cyber security Crossword Puzzles

Unit 5 - The internet and its uses 2022-05-25

Unit 5 - The internet and its uses crossword puzzle
Across
  1. a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
  2. small text file that is used to store personal data, by a web browser.
  3. the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
  4. a type of digital currency that uses encryption procedures.
  5. a network component where the web pages for a website are stored.
  6. a very large global network that allows users to access the world wide web.
  7. the physical structure, such as all the components and cables, that are used to connect devices.
  8. a type of cyber threat that involves sending a user a fake email that is designed to look genuine.
Down
  1. a person that carries out an illegal or immoral action.
  2. a method of securing data for storage or transmission that scrambles it and makes it meaningless.
  3. a type of password that uses a person's biological data, such as their fingerprint.
  4. a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
  5. a dormant/sleeping bot.
  6. a collection of web pages, normally about a related topic or purpose.
  7. a type of cookie that is stored by the web browser until it is deleted by the user or because it has expired.

15 Clues: a dormant/sleeping bot.a person that carries out an illegal or immoral action.a type of digital currency that uses encryption procedures.a network component where the web pages for a website are stored.a collection of web pages, normally about a related topic or purpose.small text file that is used to store personal data, by a web browser....

TTS Jaringan Komputer dan Internet 2024-01-11

TTS Jaringan Komputer dan Internet crossword puzzle
Across
  1. melindungi data termasuk?
  2. lapisan ke empat
  3. salah satu komponen jaringan komputer
  4. salah satu jenis cyber security
Down
  1. kata lain dari tata kelola data
  2. berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
  3. konfigurasi keamanan jaringan
  4. salah satu mekanisme pertukaran data
  5. metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
  6. jaringan area lokal

10 Clues: lapisan ke empatjaringan area lokalmelindungi data termasuk?konfigurasi keamanan jaringankata lain dari tata kelola datasalah satu jenis cyber securitysalah satu mekanisme pertukaran datasalah satu komponen jaringan komputerberbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna...

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Do I know my Cyber Security Posture 2023-07-05

Do I know my Cyber Security Posture crossword puzzle
Across
  1. - The potential negative impact or consequence of a cybersecurity incident.
  2. - Ensuring adherence to relevant cybersecurity regulations and standards.
  3. - The effects on an organization's operations, revenue, and reputation due to a security breach.
Down
  1. - The management and oversight of cybersecurity within the organization.
  2. - Assessing and managing cybersecurity risks associated with vendors, suppliers, and partners.
  3. - Coverage to mitigate potential financial losses resulting from a cyber incident.
  4. - Promoting a culture of cybersecurity consciousness among employees.
  5. - Education programs to inform employees about cybersecurity threats and best practices.
  6. - An unforeseen event or occurrence related to cybersecurity.
  7. - Protecting assets, systems, and data from unauthorized access or harm.

10 Clues: - An unforeseen event or occurrence related to cybersecurity.- Promoting a culture of cybersecurity consciousness among employees.- The management and oversight of cybersecurity within the organization.- Protecting assets, systems, and data from unauthorized access or harm.- Ensuring adherence to relevant cybersecurity regulations and standards....

8/13/2024 2024-08-13

8/13/2024 crossword puzzle
Across
  1. Pentest certification
  2. EDR
Down
  1. Program that runs as a background proccess
  2. Cyber Security conference
  3. Low level coding language
  4. Measure of severity

6 Clues: EDRMeasure of severityPentest certificationCyber Security conferenceLow level coding languageProgram that runs as a background proccess

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

TTUTC Cyber Security Awareness Month 2023-10-05

TTUTC Cyber Security Awareness Month crossword puzzle
Across
  1. Measures taken to protect personal information from unauthorized access (two words).
  2. A branch of computer science that aims to create machines capable of intelligent behavior (two words).
  3. An individual or group who uses their skills to gain unauthorized access to computer systems for various purposes.
  4. A type of attack that tricks individuals into making decisions or divulging confidential information (two words).
  5. A program that appears harmless but is designed to perform malicious actions (two words).
Down
  1. An authentication method that uses a combination of something you know, something you have, and something you are (Abbreviation).
  2. When a hacker bypasses physical access controls by following an authorized person inside.
  3. An attack that uses a thumb drive to install malware on your computer. (two words).
  4. Information security is our shared ______
  5. The ethical concerns and considerations surrounding the use of AI in various applications (two words).
  6. A technique where attackers trick individuals into revealing sensitive information.
  7. Policy A term in a policy that emphasizes keeping the workspace free of sensitive information when not in use (two words).
  8. Malicious software designed to harm or exploit computer systems.
  9. Over-the-phone-based social engineering.
  10. Incidents where sensitive information is accessed without authorization (two words).
  11. The process of encoding information to make it unreadable without the proper decryption key.
  12. Widely used in-home network technology that allows for wireless connection in interfacing with the internet
  13. A set of characters used to authenticate and access a system.
  14. A type of malware that encrypts files and demands a ransom for their release.

19 Clues: Over-the-phone-based social engineering.Information security is our shared ______A set of characters used to authenticate and access a system.Malicious software designed to harm or exploit computer systems.A type of malware that encrypts files and demands a ransom for their release....

Cyber Security Crossword Puzzle 2021-08-25

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. An act that violates the laws of one or more countries
  2. concealing the true source of electronic information
  3. a crime to access a protected computer without authorization.
  4. bullying that takes place on the internet
  5. a code of polite, thoughtful behaviors to follow while on the network.
Down
  1. an emotional often profane response to an action or statement in a chatroom
  2. Law which you have to get permission from the owner to make non-archival copies
  3. Philosophic study of ethics pertaining to computers
  4. the conditions under which you can use that is copyrighted by someone else without getting permission.
  5. the act of stealing valuable property by copying software
  6. The concept that's its a persons idea, writing and constructions without it being in physical sense
  7. the practice of attacking and robbing ships at sea
  8. A set of moral principals or values

13 Clues: A set of moral principals or valuesbullying that takes place on the internetthe practice of attacking and robbing ships at seaPhilosophic study of ethics pertaining to computersconcealing the true source of electronic informationAn act that violates the laws of one or more countriesthe act of stealing valuable property by copying software...

Nursing and Midwifery Digital Health Framework 2025-04-02

Nursing and Midwifery Digital Health Framework crossword puzzle
Across
  1. the framework supports the develop —— Skills for the healthcare workforce
  2. security The practice of safeguard digital patient information against cyber threats
  3. the use of technology to support —— Decision-making is a key component of digital health
  4. the ability to understand —-- In digital health systems is essential
Down
  1. a type of digital tool that allows remote patients monitoring and communication
  2. Nurses and midwives must ensure ——- When handling digital health records
  3. A critical skill in the framework, the ability to analyse - To support patient care
  4. nurses and midwives use —— Systems to document and access patients records
  5. Digital health tools improve —-- By reducing errors and improving workflows
  6. the secure exchange of patients ___ is critical in digital health

10 Clues: the secure exchange of patients ___ is critical in digital healththe ability to understand —-- In digital health systems is essentialNurses and midwives must ensure ——- When handling digital health recordsthe framework supports the develop —— Skills for the healthcare workforce...

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Technological Impacts in Business 2025-03-17

Technological Impacts in Business crossword puzzle
Across
  1. progress or developments
  2. companies that are in the same industry
  3. buying and selling things online.
  4. protecting digital information
  5. broadening
Down
  1. doing things faster and with less waste
  2. create new products and services
  3. using machines or computers to do tasks that people used to do
  4. the biggest example of technological impacts

9 Clues: broadeningprogress or developmentsprotecting digital informationcreate new products and servicesbuying and selling things online.doing things faster and with less wastecompanies that are in the same industrythe biggest example of technological impactsusing machines or computers to do tasks that people used to do

WHITECOLLAR CRIMES 2021-06-11

WHITECOLLAR CRIMES crossword puzzle
Across
  1. CYBER CRIME IS TRANSPARENT OR TRANSNATIONAL
  2. A PASSWORD SUCH "obxxn45499bnLLLL" IS AN EXAMPLE OF WHAT TYPE OF PASSWORD, COMPLEX OR SIMPLE
  3. THE C IN CIA MODEL FOR CYBER SECURITY MEANS WHAT
  4. WHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998
  5. IN CONTRAST TO STOCHASTIC, THIS RISK RESULT FROM DELIBERATE CONDUCT.
Down
  1. MEANS PROTECTING INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED ACCESS, USE OR DISCLOSURE
  2. OCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACT
  3. PHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIES
  4. EXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFING
  5. RISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROL
  6. a law that was enacted by the UnitedStates Congress in 1986. It forms part of the Electronic Communications PrivacyAct and is codified as 18 U.S.C. sections 2701–2712.

11 Clues: CYBER CRIME IS TRANSPARENT OR TRANSNATIONALRISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROLOCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACTPHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIESTHE C IN CIA MODEL FOR CYBER SECURITY MEANS WHATEXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFINGWHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998...

Online Saftey 2021-06-22

Online Saftey crossword puzzle
Across
  1. - never share ___ information
  2. - be____ what you post
  3. - beware of ____
  4. - we should manage multiple _____ for better security
Down
  1. - ____ cells help us with online theft
  2. - keep your social media account _____
  3. - protect your IP ____ from stalkers

7 Clues: - beware of ____- be____ what you post- never share ___ information- protect your IP ____ from stalkers- ____ cells help us with online theft- keep your social media account _____- we should manage multiple _____ for better security

Cyber Security Risks 2019-05-12

Cyber Security Risks crossword puzzle
Across
  1. These are small files that your browser saves on your computer that can stay on for months and may even record everywhere you go online.
  2. They are unwanted software that is installed in your system without your consent.
  3. It is a type of program that is installed to collect information about users, their computers or their browsing habits without your knowledge and sends the data to a remote user.
  4. It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
  5. It is the unauthorized transmission of data from within an organization to an external destination or recipient.
  6. The practice of sending emails that appears to be from trusted sources with the goal of gaining personal information or influencing the users to do something.
Down
  1. It makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  2. It is a crime in which an imposter obtains key pieces of personally identifiable information, such as NRIC or driver's license number, in order to impersonate someone else.
  3. The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.

