processed facts and figures. they have meaning.looking over someone to find out their passwords.malicious software. designed to cause harm to a computer.malicious software which makes pop-ups appear on your computer.monitors incoming and outgoing data. blocks access to unsafe websites....

Cyber Security 2025-02-27

Cyber Security crossword puzzle
Across
  1. scrambles data for security
  2. deception for gain
  3. breaking into a system
  4. pretending to be someone else
  5. extra login security
  6. crime using the internet
  7. monitoring online activity
  8. unwanted messages
Down
  1. faking an identity online
  2. fake messages to steal info
  3. secret login code
  4. harmful software
  5. trick to steal money
  6. blocks cyber-threats
  7. secures your internet
  8. unauthorized data access
  9. who you are online
  10. keeps your info safe

18 Clues: harmful softwaresecret login codeunwanted messagesdeception for gainwho you are onlinetrick to steal moneyblocks cyber-threatsextra login securitykeeps your info safesecures your internetbreaking into a systemunauthorized data accesscrime using the internetfaking an identity onlinemonitoring online activityfake messages to steal info...

Spirit Week's Cyber Crossword Puzzle 2020-09-22

Spirit Week's Cyber Crossword Puzzle crossword puzzle
Across
  1. Always _____ your computer when you leave your desk
  2. Many companies are moving their data to this
  3. Tool to protect computers from malware
  4. To protect your sensitive information, avoid sending it via _____
  5. For extra security, always enable ___ ______ authentication
  6. A fake email designed to steal your credentials
  7. Internet browser mode for more privacy
  8. Never _____ a password
  9. Aon wrote its first ____ policy 20 years ago
  10. A kind of bounty
  11. Data ____ is when an attacker steals and takes data from a company
  12. ACS service line that conducts background style research and due diligence
  13. Criminals may physically place this on a credit card reader to steal the card information
  14. ACS service line that processes and analyzes data, often as part of litigation
  15. The process of encoding information
  16. Something you have too many of
  17. A "bandaid" for software, often released on Tuesdays by Microsoft
Down
  1. A type of digital currency
  2. ACS service line that connects clients with insurance carriers
  3. Cyber Solutions CEO
  4. ACS service line that provides security recommendations
  5. Generic term for a security incident
  6. Sophisticated attack group, for short - often a nation state
  7. ACS service line that investigates cyber incidents
  8. What does ACS stand for?
  9. Internet of Things, or ______ devices
  10. A special browser to access the dark web
  11. Malware that encrypts files and demands a payment to restore them
  12. Former Assistant US Attorney for the Eastern District of New York
  13. ACS service line that tracks and gathers information about threat actors and other people of intereset
  14. ACS service line that tries to break into client systems
  15. Report suspicious emails to this Aon security group
  16. Cyber Security Awareness Month
  17. Former head of FBI's computer crime squad
  18. Canadian colleagues that joined ACS in 2020

35 Clues: A kind of bountyCyber Solutions CEONever _____ a passwordWhat does ACS stand for?A type of digital currencyCyber Security Awareness MonthSomething you have too many ofThe process of encoding informationGeneric term for a security incidentInternet of Things, or ______ devicesTool to protect computers from malware...

CISO Crossword Quiz - 2425 2025-10-16

CISO Crossword Quiz - 2425 crossword puzzle
Across
  1. Cyber ____ is the ability of an organization or nation to prepare for, withstand, recover from, and adapt to cyber threats or attacks
  2. Process of verifying user identity to prevent unauthorized access to data & systems
  3. Cyber Security principle which ensures data remains accurate and unaltered
  4. Which month is observed globally as National Cyber Security Awareness Month?
Down
  1. An Assurance that someone cannot deny having performed a specific action, such as sending a message or making a transaction
  2. NCSAM aims to increase Cyber ____ of India’s cybersecurity posture
  3. Cyber Security principle which ensures data and systems/resources of an organization are accessible to authorized users when needed
  4. Which Cyber Security principle ensures that only authorized people get access to the data?
  5. Cyber ____ Bharat is this year’s NCSAM theme in India focusing on cyber awareness
  6. Which term is used to describe safe and responsible online behavior?
  7. Which department sets the annual NCSAM theme every year?

