cyber security Crossword Puzzles
Be the Change Be Bully - Free 2016-05-04
Across
- We should all be responsible and ______ of what we do online and offline.
- If we know we have been hurting others, we can apologise and make ______.
- Stop, ____ , Save and Tell are the steps to stop Cyber bullying.
- Change your ______, change their worlds.
- ________ bullying is using internet or mobile devices to embarrass and hurt another person
- Bullying is not _____.
- An active bystander is an _________, who plays the most important role in a bullying experience.
- _____ tend to not report in cyber bullying.
- ______ usually targets people who are alone.
- A good ________ is someone who respect and care for you.
- ______ feel hurt, alone, depressed and helpless in a bullying situation.
- Bullying is all about _____, happens more than once and cause lots of sadness.
- When I have disagreements with my friends I could be _______ and work out the differences.
Down
- We can all ______ up for bullying.
- _______ bullying is the most common form of bullying.
- The website is www._____.sg
- __________ is a form of verbal bullying.
- Physical, Verbal, _______ and Cyber bullying are the different forms of bullying.
- Cyber bullying is more _________ than traditional bullying.
- Children are not ______ bullies but as good followers.
- ________ by not responding.
- Tips to stop bullying is Ignore, Walk Away, Tell Someone, Stay Cool and _____.
- When my friend is hurt by what I have done I should _______ .
23 Clues: Bullying is not _____. • The website is www._____.sg • ________ by not responding. • We can all ______ up for bullying. • Change your ______, change their worlds. • __________ is a form of verbal bullying. • _____ tend to not report in cyber bullying. • ______ usually targets people who are alone. • _______ bullying is the most common form of bullying. • ...
Leveraging IT 2025-08-13
Across
- Machines performing human tasks
- Remote data storage service
- Your computer's frontline soldier against cyber threats
- Study of data to find patterns
Down
- A digital letter that travels at the speed of light
- A secret key that uncloks your digital world
- Security barrier for networks
- Turning paper records into pixels
8 Clues: Remote data storage service • Security barrier for networks • Study of data to find patterns • Machines performing human tasks • Turning paper records into pixels • A secret key that uncloks your digital world • A digital letter that travels at the speed of light • Your computer's frontline soldier against cyber threats
Melissa 8G : Social engineering 2023-02-02
Across
- How are people targeted through Pharming?
- How are people targeted through Phishing?
- What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."
Down
- Social Engineering takes advantage of which security flaw in a computer system?
- Manipulating people to give-up information
- Tricking a person into revealing some personal information
6 Clues: How are people targeted through Pharming? • How are people targeted through Phishing? • Manipulating people to give-up information • Tricking a person into revealing some personal information • Social Engineering takes advantage of which security flaw in a computer system? • ...
Taldor's "Go Cyber" Competition 2014-01-22
Across
- A code name made for collecting large amounts of data regarding individuals.
- A malware that requests the payment of a fee to unlock encrypted files.
- The company behind February’s largest security conference.
- A software weakness which allows an attacker to gain access to a system.
- Had opened the Cybertech2014.
- A common hacking technic that relies on a typographical error when typing a website address.
- Using something to one’s own advantage.
- An exploit technique used for malicious code execution.
- An attack that exploits an unknown vulnerability in software.
- A table of legitimate files and processes.
- Malicious software, designed to hide its processes or programs.
Down
- A Security company founded by Kevin Mandia.
- The social GPS.
- A form of attack using psychological manipulation of people.
- A small piece of code used as the payload in exploitation.
- A common suite for penetration testing and exploitation.
- The Anonymous attack against Ukraine government data.
- A cyber unit under China’s 2nd Bureau of the PLA.
- A technology that is designed to detect potential data breaches and prevent them.
- An attempt to acquire information by masquerading as a trustworthy entity.
- A symmetric-key block cipher.
- Are you dead yet?
22 Clues: The social GPS. • Are you dead yet? • Had opened the Cybertech2014. • A symmetric-key block cipher. • Using something to one’s own advantage. • A table of legitimate files and processes. • A Security company founded by Kevin Mandia. • A cyber unit under China’s 2nd Bureau of the PLA. • The Anonymous attack against Ukraine government data. • ...
Cybersecurity Terms 2023-09-10
Across
- The act of being in accordance with established guidelines.
- When someone is using another person's information maliciously.
- A security method that encodes data to make it more secure.
- A valuable tool for developing applications.
- A group of connected computers that share user account information and a security policy.
- This must be protected from unauthorized access.
- A special computer designed for technical or scientific applications.
- Establishing something as genuine.
- In technology, this means maintaining hardware and software.
- Relating to software,a company that develops and sells products.
Down
- Programs on hardware.
- When you open a malicious email or text that is disguised as a legitimate one.
- A service that provides technology-related help.
- A type of secure connection.
- A type of coverage that insures in case of a cyber attack.
- When data is stolen from a system without the system's owner noticing.
- A string of letters, numbers, and/or symbols used for verifying identity.
- A person who commits fraud and/or is involved in fraudulent schemes.
- Malicious software that holds data hostage until a ransom is paid.
- Disguising an unknown source as a known source.
20 Clues: Programs on hardware. • A type of secure connection. • Establishing something as genuine. • A valuable tool for developing applications. • Disguising an unknown source as a known source. • A service that provides technology-related help. • This must be protected from unauthorized access. • A type of coverage that insures in case of a cyber attack. • ...
Case Study Puzzle (Lenovo Superfish) 2025-07-22
Across
- Which company was involved in the 2015 Superfish hash collision incident?
- What type of attack (short form) was enabled through the hash collision certificate forgery?
- The Superfish case exposed serious _______ weaknesses.
- What general cyber threat occurred due to weak hash use in Superfish?
- Name the adware that exploited certificate vulnerabilities on Lenovo devices.
Down
- Rogue _______ authorities were created using forged certificates.
- What process was used to create fake certificates that seemed genuine?
- In MITM, the attacker positions in the _______ between sender and receiver.
- Which hash function weakness was exploited in the Superfish attack?
- Which type of security certificate was exploited in this incident?
10 Clues: The Superfish case exposed serious _______ weaknesses. • Rogue _______ authorities were created using forged certificates. • Which type of security certificate was exploited in this incident? • Which hash function weakness was exploited in the Superfish attack? • What general cyber threat occurred due to weak hash use in Superfish? • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
ทักษะพลเมืองดิจิทัล 2023-06-14
Across
- ทักษะการเข้าใจสิทธิบนโลกดิจิทัลทั้งของตนเองและผู้อื่นบนโลกออนไลน์ เราต่างก็มีสิทธิเหมือนกับโลกออฟไลน์ มีกฏหมายที่คอยควบคุมให้การอยู่ร่วมกันบนโลกดิจิทัลเป็นไปอย่างสงบสุข พลเมืองดิจิทัลที่ดีจึงควรรู้และเข้าใจถึงสิทธิที่ตนเองและผู้อื่นมี เพื่อปกป้องข้อมูล และความเป็นส่วนตัวบนโลกออนไลน์
- ทักษะการเข้าใจและรู้เท่าทันสื่อดิจิทัลบนโลกดิจิทัลใครก็สามารถเป็นผู้สร้างเนื้อหาขึ้นมาได้ ดังนั้นจึงมีข้อมูลจำนวนมหาศาล ทั้งข้อมูลที่เป็นจริง และไม่จริง ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรมีทักษะในการวิเคราะห์ และประเมินข้อมูล ที่ได้รับจากโลกดิจิทัลด้วยเหตุและผล
- ทักษะการเห็นอกเห็นใจบนโลกดิจิทัลโลกดิจิทัล ทำให้การสื่อสารรวดเร็วและกว้างไกลมากขึ้น อาจทำให้อาจละเลยการรับรู้ เข้าใจอารมณ์ทั้งของเราและผู้อื่นไปบ้าง การเห็นอกเห็นใจตนเองและผูัอื่นบนโลกดิจิทัลจึงเป็นทักษะสำคัญที่ทำให้พลเมืองดิจิทัลอยู่ด้วยกันอย่างมีความสุข
- ทักษะการป้องกันภัยคุกคามบนโลกดิจิทัลในโลกดิจิทัล ก็มีคนที่ไม่หวังดีกับเรา สร้างภัยคุกคามต่างๆ ต่อระบบคอมพิวเตอร์ ไม่ว่าจะเป็น มัลแวร์ หรือไวรัส ในรูปแบบต่างๆ เพื่อโขมยข้อมูลของเรา พลเมืองดิจิทัลที่ดีจึงต้องรู้วิธีการป้องกัน และรับมือภัยคุกคามเหล่านี้
Down
- ทักษะการสร้างสมดุลที่ดีในการใช้งานเทคโนโลยีดิจิทัลโลกออนไลน์ช่างมีอะไรน่าตื่นตา ตื่นใจ จนรู้ตัวอีกทีก็หมดเวลาไปตั้งเท่าไหร่ บางครั้งเราอาจจะอยู่บนโลกดิจิทัลมากกว่ากับคนรอบตัวซะอีก ดังนั้น พลเมืองดิจิทัลที่ดีจึงควรมีทักษะการสร้างสมดุลที่ดีระหว่างโลกออนไลน์และออฟไลน์
- ทักษะการสื่อสารบนโลกดิจิทัลทุกการกระทำบนโลกดิจิทัล มักจะทิ่งร่องรอยดิจิทัลไว้อยู่เสมอ พลเมืองดิจิทัลที่ดีจึงควรรับรู้และเข้าใจแนวทางการสื่อสารของโลกดิจิทัล เพื่อสร้างร่องรอยดิจิทัลที่ดี และไม่สร้างร่องรอยที่อาจก่อให้เกิดความเสียหายทั้งต่อตนเองและผู้อื่นในอนาคต
- ทักษะการสร้างตัวตนที่แท้จริงบนโลกดิจิทัลการใช้งานบนโลกออนไลน์ มักจะต้องการให้เราระบุตัวตนก่อนการใช้งาน และบางครั้งอาจทำให้ตัวตนของเรามีความหลากหลายไปตามแพลตฟอร์มต่างๆ พลเมืองดิจิทัลที่ดีจึงควรรับรู้จึงตัวตนที่แท้จริงเดียวกันของตนเองทั้งในออนไลน์และออฟไลน์
- ทักษะการป้องกันตนเองในโลกดิจิทัลการใช้งานบนโลกดิจิทัลก็พาให้เราพบความเสี่ยงมากมายที่อาจจะส่งผลกระทบต่อจิตใจของเราและคนรอบตัว เช่น Cyberbully, Cyber Harrassment และอื่นๆ ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรรู้วิธีป้องกันและรับมืออย่างถูกวิธี
8 Clues: ทักษะการป้องกันตนเองในโลกดิจิทัลการใช้งานบนโลกดิจิทัลก็พาให้เราพบความเสี่ยงมากมายที่อาจจะส่งผลกระทบต่อจิตใจของเราและคนรอบตัว เช่น Cyberbully, Cyber Harrassment และอื่นๆ ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรรู้วิธีป้องกันและรับมืออย่างถูกวิธี • ...
