cyber security Crossword Puzzles

cyber security crossword 2023-11-24

cyber security crossword crossword puzzle
Across
  1. unwanted software that monitors and gathers information on a person and how they use their computer.
  2. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  3. spread through the network and use the system’s resources.
  4. a large collection of malware-infected devices (zombies).
Down
  1. locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. malicious form of self-replicating software.
  3. software that is designed to gain access to your computer with malicious intent.
  4. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.

8 Clues: malicious form of self-replicating software.a large collection of malware-infected devices (zombies).spread through the network and use the system’s resources.software that is designed to gain access to your computer with malicious intent.unwanted software that monitors and gathers information on a person and how they use their computer....

Cyber Security Crossword 2024-03-18

Cyber Security Crossword crossword puzzle
Across
  1. a secure place for storing your passwords
  2. software used to carry out actions that humans would have done previously
  3. when someone installs software to record your typing, interactions etc
  4. numbers, symbols and letters used to access your accounts
Down
  1. a white hat or black hat who accesses data without always having permission
  2. internet access which might include personal or public
  3. an email, link or text that is used to hook you in to sharing your data
  4. malicious software

8 Clues: malicious softwarea secure place for storing your passwordsinternet access which might include personal or publicnumbers, symbols and letters used to access your accountswhen someone installs software to record your typing, interactions etcan email, link or text that is used to hook you in to sharing your data...

Cyber Security keywords 2024-06-07

Cyber Security keywords crossword puzzle
Across
  1. When a person calls you with a made up story to get personal information
  2. Software that secretly tracks what you do
  3. When an unauthorised user gains access to your account
  4. Software that disguises itself as something legitimate
  5. Software that copies itself over and over when it infects your device
Down
  1. The way we protect our devices and data online is known as
  2. When you receive an email from an unknown person telling you a story and asking for personal information
  3. Software designed to cause harm to a computer and its files

8 Clues: Software that secretly tracks what you doWhen an unauthorised user gains access to your accountSoftware that disguises itself as something legitimateThe way we protect our devices and data online is known asSoftware designed to cause harm to a computer and its filesSoftware that copies itself over and over when it infects your device...

Cyber Security Terms 2024-09-24

Cyber Security Terms crossword puzzle
Across
  1. A security system that requires more than one method of authentication to verify the user’s identity for a login or other transaction, also known as MFA or 2FA.
  2. Attackers send fraudulent emails or messages that appear to be from reputable sources to trick individuals into revealing personal information, such as passwords or credit card numbers.
  3. Similar to phishing, but conducted via SMS text messages. Attackers send messages that appear to be from legitimate sources to trick individuals into clicking on malicious links or providing personal information.
Down
  1. Generally longer than passwords, often consisting of multiple words, which makes them harder to crack.
  2. Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure.
  3. Attackers gain physical access to a secure area by following closely behind an authorized person. This often happens in office buildings where security measures like keycard access are in place.
  4. are synthetic media in which a person in an existing image or video is replaced with someone else’s likeness using artificial intelligence (AI).
  5. Attackers use phone calls to trick individuals into revealing personal information. They might pretend to be from a bank, tech support, or another trusted entity.

8 Clues: Generally longer than passwords, often consisting of multiple words, which makes them harder to crack.Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure....

IEEE CS Git Informed 2025-10-27

IEEE CS Git Informed crossword puzzle
Across
  1. Computation type where multiple processes run simultaneously.
  2. Iterative and incremental approach to development.
  3. Pioneer recognized as the father of computer science.
  4. A fundamental unit of work in a database system.
  5. Integrated circuit that contains the core of a computer.
  6. Fundamental structure of a computer system's components.
Down
  1. Step-by-step procedure for solving a problem.
  2. Formal documents defining hardware and protocol rules.
  3. Prefix describing the security field protecting networks.
  4. The primary focus area of the Computer Society.
  5. Chip designed for a specific application only.
  6. Computing resources delivered over the internet.
  7. The academic field central to the IEEECS mission.
  8. Peer-reviewed academic publication of the society.

14 Clues: Step-by-step procedure for solving a problem.Chip designed for a specific application only.The primary focus area of the Computer Society.A fundamental unit of work in a database system.Computing resources delivered over the internet.The academic field central to the IEEECS mission.Iterative and incremental approach to development....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. Bullying the digital technology social media, messaging apps.
  2. act of using the language and thoughts of another person as one's original work.
  3. The process of transforming data into unreadable code.
  4. bombing spam attackers keep sending bulk mails.
Down
  1. The process of transferring the encrypted file over the network.
  2. A security system that prevents unauthorised people.
  3. criminal activities.
  4. illegal intrusion.
  5. Piracy when software is copied and distributed illegally.

9 Clues: illegal intrusion.criminal activities.A security system that prevents unauthorised people.bombing spam attackers keep sending bulk mails.The process of transforming data into unreadable code.Piracy when software is copied and distributed illegally.The process of transferring the encrypted file over the network....

Cybersecurity 2023-05-18

Cybersecurity crossword puzzle
Across
  1. is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
  2. is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
  3. bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
  4. attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
  5. is a general term for any type of intrusive computer software with malicious intent against the user.
  6. is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
  7. are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
  8. is the delivery of hosted services, including software, hardware, and storage, over the Internet.
  9. every aspect of protecting an organization and its employees and assets against cyber threats.
  10. is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  11. integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
  1. is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
  2. is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
  3. is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
  4. is the process of decoding cipher text to plain text so that it is readable by humans
  5. is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
  6. is a kind of spyware software that records every keystroke made on a computer’s keyboard.
  7. refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.

18 Clues: is the process of decoding cipher text to plain text so that it is readable by humansis a kind of spyware software that records every keystroke made on a computer’s keyboard.every aspect of protecting an organization and its employees and assets against cyber threats....

Product technology 2025-03-17

Product technology crossword puzzle
Across
  1. you can see it but its not there
  2. short for application
  3. access for all
  4. monosyllabic tall and angry
Down
  1. ones and zeros
  2. what you do when you wnat to rease a train and it s unrelaible
  3. what hits you when you step out of the cinema
  4. it may take your job?!! But not in the future in our experience
  5. elon saving the world (again)

9 Clues: ones and zerosaccess for allshort for applicationmonosyllabic tall and angryelon saving the world (again)you can see it but its not therewhat hits you when you step out of the cinemawhat you do when you wnat to rease a train and it s unrelaibleit may take your job?!! But not in the future in our experience

Cyber Security Month Crossword Puzzle 2024-08-29

Cyber Security Month Crossword Puzzle crossword puzzle
Across
  1. A type of malware that disguises itself as legitimate software (6 letters)
  2. Software designed to disrupt, damage, or gain unauthorized access (7 letters)
  3. To bring software up to date with the latest patches or fixes (6 letters)
  4. Software that secretly monitors user activity (7 letters)
  5. A security system that controls incoming and outgoing network traffic (7 letters)
  6. A fraudulent attempt to obtain sensitive information (8 letters)
  7. Software designed to detect and destroy viruses (9 letters)
Down
  1. Malware that encrypts files and demands payment for decryption (10 letters)
  2. Information used to verify a user's identity (11 letters)
  3. A copy of data stored separately to prevent loss (6 letters)
  4. Unauthorized access to data or systems (6 letters)
  5. A secret word or phrase used for authentication (8 letters)
  6. The process of converting information or data into a secure format (10 letters)
  7. A fraudulent attempt to obtain sensitive information (8 letters)
  8. Impersonating a legitimate source to gain unauthorized access (7 letters)
  9. An individual who uses technical skills to gain unauthorized access (6 letters)
  10. A tool used to secure and anonymize internet connections (3 letters)

17 Clues: Unauthorized access to data or systems (6 letters)Information used to verify a user's identity (11 letters)Software that secretly monitors user activity (7 letters)A secret word or phrase used for authentication (8 letters)Software designed to detect and destroy viruses (9 letters)A copy of data stored separately to prevent loss (6 letters)...

Truth About Truman School 2015-10-03

Truth About Truman School crossword puzzle
Across
  1. Who is milk and honey?
  2. Who is Lilly's boyfriend?
  3. Who was cyber bullied?
  4. What was their school called?
  5. Who was blamed for all of the cyber bulling?
  6. what is the book about?
  7. Who gets teased because of her skin?
Down
  1. Who is Amr's best friend?
  2. What grade grade are they in?
  3. Who gets involved if there is cyber bulling?
  4. What is the websites namer?
  5. What does Recce like?
  6. Where did Lilly hide?
  7. What does Trevor like to draw?
  8. Who is Muslim?

15 Clues: Who is Muslim?What does Recce like?Where did Lilly hide?Who is milk and honey?Who was cyber bullied?what is the book about?Who is Amr's best friend?Who is Lilly's boyfriend?What is the websites namer?What grade grade are they in?What was their school called?What does Trevor like to draw?Who gets teased because of her skin?...

Hacktober 2024-09-17

Hacktober crossword puzzle
Across
  1. malicious software that locks users out of their systems until a ransom is paid
  2. information about potential or ongoing cyber threats
  3. a secret word or phrase used to authenticate access to a system
  4. a digital document used to verify the identity of a user or device
  5. fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  6. software that detects and removes malware
  7. a secure environment used to isolate untrusted programs
  8. converting data into a fixed-size value, often used in password storage
  9. a network of infected computers controlled remotely by an attacker
  10. a physical or digital device used to authenticate identity
  11. the potential for loss or damage when a threat exploits a vulnerability
  12. analysis of digital evidence to investigate security incidents
  13. a weakness in a system that can be exploited by attackers
  14. penetration test, used to simulate attacks on a system to find vulnerabilities
  15. software that secretly gathers information about users without consent
  16. a vulnerability in software that is exploited before the vendor is aware
  17. security operations center, a team responsible for monitoring and defending systems
  18. an actor or event that can cause harm to a system
  19. fraudulent attempt to obtain sensitive information through email or websites
  20. a self-replicating malware that spreads across networks
  21. a trusted person within an organization who poses a security risk
  22. following laws and regulations regarding data security and privacy
Down
  1. systematic examination of security controls and processes
  2. software designed to damage or disrupt computer systems
  3. process of verifying the identity of a user
  4. a security system that controls network traffic based on predetermined rules
  5. a list of approved entities that are granted access to a system or network
  6. distributed denial of service, an attack that overwhelms a system with traffic
  7. a type of malware disguised as legitimate software
  8. multi-factor authentication, requiring two or more methods to verify identity
  9. a network security system that monitors and controls incoming and outgoing traffic
  10. process of converting data into a coded form to prevent unauthorized access
  11. an incident where data is accessed without authorization
  12. intrusion detection system, designed to detect malicious activity
  13. software that records keystrokes to steal sensitive information
  14. pretending to be someone else or a legitimate service to deceive others
  15. system used to monitor and analyze security events in real-time
  16. a software update that fixes bugs and vulnerabilities
  17. transforming data into a fixed-size value, commonly used in authentication
  18. identity and access management, used to control user permissions

40 Clues: software that detects and removes malwareprocess of verifying the identity of a useran actor or event that can cause harm to a systema type of malware disguised as legitimate softwareinformation about potential or ongoing cyber threatsa software update that fixes bugs and vulnerabilitiessoftware designed to damage or disrupt computer systems...

answers 2025-11-11

answers crossword puzzle
Across
  1. What kind of new threats does NATO counter today?
  2. Which war began in 2001?
  3. Which country invaded Ukraine in 2022?
  4. What type of security does NATO provide?
Down
  1. Where is NATO headquartered?
  2. What alliance opposed NATO in 1955?
  3. Which country joined NATO in 2024?