11 Clues: Which department sets the annual NCSAM theme every year?NCSAM aims to increase Cyber ____ of India’s cybersecurity postureWhich term is used to describe safe and responsible online behavior?Cyber Security principle which ensures data remains accurate and unalteredWhich month is observed globally as National Cyber Security Awareness Month?...

Cybersecurity terms 2024-03-12

Cybersecurity terms crossword puzzle
Across
  1. horse Malicious software disguised innocuously.
  2. Identity verification using traits.
  3. Malicious software threat
  4. Malicious code component.
  5. security Device-specific protection measures.
  6. policy Guidelines for security measures.
  7. Applying software updates regularly.
  8. Weakness in system security.
Down
  1. Deceptive email communication.
  2. testing Ethical hacking simulation.
  3. Malware with system-level access.
  4. hygiene Good digital security practices.
  5. incident Breach or violation event.
  6. Identity verification using traits.
  7. Malicious digital intrusion attempt.
  8. Network security barrier.
  9. Data protection through scrambling.
  10. Secure communication technique.
  11. Software against malicious programs.
  12. hat Ethical security expert.

20 Clues: Network security barrier.Malicious software threatMalicious code component.Weakness in system security.Deceptive email communication.Secure communication technique.Malware with system-level access.testing Ethical hacking simulation.Identity verification using traits.Identity verification using traits.Data protection through scrambling....

CIS 120 Cybersecurity 2024-03-10

CIS 120 Cybersecurity crossword puzzle
Across
  1. strength in the security structure
  2. off personal computer storage
  3. thief through computerized means
  4. needed for accessing secure information
  5. unsolicited meat banter
  6. casting cyber bait
  7. blocks out unauthorized access
  8. security tactics
  9. address for accessing websites
Down
  1. level for information security
  2. used to harm your computer
  3. software to monitor computerized information
  4. a code for keeping secrets
  5. weak point in security
  6. ID with magnetic access chip
  7. software used for destruction
  8. data to identify a person
  9. holds data hostage
  10. lying about your location
  11. the simplest part of security

20 Clues: security tacticsholds data hostagecasting cyber baitweak point in securityunsolicited meat banterdata to identify a personlying about your locationused to harm your computera code for keeping secretsID with magnetic access chipoff personal computer storagesoftware used for destructionthe simplest part of securitylevel for information security...

Cybersecurity Awareness Month Crossword Puzzle 2024-09-30

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. address for accessing websites
  2. software used for destruction
  3. thief through computerized means
  4. software to monitor computerized information
  5. ID with magnetic access chip
  6. off personal computer storage
  7. lying about your location
  8. holds data hostage
  9. security tactics
  10. level for information security
  11. unsolicited meat banter
  12. strength in the security structure
Down
  1. weak point in security
  2. used to harm your computer
  3. the simplest part of security
  4. a code for keeping secrets
  5. needed for accessing secure information
  6. blocks out unauthorized access
  7. data to identify a person
  8. casting cyber bait

20 Clues: security tacticsholds data hostagecasting cyber baitweak point in securityunsolicited meat banterlying about your locationdata to identify a personused to harm your computera code for keeping secretsID with magnetic access chipsoftware used for destructionthe simplest part of securityoff personal computer storageaddress for accessing websites...

Career Services: Cybersecurity Crossword 2025-03-24

Career Services: Cybersecurity Crossword crossword puzzle
Across
  1. The practice of protecting systems, networks, and programs from digital attacks
  2. The process of verifying a user’s identity.
  3. The process of converting data into a secret code to prevent unauthorized access.
  4. A type of malware that locks or encrypts a victim’s files and demands payment for their release.
  5. A security system that monitors and controls incoming and outgoing network traffic.
  6. A simulated cyber attack to test a system’s security.
  7. A tool that collects and analyzes security logs (Security Information and Event Management).
Down
  1. A security process that requires two forms of verification also known as 2FA.
  2. Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
  3. A type of malware that secretly gathers information from a user’s device.
  4. A person who gains unauthorized access to systems or networks.
  5. Malicious software designed to damage or disrupt computer systems.
  6. Software that detects and removes malicious programs from a computer.
  7. A cybersecurity professional who tests systems for vulnerabilities to improve security.
  8. A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.