Information and Cyber Security 2021-03-29
Across
- uses asymmetric key encryption
- person who performs a social engineering attack
- What will freezing your credit not affect?
- For online shopping it's best to use...?
Down
- most valuable to companies looking to sell you something
- Requires a carrier file to self-replicate
- What information do you need to set up a wireless access point?
- When is it ok to reuse a password?
- Cyber security month
- Weakest link in cybersecurity
- Continually bombarding a targeted network with fake requests
11 Clues: Cyber security month • Weakest link in cybersecurity • uses asymmetric key encryption • When is it ok to reuse a password? • For online shopping it's best to use...? • Requires a carrier file to self-replicate • What will freezing your credit not affect? • person who performs a social engineering attack • most valuable to companies looking to sell you something • ...
Cyber Crossword 2025-07-29
Across
- Événement grave d’origine naturelle ou humaine, accidentale ou intentionelle, occasionant des pertes et des dommages importants aux systems informatiques d’une organization ou d’un individu. [computer disaster /IT disaster]
- une faille de sécurité dans un logiciel ou un matériel qui est inconnue du fournisseur ou du développeur au moment où elle est exploitée par des attaquants. [this is a very important security flaw that allows attacker to gain complete control over your computer. This is a security flaw with no available fix or remedy
- le phishing [phishing / phishing attack] Le terme de phishing ou hameçonnage désigne l'envoi d'e-mails semblant provenir d'une source de confiance (telle qu'une banque, un service public, etc.) mais dont le but est en réalité de tromper le destinataire pour le conduire à révéler des informations confidentielles. C'est pourquoi il est toujours conseillé d'accéder à des pages Web en écrivant l'adresse directement dans le navigateur.
- défaut de sécurité [security vulnerability / security flaw]
Down
- vulnérabilité informatique ayant permis une intrusion illicite dans un système informatique, et pouvant entrainer le vol, la divulgation ou la destruction de données importantes pour une organization. [computer security breach / security breach]
- canal de communication privé dont les extrémités sont mutuellement authentifié [VPN]. The French often refer to it as “un VPN” –so you can match it with that.
- [authentification qui met en oeuvre, de façon concomitante, des procédés de verification faisant appel à au moins deux facteurs différents] [MFA]
- une attaque cyber [terme général] [cyber attack] longer definition = Ensemble coordonné d’actions malveillantes conduits par l’intermédiaire du cyberspace, qui visent à endommager, à forcer ou à détourner un réseau ou un système informatique afin de commettre un acte préjudiciable.
- un programme ou code malveillant conçu pour nuire à un ordinateur, un serveur, un réseau, ou une infrastructure informatique, sans que l'utilisateur ne s'en rende compte.
- Logiciel malveillant dissimulé à l’intérieur d’un programme en apparence inoffensive [Trojan horse]
10 Clues: défaut de sécurité [security vulnerability / security flaw] • Logiciel malveillant dissimulé à l’intérieur d’un programme en apparence inoffensive [Trojan horse] • [authentification qui met en oeuvre, de façon concomitante, des procédés de verification faisant appel à au moins deux facteurs différents] [MFA] • ...
cybersecurity story 2024-02-23
Across
- - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- - The protection of the cyber realms
- - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- - someone who tries to access data they aren't authorized to view
- - monitoring network security system
Down
- - What happens when the firewall is broken
- - A security incident where confidential information is stolen
- - the story this puzzle is about
- - a mechanism for creating a secure connection
10 Clues: - the story this puzzle is about • - The protection of the cyber realms • - monitoring network security system • - What happens when the firewall is broken • - a mechanism for creating a secure connection • - A security incident where confidential information is stolen • - someone who tries to access data they aren't authorized to view • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
The Internet and Cybersecurity 2024-04-30
Across
- A type of cyber attack where individuals are manipulated into revealing sensitive information.
- A trial and error method used to decode encrypted data such as passwords.
- An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
- The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
- The practice and study of techniques for secure communication, often involving encryption and decryption.
- A type of computation in which many calculations or processes are carried out simultaneously.
- Refers to the gap between people who have access to modern information and communication technology and those who do not.
- A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
- The practice of concealing messages or data within other non-secret text or data.
- The process of verifying the identity of a user or system.
- A type of encryption where the same key is used for both encryption and decryption.
Down
- A cryptographic key that can be freely distributed and used to encrypt messages.
- A networking device that forwards data packets between computer networks.
- A global network of interconnected computers that communicate with each other using a common set of protocols.
- A cyber attack that disrupts normal traffic of a targeted server.
- The inclusion of extra components in a system to improve reliability and performance.
- A set of rules that govern the exchange of data between devices.
- The process of encoding information in such a way that only authorized parties can access it.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A public-key encryption algorithm used for secure data transmission over the internet.
- Small units of data that are transmitted over a network.
21 Clues: Small units of data that are transmitted over a network. • The process of verifying the identity of a user or system. • A set of rules that govern the exchange of data between devices. • A cyber attack that disrupts normal traffic of a targeted server. • A networking device that forwards data packets between computer networks. • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
cyb 2024-12-05
Across
- A network that encrypts your internet connection
- This type of Wi-Fi should be used cautiously
- An extra layer of security requiring two or more verification methods
- The practice of protecting systems, networks, and programs from digital attacks
- A program that detects and removes malicious software
Down
- A malicious software designed to harm or exploit any programmable device
- The process of converting information or data into a code to prevent unauthorized access
- Software updates often include these to fix security vulnerabilities
- A mix of letters, numbers, and special characters makes a strong one
- A type of cyber attack that tricks individuals into providing sensitive information
10 Clues: This type of Wi-Fi should be used cautiously • A network that encrypts your internet connection • A program that detects and removes malicious software • Software updates often include these to fix security vulnerabilities • A mix of letters, numbers, and special characters makes a strong one • An extra layer of security requiring two or more verification methods • ...
Crowder Cyber Security Awareness 2021-10-04
Across
- You should not just check identity, you should also confirm ________
- An email that tries to trick you into visiting a scam website or to get your personal details
- A location on the internet you can save your data
- The strongest password is: Grrrrrrrr8!!!, Go'sa!, John012109, Am3r1ca!, This_P"zz1e!
- A nasty program that can harm your device or computer
- A program you use to access the internet
Down
- This can slow down your computer AND watch everywhere you go on the internet
- A type of malware that pretends to be a program you want
- A type of malware that copies itself into other files on your computer
- Information Security is not just a ______ issue
- A person who tries to access your computer without your knowledge
- A sequence of characters you use to access your accounts
12 Clues: A program you use to access the internet • Information Security is not just a ______ issue • A location on the internet you can save your data • A nasty program that can harm your device or computer • A type of malware that pretends to be a program you want • A sequence of characters you use to access your accounts • ...
crossword 2025-09-16
Across
- Exploit that targets stack buffer overflow or OS in memory.
- A comprehensive assessment and analysis of an organization’s cybersecurity and cyber risks.
- An APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
- Attack that redirects users to malicious sites by corrupting DNS cache entries with forged responses.
- A security standard that outlines the minimum required security controls for an organization's systems.
- Attack where malicious software secretly records everything typed on the keyboard.
- Technology that stores data and applications online instead of local servers.
- Tool widely used for finding and exploiting web application vulnerabilities.
Down
- A requirement that prevents use of default passwords or weak authentication methods.
- Malware that hides in system memory without leaving traces on disk.
- Security technique that isolates code execution in a controlled environment to prevent it from affecting the broader system.
- A unique identifier generated by the server to maintain a user's session, typically used by web applications.
- Tool aggregates and analyzes log and event data to detect threats and support incident response.
- Practice that enforces permissions based on job roles.
- A malware designed to give hackers access to and control over a target device.
15 Clues: Practice that enforces permissions based on job roles. • Exploit that targets stack buffer overflow or OS in memory. • Malware that hides in system memory without leaving traces on disk. • Tool widely used for finding and exploiting web application vulnerabilities. • Technology that stores data and applications online instead of local servers. • ...
Smart People Can Do This.... PS only 10% of people can do this 2021-05-06
Across
- -What does .org stand for?
- -What does .com stand for?
- -A talented programmer that can breach cyber security, usually to steal data
- -A device that routes traffic between networks
- -What is an AD
- -what is an ISP
Down
- -A facility used to house computer systems and associated components, such as telecommunications and storage systems
- -What does CD stand for?
- -What does WWW mean?
- -What is an AP
10 Clues: -What is an AP • -What is an AD • -what is an ISP • -What does WWW mean? • -What does CD stand for? • -What does .org stand for? • -What does .com stand for? • -A device that routes traffic between networks • -A talented programmer that can breach cyber security, usually to steal data • ...
Netiquette Awesome and Epic Crossword That is Totally Related to Cyber Security 2023-09-18
Across
- The word for a lot of junk mail
- When online do not freely distribute __________ information
- When online use proper ________
- The word for network etiquette
- The word for a strong opinion directed at someone else
Down
- The word for always having caps lock on
- When online make sure to respect other's ________
- When online remember the _____ on the other side
- ______ security
- When online treat others how you want to be _________
10 Clues: ______ security • The word for network etiquette • The word for a lot of junk mail • When online use proper ________ • The word for always having caps lock on • When online remember the _____ on the other side • When online make sure to respect other's ________ • When online treat others how you want to be _________ • The word for a strong opinion directed at someone else • ...
challenges and changes 2016-04-03
20 Clues: sad • brain • cyber • gossip • unhappy • punching • physically • not the same • not including • what you feel • strong belief • not the truth • poor behaviour • this is online • discriminating age • words naughty words • discriminating gender • this makes people fell sad • words that make you fell sad • bad comments about where yo come from
Vocab E-Ethics 2021-01-12
Across
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Theft when someone steals personal information to commit fraud or other crimes
- take advantage of kids by using instant messaging, e-mail and social network sites
- someone who illegally alters computer hardware or breaches computer systems
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
- States Computer Emergency Readiness Team (USCERT)- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- involves fraudulent e-mails pretending to originate from banks or online O
- Trafficking the illegal obtaining, giving or selling of passwords
- Way to protect a written IP
- an individual who alters electronics legally
- refer to TV, radio or the Internet; means of communication
- Harassment online harassment; can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening
- nature
Down
- Internet harassment
- software programs which spread from computer to computer and are malicious
- Trade Commission federal regulatory body which monitors and deals with identity theft
- such as eBay® or PayPal®
- This is used to protect our IP symbols
- any crime involving computers
- Amendment designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- security measure used on today’s Internet which insures the data is secure
- Mail a form of cybercrime where offensive letters are sent through e-mail
- the illegal stealing, copying or spreading of media including software, movies and music
- software installed discreetly which alters the usability of a computer
- Fraud stealing money or property using interstate wire communication; considered a federal crime
- Used to protect designed (say an invention or a door knob) IP
26 Clues: nature • Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • refer to TV, radio or the Internet; means of communication • modifying electronics such as an Xbox®, cell phone, or iPod® • ...