7 Clues: Which war began in 2001?Where is NATO headquartered?Which country joined NATO in 2024?What alliance opposed NATO in 1955?Which country invaded Ukraine in 2022?What type of security does NATO provide?What kind of new threats does NATO counter today?

Cyber Mobbing Kreuzworträtsel von Leon Cardinale 2015-01-20

Cyber Mobbing Kreuzworträtsel von Leon Cardinale crossword puzzle
Across
  1. Strafbestand des Cyber Mobbings im StGB?
  2. Wie werden die Täter auch genannt?
  3. Die Tat ist sowohl offen als auch?
  4. Grund für Mobbing?
  5. Die Veröffentlichung intimer Informationen ist eine?
  6. Erste Gegenmaßnahme
  7. Wie ist die Tat beweisbar?
  8. Wo sind Straftaten des Cyber Mobbings aufzufinden?
  9. Schlimmster Ausweg vieler Opfer?
Down
  1. Was spricht für Cyber Mobbing als für normales Mobbing?
  2. Letzte Gegenmaßnahme?
  3. Erster Ansprechpartner?(nicht der Lehrer)
  4. Was sollte man im Netz schützen?
  5. Das Massives Versenden von beleidigenden Mails ist eine?
  6. Die Herkunft des Wortes?

15 Clues: Grund für Mobbing?Erste GegenmaßnahmeLetzte Gegenmaßnahme?Die Herkunft des Wortes?Wie ist die Tat beweisbar?Was sollte man im Netz schützen?Schlimmster Ausweg vieler Opfer?Wie werden die Täter auch genannt?Die Tat ist sowohl offen als auch?Strafbestand des Cyber Mobbings im StGB?Erster Ansprechpartner?(nicht der Lehrer)...

CISO Crossword Quiz - 1625 2025-03-07

CISO Crossword Quiz - 1625 crossword puzzle
Across
  1. A technology that creates a secure connection over a public network, ensuring privacy and data integrity
  2. A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
  3. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
  4. An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
Down
  1. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  2. Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
  3. The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
  4. A security mechanism requiring two or more forms of verification before granting access to a system
  5. The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
  6. A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization

10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victimA security mechanism requiring two or more forms of verification before granting access to a systemA technology that creates a secure connection over a public network, ensuring privacy and data integrity...

CISO Crossword Quiz - 1625 2025-03-07

CISO Crossword Quiz - 1625 crossword puzzle
Across
  1. The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
  2. A security mechanism requiring two or more forms of verification before granting access to a system
  3. A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
  4. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  5. The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
Down
  1. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
  2. An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
  3. Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
  4. A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
  5. A technology that creates a secure connection over a public network, ensuring privacy and data integrity

10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victimA security mechanism requiring two or more forms of verification before granting access to a systemA technology that creates a secure connection over a public network, ensuring privacy and data integrity...

Cyber Awareness 2025-11-06

Cyber Awareness crossword puzzle
Across
  1. A virtual private network to access remote services securely
  2. A cyber attack that floods a network or server with excessive traffic to make it unavailable.
  3. A digital or physical device used to authenticate a user, often as a second factor.
  4. A hidden way into a system that bypasses normal authentication.
  5. Fake security alerts that trick users into installing malware or paying money.
  6. The practice of accessing a computer network illegally.
  7. A program that performs automated tasks, and can be controlled remotely and malicious
Down
  1. A secret combination of characters used to verify a user’s identity.
  2. A targeted form of phishing
  3. A security model that assumes no user or system is inherently trusted.
  4. Self-replicating malware that spreads across networks without user action.
  5. The practice of protecting computers, networks, and data from digital attacks or unauthorised access.

12 Clues: A targeted form of phishingThe practice of accessing a computer network illegally.A virtual private network to access remote services securelyA hidden way into a system that bypasses normal authentication.A secret combination of characters used to verify a user’s identity.A security model that assumes no user or system is inherently trusted....

CISO Crossword Quiz - 1625 2025-03-07

CISO Crossword Quiz - 1625 crossword puzzle
Across
  1. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  2. A security mechanism requiring two or more forms of verification before granting access to a system
  3. An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
  4. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
  5. A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
Down
  1. The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
  2. The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
  3. Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
  4. A technology that creates a secure connection over a public network, ensuring privacy and data integrity
  5. A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization

10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victimA security mechanism requiring two or more forms of verification before granting access to a systemA technology that creates a secure connection over a public network, ensuring privacy and data integrity...

Cybersecurity Crossword Puzzle 2023-08-03

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. The team that facilitates collaboration between red and blue teams
  2. A tool that monitors network traffic for potential security breaches
Down
  1. A team that simulates cyber attacks to find vulnerabilities
  2. The team responsible for defending against cyber threats
  3. The act of tricking individuals into revealing sensitive information

5 Clues: The team responsible for defending against cyber threatsA team that simulates cyber attacks to find vulnerabilitiesThe team that facilitates collaboration between red and blue teamsThe act of tricking individuals into revealing sensitive informationA tool that monitors network traffic for potential security breaches

Online Child Safety 2013-05-13

Online Child Safety crossword puzzle
Across
  1. scam that involves a fraudulent e-mail
  2. hardware and code
  3. Security-any software or technique used to prevent online crime
  4. The Communications Decency Act
  5. unsolicited adds on your computer
Down
  1. predator- An adult internet user who exploits children or teens
  2. unsolicited email or junk mail
  3. rules/manners of inline usage
  4. person who access internet files either legally or illegally
  5. Controls-software that allows parents to control what their children do online
  6. hostile, strongly worded message that may contain obscene language
  7. Media-online site where people can post information about themselves
  8. virtual sexual encounters
  9. a sexual message sent to someone
  10. Rooms-an interactive forum where you can talk in real time

15 Clues: hardware and codevirtual sexual encountersrules/manners of inline usageunsolicited email or junk mailThe Communications Decency Acta sexual message sent to someoneunsolicited adds on your computerscam that involves a fraudulent e-mailRooms-an interactive forum where you can talk in real time...

Edasiõppimine ja karjäär 2022-02-03

Edasiõppimine ja karjäär crossword puzzle
Across
  1. asutas koos Steve Jobs'iga Apple'i (perekonnanimi)
  2. asutus, mis korraldab võistlusi alates aastast 2017
  3. Tallinna Tehnikaülikooli ja Tartu ülikooli ühisprogramm
  4. Cyber Security Network asutaja (ainult perekonnanimi)
  5. Austraalia internetiaktivist ja ajakirjanik, WikiLeaks asutaja (perekonnanimi)
  6. saadavad korda head, eesmärgiks leida süsteemist turvavigu ning neid parandada
  7. tegeleb nõrkust leidmise ja ründamisega
  8. Eesti Infotehnoloogia ja Telekommunikatsiooni Liidu algatus, kust saab teada milliseid ameteid IT-valdkonnas on
Down
  1. Vastavalt olukorrast teevad nii head või tegutsevad oma kasu eesmärgil
  2. laager, kuhu pääsevad KüberNaaskel võistlusel osalenutest parimad
  3. tegeleb šifrite loomise ja lahendamisega, loogikaülesannetega, räsi ja plokiahelaga ning stenograafiaga
  4. tegeleb koodianalüüsi ja skriptide automatiseerimisega
  5. morrise ussi looja (perekonnanimi)
  6. kurjade motiividega häkkerid
  7. Euroopa Liidu kodanike digiteemade oskamise ja kasutamse mudeli nimi

15 Clues: kurjade motiividega häkkeridmorrise ussi looja (perekonnanimi)tegeleb nõrkust leidmise ja ründamisegaasutas koos Steve Jobs'iga Apple'i (perekonnanimi)asutus, mis korraldab võistlusi alates aastast 2017Cyber Security Network asutaja (ainult perekonnanimi)tegeleb koodianalüüsi ja skriptide automatiseerimisega...

Crossword 2 2024-07-11

Crossword 2 crossword puzzle
Across
  1. A cloud deployment model where services are provided over the public internet and available to anyone.
  2. A cloud computing feature that allows for automatic scaling of resources as needed.
  3. A secure network that uses the internet to connect remote sites or users together.
  4. A cloud service that provides a way to manage identities and access for users and systems.
  5. A security measure that involves scanning incoming network traffic for malicious activities.
  6. A model of cloud computing where hardware is provided as a service.
  7. A type of cyber attack that involves overwhelming a service with excessive traffic from multiple sources.
Down
  1. A method of ensuring only authorized users can access certain data or resources.
  2. A strategy for making copies of data to protect against loss or corruption.
  3. A cloud computing term for the partitioning of a physical server into smaller virtual servers.
  4. A type of security testing that is used to find vulnerabilities of a system.
  5. A cloud computing service model that offers development tools and platforms to users.
  6. A security protocol that provides encrypted communication and secure identification of a network web server.
  7. A shared responsibility model in cloud computing means both the provider and the customer must manage these.
  8. A cloud computing service model that delivers software applications over the internet.

