cyber security Crossword Puzzles

FITE 2013-05-16

FITE crossword puzzle
Across
  1. stores info. on internet servers
  2. central processing unit/speed of computer
  3. 1000 gigabytes
  4. cyber security
  5. two things that can be used together
  6. a document having a present format, used as a starting point
  7. the close up or preview of a template
  8. 1000 terabytes
  9. input
  10. output
  11. something you attach to your computer
  12. smallest unit of data
  13. internet connection
  14. printed circuit that is the foundation of a computer
  15. domain
  16. a port formed by IBM connecting a mouse or keyboard to a PC
  17. protection of anyones work
  18. computer screen
  19. search internet for specific info.
  20. programs given to a computer to do a direct operation
  21. internet and online world
Down
  1. arrangement of graphic matters
  2. slogan
  3. quoting a reference to an athourity
  4. specific, easier
  5. processing of powering up your computer
  6. cyber safety
  7. connects to the internet
  8. internet service/Comcast
  9. program that lets you interact with your computer
  10. random access memory
  11. search engine that checks all search engines
  12. a socket in a microcomputer that will accept a plug-in circuit board
  13. wired internet
  14. programs designed for a special need or purpose
  15. hardware connection
  16. provides data to other computers
  17. the way you behave online
  18. logo
  19. main storage media device that permanently stores all data on computer
  20. provides a variety of channels of data over a single communication medium
  21. series of instructions given to a computer to do a certain task
  22. 1000 petabytes
  23. a brief account of ones profession
  24. the wiring making up a computer system
  25. SSID
  26. 1000 kilobytes

47 Clues: logoSSIDinputsloganoutputdomaincyber safety1000 gigabytescyber security1000 terabyteswired internet1000 petabytes1000 kilobytescomputer screenspecific, easierhardware connectioninternet connectionrandom access memorysmallest unit of dataconnects to the internetinternet service/Comcastthe way you behave onlineinternet and online world...

Reportable Information 2025-04-24

Reportable Information crossword puzzle
Across
  1. A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.
  2. __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
  3. A potential risk indicator for person living above his means
  4. An employee who hates his job to the point of aggression
  5. A security compromise, infraction, or violation
Down
  1. Security incidents are categorized as either a security infraction or a security ______
  2. _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
  3. The ability and opportunity to gain knowledge of classified information.
  4. Denies adversaries information about friendly capabilities, activities, limitations, and intentions that adversaries need to make competent operational decisions. (Acronym)
  5. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)

10 Clues: A security compromise, infraction, or violationAn employee who hates his job to the point of aggressionA potential risk indicator for person living above his meansThe ability and opportunity to gain knowledge of classified information.Security incidents are categorized as either a security infraction or a security ______...

CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06

CYBERSECURITY AWARENESS CROSSWORD PUZZLE crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. hygiene The routine practices and steps taken to maintain good digital security.
  3. A private network that encrypts your internet connection to protect your data online.
  4. A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
  5. A malicious program disguised as legitimate software.
  6. breach An incident where sensitive information is accessed or disclosed without authorization.
  7. Malicious software designed to damage or gain unauthorized access to systems.
  8. Determines what an authenticated user is allowed to do
Down
  1. A type of malware that locks your data and demands payment to unlock it.
  2. A method of converting data into a secret code to prevent unauthorized access.
  3. The process of verifying the identity of a user or device
  4. A software update that fixes security vulnerabilities or bugs.
  5. Software designed to detect and remove malicious programs from your computer.
  6. Protecting data from being altered or tampered with

14 Clues: Protecting data from being altered or tampered withA malicious program disguised as legitimate software.Determines what an authenticated user is allowed to doThe process of verifying the identity of a user or deviceA software update that fixes security vulnerabilities or bugs.A type of malware that locks your data and demands payment to unlock it....

Types of threats 2019-01-09

Types of threats crossword puzzle
Across
  1. Collection of captured bot computers
  2. A destructive computer program that bores its way through a computer's files
  3. surfing atching an authorized user enter a security code on a keypad.
  4. data that ransome gets paid to remove
  5. When someone deceives by pretending to be someone else
  6. An attack that sends an email or displays a Web announcement that falsely claims
  7. Criminals make a promise of goods in return for details
Down
  1. a cyber-security attacker to take control
  2. n attacker entering a secured building by following an authorized employee
  3. Advertising-supported software
  4. Program that hides in a computer
  5. A type of Malware that locates
  6. A piece of code that is capable of copying itself
  7. prevents the program from running as expected
  8. pro quo Criminals promise a service in exchange for details

15 Clues: Advertising-supported softwareA type of Malware that locatesProgram that hides in a computerCollection of captured bot computersdata that ransome gets paid to removea cyber-security attacker to take controlprevents the program from running as expectedA piece of code that is capable of copying itself...

tast 2023-02-03

tast crossword puzzle
Across
  1. king of fruits
  2. office basic course
  3. a pet anima
Down
  1. what is chrome
  2. a part of computer
  3. cyber security

6 Clues: a pet animawhat is chromeking of fruitscyber securityoffice basic coursea part of computer

The President's Cabinet 2023-10-04

The President's Cabinet crossword puzzle
Across
  1. This department oversees laws regarding the workplace
  2. the department responsible for the country's armed services and related military matters.
  3. This department ensures that we have the safest, most efficient vehicles and roadways.
  4. The CIA is overseen by this cabinet director
  5. This department is responsible for border security, cyber security, counterterrorism and our immigration laws.
  6. Vice President of the U.S.
Down
  1. the number of cabinet departments today
  2. the IRS (Internal Revenue Service) is part of this department
  3. This department oversees education in the U.S.
  4. This department oversees the National Park Service
  5. Who appoints the cabinet members?
  6. this department carries out policies ranging from nuclear power to fossil fuels to alternative energy sources.
  7. attorney general of the U.S.
  8. 4th in line to take over the Presidency

14 Clues: Vice President of the U.S.attorney general of the U.S.Who appoints the cabinet members?the number of cabinet departments today4th in line to take over the PresidencyThe CIA is overseen by this cabinet directorThis department oversees education in the U.S.This department oversees the National Park Service...

Cyber Security Cross Word RForseth2 2023-01-27

Cyber Security Cross Word RForseth2 crossword puzzle
Across
  1. Microsoft 365 App type
  2. Address that takes you to somewhere else
  3. What your device runs on
  4. Commercial Business Domain
  5. Most popular web browser 2022
  6. First Page on Browser
  7. Connects to networks together
  8. Connection to internet through wires
  9. Network Security system
  10. Page posted on the internet
  11. Microsoft 365 Email App
  12. Takes digital formats to paper
Down
  1. Holding site hostage
  2. Identifies your device on the network
  3. Apps downloaded onto computer
  4. Connection using multiple routers
  5. File Transfer Protocol
  6. Keeps your device running
  7. Converting data into code for privacy
  8. The access to websites

20 Clues: Holding site hostageFirst Page on BrowserMicrosoft 365 App typeFile Transfer ProtocolThe access to websitesNetwork Security systemMicrosoft 365 Email AppWhat your device runs onKeeps your device runningCommercial Business DomainPage posted on the internetApps downloaded onto computerMost popular web browser 2022Connects to networks together...

Cyber Security Keywords (for revision) 2023-11-16

Cyber Security Keywords (for revision) crossword puzzle
Across
  1. The most basic way of protecting your data.
  2. An old method of encoding data. Very easy to break.
  3. Describes fooling people into giving away personal information.
  4. A way of protecting an account by requiring the user to enter a code sent to an email address or mobile phone.
  5. Using online services to send nasty messages to people.
  6. Turning data into an unreadable form, often using a key, so others can't understand it.
  7. Word to describe using manipulation and other skills to fool people into believing you're someone you say you are.
  8. Describes unwanted emails, often sent to many people.
  9. Type of website that pretends to be from another company.
  10. WERXEGPEYW has been encoded using Caesar Cipher by moving between 2 and 5 places.
  11. A type of hacker who commits illegal activity.
  12. Sending so many requests to a server, it stops other people accessing it.
  13. Software used to restrict access to a network.
Down
  1. Collecting personal data in order to pretend to be someone else.
  2. A type of hacker who hacks illegally but for greater good.
  3. Informal term to describe something that is trying to steal from you.
  4. A type of hacker who legally hacks.
  5. Following someone online for a period of time, often posting messages in order to upset them.
  6. Someone who gains access to a network by using a range of tools and weaknesses.
  7. Type of software that can be used to avoid viruses.
  8. Describes being on the look out for cyber security risks.
  9. Someone who spends so long playing games it affects their well-being might be suffering from this.
  10. Software used to cause damage or to allow a hacker to gain access to a system.
  11. Type of software that can be used to avoid malware.

24 Clues: A type of hacker who legally hacks.The most basic way of protecting your data.A type of hacker who commits illegal activity.Software used to restrict access to a network.Type of software that can be used to avoid viruses.Type of software that can be used to avoid malware.An old method of encoding data. Very easy to break....

Jasper's CJR Cyber Security Terms 2024-08-02

Jasper's CJR Cyber Security Terms crossword puzzle
Across
  1. ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
  2. ___ is the name commonly given to unsolicited emails.
  3. ____ is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm.
  4. ____ is a general term for any type of intrusive computer software with malicious intent against the user.
  5. ___ ___ is the deliberate theft of sensitive data by nefarious actors.
  6. Bring Your Own Device (abbreviation)
  7. A ___ is a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.
  8. ____ is malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus
  9. _____ relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked.
  10. Breach A __ ___ is the event of a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
  11. _____ is the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.
  12. A ___ is a program that automates actions on behalf of an agent for some other program or person and is used to carry out routine tasks.
  13. A ____ is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
  14. ____ is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
Down
  1. _____ is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  2. A ____ is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal.
  3. ____ is software that is secretly installed on a user’s device to gather sensitive data.
  4. _____ is the process of verifying the identity of a user or piece of information and the veracity of the information provided.
  5. Force Attack This is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
  6. The __ __ is encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  7. _____ is the process of decoding cipher text to plain text so that it is readable by humans. It is the reverse of encryption
  8. A ___ is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
  9. ___ solutions integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
  10. ____ ____ are features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children.

24 Clues: Bring Your Own Device (abbreviation)___ is the name commonly given to unsolicited emails.___ ___ is the deliberate theft of sensitive data by nefarious actors.____ is software that is secretly installed on a user’s device to gather sensitive data.___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience....

Cyber Security Words and Terms 2022-09-15

Cyber Security Words and Terms crossword puzzle
Across
  1. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  2. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  3. Text that can be read by the human eye, like this article!
  4. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  5. The programs and other operating systems used by a computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  8. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  9. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  10. The deliberate use of someone else's identity, typically for financial gain.
  11. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
  1. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  2. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
  4. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. Software that has their code listed as free to use, share, and modify.
  6. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  7. A simple form of code for software that can be written in word editors.
  8. Customizable additions to software for extra functionality.
  9. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. A secret word or phrase that is used to access a computer system or service.

21 Clues: Text that can be read by the human eye, like this article!Customizable additions to software for extra functionality.The programs and other operating systems used by a computer.Software that has their code listed as free to use, share, and modify.A simple form of code for software that can be written in word editors....

