cyber security Crossword Puzzles
FITE 2013-05-16
Across
- stores info. on internet servers
- central processing unit/speed of computer
- 1000 gigabytes
- cyber security
- two things that can be used together
- a document having a present format, used as a starting point
- the close up or preview of a template
- 1000 terabytes
- input
- output
- something you attach to your computer
- smallest unit of data
- internet connection
- printed circuit that is the foundation of a computer
- domain
- a port formed by IBM connecting a mouse or keyboard to a PC
- protection of anyones work
- computer screen
- search internet for specific info.
- programs given to a computer to do a direct operation
- internet and online world
Down
- arrangement of graphic matters
- slogan
- quoting a reference to an athourity
- specific, easier
- processing of powering up your computer
- cyber safety
- connects to the internet
- internet service/Comcast
- program that lets you interact with your computer
- random access memory
- search engine that checks all search engines
- a socket in a microcomputer that will accept a plug-in circuit board
- wired internet
- programs designed for a special need or purpose
- hardware connection
- provides data to other computers
- the way you behave online
- logo
- main storage media device that permanently stores all data on computer
- provides a variety of channels of data over a single communication medium
- series of instructions given to a computer to do a certain task
- 1000 petabytes
- a brief account of ones profession
- the wiring making up a computer system
- SSID
- 1000 kilobytes
47 Clues: logo • SSID • input • slogan • output • domain • cyber safety • 1000 gigabytes • cyber security • 1000 terabytes • wired internet • 1000 petabytes • 1000 kilobytes • computer screen • specific, easier • hardware connection • internet connection • random access memory • smallest unit of data • connects to the internet • internet service/Comcast • the way you behave online • internet and online world • ...
Reportable Information 2025-04-24
Across
- A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.
- __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
- A potential risk indicator for person living above his means
- An employee who hates his job to the point of aggression
- A security compromise, infraction, or violation
Down
- Security incidents are categorized as either a security infraction or a security ______
- _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
- The ability and opportunity to gain knowledge of classified information.
- Denies adversaries information about friendly capabilities, activities, limitations, and intentions that adversaries need to make competent operational decisions. (Acronym)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
10 Clues: A security compromise, infraction, or violation • An employee who hates his job to the point of aggression • A potential risk indicator for person living above his means • The ability and opportunity to gain knowledge of classified information. • Security incidents are categorized as either a security infraction or a security ______ • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- A security system that monitors and controls incoming and outgoing network traffic
- hygiene The routine practices and steps taken to maintain good digital security.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
- A malicious program disguised as legitimate software.
- breach An incident where sensitive information is accessed or disclosed without authorization.
- Malicious software designed to damage or gain unauthorized access to systems.
- Determines what an authenticated user is allowed to do
Down
- A type of malware that locks your data and demands payment to unlock it.
- A method of converting data into a secret code to prevent unauthorized access.
- The process of verifying the identity of a user or device
- A software update that fixes security vulnerabilities or bugs.
- Software designed to detect and remove malicious programs from your computer.
- Protecting data from being altered or tampered with
14 Clues: Protecting data from being altered or tampered with • A malicious program disguised as legitimate software. • Determines what an authenticated user is allowed to do • The process of verifying the identity of a user or device • A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • ...
Types of threats 2019-01-09
Across
- Collection of captured bot computers
- A destructive computer program that bores its way through a computer's files
- surfing atching an authorized user enter a security code on a keypad.
- data that ransome gets paid to remove
- When someone deceives by pretending to be someone else
- An attack that sends an email or displays a Web announcement that falsely claims
- Criminals make a promise of goods in return for details
Down
- a cyber-security attacker to take control
- n attacker entering a secured building by following an authorized employee
- Advertising-supported software
- Program that hides in a computer
- A type of Malware that locates
- A piece of code that is capable of copying itself
- prevents the program from running as expected
- pro quo Criminals promise a service in exchange for details
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
tast 2023-02-03
The President's Cabinet 2023-10-04
Across
- This department oversees laws regarding the workplace
- the department responsible for the country's armed services and related military matters.
- This department ensures that we have the safest, most efficient vehicles and roadways.
- The CIA is overseen by this cabinet director
- This department is responsible for border security, cyber security, counterterrorism and our immigration laws.
- Vice President of the U.S.
Down
- the number of cabinet departments today
- the IRS (Internal Revenue Service) is part of this department
- This department oversees education in the U.S.
- This department oversees the National Park Service
- Who appoints the cabinet members?
- this department carries out policies ranging from nuclear power to fossil fuels to alternative energy sources.
- attorney general of the U.S.
- 4th in line to take over the Presidency
14 Clues: Vice President of the U.S. • attorney general of the U.S. • Who appoints the cabinet members? • the number of cabinet departments today • 4th in line to take over the Presidency • The CIA is overseen by this cabinet director • This department oversees education in the U.S. • This department oversees the National Park Service • ...
Cyber Security Cross Word RForseth2 2023-01-27
Across
- Microsoft 365 App type
- Address that takes you to somewhere else
- What your device runs on
- Commercial Business Domain
- Most popular web browser 2022
- First Page on Browser
- Connects to networks together
- Connection to internet through wires
- Network Security system
- Page posted on the internet
- Microsoft 365 Email App
- Takes digital formats to paper
Down
- Holding site hostage
- Identifies your device on the network
- Apps downloaded onto computer
- Connection using multiple routers
- File Transfer Protocol
- Keeps your device running
- Converting data into code for privacy
- The access to websites
20 Clues: Holding site hostage • First Page on Browser • Microsoft 365 App type • File Transfer Protocol • The access to websites • Network Security system • Microsoft 365 Email App • What your device runs on • Keeps your device running • Commercial Business Domain • Page posted on the internet • Apps downloaded onto computer • Most popular web browser 2022 • Connects to networks together • ...
Cyber Security Keywords (for revision) 2023-11-16
Across
- The most basic way of protecting your data.
- An old method of encoding data. Very easy to break.
- Describes fooling people into giving away personal information.
- A way of protecting an account by requiring the user to enter a code sent to an email address or mobile phone.
- Using online services to send nasty messages to people.
- Turning data into an unreadable form, often using a key, so others can't understand it.
- Word to describe using manipulation and other skills to fool people into believing you're someone you say you are.
- Describes unwanted emails, often sent to many people.
- Type of website that pretends to be from another company.
- WERXEGPEYW has been encoded using Caesar Cipher by moving between 2 and 5 places.
- A type of hacker who commits illegal activity.
- Sending so many requests to a server, it stops other people accessing it.
- Software used to restrict access to a network.
Down
- Collecting personal data in order to pretend to be someone else.
- A type of hacker who hacks illegally but for greater good.
- Informal term to describe something that is trying to steal from you.
- A type of hacker who legally hacks.
- Following someone online for a period of time, often posting messages in order to upset them.
- Someone who gains access to a network by using a range of tools and weaknesses.
- Type of software that can be used to avoid viruses.
- Describes being on the look out for cyber security risks.
- Someone who spends so long playing games it affects their well-being might be suffering from this.
- Software used to cause damage or to allow a hacker to gain access to a system.
- Type of software that can be used to avoid malware.
24 Clues: A type of hacker who legally hacks. • The most basic way of protecting your data. • A type of hacker who commits illegal activity. • Software used to restrict access to a network. • Type of software that can be used to avoid viruses. • Type of software that can be used to avoid malware. • An old method of encoding data. Very easy to break. • ...
Jasper's CJR Cyber Security Terms 2024-08-02
Across
- ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
- ___ is the name commonly given to unsolicited emails.
- ____ is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm.
- ____ is a general term for any type of intrusive computer software with malicious intent against the user.
- ___ ___ is the deliberate theft of sensitive data by nefarious actors.
- Bring Your Own Device (abbreviation)
- A ___ is a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.
- ____ is malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus
- _____ relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked.
- Breach A __ ___ is the event of a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- _____ is the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.
- A ___ is a program that automates actions on behalf of an agent for some other program or person and is used to carry out routine tasks.
- A ____ is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- ____ is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
Down
- _____ is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- A ____ is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal.
- ____ is software that is secretly installed on a user’s device to gather sensitive data.
- _____ is the process of verifying the identity of a user or piece of information and the veracity of the information provided.
- Force Attack This is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- The __ __ is encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- _____ is the process of decoding cipher text to plain text so that it is readable by humans. It is the reverse of encryption
- A ___ is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- ___ solutions integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
- ____ ____ are features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children.
24 Clues: Bring Your Own Device (abbreviation) • ___ is the name commonly given to unsolicited emails. • ___ ___ is the deliberate theft of sensitive data by nefarious actors. • ____ is software that is secretly installed on a user’s device to gather sensitive data. • ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience. • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
BrainRiddle 2025-02-05
Across
- A cryptographic function that converts data into a fixed-size string.
- A vulnerability in software that is exploited before the developer fixes it.
- A type of malware that secretly gathers information from a user’s device.
- The process of securing data by converting it into an unreadable format.
- A cyber-attack where attackers trick users into revealing sensitive information.
- A type of malware that disguises itself as legitimate software.
- A hidden part of the internet where anonymous activities take place.
- A network of infected computers controlled remotely by hackers.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- A type of software designed to harm or exploit devices and networks.
- A hacking method that tries multiple password combinations to gain access.
- The act of manipulating people into revealing confidential
- A cyber attack that manipulates databases through malicious SQL queries.
- Malicious software that locks files and demands payment to restore access.
- A set of tools that allow hackers to maintain access to a system unnoticed.
15 Clues: The act of manipulating people into revealing confidential • A type of malware that disguises itself as legitimate software. • A network of infected computers controlled remotely by hackers. • A type of software designed to harm or exploit devices and networks. • A hidden part of the internet where anonymous activities take place. • ...
The Great Spring Brain Bloom 2026-03-06
Across
- Device you restart to install updates
- Email service used in Google Workspace
- Google cloud storage used by the City
- Google's AI assistant tool
- Insects that help flowers grow by moving pollen
- Program used to create presentations
Down
- What flowers do in spring
- Common cyber attack where fake emails try to trick you
- Season when flowers bloom and we refresh workflows
- Google's spreadsheet tool
- Bright yellow flower often seen in spring
- Month when spring begins in the U.S.
