cyber security Crossword Puzzles
CYBER BULLYING 2026-01-30
Across
- yang biasanya di gunakan untuk cyber bullying
- benda yang sering di gunakan untuk cyber bullying
- nama lain dari cyber bullying
- termasuk perundungan lewat sosmed
- apalikasi yang sering di gunakan untuk cyber bullying
Down
- merupakan dampak korban cyber bullying
- bagaimana peran sekolah dalam menangani cyber bullying
- biasanya kata kata ini di pakai untuk mengancam
- bahasa indonesia cyber bullying
- cara untuk mencegah cyber bullying
10 Clues: nama lain dari cyber bullying • bahasa indonesia cyber bullying • termasuk perundungan lewat sosmed • cara untuk mencegah cyber bullying • merupakan dampak korban cyber bullying • yang biasanya di gunakan untuk cyber bullying • biasanya kata kata ini di pakai untuk mengancam • benda yang sering di gunakan untuk cyber bullying • ...
Cyber Bullying 2014-01-26
Across
- Cyber bullies may feel lesser E_________ for victims.
- Always put yourself in the S________ of others.
- Cyber bullies do it I________. (On purpose)
- Be K______ to others.
- Cyber Bullies do it over the I__________.
Down
- Cyber bullying may have greater R________.
- Keep your settings P_________.
- Don't H______ others.
- T_______ someone when you are being bullied.
- Save the E__________ by taking screenshots of yourself being bullied.
- Victims of Cyber bullying may turn to D________ ways to try to cope.
- Don't share your P___________.
- T_________ before you post.
13 Clues: Don't H______ others. • Be K______ to others. • T_________ before you post. • Keep your settings P_________. • Don't share your P___________. • Cyber Bullies do it over the I__________. • Cyber bullying may have greater R________. • Cyber bullies do it I________. (On purpose) • T_______ someone when you are being bullied. • Always put yourself in the S________ of others. • ...
Cybersecurity 2023-09-13
Across
- Cyber criminals find and use these ______ for their malicious intents.
- The magic number of characters for a strong password
- _____ knowledge of recent threats as well as softwares
- A Strong ______ ensure security by making it harder to access your accounts
- Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
- Most users interact with their mobile devices more often than computers.
Down
- Software that eliminates and mitigates malicious software
- Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
- Type of security when surfing the ____
- Process of converting data into an unreadable form for data protection.
- Do not include your ______ in your passwords such as your name or birthdate
- Do not _____ your password with others
12 Clues: Type of security when surfing the ____ • Do not _____ your password with others • The magic number of characters for a strong password • _____ knowledge of recent threats as well as softwares • Software that eliminates and mitigates malicious software • Cyber criminals find and use these ______ for their malicious intents. • ...
CS Month Week 1 2023-09-14
Across
- ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
- ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
- _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
10 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data • ...
Cybersecurity 2023-04-01
Across
- Cyber criminals find and use these ______ for their malicious intents.
- The magic number of characters for a strong password
- _____ knowledge of recent threats as well as softwares
- A Strong ______ ensure security by making it harder to access your accounts
- Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
- Most users interact with their mobile devices more often than computers.
Down
- Software that eliminates and mitigates malicious software
- Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
- Type of security when surfing the ____
- Process of converting data into an unreadable form for data protection.
- Do not include your ______ in your passwords such as your name or birthdate
- Do not _____ your password with others
12 Clues: Type of security when surfing the ____ • Do not _____ your password with others • The magic number of characters for a strong password • _____ knowledge of recent threats as well as softwares • Software that eliminates and mitigates malicious software • Cyber criminals find and use these ______ for their malicious intents. • ...
Crossword Puzzle 0123 2023-01-05
Across
- Technique of Hiding data behind a photo
- Software designed to help the user's computer detect viruses & avoid them
- Gaining access to a secured area by going behind an authorized person
- Hackers with main motive to gain financial profit by doing cyber crimes
- Emails sent to trick users to reveal their sensitive information.
- Phishing Techniques used to target CEO,CFO etc.
Down
- Existence of weakness in a system or network
- Socially or politically motivated hackers
- Scrambling of text in order to ensure the security of data/ information
- Sending bulk messages by abusing electronic messaging system
- An update in an operating system or application to fix bug & improve performance or security
- Unauthorized softwares installed on computer to gather sensitive information
12 Clues: Technique of Hiding data behind a photo • Socially or politically motivated hackers • Existence of weakness in a system or network • Phishing Techniques used to target CEO,CFO etc. • Sending bulk messages by abusing electronic messaging system • Emails sent to trick users to reveal their sensitive information. • ...
Cyber security 2020-09-08
6 Clues: almacenan informacion sobre vos • es un correo electronico no solicitado • programa para detectar y eliminar virus • evita el acceso no autorizado a una red privada • a travez de internet obtiene datos privados de los usuarios • diseñado para infiltrarse en su dispositivo sin su conocimiento
Cyber security 2021-11-05
Across
- something u put in to authenticate that u are who u say u are
- watching someone put there password in
Down
- identifying u by your body features
- something that helps protect computers from getting hacked
- has 2 meanings one is decease one is a computer one
- engineering the art of tricking or manipulating to get people to reveal there personal info
6 Clues: identifying u by your body features • watching someone put there password in • has 2 meanings one is decease one is a computer one • something that helps protect computers from getting hacked • something u put in to authenticate that u are who u say u are • engineering the art of tricking or manipulating to get people to reveal there personal info
cyber security 2017-06-30
6 Clues: danger that occur online • type of destructive software • a type of virus that hides it self • you may be at risk of getting hacked • this is a bad thing that happens online • software that enables a user to obtain covert information about another's computer activities
Cyber security 2022-11-18
Across
- a malicious form of self-replicating software.
- software that is designed to gain access to your computer with malicious intent.
- spread through the network and use the system’s resources.
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
- unwanted software that monitors and gathers information on a person and how they use their computer.
- unwanted software that monitors and gathers information on a person and how they use their computer.
- a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions
7 Clues: a malicious form of self-replicating software. • spread through the network and use the system’s resources. • software that is designed to gain access to your computer with malicious intent. • unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cyber security 2022-05-09
Across
- the use of deception to manipulate individuals
- submitting many passwords or passphrases with the hope of eventuallly guessing correctly
- an attack meant to shut down a machine or network, making it inaccessible to its intended users
Down
- People who hack and try steal your data
- A high-level general-purpose programming language
- A piece of code which is capable of copying itself
6 Clues: People who hack and try steal your data • the use of deception to manipulate individuals • A high-level general-purpose programming language • A piece of code which is capable of copying itself • submitting many passwords or passphrases with the hope of eventuallly guessing correctly • ...
Cyber Security 2025-10-10
Across
- Sending communications that appear to come from authentic source
- Hardware/ software that keeps network safe
- Unwanted and unsolicited message in the inbox of email
- Files that are temporarily downloaded from a website
Down
- It is a wireless connection - wireless fidelity
- It is a key of codes that protects our email, document, or files safe
6 Clues: Hardware/ software that keeps network safe • It is a wireless connection - wireless fidelity • Files that are temporarily downloaded from a website • Unwanted and unsolicited message in the inbox of email • Sending communications that appear to come from authentic source • It is a key of codes that protects our email, document, or files safe
Cyber security 2021-11-05
Across
- something u put in to authenticate that u are who u say u are
- watching someone put there password in
Down
- identifying u by your body features
- something that helps protect computers from getting hacked
- has 2 meanings one is decease one is a computer one
- engineering the art of tricking or manipulating to get people to reveal there personal info
6 Clues: identifying u by your body features • watching someone put there password in • has 2 meanings one is decease one is a computer one • something that helps protect computers from getting hacked • something u put in to authenticate that u are who u say u are • engineering the art of tricking or manipulating to get people to reveal there personal info
Cyber Security 2022-09-18
Across
- Attempt to acquire sensitive information such as username, passwords and credit card details
- Someone steals your personal information to commit fraud
Down
- creation of e mail messages with forged sender address
- The use of electronic communication to harass a person typically by sending messages of an intimidating or threatening nature
- The practice of taking someone elses work or ideas and passing them off as ones own
- a person who uses computers to gain unauthorized access to data.
6 Clues: creation of e mail messages with forged sender address • Someone steals your personal information to commit fraud • a person who uses computers to gain unauthorized access to data. • The practice of taking someone elses work or ideas and passing them off as ones own • Attempt to acquire sensitive information such as username, passwords and credit card details • ...
Solution Update 2016-04-01
Across
- Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
- Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
- Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
- Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
- Wie lautet der Name der modularen HPE Switches für Software Defined Networks?
5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks? • Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet? • Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für….. • ...
Solution Update 2016-04-01
Across
- Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
- Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
- Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
- Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
- Wie lautet der Name der modularen HPE Switches für Software Defined Networks?
5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks? • Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet? • Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für….. • Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware? • ...
Digital Footprint-Heather Berdine 2018-09-29
Across
- Citizen You on the internet
- Drive A Unit used to connect data
- The Link between Data and Internet
- Footprint Only seen when you Release Personal info
- A Unit of patched Data
- a Link to the Internet
- What you use to search the web
- A Site linked with a URL
Down
- Hat Hackers People who try to steal Personal Info
- a Pocket Device for everyday use
- A link to a site
- Hat Hackers People who improve security on computers
- Native Someone who has grown with the Internet
- A Mini Treat for your browser
- The World of Online
- Footprint Just a Normal footprint on the internet
- A Unit that manages Data
17 Clues: A link to a site • The World of Online • A Unit of patched Data • a Link to the Internet • A Unit that manages Data • A Site linked with a URL • Citizen You on the internet • A Mini Treat for your browser • What you use to search the web • a Pocket Device for everyday use • Drive A Unit used to connect data • The Link between Data and Internet • ...