AE MODULE 7 - CYBER SECURITY 2024-01-29

AE MODULE 7 - CYBER SECURITY crossword puzzle
Across
  1. Crime that involves a computer and/or a network
  2. Someone who uses a computer to gain access to systems or networks
  3. Malicious attempts by hackers to damage, steal, or destroy a computer
  4. Software that allows an attacker to obtain information on another computer
  5. Links two or more devices
  6. Descriptive data that contains information about other data
  7. In 1988, Robert __________ unleashed a malicious computer program
  8. Positions ideal for individuals with more than five years of experience
  9. Web browser feature
  10. Do not share ____________ across multiple sites
  11. Internet connection that encrypts traffic from a device to a private network
  12. software designed to disrupt, damage, or gain unauthorized access to a computer
Down
  1. Online harassment that uses electronic communication
  2. Attacker sends fraudulent emails to deceive someone into revealing information
  3. , Describes the digital environment in which computer networks communicate
  4. A type of malicious software
  5. Someone who uses the internet to cause harm to a victim
  6. ___________ engineering is when an attacker manipulates someone into revealing information
  7. Software that automatically displays or downloads advertising material
  8. Store information across pages within the site
  9. A trail of data intentionally left behind by a user
  10. Personally identifiable information
  11. A standalone self-replicating software application that invades and destroys computers

23 Clues: Web browser featureLinks two or more devicesA type of malicious softwarePersonally identifiable informationStore information across pages within the siteCrime that involves a computer and/or a networkDo not share ____________ across multiple sitesA trail of data intentionally left behind by a userOnline harassment that uses electronic communication...

BrainRiddle 2025-02-05

BrainRiddle crossword puzzle
Across
  1. A cryptographic function that converts data into a fixed-size string.
  2. A vulnerability in software that is exploited before the developer fixes it.
  3. A type of malware that secretly gathers information from a user’s device.
  4. The process of securing data by converting it into an unreadable format.
  5. A cyber-attack where attackers trick users into revealing sensitive information.
  6. A type of malware that disguises itself as legitimate software.
  7. A hidden part of the internet where anonymous activities take place.
  8. A network of infected computers controlled remotely by hackers.
  9. A network security system that monitors and controls incoming and outgoing traffic.
Down
  1. A type of software designed to harm or exploit devices and networks.
  2. A hacking method that tries multiple password combinations to gain access.
  3. The act of manipulating people into revealing confidential
  4. A cyber attack that manipulates databases through malicious SQL queries.
  5. Malicious software that locks files and demands payment to restore access.
  6. A set of tools that allow hackers to maintain access to a system unnoticed.

15 Clues: The act of manipulating people into revealing confidentialA type of malware that disguises itself as legitimate software.A network of infected computers controlled remotely by hackers.A type of software designed to harm or exploit devices and networks.A hidden part of the internet where anonymous activities take place....

The Great Spring Brain Bloom 2026-03-06

The Great Spring Brain Bloom crossword puzzle
Across
  1. Device you restart to install updates
  2. Email service used in Google Workspace
  3. Google cloud storage used by the City
  4. Google's AI assistant tool
  5. Insects that help flowers grow by moving pollen
  6. Program used to create presentations
Down
  1. What flowers do in spring
  2. Common cyber attack where fake emails try to trick you
  3. Season when flowers bloom and we refresh workflows
  4. Google's spreadsheet tool
  5. Bright yellow flower often seen in spring
  6. Month when spring begins in the U.S.
  7. Security practice: Think before you ___

13 Clues: What flowers do in springGoogle's spreadsheet toolGoogle's AI assistant toolMonth when spring begins in the U.S.Program used to create presentationsDevice you restart to install updatesGoogle cloud storage used by the CityEmail service used in Google WorkspaceSecurity practice: Think before you ___Bright yellow flower often seen in spring...

JB OX 2025-08-03

JB OX crossword puzzle
Across
  1. Upgrade at any time
  2. Food spoilage reimbursement
Down
  1. 6TB for the whole family
  2. Qualified tradesmen
  3. 12, 24,36 month payment plans
  4. $45 replacement
  5. Cyber security specialists with 5 years of experience

7 Clues: $45 replacementQualified tradesmenUpgrade at any time6TB for the whole familyFood spoilage reimbursement12, 24,36 month payment plansCyber security specialists with 5 years of experience

IoT and smart devices 2024-11-13

IoT and smart devices crossword puzzle
Across
  1. assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
  2. devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
  3. home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
  4. The use of technology to perform tasks without human intervention.
  5. technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
  6. The right to control personal information and protect it from unauthorized access.
Down
  1. of Things A network of devices that are connected and can exchange data over the internet.
  2. Devices that detect and measure physical properties like temperature, motion, or pressure.
  3. measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
  4. breach A security incident in which sensitive information is accessed or disclosed without authorization.
  5. A software application that allows users to interact with smart devices or services on their smartphones or tablets.

11 Clues: The use of technology to perform tasks without human intervention.The right to control personal information and protect it from unauthorized access.Devices that detect and measure physical properties like temperature, motion, or pressure.of Things A network of devices that are connected and can exchange data over the internet....

Crossword Puzzle no 0123 2023-01-03

Crossword Puzzle no 0123 crossword puzzle
Across
  1. An update in an operating system or application to fix bud & improve performance or security
  2. Emails sent to trick users to reveal their sensitive information.
  3. Phishing Techniques used to target CEO,CFO etc.
  4. Scrambling of text in order to ensure the security of data/ information
  5. Existence of weakness in a system or network
Down
  1. Socially or politically motivated hackers
  2. Sending bulk messages by abusing electronic messaging system
  3. Just going behind an authorized person into a secured area
  4. Technique of Hiding data behind a photo
  5. Hackers with main motive to gain financial profit by doing cyber crimes
  6. Unauthorized softwares installed on computer to gather sensitive information
  7. Software designed to help the user's computer detect viruses & avoid them

12 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Just going behind an authorized person into a secured areaSending bulk messages by abusing electronic messaging system...

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Never write these down on a sticky note or a whiteboard.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. Lock your _____ and your mobile phone anytime they are not in use.
  5. Files with sensitive information should always be kept in a _____ file room or drawer.
  6. Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
  1. _____ is when an unauthorized person follows you into a secure location.
  2. Report all possible cyber _____ to the IT Service Desk.
  3. An email scam that that targets unsuspecting users to give up information.
  4. Measures taken to protect your or your organization's information from cyber attack
  5. An unauthorized person that tries to gain access to your computer.
  6. Stay _____ and be on the lookout for security threats or incidents.
  7. Always keep a _____ workspace that is free of confidential information.

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

Cybersecurity Fundamental Chapter 1 2022-11-29

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
  2. group of criminals breaks into computers or networks to gain access for various reasons.
  3. Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  4. The Honeynet project is an example of creating Early Warning Systems.
Down
  1. great businesses have been created by collecting and harnessing the power of data and data analytics.
  2. InfraGard is an example of wide spread sharing of cyber intelligence.
  3. hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  4. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  5. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
  7. Business large and small have recognized the power of big data and data analytics.
  8. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
  9. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence.The Honeynet project is an example of creating Early Warning Systems.Business large and small have recognized the power of big data and data analytics.group of criminals breaks into computers or networks to gain access for various reasons....

CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06

CYBERSECURITY AWARENESS CROSSWORD PUZZLE crossword puzzle
Across
  1. hygiene The routine practices and steps taken to maintain good digital security.
  2. Software designed to detect and remove malicious programs from your computer.
  3. Malicious software designed to damage or gain unauthorized access to systems.
  4. breach An incident where sensitive information is accessed or disclosed without autorization.
  5. A private network that encrypts your internet connection to protect your data online.
  6. A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
Down
  1. A type of malware that locks your data and demands payment to unlock it.
  2. Engineering Manipulating people into giving up confidential information.
  3. A security system that monitors and controls incoming and outgoing network traffic
  4. A method of converting data into a secret code to prevent unauthorized access.
  5. A software update that fixes security vulnerabilities or bugs.

11 Clues: A software update that fixes security vulnerabilities or bugs.A type of malware that locks your data and demands payment to unlock it.Engineering Manipulating people into giving up confidential information.Software designed to detect and remove malicious programs from your computer....

Computer Virus 2024-09-09

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

RU ITEC411 2025-03-19

RU ITEC411 crossword puzzle
Across
  1. – Deception to gain money or access data illegally.
  2. – Protecting computers, networks, and data from attacks.
  3. – Tricking people into visiting fake websites to steal data.
  4. – Phishing through fake phone calls pretending to be legit.
  5. Overloading a website or server so it crashes.
  6. – A super sophisticated cyber weapon that targeted Iran’s nuclear program.
  7. – A U.S. law that expanded government surveillance after 9/11.
  8. – Fake systems set up to bait and track hackers.
  9. – Investigating cybercrimes and tracking down hackers.
  10. – legal power a country has over online activities.
Down
  1. – Hacking done for political or social causes.
  2. – An entity blocking or controlling what people can see online.
  3. – Any digital assault meant to steal data or cause harm.
  4. – laws protecting individuals from false information that damages the victim’s reputation.
  5. – Content that's restricted online for being offensive.
  6. – Breaking into computer systems, whether for good or bad.
  7. – Using fingerprints, and other physical traits for security.
  8. – Tricking people into giving up personal info through fake emails.
  9. – Phishing but through text messages instead of email.
  10. – Personal data that cybercriminals want to steal.

20 Clues: – Hacking done for political or social causes.Overloading a website or server so it crashes.– Fake systems set up to bait and track hackers.– Personal data that cybercriminals want to steal.– Deception to gain money or access data illegally.– legal power a country has over online activities.– Phishing but through text messages instead of email....

Cybersecurity Crossword 2025-09-02

Cybersecurity Crossword crossword puzzle
Across
  1. – A type of malware that replicates itself by infecting other programs.
  2. – A secure tunnel for internet traffic, stands for Virtual Private Network.
  3. – A network security system that monitors and controls traffic.
  4. – A scam using fake emails or messages to trick people into revealing information.
  5. Factor – Authentication requiring more than one form of verification.
  6. – A hidden method of bypassing normal authentication.
  7. – Malware that locks files and demands payment.
  8. – Software that detects and removes malicious programs.
  9. Attack – An attempt to damage, steal, or disrupt digital systems.
  10. – The practice of protecting systems, networks, and programs from attacks.
  11. – The process of converting data into a secure code.
  12. – A clickable reference to another webpage or document.
Down
  1. – Manipulating people into revealing confidential information. _____ engineering.
  2. – A secret string of characters used for authentication.
  3. – Software designed to harm or exploit systems.
  4. – A well-known security awareness training platform.
  5. Horse – Malicious software disguised as legitimate software.
  6. – Phishing conducted through SMS text messages.
  7. – Technology simulating human intelligence, used in modern cybersecurity.
  8. – The process of verifying identity before granting access.

20 Clues: – Software designed to harm or exploit systems.– Phishing conducted through SMS text messages.– Malware that locks files and demands payment.– A well-known security awareness training platform.– The process of converting data into a secure code.– A hidden method of bypassing normal authentication....

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Stay _____ and be on the lookout for security threats or incidents.
  2. An email scam that that targets unsuspecting users to give up information.
  3. Measures taken to protect your or your organization's information from cyber attack
  4. Never write these down on a sticky note or a whiteboard.
Down
  1. An unauthorized person that tries to gain access to your computer.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. _____ is when an unauthorized person follows you into a secure location.
  5. Lock your _____ and your mobile phone anytime they are not in use.
  6. Report all possible cyber _____ to the IT Service Desk.
  7. Files with sensitive information should always be kept in a _____ file room or drawer.
  8. Always keep a _____ workspace that is free of confidential information.
  9. Alway install updates to your computer or mobile phone. Don't click "Remind me later."