15 Clues: A model of cloud computing where hardware is provided as a service.A strategy for making copies of data to protect against loss or corruption.A type of security testing that is used to find vulnerabilities of a system.A method of ensuring only authorized users can access certain data or resources....

doctor who 2014-11-23

doctor who crossword puzzle
Across
  1. ------ will fall
  2. 2d
  3. a version of the master
  4. tv
  5. a telapaphic alien
  6. rino
  7. shapehifter
  8. planet of the timelordes
  9. a cyborg
  10. piranas of the air
  11. suit
  12. serve
  13. the --------
  14. are you my mummy
  15. potato head
  16. cyber-----
  17. skin with a face
  18. a spider like alien
  19. men and robot put together
  20. rival timelord
  21. dog
  22. mythical
Down
  1. appere in a wound of time
  2. Name of the show
  3. -----man
  4. emotion + angel
  5. a place and tv show
  6. cyber-----
  7. our planet
  8. a slime thing with teeth
  9. time and relevent dimension in space
  10. has an iron fist
  11. dummy
  12. maker of the daleks
  13. time
  14. mummy
  15. main character
  16. cyber ____
  17. cyber---
  18. exterminate

40 Clues: 2dtvdogrinosuittimedummyservemummy-----mana cyborgcyber---mythicalcyber-----our planetcyber-----cyber ____shapehifterpotato headexterminatethe --------main characterrival timelordemotion + angel------ will fallName of the showhas an iron fistare you my mummyskin with a facea telapaphic alienpiranas of the aira place and tv showmaker of the daleks...

Basic puzzle 2022-12-13

Basic puzzle crossword puzzle
Across
  1. This controls the ALU and tells it what to do
  2. A extra layer of security
  3. Does IF statements
  4. This stores either an address in memory or data
  5. A standard for coding for use with differnt coding languages
  6. Where all your computer data is stored(permanent)
  7. A standard data encoding format
  8. A piece of a computer that accelerates graphic rendering
Down
  1. The operating speed of a computer and its microprocessor
  2. A bigger piece of a gigabyte
  3. This is used to switch electrical signals
  4. A coding system using 1 and 0s
  5. Helps apps load faster by storing temporary files
  6. A type of cyber attack in disguise of a email
  7. The central piece of a computer

15 Clues: Does IF statementsA extra layer of securityA bigger piece of a gigabyteA coding system using 1 and 0sA standard data encoding formatThe central piece of a computerThis is used to switch electrical signalsThis controls the ALU and tells it what to doA type of cyber attack in disguise of a emailThis stores either an address in memory or data...

Truth About Truman School 2015-10-03

Truth About Truman School crossword puzzle
Across
  1. Who was cyber bullied?
  2. What grade grade are they in?
  3. Who is Amr's best friend?
  4. Who is Lilly's boyfriend?
  5. What is the websites namer?
  6. Who gets teased because of her skin?
  7. Who is Muslim?
Down
  1. Who gets involved if there is cyber bulling?
  2. what is the book about?
  3. Where did Lilly hide?
  4. What does Recce like?
  5. What does Trevor like to draw?
  6. What was their school called?
  7. Who was blamed for all of the cyber bulling?
  8. Who is milk and honey?

15 Clues: Who is Muslim?Where did Lilly hide?What does Recce like?Who was cyber bullied?Who is milk and honey?what is the book about?Who is Amr's best friend?Who is Lilly's boyfriend?What is the websites namer?What grade grade are they in?What was their school called?What does Trevor like to draw?Who gets teased because of her skin?...

Truth About Truman School 2015-10-03

Truth About Truman School crossword puzzle
Across
  1. Who was cyber bullied?
  2. What grade grade are they in?
  3. Who is Amr's best friend?
  4. Who is Lilly's boyfriend?
  5. What is the websites namer?
  6. Who gets teased because of her skin?
  7. Who is Muslim?
Down
  1. Who gets involved if there is cyber bulling?
  2. what is the book about?
  3. Where did Lilly hide?
  4. What does Recce like?
  5. What does Trevor like to draw?
  6. What was their school called?
  7. Who was blamed for all of the cyber bulling?
  8. Who is milk and honey?

15 Clues: Who is Muslim?Where did Lilly hide?What does Recce like?Who was cyber bullied?Who is milk and honey?what is the book about?Who is Amr's best friend?Who is Lilly's boyfriend?What is the websites namer?What grade grade are they in?What was their school called?What does Trevor like to draw?Who gets teased because of her skin?...

BCAW 2022 2022-06-13

BCAW 2022 crossword puzzle
Across
  1. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  2. In order to prepare for cyber resilience, speed and agility are required.
  3. One of the UMW Group Crisis Management Team Structure
Down
  1. The capacity to recover quickly from difficulties
  2. Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
  3. Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
  4. What is the third UMW Group BCM risk events?
  5. A thing made by combining two different elements

8 Clues: What is the third UMW Group BCM risk events?A thing made by combining two different elementsThe capacity to recover quickly from difficultiesOne of the UMW Group Crisis Management Team StructureIn order to prepare for cyber resilience, speed and agility are required....

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Eden's Virus Vocab Crossword :/ 2018-11-15

Eden's Virus Vocab Crossword :/ crossword puzzle
Across
  1. online mail
  2. explosion of data that paralyzes a network
  3. security system for a computer that limits the exposure of a computer network
  4. used to protect computers from viruses
  5. type of malware that saves users data without the users knowing it
  6. programs used by a computer
  7. virus that replicates itself
  8. misleads users of its true intent
Down
  1. most used virus worm
  2. electronic device that stores data
  3. cyber crime in which people pretend to be a fake institution to lure you in so you will give out personal data
  4. unwanted computer software that turns a computer against itself
  5. software intended to damage systems
  6. unwanted program that delivers advertising content
  7. makes a virus look legitimate

15 Clues: online mailmost used virus wormprograms used by a computervirus that replicates itselfmakes a virus look legitimatemisleads users of its true intentelectronic device that stores datasoftware intended to damage systemsused to protect computers from virusesexplosion of data that paralyzes a networkunwanted program that delivers advertising content...

Cyber Security Awareness Puzzle 2021-10-11

Cyber Security Awareness Puzzle crossword puzzle
Across
  1. A software that is designed and destroy computer viruses
  2. Also known as malicious software any; any program or file that is harmful to a computer user
  3. The state of being free from danger and threat
  4. Choose a password that is easy for you _______________ but hard for you someone to guess
  5. Always _______your computer when you leave your desk
  6. Email scam or attempt to trick you into giving your password or personal information
Down
  1. Do not leave your laptop or computer
  2. Never share your _________ with another person
  3. Applied to data to protect it from unauthorized use in case of theft or loss.
  4. A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
  5. Passwords should always be at least this many characters long.

11 Clues: Do not leave your laptop or computerNever share your _________ with another personThe state of being free from danger and threatAlways _______your computer when you leave your deskA software that is designed and destroy computer virusesPasswords should always be at least this many characters long....

Cyber Security By Zara 2021-11-05

Cyber Security By Zara crossword puzzle
Across
  1. fake version of the app, loaded up with malware
  2. If something looks fake
  3. a type of malware that spreads copies of itself from computer to computer
  4. someone makes up a story to gain a person's interest and uses this to encourage them to give away information about themselves
  5. Looking over someone's shoulder to see their password
  6. What is the first thing you type in on your computer
Down
  1. a software utility program designed to protect a system from internal attacks from viruses
  2. If you click on a link you might get this
  3. PayPal Scam...
  4. decides whether to allow or block specific traffic
  5. What is the second thing you type in on your computer

11 Clues: PayPal Scam...If something looks fakeIf you click on a link you might get thisfake version of the app, loaded up with malwaredecides whether to allow or block specific trafficWhat is the first thing you type in on your computerWhat is the second thing you type in on your computerLooking over someone's shoulder to see their password...

Cyber security crossword search 2025-10-15

Cyber security crossword search crossword puzzle
Across
  1. Keeping your personal information safe and not sharing it without permission.
  2. A program that finds and removes harmful software from your device.
  3. A trick where someone pretends to be trustworthy to steal your personal info.
  4. A security step where you need two things (like a password and a code) to log in.
  5. A small update that fixes problems or security holes in software.
Down
  1. A way to lock your data so only the right person can read it.
  2. Malicious software that can damage your computer or steal your data.
  3. A secret word or code you use to log in and keep your accounts safe.
  4. A machine that cuts paper into tiny pieces so no one can read it.
  5. A sneaky program that watches what you do on your computer without you knowing.
  6. A tool that protects your computer by blocking unwanted internet traffic.

11 Clues: A way to lock your data so only the right person can read it.A machine that cuts paper into tiny pieces so no one can read it.A small update that fixes problems or security holes in software.A program that finds and removes harmful software from your device.Malicious software that can damage your computer or steal your data....

Let's Recap: Cyberbullying 2021-07-10

Let's Recap: Cyberbullying crossword puzzle
Across
  1. Where cyber bullying can take place
  2. ________ experience bullying more
  3. A type of bullying behavior
  4. Confidence in your leadership
  5. To be kept private on social media
  6. Cyber bullying occurs through ___________
  7. Opposite of staying quiet
  8. Words have _________
Down
  1. To harm, intimidate or coerce someone
  2. A type of information posted about someone
  3. The change you want to see
  4. Perform _________ acts of kindness
  5. Counter bullying

13 Clues: Counter bullyingWords have _________Opposite of staying quietThe change you want to seeA type of bullying behaviorConfidence in your leadership________ experience bullying moreTo be kept private on social mediaPerform _________ acts of kindnessWhere cyber bullying can take placeTo harm, intimidate or coerce someone...

Cybersecurity Crossword Puzzle 2023-04-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
  2. access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
  3. It is a software or hardware which is used to filter network traffic based on rules.
  4. It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
  5. Is a software that operates on different OS which is used to prevent malicious software.
  6. security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
  1. Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
  2. Is an action or event that might compromise the security.
  3. It is a malicious software that installs on your computer without your consent for a bad purpose.
  4. security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  5. Is an assault on the system security that is delivered by a person or a machine to a system.

11 Clues: Is an action or event that might compromise the security.It is a software or hardware which is used to filter network traffic based on rules.Is a software that operates on different OS which is used to prevent malicious software.Is an assault on the system security that is delivered by a person or a machine to a system....

