cyber security Crossword Puzzles
Cyber Security 2023-09-12
Across
- party coverage -Connected towards cyber insurance.
- - Owner identification.
- Security - Advanced protection.
- - Portable media.
- - Notify
- Authentication
- -Risky password.
- shared documents,employees.
- USB drives.
- -Communiction by emailing.
- security numbers- Valuable information.
Down
- security -Social security number.
- Attacks,imposters.
- Router
- - Technology
- - Uses WPA2 encryption.
- scheme- List
- insurance policy- Cyber attacks on your data held by vendors and other third parties.
- Management- Clarifying changes.
- - Verificaiton.
- Party Coverage -Legal recovery
- Updates- Brand new,pre-built.
23 Clues: Router • - Email • - Notify • USB drives. • - Technology • scheme- List • Authentication • - Verificaiton. • -Risky password. • - Portable media. • Attacks,imposters. • - Uses WPA2 encryption. • - Owner identification. • -Communiction by emailing. • shared documents,employees. • Updates- Brand new,pre-built. • Party Coverage -Legal recovery • Security - Advanced protection. • ...
Product Security is everyones responsibility 2017-07-02
20 Clues: Risk • cyber • Attack • Threat • People • Insider • Monitor • Product • Security • Firewall • Killchain • Integrity • Antivirus • Motivation • Resilience • Encryption • Protection • Availability • Vulnerability • Confidentiality
SecOps Gartner Vocabulary Crossword puzzle 2022-12-03
Across
- Endpoint detection and response
- Cyber security Mesh Architecture
- pentest as a service
- Security Orchestration and automated response
- vulnerability prioritization technology
- external attack surface management
- risk-based vulnerability management
- identity and access management
- security service edge
- digital forensics and incident response
- cyber asset attack surface management
- managed endpoint detection and response
- Extended detection and response
- digital risk protection service
- Identity Threat Detection and Response
Down
- Breach and Attack Simulation
- endpoint protection platform
- Vulnerability Assessment
- Cyber-Physical systems security
- Cloud Access security Broker
- threat intelligence platform
- Security Information and Event Management
- managed extended detection and response
- network detection and response
- threat intelligence
- modern security operations center
- exposure management
- data discovery and management software
- Managed detection and response
29 Clues: threat intelligence • exposure management • pentest as a service • security service edge • Vulnerability Assessment • Breach and Attack Simulation • endpoint protection platform • Cloud Access security Broker • threat intelligence platform • network detection and response • identity and access management • Managed detection and response • Endpoint detection and response • ...
FITCvocab.ACB 2013-05-17
Across
- poco
- central-processing-unit
- main-system
- long-term-memory
- MB
- safety the safety of yourself online
- what-why-what-can-she/he-do
- catchy-phrase
- downloads-on-devices
- ©
- KB
Down
- TB
- the-right-thing-to-do-online
- short-term-memory
- 3G,4G
- online-security
- ear-buds
- online-saveing
- GB
- optical,mechanical,touchpad
- microsoft-word
- keyboard
- sign
- word
24 Clues: © • TB • MB • GB • KB • poco • sign • word • 3G,4G • ear-buds • keyboard • main-system • catchy-phrase • online-saveing • microsoft-word • online-security • long-term-memory • short-term-memory • downloads-on-devices • central-processing-unit • what-why-what-can-she/he-do • optical,mechanical,touchpad • the-right-thing-to-do-online • safety the safety of yourself online
Technology Times 2017-11-02
Across
- When you step away from your desk at work
- Name of the Cyber Security Awareness newsletter
- In 2013 69% of incidents reported to US-CERT
- Workstations are refreshed
- SSID for County Employees Only and County-Owned Equipment
- Type of service organization the Information Technology Department is
- New switches will support this common industry requirement
- When is National Cyber Security Awareness Month (NCSAM)
- National public awareness campaign that increased understanding of cyber threats
- Information you work with to protect yourself and the organization
- Hashtag for NCSAM
Down
- Frequency of the Technology Times newsletter will be published
- This software will upgrade from 2013 to 2017
- Number of core switches on the County network
- Publisher of the Cyber Security Awareness Newsletter
- Name of VPN Client
- Percent of increase of reported cyber incidents in 2013
- Work badge and identification when outside your office
18 Clues: Hashtag for NCSAM • Name of VPN Client • Workstations are refreshed • When you step away from your desk at work • This software will upgrade from 2013 to 2017 • In 2013 69% of incidents reported to US-CERT • Number of core switches on the County network • Name of the Cyber Security Awareness newsletter • Publisher of the Cyber Security Awareness Newsletter • ...
Technology Times 2017-11-02
Across
- Information you work with to protect yourself and the organization
- In 2013 69% of incidents reported to US-CERT
- Work badge and identification when outside your office
- When is National Cyber Security Awareness Month (NCSAM)
- National public awareness campaign that increased understanding of cyber threats
- Hashtag for NCSAM
- When you step away from your desk at work
- Number of core switches on the County network
- Percent of increase of reported cyber incidents in 2013
Down
- Publisher of the Cyber Security Awareness Newsletter
- Name of the Cyber Security Awareness newsletter
- Name of VPN Client
- This software will upgrade from 2013 to 2017
- Frequency of the Technology Times newsletter will be published
- Type of service organization the Information Technology Department is
- SSID for County Employees Only and County-Owned Equipment
- New switches will support this common industry requirement
- Workstations are refreshed
18 Clues: Hashtag for NCSAM • Name of VPN Client • Workstations are refreshed • When you step away from your desk at work • In 2013 69% of incidents reported to US-CERT • This software will upgrade from 2013 to 2017 • Number of core switches on the County network • Name of the Cyber Security Awareness newsletter • Publisher of the Cyber Security Awareness Newsletter • ...
Technology Times 2017-11-02
Across
- Name of VPN Client
- When you step away from your desk at work
- When is National Cyber Security Awareness Month (NCSAM)
- Publisher of the Cyber Security Awareness Newsletter
- Work badge and identification when outside your office
- New switches will support this common industry requirement
- In 2013 69% of incidents reported to US-CERT
- Type of service organization the Information Technology Department is
- SSID for County Employees Only and County-Owned Equipment
Down
- Frequency of the Technology Times newsletter will be published
- National public awareness campaign that increased understanding of cyber threats
- Name of the Cyber Security Awareness newsletter
- This software will upgrade from 2013 to 2017
- Workstations are refreshed
- Hashtag for NCSAM
- Information you work with to protect yourself and the organization
- Percent of increase of reported cyber incidents in 2013
- Number of core switches on the County network
18 Clues: Hashtag for NCSAM • Name of VPN Client • Workstations are refreshed • When you step away from your desk at work • This software will upgrade from 2013 to 2017 • In 2013 69% of incidents reported to US-CERT • Number of core switches on the County network • Name of the Cyber Security Awareness newsletter • Publisher of the Cyber Security Awareness Newsletter • ...
##FIT_Vocab.yourinitials 2013-05-15
Across
- (optical, mechanical, touch pad)
- Disc Drive
- Decision Tool
- board
- Port
- port
- something you plug into a computer
- A place where you can save your work, besides a flash drive.
- Drive
- (Device)
- Host
Down
- Security
- Device
- of Office
- (display)
- Search Engine/Meta Crawlers
- 4G)
- Engine
- Slots
- Port
- (DSL, Cable)
- short term for documents
- Port
- (National Cyber Security Alliance)
24 Clues: 4G) • Port • Port • port • Port • Host • board • Slots • Drive • Device • Engine • Security • (Device) • of Office • (display) • Disc Drive • (DSL, Cable) • Decision Tool • short term for documents • Search Engine/Meta Crawlers • (optical, mechanical, touch pad) • something you plug into a computer • (National Cyber Security Alliance) • A place where you can save your work, besides a flash drive.
##FIT_Vocab.yourinitials 2013-05-15
Across
- A place where you can save your work, besides a flash drive.
- Port
- Device
- (National Cyber Security Alliance)
- Decision Tool
- Search Engine/Meta Crawlers
- (display)
- something you plug into a computer
- of Office
- Port
- short term for documents
- Engine
- Slots
- port
Down
- Host
- Disc Drive
- (DSL, Cable)
- Security
- 4G)
- (optical, mechanical, touch pad)
- board
- Drive
- Port
- (Device)
24 Clues: 4G) • Host • Port • Port • Port • port • board • Drive • Slots • Device • Engine • Security • (Device) • (display) • of Office • Disc Drive • (DSL, Cable) • Decision Tool • short term for documents • Search Engine/Meta Crawlers • (optical, mechanical, touch pad) • (National Cyber Security Alliance) • something you plug into a computer • A place where you can save your work, besides a flash drive.
##FIT_Vocab.yourinitials 2013-05-15
Across
- (National Cyber Security Alliance)
- Decision Tool
- (DSL, Cable)
- something you plug into a computer
- (optical, mechanical, touch pad)
- Port
- Port
- Engine
- Disc Drive
- Host
- Drive
- port
Down
- A place where you can save your work, besides a flash drive.
- 4G)
- Device
- Port
- short term for documents
- board
- Slots
- (display)
- of Office
- Security
- (Device)
- Search Engine/Meta Crawlers
24 Clues: 4G) • Port • Port • Port • Host • port • board • Slots • Drive • Device • Engine • Security • (Device) • (display) • of Office • Disc Drive • (DSL, Cable) • Decision Tool • short term for documents • Search Engine/Meta Crawlers • (optical, mechanical, touch pad) • (National Cyber Security Alliance) • something you plug into a computer • A place where you can save your work, besides a flash drive.
CyberHeist 2023-04-27
Across
- A type of software designed to protect against malware and other cyber threats.
- A type of cyber attack that involves taking control of a computer or network and demanding payment for release.
- A type of attack that bombards a network with traffic to bring it down.
- A security system designed to prevent unauthorised access to a network.
- A type of malware that encrypts files and demands payment to decrypt them.
- A type of cyber attack that uses stolen login credentials to access a network.
- Software designed to harm a computer or network.
- A type of cyber attack that targets physical infrastructure, such as power plants or transportation systems.
- A type of cyber attack that involves stealing sensitive information through a fake website or email.
- A type of cyber attack that targets vulnerabilities in software.
- The practice of accessing a computer network illegally.
Down
- A type of cyber attack that involves manipulating a user into taking an action that harms the network's security.
- A type of cyber attack that involves stealing sensitive information through an infected USB drive.
- A type of malware that copies itself and spreads throughout a network.
- A security process that requires two forms of authentication to access a network.
- A type of malware that can spy on a computer user's activities.
- A type of cyber attack that involves blocking access to a network until a ransom is paid.
- A form of phishing that targets high-profile individuals.
- A type of cyber attack that involves flooding a network with requests to disrupt its operation.
- A type of social engineering attack that impersonates a trusted entity to steal information. type of cyber attack that targets vulnerabilities in software.
20 Clues: Software designed to harm a computer or network. • The practice of accessing a computer network illegally. • A form of phishing that targets high-profile individuals. • A type of malware that can spy on a computer user's activities. • A type of cyber attack that targets vulnerabilities in software. • ...
CISO Crossword Quiz - 1124 2024-10-17
Across
- Cyber security ________ Awareness guide Volume I, II, III is uploaded in Corporate Website of Bank under Customer Corner Tab
- CISO office is conducting daily _______ from 5 pm to 6 pm during the entire month on occasion of NCSAM on various Cyber Security topics
- Daily Email under the banner of Cyber ______ is being sent from CISO office to all staff members of Bank containing Cyber Security Tips for Creating Awareness
- Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________
- #_________ is hashtag for current year National Cyber Security Awareness Month campaign by Govt. of India
- Multilingual Email in ________ regional languages containing Cyber Security tips is sent to customers every month for creating Cyber Security Awareness
Down
- Cyber Security Awareness Material is available for Staff members in Bank’s intranet Portal _______ under the path Departments > CISO > Products
- Cyber ______ Diwas is observed on 1st Wednesday of every month as per guidelines of MHA, Govt of India
- National Cyber Security Awareness month is observed during _______ month
- “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month
10 Clues: National Cyber Security Awareness month is observed during _______ month • Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________ • “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month • ...