Cyber Mobbing 2015-01-21
Across
- Agressive Art von Cyber Mobbing
- Betroffene von Cyber Mobbing
- Wie kann man Beweise sichern
- Gegen welches Recgt wird verstoßen
- An wen kann sich das Opfer wenden
- Cyber Mobbing schadet der ... einer Person
Down
- Handyvideos mit Schlägerei
- Falsches Konto
- Ursachen für Cybermobbing des Täters
- Was sollten sich Opfer suchen
- Unterschied zum normalem Mobbing
- Täter verlangt Gegenleistung
- Täter
- Was sollte man regelmäßig ändern
- Folgen für Opfer
15 Clues: Täter • Falsches Konto • Folgen für Opfer • Handyvideos mit Schlägerei • Betroffene von Cyber Mobbing • Wie kann man Beweise sichern • Täter verlangt Gegenleistung • Was sollten sich Opfer suchen • Agressive Art von Cyber Mobbing • Unterschied zum normalem Mobbing • Was sollte man regelmäßig ändern • An wen kann sich das Opfer wenden • Gegen welches Recgt wird verstoßen • ...
Multnomah Cyber Security Awareness 2022-09-29
Across
- There is never a need to report this type of email
- Stealing data is a _ _ _ _ _
- Who I am is my _ _ _ _ _ _ _ _
- Unwanted software that can damage your computer or steal your data
- Never share this with anyone!
- Personal Identifiable _ _ _ _ _ _ _ _ _ _ _
Down
- Multi Factor _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The H in HIPAA
- The device that protects your network
- Email designed to steal your information
- _ _ _ _ _ _ _ line should never contain sensitive data
- When data is compromised by bad actors
12 Clues: The H in HIPAA • Stealing data is a _ _ _ _ _ • Never share this with anyone! • Who I am is my _ _ _ _ _ _ _ _ • The device that protects your network • When data is compromised by bad actors • Multi Factor _ _ _ _ _ _ _ _ _ _ _ _ _ _ • Email designed to steal your information • Personal Identifiable _ _ _ _ _ _ _ _ _ _ _ • There is never a need to report this type of email • ...
Cyber Security Crossword Puzzle 2023-12-04
Across
- The process of encoding sensitive data, so it can't be hacked and viewed by people or computers that it isn't intended for.
- Video in which faces have been either swapped or digitally altered, with the help of AI.
- The place files can be saved, so they can be accessed anywhere rather than just on one device.
- To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss
- A type of software that defends your computer against viruses and malware. It acts as a protective shield when you're online.
- fraudulent business or scheme that takes money or other goods from an unsuspecting person.
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- A form of harassment that happens on the internet, usually through social media platforms.
- Small files that are stored on a user’s computer to help a website to recognize you and keep track of your preferences.
- A dangerous file that can infect a computer when downloaded. It can cause harm to the computer and even steal data.
- when someone who lacks the proper authentication follows an employee into a restricted area.
- A string of letters, numbers and symbols that you use to access your online account.
12 Clues: A string of letters, numbers and symbols that you use to access your online account. • Video in which faces have been either swapped or digitally altered, with the help of AI. • A form of harassment that happens on the internet, usually through social media platforms. • ...
Cyber Security Awareness Month 2024-10-15
Across
- An initial phase of a cyber-attack which entails gathering information about a target system, network, or organization to pinpoint vulnerabilities that can be exploited in subsequent stages.
- Targeted attacks aimed at specific individuals or organizations, often personalized.
- A common threat to individuals involves the theft of personal information such as Social Security numbers and credit card details, which is used without consent for financial gain or fraud.
- A part of the internet often associated with illegal activities which is not indexed by traditional search engines and requires specific software or configurations to access.
- A form of spear phishing that targets high-profile individuals, like executives.
- Process of verifying the identity of a user, device, or system before granting access to resources.
Down
- A hacker who may violate ethical standards or laws but does not have malicious intent.
- A number used only once in a cryptographic communication to prevent replay attacks.
- The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis
- A type of malware designed to erase its tracks after executing its malicious actions.
- A fraudulent email correspondence that appear to come from trustworthy sources.
- A security event where unauthorized individuals gain access to a computer system, network, or database, potentially leading to the exposure, theft, or alteration of sensitive information.
12 Clues: A fraudulent email correspondence that appear to come from trustworthy sources. • A form of spear phishing that targets high-profile individuals, like executives. • A number used only once in a cryptographic communication to prevent replay attacks. • Targeted attacks aimed at specific individuals or organizations, often personalized. • ...
Cyber Security Awareness Month 2024-10-15
Across
- An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
- A method of faking an identity to gain access.
- The process of converting encrypted data back to its original form.
- A code or technique used to take advantage of a vulnerability.
- A security event where unauthorized individuals gain access to a secure computer system, network, or database.
- The process of verifying the identity of a user, device, or system before granting access to resources.
- A type of malware designed to erase its tracks after executing its malicious actions.
- The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
- The name for a number used only once in a cryptographic communication to prevent replay attacks.
- The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
- The act of pretending to be someone else for malicious purposes.
- A form of spear phishing that targets high-profile individuals, like executives.
12 Clues: A method of faking an identity to gain access. • A code or technique used to take advantage of a vulnerability. • The act of pretending to be someone else for malicious purposes. • The process of converting encrypted data back to its original form. • A form of spear phishing that targets high-profile individuals, like executives. • ...
Bullying 2016-06-08
Across
- Based on the 2010-2011 school Crime Supplement, what % of students in grades 6-121 experience cyber bullying?
- Kids who are cyber bullied are more likely to have these (2 words, no spaces)
- Bullying that takes place using electronic technology (2 words, no spaces)
- True or False - It is easy to delete inappropriate or harassing messages, texts and pictures after they've been sent/posted
- One of the best things you can do for a student being bullied is to be one of these
- Many cyber bullying messages and pictures are posted this way
- Kids who are cyber bullied are more likely to receive (2 words, no spaces)
Down
- A 2013 study finds what percentage of high school students were bullied in 2014?
- Kids who are cyber bullied are more likely to use this
- If you see someone being bullied, one of the tactics to say "stop" is to use this
- Posting these are a form of cyber bullying (2 words, no spaces)
- If you are bullied or see someone else being bullied with whom should you speak?
- Cyber bullying can happen how many hours a day?
13 Clues: Cyber bullying can happen how many hours a day? • Kids who are cyber bullied are more likely to use this • Many cyber bullying messages and pictures are posted this way • Posting these are a form of cyber bullying (2 words, no spaces) • Bullying that takes place using electronic technology (2 words, no spaces) • ...
Chapter 12 - Security Plus 2024-03-25
Across
- streams of information containing data about various cyber threats
- Payment to a third-party for assuming risks
- The willingness to assume a level of risk in order to achieve a result
- Verifying that the organization is in compliance with required standards
- Threat intelligence data that has been legally gathered
- An examination of results to verify their accuracy
- An alarm that is raised when there is no problem.
- Directly probing for vulnerabilities
- Using tools in a penetration test that do not raise any alarms
- Analyzing a vulnerability scan for validation of its accuracy
Down
- A subjective estimate of the loss to an asset if the specific threat occurs
- pay security researchers who uncover security bugs
- To treat one item as more important than another.
- Relating to ownership.
- assessment that attempts to uncover vulnerabilities and then exploit them
- Numeric scores on a vulnerability
- The failure to raise an alarm when there is an issue.
- A judgment made about the results of an audit
- Conformity to mandated standards
- Part of the web that is the domain of threat actors
- Assessments by independent third-party auditors
21 Clues: Relating to ownership. • Conformity to mandated standards • Numeric scores on a vulnerability • Directly probing for vulnerabilities • Payment to a third-party for assuming risks • A judgment made about the results of an audit • Assessments by independent third-party auditors • To treat one item as more important than another. • ...
Cyber Security Words and Terms 2022-09-15
Across
- A simple form of code for software that can be written in word editors.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- theft The deliberate use of someone else's identity, typically for financial gain.
- source Software that has their code listed as free to use, share, and modify.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- text Text that can be read by the human eye, like this article!
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
17 Clues: text Text that can be read by the human eye, like this article! • A simple form of code for software that can be written in word editors. • source Software that has their code listed as free to use, share, and modify. • theft The deliberate use of someone else's identity, typically for financial gain. • ...
iSOC Crossword - Basic 2014-10-14
Across
- Security is in your own _______.
- Password should be changed every 2-3 months.
- A ____ is a web page address.
- A software that is designed to detect and destroy computer viruses.
- Malware hidden in a gift
- The state of being free from danger or threat.
- Never share your _______ with another person.
- Hidden entrance into a system
- Always _____ your computer when you leave your desk.
- An army of malware infected PCs
- A computer _______ is a group of interconnected computers.
Down
- Protect your laptop or cellphone by treating it like _____.
- Viruses, Worms and Trojans etc
- Be cyber savvy, be a ______ user.
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
- Classic form of Malware
- Never turn off your ______ or else your computer and the company data will be at risk
- your password is like a _______, use it regularly, change it often and do not share it with anyone else.
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- The A in APT
- A person who steals information from your system without you knowing about it.
- passwords should always be at least ______ characters long.
22 Clues: The A in APT • Classic form of Malware • Malware hidden in a gift • A ____ is a web page address. • Hidden entrance into a system • Viruses, Worms and Trojans etc • An army of malware infected PCs • Security is in your own _______. • Be cyber savvy, be a ______ user. • Password should be changed every 2-3 months. • Never share your _______ with another person. • ...
Chapter 12 Security Plus Crossword 2024-05-05
Across
- streams of information containing data about various cyber threats
- Payment to a third-party for assuming risks
- The willingness to assume a level of risk in order to achieve a result
- Verifying that the organization is in compliance with required standards
- Threat intelligence data that has been legally gathered
- An examination of results to verify their accuracy
- An alarm that is raised when there is no problem.
- Directly probing for vulnerabilities
- Using tools in a penetration test that do not raise any alarms
- Analyzing a vulnerability scan for validation of its accuracy
Down
- A subjective estimate of the loss to an asset if the specific threat occurs
- pay security researchers who uncover security bugs
- To treat one item as more important than another.