9 Clues: They are unwanted software that is installed in your system without your consent.It is the unauthorized transmission of data from within an organization to an external destination or recipient.It is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid....

Cyber Security & Legislation 2022-02-20

Cyber Security & Legislation crossword puzzle
Across
  1. Computer ________ Act 1990 - It is illegal to make any unauthorised access to data
  2. SQL __________ - a technique used to view or change data in a database by inserting additional code into a text input box, creating a different SQL command
  3. Data ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessary
  4. __________ Designs & Patents Act 1998 - It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author
  5. _________ of Service attack. Floods a server with useless traffic causing the server to become overloaded and unavailable
Down
  1. Software written in order to infect computers and commit crimes.
  2. Online fraud technique used by criminals. It is designed to get you to give away personal information
  3. Brute ________ attack - A trial and error method used to decode encrypted data (such as passwords). Uses every combination until it hits upon the correct one.
  4. Open ________ - Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. May not be fully tested. Users have access to the source code

9 Clues: Software written in order to infect computers and commit crimes.Computer ________ Act 1990 - It is illegal to make any unauthorised access to dataData ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessaryOnline fraud technique used by criminals. It is designed to get you to give away personal information...

Cyber security Vocab 2 2021-09-28

Cyber security Vocab 2 crossword puzzle
Across
  1. means of restricting access to objects based on the identity of subjects and/or groups to which they belong
  2. measure of the likelihood that the biometric security system will correctly accept an access attempt by a user
  3. Body measurements related to human characteristics
  4. software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
  5. analyzes a user's digital physical and cognitive behavior
  6. method of linking a user's identity across multiple separate identity management systems
  7. means of restricting access to objects based on the identity of subjects and/or groups to which they belong
Down
  1. process of securing a system by reducing its surface of vulnerability
  2. Microsoft Windows directory service that allows IT administrators to manage users, applications, data, and various other aspects of their organization's network
  3. software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
  4. concept that has employees rotate through different jobs to learn the procedures and processes in each
  5. network authentication protocol
  6. verifying the identity of a user
  7. small device used with a computer
  8. measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user

15 Clues: network authentication protocolverifying the identity of a usersmall device used with a computerBody measurements related to human characteristicsanalyzes a user's digital physical and cognitive behaviorprocess of securing a system by reducing its surface of vulnerability...

Cyber security 6-8 2023-07-17

Cyber security 6-8 crossword puzzle
Across
  1. Fraudulent attempts to gain access to sensitive information, usually via email
  2. Protects digital information
  3. Software designed with malicious intent
  4. A secret code to protect access
  5. A technique used to take advantage of a vulnerability
  6. When sensitive information is released
  7. Software that locks users out of their system until payment is made
Down
  1. Malicious software that targets computers
  2. Software designed to spy on activity without the user's knowledge
  3. Software update to fix vulnerabilities and bugs
  4. Using two separate forms of authentication for secure access
  5. Technology used to monitor the outflow of sensitive data
  6. Network security system that prevents unwanted access

13 Clues: Protects digital informationA secret code to protect accessWhen sensitive information is releasedSoftware designed with malicious intentMalicious software that targets computersSoftware update to fix vulnerabilities and bugsNetwork security system that prevents unwanted accessA technique used to take advantage of a vulnerability...

Cyber Security Crossword - 1 2023-07-18

Cyber Security Crossword - 1 crossword puzzle
Across
  1. Tool used to hide online activity
  2. Malicious advertising that spreads malware
  3. Malware that locks files until a ransom is paid
  4. Fraudulent practice where individuals or entities impersonate legitimate sources to deceive and trick users into revealing sensitive information, such as passwords, credit card details, or personal data.
  5. Malicious software that secretly collects information
  6. is a computer on a network which acts as an intermediary for connections with other computers on that network
  7. Taking control of a user's web session
Down
  1. An online tool that helps conceal a user's identity and activities.
  2. Attacks that flood a system with excessive requests
  3. Attacks that redirect users to fake websites
  4. password cracking Technique of breaking passwords without an internet connection
  5. Sending a large volume of emails to overwhelm a server
  6. Tool used to capture keystrokes

13 Clues: Tool used to capture keystrokesTool used to hide online activityTaking control of a user's web sessionMalicious advertising that spreads malwareAttacks that redirect users to fake websitesMalware that locks files until a ransom is paidAttacks that flood a system with excessive requestsMalicious software that secretly collects information...

Cyber Security Puzzle 2021-10-06

Cyber Security Puzzle crossword puzzle
Across
  1. exploiting
  2. infected
  3. for preventing exploits
  4. computer virus!clicknow
Down
  1. unknown
  2. fishing
  3. code
  4. gather information
  5. spreading

9 Clues: codeunknownfishinginfectedspreadingexploitinggather informationfor preventing exploitscomputer virus!clicknow

Cyber Security Crossword 2013-11-03

Cyber Security Crossword crossword puzzle
Across
  1. Sending files to a server or computer to somewhere on the Internet.
  2. Software that harms or steals your data from your computer.
  3. Someone who is not using their real identity, an unknown name.
  4. The last part of an internet URL
Down
  1. Someone who views or changes information without permission.
  2. A name you use to instead of your real name on a website or on the computer.
  3. Combinations of text letters to make up an image of a facial expression.
  4. Something that you can plug into your computer. You can put data on it.
  5. Individual 'dots' in a monitor that make up the display on your screen.

9 Clues: The last part of an internet URLSoftware that harms or steals your data from your computer.Someone who views or changes information without permission.Someone who is not using their real identity, an unknown name.Sending files to a server or computer to somewhere on the Internet....

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Cybercross 2022-09-02

Cybercross crossword puzzle
Across
  1. A piece of software or a sequence of commands that takes advantage of a software vulnerability or security flaw
  2. The conversion of data from a readable format into an encoded format.
  3. A sequence of words or other text that a person uses to authenticate their identity.
  4. A principle that ensures timely and reliable access to information when required
  5. A network of hijacked devices used to carry out various scams and cyber attacks.
  6. A program or file designed to harm a computer, server, client, or computer network.
  7. A process of verifying users' identity.
  8. A security violation in which information is accessed by an unauthorized individual or system.
Down
  1. A program that slows down your computer and watches your online activities.
  2. A principle that ensures information is protected from unauthorized disclosure
  3. A principle that ensures information is not modified or deleted by unauthorized parties.
  4. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's established security policies.
  5. Act that involves someone seeking entry to a restricted area without proper authentication.
  6. A fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  7. Any circumstance or event with the potential to steal or damage data or disrupt computing systems.

15 Clues: A process of verifying users' identity.The conversion of data from a readable format into an encoded format.A program that slows down your computer and watches your online activities.A principle that ensures information is protected from unauthorized disclosureA principle that ensures timely and reliable access to information when required...

Data Security 2025-01-23

Data Security crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A weakness that can be exploited.
  3. Verifying the identity of a user or system before granting access.
  4. Maintaining the accuracy and completeness of data.
  5. The technique of obscuring specific data within a database to protect sensitive information.
  6. Data Loss Prevention, strategies to prevent data breaches.
Down
  1. Adhering to data protection regulations.
  2. An event that compromises data security.
  3. A copy of data stored separately to protect against data loss.
  4. Ensuring that information is accessible only to those authorized to have access.
  5. Software designed to harm or exploit any device, service, or network.
  6. A type of cyber attack where attackers trick individuals into providing sensitive information.
  7. An unauthorized access or exposure of sensitive data.
  8. The potential for loss or damage.
  9. A network security system that monitors and controls incoming and outgoing network traffic.

15 Clues: A weakness that can be exploited.The potential for loss or damage.Adhering to data protection regulations.An event that compromises data security.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

I4p0 quiz 1 2025-09-02

I4p0 quiz 1 crossword puzzle
Across
  1. 3D Printing is ... Manufacturing
  2. A in AR/VR
  3. ... Integration, Cross company data integration
  4. Replication of real-life scenario in virtual
  5. Type of security very imp in Industry 4.0
  6. Lot of Data produced by sensors
Down
  1. Using tools to visually represent data
  2. First I in IIoT

8 Clues: A in AR/VRFirst I in IIoTLot of Data produced by sensors3D Printing is ... ManufacturingUsing tools to visually represent dataType of security very imp in Industry 4.0Replication of real-life scenario in virtual... Integration, Cross company data integration

Data Security 2025-01-16

Data Security crossword puzzle
Across
  1. Adhering to data protection regulations.
  2. The potential for loss or damage.
  3. The technique of obscuring specific data within a database to protect sensitive information.
  4. A weakness that can be exploited.
  5. A network security system that monitors and controls incoming and outgoing network traffic.
  6. A copy of data stored separately to protect against data loss.
  7. A type of cyber attack where attackers trick individuals into providing sensitive information.
  8. Verifying the identity of a user or system before granting access.
Down
  1. An event that compromises data security.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Data Loss Prevention, strategies to prevent data breaches.
  4. The process of converting information into a secure format to prevent unauthorized access.
  5. Maintaining the accuracy and completeness of data.
  6. An unauthorized access or exposure of sensitive data.