15 Clues: The process of verifying a user’s identity.A simulated cyber attack to test a system’s security.A person who gains unauthorized access to systems or networks.Malicious software designed to damage or disrupt computer systems.Software that detects and removes malicious programs from a computer....

Cyber Security 2023-09-15

Cyber Security crossword puzzle
Across
  1. A part of the internet that isn't indexed by search engines
  2. The conversion of information or data into a code
  3. Fraudulent email that demands urgent action
  4. A portmanteau of “malicious” and “software”
  5. A type of malicious software
  6. Virtual Private Network
  7. The process of identifying a user’s identity
  8. bypassing an organization's existing security systems
Down
  1. The use of electronics to bully someone
  2. The manipulation of facial appearance through deep generative methods.
  3. A form of malware used by hackers to spy on you and your computer activities
  4. a network security device that monitors and filters incoming and outgoing network traffic
  5. Artificial intelligence
  6. A means of attack on a computer system
  7. he result of a hacker successfully breaking into a system,
  8. A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
  9. An error, fault in a computer system

17 Clues: Artificial intelligenceVirtual Private NetworkA type of malicious softwareAn error, fault in a computer systemA means of attack on a computer systemThe use of electronics to bully someoneFraudulent email that demands urgent actionA portmanteau of “malicious” and “software”The process of identifying a user’s identity...

Cyber security 2022-12-11

Cyber security crossword puzzle
Across
  1. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
  2. The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
  3. An annoying malware that spams you with ads.
  4. Settings on folders or files that control who is allowed to access them.
  5. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
  6. What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
  7. A malicious code typically disguised as a legitimate program.
  8. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
  9. An important process that verifies a user is really who they are; many different ways this can be done.
Down
  1. Full name of a DoS attack (three words).
  2. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
  3. A collection of malware infested computers that form a network to attack.
  4. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
  5. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
  6. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
  7. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  8. An email that contains a message with a suspicious link designed to steal personal information.

17 Clues: Full name of a DoS attack (three words).An annoying malware that spams you with ads.A malicious code typically disguised as a legitimate program.Settings on folders or files that control who is allowed to access them.A collection of malware infested computers that form a network to attack....

Cyber security 2023-09-10

Cyber security crossword puzzle
Across
  1. A form of email authentication
  2. it helps protect losses from cyber attacks
  3. A form of email authentication
  4. Hacker requests money to stop attack
  5. Extra methods/steps to make something more secure
  6. Make sure only specific people can access important databases
  7. A person or group of people impersonates a company to try and convince you that your device has problems in order to get money
  8. Updates for your network that helps protect against security vulnerabilities
  9. clicking a link from a fake email leads to information being taken
  10. When someone intentionally deceives you for something like money or important information
Down
  1. Encryption that protects information sent over your network
  2. preventing unauthorized access
  3. A federal agency that helps protect consumers against cyber attacks.
  4. ransomware and phishing
  5. A service that helps encrypt data between your computer and network
  6. A method used for ransomware and phishing
  7. Website that automatically downloads malicious software on your computer
  8. Helps protect customer privacy
  9. A form of email authentication
  10. Encryption that protects information sent over your network

20 Clues: ransomware and phishingpreventing unauthorized accessA form of email authenticationA form of email authenticationHelps protect customer privacyA form of email authenticationHacker requests money to stop attackA method used for ransomware and phishingit helps protect losses from cyber attacksExtra methods/steps to make something more secure...