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

CYBURR SAFETEEE 2014-04-06

CYBURR SAFETEEE crossword puzzle
Across
  1. WHEN YOU GET NAKED ONLINE
  2. CYBER B______
  3. PROBLEMS AND THE STUFF THAT BLOCKS YOU IN LIFE
  4. BEING ONLINE WITH FRIENDS
  5. THE SOCIAL STATUS OF WHAT PEOPLE HAVE
  6. PEOPLE WHO ASSIST YOU IN BACK TIMES
  7. A DEFENSE AGAINST SOMETHING
  8. THE GROUP OF PEOPLE WHO GOVERN A COUNTRY
  9. YOUR OWN STUFF
  10. _____SAFETY
  11. SOMETHING THAT IS NOT LEGAL
Down
  1. PEOPLE OF A PLACE OR COUNTRY
  2. ADJECTIVE OF WHAT YOU CAN BE ONLINE
  3. THE ONLY PLACE WHERE IT IS BOTH A COUNTRY AND A CONTINENT
  4. THE NAME WHAT IS GIVEN TO PEOPLE WHO INTENTIONALLY CAUSE DISTRESS
  5. A VERY SMART MACHINE
  6. DATA
  7. THEFT WHEN PEOPLE STEAL YOUR IDENTITY TO USE YOUR MONEY TO PURCHASE THINGS
  8. PEOPLE WHO WILL GET INVOLVED IN CYBER BULLYING
  9. A PERSONAL WEBSTE WHERE YOU CAN SHARE YOUR FEELINGS
  10. THE WEB
  11. WHEN YOU ARE NOT ONLINE
  12. STUFF
  13. WHEN YOU ARE NOT OFFLINE
  14. CYBER _______

25 Clues: DATASTUFFTHE WEB_____SAFETYCYBER B______CYBER _______YOUR OWN STUFFA VERY SMART MACHINEWHEN YOU ARE NOT ONLINEWHEN YOU ARE NOT OFFLINEWHEN YOU GET NAKED ONLINEBEING ONLINE WITH FRIENDSA DEFENSE AGAINST SOMETHINGSOMETHING THAT IS NOT LEGALPEOPLE OF A PLACE OR COUNTRYADJECTIVE OF WHAT YOU CAN BE ONLINEPEOPLE WHO ASSIST YOU IN BACK TIMES...

CYBER 2021-09-05

CYBER crossword puzzle
Across
  1. Device that raise a number of security concerns because they create links between your computer and the outside world
  2. ARPAnet was used by __
  3. __ disagrees with cyber libertarians.
  4. Process of converting information into a digital format
Down
  1. Components of digital economy.
  2. Refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools.
  3. Act legal framework for regulation of internet in India
  4. The maximum amount of data transmitted over an internet connection in a given amount of time.
  5. Allow multiple computers to be hooked up to one cable modem allowing several devices to be directly connected through a single modem.
  6. Author of declaration of Independence of cyber rights

10 Clues: ARPAnet was used by __Components of digital economy.__ disagrees with cyber libertarians.Author of declaration of Independence of cyber rightsProcess of converting information into a digital formatAct legal framework for regulation of internet in India...

8/13/2024 2024-08-13

8/13/2024 crossword puzzle
Across
  1. Pentest certification
  2. EDR
Down
  1. Program that runs as a background proccess
  2. Cyber Security conference
  3. Low level coding language
  4. Measure of severity

6 Clues: EDRMeasure of severityPentest certificationCyber Security conferenceLow level coding languageProgram that runs as a background proccess

Computer Virus 2024-07-01

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

27-54 Vocab 2023-02-22

27-54 Vocab crossword puzzle
Across
  1. Recognizes how a person signs
  2. Good when determining a match
  3. stores handwriting samples in a database
  4. Everyone's handwriting is unique
  5. Maximum prison term for forgery
  6. Handwriting is difficult to forge
  7. Many tactics to complicate currency
  8. Altering an aspect of a document
  9. Directly altering a check
  10. checks for the authenticity of documents
  11. written marks whose source is uncertain
  12. Checks, Employment records, legal agreements
  13. Specialty practice area of accounting
  14. Checks, Certificates, Wills
  15. Finding security flaws
Down
  1. Computer system used to mimic targets of cyber attacks
  2. When false documents are used for the purpose of deception
  3. The agency that investigates forgery cases
  4. Dollar amount that is illegitimate checks every day
  5. covering original writing to make it unreadable
  6. Many tactics to use to prevent forgery
  7. Forgery for material gain
  8. first case where handwriting was used
  9. currency, food vouchers
  10. Year us court of appeals validated handwriting
  11. Height and width of the letters
  12. Examination and comparison of questioned documents

27 Clues: Finding security flawscurrency, food vouchersForgery for material gainDirectly altering a checkChecks, Certificates, WillsRecognizes how a person signsGood when determining a matchMaximum prison term for forgeryHeight and width of the lettersEveryone's handwriting is uniqueAltering an aspect of a documentHandwriting is difficult to forge...

9-1-1 Management Authority 2025-02-19

9-1-1 Management Authority crossword puzzle
Across
  1. Title for 988 calltakers
  2. A type of clinic utilized by 988
  3. 911 Management Authority IT Coordinator
  4. State Training Coordinator
  5. Crisis specialist goal for someone in crisis
  6. 911 Management Authority Cyber Security Specialist
  7. Company used to handle 988 calls in Oklahoma
  8. State 911 Coordinator
  9. Utilizing 988 can help reduce the burden to ______
Down
  1. Term often used for 911 Centers
  2. Team that can be sent to someone in crisis
  3. 911 Management Authority Grants Officer
  4. Organization best known for writing standards for 911
  5. 911 Management Authority Programs Coordinator
  6. State 911/988 Liaison
  7. Name of State's training platform
  8. Resource for improving technology in PSAP
  9. 988 has access to many of these

18 Clues: State 911/988 LiaisonState 911 CoordinatorTitle for 988 calltakersState Training CoordinatorTerm often used for 911 Centers988 has access to many of theseA type of clinic utilized by 988Name of State's training platform911 Management Authority Grants Officer911 Management Authority IT CoordinatorResource for improving technology in PSAP...

Hard Level 2021-09-11

Hard Level crossword puzzle
Across
  1. A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.
  2. Strongest wireless security.
  3. ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
Down
  1. ________ is an act that violates cyber-security.
  2. existence of weakness in a system or network is called _______.
  3. Least strong security encryption standard.

6 Clues: Strongest wireless security.Least strong security encryption standard.________ is an act that violates cyber-security.existence of weakness in a system or network is called _______.A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing....

AC3 2021-01-02

AC3 crossword puzzle
Across
  1. 2020, we worked from home due to _ 19
  2. Ways of being, B_ it
  3. Ways of being, O_ it
  4. AC3 is on which level
  5. _ Security
  6. Internal home page
  7. AC3 CEO
  8. Family Christmas party, Centennial _
  9. _ Crawford
  10. Previous AC3 company
  11. Nearest train station
  12. Recruitment team, _ Management
  13. Current location, _ St
  14. Previous location near Redfern
  15. Director of Sales
  16. CEO’s family comes from ?
  17. Wireless internet
  18. Ways of being, B_ it
Down
  1. First point of customer contact
  2. Previous AC3 company at Margaret St
  3. CEO’s Executive Assistant
  4. Office Manager
  5. _ Couzi
  6. Make a copy of data
  7. _ Georgescu
  8. _ Desk
  9. Head of Product & Tech
  10. _ Saad
  11. _ Seymour
  12. Head of Marketing
  13. Head of Corporate Services
  14. Ways of being, E_ it
  15. _ & Culture

33 Clues: _ Desk_ Saad_ CouziAC3 CEO_ Seymour_ Security_ Crawford_ Georgescu_ & CultureOffice ManagerHead of MarketingDirector of SalesWireless internetInternal home pageMake a copy of dataWays of being, B_ itWays of being, O_ itPrevious AC3 companyWays of being, E_ itWays of being, B_ itAC3 is on which levelNearest train stationHead of Product & Tech...

Computer English Course 2024-11-26

Computer English Course crossword puzzle
Across
  1. Embedded electronic circuit of computers
  2. The connection between entities
  3. Your major
  4. A portable computer
  5. The technology of deep learning
  6. Browse it!
  7. Remote virtual machines
  8. The opposite of output
  9. The opposite of input
  10. Changing for better
  11. You use it every day
  12. Software application
  13. Hosting service
  14. Where you store information
  15. Connecting the computers
Down
  1. The interface exposed to programmers
  2. information
  3. The code!
  4. cellphone
  5. The brain of the computer
  6. Python and Java
  7. The procedure and logic behind an application
  8. The I in AI
  9. A portable device, bigger than a mobile phone
  10. What dances with Tiktok?
  11. Your major
  12. What is VR?
  13. graphical interface
  14. The network used by everyone
  15. safety for the cyber world

30 Clues: The code!cellphoneYour majorBrowse it!Your majorinformationThe I in AIWhat is VR?Python and JavaHosting serviceA portable computerChanging for bettergraphical interfaceYou use it every daySoftware applicationThe opposite of inputThe opposite of outputRemote virtual machinesWhat dances with Tiktok?Connecting the computersThe brain of the computer...

Nationwide 2021-01-21

Nationwide crossword puzzle
Across
  1. relevant now
  2. tax free
  3. We have over 15 Million of them
  4. means of payment
  5. data,knowledge
  6. The renters dream
  7. Preparing for the worst
  8. To move around freely
  9. card Payment method
  10. Give for temporary use
  11. Items or things purchased or applied for
  12. Business exchange
Down
  1. in cyber space
  2. Will give you access to private information
  3. Where Dorothy longs to be
  4. school,university
  5. beneficial for me and you
  6. Given as a percentage
  7. Financial security achieved over time
  8. Who we serve?
  9. Can be High or low risk
  10. Suffer a loss
  11. Something to plan for
  12. Style of clock
  13. Something worth getting in to
  14. To bend or stretch
  15. Can be earnt

27 Clues: tax freerelevant nowCan be earntWho we serve?Suffer a lossin cyber spacedata,knowledgeStyle of clockmeans of paymentschool,universityThe renters dreamBusiness exchangeTo bend or stretchcard Payment methodGiven as a percentageSomething to plan forTo move around freelyGive for temporary useCan be High or low riskPreparing for the worst...