CISO Crossword Quiz - 1124 2024-10-17
Across
- Cyber security ________ Awareness guide Volume I, II, III is uploaded in Corporate Website of Bank under Customer Corner Tab
- National Cyber Security Awareness month is observed during _______ month
- #_________ is hashtag for current year National Cyber Security Awareness Month campaign by Govt. of India
- Cyber ______ Diwas is observed on 1st Wednesday of every month as per guidelines of MHA, Govt of India
- Daily Email under the banner of Cyber ______ is being sent from CISO office to all staff members of Bank containing Cyber Security Tips for Creating Awareness
Down
- CISO office is conducting daily _______ from 5 pm to 6 pm during the entire month of October on occasion of NCSAM on various Cyber Security topics
- “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month
- Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________
- Multilingual Email in ________ regional languages containing Cyber Security tips is sent to all the customers of Bank every month for creating Cyber Security Awareness
- Cyber Security Awareness Material is available for Staff members in Bank’s intranet Portal _______ under the path Departments > CISO > Products
10 Clues: National Cyber Security Awareness month is observed during _______ month • Name of the Cyber Security Mascots for Union Bank of India is URkshak and U__________ • “ Cyber ________ Bharat “ is the Current year theme for National Cyber Security Awareness Month • ...
CSAM 2022 - Individual Game 1 2022-08-31
Across
- "Chain" that deals with the movement of goods
- Exposed fragility of supply chain
- State with data privacy laws that QT has stores in
- Number of 3rd Party breaches this year
- QT team responsible for handling cyber security risk
- First state to enact a consumer privacy law
- EU Data Privacy acronym
Down
- Percentage of data breaches caused by 3rd parties
- QT team that responds to cyber security threats
- Cyber attack that fakes identity
- A third party that may have access to QT systems or data
- Malicious email attack
- Data type affected by data privacy laws
- Greatest cyber security risk (demographic)
- Term that means signs of malicious activity (2 words)
15 Clues: Malicious email attack • EU Data Privacy acronym • Cyber attack that fakes identity • Exposed fragility of supply chain • Number of 3rd Party breaches this year • Data type affected by data privacy laws • Greatest cyber security risk (demographic) • First state to enact a consumer privacy law • "Chain" that deals with the movement of goods • ...
Cyber Security 2022-05-20
Across
- Block of data transmitted across a network
- Software that can harm a system
- Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- Type of cyber attack where data is kept from the victim until a price is paid to the hacker
- Base-10 number system
- The fourth phase of ethical hacking
- The second phase of ethical hacking
- Malware that functions by spying on user activity without their knowledge
- The third phase of ethical hacking
- Process of encoding data to prevent theft
- Malware that can replicate itself to spread to other connected computers
- System for connecting a number of computer systems to form a local area network
- Performs tasks on command, allowing attackers to remotely control an affected computer
Down
- Operation of joining character strings end-to-end
- Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
- Type of malware that corrupts and spreads between victims
- Software that takes advantage of a flaw in a computer system
- Subset of the internet with addresses sharing a common suffix
- Base-2 number system
- Base-16 number system
- The first phase of ethical hacking
- Type of cyber attack where attacker attempts to trick the victim into giving them information
- The creation of a child process from a parent process
- Attack where hacker injects false training data to corrupt the learning model
- Input value to a command
25 Clues: Base-2 number system • Base-10 number system • Base-16 number system • Input value to a command • Software that can harm a system • The first phase of ethical hacking • The third phase of ethical hacking • The fourth phase of ethical hacking • The second phase of ethical hacking • Process of encoding data to prevent theft • Block of data transmitted across a network • ...
Cyber Security 2022-05-20
Across
- Base-10 number system
- Subset of the internet with addresses sharing a common suffix
- Base-16 number system
- Performs tasks on command, allowing attackers to remotely control an affected computer
- Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- Malware that can replicate itself to spread to other connected computers
- Input value to a command
- Malware that functions by spying on user activity without their knowledge
- Process of encoding data to prevent theft
- Block of data transmitted across a network
- Type of cyber attack where attacker attempts to trick the victim into giving them information
- Type of malware that corrupts and spreads between victims
- System for connecting a number of computer systems to form a local area network
- The second phase of ethical hacking
- Type of cyber attack where data is kept from the victim until a price is paid to the hacker
Down
- The third phase of ethical hacking
- Software that can harm a system
- Operation of joining character strings end-to-end
- Base-2 number system
- The first phase of ethical hacking
- The fourth phase of ethical hacking
- Software that takes advantage of a flaw in a computer system
- Attack where hacker injects false training data to corrupt the learning model
- Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
- The creation of a child process from a parent process
25 Clues: Base-2 number system • Base-10 number system • Base-16 number system • Input value to a command • Software that can harm a system • The third phase of ethical hacking • The first phase of ethical hacking • The fourth phase of ethical hacking • The second phase of ethical hacking • Process of encoding data to prevent theft • Block of data transmitted across a network • ...
Cyber Security 2023-09-08
Across
- data encryption ransom
- compromised computer network
- psychological manipulation
- system manager
- identifying threats
- unwanted advertisements
- multiple verification layers
- secret access keys
- protecting digital systems.
- interconnected devices
Down
- stolen identity
- data encrypt
- secure network connection
- wireless technology
- unauthorized access point
- internet address
- malicious digital actions
- digital information
- malicious software
- computer programs
20 Clues: data encrypt • system manager • stolen identity • internet address • computer programs • malicious software • secret access keys • wireless technology • identifying threats • digital information • data encryption ransom • interconnected devices • unwanted advertisements • secure network connection • unauthorized access point • malicious digital actions • psychological manipulation • ...
Cyber Security 2019-12-09
Across
- A security system that monitors and controls incoming and outgoing data , can inspect to see if suspicious
- A cyber attack intended to redirect a website's traffic to another, fake site.
- A reason why a password may be easy to guess and weak
- Code which downloads and displays adverts
- Measurements and calculations for human characteristics and the body
- If a mac address is on this, it will be able to access the system
- A type of hacker who gains access to data without permission and with the intent to harm the data
- Physical viewing an others sensitive information,by looking at people entering personal information onto a computer or a cash machine
- Code that is capable of copying itself to damage or destroy data
- A program that appears safe but is malicious and is designed to harm data. Installed by the user
Down
- What you may do to a computers MAC address if it is on a blacklist
- Also known as Pretexting
- Turning normal text into data that cant be read
- Code which allows hackers to see a computers activities
- Is used for a shared network /computer to ensure a person is who they claim to be
- A type of penetration testing that is a simulation of a black hat hacker attacking the system from outside the organisation
- Automatic way of telling if a machine or human is trying to access the system
- Code that is written with the intent to do harm
- Persuading an individual to share private information, usually via email or fake website
- Something you should do regularly to make your password harder to guess and data more protected
20 Clues: Also known as Pretexting • Code which downloads and displays adverts • Turning normal text into data that cant be read • Code that is written with the intent to do harm • A reason why a password may be easy to guess and weak • Code which allows hackers to see a computers activities • Code that is capable of copying itself to damage or destroy data • ...
Cyber Security 2020-10-27
Across
- Software designed to block malware from entering protected networks.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- a program that records every key struck on a keyboard and sends that information to an attacker.
- A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
- The amount of data that can pass through a network or part of a network per second.
- Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
- software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- or identity theft.
- until it is decrypted using a secret key.
- unsolicited emails sent to many addresses. The purpose of most spam is to make money through
- a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- a data storage device that is used to store, back up, and transfer computer files.
- a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Down
- consists of code written in a programming language that instructs computers to perform specific tasks.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- Two or more interconnected devices that can exchange data.
- a computer or computer program that provides specific services on a network, such as an email server
- port a type of connection between devices that can exchange information and power supply.
- a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
- Computer programs that can block, detect, and remove viruses and other malware.
- A company or organization that gives users and devices access to the Internet.
- attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- programs.
- directs emails and a web server that serves up web pages.
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
27 Clues: programs. • or identity theft. • until it is decrypted using a secret key. • directs emails and a web server that serves up web pages. • Two or more interconnected devices that can exchange data. • Software designed to block malware from entering protected networks. • A company or organization that gives users and devices access to the Internet. • ...
Cyber security 2024-09-18
Across
- The measurement and analysis of physical characteristics, such as fingerprints or facial recognition, used to verify a person's identity.
- A type of software that displays unwanted advertisements on a user's screen, often in the form of pop-ups, and may track browsing activities.
- A malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity, usually through email or other forms of communication.
- A standalone malware program that replicates itself to spread to other computers, often causing harm to networks by consuming bandwidth.
- A trial-and-error method used to decode encrypted data, such as passwords, by systematically checking all possible combinations.
- An additional layer of security requiring users to provide two forms of identification to verify their identity, usually a password and a code sent to their device.
- An attack designed to overwhelm a system or network by flooding it with traffic, rendering it unable to provide services to legitimate users.
- The act of gaining unauthorized access to computers, networks, or data, often to exploit vulnerabilities for malicious purposes.
- A cyberattack where users are redirected from a legitimate website to a fraudulent one without their knowledge, often used to steal login credentials.
- A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access.
- A DoS attack launched from multiple sources simultaneously, making it harder to stop and causing greater disruption to the target system or network.
Down
- A server that acts as an intermediary between a user's device and the internet, used to hide the user's IP address or bypass network restrictions.
- A service that encrypts a user's internet connection and masks their IP address, providing privacy and security when using public networks.
- A manipulation technique used to trick individuals into giving up confidential information, often through psychological manipulation rather than technical exploits.
- A type of malware disguised as legitimate software, used to access systems by tricking users into loading and executing the malware on their systems.
- A cryptographic protocol designed to provide secure communication over a computer network, often viewed as the successor to SSL.
- Software that secretly collects information about a user's activities without their knowledge, often for advertising or theft purposes.
- A protocol for establishing authenticated and encrypted links between networked computers, often used to secure communication over the internet.
- A secret combination of characters used to verify a user's identity and grant access to a computer system or network.
- The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information.
- A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- A unique identifier assigned to an individual for accessing a computer system, often used in conjunction with a password.
23 Clues: A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access. • A secret combination of characters used to verify a user's identity and grant access to a computer system or network. • The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information. • ...
Cyber Security 2023-04-18
Across
- Malicious software spread over a network.
- Someone who breaks into a device.
- Illegally exploit vulnerable networks.
- workers use their own devices.
- A disguised type of malware.
- Media manipulation to seem real.
- a secure internet connection
- Malware that collects/transmits private information.
- viruses that try for money.
- Systems that prevent unauthorized access.
- cyber attacks using sensitive information.
- Hyperlinks that seem real.
Down
- a group of bad computers
- software designed to damage computers.
- Online harassment.
- Manipulating a system.
- Security measures using physiology and behavior.
- Unwanted Ads on a device.
- Scrambled data for authorized users.
- Hidden malware when clicked on.
20 Clues: Online harassment. • Manipulating a system. • a group of bad computers • Unwanted Ads on a device. • Hyperlinks that seem real. • viruses that try for money. • A disguised type of malware. • a secure internet connection • workers use their own devices. • Hidden malware when clicked on. • Media manipulation to seem real. • Someone who breaks into a device. • ...
Cyber Security 2023-04-05
Across
- A malware synonymous with EternalBlue
- Best cybersecurity tool
- Unauthorised access of someone's gadgets
- Lock icon in the browser address bar for a URL
- Man made universe which we can't live without
- Hackers demand ransom in this currency
- Most dangerous computer virus in history
- Type of malware that threatens to expose information
- Malicious code infecting your system
- Best practices to keep your system secure
Down
- Key to open your account
- Ensures business continuity in CIA triad
- Target contacted by email or telephone or message
- People and management problem
- Browser for the dark web
- Social media platform is a hackers’ favourite
- Unnecessary mail chocking the network
- Malicious software which is installed in your system when you click a link
- Operating system for cybersecurity
- Computer virus that destroyed photos, audio files and documents
20 Clues: Best cybersecurity tool • Key to open your account • Browser for the dark web • People and management problem • Operating system for cybersecurity • Malicious code infecting your system • A malware synonymous with EternalBlue • Unnecessary mail chocking the network • Hackers demand ransom in this currency • Ensures business continuity in CIA triad • ...
cyber security 2025-08-26
Across
- A fake email scam designed to steal personal information.
- Unauthorized access to sensitive systems or data.
- Software or hardware that records everything typed.
- An update that fixes security vulnerabilities in software.
- A network of compromised computers controlled remotely.
- Malware that attaches to files and spreads when they open.
- Malware disguised as legitimate software.
- A vulnerability that hackers exploit before it’s patched.
- General term for malicious software.
Down
- The process of converting data into a secret code.
- Attack that overwhelms a system with massive fake traffic.
- Software that secretly gathers user information.
- Hidden access point into a system left by attackers.
- Malware that hides itself deep in the operating system.
- Code or tool that takes advantage of a vulnerability.
- Login method requiring two forms of authentication.
- One-way process of turning data into a fixed-length string.
- Self-replicating program that spreads without human help.
- Malware that locks files and demands payment.
- Network security system that blocks unauthorized access.