FIT-D Technology Vocab. 2013-05-14
Across
- NAtional Cyber Security Alliance
- Processing Speed (Central Processing Unit)
- a slot where you can plug in different peripherals
- Short Term Memory (Random Access Memory)
- a program that allows you to search different things (Google, Bing)
- Device potable devices with internet
- the long-term memory on your computer
- Potable Document File
Down
- the act of startin a new practice or operation, usually with government
- Liquid Crystal Display/Light Emitting Diode
- the "brain" of the computer
- an electronic device that helps you to navigate the cursor around the screen
- Internet Service Provider
13 Clues: Potable Document File • Internet Service Provider • the "brain" of the computer • NAtional Cyber Security Alliance • Device potable devices with internet • the long-term memory on your computer • Short Term Memory (Random Access Memory) • Processing Speed (Central Processing Unit) • Liquid Crystal Display/Light Emitting Diode • ...
Scsu 2023-08-11
Across
- Is attemp to hide malicious programs
- it is a type of network that allows computer or an entire network to connect to each other
- Short form of domain name server
- A small computer program
- botnet other name
- Which is used to identify mobile,handset and device
Down
- A type of cyber security tried
- Wireless area network
- A type of eaves dropping attack
- first ever online registered virus
- Is called spoof mail
11 Clues: botnet other name • Is called spoof mail • Wireless area network • A small computer program • A type of cyber security tried • A type of eaves dropping attack • Short form of domain name server • first ever online registered virus • Is attemp to hide malicious programs • Which is used to identify mobile,handset and device • ...
Cyber Crossword 2022-09-28
Across
- Type of computer program that can infect a computer.
- ______ software means your systems are less likely to be vulnerable to ransomware attacks, malware, and data breaches.
- When working remotely or at a public space, ______ allows for secure access to your company's network.
- Cyber security is a shared ______.
- A social engineering technique that is frequently used to acquire user information, typically through emails or messages.
Down
- A data ______ happens when personal information is accessed, disclosed without authorisation, or is lost.
- Who can be a target of cyber-attack?
- Never leave your computers ______ when in a public space or while remote working.
- ______ wi-fi are unsafe and cannot be trusted.
9 Clues: Cyber security is a shared ______. • Who can be a target of cyber-attack? • ______ wi-fi are unsafe and cannot be trusted. • Type of computer program that can infect a computer. • Never leave your computers ______ when in a public space or while remote working. • ...
Staying safe online 2024-05-16
Across
- security staying safe online
- a program that infects files quickly
- a way to keep your device safe
- news misleading imformation
Down
- taking advantage of someone online who trusts you
- a name someone goes by on the internet
- telling a trusted adult or someone you trust
- sending inappropriate messages or photos
- protected from danger or risk of harm
9 Clues: news misleading imformation • security staying safe online • a way to keep your device safe • a program that infects files quickly • protected from danger or risk of harm • a name someone goes by on the internet • sending inappropriate messages or photos • telling a trusted adult or someone you trust • taking advantage of someone online who trusts you
CAES Security Week 2024-01-29
Across
- This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
- Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
- The process of converting information into a code to secure it from unauthorized access.
- Weaknesses or flaws in a system’s security that could be exploited by attackers.
- A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
- Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
- Software updates designed to fix security vulnerabilities and improve overall system performance.
- Unauthorized access or breach into a system, network, or device.
- The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
- The art of writing or solving codes; used in cybersecurity to secure communication through encryption.
10 Clues: Unauthorized access or breach into a system, network, or device. • Weaknesses or flaws in a system’s security that could be exploited by attackers. • The process of converting information into a code to secure it from unauthorized access. • Software updates designed to fix security vulnerabilities and improve overall system performance. • ...
Cyber Security 2021-06-28
Across
- When reading a URL, you will want to start on the
- All domain names end in this.
- To see the full message header when using gmail, you will select
- URL stands for Uniform Resource
Down
- Information that is located in the metadata of a media file
- This is the short version of Open Source Intelligence gathering
6 Clues: All domain names end in this. • URL stands for Uniform Resource • When reading a URL, you will want to start on the • Information that is located in the metadata of a media file • This is the short version of Open Source Intelligence gathering • To see the full message header when using gmail, you will select
cyber security 2021-11-05
6 Clues: not in a pond. • something to get you into a account. • something that copies versions of its self. • something to stop you using certain websites. • someone sending a fake email asking for money or details. • looking over someone's shoulder to get their information.
cyber security 2022-01-13
Across
- an attempt by hackers to damage or destroy a computer network or system
- designed to detect and destroy computer viruses
Down
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- are small files that Web sites put on your computer hard disk drive when you first visit
- any software program in which advertising banners are displayed while the program is running
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
6 Clues: designed to detect and destroy computer viruses • an attempt by hackers to damage or destroy a computer network or system • are small files that Web sites put on your computer hard disk drive when you first visit • any software program in which advertising banners are displayed while the program is running • ...
Cyber Security 2024-05-12
Across
- What is the malicious software that can replicate itself and spread to other computers?
- What is the practice of protecting information by transforming it into an unreadable format called?
- What is the term for a software program designed to block unauthorized access to a computer system?
Down
- What term describes a secret word or phrase used for authentication?
- What is the name for a malicious software designed to block access to a computer system until a sum of money is paid?
- What type of attack involves sending fraudulent emails to trick individuals into revealing sensitive information?
6 Clues: What term describes a secret word or phrase used for authentication? • What is the malicious software that can replicate itself and spread to other computers? • What is the practice of protecting information by transforming it into an unreadable format called? • ...
Cyber Security 2024-04-19
Across
- A type of malware that restricts access to your system until a ransom is paid.
- This type of software is designed to protect your computer from malware.
Down
- The act of protecting data from unauthorized access.
- A common method of protecting your accounts; it's best to have a strong one.
- A type of security threat that often appears as a legitimate email
- A secure protocol used for sending data securely over the internet.
6 Clues: The act of protecting data from unauthorized access. • A type of security threat that often appears as a legitimate email • A secure protocol used for sending data securely over the internet. • This type of software is designed to protect your computer from malware. • A common method of protecting your accounts; it's best to have a strong one. • ...
Cyber Security 2025-02-10
cyber security 2024-11-11
Across
- a program that monitors and removes malicious software from a device.
- software designed to harm a computer or network.
- a virus that is disguised as a standard program.
Down
- an email scam where an attacker deceives someone in order to get their private information.
- a string of characters that allows access to a computer system or service.
- a service that monitors network traffic.
6 Clues: a service that monitors network traffic. • software designed to harm a computer or network. • a virus that is disguised as a standard program. • a program that monitors and removes malicious software from a device. • a string of characters that allows access to a computer system or service. • ...
Cyber Security 2026-02-25
Cyber Security 2016-09-20
6 Clues: Malicious software • Electronic messaging • Needed to authenticate • Email looking to hook you • Protected Health Information • Personal Identifiable Information
Cyber security 2020-10-21
Across
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- designed to detect and destroy computer viruses.
Down
- body of technologies, processes and practices designed to protectnetworks, computers, programs and data from attack, damage orunauthorized access
- are small files that Web sites put on your computer hard disk drive when you first visit
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
6 Clues: designed to detect and destroy computer viruses. • are small files that Web sites put on your computer hard disk drive when you first visit • the activity of defrauding an online account holder of financial information by posing as a legitimate company. • ...
CYBER SECURITY 2024-09-19
Across
- Refers to someone who breaks into computer systems or networks without permission.
- Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______.
- It is an act of someone taking something that doesn’t belong to them without any permission.
Down
- a tool that allows people to connect with others and perform online activities.
- refers to improvements or changes.
- Refers to a possibility of something bad or undesirable happening.
6 Clues: refers to improvements or changes. • Refers to a possibility of something bad or undesirable happening. • a tool that allows people to connect with others and perform online activities. • Refers to someone who breaks into computer systems or networks without permission. • Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______. • ...
Cyber Security 2025-07-08
6 Clues: Das wort dass sie schützt • wie heist das Sicherungs System? • Was kann ihr PC komplett zerstören • Ein Synonym von Auf.2 der mit C anfängt • Was Sagen die Leute in Jamaica voll oft? • Der Mann der Ihnen ein Like bei der Sicherung gezeigt hat
Emerging Technology Puzzle 2025-09-19
Across
- Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny
- Security vulnerabilitiees in faster networks, increased dependency on connected devices and data interception
- Fraud in immersive platforms and privacy issues
- Data breaches, third party vendor risks, regulatory compliance challenges and service outages
- Automation errors, lack of human oversight, cyber vulnerabilities
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Potential to break current cryptographic systems which may lead to data breaches and fraud
- Increased attack surface, device vulnerabilities, data security and privacy concerns
9 Clues: Fraud in immersive platforms and privacy issues • Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities • ...
Stay safe when purchasing online crossword 2025-04-22
Across
- Report can help others avoid becoming a ______
- Websites which pretend to be real made by scammers
- Often the ______ never arrives
- Always pay with a _____ card online
- Always check _____ are real before ordering
Down
- Scam sites often ______ quickly
- Scam sites might have no ______ to contact
- ______ police: National Cyber Security Centre
- Scam text: 'There's a ______ with your order'
9 Clues: Often the ______ never arrives • Scam sites often ______ quickly • Always pay with a _____ card online • Scam sites might have no ______ to contact • Always check _____ are real before ordering • ______ police: National Cyber Security Centre • Scam text: 'There's a ______ with your order' • Report can help others avoid becoming a ______ • ...