- Security practice: Think before you ___
13 Clues: What flowers do in spring • Google's spreadsheet tool • Google's AI assistant tool • Month when spring begins in the U.S. • Program used to create presentations • Device you restart to install updates • Google cloud storage used by the City • Email service used in Google Workspace • Security practice: Think before you ___ • Bright yellow flower often seen in spring • ...
JB OX 2025-08-03
7 Clues: $45 replacement • Qualified tradesmen • Upgrade at any time • 6TB for the whole family • Food spoilage reimbursement • 12, 24,36 month payment plans • Cyber security specialists with 5 years of experience
IoT and smart devices 2024-11-13
Across
- assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
- devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
- home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
- The use of technology to perform tasks without human intervention.
- technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
- The right to control personal information and protect it from unauthorized access.
Down
- of Things A network of devices that are connected and can exchange data over the internet.
- Devices that detect and measure physical properties like temperature, motion, or pressure.
- measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
- breach A security incident in which sensitive information is accessed or disclosed without authorization.
- A software application that allows users to interact with smart devices or services on their smartphones or tablets.
11 Clues: The use of technology to perform tasks without human intervention. • The right to control personal information and protect it from unauthorized access. • Devices that detect and measure physical properties like temperature, motion, or pressure. • of Things A network of devices that are connected and can exchange data over the internet. • ...
Crossword Puzzle no 0123 2023-01-03
Across
- An update in an operating system or application to fix bud & improve performance or security
- Emails sent to trick users to reveal their sensitive information.
- Phishing Techniques used to target CEO,CFO etc.
- Scrambling of text in order to ensure the security of data/ information
- Existence of weakness in a system or network
Down
- Socially or politically motivated hackers
- Sending bulk messages by abusing electronic messaging system
- Just going behind an authorized person into a secured area
- Technique of Hiding data behind a photo
- Hackers with main motive to gain financial profit by doing cyber crimes
- Unauthorized softwares installed on computer to gather sensitive information
- Software designed to help the user's computer detect viruses & avoid them
12 Clues: Technique of Hiding data behind a photo • Socially or politically motivated hackers • Existence of weakness in a system or network • Phishing Techniques used to target CEO,CFO etc. • Just going behind an authorized person into a secured area • Sending bulk messages by abusing electronic messaging system • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Never write these down on a sticky note or a whiteboard.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- Lock your _____ and your mobile phone anytime they are not in use.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
- _____ is when an unauthorized person follows you into a secure location.
- Report all possible cyber _____ to the IT Service Desk.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- An unauthorized person that tries to gain access to your computer.
- Stay _____ and be on the lookout for security threats or incidents.
- Always keep a _____ workspace that is free of confidential information.
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- hygiene The routine practices and steps taken to maintain good digital security.
- Software designed to detect and remove malicious programs from your computer.
- Malicious software designed to damage or gain unauthorized access to systems.
- breach An incident where sensitive information is accessed or disclosed without autorization.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
Down
- A type of malware that locks your data and demands payment to unlock it.
- Engineering Manipulating people into giving up confidential information.
- A security system that monitors and controls incoming and outgoing network traffic
- A method of converting data into a secret code to prevent unauthorized access.
- A software update that fixes security vulnerabilities or bugs.
11 Clues: A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • Engineering Manipulating people into giving up confidential information. • Software designed to detect and remove malicious programs from your computer. • ...
Computer Virus 2024-09-09
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
RU ITEC411 2025-03-19
Across
- – Deception to gain money or access data illegally.
- – Protecting computers, networks, and data from attacks.
- – Tricking people into visiting fake websites to steal data.
- – Phishing through fake phone calls pretending to be legit.
- Overloading a website or server so it crashes.
- – A super sophisticated cyber weapon that targeted Iran’s nuclear program.
- – A U.S. law that expanded government surveillance after 9/11.
- – Fake systems set up to bait and track hackers.
- – Investigating cybercrimes and tracking down hackers.
- – legal power a country has over online activities.
Down
- – Hacking done for political or social causes.
- – An entity blocking or controlling what people can see online.
- – Any digital assault meant to steal data or cause harm.
- – laws protecting individuals from false information that damages the victim’s reputation.
- – Content that's restricted online for being offensive.
- – Breaking into computer systems, whether for good or bad.
- – Using fingerprints, and other physical traits for security.
- – Tricking people into giving up personal info through fake emails.
- – Phishing but through text messages instead of email.
- – Personal data that cybercriminals want to steal.
20 Clues: – Hacking done for political or social causes. • Overloading a website or server so it crashes. • – Fake systems set up to bait and track hackers. • – Personal data that cybercriminals want to steal. • – Deception to gain money or access data illegally. • – legal power a country has over online activities. • – Phishing but through text messages instead of email. • ...
Cybersecurity Crossword 2025-09-02
Across
- – A type of malware that replicates itself by infecting other programs.
- – A secure tunnel for internet traffic, stands for Virtual Private Network.
- – A network security system that monitors and controls traffic.
- – A scam using fake emails or messages to trick people into revealing information.
- Factor – Authentication requiring more than one form of verification.
- – A hidden method of bypassing normal authentication.
- – Malware that locks files and demands payment.
- – Software that detects and removes malicious programs.
- Attack – An attempt to damage, steal, or disrupt digital systems.
- – The practice of protecting systems, networks, and programs from attacks.
- – The process of converting data into a secure code.
- – A clickable reference to another webpage or document.
Down
- – Manipulating people into revealing confidential information. _____ engineering.
- – A secret string of characters used for authentication.
- – Software designed to harm or exploit systems.
- – A well-known security awareness training platform.
- Horse – Malicious software disguised as legitimate software.
- – Phishing conducted through SMS text messages.
- – Technology simulating human intelligence, used in modern cybersecurity.
- – The process of verifying identity before granting access.
20 Clues: – Software designed to harm or exploit systems. • – Phishing conducted through SMS text messages. • – Malware that locks files and demands payment. • – A well-known security awareness training platform. • – The process of converting data into a secure code. • – A hidden method of bypassing normal authentication. • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Stay _____ and be on the lookout for security threats or incidents.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- Never write these down on a sticky note or a whiteboard.
Down
- An unauthorized person that tries to gain access to your computer.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- _____ is when an unauthorized person follows you into a secure location.
- Lock your _____ and your mobile phone anytime they are not in use.
- Report all possible cyber _____ to the IT Service Desk.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Always keep a _____ workspace that is free of confidential information.
- Alway install updates to your computer or mobile phone. Don't click "Remind me later."
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
CYBURR SAFETEEE 2014-04-06
Across
- WHEN YOU GET NAKED ONLINE
- CYBER B______
- PROBLEMS AND THE STUFF THAT BLOCKS YOU IN LIFE
- BEING ONLINE WITH FRIENDS
- THE SOCIAL STATUS OF WHAT PEOPLE HAVE
- PEOPLE WHO ASSIST YOU IN BACK TIMES
- A DEFENSE AGAINST SOMETHING
- THE GROUP OF PEOPLE WHO GOVERN A COUNTRY
- YOUR OWN STUFF
- _____SAFETY
- SOMETHING THAT IS NOT LEGAL
Down
- PEOPLE OF A PLACE OR COUNTRY
- ADJECTIVE OF WHAT YOU CAN BE ONLINE
- THE ONLY PLACE WHERE IT IS BOTH A COUNTRY AND A CONTINENT
- THE NAME WHAT IS GIVEN TO PEOPLE WHO INTENTIONALLY CAUSE DISTRESS
- A VERY SMART MACHINE
- DATA
- THEFT WHEN PEOPLE STEAL YOUR IDENTITY TO USE YOUR MONEY TO PURCHASE THINGS
- PEOPLE WHO WILL GET INVOLVED IN CYBER BULLYING
- A PERSONAL WEBSTE WHERE YOU CAN SHARE YOUR FEELINGS
- THE WEB
- WHEN YOU ARE NOT ONLINE
- STUFF
- WHEN YOU ARE NOT OFFLINE
- CYBER _______
25 Clues: DATA • STUFF • THE WEB • _____SAFETY • CYBER B______ • CYBER _______ • YOUR OWN STUFF • A VERY SMART MACHINE • WHEN YOU ARE NOT ONLINE • WHEN YOU ARE NOT OFFLINE • WHEN YOU GET NAKED ONLINE • BEING ONLINE WITH FRIENDS • A DEFENSE AGAINST SOMETHING • SOMETHING THAT IS NOT LEGAL • PEOPLE OF A PLACE OR COUNTRY • ADJECTIVE OF WHAT YOU CAN BE ONLINE • PEOPLE WHO ASSIST YOU IN BACK TIMES • ...
CYBER 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- ARPAnet was used by __
- __ disagrees with cyber libertarians.
- Process of converting information into a digital format
Down
- Components of digital economy.
- Refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools.
- Act legal framework for regulation of internet in India
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Allow multiple computers to be hooked up to one cable modem allowing several devices to be directly connected through a single modem.
- Author of declaration of Independence of cyber rights
10 Clues: ARPAnet was used by __ • Components of digital economy. • __ disagrees with cyber libertarians. • Author of declaration of Independence of cyber rights • Process of converting information into a digital format • Act legal framework for regulation of internet in India • ...