Yep! That happened. 2020-10-14

Yep! That happened. crossword puzzle
Across
  1. One of the first ISPs in 1992
  2. Ransomware that got Greenville City and Baltimore City
  3. Windows application used to wreak havoc on AOL
  4. A ransomware cyber attack unprecedented in scale
  5. Network outage from an “external intrusion"
  6. The red corporation that was breached due to an HVAC vendor
  7. Hi.COM VMS sender
  8. Founded by Julian Assange
  9. 1989 AIDS Trojan file
Down
  1. Enigma’s nemesis
  2. Email love letter
  3. CERT creator to address network security
  4. AKA Downup AKA Downadup AKA Kido
  5. NSA’s developed exploit
  6. Major consumer credit reporting agency breach
  7. His perfect pitch opened the door for phreaking
  8. The social networking site attacked in 2013
  9. Hacktivist group formed in 2003
  10. The Morris worm’s landing location
  11. Worm targeting a specific SCADA system

20 Clues: Enigma’s nemesisEmail love letterHi.COM VMS sender1989 AIDS Trojan fileNSA’s developed exploitFounded by Julian AssangeOne of the first ISPs in 1992Hacktivist group formed in 2003AKA Downup AKA Downadup AKA KidoThe Morris worm’s landing locationWorm targeting a specific SCADA systemCERT creator to address network security...

training presentation 2023-10-03

training presentation crossword puzzle
Across
  1. HOW DID ADT INITIALLY MONITOR THEIR CUSTOMERS SERVICES?
  2. OPERATIONS SUPPORT GROUP
  3. CUSTOMER MONITORING CENTER
  4. GENERAL CARE
  5. ADT IS THE LARGEST PROVIDER OF _________ HOMES
  6. IN 2017, ADT STARTED INSTALLING ______ UNITS
  7. ON APRIL 2, 2016, APOLLO GLOBAL MERGES ADT WITH WHO_____?
  8. CYBER _____ACTIVELY MONITORING 24/7, 365 DAYS
  9. IT WAS INVENTED IN THE LATE 1800'S TO INCREASE COMMUNICATION
  10. CREATING CUSTOMER FOR LIFE IS ADT'S ______ STATEMENT
  11. LOCAL OFFICE
Down
  1. WHO IS CEO?
  2. ON MAY 2, 2016 ADT BECOME A PRIVATE COMPANY HEADQUARTERED IN _____?
  3. OVER 149 YEARS OF ______?
  4. AMERICAN DISTRICT TELEGRAPH
  5. HOW DO WE RECEIVE CALLS?
  6. TECH SUPPORT
  7. ADT WAS ____ IN 1874?
  8. TO EARN THE LIFELONG TRUST OF CUSTOMERS IS CALLED WHAT?
  9. ACCOUNT MANAGEMENT

20 Clues: WHO IS CEO?TECH SUPPORTGENERAL CARELOCAL OFFICEACCOUNT MANAGEMENTADT WAS ____ IN 1874?OPERATIONS SUPPORT GROUPHOW DO WE RECEIVE CALLS?OVER 149 YEARS OF ______?CUSTOMER MONITORING CENTERAMERICAN DISTRICT TELEGRAPHIN 2017, ADT STARTED INSTALLING ______ UNITSCYBER _____ACTIVELY MONITORING 24/7, 365 DAYSADT IS THE LARGEST PROVIDER OF _________ HOMES...

tts informatika_cintavania_8_xf 2025-04-22

tts informatika_cintavania_8_xf crossword puzzle
Across
  1. mencari lokasi di peta
  2. mencari terjemahan
  3. mengembangkan dan memelihara situs web
  4. konten yang merusak reputasi
  5. proses membuat konten digital
  6. yang melindungi sistem komputer dari serangan cyber
  7. undang undang yang mengatur HAKI di Indonesia
  8. badan yang mengatur HAKI
  9. proses memeriksa konten sebelum di publikasikan
  10. simbol pengganti karakter
  11. singkatan dari hak kekayaan intelektual
  12. mencari gambar serupa
  13. konten digital tentang budaya
  14. mengembangkan perangkat lunak
Down
  1. konten yang dapat memicu konflik
  2. tujuan dari HAKI
  3. proses mengunggah ke medsos
  4. mencari file dengan format tertentu
  5. tindakan memverifikasi kebenaran konten
  6. medsos yang bisa menyebar video/postingan budaya
  7. konten yang sangat populer
  8. informasi palsu adalah
  9. profesi yang menganalisis data
  10. tindakan ilegal yang melanggar HAKI
  11. merancang antarmuka pengguna

25 Clues: tujuan dari HAKImencari terjemahanmencari gambar serupamencari lokasi di petainformasi palsu adalahbadan yang mengatur HAKIsimbol pengganti karakterkonten yang sangat populerproses mengunggah ke medsoskonten yang merusak reputasimerancang antarmuka penggunaproses membuat konten digitalkonten digital tentang budayamengembangkan perangkat lunak...

TUGAS-JARINGAN KOMPUTER DAN INTERNET 2024-01-11

TUGAS-JARINGAN KOMPUTER DAN INTERNET crossword puzzle
Across
  1. Manfaat jaringan komputer berguna untuk komunikasi lebih
  2. Device komputer pengguna yang ada di sebuah gedung atau workgroup dapat saling berkoneksi dengan jaringan LAN
  3. Jaringan yang mencakup area kecil
  4. Salah satu fitur konfigurasi keamanan jaringan
  5. protokol komunikasi untuk segala jenis
  6. Salah satu topologi yang mirip bintang
Down
  1. Fungsi cyber security
  2. jaringan
  3. Tata kelola data merupakan sebuah
  4. INTERCHANGE Nama lain pertukaran data

10 Clues: jaringanFungsi cyber securityJaringan yang mencakup area kecilTata kelola data merupakan sebuahINTERCHANGE Nama lain pertukaran dataprotokol komunikasi untuk segala jenisSalah satu topologi yang mirip bintangSalah satu fitur konfigurasi keamanan jaringanManfaat jaringan komputer berguna untuk komunikasi lebih...

Unit 5 - The internet and its uses 2022-05-25

Unit 5 - The internet and its uses crossword puzzle
Across
  1. a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
  2. small text file that is used to store personal data, by a web browser.
  3. the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
  4. a type of digital currency that uses encryption procedures.
  5. a network component where the web pages for a website are stored.
  6. a very large global network that allows users to access the world wide web.
  7. the physical structure, such as all the components and cables, that are used to connect devices.
  8. a type of cyber threat that involves sending a user a fake email that is designed to look genuine.
Down
  1. a person that carries out an illegal or immoral action.
  2. a method of securing data for storage or transmission that scrambles it and makes it meaningless.
  3. a type of password that uses a person's biological data, such as their fingerprint.
  4. a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
  5. a dormant/sleeping bot.
  6. a collection of web pages, normally about a related topic or purpose.
  7. a type of cookie that is stored by the web browser until it is deleted by the user or because it has expired.

15 Clues: a dormant/sleeping bot.a person that carries out an illegal or immoral action.a type of digital currency that uses encryption procedures.a network component where the web pages for a website are stored.a collection of web pages, normally about a related topic or purpose.small text file that is used to store personal data, by a web browser....

CYBER AWARENESS 2023-01-27

CYBER AWARENESS crossword puzzle
Across
  1. wide area network
  2. type of phishing attack that targets specific individuals or organizations typically through malicious emails
  3. networking hardware that connects devices on a computer network by using packet switching
  4. type of cyber-attack
  5. designed to harm or exploit a computer system
  6. A number (0-9) and/or symbol (such as !, #, or %)
  7. metropolitan area network
  8. is a software or program that generates various ads from different websites
  9. type of malware
  10. is a node that broadcasts data to every computer or Ethernet-based device connected to it
  11. safeguarding personal data from unauthorized access, use, or disclosure
  12. an essential component for any Wi-Fi network
Down
  1. the process of converting information or data into a code, especially to prevent unauthorized access
  2. type of malware
  3. virtual private network
  4. a phishing cyber-attack targeting CEOs
  5. is an identity and access management security method that requires two forms of identification to access resources and data
  6. can be used to identify an individual, such as name, address, phone number, email address, and financial information
  7. local area network
  8. type of malware
  9. involves flooding a website or network with traffic to make it unavailable to users
  10. networks of hijacked computer devices used to carry out various scams and cyberattacks
  11. of software that is designed to replicate itself and spread from one computer to another

23 Clues: type of malwaretype of malwaretype of malwarewide area networklocal area networktype of cyber-attackvirtual private networkmetropolitan area networka phishing cyber-attack targeting CEOsan essential component for any Wi-Fi networkdesigned to harm or exploit a computer systemA number (0-9) and/or symbol (such as !, #, or %)...

TTS Jaringan Komputer dan Internet 2024-01-11

TTS Jaringan Komputer dan Internet crossword puzzle
Across
  1. melindungi data termasuk?
  2. lapisan ke empat
  3. salah satu komponen jaringan komputer
  4. salah satu jenis cyber security
Down
  1. kata lain dari tata kelola data
  2. berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
  3. konfigurasi keamanan jaringan
  4. salah satu mekanisme pertukaran data
  5. metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
  6. jaringan area lokal

10 Clues: lapisan ke empatjaringan area lokalmelindungi data termasuk?konfigurasi keamanan jaringankata lain dari tata kelola datasalah satu jenis cyber securitysalah satu mekanisme pertukaran datasalah satu komponen jaringan komputerberbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna...

TTS Jaringan Komputer dan Internet 2024-01-11

TTS Jaringan Komputer dan Internet crossword puzzle
Across
  1. melindungi data termasuk?
  2. lapisan ke empat
  3. salah satu komponen jaringan komputer
  4. salah satu jenis cyber security
Down
  1. kata lain dari tata kelola data
  2. berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
  3. konfigurasi keamanan jaringan
  4. salah satu mekanisme pertukaran data
  5. metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
  6. jaringan area lokal

10 Clues: lapisan ke empatjaringan area lokalmelindungi data termasuk?konfigurasi keamanan jaringankata lain dari tata kelola datasalah satu jenis cyber securitysalah satu mekanisme pertukaran datasalah satu komponen jaringan komputerberbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna...

Cyber Bullying! 2020-08-29

Cyber Bullying! crossword puzzle
Across
  1. Some victims of cyber bullying may have increased anxiety or .....
  2. Cyber bullying is intended aggression through.... platforms
  3. People who are bullied are called ......
  4. It is important for Victims to know that they are never .....
  5. Some people who get cyber bullied can become depressed and .....
  6. We need to ....children and keep them safe on the internet
Down
  1. Some victims of cyber bullying may have feelings of .....
  2. Parents need to be able to ..... the effects of cyber bullying
  3. People who are cyber bullied feel like there is no ....
  4. Victims of cyber bullying can contact the .... for help
  5. Parents should teach their children how to .... people on social media and set their privacy
  6. Sometimes children who are cyber bullied ..... from school or even their favourite activities.

12 Clues: People who are bullied are called ......People who are cyber bullied feel like there is no ....Victims of cyber bullying can contact the .... for helpSome victims of cyber bullying may have feelings of .....We need to ....children and keep them safe on the internetCyber bullying is intended aggression through.... platforms...

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

8/13/2024 2024-08-13

8/13/2024 crossword puzzle
Across
  1. Pentest certification
  2. EDR
Down
  1. Program that runs as a background proccess
  2. Cyber Security conference
  3. Low level coding language
  4. Measure of severity

6 Clues: EDRMeasure of severityPentest certificationCyber Security conferenceLow level coding languageProgram that runs as a background proccess

Nursing and Midwifery Digital Health Framework 2025-04-02

Nursing and Midwifery Digital Health Framework crossword puzzle
Across
  1. the framework supports the develop —— Skills for the healthcare workforce
  2. security The practice of safeguard digital patient information against cyber threats
  3. the use of technology to support —— Decision-making is a key component of digital health
  4. the ability to understand —-- In digital health systems is essential
Down
  1. a type of digital tool that allows remote patients monitoring and communication
  2. Nurses and midwives must ensure ——- When handling digital health records
  3. A critical skill in the framework, the ability to analyse - To support patient care
  4. nurses and midwives use —— Systems to document and access patients records
  5. Digital health tools improve —-- By reducing errors and improving workflows
  6. the secure exchange of patients ___ is critical in digital health

10 Clues: the secure exchange of patients ___ is critical in digital healththe ability to understand —-- In digital health systems is essentialNurses and midwives must ensure ——- When handling digital health recordsthe framework supports the develop —— Skills for the healthcare workforce...