Internet of Things 2025-06-08
Across
- This is needed to keep software up to date
- A dangerous program hackers might install
- A type of wireless connection common in IoT devices
- cyber attack
- The internet of things
Down
- Common IoT security weakness
- A watch that tracks health data
- A small computer that connects physical devices to the internet
- An assistant that listens for voice commands
9 Clues: cyber attack • The internet of things • Common IoT security weakness • A watch that tracks health data • A dangerous program hackers might install • This is needed to keep software up to date • An assistant that listens for voice commands • A type of wireless connection common in IoT devices • A small computer that connects physical devices to the internet
Digital Footprint-Heather Berdine 2018-09-29
Across
- Citizen You on the internet
- Footprint Only seen when you Release Personal info
- The World of Online
- Hat Hackers People who try to steal Personal Info
- A Mini Treat for your browser
- Footprint Just a Normal footprint on the internet
- The Link between Data and Internet
- What you use to search the web
Down
- a Pocket Device for everyday use
- A link to a site
- a Link to the Internet
- Native Someone who has grown with the Internet
- A Unit of patched Data
- A Site linked with a URL
- A Unit that manages Data
- Hat Hackers People who improve security on computers
- Drive A Unit used to connect data
17 Clues: A link to a site • The World of Online • a Link to the Internet • A Unit of patched Data • A Site linked with a URL • A Unit that manages Data • Citizen You on the internet • A Mini Treat for your browser • What you use to search the web • a Pocket Device for everyday use • Drive A Unit used to connect data • The Link between Data and Internet • ...
BE SECURITY SMART 2017-06-15
Across
- Never share log-in IDs or these.
- Software program that may be installed on your computer without your consent.
- _________ describes a technology or product that is owned exclusively by a single company and protected.
- Never ________what you do at work, or that you hold a security clearance.
- Always shred ITAR, PII or Proprietary data in this type of shredder.
- Never share these.
- Never send ITAR, Proprietary, or Personal Identifying Information (PII) via e-mail unless the file is _________.
- All employees are required to report this type of travel to their FSO.
- Your employee number so you can be entered into the drawing!
Down
- Never take this home with you.
- _______ crime has escalated in recent years due to advances in technology.
- An unauthorized disclosure of classified information.
- You should report unsolicited “phishing” emails and phone calls to _____.
- Passwords should not include the name of your favorite _______.
- Be careful what you post on _______.
- Type of engineering that uses personal contact to extract valuable information.
16 Clues: Never share these. • Never take this home with you. • Never share log-in IDs or these. • Be careful what you post on _______. • An unauthorized disclosure of classified information. • Your employee number so you can be entered into the drawing! • Passwords should not include the name of your favorite _______. • ...
Cyber-Mobbing 2015-01-20
Across
- Wie handeln Mobber?
- Man kann eine zivilrechtliche ... beim zuständigen Gericht einreichen
- An wen können Opfer sich wenden ?
- Wie heißen die Mobber?
- Was begehen Opfer als letzten Ausweg?
- Was kann aus Stress entstehen?
- Man sollte seine ... im Internet kennen
- Opfer können Beweise per... sichern
Down
- Ein anders Wort für Cyber-Mobbing?
- Ursache für Cyber-Mobbing?
- Manchmal reicht ein ... , damit der Mobber sein Verhalten ändert
- Cyber-Mobbing gilt im Gesetz noch nicht als eigener...
- Opfer können Mobber in sozialen Netzwerken ...?
- Cyber-Mobbing kann auf vielen verschiedenen...durchgeführt werden
- Was sind Opfer eventuell ausgesetzt?
15 Clues: Wie handeln Mobber? • Wie heißen die Mobber? • Ursache für Cyber-Mobbing? • Was kann aus Stress entstehen? • An wen können Opfer sich wenden ? • Ein anders Wort für Cyber-Mobbing? • Opfer können Beweise per... sichern • Was sind Opfer eventuell ausgesetzt? • Was begehen Opfer als letzten Ausweg? • Man sollte seine ... im Internet kennen • ...
CYBER AWARENESS 2024-11-02
Across
- A group of experts dedicated to responding to computer security incidents.
- The practice of protecting computer systems and networks from digital attacks.
- The process of converting data into an unreadable format to protect it from unauthorized access.
- Acronym for the process of collecting and analyzing publicly available information to gain insights.
- The unauthorized access to computer systems or networks.
- A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- A security system that monitors and controls network traffic.
- The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- Malicious software designed to harm computer systems or networks.
- A network of compromised computers controlled by an attacker.
Down
- Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- Malware that encrypts a victim's data and demands a ransom for its decryption.
- Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- The likelihood of a threat exploiting a vulnerability and causing harm.
- A weakness in a system or network that can be exploited by attackers.
- A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- Web A part of the internet that is not indexed by search engines and requires special software to access.
- A group of information security experts who respond to malware attacks or other computer security incidents.
- Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- Illegal activities committed using computer networks or devices.
24 Clues: The unauthorized access to computer systems or networks. • A security system that monitors and controls network traffic. • A network of compromised computers controlled by an attacker. • Illegal activities committed using computer networks or devices. • Malicious software designed to harm computer systems or networks. • ...
ABOUT IANT COURSES 2023-02-27
6 Clues: WHO CREATE A NETWORK • CONEECT TO COMPUTERS • A CYBER SECURITY COURSE • ADVANCE NETWORKING COURSE • HOW MANY CERTIFICATE IN SCSU • IANT MOST HARDWARE NETWORKING COURSE
Isearch Computer Security/Hacking 2023-03-21
Across
- computer programs and associated documentation and data
- Making something secure
- set of computers sharing resources
- The languages of Computers
- Making the Computer accomplish a specific task
- Virtual Personal Network
- the external and internal devices and equipment
Down
- self-replicating malware that duplicates itself to spread to uninfected devices
- What does it mean to be a ¨Bad¨ hacker
- Trying to find a shortcut to a problem.
- Relating to VR,AR,Software,and others
- Relating to the security devices and other things
- Internet of things
- something that can take control of someone's device
- How to make it harder to pull off using RATs and Trojans.
15 Clues: Internet of things • Making something secure • Virtual Personal Network • The languages of Computers • set of computers sharing resources • Relating to VR,AR,Software,and others • What does it mean to be a ¨Bad¨ hacker • Trying to find a shortcut to a problem. • Making the Computer accomplish a specific task • the external and internal devices and equipment • ...
E-Ethics 2021-01-12
Across
- Trade Commission - federal regulatory body which monitors and deals with identity theft
- - involves fraudulent e-mails pretending to originate from banks or online O
- Harassment - online harassment; can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening
- - software programs which spread from computer to computer and are malicious
- nature
- - the illegal stealing, copying or spreading of media including software, movies and music
- -take advantage of kids by using instant messaging, e-mail and social network sites
- Amendment - designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- Fraud - stealing money or property using interstate wire communication; considered a federal crime
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
- - Internet harassment
- usability of a computer
Down
- - any crime involving computers
- -software installed discreetly which alters tTrademarks- This is used to protect our IP symbols
- Theft - when someone steals personal information to commit fraud or other crimes
- - someone who illegally alters computer hardware or breaches computer systems
- - refer to TV, radio or the Internet; means of communication
- Mail- a form of cybercrime where offensive letters are sent through e-mail
- - security measure used on today’s Internet which insures the data is secure
- Trafficking - the illegal obtaining, giving or selling of passwords
- such as eBay® or PayPal®
- modifying electronics such as an Xbox®, cell phone, or iPod®
- - Used to protect designed (say an invention or a door knob) IP
- - Way to protect a written IP
- States Computer Emergency Readiness Team (USCERT)- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
25 Clues: nature • - Internet harassment • usability of a computer • such as eBay® or PayPal® • - Way to protect a written IP • - any crime involving computers • - refer to TV, radio or the Internet; means of communication • modifying electronics such as an Xbox®, cell phone, or iPod® • - Used to protect designed (say an invention or a door knob) IP • ...
Cybersecurity 2025-10-17
Across
- update that fixes software vulnerabilities
- software designed to harm or exploit systems
- secret word used to access an account
- copy of data stored for recovery
- network barrier that blocks unauthorized access
- secure connection that hides your online activity
- team that monitors and responds to cyber threats
Down
- software that detects and removes malicious programs
- malware that locks files for payment
- extra security layer requiring multiple verifications
- unauthorized access to confidential data
- software that secretly monitors user activity
- network of infected computers controlled remotely
- fraudulent emails that trick users into giving information
- process of converting data into a secure code
15 Clues: copy of data stored for recovery • malware that locks files for payment • secret word used to access an account • unauthorized access to confidential data • update that fixes software vulnerabilities • software designed to harm or exploit systems • software that secretly monitors user activity • process of converting data into a secure code • ...
Cyber Security Words and Terms 2022-09-15
Across
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- theft The deliberate use of someone else's identity, typically for financial gain.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
Down
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- source Software that has their code listed as free to use, share, and modify.
- text Text that can be read by the human eye, like this article!
- private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A cyber attacker who uses software and social engineering methods to steal data and information.
17 Clues: text Text that can be read by the human eye, like this article! • A simple form of code for software that can be written in word editors. • source Software that has their code listed as free to use, share, and modify. • theft The deliberate use of someone else's identity, typically for financial gain. • ...
Leveraging IT 2025-08-13
Across
- Machines performing human tasks
- Remote data storage service
- Your computer's frontline soldier against cyber threats
- Study of data to find patterns
Down
- A digital letter that travels at the speed of light
- A secret key that uncloks your digital world
- Security barrier for networks
- Turning paper records into pixels
8 Clues: Remote data storage service • Security barrier for networks • Study of data to find patterns • Machines performing human tasks • Turning paper records into pixels • A secret key that uncloks your digital world • A digital letter that travels at the speed of light • Your computer's frontline soldier against cyber threats
Case Study Puzzle (Lenovo Superfish) 2025-07-22
Across
- Which company was involved in the 2015 Superfish hash collision incident?
- What type of attack (short form) was enabled through the hash collision certificate forgery?
- The Superfish case exposed serious _______ weaknesses.
- What general cyber threat occurred due to weak hash use in Superfish?
- Name the adware that exploited certificate vulnerabilities on Lenovo devices.
Down
- Rogue _______ authorities were created using forged certificates.
- What process was used to create fake certificates that seemed genuine?
- In MITM, the attacker positions in the _______ between sender and receiver.
- Which hash function weakness was exploited in the Superfish attack?
- Which type of security certificate was exploited in this incident?