20 Clues: General term for malicious software. • Malware disguised as legitimate software. • Malware that locks files and demands payment. • Software that secretly gathers user information. • Unauthorized access to sensitive systems or data. • The process of converting data into a secret code. • Software or hardware that records everything typed. • ...
Cyber security 2017-02-23
25 Clues: ce clue • ml clue • riz clue • dns clue • ntp clue • iot clue • ddos clue • risk clue • mitm clue • gdpr clue • owasp clue • nixer clue • mirai clue • iasme clue • audit clue • tcpip clue • botnet clue • bchain clue • packet clue • crypto clue • pentest clue • network clue • red team clue • firewall clue • cyberowl clue
Cyber Security. 2017-06-30
Across
- Obtaining access to another system without permission.
- software that lets a user to obtain information about another's computer activities.
- is a software that blocks access to the victim's data and threatens to publish or delete it until ransom is paid.
- is the attempt to obtain sensitive information such as usernames, passwords, and credit card details.
- a person who gains unauthorized access to computer files or networks in order to further social or political ends.
- the action of protecting, or the state of being protected.•a person or thing that protects someone or something.
- software which is specifically designed to damage a computer system.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- network of computers infected with malicious software and controlled as a group without the owners' knowledge.
- software that gets into your devise without you knowing.
- Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Irrelevant messages sent over the Internet, typically to large numbers of users, for advertising.
Down
- •a string of characters that allows access to a computer, interface, or system.
- A group or system of interconnected people or things.
- is a cyber attack redirecting a website's traffic to another from a fake site.It can be conducted by changing the hosts file on the computer.
- A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.
- a situation involving exposure to danger.
- Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message.
- software that attaches itself to all you contacts and sends itself to others in an endless cycle.
- network an online community of people with a common interest who use a website or other technologies to communicate with each other and share information, resources You tend to be in a community with friends, colleagues and family.
- the fraudulent practice of using another person's name and personal information in order to obtain credit, loans.
- logger a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
- an attempt by hackers to damage or destroy a computer network or system.
- Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
- a person who uses computers to gain unauthorized access to data.
- In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable for the user.
27 Clues: a situation involving exposure to danger. • A group or system of interconnected people or things. • Obtaining access to another system without permission. • software that gets into your devise without you knowing. • a person who uses computers to gain unauthorized access to data. • software which is specifically designed to damage a computer system. • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- Avoid sending personal information via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- A string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _ _ _ _ your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media Websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Avoid sending personal information via • Always _ _ _ _ your computer when you leave your desk • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Cyber security 2023-09-09
Across
- software that holds your data hostage
- helps make sure that a user types in the correct url to get into a desired website
- where a bunch of false information paper on ur screen forcing u to click on it causing for ur device to get infected
- one option that can help protect your business against losses resulting from a cyber attack
- a way of fighting against Phishing attacks by verifying the emails that are being sent
- the act of imitating to be someone reputable and convince another person to reveal information
- one of the most safest way to secure wireless connections
- convert data into a code to prevent unauthorized access
- a system to block unauthorized data
Down
- the act of protecting systems from digital attacks
- when data has been leaked or obtained in an illegal way
- a service that hosts websites for clients, it facilitates maintenance of a site and makes it accessible on the World Wide Web
- a action of trying to steal someone information
- a series of letter that only a trusted person would know it provides security to accounts
- a way to identify email from spoofers
- designed to disrupt, damage, or gain unauthorized access to a computer system.
- group of Computers that share user information
- when a person attempts to want to help u out wit a problem in ur computer
- a group of private computers that infect malicious software
- act of passing as someone, once you have accessed his private information
20 Clues: a system to block unauthorized data • software that holds your data hostage • a way to identify email from spoofers • group of Computers that share user information • a action of trying to steal someone information • the act of protecting systems from digital attacks • when data has been leaked or obtained in an illegal way • ...
Cyber Security 2023-09-11
Across
- Facts/statistics and information
- Technique to acquire sensitive data
- A private network that is virtual
- Operating Information used by a computer
- Power to enforce obedience
- Criminals that use technology
- Something that gives safety
- Having protection from danger
- Proving something is true
- Malware designed to deny access to files on your computer
Down
- Violation of something
- Being responsible for something
- Protocol designed to protect communication over a network
- State of being exposed to and attack
- Converting data or information into code
- Compliance with rules/standards
- A person who pretends to be someone else
- A fraud
- Sending emails with a fake senders address
- Digital currency
20 Clues: A fraud • Digital currency • Violation of something • Proving something is true • Power to enforce obedience • Something that gives safety • Criminals that use technology • Having protection from danger • Being responsible for something • Compliance with rules/standards • Facts/statistics and information • A private network that is virtual • Technique to acquire sensitive data • ...
Cyber Security 2024-02-20
Across
- Unsolicited bulk emails
- Deceptive email tactic
- Software for detecting and removing malware
- Harmful software
- Unauthorized access seeker
- Verification process
- Newly discovered vulnerability
- Secure data transmission protocol
- Secure network connection
- Network of infected computers controlled remotely
- Denial of Service attack
Down
- Malicious software demanding payment
- Weakness in a system's security
- Access code
- Network security barrier
- Identity verification using unique physical traits
- Protection of internet-connected systems and data
- Software update
- Data protection method
- Malware disguised as legitimate software
20 Clues: Access code • Software update • Harmful software • Verification process • Deceptive email tactic • Data protection method • Unsolicited bulk emails • Network security barrier • Denial of Service attack • Secure network connection • Unauthorized access seeker • Newly discovered vulnerability • Weakness in a system's security • Secure data transmission protocol • ...
Cyber Security 2024-08-11
Across
- - Open-access
- - Protective-measure
- - Connected-system
- - Origin-info
- - Innovation-tools
- - Behavior-rules
- - Correct-form
- - Technique-used
- - Grasp-meaning
- - Personal-boundaries
- - Obtain-asset
- - Secure-code
- - Lawful-acts
- - Showcase-example
- - Community-rules
- - Valuable-item
- - Identify-threats
- - Official-regulations
- - Knowledge-data
- - Recognized-known
Down
- - Societal-norms
- - No-cost
- - Represent-example
- - Investigate-topic
- - Problematic-matters
- - Guidelines-rules
- - Digital-responsibility
- - Protection-law
- - Free-access
- - Available-choices
- - Permissible-actions
- - Distributing-resource
- - Learner-individual
- - Tech-based
- - Progress-innovation
- - Safety-measures
- - Reference-source
- - Stop-risks
- - Morally-right
- - Evaluate-differences
40 Clues: - No-cost • - Tech-based • - Stop-risks • - Open-access • - Origin-info • - Free-access • - Secure-code • - Lawful-acts • - Correct-form • - Obtain-asset • - Grasp-meaning • - Valuable-item • - Morally-right • - Societal-norms • - Behavior-rules • - Protection-law • - Technique-used • - Knowledge-data • - Safety-measures • - Community-rules • - Connected-system • - Guidelines-rules • - Innovation-tools • ...
Cyber Security 2024-08-29
Across
- Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
- tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
- Jenis malware yang merekam aktivitas pengguna di komputer
- Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
- Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
- jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
- proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
- Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
- Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
- Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
- proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
- proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
- Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
- Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
- Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
- Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
- Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
- Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
- Jenis malware yang menyebarkan dirinya melalui email atau lampiran
- Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain
20 Clues: Jenis malware yang merekam aktivitas pengguna di komputer • Teknik manipulasi psikologis untuk mendapatkan informasi sensitif • Jenis malware yang menyebarkan dirinya melalui email atau lampiran • Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna • Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer • ...
Cyber Security 2025-03-16
Across
- Identity to access a website
- Secretly collects private info
- Locks you out system until paid
- Process to verify someone's identity
- Way to send messages over internet
- A software update to fix vulnerabilities
- Combination of stuff for security
- Software designed with intent to harm
- Disguises as legitimate software but bad
Down
- Programs that attach and spread files
- Attempt by Hackers to compromise data
- Detects, prevents, and removes malware
- Bad guy who steals info
- A trick to get private info
- Scrambles info to protect it
- Barrier between a trusted network
- Intrusively displays unwanted advertisements
- Overloads a network to kill it
- Self replicating program that spreads independently
- Network of malware infected computers
20 Clues: Bad guy who steals info • A trick to get private info • Identity to access a website • Scrambles info to protect it • Secretly collects private info • Overloads a network to kill it • Locks you out system until paid • Barrier between a trusted network • Combination of stuff for security • Way to send messages over internet • Process to verify someone's identity • ...
cyber security 2025-05-08
Across
- Copying someone’s work and claiming it as your own.
- Unwanted bulk emails sent to many people.
- The online record you leave behind.
- Ethical rules to follow while using the internet.
- Illegal copying or sharing of software.
- Unethical act of harassing someone online.
- A person who breaks into systems.
- Falsely pretending to be someone to steal info.
- A person who breaks into systems to cause harm or steal data.
- The unique ID every device has on a network.
- A malicious program that spreads by itself.
- Ethical use of technology and internet.
Down
- Fake websites or emails used to trick users.
- The act of accessing a system without permission.
- A small file that stores user data in the browser.
- A malicious trick where users click on invisible or disguised elements.
- A legal right that protects original digital works.
- A system that filters network traffic for safety.
- Secret word used to access an account.
- Transforming information to hide its meaning.
20 Clues: A person who breaks into systems. • The online record you leave behind. • Secret word used to access an account. • Illegal copying or sharing of software. • Ethical use of technology and internet. • Unwanted bulk emails sent to many people. • Unethical act of harassing someone online. • A malicious program that spreads by itself. • ...
cyber security 2022-11-28
Across
- / something special to a person and they can do it with a pen or pencil for important documents
- / malware
- / a slimy snake like insect that lives in mud and is basically prey to every other living organism
- /opposite of spyware
- / the opposite of decryption
- / a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
- patch
- logger /something that records what keys on the keyboard are clicked
- / making something easier to understand in cyber security terms opposite of encryption
- / a giant hollow horse statue made in the olden days and it has trojan in its name
Down
- / opposite of virus
- / botnet
- / ware made for spying
- firewall / a type of firewall
- / a type of virus
- pack/ a pack of service
- / rookit
- / an undead creature
- it is ransomware
- / the door at the back of the house
20 Clues: patch • / rookit • / malware • / botnet • it is ransomware • / a type of virus • / opposite of virus • /opposite of spyware • / an undead creature • / ware made for spying • pack/ a pack of service • / the opposite of decryption • firewall / a type of firewall • / the door at the back of the house • logger /something that records what keys on the keyboard are clicked • ...
Cyber Security 2023-02-10
Across
- or identity theft.
- A company or organization that gives users and devices access to the Internet
- often by using emails or fake websites that look like they are from trusted organizations.
- Someone who uses computers and computer networks to disrupt services or share secret information in
- Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- until it is decrypted using a secret key
- Consists of code written in a programming language that instructs computers to perform specific tasks.
- computers are usually used to cause damage that couldn’t be achieved with a single computer
- Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- Attempting to trick people into revealing sensitive information, such as passwords and credit card
- A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
- Extra copies of computer files that can be used to restore files that are lost or damaged
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by
- software Computer programs that can block, detect, and remove viruses and other malware
- A computer or computer program that provides specific services on a network, such as an email server
- It then demands a ransom if the victim wants his or her files back.
- Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
- it with a flood of traffic from a team of computers.
- effort to draw attention to political or social issues.
- directs emails and a web server that serves up web pages.
- Software designed to block malware from entering protected networks
- programs.
- A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
- The amount of data that can pass through a network or part of a network per second
25 Clues: programs. • or identity theft. • until it is decrypted using a secret key • it with a flood of traffic from a team of computers. • effort to draw attention to political or social issues. • directs emails and a web server that serves up web pages. • It then demands a ransom if the victim wants his or her files back. • ...
Cyber security 2025-08-26
Across
- – Blocks unauthorized network traffic
- – Tracks browsing activity
- – Secure private network tunnel
- – Harmful software program
- – Network of infected computers
- – Disguised harmful program
- – Secret login credential
- – Fixes software vulnerability
- – Fake email scam attempt
- – Self-replicating malware
Down
- – Records keystrokes secretly
- – Extra login verification step
- – Collects user information secretly
- – Scrambles data for security
- – Locks files for payment
- – Protects against malware
- – Translates domain to IP
- – Unwanted bulk email
- – Hides malicious software
- – Breaks into systems
20 Clues: – Unwanted bulk email • – Breaks into systems • – Locks files for payment • – Secret login credential • – Translates domain to IP • – Fake email scam attempt • – Tracks browsing activity • – Harmful software program • – Protects against malware • – Hides malicious software • – Self-replicating malware • – Disguised harmful program • – Records keystrokes secretly • ...