BCAW 2022 2022-06-13

BCAW 2022 crossword puzzle
Across
  1. What is the color alert codes for the partial activation?
  2. The capacity to recover quickly from difficulties
  3. In order to prepare for cyber resilience, speed and agility are required.
  4. What is the third UMW Group BCM risk events?
Down
  1. Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
  2. Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
  3. One of the UMW Group Crisis Management Team Structure
  4. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  5. A thing made by combining two different elements
  6. Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities

10 Clues: What is the third UMW Group BCM risk events?A thing made by combining two different elementsThe capacity to recover quickly from difficultiesOne of the UMW Group Crisis Management Team StructureWhat is the color alert codes for the partial activation?In order to prepare for cyber resilience, speed and agility are required....

Social media 2021-01-26

Social media crossword puzzle
Across
  1. a small thing that you press to work on a computer
  2. the right or opportunity to use or look at something
  3. to keep someone or something from dangerius things
Down
  1. using the internet
  2. protection of someone or something
  3. using computers, especially the internet
  4. to press a button

7 Clues: to press a buttonusing the internetprotection of someone or somethingusing computers, especially the interneta small thing that you press to work on a computerto keep someone or something from dangerius thingsthe right or opportunity to use or look at something

CISO Crossword Puzzle 0523 2023-08-28

CISO Crossword Puzzle 0523 crossword puzzle
Across
  1. The right to control how your information is viewed and used, while being protected against threats or danger.
  2. A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
  3. A technique by which cyber criminals steal potentially sensitive user information by injecting malicious JavaScript code in various forms/pages of targeted website.
  4. A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes
  5. A Security incident in which a malicious threat actor gains access to systems without authorization.
  6. Property of data which gives assurance that the data can only be accessed/modified by authorized users.
Down
  1. Software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features.
  2. The destruction of the data on a data storage device by removing its magnetism.
  3. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. A social engineering technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. Format of a message or data in readable form; extremely vulnerable from a confidentiality perspective.
  6. A documented, lowest level of security configuration allowed by an organization.

12 Clues: The destruction of the data on a data storage device by removing its magnetism.A documented, lowest level of security configuration allowed by an organization.A Security incident in which a malicious threat actor gains access to systems without authorization....

Cyber Security Crossword Puzzle 2024-10-03

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. A person who uses computers to gain unauthorized data
  2. A user illegally accessing a website
  3. An attempt to steal sensitive information
  4. A bug that disrupts the system
  5. Data from a website that is stored in a web browser
Down
  1. When people bully others online
  2. A digital trail left by everything you do online
  3. A dangerous program that destroys and corrupts devices
  4. A network that allows you to play online
  5. A user who's allowed to access a website
  6. A code that protects private information

11 Clues: A bug that disrupts the systemWhen people bully others onlineA user illegally accessing a websiteA network that allows you to play onlineA user who's allowed to access a websiteA code that protects private informationAn attempt to steal sensitive informationA digital trail left by everything you do online...

El 2025-07-01

El crossword puzzle
Across
  1. Impact of technology on physical and mental well-being
  2. Availability and affordability of technology and internet access
  3. Rules for polite and respectful online behavior
  4. Exchanging information and ideas using digital technologies
Down
  1. Freedoms and obligations in the digital world
  2. Legal framework governing online activities
  3. Protecting personal information and devices from cyber threats.
  4. Ability to find, evaluate, and use information effectively online.
  5. Buying and selling goods and services online

9 Clues: Legal framework governing online activitiesBuying and selling goods and services onlineFreedoms and obligations in the digital worldRules for polite and respectful online behaviorImpact of technology on physical and mental well-beingExchanging information and ideas using digital technologies...

BCAW 2022 2022-06-13

BCAW 2022 crossword puzzle
Across
  1. In order to prepare for cyber resilience, speed and agility are required.
  2. Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
  3. The capacity to recover quickly from difficulties
  4. What is the third UMW Group BCM risk events?
  5. A thing made by combining two different elements
Down
  1. Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
  2. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  3. Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
  4. One of the UMW Group Crisis Management Team Structure
  5. What color for alert codes of partial activation?

10 Clues: What is the third UMW Group BCM risk events?A thing made by combining two different elementsThe capacity to recover quickly from difficultiesWhat color for alert codes of partial activation?One of the UMW Group Crisis Management Team StructureIn order to prepare for cyber resilience, speed and agility are required....

cybercrime 2022-10-11

cybercrime crossword puzzle
Across
  1. variety of crimes carried out online,
  2. a security incident where sensitive data is accidentally exposed
  3. a place where you can ethicly use cybercrime
  4. type of cybercrime
  5. keep updated to protect youreself
Down
  1. the company who lost passwords in 2011
  2. a measure taken in advance to prevent something dangerous, unpleasant, or inconvenient from happening
  3. punishment for commiting cybercrime
  4. the country with the most cybercrime
  5. traditional crimes which can be increased in scale by usingcomputers( cyber-crimes)

10 Clues: type of cybercrimekeep updated to protect youreselfpunishment for commiting cybercrimethe country with the most cybercrimevariety of crimes carried out online,the company who lost passwords in 2011a place where you can ethicly use cybercrimea security incident where sensitive data is accidentally exposed...

Social media 2021-01-26

Social media crossword puzzle
Across
  1. to press a button
  2. to keep someone or something from dangerius things
  3. using computers, especially the internet
Down
  1. using the internet
  2. protection of someone or something
  3. the right or opportunity to use or look at something
  4. a small thing that you press to work on a computer

7 Clues: to press a buttonusing the internetprotection of someone or somethingusing computers, especially the interneta small thing that you press to work on a computerto keep someone or something from dangerius thingsthe right or opportunity to use or look at something

Tech, Trends, and Titans 2025-04-01

Tech, Trends, and Titans crossword puzzle
Across
  1. A celestial event where the moon blocks the sun, last seen in April 2024.
  2. A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
  3. The tech giant behind Facebook, Instagram, and its growing metaverse.
  4. OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
  5. A security essential that should be strong and frequently updated.
  6. Female country legend and philanthropist who helped fund the COVID-19 vaccine.
  7. Word used to describe viral topics on social media and news.
Down
  1. Essential for protecting businesses from modern digital threats.
  2. The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
  3. Remote servers that store data online instead of locally.
  4. A critical software update that fixes security vulnerabilities.
  5. Celebrated on April 22 to promote environmental awareness.
  6. A cyber scam that tricks users into revealing sensitive information.
  7. Boxing champ turned entrepreneur, still known for his iconic grill.
  8. The season of new beginnings, blooming flowers, and warmer days.
  9. Month known for spring showers, tax deadlines, and pranks on the 1st.

16 Clues: Remote servers that store data online instead of locally.Celebrated on April 22 to promote environmental awareness.Word used to describe viral topics on social media and news.A critical software update that fixes security vulnerabilities.Essential for protecting businesses from modern digital threats....

Cybersecurity Awareness 2025-01-16

Cybersecurity Awareness crossword puzzle
Across
  1. The opposite of risky.
  2. A secret used to unlock your account.
  3. When sensitive info gets exposed.
  4. Software that fights against malware.
  5. A common way hackers send fake messages.
  6. A virtual barrier that blocks bad stuff online.
  7. What you shouldn't do without checking the link first.
  8. To scramble data so only the right person can read it.
Down
  1. The prefix for security in the digital world.
  2. What keeps your software secure and current.
  3. A fake email trying to steal your information.
  4. Unwanted emails clogging your inbox.
  5. What you use to protect your phone or laptop screen.
  6. A copy of your files in case something goes wrong.
  7. Something you shouldn't give to suspicious websites.
  8. A second step to prove it'd really you.

16 Clues: The opposite of risky.When sensitive info gets exposed.Unwanted emails clogging your inbox.A secret used to unlock your account.Software that fights against malware.A second step to prove it'd really you.A common way hackers send fake messages.What keeps your software secure and current.The prefix for security in the digital world....

iSOC Crossword - Basic 2014-10-14

iSOC Crossword - Basic crossword puzzle
Across
  1. Security is in your own _______.
  2. A person who steals information from your system without you knowing about it.
  3. A computer _______ is a group of interconnected computers.
  4. Never turn off your ______ or else your computer and the company data will be at risk
  5. The A in APT
  6. your password is like a _______, use it regularly, change it often and do not share it with anyone else.
  7. A _______ is a program that allows a user to find view hear and interact with materials on the internet.
  8. Never share your _______ with another person.
  9. Password should be changed every 2-3 months.
  10. Protect your laptop or cellphone by treating it like _____.
  11. Be cyber savvy, be a ______ user.
Down
  1. Classic form of Malware
  2. Even when Antivirus _______ is installed and updated, your computer is never 100% safe
  3. Viruses, Worms and Trojans etc
  4. A ____ is a web page address.
  5. A software that is designed to detect and destroy computer viruses.
  6. Hidden entrance into a system
  7. An army of malware infected PCs
  8. passwords should always be at least ______ characters long.
  9. The state of being free from danger or threat.
  10. The chance you take when you download unknown content from the internet or leave your computer open
  11. Always _____ your computer when you leave your desk.

22 Clues: The A in APTClassic form of MalwareA ____ is a web page address.Hidden entrance into a systemViruses, Worms and Trojans etcAn army of malware infected PCsSecurity is in your own _______.Be cyber savvy, be a ______ user.Password should be changed every 2-3 months.Never share your _______ with another person....

Küberturvalisus 2020-05-28

Küberturvalisus crossword puzzle
Across
  1. ametiseisundi kuritarvitamine omakasu eesmärgil.
  2. see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil.
  3. jalakäijate või sõidukite liikumine ja paiknemine teel.
  4. ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused).
  5. psühhotroopne aine, mis tekitab sõltuvust.
Down
  1. cyber Security
  2. sisenemine arvutisüstemi
  3. protsess, milles üksikisik või inimrühm võtab omaks äärmuslikud poliitilised, sotsiaalsed või usulised seisukohad, mis vastanduvad kehtivale korrale ja kaasaegsetele ideedele.

8 Clues: cyber Securitysisenemine arvutisüstemipsühhotroopne aine, mis tekitab sõltuvust.ametiseisundi kuritarvitamine omakasu eesmärgil.jalakäijate või sõidukite liikumine ja paiknemine teel.see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil.ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused)....