TTUTC Cyber Security Awareness Month 2023-10-05

TTUTC Cyber Security Awareness Month crossword puzzle
Across
  1. Measures taken to protect personal information from unauthorized access (two words).
  2. A branch of computer science that aims to create machines capable of intelligent behavior (two words).
  3. An individual or group who uses their skills to gain unauthorized access to computer systems for various purposes.
  4. A type of attack that tricks individuals into making decisions or divulging confidential information (two words).
  5. A program that appears harmless but is designed to perform malicious actions (two words).
Down
  1. An authentication method that uses a combination of something you know, something you have, and something you are (Abbreviation).
  2. When a hacker bypasses physical access controls by following an authorized person inside.
  3. An attack that uses a thumb drive to install malware on your computer. (two words).
  4. Information security is our shared ______
  5. The ethical concerns and considerations surrounding the use of AI in various applications (two words).
  6. A technique where attackers trick individuals into revealing sensitive information.
  7. Policy A term in a policy that emphasizes keeping the workspace free of sensitive information when not in use (two words).
  8. Malicious software designed to harm or exploit computer systems.
  9. Over-the-phone-based social engineering.
  10. Incidents where sensitive information is accessed without authorization (two words).
  11. The process of encoding information to make it unreadable without the proper decryption key.
  12. Widely used in-home network technology that allows for wireless connection in interfacing with the internet
  13. A set of characters used to authenticate and access a system.
  14. A type of malware that encrypts files and demands a ransom for their release.

19 Clues: Over-the-phone-based social engineering.Information security is our shared ______A set of characters used to authenticate and access a system.Malicious software designed to harm or exploit computer systems.A type of malware that encrypts files and demands a ransom for their release....

Cyber Security Crossword Puzzle 2021-08-25

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. An act that violates the laws of one or more countries
  2. concealing the true source of electronic information
  3. a crime to access a protected computer without authorization.
  4. bullying that takes place on the internet
  5. a code of polite, thoughtful behaviors to follow while on the network.
Down
  1. an emotional often profane response to an action or statement in a chatroom
  2. Law which you have to get permission from the owner to make non-archival copies
  3. Philosophic study of ethics pertaining to computers
  4. the conditions under which you can use that is copyrighted by someone else without getting permission.
  5. the act of stealing valuable property by copying software
  6. The concept that's its a persons idea, writing and constructions without it being in physical sense
  7. the practice of attacking and robbing ships at sea
  8. A set of moral principals or values

13 Clues: A set of moral principals or valuesbullying that takes place on the internetthe practice of attacking and robbing ships at seaPhilosophic study of ethics pertaining to computersconcealing the true source of electronic informationAn act that violates the laws of one or more countriesthe act of stealing valuable property by copying software...

Do I know my Cyber Security Posture 2023-07-05

Do I know my Cyber Security Posture crossword puzzle
Across
  1. - The potential negative impact or consequence of a cybersecurity incident.
  2. - Ensuring adherence to relevant cybersecurity regulations and standards.
  3. - The effects on an organization's operations, revenue, and reputation due to a security breach.
Down
  1. - The management and oversight of cybersecurity within the organization.
  2. - Assessing and managing cybersecurity risks associated with vendors, suppliers, and partners.
  3. - Coverage to mitigate potential financial losses resulting from a cyber incident.
  4. - Promoting a culture of cybersecurity consciousness among employees.
  5. - Education programs to inform employees about cybersecurity threats and best practices.
  6. - An unforeseen event or occurrence related to cybersecurity.
  7. - Protecting assets, systems, and data from unauthorized access or harm.

10 Clues: - An unforeseen event or occurrence related to cybersecurity.- Promoting a culture of cybersecurity consciousness among employees.- The management and oversight of cybersecurity within the organization.- Protecting assets, systems, and data from unauthorized access or harm.- Ensuring adherence to relevant cybersecurity regulations and standards....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Technological Impacts in Business 2025-03-17

Technological Impacts in Business crossword puzzle
Across
  1. progress or developments
  2. companies that are in the same industry
  3. buying and selling things online.
  4. protecting digital information
  5. broadening
Down
  1. doing things faster and with less waste
  2. create new products and services
  3. using machines or computers to do tasks that people used to do
  4. the biggest example of technological impacts

9 Clues: broadeningprogress or developmentsprotecting digital informationcreate new products and servicesbuying and selling things online.doing things faster and with less wastecompanies that are in the same industrythe biggest example of technological impactsusing machines or computers to do tasks that people used to do

CYBER BULLYING 2026-02-06

CYBER BULLYING crossword puzzle
Across
  1. benda yang suka di gunakan untuk cyber bullying
  2. cyber bullying banyak di kalangan?
  3. korban cyber bullying dapat mengalami gangguan?
  4. dampak mental dari cyber bullying
  5. cyber bullying dapat menyebabkan korban merasa?
Down
  1. cyber bullying melanggar norma?
  2. cyber bullying dapat terjadi kapan saja secara?
  3. cyber bullying termasuk perilaku yang?
  4. Pelaku cyber bullying sering bersembunyi di balik identitas?
  5. akun palsu yang sering di gunakan untuk?

10 Clues: cyber bullying melanggar norma?dampak mental dari cyber bullyingcyber bullying banyak di kalangan?cyber bullying termasuk perilaku yang?akun palsu yang sering di gunakan untuk?benda yang suka di gunakan untuk cyber bullyingcyber bullying dapat terjadi kapan saja secara?korban cyber bullying dapat mengalami gangguan?...

Cyber security Vocab 2 2021-09-28

Cyber security Vocab 2 crossword puzzle
Across
  1. means of restricting access to objects based on the identity of subjects and/or groups to which they belong
  2. measure of the likelihood that the biometric security system will correctly accept an access attempt by a user
  3. Body measurements related to human characteristics
  4. software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
  5. analyzes a user's digital physical and cognitive behavior
  6. method of linking a user's identity across multiple separate identity management systems
  7. means of restricting access to objects based on the identity of subjects and/or groups to which they belong
Down
  1. process of securing a system by reducing its surface of vulnerability
  2. Microsoft Windows directory service that allows IT administrators to manage users, applications, data, and various other aspects of their organization's network
  3. software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
  4. concept that has employees rotate through different jobs to learn the procedures and processes in each
  5. network authentication protocol
  6. verifying the identity of a user
  7. small device used with a computer
  8. measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user

15 Clues: network authentication protocolverifying the identity of a usersmall device used with a computerBody measurements related to human characteristicsanalyzes a user's digital physical and cognitive behaviorprocess of securing a system by reducing its surface of vulnerability...

Cyber security 6-8 2023-07-17

Cyber security 6-8 crossword puzzle
Across
  1. Fraudulent attempts to gain access to sensitive information, usually via email
  2. Protects digital information
  3. Software designed with malicious intent
  4. A secret code to protect access
  5. A technique used to take advantage of a vulnerability
  6. When sensitive information is released
  7. Software that locks users out of their system until payment is made
Down
  1. Malicious software that targets computers
  2. Software designed to spy on activity without the user's knowledge
  3. Software update to fix vulnerabilities and bugs
  4. Using two separate forms of authentication for secure access
  5. Technology used to monitor the outflow of sensitive data
  6. Network security system that prevents unwanted access

13 Clues: Protects digital informationA secret code to protect accessWhen sensitive information is releasedSoftware designed with malicious intentMalicious software that targets computersSoftware update to fix vulnerabilities and bugsNetwork security system that prevents unwanted accessA technique used to take advantage of a vulnerability...

Cyber Security Crossword - 1 2023-07-18

Cyber Security Crossword - 1 crossword puzzle
Across
  1. Tool used to hide online activity
  2. Malicious advertising that spreads malware
  3. Malware that locks files until a ransom is paid
  4. Fraudulent practice where individuals or entities impersonate legitimate sources to deceive and trick users into revealing sensitive information, such as passwords, credit card details, or personal data.
  5. Malicious software that secretly collects information
  6. is a computer on a network which acts as an intermediary for connections with other computers on that network
  7. Taking control of a user's web session
Down
  1. An online tool that helps conceal a user's identity and activities.
  2. Attacks that flood a system with excessive requests
  3. Attacks that redirect users to fake websites
  4. password cracking Technique of breaking passwords without an internet connection
  5. Sending a large volume of emails to overwhelm a server
  6. Tool used to capture keystrokes

13 Clues: Tool used to capture keystrokesTool used to hide online activityTaking control of a user's web sessionMalicious advertising that spreads malwareAttacks that redirect users to fake websitesMalware that locks files until a ransom is paidAttacks that flood a system with excessive requestsMalicious software that secretly collects information...

Cyber Security Puzzle 2021-10-06

Cyber Security Puzzle crossword puzzle
Across
  1. exploiting
  2. infected
  3. for preventing exploits
  4. computer virus!clicknow
Down
  1. unknown
  2. fishing
  3. code
  4. gather information
  5. spreading

9 Clues: codeunknownfishinginfectedspreadingexploitinggather informationfor preventing exploitscomputer virus!clicknow

Cyber Security Crossword 2013-11-03

Cyber Security Crossword crossword puzzle
Across
  1. Sending files to a server or computer to somewhere on the Internet.
  2. Software that harms or steals your data from your computer.
  3. Someone who is not using their real identity, an unknown name.
  4. The last part of an internet URL
Down
  1. Someone who views or changes information without permission.
  2. A name you use to instead of your real name on a website or on the computer.
  3. Combinations of text letters to make up an image of a facial expression.
  4. Something that you can plug into your computer. You can put data on it.
  5. Individual 'dots' in a monitor that make up the display on your screen.

9 Clues: The last part of an internet URLSoftware that harms or steals your data from your computer.Someone who views or changes information without permission.Someone who is not using their real identity, an unknown name.Sending files to a server or computer to somewhere on the Internet....

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

WHITECOLLAR CRIMES 2021-06-11

WHITECOLLAR CRIMES crossword puzzle
Across
  1. CYBER CRIME IS TRANSPARENT OR TRANSNATIONAL
  2. A PASSWORD SUCH "obxxn45499bnLLLL" IS AN EXAMPLE OF WHAT TYPE OF PASSWORD, COMPLEX OR SIMPLE
  3. THE C IN CIA MODEL FOR CYBER SECURITY MEANS WHAT
  4. WHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998
  5. IN CONTRAST TO STOCHASTIC, THIS RISK RESULT FROM DELIBERATE CONDUCT.
Down
  1. MEANS PROTECTING INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED ACCESS, USE OR DISCLOSURE
  2. OCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACT
  3. PHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIES
  4. EXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFING
  5. RISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROL
  6. a law that was enacted by the UnitedStates Congress in 1986. It forms part of the Electronic Communications PrivacyAct and is codified as 18 U.S.C. sections 2701–2712.

11 Clues: CYBER CRIME IS TRANSPARENT OR TRANSNATIONALRISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROLOCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACTPHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIESTHE C IN CIA MODEL FOR CYBER SECURITY MEANS WHATEXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFINGWHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998...

Cyber Security Risks 2019-05-12

Cyber Security Risks crossword puzzle
Across
  1. These are small files that your browser saves on your computer that can stay on for months and may even record everywhere you go online.
  2. They are unwanted software that is installed in your system without your consent.
  3. It is a type of program that is installed to collect information about users, their computers or their browsing habits without your knowledge and sends the data to a remote user.
  4. It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
  5. It is the unauthorized transmission of data from within an organization to an external destination or recipient.
  6. The practice of sending emails that appears to be from trusted sources with the goal of gaining personal information or influencing the users to do something.
Down
  1. It makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  2. It is a crime in which an imposter obtains key pieces of personally identifiable information, such as NRIC or driver's license number, in order to impersonate someone else.
  3. The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.