8/13/2024 2024-08-13
6 Clues: EDR • Measure of severity • Pentest certification • Cyber Security conference • Low level coding language • Program that runs as a background proccess
Computer Virus 2024-07-01
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
27-54 Vocab 2023-02-22
Across
- Recognizes how a person signs
- Good when determining a match
- stores handwriting samples in a database
- Everyone's handwriting is unique
- Maximum prison term for forgery
- Handwriting is difficult to forge
- Many tactics to complicate currency
- Altering an aspect of a document
- Directly altering a check
- checks for the authenticity of documents
- written marks whose source is uncertain
- Checks, Employment records, legal agreements
- Specialty practice area of accounting
- Checks, Certificates, Wills
- Finding security flaws
Down
- Computer system used to mimic targets of cyber attacks
- When false documents are used for the purpose of deception
- The agency that investigates forgery cases
- Dollar amount that is illegitimate checks every day
- covering original writing to make it unreadable
- Many tactics to use to prevent forgery
- Forgery for material gain
- first case where handwriting was used
- currency, food vouchers
- Year us court of appeals validated handwriting
- Height and width of the letters
- Examination and comparison of questioned documents
27 Clues: Finding security flaws • currency, food vouchers • Forgery for material gain • Directly altering a check • Checks, Certificates, Wills • Recognizes how a person signs • Good when determining a match • Maximum prison term for forgery • Height and width of the letters • Everyone's handwriting is unique • Altering an aspect of a document • Handwriting is difficult to forge • ...
9-1-1 Management Authority 2025-02-19
Across
- Title for 988 calltakers
- A type of clinic utilized by 988
- 911 Management Authority IT Coordinator
- State Training Coordinator
- Crisis specialist goal for someone in crisis
- 911 Management Authority Cyber Security Specialist
- Company used to handle 988 calls in Oklahoma
- State 911 Coordinator
- Utilizing 988 can help reduce the burden to ______
Down
- Term often used for 911 Centers
- Team that can be sent to someone in crisis
- 911 Management Authority Grants Officer
- Organization best known for writing standards for 911
- 911 Management Authority Programs Coordinator
- State 911/988 Liaison
- Name of State's training platform
- Resource for improving technology in PSAP
- 988 has access to many of these
18 Clues: State 911/988 Liaison • State 911 Coordinator • Title for 988 calltakers • State Training Coordinator • Term often used for 911 Centers • 988 has access to many of these • A type of clinic utilized by 988 • Name of State's training platform • 911 Management Authority Grants Officer • 911 Management Authority IT Coordinator • Resource for improving technology in PSAP • ...
Hard Level 2021-09-11
Across
- A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.
- Strongest wireless security.
- ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
Down
- ________ is an act that violates cyber-security.
- existence of weakness in a system or network is called _______.
- Least strong security encryption standard.
6 Clues: Strongest wireless security. • Least strong security encryption standard. • ________ is an act that violates cyber-security. • existence of weakness in a system or network is called _______. • A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing. • ...
AC3 2021-01-02
Across
- 2020, we worked from home due to _ 19
- Ways of being, B_ it
- Ways of being, O_ it
- AC3 is on which level
- _ Security
- Internal home page
- AC3 CEO
- Family Christmas party, Centennial _
- _ Crawford
- Previous AC3 company
- Nearest train station
- Recruitment team, _ Management
- Current location, _ St
- Previous location near Redfern
- Director of Sales
- CEO’s family comes from ?
- Wireless internet
- Ways of being, B_ it
Down
- First point of customer contact
- Previous AC3 company at Margaret St
- CEO’s Executive Assistant
- Office Manager
- _ Couzi
- Make a copy of data
- _ Georgescu
- _ Desk
- Head of Product & Tech
- _ Saad
- _ Seymour
- Head of Marketing
- Head of Corporate Services
- Ways of being, E_ it
- _ & Culture
33 Clues: _ Desk • _ Saad • _ Couzi • AC3 CEO • _ Seymour • _ Security • _ Crawford • _ Georgescu • _ & Culture • Office Manager • Head of Marketing • Director of Sales • Wireless internet • Internal home page • Make a copy of data • Ways of being, B_ it • Ways of being, O_ it • Previous AC3 company • Ways of being, E_ it • Ways of being, B_ it • AC3 is on which level • Nearest train station • Head of Product & Tech • ...
Computer English Course 2024-11-26
Across
- Embedded electronic circuit of computers
- The connection between entities
- Your major
- A portable computer
- The technology of deep learning
- Browse it!
- Remote virtual machines
- The opposite of output
- The opposite of input
- Changing for better
- You use it every day
- Software application
- Hosting service
- Where you store information
- Connecting the computers
Down
- The interface exposed to programmers
- information
- The code!
- cellphone
- The brain of the computer
- Python and Java
- The procedure and logic behind an application
- The I in AI
- A portable device, bigger than a mobile phone
- What dances with Tiktok?
- Your major
- What is VR?
- graphical interface
- The network used by everyone
- safety for the cyber world
30 Clues: The code! • cellphone • Your major • Browse it! • Your major • information • The I in AI • What is VR? • Python and Java • Hosting service • A portable computer • Changing for better • graphical interface • You use it every day • Software application • The opposite of input • The opposite of output • Remote virtual machines • What dances with Tiktok? • Connecting the computers • The brain of the computer • ...
Nationwide 2021-01-21
Across
- relevant now
- tax free
- We have over 15 Million of them
- means of payment
- data,knowledge
- The renters dream
- Preparing for the worst
- To move around freely
- card Payment method
- Give for temporary use
- Items or things purchased or applied for
- Business exchange
Down
- in cyber space
- Will give you access to private information
- Where Dorothy longs to be
- school,university
- beneficial for me and you
- Given as a percentage
- Financial security achieved over time
- Who we serve?
- Can be High or low risk
- Suffer a loss
- Something to plan for
- Style of clock
- Something worth getting in to
- To bend or stretch
- Can be earnt
27 Clues: tax free • relevant now • Can be earnt • Who we serve? • Suffer a loss • in cyber space • data,knowledge • Style of clock • means of payment • school,university • The renters dream • Business exchange • To bend or stretch • card Payment method • Given as a percentage • Something to plan for • To move around freely • Give for temporary use • Can be High or low risk • Preparing for the worst • ...
Yep! That happened. 2020-10-14
Across
- One of the first ISPs in 1992
- Ransomware that got Greenville City and Baltimore City
- Windows application used to wreak havoc on AOL
- A ransomware cyber attack unprecedented in scale
- Network outage from an “external intrusion"
- The red corporation that was breached due to an HVAC vendor
- Hi.COM VMS sender
- Founded by Julian Assange
- 1989 AIDS Trojan file
Down
- Enigma’s nemesis
- Email love letter
- CERT creator to address network security
- AKA Downup AKA Downadup AKA Kido
- NSA’s developed exploit
- Major consumer credit reporting agency breach
- His perfect pitch opened the door for phreaking
- The social networking site attacked in 2013
- Hacktivist group formed in 2003
- The Morris worm’s landing location
- Worm targeting a specific SCADA system
20 Clues: Enigma’s nemesis • Email love letter • Hi.COM VMS sender • 1989 AIDS Trojan file • NSA’s developed exploit • Founded by Julian Assange • One of the first ISPs in 1992 • Hacktivist group formed in 2003 • AKA Downup AKA Downadup AKA Kido • The Morris worm’s landing location • Worm targeting a specific SCADA system • CERT creator to address network security • ...
training presentation 2023-10-03
Across
- HOW DID ADT INITIALLY MONITOR THEIR CUSTOMERS SERVICES?
- OPERATIONS SUPPORT GROUP
- CUSTOMER MONITORING CENTER
- GENERAL CARE
- ADT IS THE LARGEST PROVIDER OF _________ HOMES
- IN 2017, ADT STARTED INSTALLING ______ UNITS
- ON APRIL 2, 2016, APOLLO GLOBAL MERGES ADT WITH WHO_____?
- CYBER _____ACTIVELY MONITORING 24/7, 365 DAYS
- IT WAS INVENTED IN THE LATE 1800'S TO INCREASE COMMUNICATION
- CREATING CUSTOMER FOR LIFE IS ADT'S ______ STATEMENT
- LOCAL OFFICE
Down
- WHO IS CEO?
- ON MAY 2, 2016 ADT BECOME A PRIVATE COMPANY HEADQUARTERED IN _____?
- OVER 149 YEARS OF ______?
- AMERICAN DISTRICT TELEGRAPH
- HOW DO WE RECEIVE CALLS?
- TECH SUPPORT
- ADT WAS ____ IN 1874?
- TO EARN THE LIFELONG TRUST OF CUSTOMERS IS CALLED WHAT?
- ACCOUNT MANAGEMENT
20 Clues: WHO IS CEO? • TECH SUPPORT • GENERAL CARE • LOCAL OFFICE • ACCOUNT MANAGEMENT • ADT WAS ____ IN 1874? • OPERATIONS SUPPORT GROUP • HOW DO WE RECEIVE CALLS? • OVER 149 YEARS OF ______? • CUSTOMER MONITORING CENTER • AMERICAN DISTRICT TELEGRAPH • IN 2017, ADT STARTED INSTALLING ______ UNITS • CYBER _____ACTIVELY MONITORING 24/7, 365 DAYS • ADT IS THE LARGEST PROVIDER OF _________ HOMES • ...
tts informatika_cintavania_8_xf 2025-04-22
Across
- mencari lokasi di peta
- mencari terjemahan
- mengembangkan dan memelihara situs web
- konten yang merusak reputasi
- proses membuat konten digital
- yang melindungi sistem komputer dari serangan cyber
- undang undang yang mengatur HAKI di Indonesia
- badan yang mengatur HAKI
- proses memeriksa konten sebelum di publikasikan
- simbol pengganti karakter
- singkatan dari hak kekayaan intelektual
- mencari gambar serupa
- konten digital tentang budaya
- mengembangkan perangkat lunak
Down
- konten yang dapat memicu konflik
- tujuan dari HAKI
- proses mengunggah ke medsos
- mencari file dengan format tertentu
- tindakan memverifikasi kebenaran konten
- medsos yang bisa menyebar video/postingan budaya
- konten yang sangat populer
- informasi palsu adalah
- profesi yang menganalisis data
- tindakan ilegal yang melanggar HAKI
- merancang antarmuka pengguna
25 Clues: tujuan dari HAKI • mencari terjemahan • mencari gambar serupa • mencari lokasi di peta • informasi palsu adalah • badan yang mengatur HAKI • simbol pengganti karakter • konten yang sangat populer • proses mengunggah ke medsos • konten yang merusak reputasi • merancang antarmuka pengguna • proses membuat konten digital • konten digital tentang budaya • mengembangkan perangkat lunak • ...