- Relating to ownership.
- assessment that attempts to uncover vulnerabilities and then exploit them
- Numeric scores on a vulnerability
- The failure to raise an alarm when there is an issue.
- A judgment made about the results of an audit
- Conformity to mandated standards
- Part of the web that is the domain of threat actors
- Assessments by independent third-party auditors
21 Clues: Relating to ownership. • Conformity to mandated standards • Numeric scores on a vulnerability • Directly probing for vulnerabilities • Payment to a third-party for assuming risks • A judgment made about the results of an audit • Assessments by independent third-party auditors • To treat one item as more important than another. • ...
RU ITEC411 Crime and Security 2025-11-25
Across
- Malicious self-replicating software that infects a computer.
- Unlawful use and theft of another's identifying information.
- Security system on a computer meant to block access to certain things.
- Supreme power or sole authority of a state or governing entity over itself.
- Going to another country with better odds of winning a court case and suing for defamation.
- A country/state returning a wanted individual to another country or state.
- Using hacking to promote certain causes like political or social causes.
- Legal authority of governments and entities to hear cases and make judgements.
- System designed to lure in cyber criminals/hackers.
- Public defiance (usually nonviolent) of local laws or policies.
Down
- Organization dealing with global trade rules
- Making individuals and entities obey laws, policy, etc.
- Written or published defamation.
- Being protected from danger or threats.
- Utilizing or exploiting weaknesses in a network or computer system.
- Finding ways around obstacles and problems, think loopholes.
- Increasing connectedness amongst the world.
- Right to express opinions and ideas without prosecution.
- Act that greatly expanded law enforcement counter-terror ability after Sept 11th attacks.
- Very sophisticated computer worm that damaged enrichment plant in Iran.
20 Clues: Written or published defamation. • Being protected from danger or threats. • Increasing connectedness amongst the world. • Organization dealing with global trade rules • System designed to lure in cyber criminals/hackers. • Making individuals and entities obey laws, policy, etc. • Right to express opinions and ideas without prosecution. • ...
Taldor's "Go Cyber" competition 2014-01-22
Across
- An attack that exploits an unknown vulnerability in software.
- a software weakness which allows an attacker to gain access to a system.
- A small piece of code used as the payload in exploitation.
- are you dead yet?
- an exploit technique used for malicious code execution
- a common hacking technic that relies on a typographical error when typing the website address into the address bar.
- A table of legitimate files and processes.
- A malware that requests the payment of a fee to unlock encrypted files.
- technology that is designed to detect potential data breaches and prevent them.
- Security company founded by Kevin Mandia
Down
- A common suite for penetration testing and exploitation.
- A form of attack using psychological manipulation of people.
- a social GPS.
- will open the cybertech2014.
- Malicious software, designed to hide its processes or programs.
- Anonymous’s attack against Ukraine government data
- A cyber unit under China’s 2nd Bureau of the PLA.
- Company behind February’s largest security conference.
- A symmetric-key block cipher.
- - A code name made for collecting large amounts of data regarding individuals.
- Using something to one’s own advantage
- An Attempt to acquire information by masquerading as a trustworthy entity.
22 Clues: a social GPS. • are you dead yet? • will open the cybertech2014. • A symmetric-key block cipher. • Using something to one’s own advantage • Security company founded by Kevin Mandia • A table of legitimate files and processes. • A cyber unit under China’s 2nd Bureau of the PLA. • Anonymous’s attack against Ukraine government data • ...
About IANT 2022-09-17
stuff and things 2025-09-08
First Call Cybersecurity Challenge 2023-10-23
Across
- Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
- Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
- A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
- A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
- Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
- A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
- Malware that encrypts a victim's data and demands a ransom for the decryption key.
- Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
- The process of converting data into a code to prevent unauthorized access or data theft.
- A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.
11 Clues: Malware that encrypts a victim's data and demands a ransom for the decryption key. • The process of converting data into a code to prevent unauthorized access or data theft. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. • ...
Linux 2023-11-04
6 Clues: Base of Linux OS • Linux file system • Linux desktop environment • developed by Linus Torvalds • Linux desktop operating system distribution • A linux OS developed for cyber security professionals
Cyber Security and Laws 2022-10-17
Across
- subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
- EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
- Cyber ------ is use of the Internet or other electronic means to track someone
- The International Organization for ------- is referred as ISO
- EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
- GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
- is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
- PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
- Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
- The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
- refers to the use of a computer to commit a crime
- is the legal process by which an arbiter or judge reviews evidence and argumentation.
12 Clues: refers to the use of a computer to commit a crime • The International Organization for ------- is referred as ISO • PCI DSS is an acronym for “----- Card Industry Data Security Standard.” • Cyber ------ is use of the Internet or other electronic means to track someone • EDI internet transmission protocols include ----- File Transfer Protocol (SFTP), • ...
Cyber Security at ESDC 2023-08-15
Across
- Person with malicious intentions.
- A trap for threat actors.
- Method used to secure your data.
- Software that infects a device.
- Attack that looks at/steals your data.
- Attack that locks your data and demands money.
Down
- Device used to work.
- Cyber attack meant to trick you.
- Faking an email address, phone number, etc.
- Software meant to protect your device.
- Unsolicited emails.
- Used to prevent unwanted network access.
12 Clues: Unsolicited emails. • Device used to work. • A trap for threat actors. • Software that infects a device. • Cyber attack meant to trick you. • Method used to secure your data. • Person with malicious intentions. • Software meant to protect your device. • Attack that looks at/steals your data. • Used to prevent unwanted network access. • ...
RU ITEC411 Crime and Security 2025-11-25
Across
- Utilizing or exploiting weaknesses in a network or computer system.
- A country/state returning a wanted individual to another country or state.
- Written or published defamation.
- Using hacking to promote certain causes like political or social causes.
- Being protected from danger or threats.
- Organization dealing with global trade rules
- Unlawful use and theft of another's identifying information.
- Very sophisticated computer worm that damaged enrichment plant in Iran.
- Security system on a computer meant to block access to certain things.
- Finding ways around obstacles and problems, think loopholes.
- Supreme power or sole authority of a state or governing entity over itself.
Down
- Increasing connectedness amongst the world.
- Legal authority of governments and entities to hear cases and make judgements.
- Act that greatly expanded law enforcement counter-terror ability after Sept 11th attacks.
- System designed to lure in cyber criminals/hackers.
- Malicious self-replicating software that infects a computer.
- Right to express opinions and ideas without prosecution.
- Going to another country with better odds of winning a court case and suing for defamation.
- Public defiance (usually nonviolent) of local laws or policies.
- Making individuals and entities obey laws, policy, etc.
20 Clues: Written or published defamation. • Being protected from danger or threats. • Increasing connectedness amongst the world. • Organization dealing with global trade rules • System designed to lure in cyber criminals/hackers. • Making individuals and entities obey laws, policy, etc. • Right to express opinions and ideas without prosecution. • ...
CSC 200 Cybersecurity 2018-01-31
Across
- Deploying a security officer at the premises gate is an example of _____ control.
- _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
- Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
- Prevents either sender or receiver from denying a transmitted message.
- Assures that the system works promptly and service is not denied to authorized users.
Down
- _______ is the act of accessing information during transmission.
- _________ unauthorized access and modification of an asset.
- _________ means an information becomes lost, unavailable, or unusable
- Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
- A weakness which allows an attacker to reduce a system's information assurance.
- A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
- Phishing and attachments target the _________ threat vector
12 Clues: _________ unauthorized access and modification of an asset. • Phishing and attachments target the _________ threat vector • _______ is the act of accessing information during transmission. • _________ means an information becomes lost, unavailable, or unusable • Prevents either sender or receiver from denying a transmitted message. • ...
Identity Theft Crossword 2020-07-01
Across
- Relating to online
- Against the law, something that is unlawful
- Commonly used for purchasing items
- What makes up your character, how people know you
- Used as a barrier for security in computers
Down
- It is yours, your own things
- Persons or people that unlawfully take what isn't theirs
- The action of taking something which isn't yours
- People who invade online systems
9 Clues: Relating to online • It is yours, your own things • People who invade online systems • Commonly used for purchasing items • Against the law, something that is unlawful • Used as a barrier for security in computers • The action of taking something which isn't yours • What makes up your character, how people know you • ...
walwere 2025-11-12
Across
- Efek yang ditimbulkan virus adalah mengubah, menyembunyikan, atau menghapus ____
- Perangkat lunak yang menempel pada perangkat lunak lain dan dapat memperbanyak diri
- Malware yang mengunci file dan meminta pembayaran untuk mendeskripsinya.
- Perangkat lunak yang mampu mendapatkan akses ke suatu sistem dengan melewati lapisan security normal.
- Malware yang tampak seperti aplikasi perangkat lunak jinak, tetapi membawa komponen jahat di dalamnya
- Akronim dari Robot dan Network, yaitu sekelompok komputer yang dikendalikan peretas
- Peretas yang memiliki izin, berusaha keras melindungi sistem, dan termasuk pakar keamanan cyber.
- Peretas yang menggunakan keahlian mereka untuk merusak, tanpa memiliki etika yang baik
- Metode mengkodekan data sebelum dikirim melalui jaringan komputer
- Virus menyebar ketika seseorang membuka lampiran yang telah mengalami ____
Down
- Cara memanipulasi pengguna atau seseorang untuk mengeluarkan informasi yang melanggar protokol keamanan
- Sebutan untuk perangkat terinfeksi (bot) yang merupakan bagian dari Botnet
- Pakar keamanan ___ yang berusaha keras melindungi sistem.
- Mirip virus, namun tidak perlu menempel ke program lain agar dapat berfungsi
- Malware yang dapat memantau dan merekam aktivitas pengguna, termasuk mencatat penekanan tombol pada keyboard
- Usaha untuk memikat pengguna internet agar masuk ke web palsu
- Kejahatan di dunia maya yang mengelabui target melalui surel atau pesan teks agar memberikan data sensitif.
- Trojan melakukan aktivitas berbahaya seperti mengirim surel spam ke semua kontak di buku alamat ____
18 Clues: Pakar keamanan ___ yang berusaha keras melindungi sistem. • Usaha untuk memikat pengguna internet agar masuk ke web palsu • Metode mengkodekan data sebelum dikirim melalui jaringan komputer • Malware yang mengunci file dan meminta pembayaran untuk mendeskripsinya. • Sebutan untuk perangkat terinfeksi (bot) yang merupakan bagian dari Botnet • ...
cyber law cia 1 component 1 2021-09-05
Across
- Which act in Singapore limited the liability of network service providers for accessed content?