14 Clues: The potential for loss or damage.A weakness that can be exploited.An event that compromises data security.Adhering to data protection regulations.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

RU ITEC411 Crime 2022-10-17

RU ITEC411 Crime crossword puzzle
Across
  1. amendment to the federal computer fraud law that confronts hackers
  2. the act of spying or using spies
  3. agency of the U.S. Department of Transportation(Federal Aviation Administration)
  4. a virus that is installed on a device and is sent to attack other systems
  5. provides evidence with computer forensics, investigations, and cyber security
  6. person who uses computers to gain unauthorized access to digital information
  7. denial of service attack
  8. agency of the U.S. that is tasked with the enforcement of civil antitrust law and the promotion of consumer protection(Federal Trade Commission)
  9. a book that is made available in digital form
  10. naming system used to identify computers that are reachable through the web(Domain Name Server)
Down
  1. hacking that contributes to a political agenda
  2. the event where hackers attacked a bay area transit system
  3. suppression or changing of inappropriate material
  4. the act of damaging the reputation of a person
  5. group of hackers who coordinated cyber attacks
  6. a statement of false information towards a person
  7. agent of government that is tasked with protecting the environment
  8. computer that helps manage account funds
  9. a book by C. Stoll that addresses hackers compromising their victims
  10. the attempt to overtake personal and financial information stored online

20 Clues: denial of service attackthe act of spying or using spiescomputer that helps manage account fundsa book that is made available in digital formhacking that contributes to a political agendathe act of damaging the reputation of a persongroup of hackers who coordinated cyber attackssuppression or changing of inappropriate material...

FITDVocab.MY 2013-05-15

FITDVocab.MY crossword puzzle
Across
  1. the VDU
  2. the tower
  3. opposite of pause
  4. also known as KB
  5. it eats cheese
  6. apps
  7. wireless fidelity
  8. without wires it can be 3g or 4g
  9. national cyber security alliance
  10. what is google
  11. connect without wires
  12. in the sky
  13. to search for search engines
  14. also known as TB
  15. visual display unit
  16. it is what comes before byte
  17. a printer
  18. keep your password secret
  19. random access memory
  20. folder
  21. a blank sheet you can type on
  22. not by hand
  23. where you put your flash drive
  24. to restart your computer
  25. light admitting diode
  26. the internet world
Down
  1. a symbol to represent your company
  2. enter instructions into a computer
  3. a keyboard
  4. CD drive
  5. a virus on your computer
  6. also known as GB
  7. internet service provider
  8. liquid crystal display
  9. online police
  10. a phone
  11. a catchy phrase to go with a logo
  12. online bullying
  13. the brain of the computer
  14. where you stick your headphones into
  15. extension cord operating systems
  16. old school with WIFI
  17. bigger than a bit
  18. the creator
  19. a packet of paper to advertise your company
  20. also know as MB
  21. computer processing unit
  22. service set identifier

48 Clues: appsfolderthe VDUa phoneCD drivethe towera printera keyboardin the skythe creatornot by handonline policeit eats cheesewhat is googleonline bullyingalso know as MBalso known as KBalso known as GBalso known as TBopposite of pausewireless fidelitybigger than a bitthe internet worldvisual display unitold school with WIFIrandom access memory...

social media 2 2024-07-11

social media 2 crossword puzzle
Across
  1. - to think
  2. - to bring
  3. - to threaten
  4. peur - to be afraid
  5. - to link
  6. - desperate
  7. - to facilitate
  8. - fraud
  9. - to sell
  10. intimidation - cyber bullying
  11. - to maintain
  12. - to belong
Down
  1. - disappointed
  2. - to aim
  3. - company
  4. - anonymous
  5. - to establish
  6. - to wait/expect
  7. - application
  8. - to suffer
  9. - goal/aim

21 Clues: - fraud- to aim- company- to link- to sell- to think- to bring- goal/aim- anonymous- to suffer- desperate- to belong- to threaten- application- to maintain- disappointed- to establish- to facilitate- to wait/expectpeur - to be afraidintimidation - cyber bullying

RU ITEC411 Crime and Security 2021-04-15

RU ITEC411 Crime and Security crossword puzzle
Across
  1. A security tool used to protect data by encoding it
  2. Hacking that has no ulterior motive, typically done for the challenge
  3. A person who is intruding in someone's computer
  4. An act that made hacking illegal and more punishable, but came out before the web was invented
  5. Exploits a servers vulnerabilities by flooding it with traffic, ex. Syn flood (2 hyphens)
  6. Type of Hacking with a political motive
  7. Hacker enlisted for penetration testing or hacks with good intent(hyphen)
  8. Company that was hacked through their heating and air conditioning units
  9. The opposite of slander, which is verbal defamation
Down
  1. Used by the computer to communicate with other hardware and manage it(hyphen)
  2. Authentication that use more that one way to identify yourself
  3. tests the strength of a company’s security through hacking
  4. The conflict that takes place through online and electronic means (hyphen)
  5. Security through facial recognition, fingerprints
  6. Software or programs that can damage or harm computers
  7. Encrypts files and will decrypt them when a payment of sorts is received by a Hacker
  8. A scam that targets people through various forms of messaging such as emails and texts
  9. A type of hacker with malicious intent (hyphen)
  10. Program corrupts other computers by reproduction
  11. Malicious software that is able to track and obtain information from the device its implanted on

20 Clues: Type of Hacking with a political motiveA person who is intruding in someone's computerA type of hacker with malicious intent (hyphen)Program corrupts other computers by reproductionSecurity through facial recognition, fingerprintsA security tool used to protect data by encoding itThe opposite of slander, which is verbal defamation...

Unit 3 Cyber Security 2017-04-28

Unit 3 Cyber Security crossword puzzle
Across
  1. Level of assurance that the data will be available to those who need it when they want it
  2. Countries have always spied on each other
  3. Gaining the trust of individuals and using that trust to influence them to give confidential information
  4. Rules which restrict access only to those who need to know
  5. Level of assurance which can be given as to the accuracy and trustworthiness of the data
  6. Sending so much traffic to a computer system that it cannot cope, denying access to legitimate users
  7. Devices or programs that detect attempts at intrusion and take action to prevent them
  8. Normally criminal activities because the intention is to cause harm to the computer or system
Down
  1. To see how the system copes when subjected to conditions which would cause the vulnerabilities to become apparent
  2. Exposes any attempts by attackers to overcome security controls to compromise data or other resources
  3. This includes cyber enabled crime and cyber dependent crime.
  4. Any threat which is a result of a natural event
  5. Any threat to the system or computer through physical access. These include loss or theft of equipment. E.g. tablet or laptop, portable memory

13 Clues: Countries have always spied on each otherAny threat which is a result of a natural eventRules which restrict access only to those who need to knowThis includes cyber enabled crime and cyber dependent crime.Devices or programs that detect attempts at intrusion and take action to prevent them...

Y9 Cyber Security 2021-02-09

Y9 Cyber Security crossword puzzle
Across
  1. A type of network that doesn't need wires
  2. A short range network technology used for connecting smart watches and smartphones
  3. The colour hat for this illegal hacker
Down
  1. Weaknesses in systems that allow for hacking
  2. A type of malware
  3. Malicious software
  4. Scrambling data so that it cant be read without the key
  5. The Computer Misuse Act and GDPR are examples of this
  6. The type of hacking done by a white hat hacker

9 Clues: A type of malwareMalicious softwareThe colour hat for this illegal hackerA type of network that doesn't need wiresWeaknesses in systems that allow for hackingThe type of hacking done by a white hat hackerThe Computer Misuse Act and GDPR are examples of thisScrambling data so that it cant be read without the key...

Crossword Labs 2023-01-05

Crossword Labs crossword puzzle
Across
  1. An update in an operating system or application to fix bug & improve performance or security
  2. Emails sent to trick users to reveal their sensitive information.
  3. Phishing Techniques used to target CEO,CFO etc.
  4. Scrambling of text in order to ensure the security of data/ information
  5. Existence of weakness in a system or network
Down
  1. Socially or politically motivated hackers
  2. Sending bulk messages by abusing electronic messaging system
  3. Gaining access to a secured area by going behind an authorized person
  4. Technique of Hiding data behind a photo
  5. Hackers with main motive to gain financial profit by doing cyber crimes
  6. Unauthorized softwares installed on computer to gather sensitive information
  7. Software designed to help the user's computer to detect viruses & avoid them

12 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Sending bulk messages by abusing electronic messaging systemEmails sent to trick users to reveal their sensitive information....

ISSO June 2021 2021-06-07

ISSO June 2021 crossword puzzle
Across
  1. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
  2. The physical separation or isolation of a system from other systems or networks is known as an __ __.
  3. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
  4. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
  5. IRM office responsable for Cyber Operations oversight.
  6. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
  7. vulnerabilities must be remediated within ___calendar days of initial detection.
  8. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
  9. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
  10. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
  1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
  2. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
  3. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
  4. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
  5. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
  6. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
  7. ISSO duties must be performed using an ISSO ___ account.
  8. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
  9. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.

19 Clues: IRM office responsable for Cyber Operations oversight.ISSO duties must be performed using an ISSO ___ account.vulnerabilities must be remediated within ___calendar days of initial detection.Criminal organization responsable for the cyber attack against the Colonial Pipeline....