Cyber Security 2025-10-11
Across
- A malicious code that attaches itself to clean files and spreads to other files
- A cryptographic value used to verify data authenticity and integrity
- Software that secretly gathers user information without permission
- A secure connection that encrypts data between a device and a network
- Software designed to harm or exploit any programmable device or network
- Authentication method based on unique biological traits like fingerprints
- An attack that floods a system with traffic, causing a denial of service
- A software vulnerability unknown to the vendor and unpatched
- The process of converting data into a coded form to prevent unauthorized access
- A type of malware disguised as legitimate software
- Malware that locks or encrypts data and demands payment to restore access
- A network of infected computers controlled remotely by hackers
- A secret way of bypassing normal authentication to access a system
- A self-replicating program that spreads through networks
- A test used to differentiate between humans and automated bots
- System that monitors network traffic for suspicious activity
Down
- Any attempt to damage, steal, or disrupt data or computer systems
- Manipulating people into revealing confidential information
- A tool used to store and manage multiple passwords securely
- A person who gains unauthorized access to computer systems
- Software that detects and removes malicious programs
- The process of verifying the identity of a user or system
- A secret word or phrase used to access a system or account
- A cyber attack that tricks users into revealing personal information through fake emails or websites
- The release of sensitive or confidential information to unauthorized people
- Settings that determine what network traffic is allowed or blocked
- An update designed to fix vulnerabilities in software
- A distributed version of a DoS attack using multiple computers
- The key used to encode or decode encrypted data
- A network security system that monitors and controls incoming and outgoing traffic
30 Clues: The key used to encode or decode encrypted data • A type of malware disguised as legitimate software • Software that detects and removes malicious programs • An update designed to fix vulnerabilities in software • A self-replicating program that spreads through networks • The process of verifying the identity of a user or system • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- To protect personal information, avoid sending it via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- a string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _______your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Cyber Security 2023-11-29
Across
- The outer boundary of a network, often protected by firewalls and other security measures.
- Authentication based on unique physical or behavioral traits
- A self-replicating malware that spreads across networks.
- A decoy system designed to attract and detect cyber-attacks.
- Security Operations Center, a centralized unit for monitoring and managing security
- The process of converting data into a code to prevent unauthorized access.
- Weakness in a system that can be exploited by attackers.
- The process of converting input data into a fixed-size string of characters, often used for data integrity.
- Distributed Denial of Service, a cyber-attack that overwhelms a system with traffic.
Down
- The device or node where a network connection is terminated.
- Malicious software that encrypts data and demands a payment for its release
- Software designed to harm or exploit computer systems.
- A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity.
- A software update designed to fix vulnerabilities or improve functionality.
- A technology that ensures secure communication over an untrusted network
- This network security device acts as a barrier to block unauthorized access.
- Unauthorized interception of network traffic to capture and analyze data.
- A systematic examination of security measures to identify vulnerabilities.
- A security event that compromises the confidentiality, integrity, or availability of data.
- Faking the source of network packets to deceive a system
20 Clues: Software designed to harm or exploit computer systems. • A self-replicating malware that spreads across networks. • Weakness in a system that can be exploited by attackers. • Faking the source of network packets to deceive a system • The device or node where a network connection is terminated. • Authentication based on unique physical or behavioral traits • ...
Cyber Security 2023-04-18
Across
- Middle man wifi network attack.
- Hacker hired to test security.
- Scrambling data to prevent theft.
- Malicious elements that trick users.
- Website temporarily shutting down.
- Malicious commands.
- Network of infected computers.
- Malware that 'spies' on users.
Down
- Software designed to hurt computer systems.
- Verifies your identity.
- Online harassment.
- Cyber attack that includes fake sensitive info.
- Protects a device from attack.
- AI images showing Trump's Arrest.
- Used during the encryption process.
- Private network that uses encryption.
- Unique device network identifier.
- Demands ransom to regain access to computers.
- Hacker changes IP address of email.
- Higher risk of business security breach.
20 Clues: Online harassment. • Malicious commands. • Verifies your identity. • Protects a device from attack. • Hacker hired to test security. • Network of infected computers. • Malware that 'spies' on users. • Middle man wifi network attack. • AI images showing Trump's Arrest. • Scrambling data to prevent theft. • Unique device network identifier. • Website temporarily shutting down. • ...
Cyber Security 2023-09-08
Across
- Something that protects your information
- A way of baiting for access to personal information
- A tool used to link two or more packet-switched networks or subnetworks
- A device to gain access to the internet
- A way of computing devices
- a way of identifying someone on the internet/ online services
- an operating system for mobile devices
- No cable internet
- images saved to your devices, pngs, screenshots ect.
Down
- to make sure something is valid from the information that is being input
- 8 characters that allow you to have access to something
- Converts into code or cipher to block unauthorized access
- listening in between a conversation to gain personal information about your security breaches to accounts or info online
- Term for having information that is collected
- A fraud or a way of stealing ones information
- online web; people across the world have access using a device
- a link that you pressed that attacks your software and holds onto your data
- disrupts and damages the computer system
- Attacks your computer and affects the data that is stored negatively
- A program or other operating information used by a computer
20 Clues: No cable internet • A way of computing devices • an operating system for mobile devices • A device to gain access to the internet • Something that protects your information • disrupts and damages the computer system • Term for having information that is collected • A fraud or a way of stealing ones information • A way of baiting for access to personal information • ...
Cyber Security 2025-03-27
25 Clues: Wide • Light • Local • Wi-Fi • Light • Cable • Signal • Packet • Layers • Private • Gateway • Network • Dial-up • Spectrum • External • Personal • Mobility • Frequency • Shortwave • Conductor • High-speed • Centralized • Transmission • Communication • Interconnected
Cyber Security 2025-08-20
Across
- Network of infected computers controlled remotely
- Software that blocks unauthorized access
- Disguised malicious program
- Self-replicating malicious program
- Verification of identity
- Unauthorized access to data
- A scam to steal sensitive information via email
- Tool that records keystrokes
- Secret combination of characters used for access
- Malicious software that spreads across systems
Down
- Code that takes advantage of a system weakness
- Malware that demands money to restore access
- Attack targeting computer systems
- Software that secretly monitors activity
- Program designed to detect malicious software
- Software update fixing security vulnerabilities
- Malicious software designed to self-replicate
- Process of converting data into a coded form
- Secure private connection over the Internet
- Someone who breaks into computer systems
20 Clues: Verification of identity • Disguised malicious program • Unauthorized access to data • Tool that records keystrokes • Attack targeting computer systems • Self-replicating malicious program • Software that blocks unauthorized access • Software that secretly monitors activity • Someone who breaks into computer systems • Secure private connection over the Internet • ...
Cyber Security 2025-08-27
Across
- Secures internet connection
- Network of infected computers
- Decoy system for hackers
- Blocks unauthorized access
- Hides malicious processes
- Unknown software flaw
- Locks data for payment
- Converts data to code
- Secretly monitors activity
- Overloads servers with traffic
Down
- Fixes software vulnerabilities
- Scrambles data for secrecy
- Hidden access point
- Records typed keystrokes
- Encrypts web communications
- Fake emails trick users
- Malicious software program
- Extra login verification
- Detects and removes malware
- Self-replicating malware
20 Clues: Hidden access point • Unknown software flaw • Converts data to code • Locks data for payment • Fake emails trick users • Decoy system for hackers • Records typed keystrokes • Extra login verification • Self-replicating malware • Hides malicious processes • Scrambles data for secrecy • Blocks unauthorized access • Malicious software program • Secretly monitors activity • ...
Cyber Security 2022-10-12
Across
- Multifactor Authentication is often shorten to _ _ _
- The means by which an individual provides his/her permission for the use or disclosure of their PII.
- Information Technology help desk through which service requests, information security incidents, and general IT questions may be directed to.
- A small file placed on a computer by a website assigning a unique ID to the device
- What all employees are when they handle Personally Identifiable Information
- What you are if you complete this crossword by the end of the week.
- The style of cyber attack where a criminal attempts to get you to click on a link in an email.
- The process by which an individual’s access to accounts and data is reviewed on a routine basis.
- Recently published CHS notice relating to how CHS handles employees personal data.
Down
- The style of cyber attack where a criminal holds a company's data hostage until they pay a ransom.
- A California law detailing data protection and privacy regulations for all individual citizens of California (Abr)
- The name of an account with elevated privileges to administer a system or application.
- Data which is limited to individuals with a need-to-know. May be subject to legal or contractual confidentiality requirements.
- Data which is subject to legislative, legal, and industry regulations and must be Handled with the highest sensitivity and may be subject to breach notification laws.
- CHS approved Password Manager.
- Complete this phrase "Where to Store, What to _____"
- The type of engineering which targets "bugs in the human hardware"
- Permission entitled to an individual allowing them to use a system or view data.
- A European Union (EU) law detailing data protection and privacy regulations for all individual citizens of the EU and the European Economic Area (EEA)(Abr)
- Data which CHS has made available and approved for public dissemination.
20 Clues: CHS approved Password Manager. • Multifactor Authentication is often shorten to _ _ _ • Complete this phrase "Where to Store, What to _____" • The type of engineering which targets "bugs in the human hardware" • What you are if you complete this crossword by the end of the week. • Data which CHS has made available and approved for public dissemination. • ...
Cyber security 2023-04-28
Across
- Software designed to harm or exploit any device or network it infects.
- A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
- Software designed to detect and remove viruses and other types of malware.
- detection system Software that monitors a network or system for signs of unauthorized access or activity.
- attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
- authentication A security measure that requires two forms of identification to access an account.
- breach The unauthorized access, use, or disclosure of sensitive information.
- engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- force attack A method of guessing a password by trying every possible combination until the correct one is found.
- security The practice of securing a network from unauthorized access or attacks.
- An update to software that fixes a vulnerability or bug.
- Criminal activity that involves the use of digital devices or networks.
- testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
- exploit An attack that exploits a previously unknown vulnerability in a software application or system.
- The process of verifying the identity of a user or system.
- A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
- Method of converting plain text into a code that can only be read by authorized parties.
- A weakness or flaw in a system that can be exploited by attackers.
- Network security system that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
20 Clues: An update to software that fixes a vulnerability or bug. • The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • Software designed to harm or exploit any device or network it infects. • Criminal activity that involves the use of digital devices or networks. • ...
Cyber Security 2023-09-08
Across
- to save a state of something to restore later
- to lie
- resources
- to gain control of
- pops up that appears on websites to lead you to other websites
- combination of letters used to lock a file or account
- National Institution of Standards and Technology at the US department of Commerce
- applications or programs
- to fix something
- to delete
- to identify
- enter your account using your credentials
Down
- criminals of the internet
- Change something to a newer version of it
- malware that negatively modifies your computer
- to return something to a previous state
- not given permission
- Get rid of
- to inform someone of something
- to protect something from outsiders
- a program specifically designed to fulfill a purpose for users
21 Clues: to lie • resources • to delete • Get rid of • to identify • to fix something • to gain control of • not given permission • applications or programs • criminals of the internet • to inform someone of something • to protect something from outsiders • to return something to a previous state • Change something to a newer version of it • enter your account using your credentials • ...
Cyber Security 2023-09-08
Across
- to save a state of something to restore later
- to lie
- resources
- to gain control of
- pops up that appears on websites to lead you to other websites
- combination of letters used to lock a file or account
- National Institution of Standards and Technology at the US department of Commerce
- applications or programs
- to fix something
- to delete
- to identify
- enter your account using your credentials
Down
- criminals of the internet
- Change something to a newer version of it
- malware that negatively modifies your computer
- to return something to a previous state
- not given permission
- Get rid of
- to inform someone of something
- to protect something from outsiders
- a program specifically designed to fulfill a purpose for users
21 Clues: to lie • resources • to delete • Get rid of • to identify • to fix something • to gain control of • not given permission • applications or programs • criminals of the internet • to inform someone of something • to protect something from outsiders • to return something to a previous state • Change something to a newer version of it • enter your account using your credentials • ...
Cyber Security 2024-03-15
Across
- Internet protocol
- Physical Components of a pc
- collective network of devices
- only numbers combined t
- social engineering attack involving email
- picture puzzles are common security
- several security methods is called
- Distributed Denial of service
- Controls and monitors traffic
- malware, that replicates inside files
Down
- process of proving you are
- an intentional harmful file
- global network of remote servers
- pretends to be something else
- in the middle attack
- Process of protecting information
- letters, numbers,special characters combined
- group of interconnected computing devices
- Programs, operating systems
- virtual private network
20 Clues: Internet protocol • in the middle attack • only numbers combined t • virtual private network • process of proving you are • an intentional harmful file • Physical Components of a pc • Programs, operating systems • pretends to be something else • collective network of devices • Distributed Denial of service • Controls and monitors traffic • global network of remote servers • ...