Cybersecurity Terms 2023-01-28

Cybersecurity Terms crossword puzzle
Across
  1. One's own device for work
  2. Cybersecurity career peak
  3. Security for malware
  4. Mastery of Network defense
  5. Protection for user account
  6. Destructive single malware
  7. Online harassment
  8. Disguised cyber attack
  9. Malicious hackers
  10. Network device identity
  11. Plans security measures
Down
  1. Entry level certification
  2. Pay to release lockout
  3. Secure remote private network
  4. Network traffic control
  5. cloud security certification
  6. Malicious altered media
  7. Secure scrambled data
  8. Intermediate hacker mastery
  9. Surveillance malware

20 Clues: Online harassmentMalicious hackersSecurity for malwareSurveillance malwareSecure scrambled dataPay to release lockoutDisguised cyber attackNetwork traffic controlMalicious altered mediaNetwork device identityPlans security measuresEntry level certificationOne's own device for workCybersecurity career peakMastery of Network defense...

Digital Privacy and Data Protection 2025-07-17

Digital Privacy and Data Protection crossword puzzle
Across
  1. – qonun
  2. – raqamli
  3. – kiber
  4. – ulashish
  5. – xavfsizlik
  6. – shaxsiy
  7. – himoya
  8. – kirish imkoniyati
  9. – internet
Down
  1. – ma’lumotlar
  2. – foydalanuvchi
  3. – parol
  4. – shaxsiyat
  5. – shifrlash
  6. – kuzatuv
  7. – axborot
  8. – maxfiylik
  9. – xavfsizlik
  10. – onlayn
  11. – nazorat

20 Clues: – qonun– parol– kiber– onlayn– himoya– raqamli– kuzatuv– axborot– shaxsiy– nazorat– ulashish– internet– shaxsiyat– shifrlash– maxfiylik– xavfsizlik– xavfsizlik– ma’lumotlar– foydalanuvchi– kirish imkoniyati

Cyber Security 2024-10-10

Cyber Security crossword puzzle
Across
  1. – Distributed attack that overwhelms a system with traffic (4)
  2. force – Attack method involving trial and error (10)
  3. – Fraudulent attempt to obtain sensitive information (8)
  4. – A system designed to block unauthorized access (8)
  5. – Network of infected computers controlled remotely (6)
  6. – Testing method to evaluate security defenses (11)
  7. – Advanced Encryption Standard used for securing data (3)
  8. – Software designed to disrupt or damage systems (7)
Down
  1. – A vulnerability that is exploited before being fixed (8)
  2. – Software that secretly monitors user activity (7)
  3. – Digital document proving ownership of a public key (11)
  4. – Process of converting data into a code (10)
  5. – A weakness in a system that can be exploited (13)
  6. – Malware that demands payment to restore access (10)
  7. – A type of malware disguised as legitimate software (6)
  8. – Process of converting data into a fixed-size value (7)

16 Clues: – Process of converting data into a code (10)– Software that secretly monitors user activity (7)– A weakness in a system that can be exploited (13)– Testing method to evaluate security defenses (11)force – Attack method involving trial and error (10)– A system designed to block unauthorized access (8)...

Digital Privacy and Data Protection 2025-07-26

Digital Privacy and Data Protection crossword puzzle
Across
  1. – ulashish
  2. – foydalanuvchi
  3. – shaxsiy
  4. – shaxsiyat
  5. – qonun
  6. – himoya
  7. – shifrlash
  8. – raqamli
  9. – kirish imkoniyati
  10. – internet
  11. – maxfiylik
Down
  1. – nazorat
  2. – xavfsizlik
  3. – parol
  4. – kiber
  5. – onlayn
  6. – ma’lumotlar
  7. – axborot
  8. – kuzatuv
  9. – xavfsizlik

20 Clues: – parol– kiber– qonun– onlayn– himoya– nazorat– shaxsiy– axborot– kuzatuv– raqamli– ulashish– internet– shaxsiyat– shifrlash– maxfiylik– xavfsizlik– xavfsizlik– ma’lumotlar– foydalanuvchi– kirish imkoniyati