Learning Unit 11 - Legal issues in information security and risk management 2023-05-29

Learning Unit 11 - Legal issues in information security and risk management crossword puzzle
Across
  1. which involves any illegal act which involves a computer whether the computer is an object of a crime, an instrument used to commit a crime or a repository of evidence related to a crime and includes the statutory cyber crimes set out in sections 85 to 88 of the ECT Act.
  2. where the concepts of “reasonableness” and “duty of care” are being relied upon to determine whether or not organisations have been negligent in not taking the necessary security precautions, or are liable for loss suffered where it is proved by a party who suffered loss that their loss should have been reasonably foreseeable and due to the others parties negligence, loss or damage has been suffered by the other party.
  3. Many jurisdictions have enacted breach notification laws that require organizations to notify affected individuals, regulators, or authorities in the event of a data breach. These laws often have specific timelines for reporting breaches and may also outline the content and format of the notifications.
  4. where information technology contracts such as outsourcing, service provision, application service provider and software licensing agreements are beginning to impose security obligations on vendors and business partners. These agreements increasing require the providers of information technology to warrant against security vulnerabilities, such as viruses and trojan horses, and organisations are more frequently being contractually obligated to protect a customer’s, employee’s, or business partner’s personal or confidential information. Similarly, businesses are often required to agree to security commitments as a condition of participating in certain activities. For example, merchants that want to accept credit cards, must agree to comply with the PCI Data Security Standard (click here to read our post on the Standard).
  5. (e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication.
  6. Various data protection and privacy laws, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, regulate the collection, storage, processing, and transfer of personal data. Organizations must comply with these laws and implement appropriate security measures to safeguard personal information.
  7. in terms of section 87 of the ECT Act where the victim of an information security attack conducted by means of impersonation or spoofing could lay a criminal charge of fraud against the attacker based on the attacker’s attempt to mislead or misappropriate something of value
  8. Laws related to cybercrime and computer fraud address offenses like hacking, unauthorized access, identity theft, malware distribution, and other cyber-related crimes. These laws provide legal frameworks for prosecuting individuals or organizations engaged in illegal activities targeting information systems and networks.
Down
  1. Organizations need to protect their intellectual property rights, such as trade secrets, patents, copyrights, and trademarks. Implementing robust security measures and employing legal mechanisms to safeguard intellectual property is crucial for mitigating risks associated with unauthorized access or theft.
  2. in connection with forensic issues relating to information in electronic form which may have been modified or deleted in an attempt to hide the evidence and the taking of necessary steps to ensure that the reliability and admissibility of the electronic evidence will be maintained in the eyes of a Court of law.
  3. Transferring personal data across international borders may be subject to specific legal requirements. Adequate safeguards, such as Standard Contractual Clauses (SCCs) or Binding Corporate Rules (BCRs), may need to be implemented to ensure compliance with applicable data protection laws.
  4. where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”.
  5. Contracts, such as service level agreements (SLAs) and vendor agreements, play a crucial role in managing information security risks. Organizations should include provisions that outline security responsibilities, breach notification requirements, and liability allocation in case of security incidents.
  6. play a significant role in information security and risk management. Several laws and regulations govern the protection of sensitive information, privacy, and the management of risks associated with data breaches and cybersecurity incidents.
  7. where for example a person submits personal information to an organisation for a certain purpose and the organisation reveals the information to a third party who misuses the information causing the person to suffer damage or loss (for example, in the context of ‘data swops’ between organisations).
  8. where ordinary electronic signatures and “advanced” electronic signatures play a role in securing information pursuant to sections 13 of the ECT Act.
  9. has introduced the concepts of providing appropriate, reasonable technical and organisational measures to protect personal information.
  10. under the soon to be enacted Protection of Personal Information Bill.
  11. for example identity theft
  12. where King III™ requires appropriate information security controls to protect companies and their shareholders.

20 Clues: for example identity theftunder the soon to be enacted Protection of Personal Information Bill.where section 43 (5) of the ECT Act requires the use of a payment system which is “sufficiently secure”.(e.g. the SA Post Office Trust Centre) which includes digital certificates and electronic authentication....

What is Cyber Security: Vocabulary Review 2024-09-04

What is Cyber Security: Vocabulary Review crossword puzzle
Across
  1. the practice of isolating resources and controlling access to them through APIs or strict interfaces
  2. a design technique that separates the functionality of a program into independent, interchangeable components.
  3. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
  4. the practice of protecting data from unauthorized access, disclosure, or alteration
  5. the protection of data from unauthorized modification or deletion.
  6. a cybersecurity technique that protects processes from each other on an operating system.
  7. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
  8. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
  9. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
  10. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
  1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
  2. the ability to reliably access and use information in a timely manner.
  3. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
  4. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
  5. the practice of reducing unnecessary complexity and focusing on what's essential
  6. a way of looking at the world from the perspective of a hacker

16 Clues: a way of looking at the world from the perspective of a hackerthe protection of data from unauthorized modification or deletion.the ability to reliably access and use information in a timely manner.the practice of reducing unnecessary complexity and focusing on what's essential...

Cybersecurity Crossword 2024-03-20

Cybersecurity Crossword crossword puzzle
Across
  1. Measures adopted to protect systems and data from cyber threats.
  2. A network-connected computer or device.
  3. A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
  4. The process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. A powerful tool used for penetration testing, security research, and IDS signature development.
  3. The process or action of verifying the identity of a user or process.
  4. A country in Europe known for its precision engineering and historical contributions to science and technology.

8 Clues: A network-connected computer or device.Measures adopted to protect systems and data from cyber threats.The process or action of verifying the identity of a user or process.A powerful tool used for penetration testing, security research, and IDS signature development....

Information Security 2023-12-12

Information Security crossword puzzle
Across
  1. 57% of organizations see at least weekly phishing attempts
  2. The most common target of phishing attacks are ____
  3. The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
  4. 94% of malware is delivered by ____
  5. You should ____ over a link in an email to preview the actual address before clicking
Down
  1. Lock your ____ when you step away
  2. German American's Information Security Officer is
  3. ____ is one of the most common and dangerous forms of cyber crime
  4. Phishing is an attempt to obtain sensitive ____ with malicious intent
  5. Display names and email domains can be ____ hiding the true identity and appearing trustworthy
  6. Report spam/suspicious emails through the ____ button on the Outlook toolbar
  7. Our first line of defense against cybersecurity attacks and fraud is ___
  8. At German American, _____ is responsible for information security

13 Clues: Lock your ____ when you step away94% of malware is delivered by ____German American's Information Security Officer isThe most common target of phishing attacks are ____57% of organizations see at least weekly phishing attempts____ is one of the most common and dangerous forms of cyber crime...

Cyber Security Month 2021 2021-09-17

Cyber Security Month 2021 crossword puzzle
Across
  1. ____ all devices and software to keep them protected.
  2. Trying to get someone to divulge confidential information.
  3. Scams through a phone call.
  4. Place online where cybercriminals share and sell stolen information
  5. You should always ____ your computer before walking away.
  6. ____ any suspected malicious activity to Risk Management.
Down
  1. Principle of accessing only what you need.
  2. Scams through a text message.
  3. Should be installed on all computers to protect against malicious software.
  4. ____ any paper documents when they are no longer needed.
  5. Malicious software that holds data hostage.
  6. Enforce strong ____ on all systems.
  7. Scams through email.

13 Clues: Scams through email.Scams through a phone call.Scams through a text message.Enforce strong ____ on all systems.Principle of accessing only what you need.Malicious software that holds data hostage.____ all devices and software to keep them protected.____ any paper documents when they are no longer needed....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Enforce strong ____ on all systems.
  2. Scams through a phone call.
  3. Principle of accessing only what you need.
  4. Scams through a text message.
  5. Place online where cybercriminals share and sell stolen information.
  6. ____ any suspected malicious activity to Risk Management.
Down
  1. Trying to get someone to divulge confidential information.
  2. Malicious software that holds data hostage.
  3. ____ all devices and software to keep them protected.
  4. ____ any paper documents when they are no longer needed.
  5. Should be installed on all computers.
  6. Scams through an email.
  7. You should always ____ your computer before walking away.

13 Clues: Scams through an email.Scams through a phone call.Scams through a text message.Enforce strong ____ on all systems.Should be installed on all computers.Principle of accessing only what you need.Malicious software that holds data hostage.____ all devices and software to keep them protected.____ any paper documents when they are no longer needed....

cyber security-crossword puzzle 2025-02-13

cyber security-crossword puzzle crossword puzzle
Across
  1. a flaw or weakness in a system that could be exploited
  2. keyword that refers to online world
  3. computer programs that can block detect and remove viruses and other malware
  4. a type of malware that denies user's access to a system or data until a sum of money is paid
  5. feeling of being secure, protected from adversaries
  6. an individual group organization or government that conducts or has the intent to conduct detrimental activities
Down
  1. Extra copies of computer files that can be used to restore the files
  2. unauthorized user who attempts to or gains access to an information system
  3. converting data into a form that can't be understood by unauthorized people
  4. mechanism for creating secure connection between computer device and computer network
  5. attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources
  6. a network security device designed to monitor, filter incoming and outgoing network traffic
  7. malicious software or malware, that spreads between computers and causes damage to data and software

13 Clues: keyword that refers to online worldfeeling of being secure, protected from adversariesa flaw or weakness in a system that could be exploitedExtra copies of computer files that can be used to restore the filesunauthorized user who attempts to or gains access to an information system...

Easy Cyber Security 2021-11-28

Easy Cyber Security crossword puzzle
Across
  1. the topic is
  2. not fishing but
  3. I should open every attachment I get
  4. Bad software that infects your computer is called ______
  5. the people who attack us are called ______
Down
  1. A ____ breech is when a criminal steals confidential information
  2. you can't use your computer until you pay because you have _______
  3. I should always use a ______ password
  4. you get an email from someone you don't know asking you to open an attachment it is a

9 Clues: the topic isnot fishing butI should open every attachment I getI should always use a ______ passwordthe people who attack us are called ______Bad software that infects your computer is called ______A ____ breech is when a criminal steals confidential informationyou can't use your computer until you pay because you have _______...