Cyber Security 2025-10-11
Across
- Any software designed to harm a computer
- A fake email or message that tries to steal your information
- The name used to identify a user on a computer or website
- Software that secretly watches what you do on your computer
- Software that protects a computer from viruses
- A tool that helps you remember strong passwords
- A secret word used to log in to a computer or website
- The global network that connects computers worldwide
- The action of signing out from a computer or website
- A collection of web pages available on the internet
- A clickable text or image that can lead to another webpage
- Installing the latest version of software for better security
Down
- A piece of electronic equipment like a laptop or phone
- A common way hackers send phishing messages
- A virus that locks your files and asks for money to unlock them
- A method of keeping data secret by changing its form
- An attempt to damage or steal data from computers
- A security system that blocks unwanted network traffic
- A person who breaks into computer systems
- Information stored on a computer
- Copying a file from the internet to your computer
- A harmful program that spreads from one computer to another
- Keeping personal information safe and secure
- A copy of important files kept in case something goes wrong
- A group of connected computers
25 Clues: A group of connected computers • Information stored on a computer • Any software designed to harm a computer • A person who breaks into computer systems • A common way hackers send phishing messages • Keeping personal information safe and secure • Software that protects a computer from viruses • A tool that helps you remember strong passwords • ...
Cyber Security 2020-11-07
Across
- A code to send a secret message
- Short for “Sending Particularly Annoying Messages.”
- protecting digital devices against attacks
- smaller pieces of info sent through the internet
- Copying a file from one computer to another
- software that secretly collects info about you
- info about you cause of online activity
- A name you type so you can use a computer
Down
- an attacker uses a list of words as potential passwords
- A secret word that allows you access
- software made to damage your computer or network
- cyberattack from hacker w/ bad links
- when an attacker tries many
- a place where data stops along the way
- A person who secretly gets access to a computer Network A system of computers that are connected
- data that describe another piece of data
- cyberattack where hacker pretends to know you
- A system of symbols used to create a secret message
- passwords in hopes of guessing correctly
- A system of rules and correct steps to follow
20 Clues: when an attacker tries many • A code to send a secret message • A secret word that allows you access • cyberattack from hacker w/ bad links • a place where data stops along the way • info about you cause of online activity • data that describe another piece of data • passwords in hopes of guessing correctly • A name you type so you can use a computer • ...
cyber security 2020-11-08
Across
- processes commands to a computer program in the form of lines of text.
- of computer program that helps a user perform numerical functions
- a machine that processes something.
- server used to store a computer username, password, and other information.
- store away in hiding or for future use.
- that can be used to implement
- and organize files and folders
Down
- communication
- Web, Browser, and Internet
- process of mathematical modelling
- process of making apps more secure by finding, fixing, and enhancing the security of apps
- that provides legally binding guidelines for the use and distribution of software
- hardware device that has the capability of permitting access to a network via a user interface,
- threats like viruses, malware, and spyware across email, apps, the cloud, and the web
- element of a computer operating system used to group files
- group of Microsoft-recommended configuration settings
- A widely released and frequent software update
- one of the command-line interface programs used to execute commands in Windows operating systems
- that supports a computer's basic functions
- set of instructions, data or programs used to operate computers and execute specific tasks.
20 Clues: communication • Web, Browser, and Internet • that can be used to implement • and organize files and folders • process of mathematical modelling • a machine that processes something. • store away in hiding or for future use. • that supports a computer's basic functions • A widely released and frequent software update • group of Microsoft-recommended configuration settings • ...
Cyber security 2022-11-17
Across
- A separate program or a feature incorporated within a browser that stops popup advertisements from appearing
- Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
- A malware payload that allows an attacker to execute virtually any command on the victim's computer
- Malware that prevents a user's device from properly operating until a fee is paid
- Software code that gives access to a program or service that circumvents normal security protections.
- A logical computer network of zombies under the control of an attacker
- An attacker that sends unsolicited messages to Bluetooth-enable deceives
- Software that helps prevent computers from becoming infected by different types of spyware
- A database of viruses that is used to identify an infected file
- An infected computer that is under the remote control of an attacker
Down
- A general term used to describe software that spies on users by gathering information without consent
- Software that is a cumulative package of all patches and feature updates
- Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard
- A publicly released software security update intended to repair a vulnerability
- A copy is files from a computer's hard drive saved on other digital media that is stored in a secure location
- A malicious program designed to enter a computer via a network to take advantage of a vulnerabity in an application or an operating system
- Computer code that lies dormant until it is triggered by specific logical event
- Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- Hardware or software designed to limit the spread of malware
- Removing the built-in limitations and protection google android devices
20 Clues: Hardware or software designed to limit the spread of malware • A database of viruses that is used to identify an infected file • An infected computer that is under the remote control of an attacker • A logical computer network of zombies under the control of an attacker • Removing the built-in limitations and protection google android devices • ...
Cyber Security 2023-09-09
Across
- the protection of data and systems.
- insurance that provides liability.
- training to help educate about possible cyber threats.
- software designed with malicious intent to steal/destroy data.
- a type of malware used to encrypt files and obtain data.
- protecting connected devices and networks from unauthorized access.
- the conversion of readable data to encoded data.
- protects data from physical actions.
- insurance that covers losses money.
- a group of steps that show how to execute a test.
- an organization to help businesses manage cybersecurity risks.
- a set of requirements to help create strong passwords.
Down
- when someone pretends to be something to steal data.
- changes made to a software to improve it.
- helps cover a business's losses from a cyber attack.
- saving data in a different secure and safe place in case data is lost.
- encrypted security used to protect Wi-Fi networks.
- stealing information from an unaware person through the internet.
- a strategy made to protect businesses from threats.
- an attack used to obtain sensitive data by acting as a trusted source.
20 Clues: insurance that provides liability. • the protection of data and systems. • insurance that covers losses money. • protects data from physical actions. • changes made to a software to improve it. • the conversion of readable data to encoded data. • a group of steps that show how to execute a test. • encrypted security used to protect Wi-Fi networks. • ...
Cyber Security 2023-09-08
Across
- to save a state of something to restore later
- to lie
- resources
- to gain control of
- pops up that appears on websites to lead you to other websites
- combination of letters used to lock a file or account
- National Institution of Standards and Technology at the US department of Commerce
- applications or programs
- to fix something
- to delete
- to identify
- enter your account using your credentials
Down
- criminals of the internet
- Change something to a newer version of it
- malware that negatively modifies your computer
- to return something to a previous state
- not given permission
- Get rid of
- to inform someone of something
- to protect something from outsiders
- a program specifically designed to fulfill a purpose for users
21 Clues: to lie • resources • to delete • Get rid of • to identify • to fix something • to gain control of • not given permission • applications or programs • criminals of the internet • to inform someone of something • to protect something from outsiders • to return something to a previous state • Change something to a newer version of it • enter your account using your credentials • ...
Cyber Security 2025-03-13
Across
- Blocks unauthorized network access
- Guessing passwords repeatedly
- Simulated hacking for security testing
- Secret for decrypting data
- Overloads a website’s server
- Software designed to harm systems
- Shared for encrypted messages
- Exploit with no known fix
- Disguised as harmless software
- Code inserted into databases
- Encrypts internet traffic for privacy
Down
- Locks files, demands payment
- Records what you type
- Converts data into secret code
- Secretly monitors user activity
- Tricking people for access
- Network of hacked computers
- Extra login security step
- Scrambles data into fixed code
- Fraudulent emails tricking users
20 Clues: Records what you type • Extra login security step • Exploit with no known fix • Secret for decrypting data • Tricking people for access • Network of hacked computers • Locks files, demands payment • Overloads a website’s server • Code inserted into databases • Guessing passwords repeatedly • Shared for encrypted messages • Converts data into secret code • ...
Cyber security 2025-08-13
Across
- | Abbreviation for Virtual Private Network, used for secure internet connections.
- | Software that secretly monitors user activity.
- | Faking the sending address of an email to trick recipients.
- | Copy of data stored separately for recovery in case of loss.
- | Malicious tool that records keystrokes.
- | Unwanted or unsolicited emails.
- | Process of converting information into code to prevent unauthorized access.
- | Two-factor authentication, adds extra security to logins.
- | Software designed to damage or gain unauthorized access to a system.
- | Malicious program that spreads itself to other computers.
Down
- | Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- | Program that detects and removes malicious software.
- | Small data stored on a user’s browser to track activity.
- | Security system that controls incoming and outgoing network traffic.
- | A secret word or phrase for authentication.
- | Network of infected computers controlled by a hacker.
- | Malicious software that blocks access to data until a payment is made.
- | Malicious program disguised as legitimate software.
- | A person who gains unauthorized access to data.
- | Multi-factor authentication for added account protection.
20 Clues: | Unwanted or unsolicited emails. • | Malicious tool that records keystrokes. • | A secret word or phrase for authentication. • | Software that secretly monitors user activity. • | A person who gains unauthorized access to data. • | Malicious program disguised as legitimate software. • | Program that detects and removes malicious software. • ...
Cyber Security 2025-08-16
Across
- Software that displays unwanted ads.
- A fix for software vulnerability.
- Overwhelms a server with traffic.
- Unsolicited junk email messages.
- Website data stored on browser.
- Decoy system to trap attackers.
- Disguised malicious software program.
- General term for bad software.
- Algorithm for encrypting information.
- Secretly monitors your activity.
- Gains unauthorized computer access.
- Creates a private, secure connection.
Down
- Self-replicating malicious computer code.
- Network traffic security guard.
- Your secret key for access.
- Scrambles data for your privacy.
- Deceptive emails steal your info.
- Records all of your keystrokes.
- Unauthorized access to data.
- Holds your personal files hostage.
20 Clues: Your secret key for access. • Unauthorized access to data. • General term for bad software. • Network traffic security guard. • Website data stored on browser. • Records all of your keystrokes. • Decoy system to trap attackers. • Scrambles data for your privacy. • Unsolicited junk email messages. • Secretly monitors your activity. • A fix for software vulnerability. • ...
Cybersecurity Crossword Puzzle 2025-03-13
Across
- Unwanted email messages
- Hides internet browsing activity
- Software flaw exposing systems
- Software detecting cyber threats
- Person tricked into hacking
- Secret key for authentication
- Authentication requiring two factors
- Tracks and records keystrokes
- Deceptive attack to steal info
Down
- Unauthorized code execution attack
- Fake email for stealing data
- Attack security vulnerabilities
- Malicious software category
- Scrambles data for security
- Multiple accounts, one password
- Cybersecurity framework for networks
- Malicious program holding data hostage
- Unauthorized access attempt
- Digital fingerprint identifier
- Cyber attack flooding network packets
20 Clues: Unwanted email messages • Malicious software category • Scrambles data for security • Person tricked into hacking • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Tracks and records keystrokes • Software flaw exposing systems • Digital fingerprint identifier • Deceptive attack to steal info • Attack security vulnerabilities • ...
Cyber security 2025-03-31
19 Clues: Leck • hack • löschen • unbefugt • abzielen • schützen • zerstören • Datenschutz • vertraulich • Ausfallzeit • Datenverlust • betrügerisch • Schadsoftware • verschlüsseln • Zugangerhalten • betroffen sein • Schwachstellen • Passworttresor • Identitätsdiebstal
Cyber security 2022-09-14
Across
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
- Software that can only be run for a limited amount of time before it expires.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A secret word or phrase that is used to access a computer system or service.
- Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Code that is embedded into the hardware of a computer.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- The core of a computer’s operating system that houses the most essential functions of the computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
19 Clues: Code that is embedded into the hardware of a computer. • A secret word or phrase that is used to access a computer system or service. • Software that can only be run for a limited amount of time before it expires. • A hacking attack that makes the device mine cryptocurrency, in addition to its normal use. • ...
CYBER SECURITY 2025-12-03
Across
- people you connect with
- something harmful
- repeated unwanted behaviour
- a fully grown person
- code to access an account
- taking advantage of someone
- people related to you
- informal name used online
- exchange of messages
- information or understanding
Down
- a place or position
- text sent to someone
- portable computer
- uploading something online
- support or assistance
- something you have gone through
- a tool or electronic item
- injury or damage
- a written response online
19 Clues: injury or damage • portable computer • something harmful • a place or position • text sent to someone • a fully grown person • exchange of messages • support or assistance • people related to you • people you connect with • code to access an account • a tool or electronic item • informal name used online • a written response online • uploading something online • repeated unwanted behaviour • ...