Cyber Security 2024-10-10

Cyber Security crossword puzzle
Across
  1. Type of software used to cause damage, e.g. viruses.
  2. A small piece of software designed to cause damage.
  3. Part of the Internet hidden behind logins, etc.
  4. Part of the Internet that can be accessed using a search engine.
  5. A way of jumbling up data so it is unreadable.
  6. A simple (and very old) method of encryption where the alphabet is shifted.
  7. Type of hacker who legally hacks, often to test networks.
  8. A way of convincing people to give up personal information.
  9. Describes criminals stealing personal information to impersonate someone.
  10. Type of hacker who commits illegal actions but for the greater good.
Down
  1. Using the Internet (often social media) to target someone negatively.
  2. A way of strengthening logins by sending a code to a phone or email.
  3. Convincing users to give up personal information, often using emails.
  4. Part of the Internet that is unmonitored and often contains illegal content.
  5. A simple (and very old) method of encrypting data by rotating the alphabet.
  6. French dude who invented a complex grid-based encryption method. Begins with a V.
  7. Type of hacker that commits illegal actions.

17 Clues: Type of hacker that commits illegal actions.A way of jumbling up data so it is unreadable.Part of the Internet hidden behind logins, etc.A small piece of software designed to cause damage.Type of software used to cause damage, e.g. viruses.Type of hacker who legally hacks, often to test networks....

Cyber Security 2017-06-30

Cyber Security crossword puzzle
Across
  1. the process of converting information or data into a code, especially to prevent unauthorized access
  2. A software designed to detect and destroy computer viruses
  3. A network of private computers infected with malicious software and controlled as a group without the owners knowledge
  4. A unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission
  5. A software that enables a user to obtain covert information about another computer
  6. Theft the fraudulent practice of using another person's name and personal information in order to obtain credits and loans
  7. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  8. A standalone malware computer program that replicates itself in order to spread to other computers
  9. A person who uses computers to gain unauthorized access to data
Down
  1. A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
  2. A program designed to breach the security of a computer system while ostensibly performing some innocuous function
  3. A Computer security also known as cyber security or IT security of computer systems from the theft or damage to their hardware
  4. A attempt by hackers to damage or destroy a computer network or system
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. A vulnerability of an organization's internal resources that arises from the organization using the Internet to conduct business
  7. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done

16 Clues: A software designed to detect and destroy computer virusesA person who uses computers to gain unauthorized access to dataA attempt by hackers to damage or destroy a computer network or systemA software that enables a user to obtain covert information about another computer...

cyber security 2025-03-19

cyber security crossword puzzle
Across
  1. A type of malware that disguises itself as legitimate software
  2. Maintaining the accuracy and trustworthiness of data
  3. The act of tricking people into revealing sensitive information
  4. A security process requiring a username and password
  5. A method used to convert readable data into unreadable code
  6. A type of malware that demands payment to restore access to files
  7. Malicious software that replicates itself to spread to other computers
  8. Ensuring that data and services are accessible when needed
  9. A type of cyber attack that overwhelms a server with traffic
Down
  1. The practice of ensuring data is only accessed by authorized users
  2. A process that transforms plaintext into unreadable text
  3. A program designed to protect your device from viruses
  4. A network security system that monitors and controls incoming and outgoing traffic
  5. A secret code used for authentication
  6. Unsolicited and unwanted bulk emails
  7. A person who gains unauthorized access to a system

16 Clues: Unsolicited and unwanted bulk emailsA secret code used for authenticationA person who gains unauthorized access to a systemMaintaining the accuracy and trustworthiness of dataA security process requiring a username and passwordA program designed to protect your device from virusesA process that transforms plaintext into unreadable text...

Crouch Conundrum 2017-12-23

Crouch Conundrum crossword puzzle
Across
  1. Cyber Security Whiz
  2. Hendersonville Aunt
  3. Volleyball Diva
  4. Dad's Youngest Sister
  5. Railyard Engineer
  6. Octogenarian
  7. Decorating Maven
  8. Dad's Favorite Pizza
  9. Home Town in Tennessee
  10. Golfer
  11. Volleyball Coach
  12. Mary EmoDean
  13. Captain ____
  14. Mary's Pet
Down
  1. Arkansas Uncle
  2. Carnegie Mellon TA
  3. Manchester Senior
  4. Devin's Love
  5. Engineer in training
  6. Telephone Operator
  7. Knitting Novice
  8. Photographer
  9. Cyber Geek in Training
  10. Pawpaw's Sidekick
  11. Favorite Pet
  12. Beauty Queen