- The flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- Harassment in the form of cyber stalking and cyber bullying was prosecuted in Singapore under which act?
- "A declaration of independence of cyberspace" was written by whom?
- who was the creator and driving force of Napster?
Down
- The lawsuit in which the plaintiff is a computer scientist who wrote an encryption program which he wanted to share with his students and colleagues and post on his website. This lawsuit seeks to protect and even extend societal free speech values.
- ____________________ refers to “the action or process of digitizing; the conversion of analogue data (esp. in later use images, video, and text) into digital form.”
- Which is the governmental organisation responsible for Singapore's infocomm development and security?
- "code and other laws of cyberspace" was written by whom?
- Singapore actively supports global efforts in eradicating cyber crime by participating in schemes such as the _________ arrangement that promotes the fight against terrorism.
10 Clues: who was the creator and driving force of Napster? • "code and other laws of cyberspace" was written by whom? • "A declaration of independence of cyberspace" was written by whom? • Which act in Singapore limited the liability of network service providers for accessed content? • ...
Cybersecurity Awareness 2024-09-22
Across
- / Tool is often used to help create and store complex passwords.
- / Most commonly targeted entity of cyber attacks in an organization.
- / A type of cyber attack that tricks users into giving up personal information.
- / Who should you report a suspicious email to?
- / The person or department you should approach with documented security concerns.
Down
- / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
- / What should you use as a way to have multiple forms of authentication on your accounts?
- / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.
8 Clues: / Who should you report a suspicious email to? • / Tool is often used to help create and store complex passwords. • / Most commonly targeted entity of cyber attacks in an organization. • / A type of cyber attack that tricks users into giving up personal information. • / The person or department you should approach with documented security concerns. • ...
information warfare 2024-04-02
Across
- gap, hole
- a type of malicious software, or malware, that threatens a victim by destroying or blocking access to critical data or systems until a ransom is paid
- a person who uses unlawful violence and intimidation, especially against civilians, in the pursuit of political aims
- the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
- groups of criminals who unite to carry out cyber attacks in support of political causes.
- the condition of being exposed or unprotected, making someone more likely to be hurt, taken advantage of, or exploited
Down
- a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware
- means using the trust of a website a user keep and a hacker comes in and takes the random database from the site
- military operations between enemies : hostilities, war; also : an activity undertaken by a political unit (such as a nation) to weaken or destroy another
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent
- means open or vulnerable to something, such as an infection, influence, or attack
- state a term used to describe a country that is seen as a threat to international peace and security due to its actions or policies
- attacking wide swatches of the internet at random
- spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence)
- means having a deliberate intention to cause harm or injury, either physically or emotionally
15 Clues: gap, hole • attacking wide swatches of the internet at random • means open or vulnerable to something, such as an infection, influence, or attack • groups of criminals who unite to carry out cyber attacks in support of political causes. • means having a deliberate intention to cause harm or injury, either physically or emotionally • ...
Digital Citizenship and Cyber Hygiene Vocabulary 2022-09-20
Across
- How companies use your data
- Identity theft, stealing money, stealing private information, controlling private computers.
- A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
- Protection of computer systems, networks, and data from digital attacks.
- The information about a particular person that exists on the Internet as a result of their online activity.
- A computer security specialist who breaks into protected systems and networks to test and assess their security
- The use of electronic communication to bully a person
- Legal document outlining how a company can collect and use your data
10 Clues: How companies use your data • The use of electronic communication to bully a person • Legal document outlining how a company can collect and use your data • Protection of computer systems, networks, and data from digital attacks. • Identity theft, stealing money, stealing private information, controlling private computers. • ...
CYBER FEST CROSSWORD 2024-10-18
Across
- Software designed to detect, prevent, and remove malware and other harmful software.
- Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- A secret string of characters used to verify the identity of a user.
- An attempt by hackers to damage or disrupt a computer system or network.
- Ensuring that an organization meets regulatory and legal requirements for security practices.
- Software that secretly monitors and collects personal information from a computer.
- A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- The process of verifying the identity of a user or device before granting access to a system.
Down
- Related to computers, information technology, or virtual reality, often used in the context of online environments.
- The process of converting data into a secret code to protect it from unauthorized access.
- A weakness in software, hardware, or procedures that could be exploited to cause harm.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- Any software intentionally designed to cause damage to a computer, server, or network.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.
16 Clues: A person who uses computers to gain unauthorized access to data. • A secret string of characters used to verify the identity of a user. • An attempt by hackers to damage or disrupt a computer system or network. • Software that secretly monitors and collects personal information from a computer. • ...
Cyber Crossword 2019-06-25
Across
- Malware that attempts to extort money by locking files
- A weakness that may be exploited by a threat actor
- Software that protects your device from malware
- Cyber security regulation that applies to operators of essential services
- Incident where information or systems are accessed in an unauthorised way
Down
- EU data protection law enforced May 2018
- Something likely to cause damage or disruption
- Process of granting or denying access requests
- Email scam targeted towards a specific individual
- Assurance that information is trustworthy
- Something of value
11 Clues: Something of value • EU data protection law enforced May 2018 • Assurance that information is trustworthy • Something likely to cause damage or disruption • Process of granting or denying access requests • Software that protects your device from malware • Email scam targeted towards a specific individual • A weakness that may be exploited by a threat actor • ...
trends and buzzwordz ヾ(≧▽≦*)o 2025-07-24
Across
- A cloud-based model where any IT function or business process; eg software/infrastructure/platforms — is delivered as a service.
- A computing model that uses quantum bits to perform calculations, and can solve problems significantally faster than default computers
- Monitors and analyzes endpoint activities on devices to detect, investigate, and respond to cyber threats
- An immersive virtual environment where users interact via avatars. It blends AR, VR, and other digital assets
- A process that scans systems/networks/apps to identify weaknesses in security that could be exploited
- An umbrella term for immersive technologies; eg VR, AR, MR
- A security method that requires users to provide 2+ verification factors to access a system; eg password, finger print, one time code
- The use of advanced technologies; eg AI/machine learning/robotics to automate complex business processes end-to-end.
Down
- A cloud computing model with public cloud services distributed to different physical locations
- The ability of machines to perform tasks that typically require human intelligence
- Insurance that covers financial losses due to cyberattacks, data breaches, and ransomware
- Design approach that delivers a consistent UX across multiple digital touchpoints; eg apps, voice interfaces, and AR/VR
- Set of technologies and processes that collect, analyze, and visualize data to help organizations make informed decisions
- Technology developed with consideration for environmental, social, and economic impact.
- A framework that combines development, operations, etc to make applications more resilient.
- Efficient security architecture that integrates various security tools into a unified ecosystem.
16 Clues: An umbrella term for immersive technologies; eg VR, AR, MR • The ability of machines to perform tasks that typically require human intelligence • Technology developed with consideration for environmental, social, and economic impact. • Insurance that covers financial losses due to cyberattacks, data breaches, and ransomware • ...
Ethics and Safety measures in computing 2021-10-20
Across
- transforming data into an unreadable code.
- right relating to new inventions
- security system that prevents unauthorized people on internet.
- Harassing a person deliberately via intrnet.
- brand name, logos, distinctive designs.
- and anybody.
- legal right granted by law.
- intends to harm or damage reputation of any
- impression about a person's activities on internet
Down
- Programs used to check user's keystrokes
- crimical practice of breaching online using voice over.(VoIP)
- most common breaches through internet
- practice of sending bulk mails till server gets full
- Distroy the mental health of a child
- Online discussion site
- malicious technique of tricking web users.
- act of copying.
- The maximum amount of data transmitted via
- crime ware application that performs automated tasks for cyber criminals.
19 Clues: and anybody. • act of copying. • Online discussion site • legal right granted by law. • right relating to new inventions • Distroy the mental health of a child • most common breaches through internet • brand name, logos, distinctive designs. • Programs used to check user's keystrokes • transforming data into an unreadable code. • malicious technique of tricking web users. • ...
The Digital World 2023-10-31
Across
- What is the acronym for Information and communication technologies?
- Why do cyberbullies get from bullying their victims?
- Cyberbullying can happen
- What negative impact does cyberbullying have on someone?
- Digital ___ protects people online.
- When online, people need to be____
- What is a social media platform?
- People can hide their identity online by setting their account to
- Physical or emotional injury to someone.
- Technology is always digitally _____.
Down
- When online people are creating their digital____
- We are in the Digital_____
- People who are bullied are known to be
- Cyberbullying is a ____ issue
- There are many ditigital ___ to use.
- Social media allows you to exchange _____ files.
- What type of abuse is cyberbullying?
- What is a technological device?
- Social media can cause____ impacts on people's lives.
19 Clues: Cyberbullying can happen • We are in the Digital_____ • Cyberbullying is a ____ issue • What is a technological device? • What is a social media platform? • When online, people need to be____ • Digital ___ protects people online. • There are many ditigital ___ to use. • What type of abuse is cyberbullying? • Technology is always digitally _____. • ...
CYBER AND DIGITAL LITERALLY 2024-04-30
Across
- Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
- Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
- Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
- Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
- The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
- Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
- Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
- The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
- The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
- The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
- Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
- Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
- Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
- Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
- A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
- The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
- The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
- The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
- Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
- Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
- Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
- Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
- Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
- Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
- Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
- The global network of interconnected computers that allows for the exchange of data and communication.
- Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
- Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
- Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
- The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
- The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
- Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
- Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
- Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
- Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
- The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
- The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
- Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
- Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
- Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
- Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
- Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
- The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
- Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
- Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
- Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
- Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.
50 Clues: The global network of interconnected computers that allows for the exchange of data and communication. • Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks. • Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet. • ...
RIMA week puzzle 2023-08-09
INF KELAS 8 DAMPAK SOSIAL 2025-05-21
Across
- sikap yang diperlukan dalam menyikapi setiap informasi di media sosial
- perangkat IoT untuk menertibkan pengendara bermotor
- menyebarkan keburukan orang untuk merusak reputasi
- perangkat IoT di rumah tangga terhubung ke CCTV, AC, dan TV
- dampak fisik dari korban cyber bullying
- pesan berisi ujaran kemarahan
- Perangkat yang terhubung ke internet dan bisa dikendalikan jarak jauh
Down
- menyebarkan data rahasia milik orang lain
- informasi yang masuk akal
- undang-undang yang mengatur tentang cyber bullying
- unsur IoT yang mengumpulkan data dari lingkungan sekitar
- salah satu dampak psikologis korban cyber bullying
- tindakan yang dilakukan jika menjumpai cyber bullying
- berita palsu yang disebarkan di internet
- unsur IoT yang menghubungkan sensor ke pengolah data
15 Clues: informasi yang masuk akal • pesan berisi ujaran kemarahan • dampak fisik dari korban cyber bullying • berita palsu yang disebarkan di internet • menyebarkan data rahasia milik orang lain • undang-undang yang mengatur tentang cyber bullying • salah satu dampak psikologis korban cyber bullying • menyebarkan keburukan orang untuk merusak reputasi • ...