Cyber security 2022-09-14
Across
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
- Software that can only be run for a limited amount of time before it expires.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A secret word or phrase that is used to access a computer system or service.
- Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Code that is embedded into the hardware of a computer.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- The core of a computer’s operating system that houses the most essential functions of the computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
19 Clues: Code that is embedded into the hardware of a computer. • A secret word or phrase that is used to access a computer system or service. • Software that can only be run for a limited amount of time before it expires. • A hacking attack that makes the device mine cryptocurrency, in addition to its normal use. • ...
Cyber security 2022-09-14
Across
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- One of the most insidious types of malware, as they are extremely stealthy and difficult to detect by traditional endpoint protection methods. This malware masks its existence and controls the operating system, preventing its detection even further. Hackers use rootkits to access a system and steal information.
- Software that can only be run for a limited amount of time before it expires.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A secret word or phrase that is used to access a computer system or service.
- Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Code that is embedded into the hardware of a computer.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- The core of a computer’s operating system that houses the most essential functions of the computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
19 Clues: Code that is embedded into the hardware of a computer. • A secret word or phrase that is used to access a computer system or service. • Software that can only be run for a limited amount of time before it expires. • A hacking attack that makes the device mine cryptocurrency, in addition to its normal use. • ...
Cyber Security 2021-02-19
Across
- an crime perpetrated using computers and networks.
- a form of bullying or harassment using computer -based communication.
- piracy, the unauthorized reproduction, distribution or use of software products.
- A ___________ monitors a network, blocking dangerous content such as viruses.
- Security, Activities related to identifying , assessing and managing vulnerabilities, threats and attacks on a computer system.
- A ____________________ is a piece of data sent from a website and stored on the user's computer by the user's web browser which the user is browsing.
- of Service Attack, A cyber attack where the intent is to prevent a service being delivered by the targeted system.
- Actual action that causes harm or damage.
- the attempt to obtain sensitive information such as usernames, passwords, and credit card details by sending emails pretending to be from a legitimate organization.
- and Waterproof Storage,
- any data or resources that can be accessed via a network or the space where the Internet operates.
Down
- An action taken to counteract a threat.
- , Exposure to the possibility of being attacked or harmed.
- a statement of an intention to inflict harm or damage.
- the right of a persons to choose freely under what circumstances and to what extent they will reveal information about themselves.
- theft, The deliberate use of someone else's identity, usually to gain a financial advantage.
- The legal rights that gives the creator of an original work exclusive rights over its use and distribution.
- Measures,
- Misuse, any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- Theft, the unauthorized copying or removal of data from the legitimate owner's computer system.
20 Clues: Measures, • and Waterproof Storage, • An action taken to counteract a threat. • Actual action that causes harm or damage. • an crime perpetrated using computers and networks. • a statement of an intention to inflict harm or damage. • , Exposure to the possibility of being attacked or harmed. • a form of bullying or harassment using computer -based communication. • ...
Cyber Security 2025-03-14
Across
- Blocks unauthorized network access
- Misleading link for attention
- To fix security vulnerabilities
- Encrypts internet traffic securely
- Fraudulent emails stealing data
- Clickable web address
- Copies data for recovery
- Identifies a system user
- Harmful software, includes viruses
- Stores website user data
Down
- Wireless internet connection
- Converts data into unreadable code
- Test to block bots
- Gains unauthorized system access
- Secretly collects user information
- Used to secure accounts
- Exits an account safely
- Unwanted email messages
- Detects and removes malware
19 Clues: Test to block bots • Clickable web address • Used to secure accounts • Exits an account safely • Unwanted email messages • Copies data for recovery • Identifies a system user • Stores website user data • Detects and removes malware • Wireless internet connection • Misleading link for attention • To fix security vulnerabilities • Fraudulent emails stealing data • ...
Cybersecurity Awareness Month 2024-07-26
Across
- A fence provides this
- From white to red
- Virtual storage in the sky
- Malicious software holding data hostage
- Digital mischief-maker
- Verifying Identity
- Artificial or Real?
- Identity verification through unique traits Yellow Data
Down
- Digital bouncer for unauthorized data
- AI-generated deception
- Deceptive online lure
- Computer ninja with a keyboard
- Personal secret sentence for entry
- Your computer is under the weather
- Security theft exposing data
- Cyber vigilance
- Wireless internet access point
- Voice trickery that sounds fishy!
- BIG catch for cyber criminals
- Security in scrambled letters
- Interconnected web of computers
21 Clues: Cyber vigilance • From white to red • Verifying Identity • Artificial or Real? • Deceptive online lure • A fence provides this • AI-generated deception • Digital mischief-maker • Virtual storage in the sky • Security theft exposing data • BIG catch for cyber criminals • Security in scrambled letters • Computer ninja with a keyboard • Wireless internet access point • ...
CYBER SECURITY CROSSWORD 2018-01-24
Across
- wireless networks
- Surname of the VST Manager
- The one who can initiate a new data download
- a flaw or weakness in system cyber security procedures
- Applications which can cause loss of availability for business data
- space The complex environment resulting from the interaction of people,software and services on the internet
- The room where cyber security awareness posters are posted
Down
- The Engineer to provide communication and/or support if cyber incident is also related with HQ equipment
- Interconnection points between various systems on the IT network
- The process in order to identify critical threats
- Person in charge for checking satellite connection
- The technique through which an external source transmits manipulated data which the GPS receives as legitimate
- Combination of consequences and frequency of a risk assessment procedure
- another word for junk email
- Communication over public channels
- The response team which deals with cyber threats
16 Clues: wireless networks • Surname of the VST Manager • another word for junk email • Communication over public channels • The one who can initiate a new data download • The response team which deals with cyber threats • The process in order to identify critical threats • Person in charge for checking satellite connection • a flaw or weakness in system cyber security procedures • ...
Digital Technology Terminologies 2023-02-27
Across
- defense Cyber security role of DND & AFP.
- Pertains to right & wrong conduct.
- safety Practices for a safe web surfing.
- security The protection of internet-connected systems from cyberattacks.
- protection Cyber security role of DICT & CICC.
- To identify possible risks of harmful online behaviors.
Down
- To translate understanding into actions as to online safety.
- enforcement Cyber security role of NBI & PNP.
- ethics The online environment right & wrong conduct.
- wellness Online behavior awareness for cyberspace protection.
- community Cyber security role of NICA.
- To analyze, evaluate & reflect on the online situation.
12 Clues: Pertains to right & wrong conduct. • community Cyber security role of NICA. • safety Practices for a safe web surfing. • defense Cyber security role of DND & AFP. • enforcement Cyber security role of NBI & PNP. • protection Cyber security role of DICT & CICC. • ethics The online environment right & wrong conduct. • ...
XC Participation 2024-08-30
Across
- UI redress attack
- hidden method of bypassing security
- perform malicious actions
- designed to prevent unauthorized access
- carry out cyberattacks
- common cyber security terms
- The exposure of confidential information
- collection of all vulnerable points
- cyber attack that locks users
- social engineering attack
- method for guessing a password
Down
- list of permissions
- scrambling data
- encrypted form of the message
- Software that displays advertisements
- intelligence exhibited by machines
- a write-only database
- tackle the threat of malware
- cloud-based storage
- short for malicious software
- Distributed Denial of Service
21 Clues: scrambling data • UI redress attack • list of permissions • cloud-based storage • a write-only database • carry out cyberattacks • perform malicious actions • social engineering attack • common cyber security terms • tackle the threat of malware • short for malicious software • encrypted form of the message • cyber attack that locks users • Distributed Denial of Service • ...
Cyber Security 2017-06-30
Across
- a piece of code which is capable of corrupting
- dangers that happen on the internet
- a virus that can spread information from one
- a software that can take your personal
- includes sharing of data and services
- an interconnection of computers and devices
- when junkmails keeps appearing and it never
- computer system
- in
Down
- the intentional paralysing of a computer network
- the interception of a private communication
- to another
- software the can damage your system
- flooding it with data
- to data
- person who uses computers to gain unauthorized
- a malware computer program that replicates
- to spread to other computers
18 Clues: in • to data • to another • computer system • flooding it with data • to spread to other computers • dangers that happen on the internet • software the can damage your system • includes sharing of data and services • a software that can take your personal • a malware computer program that replicates • the interception of a private communication • ...
Cyber Security 2025-04-28
Across
- A harmful program that can replicate itself and spread to other computers, often damaging files or systems.
- Malware that locks or encrypts a user's files and demands payment to restore access.
- Theft When someone illegally uses another person's personal information (like their name or credit card) to commit fraud or theft.
- A trick where fake emails, messages, or websites try to steal personal information like passwords or credit card numbers.
- The process of converting information into a secret code to prevent unauthorized access.
- Malicious software designed to harm, exploit, or otherwise illegally access a computer system.
- Small pieces of data stored by websites on a user's device to remember information like login details or site preferences.
- A security system that blocks unauthorized access to or from a private network.
- (Virtual Private Network) A service that creates a secure, encrypted connection over the internet to protect private data and browsing activity.
Down
- Authentication A security process where a user must provide two forms of identification to log in, like a password and a code sent to their phone.
- Footprint The trail of data a person leaves behind when using the internet, such as posts, comments, and personal information.
- A dishonest scheme meant to trick people into giving away money or private information online.
- A test used by websites to confirm that a user is a human and not a bot, often by identifying objects in images or typing distorted text.
- Gaining unauthorized access to a computer system or network, usually to steal or manipulate information.
- Software that secretly gathers information about a user without their knowledge, often for spying or stealing purposes.
- Protecting personal information from being accessed or shared without permission.
- The act of publicly revealing private information about a person without their consent, often to harm or intimidate them.
- Software A program that detects, prevents, and removes malicious software from a computer.
18 Clues: A security system that blocks unauthorized access to or from a private network. • Protecting personal information from being accessed or shared without permission. • Malware that locks or encrypts a user's files and demands payment to restore access. • The process of converting information into a secret code to prevent unauthorized access. • ...
Cyber security 2023-11-28
Across
- Desktop is also known as.
- Hiding one piece of data with in another.
- The crime that related to computers and networks.
- A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
- Secretly watches computer activity.
- Phishing is malware that asks for ______ details.
- Any program, website, or file that is defined to damage or gain unauthorized access to a device.
- The practice of protecting systems, networks and programs from digital attacks.
Down
- Someone who breaks into a computer system.
- URLs that mislead the user into down leading a virus and visiting a harmful website.
- Illegal production of copyrighted material is often referred as ____.
- Information is also known as.
- A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
- Type of bullying that takes place online.
- ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
- An online threat that hides itself in computers and mobile device.
- Software that protects computer from virus related harm.
- Copying the data without the permission of owner of the computer/computers system/ computer network.
18 Clues: Desktop is also known as. • Information is also known as. • Secretly watches computer activity. • Hiding one piece of data with in another. • Type of bullying that takes place online. • Someone who breaks into a computer system. • The crime that related to computers and networks. • Phishing is malware that asks for ______ details. • ...
Cyber Security 2025-04-28
Across
- Small pieces of data stored by websites on a user's device to remember information like login details or site preferences.
- A trick where fake emails, messages, or websites try to steal personal information like passwords or credit card numbers.
- Malware that locks or encrypts a user's files and demands payment to restore access.
- A harmful program that can replicate itself and spread to other computers, often damaging files or systems.
- Malicious software designed to harm, exploit, or otherwise illegally access a computer system.
- Footprint The trail of data a person leaves behind when using the internet, such as posts, comments, and personal information.
- Software that secretly gathers information about a user without their knowledge, often for spying or stealing purposes.
- The process of verifying that someone is who they claim to be, usually before allowing access to systems, accounts, or information.
Down
- Software A program that detects, prevents, and removes malicious software from a computer.
- The act of publicly revealing private information about a person without their consent, often to harm or intimidate them.
- Theft When someone illegally uses another person's personal information (like their name or credit card) to commit fraud or theft.
- A test used by websites to confirm that a user is a human and not a bot, often by identifying objects in images or typing distorted text.
- A security system that blocks unauthorized access to or from a private network.
- Gaining unauthorized access to a computer system or network, usually to steal or manipulate information.
- Protecting personal information from being accessed or shared without permission.
- A dishonest scheme meant to trick people into giving away money or private information online.
- The process of converting information into a secret code to prevent unauthorized access.
- (Virtual Private Network) A service that creates a secure, encrypted connection over the internet to protect private data and browsing activity.
18 Clues: A security system that blocks unauthorized access to or from a private network. • Protecting personal information from being accessed or shared without permission. • Malware that locks or encrypts a user's files and demands payment to restore access. • The process of converting information into a secret code to prevent unauthorized access. • ...