26 Clues: GolferMary's PetDevin's LovePhotographerOctogenarianFavorite PetMary EmoDeanCaptain ____Beauty QueenArkansas UncleVolleyball DivaKnitting NoviceDecorating MavenVolleyball CoachManchester SeniorRailyard EngineerPawpaw's SidekickCarnegie Mellon TATelephone OperatorCyber Security WhizHendersonville AuntEngineer in trainingDad's Favorite Pizza...

SFSHS Government 3-10-22 2022-03-10

SFSHS Government 3-10-22 crossword puzzle
Across
  1. Biased information used to promote a point of view
  2. A security tool used to hide or scramble message contents
  3. Ukrainian region that Putin annexed
  4. This Russian company shares responsibility for Russian troll farms
  5. U.S. intelligence agency that handles domestic cyber crimes
  6. Software that seizes your data until payment is received
  7. Soviet Union intelligence agency
Down
  1. Computer security issue only known to the hacker
  2. plan of action designed to achieve a goal
  3. military alliance of 30 countries
  4. Cyber attack that hit Ukraine in 2017
  5. Main cyber risk advisor to the country
  6. President of Ukraine
  7. a country that has remained neutral on the Ukraine crisis

14 Clues: President of UkraineSoviet Union intelligence agencymilitary alliance of 30 countriesUkrainian region that Putin annexedCyber attack that hit Ukraine in 2017Main cyber risk advisor to the countryplan of action designed to achieve a goalComputer security issue only known to the hackerBiased information used to promote a point of view...

Tugas-Jaringan Komputer dan Internet 2024-01-11

Tugas-Jaringan Komputer dan Internet crossword puzzle
Across
  1. Alat untuk menerjemahkan informasi dari jaringan satu ke jaringan yang lain
  2. Salah satu aspek teknis jaringan komputer
  3. Topologi yang berbentuk bintang
  4. Salah satu sistem operasi yang sering dipakai
  5. Website yang dibuat oleh Google inc
  6. Perangkat untuk memperkuat sinyal
Down
  1. Konsep cyber security yang pertama dan terutama
  2. Komponen untuk menghubungkan workstation
  3. Salah satu cara untuk menunjang cyber security
  4. Alat ini digunakan untuk penghubung antar jaringan
  5. Salah satu jenis ancaman cyber

11 Clues: Salah satu jenis ancaman cyberTopologi yang berbentuk bintangPerangkat untuk memperkuat sinyalWebsite yang dibuat oleh Google incKomponen untuk menghubungkan workstationSalah satu aspek teknis jaringan komputerSalah satu sistem operasi yang sering dipakaiSalah satu cara untuk menunjang cyber securityKonsep cyber security yang pertama dan terutama...

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. (of software) designed to detect and destroy computer viruses
  2. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
  3. a standalone malware computer program that replicates itself in order to spread to other computers
  4. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
  5. a secret word or phrase that must be used to gain admission to a place.
  6. the art of tricking or manipulate to get someone to revel their personal information
Down
  1. looking at someone's information over their shoulder, for example looking at someone enter their PIN in a shop or at a cashpoint. A person can prevent this by using their hand to cover the keypad as they type their PIN, or being aware of people around them when typing in PINs.
  2. having or showing a cautious distrust of someone or something.
  3. the process or action of proving or showing something to be true, genuine, or valid.
  4. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
  6. an identification used by a person with access to a computer, network, or online service.
  7. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  8. the action of obtaining something by using persuasion or guile the action of obtaining private or confidential information by impersonation or another method of deception
  9. any malware that misleads users of its true intent.

15 Clues: any malware that misleads users of its true intent.(of software) designed to detect and destroy computer viruseshaving or showing a cautious distrust of someone or something.a secret word or phrase that must be used to gain admission to a place.the process or action of proving or showing something to be true, genuine, or valid....