10 Clues: The Superfish case exposed serious _______ weaknesses. • Rogue _______ authorities were created using forged certificates. • Which type of security certificate was exploited in this incident? • Which hash function weakness was exploited in the Superfish attack? • What general cyber threat occurred due to weak hash use in Superfish? • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Melissa 8G : Social engineering 2023-02-02
Across
- How are people targeted through Pharming?
- How are people targeted through Phishing?
- What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."
Down
- Social Engineering takes advantage of which security flaw in a computer system?
- Manipulating people to give-up information
- Tricking a person into revealing some personal information
6 Clues: How are people targeted through Pharming? • How are people targeted through Phishing? • Manipulating people to give-up information • Tricking a person into revealing some personal information • Social Engineering takes advantage of which security flaw in a computer system? • ...
Information and Cyber Security 2021-03-29
Across
- uses asymmetric key encryption
- person who performs a social engineering attack
- What will freezing your credit not affect?
- For online shopping it's best to use...?
Down
- most valuable to companies looking to sell you something
- Requires a carrier file to self-replicate
- What information do you need to set up a wireless access point?
- When is it ok to reuse a password?
- Cyber security month
- Weakest link in cybersecurity
- Continually bombarding a targeted network with fake requests
11 Clues: Cyber security month • Weakest link in cybersecurity • uses asymmetric key encryption • When is it ok to reuse a password? • For online shopping it's best to use...? • Requires a carrier file to self-replicate • What will freezing your credit not affect? • person who performs a social engineering attack • most valuable to companies looking to sell you something • ...
Cyber Crossword 2025-07-29
Across
- Événement grave d’origine naturelle ou humaine, accidentale ou intentionelle, occasionant des pertes et des dommages importants aux systems informatiques d’une organization ou d’un individu. [computer disaster /IT disaster]
- une faille de sécurité dans un logiciel ou un matériel qui est inconnue du fournisseur ou du développeur au moment où elle est exploitée par des attaquants. [this is a very important security flaw that allows attacker to gain complete control over your computer. This is a security flaw with no available fix or remedy
- le phishing [phishing / phishing attack] Le terme de phishing ou hameçonnage désigne l'envoi d'e-mails semblant provenir d'une source de confiance (telle qu'une banque, un service public, etc.) mais dont le but est en réalité de tromper le destinataire pour le conduire à révéler des informations confidentielles. C'est pourquoi il est toujours conseillé d'accéder à des pages Web en écrivant l'adresse directement dans le navigateur.
- défaut de sécurité [security vulnerability / security flaw]
Down
- vulnérabilité informatique ayant permis une intrusion illicite dans un système informatique, et pouvant entrainer le vol, la divulgation ou la destruction de données importantes pour une organization. [computer security breach / security breach]
- canal de communication privé dont les extrémités sont mutuellement authentifié [VPN]. The French often refer to it as “un VPN” –so you can match it with that.
- [authentification qui met en oeuvre, de façon concomitante, des procédés de verification faisant appel à au moins deux facteurs différents] [MFA]
- une attaque cyber [terme général] [cyber attack] longer definition = Ensemble coordonné d’actions malveillantes conduits par l’intermédiaire du cyberspace, qui visent à endommager, à forcer ou à détourner un réseau ou un système informatique afin de commettre un acte préjudiciable.
- un programme ou code malveillant conçu pour nuire à un ordinateur, un serveur, un réseau, ou une infrastructure informatique, sans que l'utilisateur ne s'en rende compte.
- Logiciel malveillant dissimulé à l’intérieur d’un programme en apparence inoffensive [Trojan horse]
10 Clues: défaut de sécurité [security vulnerability / security flaw] • Logiciel malveillant dissimulé à l’intérieur d’un programme en apparence inoffensive [Trojan horse] • [authentification qui met en oeuvre, de façon concomitante, des procédés de verification faisant appel à au moins deux facteurs différents] [MFA] • ...
ทักษะพลเมืองดิจิทัล 2023-06-14
Across
- ทักษะการเข้าใจสิทธิบนโลกดิจิทัลทั้งของตนเองและผู้อื่นบนโลกออนไลน์ เราต่างก็มีสิทธิเหมือนกับโลกออฟไลน์ มีกฏหมายที่คอยควบคุมให้การอยู่ร่วมกันบนโลกดิจิทัลเป็นไปอย่างสงบสุข พลเมืองดิจิทัลที่ดีจึงควรรู้และเข้าใจถึงสิทธิที่ตนเองและผู้อื่นมี เพื่อปกป้องข้อมูล และความเป็นส่วนตัวบนโลกออนไลน์
- ทักษะการเข้าใจและรู้เท่าทันสื่อดิจิทัลบนโลกดิจิทัลใครก็สามารถเป็นผู้สร้างเนื้อหาขึ้นมาได้ ดังนั้นจึงมีข้อมูลจำนวนมหาศาล ทั้งข้อมูลที่เป็นจริง และไม่จริง ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรมีทักษะในการวิเคราะห์ และประเมินข้อมูล ที่ได้รับจากโลกดิจิทัลด้วยเหตุและผล
- ทักษะการเห็นอกเห็นใจบนโลกดิจิทัลโลกดิจิทัล ทำให้การสื่อสารรวดเร็วและกว้างไกลมากขึ้น อาจทำให้อาจละเลยการรับรู้ เข้าใจอารมณ์ทั้งของเราและผู้อื่นไปบ้าง การเห็นอกเห็นใจตนเองและผูัอื่นบนโลกดิจิทัลจึงเป็นทักษะสำคัญที่ทำให้พลเมืองดิจิทัลอยู่ด้วยกันอย่างมีความสุข
- ทักษะการป้องกันภัยคุกคามบนโลกดิจิทัลในโลกดิจิทัล ก็มีคนที่ไม่หวังดีกับเรา สร้างภัยคุกคามต่างๆ ต่อระบบคอมพิวเตอร์ ไม่ว่าจะเป็น มัลแวร์ หรือไวรัส ในรูปแบบต่างๆ เพื่อโขมยข้อมูลของเรา พลเมืองดิจิทัลที่ดีจึงต้องรู้วิธีการป้องกัน และรับมือภัยคุกคามเหล่านี้
Down
- ทักษะการสร้างสมดุลที่ดีในการใช้งานเทคโนโลยีดิจิทัลโลกออนไลน์ช่างมีอะไรน่าตื่นตา ตื่นใจ จนรู้ตัวอีกทีก็หมดเวลาไปตั้งเท่าไหร่ บางครั้งเราอาจจะอยู่บนโลกดิจิทัลมากกว่ากับคนรอบตัวซะอีก ดังนั้น พลเมืองดิจิทัลที่ดีจึงควรมีทักษะการสร้างสมดุลที่ดีระหว่างโลกออนไลน์และออฟไลน์
- ทักษะการสื่อสารบนโลกดิจิทัลทุกการกระทำบนโลกดิจิทัล มักจะทิ่งร่องรอยดิจิทัลไว้อยู่เสมอ พลเมืองดิจิทัลที่ดีจึงควรรับรู้และเข้าใจแนวทางการสื่อสารของโลกดิจิทัล เพื่อสร้างร่องรอยดิจิทัลที่ดี และไม่สร้างร่องรอยที่อาจก่อให้เกิดความเสียหายทั้งต่อตนเองและผู้อื่นในอนาคต
- ทักษะการสร้างตัวตนที่แท้จริงบนโลกดิจิทัลการใช้งานบนโลกออนไลน์ มักจะต้องการให้เราระบุตัวตนก่อนการใช้งาน และบางครั้งอาจทำให้ตัวตนของเรามีความหลากหลายไปตามแพลตฟอร์มต่างๆ พลเมืองดิจิทัลที่ดีจึงควรรับรู้จึงตัวตนที่แท้จริงเดียวกันของตนเองทั้งในออนไลน์และออฟไลน์
- ทักษะการป้องกันตนเองในโลกดิจิทัลการใช้งานบนโลกดิจิทัลก็พาให้เราพบความเสี่ยงมากมายที่อาจจะส่งผลกระทบต่อจิตใจของเราและคนรอบตัว เช่น Cyberbully, Cyber Harrassment และอื่นๆ ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรรู้วิธีป้องกันและรับมืออย่างถูกวิธี
8 Clues: ทักษะการป้องกันตนเองในโลกดิจิทัลการใช้งานบนโลกดิจิทัลก็พาให้เราพบความเสี่ยงมากมายที่อาจจะส่งผลกระทบต่อจิตใจของเราและคนรอบตัว เช่น Cyberbully, Cyber Harrassment และอื่นๆ ดังนั้นพลเมืองดิจิทัลที่ดีจึงควรรู้วิธีป้องกันและรับมืออย่างถูกวิธี • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Cyber ethics and networking concept 2025-06-20
Across
- network created for individual person
- unwanted bulk emails come from unknown sources
- immiting someone's original work
- crime done through the internet
- ethical practices while using internet
- network which works vey fast
- Geometrical shapes of wires
Down
- ILLEGAL INTRUSION IN THE COMPUTER
- opposite of encryption
- Component of networking
- multiple backups are stored on different computers
- ethics rules we should follow while using internet
- security protecting the network from misuse
- networking cable used in telephones
- networking Component which connects all the device in a network
15 Clues: opposite of encryption • Component of networking • Geometrical shapes of wires • network which works vey fast • crime done through the internet • immiting someone's original work • ILLEGAL INTRUSION IN THE COMPUTER • networking cable used in telephones • network created for individual person • ethical practices while using internet • ...
Crowder Cyber Security Awareness 2021-10-04
Across
- You should not just check identity, you should also confirm ________
- An email that tries to trick you into visiting a scam website or to get your personal details
- A location on the internet you can save your data
- The strongest password is: Grrrrrrrr8!!!, Go'sa!, John012109, Am3r1ca!, This_P"zz1e!