TUGAS-JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Manfaat jaringan komputer berguna untuk komunikasi lebih
- Device komputer pengguna yang ada di sebuah gedung atau workgroup dapat saling berkoneksi dengan jaringan LAN
- Jaringan yang mencakup area kecil
- Salah satu fitur konfigurasi keamanan jaringan
- protokol komunikasi untuk segala jenis
- Salah satu topologi yang mirip bintang
Down
- Fungsi cyber security
- jaringan
- Tata kelola data merupakan sebuah
- INTERCHANGE Nama lain pertukaran data
10 Clues: jaringan • Fungsi cyber security • Jaringan yang mencakup area kecil • Tata kelola data merupakan sebuah • INTERCHANGE Nama lain pertukaran data • protokol komunikasi untuk segala jenis • Salah satu topologi yang mirip bintang • Salah satu fitur konfigurasi keamanan jaringan • Manfaat jaringan komputer berguna untuk komunikasi lebih • ...
Unit 5 - The internet and its uses 2022-05-25
Across
- a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
- small text file that is used to store personal data, by a web browser.
- the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
- a type of digital currency that uses encryption procedures.
- a network component where the web pages for a website are stored.
- a very large global network that allows users to access the world wide web.
- the physical structure, such as all the components and cables, that are used to connect devices.
- a type of cyber threat that involves sending a user a fake email that is designed to look genuine.
Down
- a person that carries out an illegal or immoral action.
- a method of securing data for storage or transmission that scrambles it and makes it meaningless.
- a type of password that uses a person's biological data, such as their fingerprint.
- a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
- a dormant/sleeping bot.
- a collection of web pages, normally about a related topic or purpose.
- a type of cookie that is stored by the web browser until it is deleted by the user or because it has expired.
15 Clues: a dormant/sleeping bot. • a person that carries out an illegal or immoral action. • a type of digital currency that uses encryption procedures. • a network component where the web pages for a website are stored. • a collection of web pages, normally about a related topic or purpose. • small text file that is used to store personal data, by a web browser. • ...
CYBER AWARENESS 2023-01-27
Across
- wide area network
- type of phishing attack that targets specific individuals or organizations typically through malicious emails
- networking hardware that connects devices on a computer network by using packet switching
- type of cyber-attack
- designed to harm or exploit a computer system
- A number (0-9) and/or symbol (such as !, #, or %)
- metropolitan area network
- is a software or program that generates various ads from different websites
- type of malware
- is a node that broadcasts data to every computer or Ethernet-based device connected to it
- safeguarding personal data from unauthorized access, use, or disclosure
- an essential component for any Wi-Fi network
Down
- the process of converting information or data into a code, especially to prevent unauthorized access
- type of malware
- virtual private network
- a phishing cyber-attack targeting CEOs
- is an identity and access management security method that requires two forms of identification to access resources and data
- can be used to identify an individual, such as name, address, phone number, email address, and financial information
- local area network
- type of malware
- involves flooding a website or network with traffic to make it unavailable to users
- networks of hijacked computer devices used to carry out various scams and cyberattacks
- of software that is designed to replicate itself and spread from one computer to another
23 Clues: type of malware • type of malware • type of malware • wide area network • local area network • type of cyber-attack • virtual private network • metropolitan area network • a phishing cyber-attack targeting CEOs • an essential component for any Wi-Fi network • designed to harm or exploit a computer system • A number (0-9) and/or symbol (such as !, #, or %) • ...
TTS Jaringan Komputer dan Internet 2024-01-11
Across
- melindungi data termasuk?
- lapisan ke empat
- salah satu komponen jaringan komputer
- salah satu jenis cyber security
Down
- kata lain dari tata kelola data
- berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
- konfigurasi keamanan jaringan
- salah satu mekanisme pertukaran data
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
- jaringan area lokal
10 Clues: lapisan ke empat • jaringan area lokal • melindungi data termasuk? • konfigurasi keamanan jaringan • kata lain dari tata kelola data • salah satu jenis cyber security • salah satu mekanisme pertukaran data • salah satu komponen jaringan komputer • berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna • ...
TTS Jaringan Komputer dan Internet 2024-01-11
Across
- melindungi data termasuk?
- lapisan ke empat
- salah satu komponen jaringan komputer
- salah satu jenis cyber security
Down
- kata lain dari tata kelola data
- berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
- konfigurasi keamanan jaringan
- salah satu mekanisme pertukaran data
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
- jaringan area lokal
10 Clues: lapisan ke empat • jaringan area lokal • melindungi data termasuk? • konfigurasi keamanan jaringan • kata lain dari tata kelola data • salah satu jenis cyber security • salah satu mekanisme pertukaran data • salah satu komponen jaringan komputer • berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna • ...
Cyber Bullying! 2020-08-29
Across
- Some victims of cyber bullying may have increased anxiety or .....
- Cyber bullying is intended aggression through.... platforms
- People who are bullied are called ......
- It is important for Victims to know that they are never .....
- Some people who get cyber bullied can become depressed and .....
- We need to ....children and keep them safe on the internet
Down
- Some victims of cyber bullying may have feelings of .....
- Parents need to be able to ..... the effects of cyber bullying
- People who are cyber bullied feel like there is no ....
- Victims of cyber bullying can contact the .... for help
- Parents should teach their children how to .... people on social media and set their privacy
- Sometimes children who are cyber bullied ..... from school or even their favourite activities.
12 Clues: People who are bullied are called ...... • People who are cyber bullied feel like there is no .... • Victims of cyber bullying can contact the .... for help • Some victims of cyber bullying may have feelings of ..... • We need to ....children and keep them safe on the internet • Cyber bullying is intended aggression through.... platforms • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
8/13/2024 2024-08-13
6 Clues: EDR • Measure of severity • Pentest certification • Cyber Security conference • Low level coding language • Program that runs as a background proccess
Nursing and Midwifery Digital Health Framework 2025-04-02
Across
- the framework supports the develop —— Skills for the healthcare workforce
- security The practice of safeguard digital patient information against cyber threats
- the use of technology to support —— Decision-making is a key component of digital health
- the ability to understand —-- In digital health systems is essential
Down
- a type of digital tool that allows remote patients monitoring and communication
- Nurses and midwives must ensure ——- When handling digital health records
- A critical skill in the framework, the ability to analyse - To support patient care
- nurses and midwives use —— Systems to document and access patients records
- Digital health tools improve —-- By reducing errors and improving workflows
- the secure exchange of patients ___ is critical in digital health
10 Clues: the secure exchange of patients ___ is critical in digital health • the ability to understand —-- In digital health systems is essential • Nurses and midwives must ensure ——- When handling digital health records • the framework supports the develop —— Skills for the healthcare workforce • ...
TTUTC Cyber Security Awareness Month 2023-10-05
Across
- Measures taken to protect personal information from unauthorized access (two words).
- A branch of computer science that aims to create machines capable of intelligent behavior (two words).
- An individual or group who uses their skills to gain unauthorized access to computer systems for various purposes.
- A type of attack that tricks individuals into making decisions or divulging confidential information (two words).
- A program that appears harmless but is designed to perform malicious actions (two words).
Down
- An authentication method that uses a combination of something you know, something you have, and something you are (Abbreviation).
- When a hacker bypasses physical access controls by following an authorized person inside.
- An attack that uses a thumb drive to install malware on your computer. (two words).
- Information security is our shared ______
- The ethical concerns and considerations surrounding the use of AI in various applications (two words).
- A technique where attackers trick individuals into revealing sensitive information.
- Policy A term in a policy that emphasizes keeping the workspace free of sensitive information when not in use (two words).
- Malicious software designed to harm or exploit computer systems.
- Over-the-phone-based social engineering.
- Incidents where sensitive information is accessed without authorization (two words).
- The process of encoding information to make it unreadable without the proper decryption key.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet
- A set of characters used to authenticate and access a system.
- A type of malware that encrypts files and demands a ransom for their release.
19 Clues: Over-the-phone-based social engineering. • Information security is our shared ______ • A set of characters used to authenticate and access a system. • Malicious software designed to harm or exploit computer systems. • A type of malware that encrypts files and demands a ransom for their release. • ...
Cyber Security Crossword Puzzle 2021-08-25
Across
- An act that violates the laws of one or more countries
- concealing the true source of electronic information
- a crime to access a protected computer without authorization.
- bullying that takes place on the internet
- a code of polite, thoughtful behaviors to follow while on the network.
Down
- an emotional often profane response to an action or statement in a chatroom
- Law which you have to get permission from the owner to make non-archival copies
- Philosophic study of ethics pertaining to computers
- the conditions under which you can use that is copyrighted by someone else without getting permission.
- the act of stealing valuable property by copying software
- The concept that's its a persons idea, writing and constructions without it being in physical sense
- the practice of attacking and robbing ships at sea
- A set of moral principals or values
13 Clues: A set of moral principals or values • bullying that takes place on the internet • the practice of attacking and robbing ships at sea • Philosophic study of ethics pertaining to computers • concealing the true source of electronic information • An act that violates the laws of one or more countries • the act of stealing valuable property by copying software • ...
Do I know my Cyber Security Posture 2023-07-05
Across
- - The potential negative impact or consequence of a cybersecurity incident.
- - Ensuring adherence to relevant cybersecurity regulations and standards.
- - The effects on an organization's operations, revenue, and reputation due to a security breach.
Down
- - The management and oversight of cybersecurity within the organization.
- - Assessing and managing cybersecurity risks associated with vendors, suppliers, and partners.
- - Coverage to mitigate potential financial losses resulting from a cyber incident.
- - Promoting a culture of cybersecurity consciousness among employees.
- - Education programs to inform employees about cybersecurity threats and best practices.
- - An unforeseen event or occurrence related to cybersecurity.
- - Protecting assets, systems, and data from unauthorized access or harm.