Cyber Security - Social Engineering 2021-11-02

Cyber Security - Social Engineering crossword puzzle
Across
  1. The use of viruses and exploits to redirect victims trying to reach legitimate websites to identical but fake websites in which their data is not secure. (e.g. A fake bank login website that steals bank account and login information).
  2. The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information.
  3. The act of getting into a restricted area by compelling an authorized person to share their credentials. (A security guard may feel compelled to hold a secure door open for a person carrying heavy boxes or an elderly lady).
  4. The act of creating an invented scenario (the pretext) to convince someone to divulge private information, generally by pretending to be an executive or other high-ranking official.
Down
  1. The practice of gaining confidential data (passwords, PINs, etc.) by eavesdropping on the keystrokes inputted on their device. This can be done both digitally (with software that records keystrokes) or physically (looking over someone's shoulder).
  2. Tricking people into getting their personal information without their consent. Can be done using impersonation, or other social engineering practices.
  3. The practice of sending emails pretending to be from trusted companies in order to trick individuals into revealing personal information, such as passwords and credit card numbers.
  4. The practice of requesting private data or login credentials in exchange for a service or money (e.g. offering "free" IT assistance in exchange for login credentials)
  5. The act of closely following an authorized person into a restricted area (e.g. through locked doors) without the person noticing, and gaining access to that location.
  6. The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information.
  7. The act of using a malware-infected object (physical or digital) to pique people's curiosity or greed, and lure them into a trap that steals their personal information when they interact with the object.

11 Clues: The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information.The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information....

e-safety 2020-05-19

e-safety crossword puzzle
Across
  1. the opposite of the truth
  2. not actually but it is a barrier of flames
  3. sending someone a false request e.g. saying that there your bank account
Down
  1. another word for cyber
  2. being mean to people online
  3. The best computer science teacher ever
  4. 6 letter word that means security

7 Clues: another word for cyberthe opposite of the truthbeing mean to people online6 letter word that means securityThe best computer science teacher evernot actually but it is a barrier of flamessending someone a false request e.g. saying that there your bank account

E-Commerce Crossword 2016-11-22

E-Commerce Crossword crossword puzzle
Across
  1. /being connected to the internet
  2. technology /scrambles data travelling over the internet to prevent unauthorised access
  3. /the ability to conduct business transactions through a a mobile device
  4. /electronic retailer
  5. /software intended to perform unwanted actions on a computer
  6. /electronic security on the internet
  7. /a feature highlighted within a document that triggers a link to another document
  8. /a file that a web server stores on the user’s computer when a website is visited. A cookie gathers information about a user.
Down
  1. theft /the crime of stealing personal information in order to assume that person's name
  2. /the use of a fake bank website to elicit a customer’s account details
  3. of privacy /the wrongful intrusion into the personal life of another
  4. investing /direct investor trading over the internet
  5. /the buying and selling of information, goods and services via the internet
  6. mall /a virtual shopping mall
  7. /protects an author, artist, musician or publisher by giving them exclusive rights over their creation
  8. /unlawfully damaging a person’s reputation
  9. account /an account where a third party holds money until goods are delivered
  10. buying /buying in bulk so both the buyers and the sellers benefit from the deal

18 Clues: /electronic retailermall /a virtual shopping mall/being connected to the internet/electronic security on the internet/unlawfully damaging a person’s reputationinvesting /direct investor trading over the internet/software intended to perform unwanted actions on a computerof privacy /the wrongful intrusion into the personal life of another...

YSC 4.0 2022-11-09

YSC 4.0 crossword puzzle
Across
  1. fundamental knowledge and practical skills of business management especially in core business area and business analytics
  2. Engineering discipline that is growing rapidly and in importance in the age of computing platform
  3. thomas edison invented ………
  4. involves investigating the relationships that exist between the structures and properties of materials
  5. provides students with fundamental knowledge and practical skills of computer technologies especially in programming, data science, network and software engineering with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
  6. areas with applications such as telecommunications, computer systems, and power engineering and also extended into areas of applications such as in manufacturing, information technology and many more
  7. Focuses on the application of engineering principles to the design, construction and operation of industrial processing plants
Down
  1. fundamental knowledge and practical skills especially in programming, networking and software engineering
  2. involves the application of Physics principles to the design, construction and operation of various systems and devices
  3. provide students with a strong understanding of geology and geophysics that relate to exploration, petroleum discovery, development and production
  4. produce skilled knowledge workers, addressing the nation’s call for more scientists and technologists especially in the areas of Petrochemistry, Sustainable Chemistry and Nanotechnology
  5. Involves the application of engineering principles and applied sciences to the design, construction, operation, and maintenance of capital projects in a typical asset life cycle
  6. engineering field that involves activities related to exploration and production of hydrocarbons within the upstream sector
  7. focuses on providing sound knowledge and expertise in enterprise resource planning, systems analysis and design methods, database management systems and business applications with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
  8. application of engineering principles to the design, development and manufacturing of mechanical devices and systems

15 Clues: thomas edison invented ………Engineering discipline that is growing rapidly and in importance in the age of computing platforminvolves investigating the relationships that exist between the structures and properties of materialsfundamental knowledge and practical skills especially in programming, networking and software engineering...

EQUATE - Mobile Security Risks Edition 2023-06-21

EQUATE - Mobile Security Risks Edition crossword puzzle
Across
  1. Short for malicious software, it refers to any software designed to harm or exploit computer systems
  2. The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
  3. Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
  4. A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
  1. The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
  2. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
  3. Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  4. A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user

8 Clues: Short for malicious software, it refers to any software designed to harm or exploit computer systemsWireless networking technology that uses radio waves to provide wireless high-speed Internet access.The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people....

CIS101 Cybersecurity Questions by Cale Therault 2025-06-04

CIS101 Cybersecurity Questions by Cale Therault crossword puzzle
Across
  1. A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
  2. The process of identifying, analyzing, and evaluating potential risks to a system.
  3. A method of authentication that require two or more methods to gain access.
  4. Unsolicited or undesired electronic messages, typically email.
  5. The practice and study of techniques for secure communication in the presence of adversaries.
  6. The process of verifying the identity of a user or system.
  7. A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
  8. Software designed to detect, prevent, and remove malicious software.
  9. An incident where unauthorized access to data or systems occurs.
  10. Short for malicious software.
  11. A software update released to fix vulnerabilities and bugs.
Down
  1. A cyber attack made from numerous compromised computer systems.
  2. An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
  3. The process of converting data into code, especially to prevent unauthorized access.
  4. Making full use of and/or derive benefit from a resource.
  5. A weakness or flaw in a system that can be exploited by a threat.
  6. A type of malware that maliciously encrypts files and demands money for release.
  7. A potential danger that might exploit a vulnerability to breach security.
  8. A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
  9. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

20 Clues: Short for malicious software.Making full use of and/or derive benefit from a resource.The process of verifying the identity of a user or system.A software update released to fix vulnerabilities and bugs.Unsolicited or undesired electronic messages, typically email.A cyber attack made from numerous compromised computer systems....

09 Innovation through IoE 2025-02-25

09 Innovation through IoE crossword puzzle
Across
  1. A method to process IoT data closer to the source
  2. The ability of machines to function without human intervention
  3. An example of an IoT-enabled wearable device
  4. A city using IoT for urban management
  5. A high-speed wireless network that enhances IoT communication
  6. The ability of IoT devices to communicate with each other
  7. Protection of IoT systems against cyber threats
  8. Technology used for tracking objects in IoT
  9. The process of machines operating independently
  10. IoT-enabled device for tracking energy consumption
  11. IoT-based monitoring for security purposes
  12. IoT-enabled devices worn on the body
  13. The concept of connecting physical objects to the Internet
  14. A method used to enhance IoT systems through software-based solutions
Down
  1. The integration of IoT in household appliances
  2. Machine-to-Machine communication in IoT
  3. A technology linked to digital currencies and IoT security
  4. The interconnected digital environment created by IoE
  5. The process of combining multiple IoT systems
  6. A major concern in the IoT era
  7. Components that enable movement in IoT devices
  8. Devices that collect data in IoT systems
  9. A threat faced by IoT devices connected to the Internet
  10. Large-scale information generated by IoT devices
  11. A vehicle using IoT and AI for autonomous navigation
  12. Technology expected to manage the massive data from IoE
  13. The process of interpreting IoT-generated data
  14. A platform where IoT data is often stored and analyzed
  15. A key benefit of IoT, improving time and resource management
  16. The foundation of IoT, collected and used for decision-making

30 Clues: A major concern in the IoT eraIoT-enabled devices worn on the bodyA city using IoT for urban managementMachine-to-Machine communication in IoTDevices that collect data in IoT systemsIoT-based monitoring for security purposesTechnology used for tracking objects in IoTAn example of an IoT-enabled wearable device...

cyber security class 7-8 2025-07-07

cyber security class 7-8 crossword puzzle
Across
  1. A person who tries to break into computers or networks
  2. A personal profile you log into on websites or apps
  3. A program that secretly collects what you do on your device
  4. Small data stored by websites to remember what you did
  5. A program that helps protect your computer from harmful software
  6. A program or device that guards your network from threats
Down
  1. Something you install to fix or improve software
  2. Any software made to harm your computer or data
  3. A harmful program that spreads and damages your files
  4. A test websites use to check if you’re a human
  5. A small window that appears on your screen, sometimes as part of a scam
  6. A harmful file that tricks you by looking like something safe
  7. A tool that helps block unwanted content or messages
  8. A scam where someone pretends to be trustworthy to steal your info
  9. A tool that blocks unwanted connections to your computer or network
  10. A part of a website or message that takes you to another page

16 Clues: A test websites use to check if you’re a humanAny software made to harm your computer or dataSomething you install to fix or improve softwareA personal profile you log into on websites or appsA tool that helps block unwanted content or messagesA harmful program that spreads and damages your files...

cyber security class 7-8 2025-07-07

cyber security class 7-8 crossword puzzle
Across
  1. A tool that blocks unwanted connections to your computer or network
  2. Something you install to fix or improve software
  3. Small data stored by websites to remember what you did
  4. A harmful program that spreads and damages your files
  5. A tool that helps block unwanted content or messages
  6. A program that secretly collects what you do on your device
  7. A scam where someone pretends to be trustworthy to steal your info
  8. A test websites use to check if you’re a human
Down
  1. Any software made to harm your computer or data
  2. A personal profile you log into on websites or apps
  3. A program that helps protect your computer from harmful software
  4. A harmful file that tricks you by looking like something safe
  5. A person who tries to break into computers or networks
  6. A small window that appears on your screen, sometimes as part of a scam
  7. A part of a website or message that takes you to another page
  8. A program or device that guards your network from threats

16 Clues: A test websites use to check if you’re a humanAny software made to harm your computer or dataSomething you install to fix or improve softwareA personal profile you log into on websites or appsA tool that helps block unwanted content or messagesA harmful program that spreads and damages your files...