- A nasty program that can harm your device or computer
- A program you use to access the internet
Down
- This can slow down your computer AND watch everywhere you go on the internet
- A type of malware that pretends to be a program you want
- A type of malware that copies itself into other files on your computer
- Information Security is not just a ______ issue
- A person who tries to access your computer without your knowledge
- A sequence of characters you use to access your accounts
12 Clues: A program you use to access the internet • Information Security is not just a ______ issue • A location on the internet you can save your data • A nasty program that can harm your device or computer • A type of malware that pretends to be a program you want • A sequence of characters you use to access your accounts • ...
cybersecurity story 2024-02-23
Across
- - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- - The protection of the cyber realms
- - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- - someone who tries to access data they aren't authorized to view
- - monitoring network security system
Down
- - What happens when the firewall is broken
- - A security incident where confidential information is stolen
- - the story this puzzle is about
- - a mechanism for creating a secure connection
10 Clues: - the story this puzzle is about • - The protection of the cyber realms • - monitoring network security system • - What happens when the firewall is broken • - a mechanism for creating a secure connection • - A security incident where confidential information is stolen • - someone who tries to access data they aren't authorized to view • ...
Taldor's "Go Cyber" Competition 2014-01-22
Across
- A code name made for collecting large amounts of data regarding individuals.
- A malware that requests the payment of a fee to unlock encrypted files.
- The company behind February’s largest security conference.
- A software weakness which allows an attacker to gain access to a system.
- Had opened the Cybertech2014.
- A common hacking technic that relies on a typographical error when typing a website address.
- Using something to one’s own advantage.
- An exploit technique used for malicious code execution.
- An attack that exploits an unknown vulnerability in software.
- A table of legitimate files and processes.
- Malicious software, designed to hide its processes or programs.
Down
- A Security company founded by Kevin Mandia.
- The social GPS.
- A form of attack using psychological manipulation of people.
- A small piece of code used as the payload in exploitation.
- A common suite for penetration testing and exploitation.
- The Anonymous attack against Ukraine government data.
- A cyber unit under China’s 2nd Bureau of the PLA.
- A technology that is designed to detect potential data breaches and prevent them.
- An attempt to acquire information by masquerading as a trustworthy entity.
- A symmetric-key block cipher.
- Are you dead yet?
22 Clues: The social GPS. • Are you dead yet? • Had opened the Cybertech2014. • A symmetric-key block cipher. • Using something to one’s own advantage. • A table of legitimate files and processes. • A Security company founded by Kevin Mandia. • A cyber unit under China’s 2nd Bureau of the PLA. • The Anonymous attack against Ukraine government data. • ...
Cybersecurity Terms 2023-09-10
Across
- The act of being in accordance with established guidelines.
- When someone is using another person's information maliciously.
- A security method that encodes data to make it more secure.
- A valuable tool for developing applications.
- A group of connected computers that share user account information and a security policy.
- This must be protected from unauthorized access.
- A special computer designed for technical or scientific applications.
- Establishing something as genuine.
- In technology, this means maintaining hardware and software.
- Relating to software,a company that develops and sells products.
Down
- Programs on hardware.
- When you open a malicious email or text that is disguised as a legitimate one.
- A service that provides technology-related help.
- A type of secure connection.
- A type of coverage that insures in case of a cyber attack.
- When data is stolen from a system without the system's owner noticing.
- A string of letters, numbers, and/or symbols used for verifying identity.
- A person who commits fraud and/or is involved in fraudulent schemes.
- Malicious software that holds data hostage until a ransom is paid.
- Disguising an unknown source as a known source.
20 Clues: Programs on hardware. • A type of secure connection. • Establishing something as genuine. • A valuable tool for developing applications. • Disguising an unknown source as a known source. • A service that provides technology-related help. • This must be protected from unauthorized access. • A type of coverage that insures in case of a cyber attack. • ...
Be the Change Be Bully - Free 2016-05-04
Across
- We should all be responsible and ______ of what we do online and offline.
- If we know we have been hurting others, we can apologise and make ______.
- Stop, ____ , Save and Tell are the steps to stop Cyber bullying.
- Change your ______, change their worlds.
- ________ bullying is using internet or mobile devices to embarrass and hurt another person
- Bullying is not _____.
- An active bystander is an _________, who plays the most important role in a bullying experience.
- _____ tend to not report in cyber bullying.
- ______ usually targets people who are alone.
- A good ________ is someone who respect and care for you.
- ______ feel hurt, alone, depressed and helpless in a bullying situation.
- Bullying is all about _____, happens more than once and cause lots of sadness.
- When I have disagreements with my friends I could be _______ and work out the differences.
Down
- We can all ______ up for bullying.
- _______ bullying is the most common form of bullying.
- The website is www._____.sg
- __________ is a form of verbal bullying.
- Physical, Verbal, _______ and Cyber bullying are the different forms of bullying.
- Cyber bullying is more _________ than traditional bullying.
- Children are not ______ bullies but as good followers.
- ________ by not responding.
- Tips to stop bullying is Ignore, Walk Away, Tell Someone, Stay Cool and _____.
- When my friend is hurt by what I have done I should _______ .
23 Clues: Bullying is not _____. • The website is www._____.sg • ________ by not responding. • We can all ______ up for bullying. • Change your ______, change their worlds. • __________ is a form of verbal bullying. • _____ tend to not report in cyber bullying. • ______ usually targets people who are alone. • _______ bullying is the most common form of bullying. • ...
The Internet and Cybersecurity 2024-04-30
Across
- A type of cyber attack where individuals are manipulated into revealing sensitive information.
- A trial and error method used to decode encrypted data such as passwords.
- An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
- The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
- The practice and study of techniques for secure communication, often involving encryption and decryption.
- A type of computation in which many calculations or processes are carried out simultaneously.
- Refers to the gap between people who have access to modern information and communication technology and those who do not.
- A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
- The practice of concealing messages or data within other non-secret text or data.
- The process of verifying the identity of a user or system.
- A type of encryption where the same key is used for both encryption and decryption.
Down
- A cryptographic key that can be freely distributed and used to encrypt messages.
- A networking device that forwards data packets between computer networks.
- A global network of interconnected computers that communicate with each other using a common set of protocols.
- A cyber attack that disrupts normal traffic of a targeted server.
- The inclusion of extra components in a system to improve reliability and performance.
- A set of rules that govern the exchange of data between devices.
- The process of encoding information in such a way that only authorized parties can access it.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A public-key encryption algorithm used for secure data transmission over the internet.
- Small units of data that are transmitted over a network.
21 Clues: Small units of data that are transmitted over a network. • The process of verifying the identity of a user or system. • A set of rules that govern the exchange of data between devices. • A cyber attack that disrupts normal traffic of a targeted server. • A networking device that forwards data packets between computer networks. • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
crossword 2025-09-16
Across
- Exploit that targets stack buffer overflow or OS in memory.
- A comprehensive assessment and analysis of an organization’s cybersecurity and cyber risks.
- An APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
- Attack that redirects users to malicious sites by corrupting DNS cache entries with forged responses.
- A security standard that outlines the minimum required security controls for an organization's systems.
- Attack where malicious software secretly records everything typed on the keyboard.
- Technology that stores data and applications online instead of local servers.
- Tool widely used for finding and exploiting web application vulnerabilities.
Down
- A requirement that prevents use of default passwords or weak authentication methods.
- Malware that hides in system memory without leaving traces on disk.
- Security technique that isolates code execution in a controlled environment to prevent it from affecting the broader system.
- A unique identifier generated by the server to maintain a user's session, typically used by web applications.
- Tool aggregates and analyzes log and event data to detect threats and support incident response.
- Practice that enforces permissions based on job roles.
- A malware designed to give hackers access to and control over a target device.
15 Clues: Practice that enforces permissions based on job roles. • Exploit that targets stack buffer overflow or OS in memory. • Malware that hides in system memory without leaving traces on disk. • Tool widely used for finding and exploiting web application vulnerabilities. • Technology that stores data and applications online instead of local servers. • ...
Smart People Can Do This.... PS only 10% of people can do this 2021-05-06
Across
- -What does .org stand for?
- -What does .com stand for?
- -A talented programmer that can breach cyber security, usually to steal data
- -A device that routes traffic between networks
- -What is an AD
- -what is an ISP
Down
- -A facility used to house computer systems and associated components, such as telecommunications and storage systems
- -What does CD stand for?
- -What does WWW mean?
- -What is an AP
10 Clues: -What is an AP • -What is an AD • -what is an ISP • -What does WWW mean? • -What does CD stand for? • -What does .org stand for? • -What does .com stand for? • -A device that routes traffic between networks • -A talented programmer that can breach cyber security, usually to steal data • ...
Netiquette Awesome and Epic Crossword That is Totally Related to Cyber Security 2023-09-18
Across
- The word for a lot of junk mail
- When online do not freely distribute __________ information
- When online use proper ________
- The word for network etiquette
- The word for a strong opinion directed at someone else
Down
- The word for always having caps lock on
- When online make sure to respect other's ________
- When online remember the _____ on the other side
- ______ security
- When online treat others how you want to be _________
10 Clues: ______ security • The word for network etiquette • The word for a lot of junk mail • When online use proper ________ • The word for always having caps lock on • When online remember the _____ on the other side • When online make sure to respect other's ________ • When online treat others how you want to be _________ • The word for a strong opinion directed at someone else • ...
challenges and changes 2016-04-03
20 Clues: sad • brain • cyber • gossip • unhappy • punching • physically • not the same • not including • what you feel • strong belief • not the truth • poor behaviour • this is online • discriminating age • words naughty words • discriminating gender • this makes people fell sad • words that make you fell sad • bad comments about where yo come from
cyb 2024-12-05
Across
- A network that encrypts your internet connection
- This type of Wi-Fi should be used cautiously
- An extra layer of security requiring two or more verification methods
- The practice of protecting systems, networks, and programs from digital attacks
- A program that detects and removes malicious software
Down
- A malicious software designed to harm or exploit any programmable device
- The process of converting information or data into a code to prevent unauthorized access
- Software updates often include these to fix security vulnerabilities
- A mix of letters, numbers, and special characters makes a strong one
- A type of cyber attack that tricks individuals into providing sensitive information
10 Clues: This type of Wi-Fi should be used cautiously • A network that encrypts your internet connection • A program that detects and removes malicious software • Software updates often include these to fix security vulnerabilities • A mix of letters, numbers, and special characters makes a strong one • An extra layer of security requiring two or more verification methods • ...