Hardware/Cyber Security 2020-10-13

Hardware/Cyber Security crossword puzzle
Across
  1. memory stored in a computer that lasts forever
  2. a scam email with a link aimed to steal things such as your IP address
  3. an AI used to swarm or abuse abilities of web pages, nowadays web pages have protection against these.
  4. short for malicious software
  5. a type of malware that is capable of copying itself and spreading to other devices
  6. temporary memory inside of a computer
Down
  1. holds and allows communication between many of the crucial electronic components of a system, such as the CPU and memory,
  2. the brain of the computer
  3. when content inside of your computer is stolen and they ask for money to get it back

9 Clues: the brain of the computershort for malicious softwaretemporary memory inside of a computermemory stored in a computer that lasts forevera scam email with a link aimed to steal things such as your IP addressa type of malware that is capable of copying itself and spreading to other devices...

Cyber Security Crossword 2023-07-24

Cyber Security Crossword crossword puzzle
Across
  1. ______ are damaging to the reputation of companies and expose their customers to identity theft
  2. ______ determines an authenticated person’s or service’s level of access. It defines which data they can access, and what they can do with it
  3. ______ refers to the accuracy and consistency of data and information. Ensuring data integrity means preventing unauthorized alterations or tampering of data
  4. ______ is a type of social engineering where an attacker sends a fraudulent message designed to convince you to provide sensitive information via a message or a fraudulent web site, gain access to your device by convincing you to click on a link or open an attachment that contains malware, and convince you to provide something of value to the attacker
  5. ______ refers to the principle of ensuring that authorized users have access to the information they need when they need it. This can be achieved through measures such as redundant systems, backups, and disaster
Down
  1. ______ is a type of software designed to damage or disrupt computer systems
  2. The principle of ______ involves protecting sensitive information from unauthorized access. This can be achieved through methods such as encryption or access controls
  3. ______ is a process verifying the identity of a person or service. It requests legitimate access credentials and basis for creating secure identity and access control principles
  4. ______ is vicious malware that locks users out of their devices until they pay a ransom

9 Clues: ______ is a type of software designed to damage or disrupt computer systems______ is vicious malware that locks users out of their devices until they pay a ransom______ are damaging to the reputation of companies and expose their customers to identity theft...

Cyber Security Awareness 2024-06-15

Cyber Security Awareness crossword puzzle
Across
  1. String of characters that allows access to a computer system
  2. Harmful software
  3. Program that spreads between computers and infects files
  4. Unauthorized access to computer systems
Down
  1. Secret word or phrase
  2. Weakness in a system
  3. Type of attack where services are disrupted
  4. Safeguarding of personal information
  5. Act of deceiving someone

9 Clues: Harmful softwareWeakness in a systemSecret word or phraseAct of deceiving someoneSafeguarding of personal informationUnauthorized access to computer systemsType of attack where services are disruptedProgram that spreads between computers and infects filesString of characters that allows access to a computer system

Security Crossword Puzzle - October 2021 2021-10-01

Security Crossword Puzzle - October 2021 crossword puzzle
Across
  1. This is a software vulnerability usually found in Web applications that allows online criminals to inject client-side script into pages that other users view
  2. This is a program used for security purposes which is able to simulate one or more network services to look like a vulnerability and act as a bait to the attacker
  3. You should not just check identity; you should also confirm
  4. Hackers take advantage from this type of attack that can lead to unauthorized code running or system crashes
Down
  1. In cyber security, intrusion refers to the act of getting around a system’s security mechanisms to gain unauthorized access.
  2. The process of stealing someone’s personal identification data and using it online in order to pose as that person
  3. The main goal of this process is to identify, analyze and present facts about a digital investigation. The conclusions of this can be used in fight against cyber-crime or for civil proceedings
  4. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  5. In cryptography, this attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing it correctly
  6. This can slow down your computer and watch everywhere you go on the internet

10 Clues: You should not just check identity; you should also confirmThis can slow down your computer and watch everywhere you go on the internetHackers take advantage from this type of attack that can lead to unauthorized code running or system crashes...

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. a word or phrase to protect your device
  2. something stopping hackers get into your personal information
  3. sending fake emails
  4. an infection on your phone
Down
  1. looking at someone putting in their password
  2. stealing someone's personal information

6 Clues: sending fake emailsan infection on your phonea word or phrase to protect your devicestealing someone's personal informationlooking at someone putting in their passwordsomething stopping hackers get into your personal information

Cyber Security 2021-03-30

Cyber Security crossword puzzle
Across
  1. an algorithm for transforming original message to coded message
  2. is the process of verifying the identity of a person or device
Down
  1. is the method by which information is converted into secret code that hides the information's true meaning.
  2. it is the defense of digital information and IT assets against internal and external, malicious and accidental threats
  3. study of encryption principles
  4. an attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset.

6 Clues: study of encryption principlesis the process of verifying the identity of a person or devicean algorithm for transforming original message to coded messageis the method by which information is converted into secret code that hides the information's true meaning....

Cyber Security 2023-09-19

Cyber Security crossword puzzle
Across
  1. Software used to spy on people to get passwords or bank details.
  2. Software used to protect computers against viruses.
  3. App or game that looks legitimate but contains a virus or worm.
Down
  1. Type of hacker who hacks for selfish reasons.
  2. Type of hacker who hacks for the government.
  3. Person pretending to be someone else to steal data.

6 Clues: Type of hacker who hacks for the government.Type of hacker who hacks for selfish reasons.Person pretending to be someone else to steal data.Software used to protect computers against viruses.App or game that looks legitimate but contains a virus or worm.Software used to spy on people to get passwords or bank details.

Cyber Security 2024-03-25

Cyber Security crossword puzzle
Across
  1. Security systems designed to prevent unauthorized access to or from a private network.
  2. Networks of hijacked computer devices used to carry out various scams and cyber attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

6 Clues: Security systems designed to prevent unauthorized access to or from a private network.Networks of hijacked computer devices used to carry out various scams and cyber attacks.Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system....

CYBER SECURITY 2024-08-18

CYBER SECURITY crossword puzzle
Across
  1. virtual wall that filters incoming traffic
  2. the act of intruding
  3. aim to steal account credentials
  4. steal sensitive information
Down
  1. a malicious software
  2. set of programs that protect your software

6 Clues: a malicious softwarethe act of intrudingsteal sensitive informationaim to steal account credentialsvirtual wall that filters incoming trafficset of programs that protect your software

Cyber-Security 2023-01-16

Cyber-Security crossword puzzle
Across
  1. a person's personal information
  2. Securing Social media accounts
  3. protect computer from unwanted emails
Down
  1. piece of information stored on the internet when you browse online
  2. illegal and unauthorised access to someone's PC
  3. attempt to acquire personal info by posing as trustworthy authority

6 Clues: Securing Social media accountsa person's personal informationprotect computer from unwanted emailsillegal and unauthorised access to someone's PCpiece of information stored on the internet when you browse onlineattempt to acquire personal info by posing as trustworthy authority

Cyber Security 2025-10-21

Cyber Security crossword puzzle
Across
  1. Crime involving stealing someone's personal information.
  2. Software that is designed to damage or disrupt systems.
Down
  1. A scam where attackers trick users into giving personal information.
  2. A type of malware that pretends to be legitimate software.
  3. A type of malware that attaches itself to clean files.
  4. A self-replicating malware that spreads without user action.

6 Clues: A type of malware that attaches itself to clean files.Software that is designed to damage or disrupt systems.Crime involving stealing someone's personal information.A type of malware that pretends to be legitimate software.A self-replicating malware that spreads without user action....

Tech crossword 2022-10-01

Tech crossword crossword puzzle
Across
  1. Most used Javascript backend runtime
  2. Leading public cloud provider
  3. Diffusion based image generation Tool by Google
  4. Modelling language used for Software Design
Down
  1. Most important resource in Machine Learning
  2. Wireless networking
  3. Popular crypto-currency used for smart-contracts
  4. Linux version used famously for cyber-security

8 Clues: Wireless networkingLeading public cloud providerMost used Javascript backend runtimeMost important resource in Machine LearningModelling language used for Software DesignLinux version used famously for cyber-securityDiffusion based image generation Tool by GooglePopular crypto-currency used for smart-contracts

CS Month Week 1 2023-09-14

CS Month Week 1 crossword puzzle
Across
  1. ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
  2. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
  3. ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
  4. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
  5. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
  1. _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
  2. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
  3. A software update released to fix vulnerabilities and improve security in applications or systems.
  4. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
  5. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.

10 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques.A software update released to fix vulnerabilities and improve security in applications or systems.Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data...

Cyber Bullying 2014-01-26

Cyber Bullying crossword puzzle
Across
  1. Cyber bullies may feel lesser E_________ for victims.
  2. Always put yourself in the S________ of others.
  3. Cyber bullies do it I________. (On purpose)
  4. Be K______ to others.
  5. Cyber Bullies do it over the I__________.
Down
  1. Cyber bullying may have greater R________.
  2. Keep your settings P_________.
  3. Don't H______ others.
  4. T_______ someone when you are being bullied.
  5. Save the E__________ by taking screenshots of yourself being bullied.
  6. Victims of Cyber bullying may turn to D________ ways to try to cope.
  7. Don't share your P___________.
  8. T_________ before you post.

13 Clues: Don't H______ others.Be K______ to others.T_________ before you post.Keep your settings P_________.Don't share your P___________.Cyber Bullies do it over the I__________.Cyber bullying may have greater R________.Cyber bullies do it I________. (On purpose)T_______ someone when you are being bullied.Always put yourself in the S________ of others....

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

Cybersecurity 2023-04-01

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

Crossword Puzzle 0123 2023-01-05

Crossword Puzzle 0123 crossword puzzle
Across
  1. Technique of Hiding data behind a photo
  2. Software designed to help the user's computer detect viruses & avoid them
  3. Gaining access to a secured area by going behind an authorized person
  4. Hackers with main motive to gain financial profit by doing cyber crimes
  5. Emails sent to trick users to reveal their sensitive information.
  6. Phishing Techniques used to target CEO,CFO etc.
Down
  1. Existence of weakness in a system or network
  2. Socially or politically motivated hackers
  3. Scrambling of text in order to ensure the security of data/ information
  4. Sending bulk messages by abusing electronic messaging system
  5. An update in an operating system or application to fix bug & improve performance or security
  6. Unauthorized softwares installed on computer to gather sensitive information

12 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Sending bulk messages by abusing electronic messaging systemEmails sent to trick users to reveal their sensitive information....