Cyber Security Awareness & Education - Crossword 2025-08-26

Cyber Security Awareness & Education - Crossword crossword puzzle
Across
  1. a set of numbers used to unlock a phone.
  2. a phishing attempt directed at a leader of an organisation.
  3. hackers often attempt to seal this from your computer or external storage.
  4. a 14-character phrase to secure an account.
  5. the button in Outlook to declare a phish email.
  6. What is the acronym for artificial intelligence.
  7. when a criminal follows behind you when entering a secure building.
  8. turn on when working on a work device out of office.
Down
  1. software used to blackmail targets for money.
  2. software installed to spy on your device.
  3. never click suspicious _____ in emails.
  4. what action should you take when you leave your work computer?
  5. a fake email used to trick the receiver.
  6. phishing that targets one specific person.
  7. sensitive emails must be sent with correct ___?

15 Clues: never click suspicious _____ in emails.a set of numbers used to unlock a phone.a fake email used to trick the receiver.software installed to spy on your device.phishing that targets one specific person.a 14-character phrase to secure an account.software used to blackmail targets for money.the button in Outlook to declare a phish email....

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Attack using precompiled lists of common passwords.
  2. Searching for insecure wireless networks to exploit.
  3. Small piece of code used to exploit a vulnerability.
  4. Technique aimed at disturbing or halting services.
  5. Memory structure targeted in buffer overflow attacks.
  6. Process of gathering information before an attack.
Down
  1. Error caused when data exceeds memory storage limits.
  2. Technique of inserting malicious code into input fields.
  3. Cross-site scripting that injects scripts into web pages.
  4. Code or tool designed to abuse vulnerabilities.
  5. Method of guessing passwords by trying all possibilities.
  6. Attack that makes a system unavailable to users.
  7. Condition where timing flaws lead to security gaps.
  8. Engineering attack that manipulates human behavior.
  9. Database query language often exploited for injection attacks.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Attack using precompiled lists of common passwords.Condition where timing flaws lead to security gaps.Engineering attack that manipulates human behavior....

FiGuRe ThIs OuT 2021-11-05

FiGuRe ThIs OuT crossword puzzle
Across
  1. When you say hello you are doing this
  2. Providing information to a group of people
  3. The type of security everyone is concerned about
  4. Something all professionals need
  5. A way to describe things
  6. Telling everyone about an upcoming event
  7. A way to recruit new faculty
  8. An Acronymn that has been in the news alot
  9. How you learn something
  10. You can't be a mentor without one of these
Down
  1. Another word for forum
  2. Made processing payments a lot easier
  3. You need a plan in order for this to work
  4. People that provide instruction
  5. The NSA grants focus on this
  6. Something all professionals need
  7. Nobody likes this
  8. A system with desired outcomes
  9. A lot of this equals information
  10. Funding to perform goals and objectives
  11. You find this as part of a goal
  12. The opposite of local
  13. A very popular night
  14. One of our partners

24 Clues: Nobody likes thisOne of our partnersA very popular nightThe opposite of localAnother word for forumHow you learn somethingA way to describe thingsThe NSA grants focus on thisA way to recruit new facultyA system with desired outcomesPeople that provide instructionYou find this as part of a goalSomething all professionals need...

Digital privacy and data protection 2025-07-08

Digital privacy and data protection crossword puzzle
Across
  1. Shaxsiy yoki individual
  2. Xavfsizlik buzilishi yoki ruxsatsiz kirish
  3. Saqlash yoki ma’lumot joyi
  4. Rozilik yoki ruxsat berish
  5. Hisob (akkaunt) yoki foydalanuvchi profili
  6. Platforma yoki internet xizmat maydoni
  7. Onlayn, internet orqali bog‘langan
  8. Kirish yoki foydalanish huquqi
  9. Kuzatish yoki harakatlarni nazorat qilish
  10. Shaxs yoki kimligingiz haqida ma’lumot
  11. Qonun yoki huquqiy me’yor
  12. Shifrlash yoki maxfiy ma’lumotni kodlash
  13. Internet tarmog‘i
Down
  1. Raqamli yoki elektron shakldagi
  2. Himoya yoki asrash
  3. Xavfsizlik yoki zarar yetmasligi holati
  4. Parol yoki maxfiy so‘z
  5. Ma’lumotlar yoki axborot to‘plami
  6. Texnologiya yoki texnik vositalar tizimi
  7. Nazorat yoki boshqaruv
  8. Siyosat yoki rasmiy qoidalar majmuasi
  9. Shaxsiy hayot daxlsizligi
  10. Axborot yoki ma’lumot
  11. Nozik yoki maxfiy ma’lumot
  12. Doimiy nazorat yoki kuzatuv
  13. Xavfsizlik yoki himoya tizimi
  14. Tartibga solish yoki qonun bilan boshqarish
  15. Foydalanuvchi yoki tizimdan foydalanuvchi shaxs
  16. Ulashish yoki ma’lumot almashish
  17. Internet yoki raqamli muhit bilan bog‘liq

30 Clues: Internet tarmog‘iHimoya yoki asrashAxborot yoki ma’lumotParol yoki maxfiy so‘zNazorat yoki boshqaruvShaxsiy yoki individualShaxsiy hayot daxlsizligiQonun yoki huquqiy me’yorSaqlash yoki ma’lumot joyiRozilik yoki ruxsat berishNozik yoki maxfiy ma’lumotDoimiy nazorat yoki kuzatuvXavfsizlik yoki himoya tizimiKirish yoki foydalanish huquqi...

CTF-CW6 2025-11-14

CTF-CW6 crossword puzzle
Across
  1. The robot butler for incident response
  2. The housekeeper for your digital vault
  3. The digital signature no one can forge
  4. At Tekion, nothing launches past this checkpoint without a security stamp!
  5. Building products with privacy protections from the start
  6. The club bouncer’s preferred guest list
  7. Swapping out names with code numbers in datasets
  8. Not you, not me, but the other guy
  9. The toy box for suspicious files
Down
  1. Hall monitor for regulations
  2. Only requesting essential personal questions on a signup form
  3. The “pest control” for your servers
  4. The Tupperware for your applications
  5. VIP pass for allowed apps and users
  6. No stickynotes—1password’s where Tekion hides the keys!
  7. When your umbrella has a hole—it leaks risk!
  8. The “oops” log for Tekion’s digital slip-ups.
  9. Cyber bouncer’s checklist
  10. Conversation with a website’s memory
  11. Four-letter acronym that stops privacy disasters before they start (abbr.)!

20 Clues: Cyber bouncer’s checklistHall monitor for regulationsThe toy box for suspicious filesNot you, not me, but the other guyThe “pest control” for your serversVIP pass for allowed apps and usersThe Tupperware for your applicationsConversation with a website’s memoryThe robot butler for incident responseThe housekeeper for your digital vault...

Tech Crossword Puzzle 2023-10-16

Tech Crossword Puzzle crossword puzzle
Across
  1. All public websites to access on the internet
  2. Tech process for telling a computer which tasks to fulfill
  3. Open source operating source modeled on UNIX
  4. Trace and correct faults in a computer
  5. A computer part or network to block unauthorized access
  6. Making a website accessible and giving adaptable resources
  7. Using microwave or radio signals to transmit signals
  8. Hypertext language
  9. The ability to acquire and apply knowledge and skills
  10. Security Controls to protect systems and the network from cyber attacks
  11. Is a sequence of instruction that is continually until a certain condition is reached
  12. Organized collection of structured info or data
Down
  1. System Software that after being loaded into the computer by an initial boot program and manages a computers resources
  2. Foundation for a system,organization or an electronic system
  3. A process or set of rules to be followed
  4. Interconnecting computing devices that can exchange data with each other
  5. Technology that you can use to create virtual representations of servers
  6. A mark up language that provides rules to define any data
  7. force Hacking method that uses trial and error to crack passwords
  8. Capture or retain digital tech info on storage inside of media
  9. The programs and other operations information used by a computer
  10. Exact copy of a dataset
  11. The process of converting information or data into a code to prevent unauthorized access
  12. Computer program that can capture or manipulate data in rows or columns
  13. Delivery of computing servers

25 Clues: Hypertext languageExact copy of a datasetDelivery of computing serversTrace and correct faults in a computerA process or set of rules to be followedOpen source operating source modeled on UNIXAll public websites to access on the internetOrganized collection of structured info or dataUsing microwave or radio signals to transmit signals...

cyber 2025-05-19

cyber crossword puzzle
Across
  1. The danger that comes from companies or people outside your business
  2. Doing what a reasonable person would do to protect others
  3. A copy of data kept in case the original is lost
  4. How rules, decisions, and controls are managed in a company
  5. A fake message that tricks people into giving away personal info
  6. When private information is stolen or exposed
  7. A written rule or guide that staff must follow
  8. Giving your risk to another party, like an insurance company
  9. A way to decide who can or can’t see or use something
  10. Proving you are who you say you are, like with a password
  11. A weak point in a system that attackers can use
Down
  1. The steps taken after a cyberattack happens
  2. Checking carefully before making a business or security decision
  3. Following the laws, rules, or standards required by authorities
  4. Keeping information private and protected
  5. Someone who causes or tries to cause harm in cyberspace
  6. Hiding data by changing it into secret code
  7. An official check to see if rules are being followed
  8. A tool that blocks unsafe internet traffic from entering a system

19 Clues: Keeping information private and protectedThe steps taken after a cyberattack happensHiding data by changing it into secret codeWhen private information is stolen or exposedA written rule or guide that staff must followA weak point in a system that attackers can useA copy of data kept in case the original is lost...