Vocab E-Ethics 2021-01-12
Across
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Theft when someone steals personal information to commit fraud or other crimes
- take advantage of kids by using instant messaging, e-mail and social network sites
- someone who illegally alters computer hardware or breaches computer systems
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
- States Computer Emergency Readiness Team (USCERT)- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- involves fraudulent e-mails pretending to originate from banks or online O
- Trafficking the illegal obtaining, giving or selling of passwords
- Way to protect a written IP
- an individual who alters electronics legally
- refer to TV, radio or the Internet; means of communication
- Harassment online harassment; can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening
- nature
Down
- Internet harassment
- software programs which spread from computer to computer and are malicious
- Trade Commission federal regulatory body which monitors and deals with identity theft
- such as eBay® or PayPal®
- This is used to protect our IP symbols
- any crime involving computers
- Amendment designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- security measure used on today’s Internet which insures the data is secure
- Mail a form of cybercrime where offensive letters are sent through e-mail
- the illegal stealing, copying or spreading of media including software, movies and music
- software installed discreetly which alters the usability of a computer
- Fraud stealing money or property using interstate wire communication; considered a federal crime
- Used to protect designed (say an invention or a door knob) IP
26 Clues: nature • Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • refer to TV, radio or the Internet; means of communication • modifying electronics such as an Xbox®, cell phone, or iPod® • ...
Chapter 12 - Security Plus 2024-03-25
Across
- streams of information containing data about various cyber threats
- Payment to a third-party for assuming risks
- The willingness to assume a level of risk in order to achieve a result
- Verifying that the organization is in compliance with required standards
- Threat intelligence data that has been legally gathered
- An examination of results to verify their accuracy
- An alarm that is raised when there is no problem.
- Directly probing for vulnerabilities
- Using tools in a penetration test that do not raise any alarms
- Analyzing a vulnerability scan for validation of its accuracy
Down
- A subjective estimate of the loss to an asset if the specific threat occurs
- pay security researchers who uncover security bugs
- To treat one item as more important than another.
- Relating to ownership.
- assessment that attempts to uncover vulnerabilities and then exploit them
- Numeric scores on a vulnerability
- The failure to raise an alarm when there is an issue.
- A judgment made about the results of an audit
- Conformity to mandated standards
- Part of the web that is the domain of threat actors
- Assessments by independent third-party auditors
21 Clues: Relating to ownership. • Conformity to mandated standards • Numeric scores on a vulnerability • Directly probing for vulnerabilities • Payment to a third-party for assuming risks • A judgment made about the results of an audit • Assessments by independent third-party auditors • To treat one item as more important than another. • ...
Cyber Mobbing 2015-01-21
Across
- Agressive Art von Cyber Mobbing
- Betroffene von Cyber Mobbing
- Wie kann man Beweise sichern
- Gegen welches Recgt wird verstoßen
- An wen kann sich das Opfer wenden
- Cyber Mobbing schadet der ... einer Person
Down
- Handyvideos mit Schlägerei
- Falsches Konto
- Ursachen für Cybermobbing des Täters
- Was sollten sich Opfer suchen
- Unterschied zum normalem Mobbing
- Täter verlangt Gegenleistung
- Täter
- Was sollte man regelmäßig ändern
- Folgen für Opfer
15 Clues: Täter • Falsches Konto • Folgen für Opfer • Handyvideos mit Schlägerei • Betroffene von Cyber Mobbing • Wie kann man Beweise sichern • Täter verlangt Gegenleistung • Was sollten sich Opfer suchen • Agressive Art von Cyber Mobbing • Unterschied zum normalem Mobbing • Was sollte man regelmäßig ändern • An wen kann sich das Opfer wenden • Gegen welches Recgt wird verstoßen • ...
Multnomah Cyber Security Awareness 2022-09-29
Across
- There is never a need to report this type of email
- Stealing data is a _ _ _ _ _
- Who I am is my _ _ _ _ _ _ _ _
- Unwanted software that can damage your computer or steal your data
- Never share this with anyone!
- Personal Identifiable _ _ _ _ _ _ _ _ _ _ _
Down
- Multi Factor _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The H in HIPAA
- The device that protects your network
- Email designed to steal your information
- _ _ _ _ _ _ _ line should never contain sensitive data
- When data is compromised by bad actors
12 Clues: The H in HIPAA • Stealing data is a _ _ _ _ _ • Never share this with anyone! • Who I am is my _ _ _ _ _ _ _ _ • The device that protects your network • When data is compromised by bad actors • Multi Factor _ _ _ _ _ _ _ _ _ _ _ _ _ _ • Email designed to steal your information • Personal Identifiable _ _ _ _ _ _ _ _ _ _ _ • There is never a need to report this type of email • ...
Cyber Security Crossword Puzzle 2023-12-04
Across
- The process of encoding sensitive data, so it can't be hacked and viewed by people or computers that it isn't intended for.
- Video in which faces have been either swapped or digitally altered, with the help of AI.
- The place files can be saved, so they can be accessed anywhere rather than just on one device.
- To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss
- A type of software that defends your computer against viruses and malware. It acts as a protective shield when you're online.
- fraudulent business or scheme that takes money or other goods from an unsuspecting person.
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- A form of harassment that happens on the internet, usually through social media platforms.
- Small files that are stored on a user’s computer to help a website to recognize you and keep track of your preferences.
- A dangerous file that can infect a computer when downloaded. It can cause harm to the computer and even steal data.
- when someone who lacks the proper authentication follows an employee into a restricted area.
- A string of letters, numbers and symbols that you use to access your online account.
12 Clues: A string of letters, numbers and symbols that you use to access your online account. • Video in which faces have been either swapped or digitally altered, with the help of AI. • A form of harassment that happens on the internet, usually through social media platforms. • ...
Cyber Security Awareness Month 2024-10-15
Across
- An initial phase of a cyber-attack which entails gathering information about a target system, network, or organization to pinpoint vulnerabilities that can be exploited in subsequent stages.
- Targeted attacks aimed at specific individuals or organizations, often personalized.
- A common threat to individuals involves the theft of personal information such as Social Security numbers and credit card details, which is used without consent for financial gain or fraud.
- A part of the internet often associated with illegal activities which is not indexed by traditional search engines and requires specific software or configurations to access.
- A form of spear phishing that targets high-profile individuals, like executives.
- Process of verifying the identity of a user, device, or system before granting access to resources.
Down
- A hacker who may violate ethical standards or laws but does not have malicious intent.
- A number used only once in a cryptographic communication to prevent replay attacks.
- The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis
- A type of malware designed to erase its tracks after executing its malicious actions.
- A fraudulent email correspondence that appear to come from trustworthy sources.
- A security event where unauthorized individuals gain access to a computer system, network, or database, potentially leading to the exposure, theft, or alteration of sensitive information.
12 Clues: A fraudulent email correspondence that appear to come from trustworthy sources. • A form of spear phishing that targets high-profile individuals, like executives. • A number used only once in a cryptographic communication to prevent replay attacks. • Targeted attacks aimed at specific individuals or organizations, often personalized. • ...
Cyber Security Awareness Month 2024-10-15
Across
- An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
- A method of faking an identity to gain access.
- The process of converting encrypted data back to its original form.
- A code or technique used to take advantage of a vulnerability.
- A security event where unauthorized individuals gain access to a secure computer system, network, or database.
- The process of verifying the identity of a user, device, or system before granting access to resources.
- A type of malware designed to erase its tracks after executing its malicious actions.
- The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
- The name for a number used only once in a cryptographic communication to prevent replay attacks.
- The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
- The act of pretending to be someone else for malicious purposes.
- A form of spear phishing that targets high-profile individuals, like executives.
12 Clues: A method of faking an identity to gain access. • A code or technique used to take advantage of a vulnerability. • The act of pretending to be someone else for malicious purposes. • The process of converting encrypted data back to its original form. • A form of spear phishing that targets high-profile individuals, like executives. • ...
iSOC Crossword - Basic 2014-10-14
Across
- Security is in your own _______.
- Password should be changed every 2-3 months.
- A ____ is a web page address.
- A software that is designed to detect and destroy computer viruses.
- Malware hidden in a gift
- The state of being free from danger or threat.
- Never share your _______ with another person.
- Hidden entrance into a system
- Always _____ your computer when you leave your desk.
- An army of malware infected PCs
- A computer _______ is a group of interconnected computers.
Down
- Protect your laptop or cellphone by treating it like _____.
- Viruses, Worms and Trojans etc
- Be cyber savvy, be a ______ user.
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
- Classic form of Malware
- Never turn off your ______ or else your computer and the company data will be at risk
- your password is like a _______, use it regularly, change it often and do not share it with anyone else.
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- The A in APT
- A person who steals information from your system without you knowing about it.
- passwords should always be at least ______ characters long.
22 Clues: The A in APT • Classic form of Malware • Malware hidden in a gift • A ____ is a web page address. • Hidden entrance into a system • Viruses, Worms and Trojans etc • An army of malware infected PCs • Security is in your own _______. • Be cyber savvy, be a ______ user. • Password should be changed every 2-3 months. • Never share your _______ with another person. • ...
Chapter 12 Security Plus Crossword 2024-05-05
Across
- streams of information containing data about various cyber threats
- Payment to a third-party for assuming risks
- The willingness to assume a level of risk in order to achieve a result
- Verifying that the organization is in compliance with required standards
- Threat intelligence data that has been legally gathered
- An examination of results to verify their accuracy
- An alarm that is raised when there is no problem.
- Directly probing for vulnerabilities
- Using tools in a penetration test that do not raise any alarms
- Analyzing a vulnerability scan for validation of its accuracy
Down
- A subjective estimate of the loss to an asset if the specific threat occurs
- pay security researchers who uncover security bugs
- To treat one item as more important than another.