DIYA CYBER SAFETY CROSSWORD 2016-05-25
Across
- A bad thing on the computer
- security - Its help to stop online crimes
- - They help you to get virus off
- - A website you text on
- app- A website you can send messages and chat on
- - You can't share it with anyone
- - Part of your computer saves all your datas
- - A device you watch on
- - Website which give you information
Down
- A popular web site
- - They help on the internet
- - They hlep you on the computer
- - A device which knows everything
- - Instructios to set your computer
- - A device you can chat on
- - something that loads things quickly
- - A website you can send pictures on
- - They can be rude to you on the internet
- -A website which you can chat on
- -They pop up on your screen
20 Clues: A popular web site • - A website you text on • - A device you watch on • - A device you can chat on • - They help on the internet • -They pop up on your screen • A bad thing on the computer • - They hlep you on the computer • - They help you to get virus off • - You can't share it with anyone • - A device which knows everything • -A website which you can chat on • ...
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
Cyber law 2021-08-31
Across
- one of the general problems of new media
- fake identity
- school of thought supporting no regulation of cyber space.
- man made resource in cyber space
- traces back to who is accessing the website
Down
- another name for cyber paternalism
- stakeholder of cyber space
- digitalization of the Indian Economy
- proponent of cyber paternalism
- constructing various contraints within the cyber space
10 Clues: fake identity • stakeholder of cyber space • proponent of cyber paternalism • man made resource in cyber space • another name for cyber paternalism • digitalization of the Indian Economy • one of the general problems of new media • traces back to who is accessing the website • constructing various contraints within the cyber space • ...
Cyber 2023-03-17
Across
- Attack that attempts to put a machine into request overload to the point of making it impossible to deliver the requested services
- Probability x Impact
- It helps validate identity for access to an application or data via something you know, have or are
- Who oversees the compliance
- First step in the risk management process
- Fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
- Kind of data, like a fingerprint
- It helps control and manage access to applications, data and networks by internal staff and external individuals and organisations
- Guarantee that the information receiver can confirm the identity of the sender
- Ensure that the origin of data can be deduced with certainty
- Proactively monitors the network and endpoints for threats, and includes analytics and event correlation capabilities to improve response speeds
- Gateway device that monitors and controls incoming and outgoing network traffic
- Type of software that is specifically designed to cause harm to a computer system, network, or device
- Attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter
- The consent for email marketing should be…
Down
- European regulation on the processing of personal data
- It should be following a data breach
- Type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability
- It helps you identify and minimise the data protection risks of a project
- A phase of Cyber Kill Chain Attack
- It allows an attacker to coerce the application to send a crafted request to an unexpected destination
- Legal document provided to users about individual rights about data processing
- It usually allows to process data
- Technique for identifying the password through the use of all possible combinations of characters
- It helps ensuring the efficiency and effectiveness of business processes by ensuring the well-being of the company
- Data is unable to be referred to an individual
- It is achieved when data are not changed improperly
- It delivers faster response times, with streamlined and automated incident response workflows
- Person who acts for ideology purposes
- Any person other than the Data Subject, Data Controller or Data Processor
- It specifies the requirements for establishing, carrying out, maintain and continuously improve a management system for information security
- Hardware and software responsible of monitoring and/or control of physical devices, processes and events in the enterprise
32 Clues: Probability x Impact • Who oversees the compliance • Kind of data, like a fingerprint • It usually allows to process data • A phase of Cyber Kill Chain Attack • It should be following a data breach • Person who acts for ideology purposes • First step in the risk management process • The consent for email marketing should be… • Data is unable to be referred to an individual • ...
Bullying 2016-06-08
Across
- Based on the 2010-2011 school Crime Supplement, what % of students in grades 6-121 experience cyber bullying?
- Kids who are cyber bullied are more likely to have these (2 words, no spaces)
- True or False - It is easy to delete inappropriate or harassing messages, texts and pictures after they've been sent/posted
- A 2013 study finds what percentage of high school students were bullied in 2014?
- that takes place using electronic technology
- If you are bullied or see someone else being bullied with whom should you speak?
- Kids who are cyber bullied are more likely to receive (2 words, no spaces)
- If you see someone being bullied, one of the tactics to say "stop" is to use this
Down
- Posting these are a form of cyber bullying (2 words, no spaces)
- Kids who are cyber bullied are more likely to use this
- Many cyber bullying messages and pictures are posted this way
- One of the best things you can do for a student being bullied is to be one of these
- Cyber bullying can happen how many hours a day?
13 Clues: that takes place using electronic technology • Cyber bullying can happen how many hours a day? • Kids who are cyber bullied are more likely to use this • Many cyber bullying messages and pictures are posted this way • Posting these are a form of cyber bullying (2 words, no spaces) • Kids who are cyber bullied are more likely to receive (2 words, no spaces) • ...
Total Defense Pillars 2021-08-16
6 Clues: network, cyber security • people living in harmony • safety and needs of country • confidence in nation's future • protect the country from external threats • government, business and industry supporting the economy
Cyber Security Crossword 2024-09-05
8 Clues: Network security system • Secret authentication key • Software to prevent malware • App for generating MFA codes • Secures data by scrambling it • A common email scam technique • Popular video conferencing platform • Authentication method using fingerprints or facial recognition
Cyber Law CIA 1 2021-09-03
Across
- school of thought supporting no regulation of cyber space.
- another name for cyber paternalism
- a false or fictitious name
- a declaration of the independence of the cyber space
- one of the general problems of new media
Down
- man made resource of cyber space
- digitalization of the Indian economy
- stakeholder of cyber space
- traces back to who is accessing the website
- constructing various contraints within the cyber
10 Clues: stakeholder of cyber space • a false or fictitious name • man made resource of cyber space • another name for cyber paternalism • digitalization of the Indian economy • one of the general problems of new media • traces back to who is accessing the website • constructing various contraints within the cyber • a declaration of the independence of the cyber space • ...
Cybersecurity Awareness Crossword 2024-10-17
Across
- A piece of data about your online history that creates a trail of crumbs
- A file or program that appears legitimate but is actually malicious
- Manipulating individuals to divulge confidential information
- An authentication method of verifying a user’s identity using two or more different methods
- A network security system that monitors and controls incoming and outgoing network traffic
- Software that secretly monitors and collects information from a computer
- A method of securing data by converting it into a code
- When bad actors create a fake identity to send phishing emails
Down
- A decoy system set up to attract and analyze cyber attackers
- Protects your computer from viruses
- Unauthorized access by following someone into a secure area
- A type of malware that demands payment to restore access to data
- A software update that fixes security vulnerabilities
- A secret word or phrase used to access a computer system
- Unauthorized access to data in a system
- A method of securing data by converting it into a code
- Software designed to harm or exploit any programmable device
- A scam where a person is tricked into giving personal information
18 Clues: Protects your computer from viruses • Unauthorized access to data in a system • A software update that fixes security vulnerabilities • A method of securing data by converting it into a code • A method of securing data by converting it into a code • A secret word or phrase used to access a computer system • Unauthorized access by following someone into a secure area • ...
cyber law cia 1 component 1 2021-09-05
Across
- "A declaration of independence of cyberspace" was written by whom?
- Which act in singapore limitd the liability of network service providers for accessed content?
- "code and other laws of cyberspace" was written by whom?
- Singapore actively supports global efforts in eradicating cyber crime by participating in schemes such as the _________ arrangement that promotes the fight against terrorism.
- who was the creator and driving force of napster?
Down
- Harassment in the form of cyber stalking and cyber bullying was prosecuted in singapore under which act?
- ____________________ refers to “the action or process of digitizing; the conversion of analogue data (esp. in later use images, video, and text) into digital form.”
- The flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- the lawsuit in the plaintiff is a computer scientist who wrote an encryption program which he wanted to share with his students and colleagues and post on his website. This lawsuit seeks to protect and even extend societal free speech values.
- Which is the governmental organisation responsible for singapore's infocom development and security?
10 Clues: who was the creator and driving force of napster? • "code and other laws of cyberspace" was written by whom? • "A declaration of independence of cyberspace" was written by whom? • Which act in singapore limitd the liability of network service providers for accessed content? • ...
gdgc crossword 2025-01-14
Across
- A prefix related to technology, especially the internet and security
- A step-by-step procedure for solving a problem or performing a task
- A system of numerical notation using only 0s and 1s
- Machines Simulated environments that run operating systems and applications
- The part of a website or app that users directly interact with
- The physical components of a computer, like the CPU or motherboard
- A program that converts code from a high-level language to machine language
Down
- A group of interconnected computers or devices for sharing resources
- A scripting language used to add interactivity to websites
- A security system that monitors and controls incoming and outgoing network traffic
- A reusable block of code designed to perform a specific task in programming
- Technology that mimics human intelligence, including learning and decision-making
- Remote servers used for storing, processing, and accessing data over the internet
- A structured platform for building applications, like React or Angular
- The server-side of a web application, handling logic, databases, and APIs
15 Clues: A system of numerical notation using only 0s and 1s • A scripting language used to add interactivity to websites • The part of a website or app that users directly interact with • The physical components of a computer, like the CPU or motherboard • A step-by-step procedure for solving a problem or performing a task • ...
CS Month Week 1 2023-09-14
Across
- A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.
8 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data. • ...
October 2022 Newsletter 2022-10-31
Across
- Abbreviation for Division holding an Information Session on November 2
- Number of CIO Portfolio projects opened in October
- Division now located in Michie North
- Number of New Hires
Down
- Guest for Cyber Security Month
- Slides from this meeting are now available on the intranet
- Number of Job Postings
- Opportunity to support nonprofit and charitable organizations
8 Clues: Number of New Hires • Number of Job Postings • Guest for Cyber Security Month • Division now located in Michie North • Number of CIO Portfolio projects opened in October • Slides from this meeting are now available on the intranet • Opportunity to support nonprofit and charitable organizations • Abbreviation for Division holding an Information Session on November 2
Browsing Safely 2025-06-17
Across
- Security : collection of technologies, process and practices
- vital information under seize
- theft: the act of stealing and misusing someone's personal information
- illegal entry into a computer system
- one time password
- Terrorism: it is used to conduct terrorism through the use of computers
Down
- it is a software that helps in preventing unauthorized access
- it is an act of harming or harassing
- It is the act of sending an email to a user
- Frauds: illegal methods to get money
- program designed to protect computers from malicious software
- criminal activity intended to harm anyone
12 Clues: one time password • vital information under seize • it is an act of harming or harassing • Frauds: illegal methods to get money • illegal entry into a computer system • criminal activity intended to harm anyone • It is the act of sending an email to a user • Security : collection of technologies, process and practices • ...