9 Clues: They are unwanted software that is installed in your system without your consent.It is the unauthorized transmission of data from within an organization to an external destination or recipient.It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid....

Cyber Security & Legislation 2022-02-20

Cyber Security & Legislation crossword puzzle
Across
  1. Computer ________ Act 1990 - It is illegal to make any unauthorised access to data
  2. SQL __________ - a technique used to view or change data in a database by inserting additional code into a text input box, creating a different SQL command
  3. Data ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessary
  4. __________ Designs & Patents Act 1998 - It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author
  5. _________ of Service attack. Floods a server with useless traffic causing the server to become overloaded and unavailable
Down
  1. Software written in order to infect computers and commit crimes.
  2. Online fraud technique used by criminals. It is designed to get you to give away personal information
  3. Brute ________ attack - A trial and error method used to decode encrypted data (such as passwords). Uses every combination until it hits upon the correct one.
  4. Open ________ - Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. May not be fully tested. Users have access to the source code

9 Clues: Software written in order to infect computers and commit crimes.Computer ________ Act 1990 - It is illegal to make any unauthorised access to dataData ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessaryOnline fraud technique used by criminals. It is designed to get you to give away personal information...

Online Saftey 2021-06-22

Online Saftey crossword puzzle
Across
  1. - never share ___ information
  2. - be____ what you post
  3. - beware of ____
  4. - we should manage multiple _____ for better security
Down
  1. - ____ cells help us with online theft
  2. - keep your social media account _____
  3. - protect your IP ____ from stalkers

7 Clues: - beware of ____- be____ what you post- never share ___ information- protect your IP ____ from stalkers- ____ cells help us with online theft- keep your social media account _____- we should manage multiple _____ for better security

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Data Security 2025-01-16

Data Security crossword puzzle
Across
  1. Adhering to data protection regulations.
  2. The potential for loss or damage.
  3. The technique of obscuring specific data within a database to protect sensitive information.
  4. A weakness that can be exploited.
  5. A network security system that monitors and controls incoming and outgoing network traffic.
  6. A copy of data stored separately to protect against data loss.
  7. A type of cyber attack where attackers trick individuals into providing sensitive information.
  8. Verifying the identity of a user or system before granting access.
Down
  1. An event that compromises data security.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Data Loss Prevention, strategies to prevent data breaches.
  4. The process of converting information into a secure format to prevent unauthorized access.
  5. Maintaining the accuracy and completeness of data.
  6. An unauthorized access or exposure of sensitive data.

14 Clues: The potential for loss or damage.A weakness that can be exploited.An event that compromises data security.Adhering to data protection regulations.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Cybercross 2022-09-02

Cybercross crossword puzzle
Across
  1. A piece of software or a sequence of commands that takes advantage of a software vulnerability or security flaw
  2. The conversion of data from a readable format into an encoded format.
  3. A sequence of words or other text that a person uses to authenticate their identity.
  4. A principle that ensures timely and reliable access to information when required
  5. A network of hijacked devices used to carry out various scams and cyber attacks.
  6. A program or file designed to harm a computer, server, client, or computer network.
  7. A process of verifying users' identity.
  8. A security violation in which information is accessed by an unauthorized individual or system.
Down
  1. A program that slows down your computer and watches your online activities.
  2. A principle that ensures information is protected from unauthorized disclosure
  3. A principle that ensures information is not modified or deleted by unauthorized parties.
  4. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's established security policies.
  5. Act that involves someone seeking entry to a restricted area without proper authentication.
  6. A fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  7. Any circumstance or event with the potential to steal or damage data or disrupt computing systems.

15 Clues: A process of verifying users' identity.The conversion of data from a readable format into an encoded format.A program that slows down your computer and watches your online activities.A principle that ensures information is protected from unauthorized disclosureA principle that ensures timely and reliable access to information when required...

RU ITEC411 Crime 2022-10-17

RU ITEC411 Crime crossword puzzle
Across
  1. amendment to the federal computer fraud law that confronts hackers
  2. the act of spying or using spies
  3. agency of the U.S. Department of Transportation(Federal Aviation Administration)
  4. a virus that is installed on a device and is sent to attack other systems
  5. provides evidence with computer forensics, investigations, and cyber security
  6. person who uses computers to gain unauthorized access to digital information
  7. denial of service attack
  8. agency of the U.S. that is tasked with the enforcement of civil antitrust law and the promotion of consumer protection(Federal Trade Commission)
  9. a book that is made available in digital form
  10. naming system used to identify computers that are reachable through the web(Domain Name Server)
Down
  1. hacking that contributes to a political agenda
  2. the event where hackers attacked a bay area transit system
  3. suppression or changing of inappropriate material
  4. the act of damaging the reputation of a person
  5. group of hackers who coordinated cyber attacks
  6. a statement of false information towards a person
  7. agent of government that is tasked with protecting the environment
  8. computer that helps manage account funds
  9. a book by C. Stoll that addresses hackers compromising their victims
  10. the attempt to overtake personal and financial information stored online

20 Clues: denial of service attackthe act of spying or using spiescomputer that helps manage account fundsa book that is made available in digital formhacking that contributes to a political agendathe act of damaging the reputation of a persongroup of hackers who coordinated cyber attackssuppression or changing of inappropriate material...

FITDVocab.MY 2013-05-15

FITDVocab.MY crossword puzzle
Across
  1. the VDU
  2. the tower
  3. opposite of pause
  4. also known as KB
  5. it eats cheese
  6. apps
  7. wireless fidelity
  8. without wires it can be 3g or 4g
  9. national cyber security alliance
  10. what is google
  11. connect without wires
  12. in the sky
  13. to search for search engines
  14. also known as TB
  15. visual display unit
  16. it is what comes before byte
  17. a printer
  18. keep your password secret
  19. random access memory
  20. folder
  21. a blank sheet you can type on
  22. not by hand
  23. where you put your flash drive
  24. to restart your computer
  25. light admitting diode
  26. the internet world
Down
  1. a symbol to represent your company
  2. enter instructions into a computer
  3. a keyboard
  4. CD drive
  5. a virus on your computer
  6. also known as GB
  7. internet service provider
  8. liquid crystal display
  9. online police
  10. a phone
  11. a catchy phrase to go with a logo
  12. online bullying
  13. the brain of the computer
  14. where you stick your headphones into
  15. extension cord operating systems
  16. old school with WIFI
  17. bigger than a bit
  18. the creator
  19. a packet of paper to advertise your company
  20. also know as MB
  21. computer processing unit
  22. service set identifier

48 Clues: appsfolderthe VDUa phoneCD drivethe towera printera keyboardin the skythe creatornot by handonline policeit eats cheesewhat is googleonline bullyingalso know as MBalso known as KBalso known as GBalso known as TBopposite of pausewireless fidelitybigger than a bitthe internet worldvisual display unitold school with WIFIrandom access memory...

RU ITEC411 Crime and Security 2021-04-15

RU ITEC411 Crime and Security crossword puzzle
Across
  1. A security tool used to protect data by encoding it
  2. Hacking that has no ulterior motive, typically done for the challenge
  3. A person who is intruding in someone's computer
  4. An act that made hacking illegal and more punishable, but came out before the web was invented
  5. Exploits a servers vulnerabilities by flooding it with traffic, ex. Syn flood (2 hyphens)
  6. Type of Hacking with a political motive
  7. Hacker enlisted for penetration testing or hacks with good intent(hyphen)
  8. Company that was hacked through their heating and air conditioning units
  9. The opposite of slander, which is verbal defamation
Down
  1. Used by the computer to communicate with other hardware and manage it(hyphen)
  2. Authentication that use more that one way to identify yourself
  3. tests the strength of a company’s security through hacking
  4. The conflict that takes place through online and electronic means (hyphen)
  5. Security through facial recognition, fingerprints
  6. Software or programs that can damage or harm computers
  7. Encrypts files and will decrypt them when a payment of sorts is received by a Hacker
  8. A scam that targets people through various forms of messaging such as emails and texts
  9. A type of hacker with malicious intent (hyphen)
  10. Program corrupts other computers by reproduction
  11. Malicious software that is able to track and obtain information from the device its implanted on

20 Clues: Type of Hacking with a political motiveA person who is intruding in someone's computerA type of hacker with malicious intent (hyphen)Program corrupts other computers by reproductionSecurity through facial recognition, fingerprintsA security tool used to protect data by encoding itThe opposite of slander, which is verbal defamation...

ISSO June 2021 2021-06-07

ISSO June 2021 crossword puzzle
Across
  1. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
  2. The physical separation or isolation of a system from other systems or networks is known as an __ __.
  3. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
  4. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
  5. IRM office responsable for Cyber Operations oversight.
  6. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
  7. vulnerabilities must be remediated within ___calendar days of initial detection.
  8. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
  9. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
  10. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
  1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
  2. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
  3. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
  4. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
  5. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
  6. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
  7. ISSO duties must be performed using an ISSO ___ account.
  8. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
  9. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.

19 Clues: IRM office responsable for Cyber Operations oversight.ISSO duties must be performed using an ISSO ___ account.vulnerabilities must be remediated within ___calendar days of initial detection.Criminal organization responsable for the cyber attack against the Colonial Pipeline....

social media 2 2024-07-11

social media 2 crossword puzzle
Across
  1. - to think
  2. - to bring
  3. - to threaten
  4. peur - to be afraid
  5. - to link
  6. - desperate
  7. - to facilitate
  8. - fraud
  9. - to sell
  10. intimidation - cyber bullying
  11. - to maintain
  12. - to belong
Down
  1. - disappointed
  2. - to aim
  3. - company
  4. - anonymous
  5. - to establish
  6. - to wait/expect
  7. - application
  8. - to suffer
  9. - goal/aim

21 Clues: - fraud- to aim- company- to link- to sell- to think- to bring- goal/aim- anonymous- to suffer- desperate- to belong- to threaten- application- to maintain- disappointed- to establish- to facilitate- to wait/expectpeur - to be afraidintimidation - cyber bullying

I4p0 quiz 1 2025-09-02

I4p0 quiz 1 crossword puzzle
Across
  1. 3D Printing is ... Manufacturing
  2. A in AR/VR
  3. ... Integration, Cross company data integration
  4. Replication of real-life scenario in virtual
  5. Type of security very imp in Industry 4.0
  6. Lot of Data produced by sensors
Down
  1. Using tools to visually represent data
  2. First I in IIoT

8 Clues: A in AR/VRFirst I in IIoTLot of Data produced by sensors3D Printing is ... ManufacturingUsing tools to visually represent dataType of security very imp in Industry 4.0Replication of real-life scenario in virtual... Integration, Cross company data integration

Unit 3 Cyber Security 2017-04-28

Unit 3 Cyber Security crossword puzzle
Across
  1. Level of assurance that the data will be available to those who need it when they want it
  2. Countries have always spied on each other
  3. Gaining the trust of individuals and using that trust to influence them to give confidential information
  4. Rules which restrict access only to those who need to know
  5. Level of assurance which can be given as to the accuracy and trustworthiness of the data
  6. Sending so much traffic to a computer system that it cannot cope, denying access to legitimate users
  7. Devices or programs that detect attempts at intrusion and take action to prevent them
  8. Normally criminal activities because the intention is to cause harm to the computer or system
Down
  1. To see how the system copes when subjected to conditions which would cause the vulnerabilities to become apparent
  2. Exposes any attempts by attackers to overcome security controls to compromise data or other resources
  3. This includes cyber enabled crime and cyber dependent crime.
  4. Any threat which is a result of a natural event
  5. Any threat to the system or computer through physical access. These include loss or theft of equipment. E.g. tablet or laptop, portable memory

13 Clues: Countries have always spied on each otherAny threat which is a result of a natural eventRules which restrict access only to those who need to knowThis includes cyber enabled crime and cyber dependent crime.Devices or programs that detect attempts at intrusion and take action to prevent them...