Cyber Security 2023-02-08
Across
- you should do auto- _ _ _ _ _ _ _ to your operating system and applications to keep them up to date.
- plain text is turned into cipher text so that if it is intercepted it cannot be understood. you must have the key to be able to decrypt the code.
- disguises itself as legitimate software. allows the creator to get 'backdoor' access to remotely see files.
- multiple computers flood a network with data requests so that it is unusable.
- malicious software. designed to cause harm to a computer.
- a combination of letters, symbols and number which allows you to access an account.
- self replicating malware. often downloaded from email attachments. will delete and modify files.
- emails that do not contain a hyperlink. the sender will create a fake story and convince you to send them money/ details.
- monitors incoming and outgoing data. blocks access to unsafe websites.
Down
- malicious software which makes pop-ups appear on your computer.
- software which locks and encrypts all of your files. you will then be told to pay a certain amount of money to get your files back.
- software which spies on your actions. keylogging can be used to monitor your keystrokes and access your passwords.
- processed facts and figures. they have meaning.
- looking over someone to find out their passwords.
- a system designed to tell a human apart from a bot. you typically have to select images of the same item e.g. traffic lights.
- fake emails pretending to be real. often from a bank asking you to click on a hyperlink and enter details.
- infects an entire network of computers and takes up bandwidth which makes the network run very slowly.
- raw facts and figures. unprocessed.
18 Clues: raw facts and figures. unprocessed. • processed facts and figures. they have meaning. • looking over someone to find out their passwords. • malicious software. designed to cause harm to a computer. • malicious software which makes pop-ups appear on your computer. • monitors incoming and outgoing data. blocks access to unsafe websites. • ...
Cyber Security 2025-02-27
Across
- scrambles data for security
- deception for gain
- breaking into a system
- pretending to be someone else
- extra login security
- crime using the internet
- monitoring online activity
- unwanted messages
Down
- faking an identity online
- fake messages to steal info
- secret login code
- harmful software
- trick to steal money
- blocks cyber-threats
- secures your internet
- unauthorized data access
- who you are online
- keeps your info safe
18 Clues: harmful software • secret login code • unwanted messages • deception for gain • who you are online • trick to steal money • blocks cyber-threats • extra login security • keeps your info safe • secures your internet • breaking into a system • unauthorized data access • crime using the internet • faking an identity online • monitoring online activity • fake messages to steal info • ...
Spirit Week's Cyber Crossword Puzzle 2020-09-22
Across
- Always _____ your computer when you leave your desk
- Many companies are moving their data to this
- Tool to protect computers from malware
- To protect your sensitive information, avoid sending it via _____
- For extra security, always enable ___ ______ authentication
- A fake email designed to steal your credentials
- Internet browser mode for more privacy
- Never _____ a password
- Aon wrote its first ____ policy 20 years ago
- A kind of bounty
- Data ____ is when an attacker steals and takes data from a company
- ACS service line that conducts background style research and due diligence
- Criminals may physically place this on a credit card reader to steal the card information
- ACS service line that processes and analyzes data, often as part of litigation
- The process of encoding information
- Something you have too many of
- A "bandaid" for software, often released on Tuesdays by Microsoft
Down
- A type of digital currency
- ACS service line that connects clients with insurance carriers
- Cyber Solutions CEO
- ACS service line that provides security recommendations
- Generic term for a security incident
- Sophisticated attack group, for short - often a nation state
- ACS service line that investigates cyber incidents
- What does ACS stand for?
- Internet of Things, or ______ devices
- A special browser to access the dark web
- Malware that encrypts files and demands a payment to restore them
- Former Assistant US Attorney for the Eastern District of New York
- ACS service line that tracks and gathers information about threat actors and other people of intereset
- ACS service line that tries to break into client systems
- Report suspicious emails to this Aon security group
- Cyber Security Awareness Month
- Former head of FBI's computer crime squad
- Canadian colleagues that joined ACS in 2020
35 Clues: A kind of bounty • Cyber Solutions CEO • Never _____ a password • What does ACS stand for? • A type of digital currency • Cyber Security Awareness Month • Something you have too many of • The process of encoding information • Generic term for a security incident • Internet of Things, or ______ devices • Tool to protect computers from malware • ...
CISO Crossword Quiz - 2425 2025-10-16
Across
- Cyber ____ is the ability of an organization or nation to prepare for, withstand, recover from, and adapt to cyber threats or attacks
- Process of verifying user identity to prevent unauthorized access to data & systems
- Cyber Security principle which ensures data remains accurate and unaltered
- Which month is observed globally as National Cyber Security Awareness Month?
Down
- An Assurance that someone cannot deny having performed a specific action, such as sending a message or making a transaction
- NCSAM aims to increase Cyber ____ of India’s cybersecurity posture
- Cyber Security principle which ensures data and systems/resources of an organization are accessible to authorized users when needed
- Which Cyber Security principle ensures that only authorized people get access to the data?
- Cyber ____ Bharat is this year’s NCSAM theme in India focusing on cyber awareness
- Which term is used to describe safe and responsible online behavior?
- Which department sets the annual NCSAM theme every year?
11 Clues: Which department sets the annual NCSAM theme every year? • NCSAM aims to increase Cyber ____ of India’s cybersecurity posture • Which term is used to describe safe and responsible online behavior? • Cyber Security principle which ensures data remains accurate and unaltered • Which month is observed globally as National Cyber Security Awareness Month? • ...
Cybersecurity terms 2024-03-12
Across
- horse Malicious software disguised innocuously.
- Identity verification using traits.
- Malicious software threat
- Malicious code component.
- security Device-specific protection measures.
- policy Guidelines for security measures.
- Applying software updates regularly.
- Weakness in system security.
Down
- Deceptive email communication.
- testing Ethical hacking simulation.
- Malware with system-level access.
- hygiene Good digital security practices.
- incident Breach or violation event.
- Identity verification using traits.
- Malicious digital intrusion attempt.
- Network security barrier.
- Data protection through scrambling.
- Secure communication technique.
- Software against malicious programs.
- hat Ethical security expert.
20 Clues: Network security barrier. • Malicious software threat • Malicious code component. • Weakness in system security. • Deceptive email communication. • Secure communication technique. • Malware with system-level access. • testing Ethical hacking simulation. • Identity verification using traits. • Identity verification using traits. • Data protection through scrambling. • ...
CIS 120 Cybersecurity 2024-03-10
Across
- strength in the security structure
- off personal computer storage
- thief through computerized means
- needed for accessing secure information
- unsolicited meat banter
- casting cyber bait
- blocks out unauthorized access
- security tactics
- address for accessing websites
Down
- level for information security
- used to harm your computer
- software to monitor computerized information
- a code for keeping secrets
- weak point in security
- ID with magnetic access chip
- software used for destruction
- data to identify a person
- holds data hostage
- lying about your location
- the simplest part of security
20 Clues: security tactics • holds data hostage • casting cyber bait • weak point in security • unsolicited meat banter • data to identify a person • lying about your location • used to harm your computer • a code for keeping secrets • ID with magnetic access chip • off personal computer storage • software used for destruction • the simplest part of security • level for information security • ...
Cybersecurity Awareness Month Crossword Puzzle 2024-09-30
Across
- address for accessing websites
- software used for destruction
- thief through computerized means
- software to monitor computerized information
- ID with magnetic access chip
- off personal computer storage
- lying about your location
- holds data hostage
- security tactics
- level for information security
- unsolicited meat banter
- strength in the security structure
Down
- weak point in security
- used to harm your computer
- the simplest part of security
- a code for keeping secrets
- needed for accessing secure information
- blocks out unauthorized access
- data to identify a person
- casting cyber bait
20 Clues: security tactics • holds data hostage • casting cyber bait • weak point in security • unsolicited meat banter • lying about your location • data to identify a person • used to harm your computer • a code for keeping secrets • ID with magnetic access chip • software used for destruction • the simplest part of security • off personal computer storage • address for accessing websites • ...
Career Services: Cybersecurity Crossword 2025-03-24
Across
- The practice of protecting systems, networks, and programs from digital attacks
- The process of verifying a user’s identity.
- The process of converting data into a secret code to prevent unauthorized access.
- A type of malware that locks or encrypts a victim’s files and demands payment for their release.
- A security system that monitors and controls incoming and outgoing network traffic.
- A simulated cyber attack to test a system’s security.
- A tool that collects and analyzes security logs (Security Information and Event Management).
Down
- A security process that requires two forms of verification also known as 2FA.
- Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
- A type of malware that secretly gathers information from a user’s device.
- A person who gains unauthorized access to systems or networks.
- Malicious software designed to damage or disrupt computer systems.
- Software that detects and removes malicious programs from a computer.
- A cybersecurity professional who tests systems for vulnerabilities to improve security.
- A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.
15 Clues: The process of verifying a user’s identity. • A simulated cyber attack to test a system’s security. • A person who gains unauthorized access to systems or networks. • Malicious software designed to damage or disrupt computer systems. • Software that detects and removes malicious programs from a computer. • ...
Cyber Security 2023-09-15
Across
- A part of the internet that isn't indexed by search engines
- The conversion of information or data into a code
- Fraudulent email that demands urgent action
- A portmanteau of “malicious” and “software”
- A type of malicious software
- Virtual Private Network
- The process of identifying a user’s identity
- bypassing an organization's existing security systems
Down
- The use of electronics to bully someone
- The manipulation of facial appearance through deep generative methods.
- A form of malware used by hackers to spy on you and your computer activities
- a network security device that monitors and filters incoming and outgoing network traffic
- Artificial intelligence
- A means of attack on a computer system
- he result of a hacker successfully breaking into a system,
- A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
- An error, fault in a computer system
17 Clues: Artificial intelligence • Virtual Private Network • A type of malicious software • An error, fault in a computer system • A means of attack on a computer system • The use of electronics to bully someone • Fraudulent email that demands urgent action • A portmanteau of “malicious” and “software” • The process of identifying a user’s identity • ...
Cyber security 2022-12-11
Across
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
- An annoying malware that spams you with ads.
- Settings on folders or files that control who is allowed to access them.
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
- A malicious code typically disguised as a legitimate program.
- Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- An important process that verifies a user is really who they are; many different ways this can be done.
Down
- Full name of a DoS attack (three words).
- The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- A collection of malware infested computers that form a network to attack.
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- An email that contains a message with a suspicious link designed to steal personal information.
17 Clues: Full name of a DoS attack (three words). • An annoying malware that spams you with ads. • A malicious code typically disguised as a legitimate program. • Settings on folders or files that control who is allowed to access them. • A collection of malware infested computers that form a network to attack. • ...
Cyber security 2023-09-10
Across
- A form of email authentication
- it helps protect losses from cyber attacks
- A form of email authentication
- Hacker requests money to stop attack
- Extra methods/steps to make something more secure
- Make sure only specific people can access important databases
- A person or group of people impersonates a company to try and convince you that your device has problems in order to get money
- Updates for your network that helps protect against security vulnerabilities
- clicking a link from a fake email leads to information being taken
- When someone intentionally deceives you for something like money or important information
Down
- Encryption that protects information sent over your network
- preventing unauthorized access
- A federal agency that helps protect consumers against cyber attacks.
- ransomware and phishing
- A service that helps encrypt data between your computer and network
- A method used for ransomware and phishing
- Website that automatically downloads malicious software on your computer
- Helps protect customer privacy
- A form of email authentication
- Encryption that protects information sent over your network
20 Clues: ransomware and phishing • preventing unauthorized access • A form of email authentication • A form of email authentication • Helps protect customer privacy • A form of email authentication • Hacker requests money to stop attack • A method used for ransomware and phishing • it helps protect losses from cyber attacks • Extra methods/steps to make something more secure • ...
Cybersecurity Terms 2023-01-28
Across
- One's own device for work
- Cybersecurity career peak
- Security for malware
- Mastery of Network defense
- Protection for user account
- Destructive single malware
- Online harassment
- Disguised cyber attack
- Malicious hackers
- Network device identity
- Plans security measures
Down
- Entry level certification
- Pay to release lockout
- Secure remote private network
- Network traffic control
- cloud security certification
- Malicious altered media
- Secure scrambled data
- Intermediate hacker mastery
- Surveillance malware
20 Clues: Online harassment • Malicious hackers • Security for malware • Surveillance malware • Secure scrambled data • Pay to release lockout • Disguised cyber attack • Network traffic control • Malicious altered media • Network device identity • Plans security measures • Entry level certification • One's own device for work • Cybersecurity career peak • Mastery of Network defense • ...