10 Clues: - An unforeseen event or occurrence related to cybersecurity. • - Promoting a culture of cybersecurity consciousness among employees. • - The management and oversight of cybersecurity within the organization. • - Protecting assets, systems, and data from unauthorized access or harm. • - Ensuring adherence to relevant cybersecurity regulations and standards. • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Technological Impacts in Business 2025-03-17
Across
- progress or developments
- companies that are in the same industry
- buying and selling things online.
- protecting digital information
- broadening
Down
- doing things faster and with less waste
- create new products and services
- using machines or computers to do tasks that people used to do
- the biggest example of technological impacts
9 Clues: broadening • progress or developments • protecting digital information • create new products and services • buying and selling things online. • doing things faster and with less waste • companies that are in the same industry • the biggest example of technological impacts • using machines or computers to do tasks that people used to do
CYBER BULLYING 2026-02-06
Across
- benda yang suka di gunakan untuk cyber bullying
- cyber bullying banyak di kalangan?
- korban cyber bullying dapat mengalami gangguan?
- dampak mental dari cyber bullying
- cyber bullying dapat menyebabkan korban merasa?
Down
- cyber bullying melanggar norma?
- cyber bullying dapat terjadi kapan saja secara?
- cyber bullying termasuk perilaku yang?
- Pelaku cyber bullying sering bersembunyi di balik identitas?
- akun palsu yang sering di gunakan untuk?
10 Clues: cyber bullying melanggar norma? • dampak mental dari cyber bullying • cyber bullying banyak di kalangan? • cyber bullying termasuk perilaku yang? • akun palsu yang sering di gunakan untuk? • benda yang suka di gunakan untuk cyber bullying • cyber bullying dapat terjadi kapan saja secara? • korban cyber bullying dapat mengalami gangguan? • ...
Cyber security Vocab 2 2021-09-28
Across
- means of restricting access to objects based on the identity of subjects and/or groups to which they belong
- measure of the likelihood that the biometric security system will correctly accept an access attempt by a user
- Body measurements related to human characteristics
- software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
- analyzes a user's digital physical and cognitive behavior
- method of linking a user's identity across multiple separate identity management systems
- means of restricting access to objects based on the identity of subjects and/or groups to which they belong
Down
- process of securing a system by reducing its surface of vulnerability
- Microsoft Windows directory service that allows IT administrators to manage users, applications, data, and various other aspects of their organization's network
- software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
- concept that has employees rotate through different jobs to learn the procedures and processes in each
- network authentication protocol
- verifying the identity of a user
- small device used with a computer
- measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user
15 Clues: network authentication protocol • verifying the identity of a user • small device used with a computer • Body measurements related to human characteristics • analyzes a user's digital physical and cognitive behavior • process of securing a system by reducing its surface of vulnerability • ...
Cyber security 6-8 2023-07-17
Across
- Fraudulent attempts to gain access to sensitive information, usually via email
- Protects digital information
- Software designed with malicious intent
- A secret code to protect access
- A technique used to take advantage of a vulnerability
- When sensitive information is released
- Software that locks users out of their system until payment is made
Down
- Malicious software that targets computers
- Software designed to spy on activity without the user's knowledge
- Software update to fix vulnerabilities and bugs
- Using two separate forms of authentication for secure access
- Technology used to monitor the outflow of sensitive data
- Network security system that prevents unwanted access
13 Clues: Protects digital information • A secret code to protect access • When sensitive information is released • Software designed with malicious intent • Malicious software that targets computers • Software update to fix vulnerabilities and bugs • Network security system that prevents unwanted access • A technique used to take advantage of a vulnerability • ...
Cyber Security Crossword - 1 2023-07-18
Across
- Tool used to hide online activity
- Malicious advertising that spreads malware
- Malware that locks files until a ransom is paid
- Fraudulent practice where individuals or entities impersonate legitimate sources to deceive and trick users into revealing sensitive information, such as passwords, credit card details, or personal data.
- Malicious software that secretly collects information
- is a computer on a network which acts as an intermediary for connections with other computers on that network
- Taking control of a user's web session
Down
- An online tool that helps conceal a user's identity and activities.
- Attacks that flood a system with excessive requests
- Attacks that redirect users to fake websites
- password cracking Technique of breaking passwords without an internet connection
- Sending a large volume of emails to overwhelm a server
- Tool used to capture keystrokes
13 Clues: Tool used to capture keystrokes • Tool used to hide online activity • Taking control of a user's web session • Malicious advertising that spreads malware • Attacks that redirect users to fake websites • Malware that locks files until a ransom is paid • Attacks that flood a system with excessive requests • Malicious software that secretly collects information • ...
Cyber Security Puzzle 2021-10-06
Cyber Security Crossword 2013-11-03
Across
- Sending files to a server or computer to somewhere on the Internet.
- Software that harms or steals your data from your computer.
- Someone who is not using their real identity, an unknown name.
- The last part of an internet URL
Down
- Someone who views or changes information without permission.
- A name you use to instead of your real name on a website or on the computer.
- Combinations of text letters to make up an image of a facial expression.
- Something that you can plug into your computer. You can put data on it.
- Individual 'dots' in a monitor that make up the display on your screen.
9 Clues: The last part of an internet URL • Software that harms or steals your data from your computer. • Someone who views or changes information without permission. • Someone who is not using their real identity, an unknown name. • Sending files to a server or computer to somewhere on the Internet. • ...
Cyber Security Puzzle 2024-10-21
Across
- term used for various pop-up advertisements that show up on your computer or mobile device.
- a malware designed to deny a user or organization access to files on their computer
- what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
- specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
- the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
- refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
- A worm in cybersecurity is a type of malicious software that spreads across computer networks
- A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user
9 Clues: a malware designed to deny a user or organization access to files on their computer • term used for various pop-up advertisements that show up on your computer or mobile device. • A worm in cybersecurity is a type of malicious software that spreads across computer networks • ...
WHITECOLLAR CRIMES 2021-06-11
Across
- CYBER CRIME IS TRANSPARENT OR TRANSNATIONAL
- A PASSWORD SUCH "obxxn45499bnLLLL" IS AN EXAMPLE OF WHAT TYPE OF PASSWORD, COMPLEX OR SIMPLE
- THE C IN CIA MODEL FOR CYBER SECURITY MEANS WHAT
- WHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998
- IN CONTRAST TO STOCHASTIC, THIS RISK RESULT FROM DELIBERATE CONDUCT.
Down
- MEANS PROTECTING INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED ACCESS, USE OR DISCLOSURE
- OCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACT
- PHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIES
- EXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFING
- RISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROL
- a law that was enacted by the UnitedStates Congress in 1986. It forms part of the Electronic Communications PrivacyAct and is codified as 18 U.S.C. sections 2701–2712.
11 Clues: CYBER CRIME IS TRANSPARENT OR TRANSNATIONAL • RISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROL • OCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACT • PHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIES • THE C IN CIA MODEL FOR CYBER SECURITY MEANS WHAT • EXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFING • WHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998 • ...
Cyber Security Risks 2019-05-12
Across
- These are small files that your browser saves on your computer that can stay on for months and may even record everywhere you go online.
- They are unwanted software that is installed in your system without your consent.
- It is a type of program that is installed to collect information about users, their computers or their browsing habits without your knowledge and sends the data to a remote user.
- It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
- It is the unauthorized transmission of data from within an organization to an external destination or recipient.
- The practice of sending emails that appears to be from trusted sources with the goal of gaining personal information or influencing the users to do something.
Down
- It makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
- It is a crime in which an imposter obtains key pieces of personally identifiable information, such as NRIC or driver's license number, in order to impersonate someone else.
- The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.
9 Clues: They are unwanted software that is installed in your system without your consent. • It is the unauthorized transmission of data from within an organization to an external destination or recipient. • It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid. • ...
Cyber Security & Legislation 2022-02-20
Across
- Computer ________ Act 1990 - It is illegal to make any unauthorised access to data
- SQL __________ - a technique used to view or change data in a database by inserting additional code into a text input box, creating a different SQL command
- Data ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessary
- __________ Designs & Patents Act 1998 - It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author
- _________ of Service attack. Floods a server with useless traffic causing the server to become overloaded and unavailable
Down
- Software written in order to infect computers and commit crimes.
- Online fraud technique used by criminals. It is designed to get you to give away personal information
- Brute ________ attack - A trial and error method used to decode encrypted data (such as passwords). Uses every combination until it hits upon the correct one.
- Open ________ - Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. May not be fully tested. Users have access to the source code
9 Clues: Software written in order to infect computers and commit crimes. • Computer ________ Act 1990 - It is illegal to make any unauthorised access to data • Data ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessary • Online fraud technique used by criminals. It is designed to get you to give away personal information • ...
Online Saftey 2021-06-22
7 Clues: - beware of ____ • - be____ what you post • - never share ___ information • - protect your IP ____ from stalkers • - ____ cells help us with online theft • - keep your social media account _____ • - we should manage multiple _____ for better security
Data Security 2025-01-23
Across
- The process of converting information into a secure format to prevent unauthorized access.
- A weakness that can be exploited.
- Verifying the identity of a user or system before granting access.
- Maintaining the accuracy and completeness of data.
- The technique of obscuring specific data within a database to protect sensitive information.
- Data Loss Prevention, strategies to prevent data breaches.
Down
- Adhering to data protection regulations.
- An event that compromises data security.
- A copy of data stored separately to protect against data loss.
- Ensuring that information is accessible only to those authorized to have access.
- Software designed to harm or exploit any device, service, or network.
- A type of cyber attack where attackers trick individuals into providing sensitive information.
- An unauthorized access or exposure of sensitive data.
- The potential for loss or damage.
- A network security system that monitors and controls incoming and outgoing network traffic.
15 Clues: A weakness that can be exploited. • The potential for loss or damage. • Adhering to data protection regulations. • An event that compromises data security. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Data Security 2025-01-23
Across
- The process of converting information into a secure format to prevent unauthorized access.
- A weakness that can be exploited.
- Verifying the identity of a user or system before granting access.
- Maintaining the accuracy and completeness of data.
- The technique of obscuring specific data within a database to protect sensitive information.
- Data Loss Prevention, strategies to prevent data breaches.
Down
- Adhering to data protection regulations.