Solution Update 2016-04-01

Solution Update crossword puzzle
Across
  1. Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
  2. Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
  1. Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
  2. Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
  3. Wie lautet der Name der modularen HPE Switches für Software Defined Networks?

5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks?Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für….....

Solution Update 2016-04-01

Solution Update crossword puzzle
Across
  1. Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
  2. Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
  1. Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
  2. Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
  3. Wie lautet der Name der modularen HPE Switches für Software Defined Networks?

5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks?Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?...

FIT-D Technology Vocab. 2013-05-14

FIT-D Technology Vocab. crossword puzzle
Across
  1. NAtional Cyber Security Alliance
  2. Processing Speed (Central Processing Unit)
  3. a slot where you can plug in different peripherals
  4. Short Term Memory (Random Access Memory)
  5. a program that allows you to search different things (Google, Bing)
  6. Device potable devices with internet
  7. the long-term memory on your computer
  8. Potable Document File
Down
  1. the act of startin a new practice or operation, usually with government
  2. Liquid Crystal Display/Light Emitting Diode
  3. the "brain" of the computer
  4. an electronic device that helps you to navigate the cursor around the screen
  5. Internet Service Provider

13 Clues: Potable Document FileInternet Service Providerthe "brain" of the computerNAtional Cyber Security AllianceDevice potable devices with internetthe long-term memory on your computerShort Term Memory (Random Access Memory)Processing Speed (Central Processing Unit)Liquid Crystal Display/Light Emitting Diode...

Digital Footprint-Heather Berdine 2018-09-29

Digital Footprint-Heather Berdine crossword puzzle
Across
  1. Citizen You on the internet
  2. Drive A Unit used to connect data
  3. The Link between Data and Internet
  4. Footprint Only seen when you Release Personal info
  5. A Unit of patched Data
  6. a Link to the Internet
  7. What you use to search the web
  8. A Site linked with a URL
Down
  1. Hat Hackers People who try to steal Personal Info
  2. a Pocket Device for everyday use
  3. A link to a site
  4. Hat Hackers People who improve security on computers
  5. Native Someone who has grown with the Internet
  6. A Mini Treat for your browser
  7. The World of Online
  8. Footprint Just a Normal footprint on the internet
  9. A Unit that manages Data

17 Clues: A link to a siteThe World of OnlineA Unit of patched Dataa Link to the InternetA Unit that manages DataA Site linked with a URLCitizen You on the internetA Mini Treat for your browserWhat you use to search the weba Pocket Device for everyday useDrive A Unit used to connect dataThe Link between Data and Internet...

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. something u put in to authenticate that u are who u say u are
  2. watching someone put there password in
Down
  1. identifying u by your body features
  2. something that helps protect computers from getting hacked
  3. has 2 meanings one is decease one is a computer one
  4. engineering the art of tricking or manipulating to get people to reveal there personal info

6 Clues: identifying u by your body featureswatching someone put there password inhas 2 meanings one is decease one is a computer onesomething that helps protect computers from getting hackedsomething u put in to authenticate that u are who u say u areengineering the art of tricking or manipulating to get people to reveal there personal info

Cyber Security 2022-09-18

Cyber Security crossword puzzle
Across
  1. Attempt to acquire sensitive information such as username, passwords and credit card details
  2. Someone steals your personal information to commit fraud
Down
  1. creation of e mail messages with forged sender address
  2. The use of electronic communication to harass a person typically by sending messages of an intimidating or threatening nature
  3. The practice of taking someone elses work or ideas and passing them off as ones own
  4. a person who uses computers to gain unauthorized access to data.

6 Clues: creation of e mail messages with forged sender addressSomeone steals your personal information to commit frauda person who uses computers to gain unauthorized access to data.The practice of taking someone elses work or ideas and passing them off as ones ownAttempt to acquire sensitive information such as username, passwords and credit card details...

Staying safe online 2024-05-16

Staying safe online crossword puzzle
Across
  1. security staying safe online
  2. a program that infects files quickly
  3. a way to keep your device safe
  4. news misleading imformation
Down
  1. taking advantage of someone online who trusts you
  2. a name someone goes by on the internet
  3. telling a trusted adult or someone you trust
  4. sending inappropriate messages or photos
  5. protected from danger or risk of harm

9 Clues: news misleading imformationsecurity staying safe onlinea way to keep your device safea program that infects files quicklyprotected from danger or risk of harma name someone goes by on the internetsending inappropriate messages or photostelling a trusted adult or someone you trusttaking advantage of someone online who trusts you

Cyber security 2020-09-08

Cyber security crossword puzzle
Across
  1. a travez de internet obtiene datos privados de los usuarios
  2. almacenan informacion sobre vos
  3. es un correo electronico no solicitado
  4. evita el acceso no autorizado a una red privada
Down
  1. programa para detectar y eliminar virus
  2. diseñado para infiltrarse en su dispositivo sin su conocimiento

6 Clues: almacenan informacion sobre voses un correo electronico no solicitadoprograma para detectar y eliminar virusevita el acceso no autorizado a una red privadaa travez de internet obtiene datos privados de los usuariosdiseñado para infiltrarse en su dispositivo sin su conocimiento

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. something u put in to authenticate that u are who u say u are
  2. watching someone put there password in
Down
  1. identifying u by your body features
  2. something that helps protect computers from getting hacked
  3. has 2 meanings one is decease one is a computer one
  4. engineering the art of tricking or manipulating to get people to reveal there personal info

6 Clues: identifying u by your body featureswatching someone put there password inhas 2 meanings one is decease one is a computer onesomething that helps protect computers from getting hackedsomething u put in to authenticate that u are who u say u areengineering the art of tricking or manipulating to get people to reveal there personal info

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. type of destructive software
  2. this is a bad thing that happens online
  3. software that enables a user to obtain covert information about another's computer activities
Down
  1. you may be at risk of getting hacked
  2. danger that occur online
  3. a type of virus that hides it self

6 Clues: danger that occur onlinetype of destructive softwarea type of virus that hides it selfyou may be at risk of getting hackedthis is a bad thing that happens onlinesoftware that enables a user to obtain covert information about another's computer activities

Cyber security 2022-11-18

Cyber security crossword puzzle
Across
  1. a malicious form of self-replicating software.
  2. software that is designed to gain access to your computer with malicious intent.
  3. spread through the network and use the system’s resources.
  4. locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
  1. unwanted software that monitors and gathers information on a person and how they use their computer.
  2. unwanted software that monitors and gathers information on a person and how they use their computer.
  3. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions

7 Clues: a malicious form of self-replicating software.spread through the network and use the system’s resources.software that is designed to gain access to your computer with malicious intent.unwanted software that monitors and gathers information on a person and how they use their computer....

Cyber security 2022-05-09

Cyber security crossword puzzle
Across
  1. the use of deception to manipulate individuals
  2. submitting many passwords or passphrases with the hope of eventuallly guessing correctly
  3. an attack meant to shut down a machine or network, making it inaccessible to its intended users
Down
  1. People who hack and try steal your data
  2. A high-level general-purpose programming language
  3. A piece of code which is capable of copying itself

6 Clues: People who hack and try steal your datathe use of deception to manipulate individualsA high-level general-purpose programming languageA piece of code which is capable of copying itselfsubmitting many passwords or passphrases with the hope of eventuallly guessing correctly...

Cyber Security 2025-10-10

Cyber Security crossword puzzle
Across
  1. Sending communications that appear to come from authentic source
  2. Hardware/ software that keeps network safe
  3. Unwanted and unsolicited message in the inbox of email
  4. Files that are temporarily downloaded from a website
Down
  1. It is a wireless connection - wireless fidelity
  2. It is a key of codes that protects our email, document, or files safe

6 Clues: Hardware/ software that keeps network safeIt is a wireless connection - wireless fidelityFiles that are temporarily downloaded from a websiteUnwanted and unsolicited message in the inbox of emailSending communications that appear to come from authentic sourceIt is a key of codes that protects our email, document, or files safe

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. Is attemp to hide malicious programs
  2. it is a type of network that allows computer or an entire network to connect to each other
  3. Short form of domain name server
  4. A small computer program
  5. botnet other name
  6. Which is used to identify mobile,handset and device
Down
  1. A type of cyber security tried
  2. Wireless area network
  3. A type of eaves dropping attack
  4. first ever online registered virus
  5. Is called spoof mail

11 Clues: botnet other nameIs called spoof mailWireless area networkA small computer programA type of cyber security triedA type of eaves dropping attackShort form of domain name serverfirst ever online registered virusIs attemp to hide malicious programsWhich is used to identify mobile,handset and device...

Cyber Crossword 2022-09-28

Cyber Crossword crossword puzzle
Across
  1. Type of computer program that can infect a computer.
  2. ______ software means your systems are less likely to be vulnerable to ransomware attacks, malware, and data breaches.
  3. When working remotely or at a public space, ______ allows for secure access to your company's network.
  4. Cyber security is a shared ______.
  5. A social engineering technique that is frequently used to acquire user information, typically through emails or messages.
Down
  1. A data ______ happens when personal information is accessed, disclosed without authorisation, or is lost.
  2. Who can be a target of cyber-attack?
  3. Never leave your computers ______ when in a public space or while remote working.
  4. ______ wi-fi are unsafe and cannot be trusted.

9 Clues: Cyber security is a shared ______.Who can be a target of cyber-attack?______ wi-fi are unsafe and cannot be trusted.Type of computer program that can infect a computer.Never leave your computers ______ when in a public space or while remote working....