AB1401 puzzle 2020-09-12

AB1401 puzzle crossword puzzle
Across
  1. The use of deception to manipulate individuals into revealing confidential information.
  2. Who are the most vulnerable to be manipulated by hackers?
  3. What security feature did the hacker exploit in the sim swap hack?
  4. What is the most commonly reported security attack?
  5. Which company experienced the biggest cyber attack in Singapore?
Down
  1. How can we guard against social engineering tactics?

6 Clues: What is the most commonly reported security attack?How can we guard against social engineering tactics?Who are the most vulnerable to be manipulated by hackers?Which company experienced the biggest cyber attack in Singapore?What security feature did the hacker exploit in the sim swap hack?...

Cyber Crossword 2025-10-30

Cyber Crossword crossword puzzle
Across
  1. crime investigation; comes after “digital”
  2. attack stage involving traversal between systems
  3. slang term for “hacked”
  4. attack component that performs the target malicious action
  5. to gain attacker presence on a system
  6. field focusing on protecting computers
  7. attack stage where NMAP may be used
  8. facility whose analysts may use a SIEM
  9. investigation of system and network records
  10. principle of least ___
  11. phrase an attacker says after gaining access
  12. network layer protocol with pings
  13. THE defensive cyber club
  14. fancy term for Google-fu
  15. smartcards using close-proximity communication
  16. fun term for a CDRU member
  17. evidence of malicious activity
  18. evil computer program
Down
  1. short form of “covered writing”
  2. comes before “base” or “science”
  3. a tantalizing trap for attackers
  4. engineering type that works on people
  5. act of sending a malicious email
  6. the shield to red’s sword
  7. authorized cyberattack to identify vulnerabilities
  8. proactive defense, or our theme this semester
  9. bypassing physical security devices without a key
  10. IT person in charge of organization computers
  11. act of smuggling data from a system
  12. common term for offensive security person
  13. short form of “secret writing”
  14. often a network packet filter
  15. collections of connected computers
  16. either 0 or 1

34 Clues: either 0 or 1evil computer programprinciple of least ___slang term for “hacked”THE defensive cyber clubfancy term for Google-futhe shield to red’s swordfun term for a CDRU memberoften a network packet filtershort form of “secret writing”evidence of malicious activityshort form of “covered writing”comes before “base” or “science”...

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Database query language often exploited for injection attacks.
  2. Method of guessing passwords by trying all possibilities.
  3. Condition where timing flaws lead to security gaps.
  4. Technique of inserting malicious code into input fields.
  5. Memory structure targeted in buffer overflow attacks.
  6. Small piece of code used to exploit a vulnerability.
  7. Process of gathering information before an attack.
  8. Code or tool designed to abuse vulnerabilities.
Down
  1. Technique aimed at disturbing or halting services.
  2. Attack using precompiled lists of common passwords.
  3. Searching for insecure wireless networks to exploit.
  4. Error caused when data exceeds memory storage limits.
  5. Engineering attack that manipulates human behavior.
  6. Attack that makes a system unavailable to users.
  7. Cross-site scripting that injects scripts into web pages.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Attack using precompiled lists of common passwords.Condition where timing flaws lead to security gaps.Engineering attack that manipulates human behavior....

Cyber Security Unit-2 Puzzle 2025-10-01

Cyber Security Unit-2 Puzzle crossword puzzle
Across
  1. Fake or deceptive programs pretending to be legitimate.
  2. Software designed to detect and remove malware.
  3. Malware that locks files and demands payment.
  4. Phishing carried out through voice calls.
  5. Technique to rapidly change IP addresses of malicious hosts.
  6. A person or entity trying to break into systems.
  7. Phishing carried out through SMS messages.
  8. Deceptive act intended to gain unlawful advantage.
Down
  1. The reason why attackers launch cyberattacks.
  2. The underlying network used to support cyberattacks.
  3. Technique to send data secretly through another network.
  4. A server used to hide the real identity of a user.
  5. A network of compromised computers controlled remotely.
  6. Fraudulent attempt to steal information via fake emails/websites.
  7. Term used to describe harmful or hostile software/code.

15 Clues: Phishing carried out through voice calls.Phishing carried out through SMS messages.The reason why attackers launch cyberattacks.Malware that locks files and demands payment.Software designed to detect and remove malware.A person or entity trying to break into systems.A server used to hide the real identity of a user....

Cyber Security Month Crossword 2 ! 2023-10-20

Cyber Security Month  Crossword 2 ! crossword puzzle
Across
  1. A secure network communications protocol
  2. A special code that you need to access your account
  3. Secure remote collaboration tool
  4. Turn on your _____ during video calls to engage with colleagues
  5. Encryption standard used for secure file transfer
  6. A Remote Access Threat. According to some sources, remote workers are more vulnerable to this than those who work in an office environment
  7. Protected Wireless Network
Down
  1. this technology verifies a user's identity by using unique physical or behavioral traits like fingerprints or iris scan
  2. A way to keep your internet connection secure
  3. A document format that's often used for secure sharing
  4. Remote Work Communication Tool
  5. Even though you're at home, it's good to maintain a professional ____ code during work hours
  6. According to a survey by OpenVPN, 73% of vice-presidents and C-Suite IT executives believe remote workers pose a greater risk than on-site employees.Those working from home but not following proper security protocols and _______ _______ form the single biggest threat to organizations in a remote work world.
  7. What you should do when you're not speaking during a video conference.
  8. Cryptographic Protocol used to securely log onto remote systems

15 Clues: Protected Wireless NetworkRemote Work Communication ToolSecure remote collaboration toolA secure network communications protocolA way to keep your internet connection secureEncryption standard used for secure file transferA special code that you need to access your accountA document format that's often used for secure sharing...

Cyber Security Unit-1 Puzzle 2025-10-01

Cyber Security Unit-1 Puzzle crossword puzzle
Across
  1. An object representing a user's security context in Windows.
  2. Act that uses vulnerability to do damage to systems.
  3. A security barrier that controls network traffic.
  4. Ensuring data has not been altered or tampered with.
  5. Information safe from accidental or intentional disclosure.
  6. Information is available to authorized users when needed.
  7. The process of converting data into a secret code.
Down
  1. Gaps in a security program.
  2. The act of guaranteeing information is protected.
  3. The art and science of secret communication.
  4. An electronic document used to prove identity online.
  5. The process of verifying who you are.
  6. A type of encryption using only one shared key.
  7. The process of a computer running a program's instructions.
  8. Exploit a vulnerability intentionally or accidentally.

15 Clues: Gaps in a security program.The process of verifying who you are.The art and science of secret communication.A type of encryption using only one shared key.The act of guaranteeing information is protected.A security barrier that controls network traffic.The process of converting data into a secret code....

Cyber Security Unit-5 Puzzle 2025-10-07

Cyber Security Unit-5 Puzzle crossword puzzle
Across
  1. Analysis that observes behavior without executing malware.
  2. Analysis that runs malware to observe its actions.
  3. Person performing memory or malware analysis.
  4. Set of tools or methods used in forensic analysis.
  5. Collection of scripts/tools to aid memory analysis.
  6. Assigning identifiers or categories to malicious code.
  7. Scientific investigation of digital evidence.
Down
  1. Running program or task, sometimes hidden by malware.
  2. Volatile storage analyzed during forensic investigations.
  3. Processes or data intentionally concealed by attackers.
  4. Copying physical memory for analysis.
  5. Decoy system designed to attract and study attackers.
  6. Malicious software analyzed in automated systems.
  7. Analysis performed by a system without human intervention.
  8. Tool/framework for analyzing memory dumps.

15 Clues: Copying physical memory for analysis.Tool/framework for analyzing memory dumps.Person performing memory or malware analysis.Scientific investigation of digital evidence.Malicious software analyzed in automated systems.Analysis that runs malware to observe its actions.Set of tools or methods used in forensic analysis....

Cyber Security Unit-5 Puzzle 2025-10-07

Cyber Security Unit-5 Puzzle crossword puzzle
Across
  1. Analysis that runs malware to observe its actions.
  2. Tool/framework for analyzing memory dumps.
  3. Volatile storage analyzed during forensic investigations.
  4. Scientific investigation of digital evidence.
  5. Collection of scripts/tools to aid memory analysis.
Down
  1. Processes or data intentionally concealed by attackers.
  2. Assigning identifiers or categories to malicious code.
  3. Analysis that observes behavior without executing malware.
  4. Decoy system designed to attract and study attackers.
  5. Malicious software analyzed in automated systems.
  6. Set of tools or methods used in forensic analysis.
  7. Copying physical memory for analysis.
  8. Person performing memory or malware analysis.
  9. Running program or task, sometimes hidden by malware.
  10. Analysis performed by a system without human intervention.

15 Clues: Copying physical memory for analysis.Tool/framework for analyzing memory dumps.Person performing memory or malware analysis.Scientific investigation of digital evidence.Malicious software analyzed in automated systems.Analysis that runs malware to observe its actions.Set of tools or methods used in forensic analysis....

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Searching for insecure wireless networks to exploit.
  2. Small piece of code used to exploit a vulnerability.
  3. Memory structure targeted in buffer overflow attacks.
  4. Technique aimed at disturbing or halting services.
  5. Cross-site scripting that injects scripts into web pages.
  6. Process of gathering information before an attack.
  7. Method of guessing passwords by trying all possibilities.
  8. Engineering attack that manipulates human behavior.
Down
  1. Condition where timing flaws lead to security gaps.
  2. Code or tool designed to abuse vulnerabilities.
  3. Attack using precompiled lists of common passwords.
  4. Error caused when data exceeds memory storage limits.
  5. Attack that makes a system unavailable to users.
  6. Technique of inserting malicious code into input fields.
  7. Database query language often exploited for injection attacks.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Condition where timing flaws lead to security gaps.Attack using precompiled lists of common passwords.Engineering attack that manipulates human behavior....

Cyber Security Unit-4 Puzzle 2025-10-07

Cyber Security Unit-4 Puzzle crossword puzzle
Across
  1. Stealing data entered into online forms.
  2. Malware that stays active after reboots.
  3. Add-on program that extends browser functionality, often abused.
  4. Technique of hiding malicious code to avoid detection.
  5. Shared library file targeted in injection attacks.
  6. Special system rights that attackers try to escalate.
  7. Stealthy software designed to hide the presence of malware.
Down
  1. Stealing security tokens to impersonate a legitimate user.
  2. Malware that secretly monitors and collects user data.
  3. Malicious program that attaches itself to files and spreads.
  4. Application used to access the web, targeted by malware.
  5. Process of gaining higher access rights than intended.
  6. Attack that intercepts communication between two parties.
  7. Self-replicating malicious code that spreads across systems.
  8. Virtual Machine environment bypassed or checked by malware.