- An event that compromises data security.
- A copy of data stored separately to protect against data loss.
- Ensuring that information is accessible only to those authorized to have access.
- Software designed to harm or exploit any device, service, or network.
- A type of cyber attack where attackers trick individuals into providing sensitive information.
- An unauthorized access or exposure of sensitive data.
- The potential for loss or damage.
- A network security system that monitors and controls incoming and outgoing network traffic.
15 Clues: A weakness that can be exploited. • The potential for loss or damage. • Adhering to data protection regulations. • An event that compromises data security. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Data Security 2025-01-16
Across
- Adhering to data protection regulations.
- The potential for loss or damage.
- The technique of obscuring specific data within a database to protect sensitive information.
- A weakness that can be exploited.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A copy of data stored separately to protect against data loss.
- A type of cyber attack where attackers trick individuals into providing sensitive information.
- Verifying the identity of a user or system before granting access.
Down
- An event that compromises data security.
- Ensuring that information is accessible only to those authorized to have access.
- Data Loss Prevention, strategies to prevent data breaches.
- The process of converting information into a secure format to prevent unauthorized access.
- Maintaining the accuracy and completeness of data.
- An unauthorized access or exposure of sensitive data.
14 Clues: The potential for loss or damage. • A weakness that can be exploited. • An event that compromises data security. • Adhering to data protection regulations. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Data Security 2025-01-23
Across
- The process of converting information into a secure format to prevent unauthorized access.
- A weakness that can be exploited.
- Verifying the identity of a user or system before granting access.
- Maintaining the accuracy and completeness of data.
- The technique of obscuring specific data within a database to protect sensitive information.
- Data Loss Prevention, strategies to prevent data breaches.
Down
- Adhering to data protection regulations.
- An event that compromises data security.
- A copy of data stored separately to protect against data loss.
- Ensuring that information is accessible only to those authorized to have access.
- Software designed to harm or exploit any device, service, or network.
- A type of cyber attack where attackers trick individuals into providing sensitive information.
- An unauthorized access or exposure of sensitive data.
- The potential for loss or damage.
- A network security system that monitors and controls incoming and outgoing network traffic.
15 Clues: A weakness that can be exploited. • The potential for loss or damage. • Adhering to data protection regulations. • An event that compromises data security. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Cybercross 2022-09-02
Across
- A piece of software or a sequence of commands that takes advantage of a software vulnerability or security flaw
- The conversion of data from a readable format into an encoded format.
- A sequence of words or other text that a person uses to authenticate their identity.
- A principle that ensures timely and reliable access to information when required
- A network of hijacked devices used to carry out various scams and cyber attacks.
- A program or file designed to harm a computer, server, client, or computer network.
- A process of verifying users' identity.
- A security violation in which information is accessed by an unauthorized individual or system.
Down
- A program that slows down your computer and watches your online activities.
- A principle that ensures information is protected from unauthorized disclosure
- A principle that ensures information is not modified or deleted by unauthorized parties.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's established security policies.
- Act that involves someone seeking entry to a restricted area without proper authentication.
- A fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- Any circumstance or event with the potential to steal or damage data or disrupt computing systems.
15 Clues: A process of verifying users' identity. • The conversion of data from a readable format into an encoded format. • A program that slows down your computer and watches your online activities. • A principle that ensures information is protected from unauthorized disclosure • A principle that ensures timely and reliable access to information when required • ...
RU ITEC411 Crime 2022-10-17
Across
- amendment to the federal computer fraud law that confronts hackers
- the act of spying or using spies
- agency of the U.S. Department of Transportation(Federal Aviation Administration)
- a virus that is installed on a device and is sent to attack other systems
- provides evidence with computer forensics, investigations, and cyber security
- person who uses computers to gain unauthorized access to digital information
- denial of service attack
- agency of the U.S. that is tasked with the enforcement of civil antitrust law and the promotion of consumer protection(Federal Trade Commission)
- a book that is made available in digital form
- naming system used to identify computers that are reachable through the web(Domain Name Server)
Down
- hacking that contributes to a political agenda
- the event where hackers attacked a bay area transit system
- suppression or changing of inappropriate material
- the act of damaging the reputation of a person
- group of hackers who coordinated cyber attacks
- a statement of false information towards a person
- agent of government that is tasked with protecting the environment
- computer that helps manage account funds
- a book by C. Stoll that addresses hackers compromising their victims
- the attempt to overtake personal and financial information stored online
20 Clues: denial of service attack • the act of spying or using spies • computer that helps manage account funds • a book that is made available in digital form • hacking that contributes to a political agenda • the act of damaging the reputation of a person • group of hackers who coordinated cyber attacks • suppression or changing of inappropriate material • ...
FITDVocab.MY 2013-05-15
Across
- the VDU
- the tower
- opposite of pause
- also known as KB
- it eats cheese
- apps
- wireless fidelity
- without wires it can be 3g or 4g
- national cyber security alliance
- what is google
- connect without wires
- in the sky
- to search for search engines
- also known as TB
- visual display unit
- it is what comes before byte
- a printer
- keep your password secret
- random access memory
- folder
- a blank sheet you can type on
- not by hand
- where you put your flash drive
- to restart your computer
- light admitting diode
- the internet world
Down
- a symbol to represent your company
- enter instructions into a computer
- a keyboard
- CD drive
- a virus on your computer
- also known as GB
- internet service provider
- liquid crystal display
- online police
- a phone
- a catchy phrase to go with a logo
- online bullying
- the brain of the computer
- where you stick your headphones into
- extension cord operating systems
- old school with WIFI
- bigger than a bit
- the creator
- a packet of paper to advertise your company
- also know as MB
- computer processing unit
- service set identifier
48 Clues: apps • folder • the VDU • a phone • CD drive • the tower • a printer • a keyboard • in the sky • the creator • not by hand • online police • it eats cheese • what is google • online bullying • also know as MB • also known as KB • also known as GB • also known as TB • opposite of pause • wireless fidelity • bigger than a bit • the internet world • visual display unit • old school with WIFI • random access memory • ...
RU ITEC411 Crime and Security 2021-04-15
Across
- A security tool used to protect data by encoding it
- Hacking that has no ulterior motive, typically done for the challenge
- A person who is intruding in someone's computer
- An act that made hacking illegal and more punishable, but came out before the web was invented
- Exploits a servers vulnerabilities by flooding it with traffic, ex. Syn flood (2 hyphens)
- Type of Hacking with a political motive
- Hacker enlisted for penetration testing or hacks with good intent(hyphen)
- Company that was hacked through their heating and air conditioning units
- The opposite of slander, which is verbal defamation
Down
- Used by the computer to communicate with other hardware and manage it(hyphen)
- Authentication that use more that one way to identify yourself
- tests the strength of a company’s security through hacking
- The conflict that takes place through online and electronic means (hyphen)
- Security through facial recognition, fingerprints
- Software or programs that can damage or harm computers
- Encrypts files and will decrypt them when a payment of sorts is received by a Hacker
- A scam that targets people through various forms of messaging such as emails and texts
- A type of hacker with malicious intent (hyphen)
- Program corrupts other computers by reproduction
- Malicious software that is able to track and obtain information from the device its implanted on
20 Clues: Type of Hacking with a political motive • A person who is intruding in someone's computer • A type of hacker with malicious intent (hyphen) • Program corrupts other computers by reproduction • Security through facial recognition, fingerprints • A security tool used to protect data by encoding it • The opposite of slander, which is verbal defamation • ...
ISSO June 2021 2021-06-07
Across
- IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- The physical separation or isolation of a system from other systems or networks is known as an __ __.
- A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- IRM office responsable for Cyber Operations oversight.
- ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- vulnerabilities must be remediated within ___calendar days of initial detection.
- The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- ISSO duties must be performed using an ISSO ___ account.
- The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- of ___ is an attack that prevents or impairs the authorized use of information system resources or services.
19 Clues: IRM office responsable for Cyber Operations oversight. • ISSO duties must be performed using an ISSO ___ account. • vulnerabilities must be remediated within ___calendar days of initial detection. • Criminal organization responsable for the cyber attack against the Colonial Pipeline. • ...
social media 2 2024-07-11
21 Clues: - fraud • - to aim • - company • - to link • - to sell • - to think • - to bring • - goal/aim • - anonymous • - to suffer • - desperate • - to belong • - to threaten • - application • - to maintain • - disappointed • - to establish • - to facilitate • - to wait/expect • peur - to be afraid • intimidation - cyber bullying
I4p0 quiz 1 2025-09-02
8 Clues: A in AR/VR • First I in IIoT • Lot of Data produced by sensors • 3D Printing is ... Manufacturing • Using tools to visually represent data • Type of security very imp in Industry 4.0 • Replication of real-life scenario in virtual • ... Integration, Cross company data integration
Unit 3 Cyber Security 2017-04-28
Across
- Level of assurance that the data will be available to those who need it when they want it
- Countries have always spied on each other
- Gaining the trust of individuals and using that trust to influence them to give confidential information
- Rules which restrict access only to those who need to know
- Level of assurance which can be given as to the accuracy and trustworthiness of the data
- Sending so much traffic to a computer system that it cannot cope, denying access to legitimate users
- Devices or programs that detect attempts at intrusion and take action to prevent them
- Normally criminal activities because the intention is to cause harm to the computer or system
Down
- To see how the system copes when subjected to conditions which would cause the vulnerabilities to become apparent
- Exposes any attempts by attackers to overcome security controls to compromise data or other resources
- This includes cyber enabled crime and cyber dependent crime.
- Any threat which is a result of a natural event
- Any threat to the system or computer through physical access. These include loss or theft of equipment. E.g. tablet or laptop, portable memory
13 Clues: Countries have always spied on each other • Any threat which is a result of a natural event • Rules which restrict access only to those who need to know • This includes cyber enabled crime and cyber dependent crime. • Devices or programs that detect attempts at intrusion and take action to prevent them • ...
Learning Unit 11 - Legal issues in information security and risk management 2023-05-29
Across
- which involves any illegal act which involves a computer whether the computer is an object of a crime, an instrument used to commit a crime or a repository of evidence related to a crime and includes the statutory cyber crimes set out in sections 85 to 88 of the ECT Act.