CAES Security Week 2024-01-29

CAES Security Week crossword puzzle
Across
  1. This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
  2. Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
  3. The process of converting information into a code to secure it from unauthorized access.
  4. Weaknesses or flaws in a system’s security that could be exploited by attackers.
  5. A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
  6. Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
  1. Software updates designed to fix security vulnerabilities and improve overall system performance.
  2. Unauthorized access or breach into a system, network, or device.
  3. The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
  4. The art of writing or solving codes; used in cybersecurity to secure communication through encryption.

10 Clues: Unauthorized access or breach into a system, network, or device.Weaknesses or flaws in a system’s security that could be exploited by attackers.The process of converting information into a code to secure it from unauthorized access.Software updates designed to fix security vulnerabilities and improve overall system performance....

Cyber Security 2021-06-28

Cyber Security crossword puzzle
Across
  1. When reading a URL, you will want to start on the
  2. All domain names end in this.
  3. To see the full message header when using gmail, you will select
  4. URL stands for Uniform Resource
Down
  1. Information that is located in the metadata of a media file
  2. This is the short version of Open Source Intelligence gathering

6 Clues: All domain names end in this.URL stands for Uniform ResourceWhen reading a URL, you will want to start on theInformation that is located in the metadata of a media fileThis is the short version of Open Source Intelligence gatheringTo see the full message header when using gmail, you will select

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. looking over someone's shoulder to get their information.
  2. something to stop you using certain websites.
Down
  1. someone sending a fake email asking for money or details.
  2. not in a pond.
  3. something to get you into a account.
  4. something that copies versions of its self.

6 Clues: not in a pond.something to get you into a account.something that copies versions of its self.something to stop you using certain websites.someone sending a fake email asking for money or details.looking over someone's shoulder to get their information.

cyber security 2022-01-13

cyber security crossword puzzle
Across
  1. an attempt by hackers to damage or destroy a computer network or system
  2. designed to detect and destroy computer viruses
Down
  1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
  2. are small files that Web sites put on your computer hard disk drive when you first visit
  3. any software program in which advertising banners are displayed while the program is running
  4. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed

6 Clues: designed to detect and destroy computer virusesan attempt by hackers to damage or destroy a computer network or systemare small files that Web sites put on your computer hard disk drive when you first visitany software program in which advertising banners are displayed while the program is running...

Cyber Security 2024-05-12

Cyber Security crossword puzzle
Across
  1. What is the malicious software that can replicate itself and spread to other computers?
  2. What is the practice of protecting information by transforming it into an unreadable format called?
  3. What is the term for a software program designed to block unauthorized access to a computer system?
Down
  1. What term describes a secret word or phrase used for authentication?
  2. What is the name for a malicious software designed to block access to a computer system until a sum of money is paid?
  3. What type of attack involves sending fraudulent emails to trick individuals into revealing sensitive information?

6 Clues: What term describes a secret word or phrase used for authentication?What is the malicious software that can replicate itself and spread to other computers?What is the practice of protecting information by transforming it into an unreadable format called?...

Cyber Security 2024-04-19

Cyber Security crossword puzzle
Across
  1. A type of malware that restricts access to your system until a ransom is paid.
  2. This type of software is designed to protect your computer from malware.
Down
  1. The act of protecting data from unauthorized access.
  2. A common method of protecting your accounts; it's best to have a strong one.
  3. A type of security threat that often appears as a legitimate email
  4. A secure protocol used for sending data securely over the internet.

6 Clues: The act of protecting data from unauthorized access.A type of security threat that often appears as a legitimate emailA secure protocol used for sending data securely over the internet.This type of software is designed to protect your computer from malware.A common method of protecting your accounts; it's best to have a strong one....

Cyber Security 2025-02-10

Cyber Security crossword puzzle
Across
  1. Databreaches
  2. encryption
  3. Authentication
Down
  1. Passwordprotection
  2. securityprotocols
  3. firewall
  4. Authentication

7 Clues: firewallencryptionDatabreachesAuthenticationAuthenticationsecurityprotocolsPasswordprotection

cyber security 2024-11-11

cyber security crossword puzzle
Across
  1. a program that monitors and removes malicious software from a device.
  2. software designed to harm a computer or network.
  3. a virus that is disguised as a standard program.
Down
  1. an email scam where an attacker deceives someone in order to get their private information.
  2. a string of characters that allows access to a computer system or service.
  3. a service that monitors network traffic.

6 Clues: a service that monitors network traffic.software designed to harm a computer or network.a virus that is disguised as a standard program.a program that monitors and removes malicious software from a device.a string of characters that allows access to a computer system or service....

Cyber Security 2016-09-20

Cyber Security crossword puzzle
Across
  1. Email looking to hook you
  2. Malicious software
Down
  1. Needed to authenticate
  2. Personal Identifiable Information
  3. Protected Health Information
  4. Electronic messaging

6 Clues: Malicious softwareElectronic messagingNeeded to authenticateEmail looking to hook youProtected Health InformationPersonal Identifiable Information

Cyber security 2020-10-21

Cyber security crossword puzzle
Across
  1. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
  2. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
  3. designed to detect and destroy computer viruses.
Down
  1. body of technologies, processes and practices designed to protectnetworks, computers, programs and data from attack, damage orunauthorized access
  2. are small files that Web sites put on your computer hard disk drive when you first visit
  3. the activity of defrauding an online account holder of financial information by posing as a legitimate company.

6 Clues: designed to detect and destroy computer viruses.are small files that Web sites put on your computer hard disk drive when you first visitthe activity of defrauding an online account holder of financial information by posing as a legitimate company....

CYBER SECURITY 2024-09-19

CYBER SECURITY crossword puzzle
Across
  1. Refers to someone who breaks into computer systems or networks without permission.
  2. Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______.
  3. It is an act of someone taking something that doesn’t belong to them without any permission.
Down
  1. a tool that allows people to connect with others and perform online activities.
  2. refers to improvements or changes.
  3. Refers to a possibility of something bad or undesirable happening.

6 Clues: refers to improvements or changes.Refers to a possibility of something bad or undesirable happening.a tool that allows people to connect with others and perform online activities.Refers to someone who breaks into computer systems or networks without permission.Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______....

Cyber Security 2025-07-08

Cyber Security crossword puzzle
Across
  1. wie heist das Sicherungs System?
  2. Das wort dass sie schützt
  3. Was kann ihr PC komplett zerstören
  4. Ein Synonym von Auf.2 der mit C anfängt
Down
  1. Was Sagen die Leute in Jamaica voll oft?
  2. Der Mann der Ihnen ein Like bei der Sicherung gezeigt hat

6 Clues: Das wort dass sie schütztwie heist das Sicherungs System?Was kann ihr PC komplett zerstörenEin Synonym von Auf.2 der mit C anfängtWas Sagen die Leute in Jamaica voll oft?Der Mann der Ihnen ein Like bei der Sicherung gezeigt hat

Emerging Technology Puzzle 2025-09-19

Emerging Technology Puzzle crossword puzzle
Across
  1. Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny
  2. Security vulnerabilitiees in faster networks, increased dependency on connected devices and data interception
  3. Fraud in immersive platforms and privacy issues
  4. Data breaches, third party vendor risks, regulatory compliance challenges and service outages
  5. Automation errors, lack of human oversight, cyber vulnerabilities
Down
  1. Regulatory uncertainty, scalability challenges, smart contract vulnerabilities
  2. Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
  3. Potential to break current cryptographic systems which may lead to data breaches and fraud
  4. Increased attack surface, device vulnerabilities, data security and privacy concerns

9 Clues: Fraud in immersive platforms and privacy issuesAutomation errors, lack of human oversight, cyber vulnerabilitiesPrivacy concerns, data theft, spoofing attacks, and regulatory scrutinyAlgorithmic bias, model errors, data privacy and misuse in fraud/cyberattacksRegulatory uncertainty, scalability challenges, smart contract vulnerabilities...

BE SECURITY SMART 2017-06-15

BE SECURITY SMART crossword puzzle
Across
  1. Never share log-in IDs or these.
  2. Software program that may be installed on your computer without your consent.
  3. _________ describes a technology or product that is owned exclusively by a single company and protected.
  4. Never ________what you do at work, or that you hold a security clearance.
  5. Always shred ITAR, PII or Proprietary data in this type of shredder.
  6. Never share these.
  7. Never send ITAR, Proprietary, or Personal Identifying Information (PII) via e-mail unless the file is _________.
  8. All employees are required to report this type of travel to their FSO.
  9. Your employee number so you can be entered into the drawing!
Down
  1. Never take this home with you.
  2. _______ crime has escalated in recent years due to advances in technology.
  3. An unauthorized disclosure of classified information.
  4. You should report unsolicited “phishing” emails and phone calls to _____.
  5. Passwords should not include the name of your favorite _______.
  6. Be careful what you post on _______.
  7. Type of engineering that uses personal contact to extract valuable information.

16 Clues: Never share these.Never take this home with you.Never share log-in IDs or these.Be careful what you post on _______.An unauthorized disclosure of classified information.Your employee number so you can be entered into the drawing!Passwords should not include the name of your favorite _______....

Stay safe when purchasing online crossword 2025-04-22

Stay safe when purchasing online crossword crossword puzzle
Across
  1. Report can help others avoid becoming a ______
  2. Websites which pretend to be real made by scammers
  3. Often the ______ never arrives
  4. Always pay with a _____ card online
  5. Always check _____ are real before ordering
Down
  1. Scam sites often ______ quickly
  2. Scam sites might have no ______ to contact
  3. ______ police: National Cyber Security Centre
  4. Scam text: 'There's a ______ with your order'

9 Clues: Often the ______ never arrivesScam sites often ______ quicklyAlways pay with a _____ card onlineScam sites might have no ______ to contactAlways check _____ are real before ordering______ police: National Cyber Security CentreScam text: 'There's a ______ with your order'Report can help others avoid becoming a ______...