Christmas 2023 2022-12-25
Across
- Where I wandered around downtown the Friday before Halloween.
- Fighter pilot who claims to have seen UFOs.
- Conspiracy book left at a bar.
- Necessary thing to get a job as a software engineer.
- Thing on the ground in the hallway of the hotel from the Airbnb.
- New UFO acronym.
Down
- Country where sociologist friend is from.
- Rain’s voice assistant for mechanics.
- Aerospace technical society.
- Collection of scrolls read by cyber security engineer at philosophy group.
- Founder of the Fish Welfare Initiative.
11 Clues: New UFO acronym. • Aerospace technical society. • Conspiracy book left at a bar. • Rain’s voice assistant for mechanics. • Founder of the Fish Welfare Initiative. • Country where sociologist friend is from. • Fighter pilot who claims to have seen UFOs. • Necessary thing to get a job as a software engineer. • Where I wandered around downtown the Friday before Halloween. • ...
Steve Jobs 2018-06-05
Across
- having great excitement and/or interest.
- old vs [fill in the blank].
- protection from threat or danger.
- portable computer.
- the result of humankind's advancement in science and engineering.
Down
- physical and "permanent" components of any electronic device
- speed up the movement of something.
- each segment of world population who were, regarded collectively, born in the same period of time.
- associated with computer network or the internet.
- workers who are in the workforce.
10 Clues: portable computer. • old vs [fill in the blank]. • workers who are in the workforce. • protection from threat or danger. • speed up the movement of something. • having great excitement and/or interest. • associated with computer network or the internet. • physical and "permanent" components of any electronic device • ...
Cyber Ethics 2025-05-24
Across
- Bullying the digital technology social media, messaging apps.
- illegal intrusion.
- A security system that prevents unauthorised people.
- The process of transforming data into unreadable code.
- bombing spam attackers keep sending bulk mails.
Down
- criminal activities.
- Piracy when software is copied and distributed illegally.
- act of using the language and thoughts of another person as one's original work.
- The process of transferring the encrypted file over the network.
9 Clues: illegal intrusion. • criminal activities. • A security system that prevents unauthorised people. • bombing spam attackers keep sending bulk mails. • The process of transforming data into unreadable code. • Piracy when software is copied and distributed illegally. • Bullying the digital technology social media, messaging apps. • ...
Cybersecurity Brainteaser 2025-01-02
Across
- A service that encrypts your internet traffic and protects your online identity
- A secret word or phrase used to gain entry or authenticate identity
- The ability or permission to enter, view, or use a system or resource
- An additional security process requiring more than one form of verification
- What you should do when you receive a suspicious email
Down
- A network security system that monitors and controls incoming and outgoing traffic
- Information meant to be kept private and not shared without permission
- The most common cyber attack
- What you should do with your computer when you step away
- Software designed to disrupt, damage, or gain unauthorised access to a computer system
10 Clues: The most common cyber attack • What you should do when you receive a suspicious email • What you should do with your computer when you step away • A secret word or phrase used to gain entry or authenticate identity • The ability or permission to enter, view, or use a system or resource • Information meant to be kept private and not shared without permission • ...
"Revolutionizing HSSE: The Role of AI & Digitalization at Work" 2025-04-27
Across
- Logs Digital records for workplace safety analysis
- Digital training exercises using VR/AR for HSSE learning
- Technology detecting and preventing cyber threats
- Sensors System monitoring marine environmental conditions
- Simulator A training tool used for simulating marine navigation
- AI-driven robotic tools used in hazardous environments
- Enhances security with facial and object recognition
Down
- The process of automating HSSE reporting
- Compactor A device that uses solar energy to compress waste
- A system digitally tracking environmental compliance
- Wearable technology improving worker safety
- Checks AI-driven inspections replacing manual quality control
12 Clues: The process of automating HSSE reporting • Wearable technology improving worker safety • Technology detecting and preventing cyber threats • Logs Digital records for workplace safety analysis • A system digitally tracking environmental compliance • Enhances security with facial and object recognition • AI-driven robotic tools used in hazardous environments • ...
cyber security Games 2023-09-29
Across
- A fraudulent email or message that appears to be from a legitimate source.
- A type of malicious software that encrypts files and demands a ransom for decryption.
- A strong, complex, and unique string of characters used to protect accounts.
- The act of protecting information from unauthorized access.
- A device or software used to protect against malware and other cyber threats.
Down
- A method of authenticating users based on their physical or behavioral traits.
- A program designed to detect and remove malicious software.
- A technique used to trick individuals into revealing sensitive information.
8 Clues: A program designed to detect and remove malicious software. • The act of protecting information from unauthorized access. • A fraudulent email or message that appears to be from a legitimate source. • A technique used to trick individuals into revealing sensitive information. • A strong, complex, and unique string of characters used to protect accounts. • ...
All About EXIM! 2022-09-14
Across
- Must be carried for every client that uses our services.
- Our valued clients needs this the most.
- Security gives you peace of mind.
- A method of Cyber Attack
- Save the date, and don't be late!
- We couldn't do what we do best without them.
Down
- I was once the head of this great institution.
- In order for a business to gain profit, you need this.
- The quickest of them all.
- This is an important part of the loan approval process.
- One of our key sectors in development
- Sometimes we just have to start again.
- The day has just begun.
13 Clues: The day has just begun. • A method of Cyber Attack • The quickest of them all. • Security gives you peace of mind. • Save the date, and don't be late! • One of our key sectors in development • Sometimes we just have to start again. • Our valued clients needs this the most. • We couldn't do what we do best without them. • I was once the head of this great institution. • ...
Crossword Puzzle Game 1 2022-10-06
Across
- , To whom you will report the suspicious email you have received in PDAX email?
- , It is an extra layer of security that requires to enable for PDAX employee
- , Security is everyone's ___________
- ,This is a type of cyber attacks where criminals sends an email asking you to click on link or ask for your personal information
Down
- , It is intrusive software developed by cybercriminals who typically use it to steal or extract data that they can leverage over victims for financial gain.
- , SAfEPDAX mean Security _____________ for Everyone in PDAX
- , You are sending company's important file via email. What do you think you should do to protect your data in the file from security breaches?
- , It is a type of phishing that instead of email they attack through sending an SMS
- , You should change this frequently whenever you suspect that it could have been compromise and whenever PDAX policy requires it.
- , What should you do If you click or download a malicious attachment or fall victim to ransomware attacks?
10 Clues: , Security is everyone's ___________ • , SAfEPDAX mean Security _____________ for Everyone in PDAX • , It is an extra layer of security that requires to enable for PDAX employee • , To whom you will report the suspicious email you have received in PDAX email? • , It is a type of phishing that instead of email they attack through sending an SMS • ...
Cyber Security Awareness Month 2025-09-08
Across
- process of converting readable data, or plaintext, into an unreadable, encoded format called ciphertext
- Someone who breaks into computer systems
- Form of digital mail
- Type of scam/cyber attack
- protects internal network from untrusted external traffic
Down
- A Person that logs into a computer
- Attack that encrypts files and demands payment
- Authentication method to enhance security
- Weakness in a system that can be exploited
- Digital lock that protects your account
10 Clues: Form of digital mail • Type of scam/cyber attack • A Person that logs into a computer • Digital lock that protects your account • Someone who breaks into computer systems • Authentication method to enhance security • Weakness in a system that can be exploited • Attack that encrypts files and demands payment • protects internal network from untrusted external traffic • ...
Tech 2025-08-24
Across
- → Word used with security to mean “online safety” 🔒
- → Open-source operating system 🐧
- → Popular programming language, also a kind of coffee ☕
- → A programming language named after a snake 🐍
- → World’s most used search engine 🔍
Down
- → Electric car company founded by Elon Musk 🚗⚡
- → Online storage like Google Drive ☁
- → iPhone and MacBook company 🍏
- → A machine that can act like humans 🤖
- → First name of Tesla and SpaceX founder 🚀
10 Clues: → iPhone and MacBook company 🍏 • → Open-source operating system 🐧 • → World’s most used search engine 🔍 • → Online storage like Google Drive ☁ • → A machine that can act like humans 🤖 • → First name of Tesla and SpaceX founder 🚀 • → Electric car company founded by Elon Musk 🚗⚡ • → A programming language named after a snake 🐍 • ...
Cyber 2019-02-11
Across
- Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
- Any unsolicited e-mail, or junk mail
- A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
- A hostile, strongly worded message that may contain obscene language
- Any Internet-related illegal activity
- Methods individuals use to track, lure, or harass another person online
- In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- A diary or personal journal kept on a website
- To send information from your computer to another computer
- Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- A tracking feature of Internet browsers that shows all the recent websites visited
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- The name a user selects to be identified on a computer, on a network, or in an online gaming forum
Down
- To upload information to the Web
- A program, or set of instructions, that runs on a computer
- A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- To copy a file from one computer system to another via the Internet
- A location online that allows multiple users to communicate electronically with each other in real time
- A form of malicious code that displays unsolicited advertising on your computer
- “Live” time; the actual time during which something takes place
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- Willful and repeated harm inflicted through the medium of electronic text
- Refers to virtual sexual encounters between two or more persons
- Rules or manners for interacting courteously with others online
- A piece of information about your visit to a website that some websites record automatically on your computer
- Software that attempts to block malicious programs from harming your computer
- A secret word or number that must be used to gain access to an online service
- A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
30 Clues: To upload information to the Web • Any unsolicited e-mail, or junk mail • Any Internet-related illegal activity • A diary or personal journal kept on a website • A program, or set of instructions, that runs on a computer • To send information from your computer to another computer • “Live” time; the actual time during which something takes place • ...
Cyber 2025-11-05
Across
- Related to computers and online adventures
- A place to store things online so you can get them anywhere
- Something you do before sleeping to know what happened in a story
- A small problem or glitch that’s annoying but sometimes funny
- Imagine a party with a billion people
- To make someone part of a game or activity
- Your online picture and info about yourself
- Too much candy can be this
- When your backpack falls over suddenly
- When someone sneaks a joke on you and you fall for it
- Something that happens when you spill juice on your laptop
- over When a new game, app, or person grabs all your attention
Down
- a link Pressing a button online to see what happens
- To type your info in a website or form
- A group or club that does fun or serious things
- Something that happens very fast or without warning
- You want to remove a silly text from your phone
- When you make your friend laugh uncontrollably
- A nasty bug that makes you sneeze or cough
- A place where you keep funny photos or school projects
- When you ask someone nicely for help or a favor
- Something that can hurt your feelings or your friendship
- Trying something weird, like juggling bananas
23 Clues: Too much candy can be this • Imagine a party with a billion people • To type your info in a website or form • When your backpack falls over suddenly • Related to computers and online adventures • To make someone part of a game or activity • A nasty bug that makes you sneeze or cough • Your online picture and info about yourself • ...