Cyber security 2022-10-19

Cyber security crossword puzzle
Across
  1. In order to ensure the security of the data/information, we need to ____________ the data:
  2. _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  3. _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  5. ________is actually considered the first computer virus?
  6. ________ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. Advertising software can be used to spread malware.
  3. _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  4. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  5. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
  6. _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
  7. _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  8. Which wifi cummunication protocol is more Secure?

15 Clues: Which wifi cummunication protocol is more Secure?Advertising software can be used to spread malware.________is actually considered the first computer virus?In order to ensure the security of the data/information, we need to ____________ the data:_______ is a type of software designed to help the user's computer detect viruses and avoid them....

Cyber Security 2024-09-20

Cyber Security crossword puzzle
Across
  1. – An event or occurrence that disrupts normal operations, often involving security threats.
  2. – The act of breaking into a system, network, or data storage illegally.
  3. – Free from danger or threat; used to describe a well-protected system.
  4. – A copy of data stored separately to restore the original in case of data loss.
  5. – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. – Unauthorized access or entry into a computer system or network.
  7. – A secret word or phrase used to gain access to a computer system or service.
  8. – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
  9. – The process of verifying the identity of a user or system.
Down
  1. – The process of converting data into a code to prevent unauthorized access.
  2. – Adherence to laws, regulations, and standards, especially in cybersecurity.
  3. – A type of malicious software that replicates itself and spreads to other systems.
  4. – A network security system that monitors and controls incoming and outgoing network traffic.
  5. – Malicious software designed to gather information about a person or organization without their knowledge.
  6. – Strong and reliable, often used to describe a system that can withstand attacks or failures.

15 Clues: – The process of verifying the identity of a user or system.– Unauthorized access or entry into a computer system or network.– Free from danger or threat; used to describe a well-protected system.– The act of breaking into a system, network, or data storage illegally.– The process of converting data into a code to prevent unauthorized access....

cyber security 2025-07-07

cyber security crossword puzzle
Across
  1. A small window that appears on your screen, sometimes as part of a scam
  2. A tool that blocks unwanted connections to your computer or network
  3. A program that helps protect your computer from harmful software
  4. A test websites use to check if you’re a human
  5. A harmful program that spreads and damages your files
  6. Something not real, often used to trick people online
  7. A tool that helps block unwanted content or messages
Down
  1. Any software made to harm your computer or data
  2. A scam where someone pretends to be trustworthy to steal your info
  3. A harmful file that tricks you by looking like something safe
  4. A program or device that guards your network from threats
  5. A personal profile you log into on websites or apps
  6. A program that secretly collects what you do on your device
  7. A person who tries to break into computers or networks
  8. Small data stored by websites to remember what you did
  9. A part of a website or message that takes you to another page

16 Clues: A test websites use to check if you’re a humanAny software made to harm your computer or dataA personal profile you log into on websites or appsA tool that helps block unwanted content or messagesA harmful program that spreads and damages your filesSomething not real, often used to trick people online...

cyber security 2025-11-13

cyber security crossword puzzle
Across
  1. someone takes your files and you have to pay a ransom to get it back
  2. detects and removes viruses and malware
  3. tests if you are human or a computer
  4. making up a story pretending to be someone else and trying to convince someone to do something (e.g. send the money)
  5. unauthorized access to a computer system
  6. a type of malware that disguises itself
  7. a person who's job is to find faults in a system and help fix them
Down
  1. a piece of code which will do a certain command under the right conditions
  2. viruses which duplicate and spread quickly
  3. means no more annoying manual updates
  4. many computers/computer programs overflowing a website and often shutting it down at least temporarially
  5. something many people theorize will steal all jobs
  6. a type of malware that is always watching, looking, listening.....
  7. your computer's barrier between malware and itself
  8. tricks often used online to manipulate humans

15 Clues: tests if you are human or a computermeans no more annoying manual updatesdetects and removes viruses and malwarea type of malware that disguises itselfunauthorized access to a computer systemviruses which duplicate and spread quicklytricks often used online to manipulate humanssomething many people theorize will steal all jobs...