Internet of Things 2025-06-08

Internet of Things crossword puzzle
Across
  1. This is needed to keep software up to date
  2. A dangerous program hackers might install
  3. A type of wireless connection common in IoT devices
  4. cyber attack
  5. The internet of things
Down
  1. Common IoT security weakness
  2. A watch that tracks health data
  3. A small computer that connects physical devices to the internet
  4. An assistant that listens for voice commands

9 Clues: cyber attackThe internet of thingsCommon IoT security weaknessA watch that tracks health dataA dangerous program hackers might installThis is needed to keep software up to dateAn assistant that listens for voice commandsA type of wireless connection common in IoT devicesA small computer that connects physical devices to the internet

Digital Footprint-Heather Berdine 2018-09-29

Digital Footprint-Heather Berdine crossword puzzle
Across
  1. Citizen You on the internet
  2. Footprint Only seen when you Release Personal info
  3. The World of Online
  4. Hat Hackers People who try to steal Personal Info
  5. A Mini Treat for your browser
  6. Footprint Just a Normal footprint on the internet
  7. The Link between Data and Internet
  8. What you use to search the web
Down
  1. a Pocket Device for everyday use
  2. A link to a site
  3. a Link to the Internet
  4. Native Someone who has grown with the Internet
  5. A Unit of patched Data
  6. A Site linked with a URL
  7. A Unit that manages Data
  8. Hat Hackers People who improve security on computers
  9. Drive A Unit used to connect data

17 Clues: A link to a siteThe World of Onlinea Link to the InternetA Unit of patched DataA Site linked with a URLA Unit that manages DataCitizen You on the internetA Mini Treat for your browserWhat you use to search the weba Pocket Device for everyday useDrive A Unit used to connect dataThe Link between Data and Internet...

Cyber-Mobbing 2015-01-20

Cyber-Mobbing crossword puzzle
Across
  1. Wie handeln Mobber?
  2. Man kann eine zivilrechtliche ... beim zuständigen Gericht einreichen
  3. An wen können Opfer sich wenden ?
  4. Wie heißen die Mobber?
  5. Was begehen Opfer als letzten Ausweg?
  6. Was kann aus Stress entstehen?
  7. Man sollte seine ... im Internet kennen
  8. Opfer können Beweise per... sichern
Down
  1. Ein anders Wort für Cyber-Mobbing?
  2. Ursache für Cyber-Mobbing?
  3. Manchmal reicht ein ... , damit der Mobber sein Verhalten ändert
  4. Cyber-Mobbing gilt im Gesetz noch nicht als eigener...
  5. Opfer können Mobber in sozialen Netzwerken ...?
  6. Cyber-Mobbing kann auf vielen verschiedenen...durchgeführt werden
  7. Was sind Opfer eventuell ausgesetzt?

15 Clues: Wie handeln Mobber?Wie heißen die Mobber?Ursache für Cyber-Mobbing?Was kann aus Stress entstehen?An wen können Opfer sich wenden ?Ein anders Wort für Cyber-Mobbing?Opfer können Beweise per... sichernWas sind Opfer eventuell ausgesetzt?Was begehen Opfer als letzten Ausweg?Man sollte seine ... im Internet kennen...

ABOUT IANT COURSES 2023-02-27

ABOUT IANT COURSES crossword puzzle
Across
  1. A CYBER SECURITY COURSE
  2. CONEECT TO COMPUTERS
  3. ADVANCE NETWORKING COURSE
Down
  1. WHO CREATE A NETWORK
  2. IANT MOST HARDWARE NETWORKING COURSE
  3. HOW MANY CERTIFICATE IN SCSU

6 Clues: WHO CREATE A NETWORKCONEECT TO COMPUTERSA CYBER SECURITY COURSEADVANCE NETWORKING COURSEHOW MANY CERTIFICATE IN SCSUIANT MOST HARDWARE NETWORKING COURSE

CYBER AWARENESS 2024-11-02

CYBER AWARENESS crossword puzzle
Across
  1. A group of experts dedicated to responding to computer security incidents.
  2. The practice of protecting computer systems and networks from digital attacks.
  3. The process of converting data into an unreadable format to protect it from unauthorized access.
  4. Acronym for the process of collecting and analyzing publicly available information to gain insights.
  5. The unauthorized access to computer systems or networks.
  6. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
  7. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
  8. A security system that monitors and controls network traffic.
  9. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
  10. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
  11. Malicious software designed to harm computer systems or networks.
  12. A network of compromised computers controlled by an attacker.
Down
  1. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
  2. Malware that encrypts a victim's data and demands a ransom for its decryption.
  3. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
  4. The likelihood of a threat exploiting a vulnerability and causing harm.
  5. A weakness in a system or network that can be exploited by attackers.
  6. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
  7. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
  8. Web A part of the internet that is not indexed by search engines and requires special software to access.
  9. A group of information security experts who respond to malware attacks or other computer security incidents.
  10. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
  11. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
  12. Illegal activities committed using computer networks or devices.

24 Clues: The unauthorized access to computer systems or networks.A security system that monitors and controls network traffic.A network of compromised computers controlled by an attacker.Illegal activities committed using computer networks or devices.Malicious software designed to harm computer systems or networks....

E-Ethics 2021-01-12

E-Ethics crossword puzzle
Across
  1. Trade Commission - federal regulatory body which monitors and deals with identity theft
  2. - involves fraudulent e-mails pretending to originate from banks or online O
  3. Harassment - online harassment; can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening
  4. - software programs which spread from computer to computer and are malicious
  5. nature
  6. - the illegal stealing, copying or spreading of media including software, movies and music
  7. -take advantage of kids by using instant messaging, e-mail and social network sites
  8. Amendment - designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  9. Fraud - stealing money or property using interstate wire communication; considered a federal crime
  10. (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
  11. - Internet harassment
  12. usability of a computer
Down
  1. - any crime involving computers
  2. -software installed discreetly which alters tTrademarks- This is used to protect our IP symbols
  3. Theft - when someone steals personal information to commit fraud or other crimes
  4. - someone who illegally alters computer hardware or breaches computer systems
  5. - refer to TV, radio or the Internet; means of communication
  6. Mail- a form of cybercrime where offensive letters are sent through e-mail
  7. - security measure used on today’s Internet which insures the data is secure
  8. Trafficking - the illegal obtaining, giving or selling of passwords
  9. such as eBay® or PayPal®
  10. modifying electronics such as an Xbox®, cell phone, or iPod®
  11. - Used to protect designed (say an invention or a door knob) IP
  12. - Way to protect a written IP
  13. States Computer Emergency Readiness Team (USCERT)- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks

25 Clues: nature- Internet harassmentusability of a computersuch as eBay® or PayPal®- Way to protect a written IP- any crime involving computers- refer to TV, radio or the Internet; means of communicationmodifying electronics such as an Xbox®, cell phone, or iPod®- Used to protect designed (say an invention or a door knob) IP...

Cybersecurity 2025-10-17

Cybersecurity crossword puzzle
Across
  1. update that fixes software vulnerabilities
  2. software designed to harm or exploit systems
  3. secret word used to access an account
  4. copy of data stored for recovery
  5. network barrier that blocks unauthorized access
  6. secure connection that hides your online activity
  7. team that monitors and responds to cyber threats
Down
  1. software that detects and removes malicious programs
  2. malware that locks files for payment
  3. extra security layer requiring multiple verifications
  4. unauthorized access to confidential data
  5. software that secretly monitors user activity
  6. network of infected computers controlled remotely
  7. fraudulent emails that trick users into giving information
  8. process of converting data into a secure code

15 Clues: copy of data stored for recoverymalware that locks files for paymentsecret word used to access an accountunauthorized access to confidential dataupdate that fixes software vulnerabilitiessoftware designed to harm or exploit systemssoftware that secretly monitors user activityprocess of converting data into a secure code...

Isearch Computer Security/Hacking 2023-03-21

Isearch Computer Security/Hacking crossword puzzle
Across
  1. computer programs and associated documentation and data
  2. Making something secure
  3. set of computers sharing resources
  4. The languages of Computers
  5. Making the Computer accomplish a specific task
  6. Virtual Personal Network
  7. the external and internal devices and equipment
Down
  1. self-replicating malware that duplicates itself to spread to uninfected devices
  2. What does it mean to be a ¨Bad¨ hacker
  3. Trying to find a shortcut to a problem.
  4. Relating to VR,AR,Software,and others
  5. Relating to the security devices and other things
  6. Internet of things
  7. something that can take control of someone's device
  8. How to make it harder to pull off using RATs and Trojans.

15 Clues: Internet of thingsMaking something secureVirtual Personal NetworkThe languages of Computersset of computers sharing resourcesRelating to VR,AR,Software,and othersWhat does it mean to be a ¨Bad¨ hackerTrying to find a shortcut to a problem.Making the Computer accomplish a specific taskthe external and internal devices and equipment...

Cyber Security Words and Terms 2022-09-15

Cyber Security Words and Terms crossword puzzle
Across
  1. A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
  2. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  3. theft The deliberate use of someone else's identity, typically for financial gain.
  4. A simple form of code for software that can be written in word editors.
  5. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  6. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  8. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
Down
  1. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  2. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  3. source Software that has their code listed as free to use, share, and modify.
  4. text Text that can be read by the human eye, like this article!
  5. private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  6. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  7. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  8. breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  9. A cyber attacker who uses software and social engineering methods to steal data and information.

17 Clues: text Text that can be read by the human eye, like this article!A simple form of code for software that can be written in word editors.source Software that has their code listed as free to use, share, and modify.theft The deliberate use of someone else's identity, typically for financial gain....