- where the concepts of “reasonableness” and “duty of care” are being relied upon to determine whether or not organisations have been negligent in not taking the necessary security precautions, or are liable for loss suffered where it is proved by a party who suffered loss that their loss should have been reasonably foreseeable and due to the others parties negligence, loss or damage has been suffered by the other party.
- Many jurisdictions have enacted breach notification laws that require organizations to notify affected individuals, regulators, or authorities in the event of a data breach. These laws often have specific timelines for reporting breaches and may also outline the content and format of the notifications.
- where information technology contracts such as outsourcing, service provision, application service provider and software licensing agreements are beginning to impose security obligations on vendors and business partners. These agreements increasing require the providers of information technology to warrant against security vulnerabilities, such as viruses and trojan horses, and organisations are more frequently being contractually obligated to protect a customer’s, employee’s, or business partner’s personal or confidential information. Similarly, businesses are often required to agree to security commitments as a condition of participating in certain activities. For example, merchants that want to accept credit cards, must agree to comply with the PCI Data Security Standard (click here to read our post on the Standard).
- (e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication.
- Various data protection and privacy laws, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, regulate the collection, storage, processing, and transfer of personal data. Organizations must comply with these laws and implement appropriate security measures to safeguard personal information.
- in terms of section 87 of the ECT Act where the victim of an information security attack conducted by means of impersonation or spoofing could lay a criminal charge of fraud against the attacker based on the attacker’s attempt to mislead or misappropriate something of value
- Laws related to cybercrime and computer fraud address offenses like hacking, unauthorized access, identity theft, malware distribution, and other cyber-related crimes. These laws provide legal frameworks for prosecuting individuals or organizations engaged in illegal activities targeting information systems and networks.
Down
- Organizations need to protect their intellectual property rights, such as trade secrets, patents, copyrights, and trademarks. Implementing robust security measures and employing legal mechanisms to safeguard intellectual property is crucial for mitigating risks associated with unauthorized access or theft.
- in connection with forensic issues relating to information in electronic form which may have been modified or deleted in an attempt to hide the evidence and the taking of necessary steps to ensure that the reliability and admissibility of the electronic evidence will be maintained in the eyes of a Court of law.
- Transferring personal data across international borders may be subject to specific legal requirements. Adequate safeguards, such as Standard Contractual Clauses (SCCs) or Binding Corporate Rules (BCRs), may need to be implemented to ensure compliance with applicable data protection laws.
- where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”.
- Contracts, such as service level agreements (SLAs) and vendor agreements, play a crucial role in managing information security risks. Organizations should include provisions that outline security responsibilities, breach notification requirements, and liability allocation in case of security incidents.
- play a significant role in information security and risk management. Several laws and regulations govern the protection of sensitive information, privacy, and the management of risks associated with data breaches and cybersecurity incidents.
- where for example a person submits personal information to an organisation for a certain purpose and the organisation reveals the information to a third party who misuses the information causing the person to suffer damage or loss (for example, in the context of ‘data swops’ between organisations).
- where ordinary electronic signatures and “advanced” electronic signatures play a role in securing information pursuant to sections 13 of the ECT Act.
- has introduced the concepts of providing appropriate, reasonable technical and organisational measures to protect personal information.
- under the soon to be enacted Protection of Personal Information Bill.
- for example identity theft
- where King III™ requires appropriate information security controls to protect companies and their shareholders.
20 Clues: for example identity theft • under the soon to be enacted Protection of Personal Information Bill. • where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”. • (e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication. • ...
Y9 Cyber Security 2021-02-09
Across
- A type of network that doesn't need wires
- A short range network technology used for connecting smart watches and smartphones
- The colour hat for this illegal hacker
Down
- Weaknesses in systems that allow for hacking
- A type of malware
- Malicious software
- Scrambling data so that it cant be read without the key
- The Computer Misuse Act and GDPR are examples of this
- The type of hacking done by a white hat hacker
9 Clues: A type of malware • Malicious software • The colour hat for this illegal hacker • A type of network that doesn't need wires • Weaknesses in systems that allow for hacking • The type of hacking done by a white hat hacker • The Computer Misuse Act and GDPR are examples of this • Scrambling data so that it cant be read without the key • ...
Cyber Security Crossword 2026-04-05
Across
- A secret word you use to log in.
- When someone tries to harm a computer or network online.
- Bad software that can harm your computer.
- A big computer that stores and shares information.
Down
- A security system that blocks bad traffic and keeps your computer safe.
- A person who tries to break into computers.
- A program that protects your computer from bad files.
- A fake message that tries to trick you to give your information.
- harmful program that can make your computer sick.
9 Clues: A secret word you use to log in. • Bad software that can harm your computer. • A person who tries to break into computers. • harmful program that can make your computer sick. • A big computer that stores and shares information. • A program that protects your computer from bad files. • When someone tries to harm a computer or network online. • ...
Cyber Security Month 2021 2021-09-17
Across
- ____ all devices and software to keep them protected.
- Trying to get someone to divulge confidential information.
- Scams through a phone call.
- Place online where cybercriminals share and sell stolen information
- You should always ____ your computer before walking away.
- ____ any suspected malicious activity to Risk Management.
Down
- Principle of accessing only what you need.
- Scams through a text message.
- Should be installed on all computers to protect against malicious software.
- ____ any paper documents when they are no longer needed.
- Malicious software that holds data hostage.
- Enforce strong ____ on all systems.
- Scams through email.
13 Clues: Scams through email. • Scams through a phone call. • Scams through a text message. • Enforce strong ____ on all systems. • Principle of accessing only what you need. • Malicious software that holds data hostage. • ____ all devices and software to keep them protected. • ____ any paper documents when they are no longer needed. • ...
Cyber Security Month 2021 2021-09-15
Across
- Enforce strong ____ on all systems.
- Scams through a phone call.
- Principle of accessing only what you need.
- Scams through a text message.
- Place online where cybercriminals share and sell stolen information.
- ____ any suspected malicious activity to Risk Management.
Down
- Trying to get someone to divulge confidential information.
- Malicious software that holds data hostage.
- ____ all devices and software to keep them protected.
- ____ any paper documents when they are no longer needed.
- Should be installed on all computers.
- Scams through an email.
- You should always ____ your computer before walking away.
13 Clues: Scams through an email. • Scams through a phone call. • Scams through a text message. • Enforce strong ____ on all systems. • Should be installed on all computers. • Principle of accessing only what you need. • Malicious software that holds data hostage. • ____ all devices and software to keep them protected. • ____ any paper documents when they are no longer needed. • ...
cyber security-crossword puzzle 2025-02-13
Across
- a flaw or weakness in a system that could be exploited
- keyword that refers to online world
- computer programs that can block detect and remove viruses and other malware
- a type of malware that denies user's access to a system or data until a sum of money is paid
- feeling of being secure, protected from adversaries
- an individual group organization or government that conducts or has the intent to conduct detrimental activities
Down
- Extra copies of computer files that can be used to restore the files
- unauthorized user who attempts to or gains access to an information system
- converting data into a form that can't be understood by unauthorized people
- mechanism for creating secure connection between computer device and computer network
- attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources
- a network security device designed to monitor, filter incoming and outgoing network traffic
- malicious software or malware, that spreads between computers and causes damage to data and software
13 Clues: keyword that refers to online world • feeling of being secure, protected from adversaries • a flaw or weakness in a system that could be exploited • Extra copies of computer files that can be used to restore the files • unauthorized user who attempts to or gains access to an information system • ...
Cybersecurity Crossword 2024-03-20
Across
- Measures adopted to protect systems and data from cyber threats.
- A network-connected computer or device.
- A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
- The process of converting information or data into a code, especially to prevent unauthorized access.
Down
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A powerful tool used for penetration testing, security research, and IDS signature development.
- The process or action of verifying the identity of a user or process.
- A country in Europe known for its precision engineering and historical contributions to science and technology.
8 Clues: A network-connected computer or device. • Measures adopted to protect systems and data from cyber threats. • The process or action of verifying the identity of a user or process. • A powerful tool used for penetration testing, security research, and IDS signature development. • ...
Easy Cyber Security 2021-11-28
Across
- the topic is
- not fishing but
- I should open every attachment I get
- Bad software that infects your computer is called ______
- the people who attack us are called ______
Down
- A ____ breech is when a criminal steals confidential information
- you can't use your computer until you pay because you have _______
- I should always use a ______ password
- you get an email from someone you don't know asking you to open an attachment it is a
9 Clues: the topic is • not fishing but • I should open every attachment I get • I should always use a ______ password • the people who attack us are called ______ • Bad software that infects your computer is called ______ • A ____ breech is when a criminal steals confidential information • you can't use your computer until you pay because you have _______ • ...
Hardware/Cyber Security 2020-10-13
Across
- memory stored in a computer that lasts forever
- a scam email with a link aimed to steal things such as your IP address
- an AI used to swarm or abuse abilities of web pages, nowadays web pages have protection against these.
- short for malicious software
- a type of malware that is capable of copying itself and spreading to other devices
- temporary memory inside of a computer
Down
- holds and allows communication between many of the crucial electronic components of a system, such as the CPU and memory,
- the brain of the computer
- when content inside of your computer is stolen and they ask for money to get it back
9 Clues: the brain of the computer • short for malicious software • temporary memory inside of a computer • memory stored in a computer that lasts forever • a scam email with a link aimed to steal things such as your IP address • a type of malware that is capable of copying itself and spreading to other devices • ...