Learning Unit 11 - Legal issues in information security and risk management 2023-05-29

Learning Unit 11 - Legal issues in information security and risk management crossword puzzle
Across
  1. which involves any illegal act which involves a computer whether the computer is an object of a crime, an instrument used to commit a crime or a repository of evidence related to a crime and includes the statutory cyber crimes set out in sections 85 to 88 of the ECT Act.
  2. where the concepts of “reasonableness” and “duty of care” are being relied upon to determine whether or not organisations have been negligent in not taking the necessary security precautions, or are liable for loss suffered where it is proved by a party who suffered loss that their loss should have been reasonably foreseeable and due to the others parties negligence, loss or damage has been suffered by the other party.
  3. Many jurisdictions have enacted breach notification laws that require organizations to notify affected individuals, regulators, or authorities in the event of a data breach. These laws often have specific timelines for reporting breaches and may also outline the content and format of the notifications.
  4. where information technology contracts such as outsourcing, service provision, application service provider and software licensing agreements are beginning to impose security obligations on vendors and business partners. These agreements increasing require the providers of information technology to warrant against security vulnerabilities, such as viruses and trojan horses, and organisations are more frequently being contractually obligated to protect a customer’s, employee’s, or business partner’s personal or confidential information. Similarly, businesses are often required to agree to security commitments as a condition of participating in certain activities. For example, merchants that want to accept credit cards, must agree to comply with the PCI Data Security Standard (click here to read our post on the Standard).
  5. (e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication.
  6. Various data protection and privacy laws, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, regulate the collection, storage, processing, and transfer of personal data. Organizations must comply with these laws and implement appropriate security measures to safeguard personal information.
  7. in terms of section 87 of the ECT Act where the victim of an information security attack conducted by means of impersonation or spoofing could lay a criminal charge of fraud against the attacker based on the attacker’s attempt to mislead or misappropriate something of value
  8. Laws related to cybercrime and computer fraud address offenses like hacking, unauthorized access, identity theft, malware distribution, and other cyber-related crimes. These laws provide legal frameworks for prosecuting individuals or organizations engaged in illegal activities targeting information systems and networks.
Down
  1. Organizations need to protect their intellectual property rights, such as trade secrets, patents, copyrights, and trademarks. Implementing robust security measures and employing legal mechanisms to safeguard intellectual property is crucial for mitigating risks associated with unauthorized access or theft.
  2. in connection with forensic issues relating to information in electronic form which may have been modified or deleted in an attempt to hide the evidence and the taking of necessary steps to ensure that the reliability and admissibility of the electronic evidence will be maintained in the eyes of a Court of law.
  3. Transferring personal data across international borders may be subject to specific legal requirements. Adequate safeguards, such as Standard Contractual Clauses (SCCs) or Binding Corporate Rules (BCRs), may need to be implemented to ensure compliance with applicable data protection laws.
  4. where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”.
  5. Contracts, such as service level agreements (SLAs) and vendor agreements, play a crucial role in managing information security risks. Organizations should include provisions that outline security responsibilities, breach notification requirements, and liability allocation in case of security incidents.
  6. play a significant role in information security and risk management. Several laws and regulations govern the protection of sensitive information, privacy, and the management of risks associated with data breaches and cybersecurity incidents.
  7. where for example a person submits personal information to an organisation for a certain purpose and the organisation reveals the information to a third party who misuses the information causing the person to suffer damage or loss (for example, in the context of ‘data swops’ between organisations).
  8. where ordinary electronic signatures and “advanced” electronic signatures play a role in securing information pursuant to sections 13 of the ECT Act.
  9. has introduced the concepts of providing appropriate, reasonable technical and organisational measures to protect personal information.
  10. under the soon to be enacted Protection of Personal Information Bill.
  11. for example identity theft
  12. where King III™ requires appropriate information security controls to protect companies and their shareholders.

20 Clues: for example identity theftunder the soon to be enacted Protection of Personal Information Bill.where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”.(e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication....

Y9 Cyber Security 2021-02-09

Y9 Cyber Security crossword puzzle
Across
  1. A type of network that doesn't need wires
  2. A short range network technology used for connecting smart watches and smartphones
  3. The colour hat for this illegal hacker
Down
  1. Weaknesses in systems that allow for hacking
  2. A type of malware
  3. Malicious software
  4. Scrambling data so that it cant be read without the key
  5. The Computer Misuse Act and GDPR are examples of this
  6. The type of hacking done by a white hat hacker

9 Clues: A type of malwareMalicious softwareThe colour hat for this illegal hackerA type of network that doesn't need wiresWeaknesses in systems that allow for hackingThe type of hacking done by a white hat hackerThe Computer Misuse Act and GDPR are examples of thisScrambling data so that it cant be read without the key...

Cyber Security Crossword 2026-04-05

Cyber Security Crossword crossword puzzle
Across
  1. A secret word you use to log in.
  2. When someone tries to harm a computer or network online.
  3. Bad software that can harm your computer.
  4. A big computer that stores and shares information.
Down
  1. A security system that blocks bad traffic and keeps your computer safe.
  2. A person who tries to break into computers.
  3. A program that protects your computer from bad files.
  4. A fake message that tries to trick you to give your information.
  5. harmful program that can make your computer sick.

9 Clues: A secret word you use to log in.Bad software that can harm your computer.A person who tries to break into computers.harmful program that can make your computer sick.A big computer that stores and shares information.A program that protects your computer from bad files.When someone tries to harm a computer or network online....

Cyber Security Month 2021 2021-09-17

Cyber Security Month 2021 crossword puzzle
Across
  1. ____ all devices and software to keep them protected.
  2. Trying to get someone to divulge confidential information.
  3. Scams through a phone call.
  4. Place online where cybercriminals share and sell stolen information
  5. You should always ____ your computer before walking away.
  6. ____ any suspected malicious activity to Risk Management.
Down
  1. Principle of accessing only what you need.
  2. Scams through a text message.
  3. Should be installed on all computers to protect against malicious software.
  4. ____ any paper documents when they are no longer needed.
  5. Malicious software that holds data hostage.
  6. Enforce strong ____ on all systems.
  7. Scams through email.

13 Clues: Scams through email.Scams through a phone call.Scams through a text message.Enforce strong ____ on all systems.Principle of accessing only what you need.Malicious software that holds data hostage.____ all devices and software to keep them protected.____ any paper documents when they are no longer needed....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Enforce strong ____ on all systems.
  2. Scams through a phone call.
  3. Principle of accessing only what you need.
  4. Scams through a text message.
  5. Place online where cybercriminals share and sell stolen information.
  6. ____ any suspected malicious activity to Risk Management.
Down
  1. Trying to get someone to divulge confidential information.
  2. Malicious software that holds data hostage.
  3. ____ all devices and software to keep them protected.
  4. ____ any paper documents when they are no longer needed.
  5. Should be installed on all computers.
  6. Scams through an email.
  7. You should always ____ your computer before walking away.

13 Clues: Scams through an email.Scams through a phone call.Scams through a text message.Enforce strong ____ on all systems.Should be installed on all computers.Principle of accessing only what you need.Malicious software that holds data hostage.____ all devices and software to keep them protected.____ any paper documents when they are no longer needed....

cyber security-crossword puzzle 2025-02-13

cyber security-crossword puzzle crossword puzzle
Across
  1. a flaw or weakness in a system that could be exploited
  2. keyword that refers to online world
  3. computer programs that can block detect and remove viruses and other malware
  4. a type of malware that denies user's access to a system or data until a sum of money is paid
  5. feeling of being secure, protected from adversaries
  6. an individual group organization or government that conducts or has the intent to conduct detrimental activities
Down
  1. Extra copies of computer files that can be used to restore the files
  2. unauthorized user who attempts to or gains access to an information system
  3. converting data into a form that can't be understood by unauthorized people
  4. mechanism for creating secure connection between computer device and computer network
  5. attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources
  6. a network security device designed to monitor, filter incoming and outgoing network traffic
  7. malicious software or malware, that spreads between computers and causes damage to data and software

13 Clues: keyword that refers to online worldfeeling of being secure, protected from adversariesa flaw or weakness in a system that could be exploitedExtra copies of computer files that can be used to restore the filesunauthorized user who attempts to or gains access to an information system...

Cybersecurity Crossword 2024-03-20

Cybersecurity Crossword crossword puzzle
Across
  1. Measures adopted to protect systems and data from cyber threats.
  2. A network-connected computer or device.
  3. A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
  4. The process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. A powerful tool used for penetration testing, security research, and IDS signature development.
  3. The process or action of verifying the identity of a user or process.
  4. A country in Europe known for its precision engineering and historical contributions to science and technology.

8 Clues: A network-connected computer or device.Measures adopted to protect systems and data from cyber threats.The process or action of verifying the identity of a user or process.A powerful tool used for penetration testing, security research, and IDS signature development....

Easy Cyber Security 2021-11-28

Easy Cyber Security crossword puzzle
Across
  1. the topic is
  2. not fishing but
  3. I should open every attachment I get
  4. Bad software that infects your computer is called ______
  5. the people who attack us are called ______
Down
  1. A ____ breech is when a criminal steals confidential information
  2. you can't use your computer until you pay because you have _______
  3. I should always use a ______ password
  4. you get an email from someone you don't know asking you to open an attachment it is a

9 Clues: the topic isnot fishing butI should open every attachment I getI should always use a ______ passwordthe people who attack us are called ______Bad software that infects your computer is called ______A ____ breech is when a criminal steals confidential informationyou can't use your computer until you pay because you have _______...

Hardware/Cyber Security 2020-10-13

Hardware/Cyber Security crossword puzzle
Across
  1. memory stored in a computer that lasts forever
  2. a scam email with a link aimed to steal things such as your IP address
  3. an AI used to swarm or abuse abilities of web pages, nowadays web pages have protection against these.
  4. short for malicious software
  5. a type of malware that is capable of copying itself and spreading to other devices
  6. temporary memory inside of a computer
Down
  1. holds and allows communication between many of the crucial electronic components of a system, such as the CPU and memory,
  2. the brain of the computer
  3. when content inside of your computer is stolen and they ask for money to get it back

9 Clues: the brain of the computershort for malicious softwaretemporary memory inside of a computermemory stored in a computer that lasts forevera scam email with a link aimed to steal things such as your IP addressa type of malware that is capable of copying itself and spreading to other devices...