- Relating to ownership.
- assessment that attempts to uncover vulnerabilities and then exploit them
- Numeric scores on a vulnerability
- The failure to raise an alarm when there is an issue.
- A judgment made about the results of an audit
- Conformity to mandated standards
- Part of the web that is the domain of threat actors
- Assessments by independent third-party auditors
21 Clues: Relating to ownership. • Conformity to mandated standards • Numeric scores on a vulnerability • Directly probing for vulnerabilities • Payment to a third-party for assuming risks • A judgment made about the results of an audit • Assessments by independent third-party auditors • To treat one item as more important than another. • ...
RU ITEC411 Crime and Security 2025-11-25
Across
- Malicious self-replicating software that infects a computer.
- Unlawful use and theft of another's identifying information.
- Security system on a computer meant to block access to certain things.
- Supreme power or sole authority of a state or governing entity over itself.
- Going to another country with better odds of winning a court case and suing for defamation.
- A country/state returning a wanted individual to another country or state.
- Using hacking to promote certain causes like political or social causes.
- Legal authority of governments and entities to hear cases and make judgements.
- System designed to lure in cyber criminals/hackers.
- Public defiance (usually nonviolent) of local laws or policies.
Down
- Organization dealing with global trade rules
- Making individuals and entities obey laws, policy, etc.
- Written or published defamation.
- Being protected from danger or threats.
- Utilizing or exploiting weaknesses in a network or computer system.
- Finding ways around obstacles and problems, think loopholes.
- Increasing connectedness amongst the world.
- Right to express opinions and ideas without prosecution.
- Act that greatly expanded law enforcement counter-terror ability after Sept 11th attacks.
- Very sophisticated computer worm that damaged enrichment plant in Iran.
20 Clues: Written or published defamation. • Being protected from danger or threats. • Increasing connectedness amongst the world. • Organization dealing with global trade rules • System designed to lure in cyber criminals/hackers. • Making individuals and entities obey laws, policy, etc. • Right to express opinions and ideas without prosecution. • ...
Cyber Security and Laws 2022-10-17
Across
- subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
- EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
- Cyber ------ is use of the Internet or other electronic means to track someone
- The International Organization for ------- is referred as ISO
- EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
- GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
- is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
- PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
- Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
- The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
- refers to the use of a computer to commit a crime
- is the legal process by which an arbiter or judge reviews evidence and argumentation.
12 Clues: refers to the use of a computer to commit a crime • The International Organization for ------- is referred as ISO • PCI DSS is an acronym for “----- Card Industry Data Security Standard.” • Cyber ------ is use of the Internet or other electronic means to track someone • EDI internet transmission protocols include ----- File Transfer Protocol (SFTP), • ...
Cyber Security at ESDC 2023-08-15
Across
- Person with malicious intentions.
- A trap for threat actors.
- Method used to secure your data.
- Software that infects a device.
- Attack that looks at/steals your data.
- Attack that locks your data and demands money.
Down
- Device used to work.
- Cyber attack meant to trick you.
- Faking an email address, phone number, etc.
- Software meant to protect your device.
- Unsolicited emails.
- Used to prevent unwanted network access.
12 Clues: Unsolicited emails. • Device used to work. • A trap for threat actors. • Software that infects a device. • Cyber attack meant to trick you. • Method used to secure your data. • Person with malicious intentions. • Software meant to protect your device. • Attack that looks at/steals your data. • Used to prevent unwanted network access. • ...
Cyber Security Words and Terms 2022-09-15
Across
- A simple form of code for software that can be written in word editors.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- theft The deliberate use of someone else's identity, typically for financial gain.
- source Software that has their code listed as free to use, share, and modify.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- text Text that can be read by the human eye, like this article!
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
17 Clues: text Text that can be read by the human eye, like this article! • A simple form of code for software that can be written in word editors. • source Software that has their code listed as free to use, share, and modify. • theft The deliberate use of someone else's identity, typically for financial gain. • ...
Taldor's "Go Cyber" competition 2014-01-22
Across
- An attack that exploits an unknown vulnerability in software.
- a software weakness which allows an attacker to gain access to a system.
- A small piece of code used as the payload in exploitation.
- are you dead yet?
- an exploit technique used for malicious code execution
- a common hacking technic that relies on a typographical error when typing the website address into the address bar.
- A table of legitimate files and processes.
- A malware that requests the payment of a fee to unlock encrypted files.
- technology that is designed to detect potential data breaches and prevent them.
- Security company founded by Kevin Mandia
Down
- A common suite for penetration testing and exploitation.
- A form of attack using psychological manipulation of people.
- a social GPS.
- will open the cybertech2014.
- Malicious software, designed to hide its processes or programs.
- Anonymous’s attack against Ukraine government data
- A cyber unit under China’s 2nd Bureau of the PLA.
- Company behind February’s largest security conference.
- A symmetric-key block cipher.
- - A code name made for collecting large amounts of data regarding individuals.
- Using something to one’s own advantage
- An Attempt to acquire information by masquerading as a trustworthy entity.
22 Clues: a social GPS. • are you dead yet? • will open the cybertech2014. • A symmetric-key block cipher. • Using something to one’s own advantage • Security company founded by Kevin Mandia • A table of legitimate files and processes. • A cyber unit under China’s 2nd Bureau of the PLA. • Anonymous’s attack against Ukraine government data • ...
stuff and things 2025-09-08
RU ITEC411 Crime and Security 2025-11-25
Across
- Utilizing or exploiting weaknesses in a network or computer system.
- A country/state returning a wanted individual to another country or state.
- Written or published defamation.
- Using hacking to promote certain causes like political or social causes.
- Being protected from danger or threats.
- Organization dealing with global trade rules
- Unlawful use and theft of another's identifying information.
- Very sophisticated computer worm that damaged enrichment plant in Iran.
- Security system on a computer meant to block access to certain things.
- Finding ways around obstacles and problems, think loopholes.
- Supreme power or sole authority of a state or governing entity over itself.
Down
- Increasing connectedness amongst the world.
- Legal authority of governments and entities to hear cases and make judgements.
- Act that greatly expanded law enforcement counter-terror ability after Sept 11th attacks.
- System designed to lure in cyber criminals/hackers.
- Malicious self-replicating software that infects a computer.
- Right to express opinions and ideas without prosecution.
- Going to another country with better odds of winning a court case and suing for defamation.
- Public defiance (usually nonviolent) of local laws or policies.
- Making individuals and entities obey laws, policy, etc.
20 Clues: Written or published defamation. • Being protected from danger or threats. • Increasing connectedness amongst the world. • Organization dealing with global trade rules • System designed to lure in cyber criminals/hackers. • Making individuals and entities obey laws, policy, etc. • Right to express opinions and ideas without prosecution. • ...
CSC 200 Cybersecurity 2018-01-31
Across
- Deploying a security officer at the premises gate is an example of _____ control.
- _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
- Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
- Prevents either sender or receiver from denying a transmitted message.
- Assures that the system works promptly and service is not denied to authorized users.
Down
- _______ is the act of accessing information during transmission.
- _________ unauthorized access and modification of an asset.
- _________ means an information becomes lost, unavailable, or unusable
- Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
- A weakness which allows an attacker to reduce a system's information assurance.
- A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
- Phishing and attachments target the _________ threat vector
12 Clues: _________ unauthorized access and modification of an asset. • Phishing and attachments target the _________ threat vector • _______ is the act of accessing information during transmission. • _________ means an information becomes lost, unavailable, or unusable • Prevents either sender or receiver from denying a transmitted message. • ...
About IANT 2022-09-17
Linux 2023-11-04
6 Clues: Base of Linux OS • Linux file system • Linux desktop environment • developed by Linus Torvalds • Linux desktop operating system distribution • A linux OS developed for cyber security professionals
Bullying 2016-06-08
Across
- Based on the 2010-2011 school Crime Supplement, what % of students in grades 6-121 experience cyber bullying?
- Kids who are cyber bullied are more likely to have these (2 words, no spaces)
- Bullying that takes place using electronic technology (2 words, no spaces)
- True or False - It is easy to delete inappropriate or harassing messages, texts and pictures after they've been sent/posted
- One of the best things you can do for a student being bullied is to be one of these
- Many cyber bullying messages and pictures are posted this way
- Kids who are cyber bullied are more likely to receive (2 words, no spaces)
Down
- A 2013 study finds what percentage of high school students were bullied in 2014?
- Kids who are cyber bullied are more likely to use this
- If you see someone being bullied, one of the tactics to say "stop" is to use this
- Posting these are a form of cyber bullying (2 words, no spaces)
- If you are bullied or see someone else being bullied with whom should you speak?
- Cyber bullying can happen how many hours a day?
13 Clues: Cyber bullying can happen how many hours a day? • Kids who are cyber bullied are more likely to use this • Many cyber bullying messages and pictures are posted this way • Posting these are a form of cyber bullying (2 words, no spaces) • Bullying that takes place using electronic technology (2 words, no spaces) • ...
First Call Cybersecurity Challenge 2023-10-23
Across
- Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
- Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
- A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
- A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
- Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
- A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
- Malware that encrypts a victim's data and demands a ransom for the decryption key.
- Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
- The process of converting data into a code to prevent unauthorized access or data theft.
- A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.
11 Clues: Malware that encrypts a victim's data and demands a ransom for the decryption key. • The process of converting data into a code to prevent unauthorized access or data theft. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. • ...
walwere 2025-11-12
Across
- Efek yang ditimbulkan virus adalah mengubah, menyembunyikan, atau menghapus ____
- Perangkat lunak yang menempel pada perangkat lunak lain dan dapat memperbanyak diri
- Malware yang mengunci file dan meminta pembayaran untuk mendeskripsinya.
- Perangkat lunak yang mampu mendapatkan akses ke suatu sistem dengan melewati lapisan security normal.