The Eye of Minds Crossword 2022-06-01
Across
- The ___ of Minds
- the _________ Doctrine
- last of the author
- device used to make a digital screen appear in front of you
- the main skill of most of the characters use
- the name of the virtual world
- Kaine isn't human, he is a _______
- The War of ________
- Michael's nanny
Down
- Michael's other best friend
- VNS stands for Virtnet ________
- The place that everyone is trying to reach, lifeblood _____
- name of the box used to enter the digital world
- the point of "Devils of Destruction"
- The main villain of the story
- One of Michael's best friends
- Who Michael misses the most, despite not remembering them
- Kaine is considered a "_____ terrorist"
- what keeps you alive if you die in the Virtnet
- what the three main characters use to locate Kaine
20 Clues: Michael's nanny • The ___ of Minds • last of the author • The War of ________ • the _________ Doctrine • Michael's other best friend • The main villain of the story • One of Michael's best friends • the name of the virtual world • VNS stands for Virtnet ________ • Kaine isn't human, he is a _______ • the point of "Devils of Destruction" • Kaine is considered a "_____ terrorist" • ...
Kaylie and Eli Sip and Solve 2025-08-31
Across
- Engagement Location
- The mascot of the oposing team at the game when they starting dating
- Security Eli graduated in 2026 majoring in
- John Their first concert
- World Their first trip together
- Swift kaylie's favorite singer
- Their favorite energy drink
- First Date Location
- County Kaylie was Miss __ in 2023
- New Groove Kaylie's favorite movie
Down
- Bears Eli's favorite sports team
- Sigma Tau The name of Kaylie's sorority
- The college Kaylie graduated with her bachelor's degree
- Eli's favorite type of cookie
- Five Eli's football number in high school
- Kaylie's maiden name
- Kaylie's favorite color
- Roadhouse Their favorite restaurant
- Eli's favorite band
- Their high school mascot
- Christmas Story Eli's favorite christmas movie
- their total number of siblings
- Eli's middle name
- The name of Eli's childhood pet
- the month they started dating
25 Clues: Eli's middle name • Engagement Location • Eli's favorite band • First Date Location • Kaylie's maiden name • Kaylie's favorite color • John Their first concert • Their high school mascot • Their favorite energy drink • Eli's favorite type of cookie • the month they started dating • Swift kaylie's favorite singer • their total number of siblings • World Their first trip together • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
Cyber Terms and Concepts Review 2016-11-08
Across
- Cyber capability considered an ISR activity
- "Deny" effect w/ intent to permanently and completely deny access to the target
- Any device, computer program, or technique designed to create an effect in or through cyberspace (2 words, no space)
- One of the 4 cyber capabilities, secures DoD networks (2 words, no space)
- Interconnected, end-to-end set of information capabilities for warfighters
- Mission type intended to project power by the application of force
- Principle that cyberspace is a global, ___-____ domain
- OCO effects are classified as denial or _______
Down
- "Deny" effect meant to completely but temporarily deny access to the target
- Employment of cyber capes to achieve objectives in or through cyberspace (2 words, no space)
- Global domain within the information environment
- Cyberspace can be described in terms of 3 layers: Physical, ____, Cyber-Persona
- Cyber capability considered a non-intelligence activity to support follow on military ops
- Cyberspace limitation, can be difficult to confirm _____ in cyberspace
- OCO effect that can include degrade, disrupt or destroy
- Mission type intended to preserve the ability to use friendly cyberspace
16 Clues: Cyber capability considered an ISR activity • OCO effects are classified as denial or _______ • Global domain within the information environment • Principle that cyberspace is a global, ___-____ domain • OCO effect that can include degrade, disrupt or destroy • Mission type intended to project power by the application of force • ...
Network 2025-05-29
Across
- A device that directs data between different networks.
- Computing Storing and accessing data online instead of on local devices.
- A small unit of data transmitted over a network.
- A wired networking technology for local area networks.
- Legal protection for creators of digital content.
- Address A unique identifier for a device on the internet.
- A security system that filters incoming and outgoing network traffic.
- Footprint The trail of data left behind when using the internet.
- System that translates domain names into IP addresses.
- A secure connection that hides your online activities.
Down
- The right to keep personal information safe online.
- should make for an engaging crossword! Want me to add more or refine the hints further?
- Authentication An extra layer of security requiring two forms of verification.
- Malicious software designed to harm a computer.
- The delay in data transmission over a network.
- Hacking Using hacking skills to protect systems legally.
- Harassing or intimidating someone over the internet.
- The maximum data transfer rate of a network.
- A cyber-attack where fraudsters trick people into revealing personal data. Hacking Gaining unauthorized access to a system. Encryption – The process of converting data into a secure format.
19 Clues: The maximum data transfer rate of a network. • The delay in data transmission over a network. • Malicious software designed to harm a computer. • A small unit of data transmitted over a network. • Legal protection for creators of digital content. • The right to keep personal information safe online. • Harassing or intimidating someone over the internet. • ...
Security Education Week 2019 2019-02-20
Across
- a weakness in a system or internal controls that could be exploited by a threat source
- a fancy term for scamming people, ripping them off is social __________
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
- this is granted to an employee for access to classified information
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
Down
- this type of email can be reported using the add-in button on the Outlook toolbar
- provide advanced notice of this type of travel in advance to trade and security
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
Security Education Week 2019 2019-02-20
Across
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- a fancy term for scamming people, ripping them off is social __________
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- provide advanced notice of this type of travel in advance to trade and security
Down
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
- this is granted to an employee for access to classified information
- a weakness in a system or internal controls that could be exploited by a threat source
- this type of email can be reported using the add-in button on the Outlook toolbar
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
Security Education Week 2019 2019-02-20
Across
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- a weakness in a system or internal controls that could be exploited by a threat source
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
Down
- this is granted to an employee for access to classified information
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- a fancy term for scamming people, ripping them off is social __________
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- this type of email can be reported using the add-in button on the Outlook toolbar
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
- provide advanced notice of this type of travel in advance to trade and security
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
Bullying 2021-08-31
MMolloy_CIS-Word.pptx 2024-06-06
Across
- intentionally taking over the administrative position
- An observable occurrence in an information system or network.
- A program used for, and writing html and css documents
- Malicious program data which can damage software
- An unusual message from an unknown source, with malicious intent behind it.
- A kind of.. "Warden" that protects personal information, frequently found in websites with personal information.
- Unauthorized program code dedicated to carrying out a malicious commands, changes, etc.
- A value computed with a cryptographic process using a private key and then appended to a data object
- The activities that refer to the short and long term development of a cyber-incident
- The manner/method someone uses to infiltrate a secure system
Down
- refers to anything that could seriously affect a given system, infrastructure, or data center
- An ethical hacking method used to gather unfamiliar system data
- The result of unintentionally or accidentally deleting data
- a method used to infiltrate unauthorized systems in violation of security policy
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- A chain of text used to make calculations in Excel
- contains information, text, and can be used to write specific mathematical equasions
- A type of cyber-attack that is automized for this specific type of e-attack
- Things like firewalls, services, password prompts, etc.
19 Clues: Malicious program data which can damage software • A chain of text used to make calculations in Excel • intentionally taking over the administrative position • A program used for, and writing html and css documents • Things like firewalls, services, password prompts, etc. • The result of unintentionally or accidentally deleting data • ...
IT English 1 2025-09-14
Across
- to unexpectedly meet or be faced with something or someone
- a person who designs, writes, and tests software and applications
- a professional who protects an organization's computer systems and networks from cyber threats
- a secure, digital, and decentralized record of transactions
- the skill or knowledge that a person has in a particular area
- a security specialist who simulates cyber attacks to find vulnerabilities in computer systems
- teachable abilities or specific knowledge sets, like programming or accounting
- a person who prepares technical drawings and plans for machinery, buildings, or products
Down
- to start a project or task from the very beginning
- the point where a user and a computer system interact
- a person who publicly supports or recommends a particular cause, policy, or group
- a writer who creates the text that guides users through a product, like buttons and menu labels
- giving a lot of information clearly and in a few words
- a person who introduces new methods, ideas, or products
- someone who examines, cleans, and models data to find useful information and support decision-making
- a professional who installs, maintains, and repairs electrical equipment and systems
- an engineer who designs, constructs, and programs robots and robotic systems
- people skills, help you collaborate with people
- an engineer who helps integrate and launch new software or systems for customers
19 Clues: people skills, help you collaborate with people • to start a project or task from the very beginning • the point where a user and a computer system interact • giving a lot of information clearly and in a few words • a person who introduces new methods, ideas, or products • to unexpectedly meet or be faced with something or someone • ...
HIM 3350 Ch. 10 2025-03-20
Across
- A contract required between a covered entity and business associates to ensure data protection.
- The type of threat that includes phishing and ransomware
- A term for disguising data to protect it from unauthorized access
- The federal office responsible for enforcing HIPAA regulations since 2009
- The type of plan that ensures a healthcare entity can recover after a disaster
- A malicious program that replicates itself and spreads across a network
- The safeguard category that includes facility access controls and workstation security
Down
- A requirement of the HIPAA Security Rule that prevents alteration or destruction of data
- A technical safeguard that ensures only authorized users can access ePHI
- The federal act that introduced medical identity theft regulations in 1998
10 Clues: The type of threat that includes phishing and ransomware • A term for disguising data to protect it from unauthorized access • The federal office responsible for enforcing HIPAA regulations since 2009 • A malicious program that replicates itself and spreads across a network • A technical safeguard that ensures only authorized users can access ePHI • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
Cyber Security Puzzle 2017-04-11
Across
- Our team name
- Don't Click these if you find them in an email
- Facebook,Instagram and Twitter are types of this account
- _____ million homes have had serious virus problem on at least one computer
Down
- A form of bullying or harassment using electronic means
- People you meet on the internet who you don't know personally
- A free browser add-on that blocks potentially harmful ads
- Software designed to prevent and remove malicious software
8 Clues: Our team name • Don't Click these if you find them in an email • A form of bullying or harassment using electronic means • Facebook,Instagram and Twitter are types of this account • A free browser add-on that blocks potentially harmful ads • Software designed to prevent and remove malicious software • People you meet on the internet who you don't know personally • ...
Cyber Security Tips 2023-07-21
8 Clues: _____ yourself • Caution in _____ • Use strong _____ • Enable 2 factors _____ • Secure your home _____ • Be mindful of public _____ • Regularly backup your _____ • Be cautious of _____ attempts