Cyber Security Crossword 2023-07-24
Across
- ______ are damaging to the reputation of companies and expose their customers to identity theft
- ______ determines an authenticated person’s or service’s level of access. It defines which data they can access, and what they can do with it
- ______ refers to the accuracy and consistency of data and information. Ensuring data integrity means preventing unauthorized alterations or tampering of data
- ______ is a type of social engineering where an attacker sends a fraudulent message designed to convince you to provide sensitive information via a message or a fraudulent web site, gain access to your device by convincing you to click on a link or open an attachment that contains malware, and convince you to provide something of value to the attacker
- ______ refers to the principle of ensuring that authorized users have access to the information they need when they need it. This can be achieved through measures such as redundant systems, backups, and disaster
Down
- ______ is a type of software designed to damage or disrupt computer systems
- The principle of ______ involves protecting sensitive information from unauthorized access. This can be achieved through methods such as encryption or access controls
- ______ is a process verifying the identity of a person or service. It requests legitimate access credentials and basis for creating secure identity and access control principles
- ______ is vicious malware that locks users out of their devices until they pay a ransom
9 Clues: ______ is a type of software designed to damage or disrupt computer systems • ______ is vicious malware that locks users out of their devices until they pay a ransom • ______ are damaging to the reputation of companies and expose their customers to identity theft • ...
Cyber Security Awareness 2024-06-15
Across
- String of characters that allows access to a computer system
- Harmful software
- Program that spreads between computers and infects files
- Unauthorized access to computer systems
Down
- Secret word or phrase
- Weakness in a system
- Type of attack where services are disrupted
- Safeguarding of personal information
- Act of deceiving someone
9 Clues: Harmful software • Weakness in a system • Secret word or phrase • Act of deceiving someone • Safeguarding of personal information • Unauthorized access to computer systems • Type of attack where services are disrupted • Program that spreads between computers and infects files • String of characters that allows access to a computer system
Information Security 2023-12-12
Across
- 57% of organizations see at least weekly phishing attempts
- The most common target of phishing attacks are ____
- The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
- 94% of malware is delivered by ____
- You should ____ over a link in an email to preview the actual address before clicking
Down
- Lock your ____ when you step away
- German American's Information Security Officer is
- ____ is one of the most common and dangerous forms of cyber crime
- Phishing is an attempt to obtain sensitive ____ with malicious intent
- Display names and email domains can be ____ hiding the true identity and appearing trustworthy
- Report spam/suspicious emails through the ____ button on the Outlook toolbar
- Our first line of defense against cybersecurity attacks and fraud is ___
- At German American, _____ is responsible for information security
13 Clues: Lock your ____ when you step away • 94% of malware is delivered by ____ • German American's Information Security Officer is • The most common target of phishing attacks are ____ • 57% of organizations see at least weekly phishing attempts • ____ is one of the most common and dangerous forms of cyber crime • ...
Crossword Labs 2023-01-05
Across
- An update in an operating system or application to fix bug & improve performance or security
- Emails sent to trick users to reveal their sensitive information.
- Phishing Techniques used to target CEO,CFO etc.
- Scrambling of text in order to ensure the security of data/ information
- Existence of weakness in a system or network
Down
- Socially or politically motivated hackers
- Sending bulk messages by abusing electronic messaging system
- Gaining access to a secured area by going behind an authorized person
- Technique of Hiding data behind a photo
- Hackers with main motive to gain financial profit by doing cyber crimes
- Unauthorized softwares installed on computer to gather sensitive information
- Software designed to help the user's computer to detect viruses & avoid them
12 Clues: Technique of Hiding data behind a photo • Socially or politically motivated hackers • Existence of weakness in a system or network • Phishing Techniques used to target CEO,CFO etc. • Sending bulk messages by abusing electronic messaging system • Emails sent to trick users to reveal their sensitive information. • ...
What is Cyber Security: Vocabulary Review 2024-09-04
Across
- the practice of isolating resources and controlling access to them through APIs or strict interfaces
- a design technique that separates the functionality of a program into independent, interchangeable components.
- the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
- the practice of protecting data from unauthorized access, disclosure, or alteration
- the protection of data from unauthorized modification or deletion.
- a cybersecurity technique that protects processes from each other on an operating system.
- a design principle that emphasizes the importance of simplicity in cyber security systems and logics
- the practice of concealing information within other data, structures, or media to prevent unauthorized access.
- the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
- the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
- creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
- the ability to reliably access and use information in a timely manner.
- a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
- a process that separates data, processes, and administrative tasks into logical groupings, or domains.
- the practice of reducing unnecessary complexity and focusing on what's essential
- a way of looking at the world from the perspective of a hacker
16 Clues: a way of looking at the world from the perspective of a hacker • the protection of data from unauthorized modification or deletion. • the ability to reliably access and use information in a timely manner. • the practice of reducing unnecessary complexity and focusing on what's essential • ...
Security Crossword Puzzle - October 2021 2021-10-01
Across
- This is a software vulnerability usually found in Web applications that allows online criminals to inject client-side script into pages that other users view
- This is a program used for security purposes which is able to simulate one or more network services to look like a vulnerability and act as a bait to the attacker
- You should not just check identity; you should also confirm
- Hackers take advantage from this type of attack that can lead to unauthorized code running or system crashes
Down
- In cyber security, intrusion refers to the act of getting around a system’s security mechanisms to gain unauthorized access.
- The process of stealing someone’s personal identification data and using it online in order to pose as that person
- The main goal of this process is to identify, analyze and present facts about a digital investigation. The conclusions of this can be used in fight against cyber-crime or for civil proceedings
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- In cryptography, this attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing it correctly
- This can slow down your computer and watch everywhere you go on the internet
10 Clues: You should not just check identity; you should also confirm • This can slow down your computer and watch everywhere you go on the internet • Hackers take advantage from this type of attack that can lead to unauthorized code running or system crashes • ...
Tech crossword 2022-10-01
Across
- Most used Javascript backend runtime
- Leading public cloud provider
- Diffusion based image generation Tool by Google
- Modelling language used for Software Design
Down
- Most important resource in Machine Learning
- Wireless networking
- Popular crypto-currency used for smart-contracts
- Linux version used famously for cyber-security
8 Clues: Wireless networking • Leading public cloud provider • Most used Javascript backend runtime • Most important resource in Machine Learning • Modelling language used for Software Design • Linux version used famously for cyber-security • Diffusion based image generation Tool by Google • Popular crypto-currency used for smart-contracts
Ty's crossword 2026-01-16
Across
- main printed circut board
- Artifishile inteligent
- security making your password
- conponet of the computer that controls it
Down
- central possessing unit
- A person that tries to get you to do stuff
- A person that steals your computer information
- footprint something you want to follow you for the rest of your life
- A person or a computer trying to get your information
- it is controlled the computer
10 Clues: Artifishile inteligent • central possessing unit • main printed circut board • it is controlled the computer • security making your password • conponet of the computer that controls it • A person that tries to get you to do stuff • A person that steals your computer information • A person or a computer trying to get your information • ...
cyber security 2021-11-05
6 Clues: sending fake emails • an infection on your phone • a word or phrase to protect your device • stealing someone's personal information • looking at someone putting in their password • something stopping hackers get into your personal information
Cyber Security 2021-03-30
Across
- an algorithm for transforming original message to coded message
- is the process of verifying the identity of a person or device
Down
- is the method by which information is converted into secret code that hides the information's true meaning.
- it is the defense of digital information and IT assets against internal and external, malicious and accidental threats
- study of encryption principles
- an attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset.
6 Clues: study of encryption principles • is the process of verifying the identity of a person or device • an algorithm for transforming original message to coded message • is the method by which information is converted into secret code that hides the information's true meaning. • ...
Cyber Security 2023-09-19
Across
- Software used to spy on people to get passwords or bank details.
- Software used to protect computers against viruses.
- App or game that looks legitimate but contains a virus or worm.
Down
- Type of hacker who hacks for selfish reasons.
- Type of hacker who hacks for the government.
- Person pretending to be someone else to steal data.
6 Clues: Type of hacker who hacks for the government. • Type of hacker who hacks for selfish reasons. • Person pretending to be someone else to steal data. • Software used to protect computers against viruses. • App or game that looks legitimate but contains a virus or worm. • Software used to spy on people to get passwords or bank details.
Cyber Security 2024-03-25
Across
- Security systems designed to prevent unauthorized access to or from a private network.
- Networks of hijacked computer devices used to carry out various scams and cyber attacks.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
6 Clues: Security systems designed to prevent unauthorized access to or from a private network. • Networks of hijacked computer devices used to carry out various scams and cyber attacks. • Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
CYBER SECURITY 2024-08-18
6 Clues: a malicious software • the act of intruding • steal sensitive information • aim to steal account credentials • virtual wall that filters incoming traffic • set of programs that protect your software
Cyber-Security 2023-01-16
6 Clues: Securing Social media accounts • a person's personal information • protect computer from unwanted emails • illegal and unauthorised access to someone's PC • piece of information stored on the internet when you browse online • attempt to acquire personal info by posing as trustworthy authority
Cyber Security 2025-10-21
Across
- Crime involving stealing someone's personal information.
- Software that is designed to damage or disrupt systems.
Down
- A scam where attackers trick users into giving personal information.
- A type of malware that pretends to be legitimate software.
- A type of malware that attaches itself to clean files.
- A self-replicating malware that spreads without user action.
6 Clues: A type of malware that attaches itself to clean files. • Software that is designed to damage or disrupt systems. • Crime involving stealing someone's personal information. • A type of malware that pretends to be legitimate software. • A self-replicating malware that spreads without user action. • ...
CYBER BULLYING 2026-01-30
Across
- yang biasanya di gunakan untuk cyber bullying
- benda yang sering di gunakan untuk cyber bullying
- nama lain dari cyber bullying
- termasuk perundungan lewat sosmed
- apalikasi yang sering di gunakan untuk cyber bullying
Down
- merupakan dampak korban cyber bullying
- bagaimana peran sekolah dalam menangani cyber bullying
- biasanya kata kata ini di pakai untuk mengancam
- bahasa indonesia cyber bullying
- cara untuk mencegah cyber bullying
10 Clues: nama lain dari cyber bullying • bahasa indonesia cyber bullying • termasuk perundungan lewat sosmed • cara untuk mencegah cyber bullying • merupakan dampak korban cyber bullying • yang biasanya di gunakan untuk cyber bullying • biasanya kata kata ini di pakai untuk mengancam • benda yang sering di gunakan untuk cyber bullying • ...