Cyber Security Crossword 2023-07-24

Cyber Security Crossword crossword puzzle
Across
  1. ______ are damaging to the reputation of companies and expose their customers to identity theft
  2. ______ determines an authenticated person’s or service’s level of access. It defines which data they can access, and what they can do with it
  3. ______ refers to the accuracy and consistency of data and information. Ensuring data integrity means preventing unauthorized alterations or tampering of data
  4. ______ is a type of social engineering where an attacker sends a fraudulent message designed to convince you to provide sensitive information via a message or a fraudulent web site, gain access to your device by convincing you to click on a link or open an attachment that contains malware, and convince you to provide something of value to the attacker
  5. ______ refers to the principle of ensuring that authorized users have access to the information they need when they need it. This can be achieved through measures such as redundant systems, backups, and disaster
Down
  1. ______ is a type of software designed to damage or disrupt computer systems
  2. The principle of ______ involves protecting sensitive information from unauthorized access. This can be achieved through methods such as encryption or access controls
  3. ______ is a process verifying the identity of a person or service. It requests legitimate access credentials and basis for creating secure identity and access control principles
  4. ______ is vicious malware that locks users out of their devices until they pay a ransom

9 Clues: ______ is a type of software designed to damage or disrupt computer systems______ is vicious malware that locks users out of their devices until they pay a ransom______ are damaging to the reputation of companies and expose their customers to identity theft...

Cyber Security Awareness 2024-06-15

Cyber Security Awareness crossword puzzle
Across
  1. String of characters that allows access to a computer system
  2. Harmful software
  3. Program that spreads between computers and infects files
  4. Unauthorized access to computer systems
Down
  1. Secret word or phrase
  2. Weakness in a system
  3. Type of attack where services are disrupted
  4. Safeguarding of personal information
  5. Act of deceiving someone

9 Clues: Harmful softwareWeakness in a systemSecret word or phraseAct of deceiving someoneSafeguarding of personal informationUnauthorized access to computer systemsType of attack where services are disruptedProgram that spreads between computers and infects filesString of characters that allows access to a computer system

Information Security 2023-12-12

Information Security crossword puzzle
Across
  1. 57% of organizations see at least weekly phishing attempts
  2. The most common target of phishing attacks are ____
  3. The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
  4. 94% of malware is delivered by ____
  5. You should ____ over a link in an email to preview the actual address before clicking
Down
  1. Lock your ____ when you step away
  2. German American's Information Security Officer is
  3. ____ is one of the most common and dangerous forms of cyber crime
  4. Phishing is an attempt to obtain sensitive ____ with malicious intent
  5. Display names and email domains can be ____ hiding the true identity and appearing trustworthy
  6. Report spam/suspicious emails through the ____ button on the Outlook toolbar
  7. Our first line of defense against cybersecurity attacks and fraud is ___
  8. At German American, _____ is responsible for information security

13 Clues: Lock your ____ when you step away94% of malware is delivered by ____German American's Information Security Officer isThe most common target of phishing attacks are ____57% of organizations see at least weekly phishing attempts____ is one of the most common and dangerous forms of cyber crime...

Crossword Labs 2023-01-05

Crossword Labs crossword puzzle
Across
  1. An update in an operating system or application to fix bug & improve performance or security
  2. Emails sent to trick users to reveal their sensitive information.
  3. Phishing Techniques used to target CEO,CFO etc.
  4. Scrambling of text in order to ensure the security of data/ information
  5. Existence of weakness in a system or network
Down
  1. Socially or politically motivated hackers
  2. Sending bulk messages by abusing electronic messaging system
  3. Gaining access to a secured area by going behind an authorized person
  4. Technique of Hiding data behind a photo
  5. Hackers with main motive to gain financial profit by doing cyber crimes
  6. Unauthorized softwares installed on computer to gather sensitive information
  7. Software designed to help the user's computer to detect viruses & avoid them

12 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Sending bulk messages by abusing electronic messaging systemEmails sent to trick users to reveal their sensitive information....

What is Cyber Security: Vocabulary Review 2024-09-04

What is Cyber Security: Vocabulary Review crossword puzzle
Across
  1. the practice of isolating resources and controlling access to them through APIs or strict interfaces
  2. a design technique that separates the functionality of a program into independent, interchangeable components.
  3. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
  4. the practice of protecting data from unauthorized access, disclosure, or alteration
  5. the protection of data from unauthorized modification or deletion.
  6. a cybersecurity technique that protects processes from each other on an operating system.
  7. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
  8. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
  9. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
  10. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
  1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
  2. the ability to reliably access and use information in a timely manner.
  3. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
  4. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
  5. the practice of reducing unnecessary complexity and focusing on what's essential
  6. a way of looking at the world from the perspective of a hacker

16 Clues: a way of looking at the world from the perspective of a hackerthe protection of data from unauthorized modification or deletion.the ability to reliably access and use information in a timely manner.the practice of reducing unnecessary complexity and focusing on what's essential...

Security Crossword Puzzle - October 2021 2021-10-01

Security Crossword Puzzle - October 2021 crossword puzzle
Across
  1. This is a software vulnerability usually found in Web applications that allows online criminals to inject client-side script into pages that other users view
  2. This is a program used for security purposes which is able to simulate one or more network services to look like a vulnerability and act as a bait to the attacker
  3. You should not just check identity; you should also confirm
  4. Hackers take advantage from this type of attack that can lead to unauthorized code running or system crashes
Down
  1. In cyber security, intrusion refers to the act of getting around a system’s security mechanisms to gain unauthorized access.
  2. The process of stealing someone’s personal identification data and using it online in order to pose as that person
  3. The main goal of this process is to identify, analyze and present facts about a digital investigation. The conclusions of this can be used in fight against cyber-crime or for civil proceedings
  4. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  5. In cryptography, this attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing it correctly
  6. This can slow down your computer and watch everywhere you go on the internet

10 Clues: You should not just check identity; you should also confirmThis can slow down your computer and watch everywhere you go on the internetHackers take advantage from this type of attack that can lead to unauthorized code running or system crashes...

Tech crossword 2022-10-01

Tech crossword crossword puzzle
Across
  1. Most used Javascript backend runtime
  2. Leading public cloud provider
  3. Diffusion based image generation Tool by Google
  4. Modelling language used for Software Design
Down
  1. Most important resource in Machine Learning
  2. Wireless networking
  3. Popular crypto-currency used for smart-contracts
  4. Linux version used famously for cyber-security

8 Clues: Wireless networkingLeading public cloud providerMost used Javascript backend runtimeMost important resource in Machine LearningModelling language used for Software DesignLinux version used famously for cyber-securityDiffusion based image generation Tool by GooglePopular crypto-currency used for smart-contracts

Ty's crossword 2026-01-16

Ty's crossword crossword puzzle
Across
  1. main printed circut board
  2. Artifishile inteligent
  3. security making your password
  4. conponet of the computer that controls it
Down
  1. central possessing unit
  2. A person that tries to get you to do stuff
  3. A person that steals your computer information
  4. footprint something you want to follow you for the rest of your life
  5. A person or a computer trying to get your information
  6. it is controlled the computer

10 Clues: Artifishile inteligentcentral possessing unitmain printed circut boardit is controlled the computersecurity making your passwordconponet of the computer that controls itA person that tries to get you to do stuffA person that steals your computer informationA person or a computer trying to get your information...

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. a word or phrase to protect your device
  2. something stopping hackers get into your personal information
  3. sending fake emails
  4. an infection on your phone
Down
  1. looking at someone putting in their password
  2. stealing someone's personal information

6 Clues: sending fake emailsan infection on your phonea word or phrase to protect your devicestealing someone's personal informationlooking at someone putting in their passwordsomething stopping hackers get into your personal information

Cyber Security 2021-03-30

Cyber Security crossword puzzle
Across
  1. an algorithm for transforming original message to coded message
  2. is the process of verifying the identity of a person or device
Down
  1. is the method by which information is converted into secret code that hides the information's true meaning.
  2. it is the defense of digital information and IT assets against internal and external, malicious and accidental threats
  3. study of encryption principles
  4. an attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset.

6 Clues: study of encryption principlesis the process of verifying the identity of a person or devicean algorithm for transforming original message to coded messageis the method by which information is converted into secret code that hides the information's true meaning....

Cyber Security 2023-09-19

Cyber Security crossword puzzle
Across
  1. Software used to spy on people to get passwords or bank details.
  2. Software used to protect computers against viruses.
  3. App or game that looks legitimate but contains a virus or worm.
Down
  1. Type of hacker who hacks for selfish reasons.
  2. Type of hacker who hacks for the government.
  3. Person pretending to be someone else to steal data.

6 Clues: Type of hacker who hacks for the government.Type of hacker who hacks for selfish reasons.Person pretending to be someone else to steal data.Software used to protect computers against viruses.App or game that looks legitimate but contains a virus or worm.Software used to spy on people to get passwords or bank details.

Cyber Security 2024-03-25

Cyber Security crossword puzzle
Across
  1. Security systems designed to prevent unauthorized access to or from a private network.
  2. Networks of hijacked computer devices used to carry out various scams and cyber attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

6 Clues: Security systems designed to prevent unauthorized access to or from a private network.Networks of hijacked computer devices used to carry out various scams and cyber attacks.Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system....

CYBER SECURITY 2024-08-18

CYBER SECURITY crossword puzzle
Across
  1. virtual wall that filters incoming traffic
  2. the act of intruding
  3. aim to steal account credentials
  4. steal sensitive information
Down
  1. a malicious software
  2. set of programs that protect your software

6 Clues: a malicious softwarethe act of intrudingsteal sensitive informationaim to steal account credentialsvirtual wall that filters incoming trafficset of programs that protect your software

Cyber-Security 2023-01-16

Cyber-Security crossword puzzle
Across
  1. a person's personal information
  2. Securing Social media accounts
  3. protect computer from unwanted emails
Down
  1. piece of information stored on the internet when you browse online
  2. illegal and unauthorised access to someone's PC
  3. attempt to acquire personal info by posing as trustworthy authority

6 Clues: Securing Social media accountsa person's personal informationprotect computer from unwanted emailsillegal and unauthorised access to someone's PCpiece of information stored on the internet when you browse onlineattempt to acquire personal info by posing as trustworthy authority

Cyber Security 2025-10-21

Cyber Security crossword puzzle
Across
  1. Crime involving stealing someone's personal information.
  2. Software that is designed to damage or disrupt systems.
Down
  1. A scam where attackers trick users into giving personal information.
  2. A type of malware that pretends to be legitimate software.
  3. A type of malware that attaches itself to clean files.
  4. A self-replicating malware that spreads without user action.

6 Clues: A type of malware that attaches itself to clean files.Software that is designed to damage or disrupt systems.Crime involving stealing someone's personal information.A type of malware that pretends to be legitimate software.A self-replicating malware that spreads without user action....

CYBER BULLYING 2026-01-30

CYBER BULLYING crossword puzzle
Across
  1. yang biasanya di gunakan untuk cyber bullying
  2. benda yang sering di gunakan untuk cyber bullying
  3. nama lain dari cyber bullying
  4. termasuk perundungan lewat sosmed
  5. apalikasi yang sering di gunakan untuk cyber bullying
Down
  1. merupakan dampak korban cyber bullying
  2. bagaimana peran sekolah dalam menangani cyber bullying
  3. biasanya kata kata ini di pakai untuk mengancam
  4. bahasa indonesia cyber bullying
  5. cara untuk mencegah cyber bullying

10 Clues: nama lain dari cyber bullyingbahasa indonesia cyber bullyingtermasuk perundungan lewat sosmedcara untuk mencegah cyber bullyingmerupakan dampak korban cyber bullyingyang biasanya di gunakan untuk cyber bullyingbiasanya kata kata ini di pakai untuk mengancambenda yang sering di gunakan untuk cyber bullying...