- Malware yang tampak seperti aplikasi perangkat lunak jinak, tetapi membawa komponen jahat di dalamnya
- Akronim dari Robot dan Network, yaitu sekelompok komputer yang dikendalikan peretas
- Peretas yang memiliki izin, berusaha keras melindungi sistem, dan termasuk pakar keamanan cyber.
- Peretas yang menggunakan keahlian mereka untuk merusak, tanpa memiliki etika yang baik
- Metode mengkodekan data sebelum dikirim melalui jaringan komputer
- Virus menyebar ketika seseorang membuka lampiran yang telah mengalami ____
Down
- Cara memanipulasi pengguna atau seseorang untuk mengeluarkan informasi yang melanggar protokol keamanan
- Sebutan untuk perangkat terinfeksi (bot) yang merupakan bagian dari Botnet
- Pakar keamanan ___ yang berusaha keras melindungi sistem.
- Mirip virus, namun tidak perlu menempel ke program lain agar dapat berfungsi
- Malware yang dapat memantau dan merekam aktivitas pengguna, termasuk mencatat penekanan tombol pada keyboard
- Usaha untuk memikat pengguna internet agar masuk ke web palsu
- Kejahatan di dunia maya yang mengelabui target melalui surel atau pesan teks agar memberikan data sensitif.
- Trojan melakukan aktivitas berbahaya seperti mengirim surel spam ke semua kontak di buku alamat ____
18 Clues: Pakar keamanan ___ yang berusaha keras melindungi sistem. • Usaha untuk memikat pengguna internet agar masuk ke web palsu • Metode mengkodekan data sebelum dikirim melalui jaringan komputer • Malware yang mengunci file dan meminta pembayaran untuk mendeskripsinya. • Sebutan untuk perangkat terinfeksi (bot) yang merupakan bagian dari Botnet • ...
Identity Theft Crossword 2020-07-01
Across
- Relating to online
- Against the law, something that is unlawful
- Commonly used for purchasing items
- What makes up your character, how people know you
- Used as a barrier for security in computers
Down
- It is yours, your own things
- Persons or people that unlawfully take what isn't theirs
- The action of taking something which isn't yours
- People who invade online systems
9 Clues: Relating to online • It is yours, your own things • People who invade online systems • Commonly used for purchasing items • Against the law, something that is unlawful • Used as a barrier for security in computers • The action of taking something which isn't yours • What makes up your character, how people know you • ...
information warfare 2024-04-02
Across
- gap, hole
- a type of malicious software, or malware, that threatens a victim by destroying or blocking access to critical data or systems until a ransom is paid
- a person who uses unlawful violence and intimidation, especially against civilians, in the pursuit of political aims
- the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
- groups of criminals who unite to carry out cyber attacks in support of political causes.
- the condition of being exposed or unprotected, making someone more likely to be hurt, taken advantage of, or exploited
Down
- a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware
- means using the trust of a website a user keep and a hacker comes in and takes the random database from the site
- military operations between enemies : hostilities, war; also : an activity undertaken by a political unit (such as a nation) to weaken or destroy another
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent
- means open or vulnerable to something, such as an infection, influence, or attack
- state a term used to describe a country that is seen as a threat to international peace and security due to its actions or policies
- attacking wide swatches of the internet at random
- spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence)
- means having a deliberate intention to cause harm or injury, either physically or emotionally
15 Clues: gap, hole • attacking wide swatches of the internet at random • means open or vulnerable to something, such as an infection, influence, or attack • groups of criminals who unite to carry out cyber attacks in support of political causes. • means having a deliberate intention to cause harm or injury, either physically or emotionally • ...
Cybersecurity Awareness 2024-09-22
Across
- / Tool is often used to help create and store complex passwords.
- / Most commonly targeted entity of cyber attacks in an organization.
- / A type of cyber attack that tricks users into giving up personal information.
- / Who should you report a suspicious email to?
- / The person or department you should approach with documented security concerns.
Down
- / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
- / What should you use as a way to have multiple forms of authentication on your accounts?
- / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.
8 Clues: / Who should you report a suspicious email to? • / Tool is often used to help create and store complex passwords. • / Most commonly targeted entity of cyber attacks in an organization. • / A type of cyber attack that tricks users into giving up personal information. • / The person or department you should approach with documented security concerns. • ...
CYBER FEST CROSSWORD 2024-10-18
Across
- Software designed to detect, prevent, and remove malware and other harmful software.
- Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- A secret string of characters used to verify the identity of a user.
- An attempt by hackers to damage or disrupt a computer system or network.
- Ensuring that an organization meets regulatory and legal requirements for security practices.
- Software that secretly monitors and collects personal information from a computer.
- A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- The process of verifying the identity of a user or device before granting access to a system.
Down
- Related to computers, information technology, or virtual reality, often used in the context of online environments.
- The process of converting data into a secret code to protect it from unauthorized access.
- A weakness in software, hardware, or procedures that could be exploited to cause harm.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- Any software intentionally designed to cause damage to a computer, server, or network.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.
16 Clues: A person who uses computers to gain unauthorized access to data. • A secret string of characters used to verify the identity of a user. • An attempt by hackers to damage or disrupt a computer system or network. • Software that secretly monitors and collects personal information from a computer. • ...
cyber law cia 1 component 1 2021-09-05
Across
- Which act in Singapore limited the liability of network service providers for accessed content?
- The flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- Harassment in the form of cyber stalking and cyber bullying was prosecuted in Singapore under which act?
- "A declaration of independence of cyberspace" was written by whom?
- who was the creator and driving force of Napster?
Down
- The lawsuit in which the plaintiff is a computer scientist who wrote an encryption program which he wanted to share with his students and colleagues and post on his website. This lawsuit seeks to protect and even extend societal free speech values.
- ____________________ refers to “the action or process of digitizing; the conversion of analogue data (esp. in later use images, video, and text) into digital form.”
- Which is the governmental organisation responsible for Singapore's infocomm development and security?
- "code and other laws of cyberspace" was written by whom?
- Singapore actively supports global efforts in eradicating cyber crime by participating in schemes such as the _________ arrangement that promotes the fight against terrorism.
10 Clues: who was the creator and driving force of Napster? • "code and other laws of cyberspace" was written by whom? • "A declaration of independence of cyberspace" was written by whom? • Which act in Singapore limited the liability of network service providers for accessed content? • ...
trends and buzzwordz ヾ(≧▽≦*)o 2025-07-24
Across
- A cloud-based model where any IT function or business process; eg software/infrastructure/platforms — is delivered as a service.
- A computing model that uses quantum bits to perform calculations, and can solve problems significantally faster than default computers
- Monitors and analyzes endpoint activities on devices to detect, investigate, and respond to cyber threats
- An immersive virtual environment where users interact via avatars. It blends AR, VR, and other digital assets
- A process that scans systems/networks/apps to identify weaknesses in security that could be exploited
- An umbrella term for immersive technologies; eg VR, AR, MR
- A security method that requires users to provide 2+ verification factors to access a system; eg password, finger print, one time code
- The use of advanced technologies; eg AI/machine learning/robotics to automate complex business processes end-to-end.
Down
- A cloud computing model with public cloud services distributed to different physical locations
- The ability of machines to perform tasks that typically require human intelligence
- Insurance that covers financial losses due to cyberattacks, data breaches, and ransomware
- Design approach that delivers a consistent UX across multiple digital touchpoints; eg apps, voice interfaces, and AR/VR
- Set of technologies and processes that collect, analyze, and visualize data to help organizations make informed decisions
- Technology developed with consideration for environmental, social, and economic impact.
- A framework that combines development, operations, etc to make applications more resilient.
- Efficient security architecture that integrates various security tools into a unified ecosystem.
16 Clues: An umbrella term for immersive technologies; eg VR, AR, MR • The ability of machines to perform tasks that typically require human intelligence • Technology developed with consideration for environmental, social, and economic impact. • Insurance that covers financial losses due to cyberattacks, data breaches, and ransomware • ...
Ethics and Safety measures in computing 2021-10-20
Across
- transforming data into an unreadable code.
- right relating to new inventions
- security system that prevents unauthorized people on internet.
- Harassing a person deliberately via intrnet.
- brand name, logos, distinctive designs.
- and anybody.
- legal right granted by law.
- intends to harm or damage reputation of any
- impression about a person's activities on internet
Down
- Programs used to check user's keystrokes
- crimical practice of breaching online using voice over.(VoIP)
- most common breaches through internet
- practice of sending bulk mails till server gets full
- Distroy the mental health of a child
- Online discussion site
- malicious technique of tricking web users.
- act of copying.
- The maximum amount of data transmitted via
- crime ware application that performs automated tasks for cyber criminals.
19 Clues: and anybody. • act of copying. • Online discussion site • legal right granted by law. • right relating to new inventions • Distroy the mental health of a child • most common breaches through internet • brand name, logos, distinctive designs. • Programs used to check user's keystrokes • transforming data into an unreadable code. • malicious technique of tricking web users. • ...
The Digital World 2023-10-31
Across
- What is the acronym for Information and communication technologies?
- Why do cyberbullies get from bullying their victims?
- Cyberbullying can happen
- What negative impact does cyberbullying have on someone?
- Digital ___ protects people online.
- When online, people need to be____
- What is a social media platform?
- People can hide their identity online by setting their account to
- Physical or emotional injury to someone.
- Technology is always digitally _____.
Down
- When online people are creating their digital____
- We are in the Digital_____
- People who are bullied are known to be
- Cyberbullying is a ____ issue
- There are many ditigital ___ to use.
- Social media allows you to exchange _____ files.
- What type of abuse is cyberbullying?
- What is a technological device?
- Social media can cause____ impacts on people's lives.
19 Clues: Cyberbullying can happen • We are in the Digital_____ • Cyberbullying is a ____ issue • What is a technological device? • What is a social media platform? • When online, people need to be____ • Digital ___ protects people online. • There are many ditigital ___ to use. • What type of abuse is cyberbullying? • Technology is always digitally _____. • ...