Digital Privacy and Data Protection 2025-07-17
20 Clues: – qonun • – parol • – kiber • – onlayn • – himoya • – raqamli • – kuzatuv • – axborot • – shaxsiy • – nazorat • – ulashish • – internet • – shaxsiyat • – shifrlash • – maxfiylik • – xavfsizlik • – xavfsizlik • – ma’lumotlar • – foydalanuvchi • – kirish imkoniyati
Cyber Security 2024-10-10
Across
- – Distributed attack that overwhelms a system with traffic (4)
- force – Attack method involving trial and error (10)
- – Fraudulent attempt to obtain sensitive information (8)
- – A system designed to block unauthorized access (8)
- – Network of infected computers controlled remotely (6)
- – Testing method to evaluate security defenses (11)
- – Advanced Encryption Standard used for securing data (3)
- – Software designed to disrupt or damage systems (7)
Down
- – A vulnerability that is exploited before being fixed (8)
- – Software that secretly monitors user activity (7)
- – Digital document proving ownership of a public key (11)
- – Process of converting data into a code (10)
- – A weakness in a system that can be exploited (13)
- – Malware that demands payment to restore access (10)
- – A type of malware disguised as legitimate software (6)
- – Process of converting data into a fixed-size value (7)
16 Clues: – Process of converting data into a code (10) • – Software that secretly monitors user activity (7) • – A weakness in a system that can be exploited (13) • – Testing method to evaluate security defenses (11) • force – Attack method involving trial and error (10) • – A system designed to block unauthorized access (8) • ...
Digital Privacy and Data Protection 2025-07-26
20 Clues: – parol • – kiber • – qonun • – onlayn • – himoya • – nazorat • – shaxsiy • – axborot • – kuzatuv • – raqamli • – ulashish • – internet • – shaxsiyat • – shifrlash • – maxfiylik • – xavfsizlik • – xavfsizlik • – ma’lumotlar • – foydalanuvchi • – kirish imkoniyati
Cyber Security 2024-10-10
Across
- Type of software used to cause damage, e.g. viruses.
- A small piece of software designed to cause damage.
- Part of the Internet hidden behind logins, etc.
- Part of the Internet that can be accessed using a search engine.
- A way of jumbling up data so it is unreadable.
- A simple (and very old) method of encryption where the alphabet is shifted.
- Type of hacker who legally hacks, often to test networks.
- A way of convincing people to give up personal information.
- Describes criminals stealing personal information to impersonate someone.
- Type of hacker who commits illegal actions but for the greater good.
Down
- Using the Internet (often social media) to target someone negatively.
- A way of strengthening logins by sending a code to a phone or email.
- Convincing users to give up personal information, often using emails.
- Part of the Internet that is unmonitored and often contains illegal content.
- A simple (and very old) method of encrypting data by rotating the alphabet.
- French dude who invented a complex grid-based encryption method. Begins with a V.
- Type of hacker that commits illegal actions.
17 Clues: Type of hacker that commits illegal actions. • A way of jumbling up data so it is unreadable. • Part of the Internet hidden behind logins, etc. • A small piece of software designed to cause damage. • Type of software used to cause damage, e.g. viruses. • Type of hacker who legally hacks, often to test networks. • ...
Cyber Security 2017-06-30
Across
- the process of converting information or data into a code, especially to prevent unauthorized access
- A software designed to detect and destroy computer viruses
- A network of private computers infected with malicious software and controlled as a group without the owners knowledge
- A unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission
- A software that enables a user to obtain covert information about another computer
- Theft the fraudulent practice of using another person's name and personal information in order to obtain credits and loans
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A standalone malware computer program that replicates itself in order to spread to other computers
- A person who uses computers to gain unauthorized access to data
Down
- A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
- A program designed to breach the security of a computer system while ostensibly performing some innocuous function
- A Computer security also known as cyber security or IT security of computer systems from the theft or damage to their hardware
- A attempt by hackers to damage or destroy a computer network or system
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- A vulnerability of an organization's internal resources that arises from the organization using the Internet to conduct business
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done
16 Clues: A software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorized access to data • A attempt by hackers to damage or destroy a computer network or system • A software that enables a user to obtain covert information about another computer • ...
cyber security 2025-03-19
Across
- A type of malware that disguises itself as legitimate software
- Maintaining the accuracy and trustworthiness of data
- The act of tricking people into revealing sensitive information
- A security process requiring a username and password
- A method used to convert readable data into unreadable code
- A type of malware that demands payment to restore access to files
- Malicious software that replicates itself to spread to other computers
- Ensuring that data and services are accessible when needed
- A type of cyber attack that overwhelms a server with traffic
Down
- The practice of ensuring data is only accessed by authorized users
- A process that transforms plaintext into unreadable text
- A program designed to protect your device from viruses
- A network security system that monitors and controls incoming and outgoing traffic
- A secret code used for authentication
- Unsolicited and unwanted bulk emails
- A person who gains unauthorized access to a system
16 Clues: Unsolicited and unwanted bulk emails • A secret code used for authentication • A person who gains unauthorized access to a system • Maintaining the accuracy and trustworthiness of data • A security process requiring a username and password • A program designed to protect your device from viruses • A process that transforms plaintext into unreadable text • ...
Crouch Conundrum 2017-12-23
Across
- Cyber Security Whiz
- Hendersonville Aunt
- Volleyball Diva
- Dad's Youngest Sister
- Railyard Engineer
- Octogenarian
- Decorating Maven
- Dad's Favorite Pizza
- Home Town in Tennessee
- Golfer
- Volleyball Coach
- Mary EmoDean
- Captain ____
- Mary's Pet
Down
- Arkansas Uncle
- Carnegie Mellon TA
- Manchester Senior
- Devin's Love
- Engineer in training
- Telephone Operator
- Knitting Novice
- Photographer
- Cyber Geek in Training
- Pawpaw's Sidekick
- Favorite Pet
- Beauty Queen
26 Clues: Golfer • Mary's Pet • Devin's Love • Photographer • Octogenarian • Favorite Pet • Mary EmoDean • Captain ____ • Beauty Queen • Arkansas Uncle • Volleyball Diva • Knitting Novice • Decorating Maven • Volleyball Coach • Manchester Senior • Railyard Engineer • Pawpaw's Sidekick • Carnegie Mellon TA • Telephone Operator • Cyber Security Whiz • Hendersonville Aunt • Engineer in training • Dad's Favorite Pizza • ...
SFSHS Government 3-10-22 2022-03-10
Across
- Biased information used to promote a point of view
- A security tool used to hide or scramble message contents
- Ukrainian region that Putin annexed
- This Russian company shares responsibility for Russian troll farms
- U.S. intelligence agency that handles domestic cyber crimes
- Software that seizes your data until payment is received
- Soviet Union intelligence agency
Down
- Computer security issue only known to the hacker
- plan of action designed to achieve a goal
- military alliance of 30 countries
- Cyber attack that hit Ukraine in 2017
- Main cyber risk advisor to the country
- President of Ukraine
- a country that has remained neutral on the Ukraine crisis
14 Clues: President of Ukraine • Soviet Union intelligence agency • military alliance of 30 countries • Ukrainian region that Putin annexed • Cyber attack that hit Ukraine in 2017 • Main cyber risk advisor to the country • plan of action designed to achieve a goal • Computer security issue only known to the hacker • Biased information used to promote a point of view • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- Alat untuk menerjemahkan informasi dari jaringan satu ke jaringan yang lain
- Salah satu aspek teknis jaringan komputer
- Topologi yang berbentuk bintang
- Salah satu sistem operasi yang sering dipakai
- Website yang dibuat oleh Google inc
- Perangkat untuk memperkuat sinyal
Down
- Konsep cyber security yang pertama dan terutama
- Komponen untuk menghubungkan workstation
- Salah satu cara untuk menunjang cyber security
- Alat ini digunakan untuk penghubung antar jaringan
- Salah satu jenis ancaman cyber
11 Clues: Salah satu jenis ancaman cyber • Topologi yang berbentuk bintang • Perangkat untuk memperkuat sinyal • Website yang dibuat oleh Google inc • Komponen untuk menghubungkan workstation • Salah satu aspek teknis jaringan komputer • Salah satu sistem operasi yang sering dipakai • Salah satu cara untuk menunjang cyber security • Konsep cyber security yang pertama dan terutama • ...
cyber security 2021-11-05
Across
- (of software) designed to detect and destroy computer viruses
- an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
- a standalone malware computer program that replicates itself in order to spread to other computers
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
- a secret word or phrase that must be used to gain admission to a place.
- the art of tricking or manipulate to get someone to revel their personal information
Down
- looking at someone's information over their shoulder, for example looking at someone enter their PIN in a shop or at a cashpoint. A person can prevent this by using their hand to cover the keypad as they type their PIN, or being aware of people around them when typing in PINs.
- having or showing a cautious distrust of someone or something.
- the process or action of proving or showing something to be true, genuine, or valid.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
- an identification used by a person with access to a computer, network, or online service.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- the action of obtaining something by using persuasion or guile the action of obtaining private or confidential information by impersonation or another method of deception
- any malware that misleads users of its true intent.
15 Clues: any malware that misleads users of its true intent. • (of software) designed to detect and destroy computer viruses • having or showing a cautious distrust of someone or something. • a secret word or phrase that must be used to gain admission to a place. • the process or action of proving or showing something to be true, genuine, or valid. • ...
Cyber security 2022-10-19
Across
- In order to ensure the security of the data/information, we need to ____________ the data:
- _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- ________is actually considered the first computer virus?
- ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Advertising software can be used to spread malware.
- _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- Which wifi cummunication protocol is more Secure?
15 Clues: Which wifi cummunication protocol is more Secure? • Advertising software can be used to spread malware. • ________is actually considered the first computer virus? • In order to ensure the security of the data/information, we need to ____________ the data: • _______ is a type of software designed to help the user's computer detect viruses and avoid them. • ...
Cyber Security 2024-09-20
Across
- – An event or occurrence that disrupts normal operations, often involving security threats.
- – The act of breaking into a system, network, or data storage illegally.
- – Free from danger or threat; used to describe a well-protected system.
- – A copy of data stored separately to restore the original in case of data loss.
- – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- – Unauthorized access or entry into a computer system or network.
- – A secret word or phrase used to gain access to a computer system or service.
- – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
- – The process of verifying the identity of a user or system.
Down
- – The process of converting data into a code to prevent unauthorized access.
- – Adherence to laws, regulations, and standards, especially in cybersecurity.
- – A type of malicious software that replicates itself and spreads to other systems.
- – A network security system that monitors and controls incoming and outgoing network traffic.
- – Malicious software designed to gather information about a person or organization without their knowledge.
- – Strong and reliable, often used to describe a system that can withstand attacks or failures.
15 Clues: – The process of verifying the identity of a user or system. • – Unauthorized access or entry into a computer system or network. • – Free from danger or threat; used to describe a well-protected system. • – The act of breaking into a system, network, or data storage illegally. • – The process of converting data into a code to prevent unauthorized access. • ...
cyber security 2025-07-07
Across
- A small window that appears on your screen, sometimes as part of a scam
- A tool that blocks unwanted connections to your computer or network
- A program that helps protect your computer from harmful software
- A test websites use to check if you’re a human
- A harmful program that spreads and damages your files
- Something not real, often used to trick people online
- A tool that helps block unwanted content or messages
Down
- Any software made to harm your computer or data
- A scam where someone pretends to be trustworthy to steal your info
- A harmful file that tricks you by looking like something safe
- A program or device that guards your network from threats
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- A person who tries to break into computers or networks
- Small data stored by websites to remember what you did
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • Something not real, often used to trick people online • ...
cyber security 2025-11-13
Across
- someone takes your files and you have to pay a ransom to get it back
- detects and removes viruses and malware
- tests if you are human or a computer
- making up a story pretending to be someone else and trying to convince someone to do something (e.g. send the money)
- unauthorized access to a computer system
- a type of malware that disguises itself
- a person who's job is to find faults in a system and help fix them
Down
- a piece of code which will do a certain command under the right conditions
- viruses which duplicate and spread quickly
- means no more annoying manual updates
- many computers/computer programs overflowing a website and often shutting it down at least temporarially
- something many people theorize will steal all jobs
- a type of malware that is always watching, looking, listening.....
- your computer's barrier between malware and itself
- tricks often used online to manipulate humans
15 Clues: tests if you are human or a computer • means no more annoying manual updates • detects and removes viruses and malware • a type of malware that disguises itself • unauthorized access to a computer system • viruses which duplicate and spread quickly • tricks often used online to manipulate humans • something many people theorize will steal all jobs • ...
Page 1 of 100 Next