15 Clues: Stealing data entered into online forms.Malware that stays active after reboots.Shared library file targeted in injection attacks.Special system rights that attackers try to escalate.Malware that secretly monitors and collects user data.Process of gaining higher access rights than intended.Technique of hiding malicious code to avoid detection....

Cyber Security Unit-2 Puzzle 2025-10-01

Cyber Security Unit-2 Puzzle crossword puzzle
Across
  1. Technique to rapidly change IP addresses of malicious hosts.
  2. Malware that locks files and demands payment.
  3. Phishing carried out through voice calls.
  4. Phishing carried out through SMS messages.
  5. A person or entity trying to break into systems.
  6. Term used to describe harmful or hostile software/code.
  7. Technique to send data secretly through another network.
  8. Deceptive act intended to gain unlawful advantage.
Down
  1. The reason why attackers launch cyberattacks.
  2. A server used to hide the real identity of a user.
  3. A network of compromised computers controlled remotely.
  4. The underlying network used to support cyberattacks.
  5. Fraudulent attempt to steal information via fake emails/websites.
  6. Software designed to detect and remove malware.
  7. Fake or deceptive programs pretending to be legitimate.

15 Clues: Phishing carried out through voice calls.Phishing carried out through SMS messages.The reason why attackers launch cyberattacks.Malware that locks files and demands payment.Software designed to detect and remove malware.A person or entity trying to break into systems.A server used to hide the real identity of a user....

Cs 2023-10-16

Cs crossword puzzle
Across
  1. Malware that tracks and records a user's keystrokes, often used for stealing sensitive information.
  2. the act of downloading or streaming music games and other programes or work without any credit or cracked
  3. Driver Software that enables the operating system to communicate with and control specific hardware devices.
  4. high level programming language
  5. one example of operating system
  6. physical components of a computer system.
  7. one example of closed source software associated with microsoft
  8. malware used to collect data from users (hint tlauncher funny)
  9. Determines how much memory to allocate to each process.
  10. A type of cyber attack that redirects website traffic to a malicious website without the user's knowledge or consent.
Down
  1. A type of cyber attack where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
  2. It takes responsibility for a range of functions including managing processor time, memory management, inputs/outputs, and security.
  3. a type of license software that allows software code to be studied and changed by anyone.
  4. practice of downloading or distributing digital content without permission
  5. Swaps tasks in and out of the processor so it appears the computer is doing more than one task at the same time.
  6. Malware that spreads by replicating itself and infecting other files or systems.
  7. A type of malware that disguises itself as legitimate software or files.
  8. Allocates time to processes that are deemed urgent.
  9. low level programming language
  10. A type of malware that encrypts files and demands a ransom for their release.

20 Clues: low level programming languagehigh level programming languageone example of operating systemphysical components of a computer system.Allocates time to processes that are deemed urgent.Determines how much memory to allocate to each process.malware used to collect data from users (hint tlauncher funny)...

Complete the puzzle with the help of hints: 2023-02-07

Complete the puzzle with the help of hints: crossword puzzle
Across
  1. ________ programs are used to check the user’s keystrokes and get important information, such as passwords.
  2. Name the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments, and enemies also for military, political, or economic advantage.
Down
  1. Name the most expensive virus in the world and in cyber security history.
  2. ________ are one of the most sophisticated types of crime-ware applications that perform a wide variety of automated tasks on behalf of the cyber criminals.
  3. ________ hacking is done for a good cause, such as national security,etc.

5 Clues: Name the most expensive virus in the world and in cyber security history.________ hacking is done for a good cause, such as national security,etc.________ programs are used to check the user’s keystrokes and get important information, such as passwords....

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

ypdva-y9-CS-unit-1-revision-keywords 2025-12-03

ypdva-y9-CS-unit-1-revision-keywords crossword puzzle
Across
  1. Tool used on emails and networks to block spam or suspicious traffic
  2. Prevention method that ensures people know how to spot a cyber trick
  3. Software designed to protect your device from malware
  4. Copies of data needed to recover from a ransomware attack
  5. Attack that floods a server with requests from many sources
  6. The process used with 2FA to verify a user's identity
  7. Tempting downloads or USB sticks to trick someone into giving data
  8. Prevention method for this threat is being aware of who is watching your screen
  9. General term for malicious software
  10. Installing these will fix security holes and vulnerabilities
  11. A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
  1. Security system that monitors and filters network traffic
  2. Attack that floods a server with requests, often from a single source
  3. Malware that locks your files and demands payment
  4. Sending fake emails to trick a user into clicking a link
  5. Attack that guesses passwords by trying lots of different combinations
  6. Accessing a computer system without permission
  7. A secret set of characters used to secure an account
  8. A dishonest scheme used to trick people
  9. Type of password that makes brute force attacks take a very long time

20 Clues: General term for malicious softwareA dishonest scheme used to trick peopleAccessing a computer system without permissionMalware that locks your files and demands paymentA secret set of characters used to secure an accountSoftware designed to protect your device from malwareThe process used with 2FA to verify a user's identity...

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

Cybersecurity 2022-11-16

Cybersecurity crossword puzzle
Across
  1. Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
  2. The Sarbanes Oxly Act covers which type of activity?
  3. Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
  4. Defined as an intense and selfish desire for something, especially wealth or power.
  5. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  6. One common error when considering people in Cybersecurity is using TRUST instead of
  7. In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
  1. Falsifying header information is a serious violation of the _ Act.
  2. Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
  3. Allows the user to determine how to trust the keys, so its a trust model.
  4. Financial regulations
  5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?

12 Clues: Financial regulationsThe Sarbanes Oxly Act covers which type of activity?Falsifying header information is a serious violation of the _ Act.Allows the user to determine how to trust the keys, so its a trust model.Defined as an intense and selfish desire for something, especially wealth or power....

Summertime Reminders 2025-07-02

Summertime Reminders crossword puzzle
Across
  1. Posting too much personal information on social media.
  2. A cyber attack in which a compromised USB charging station transfers malware to a connected device.
  3. Wireless internet often used in public places.
  4. Document required for foreign travel.
Down
  1. A notification or warning about potential security risks.
  2. Time off for personal travel.
  3. Do not leave these in a vehicle overnight.
  4. Converting data into a code for protection.
  5. Protect your devices by setting this numerical code.
  6. Do this when planning foreign travel.

10 Clues: Time off for personal travel.Do this when planning foreign travel.Document required for foreign travel.Do not leave these in a vehicle overnight.Converting data into a code for protection.Wireless internet often used in public places.Protect your devices by setting this numerical code.Posting too much personal information on social media....

Cyber Security Awareness & Education - Crossword 2025-08-26

Cyber Security Awareness & Education - Crossword crossword puzzle
Across
  1. a set of numbers used to unlock a phone.
  2. software installed to spy on your device.
  3. a code used to unlock a device.
  4. use this when working on a work device out of office.
  5. when a criminal follows behind you when entering a secure building.
  6. what criminals want to steal from your computer
Down
  1. never click suspicious _____ in emails.
  2. a 14-character phrase to secure an account.
  3. the button in Outlook to declare a phish email.
  4. sensitive emails must be sent with correct ___?
  5. a fake email used to trick the receiver.
  6. phishing that targets one specific person.
  7. software used to blackmail targets for money.
  8. what to do when you leave your work device?
  9. the advancement of this has broadened phishing attempts across Australia.

15 Clues: a code used to unlock a device.never click suspicious _____ in emails.a set of numbers used to unlock a phone.a fake email used to trick the receiver.software installed to spy on your device.phishing that targets one specific person.a 14-character phrase to secure an account.what to do when you leave your work device?...

vocab 30-45 2022-09-25

vocab 30-45 crossword puzzle
Across
  1. Portrait stands out and appears raised off the paper; contains clear red and blue fibers woven throughout the bill; has clear, distinct border edges; treasury seal is shown clear, sharp saw-tooth points; watermark appears on the right side of the bull in the light:the security thread is evident- a thin embedded vertical strip with the denomination of the bill printed in it; there is minute printing on the security threads, as well as around the portrait; when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green.
  2. What was first known case in which handwriting analysis played a role?
  3. Handwriting is difficult to disguise and forge
  4. What are the overall height width and size of the letters?
  5. Also called pen testing or ethical hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
  6. When false documents or other items are copied for the purpose of deception
  7. The agency that investigates forgery cases
Down
  1. Good tool for including or excluding persons when determining a match
  2. Any prewritten handwriting samples from a suspect(S)
  3. currency/paper money, traveler’s checks. Food vouchers/ WIC coupons, certain bonds, postage stamps
  4. Similar to fingerprints, every person's handwriting is what it is
  5. The year the us court of appeals determine that handwriting ana;ysiss qualifies as a form of expert testimony
  6. Chemically sensitive paper large font size requires more ink and makes alterations more difficult high resolution borders that are difficult to copy multiple color patterns on paper embed fibers that glow under different light use chemical wash detection systems that change color when a check is altered
  7. Maximum prison term for forgery. Forgery is a federal felony
  8. A computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate

15 Clues: The agency that investigates forgery casesHandwriting is difficult to disguise and forgeAny prewritten handwriting samples from a suspect(S)What are the overall height width and size of the letters?Maximum prison term for forgery. Forgery is a federal felonySimilar to fingerprints, every person's handwriting is what it is...

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Cyber safety-by Angelica Honan 2016-06-08

Cyber safety-by Angelica Honan crossword puzzle
Across
  1. someone who is like a parent
  2. where you go on to find out information
  3. something you do when you are holding something fragile
  4. a type of virus
  5. something that keeps you safe
  6. someone who is a police
  7. where you live
  8. a person that teaches you things
  9. messages something similar to Emails
  10. something that can be detroed
  11. a way you feel when your not scared
Down
  1. when you have to make sure that something is not to Voilt
  2. something that you can play on
  3. something a bad person puts on your computer
  4. adults who you are related to
  5. card A card that has money on it
  6. someone that keeps you safe
  7. when someone sends you something on the computer
  8. when so one is telling you to get in there car
  9. when a bad person watches you on a app

20 Clues: where you livea type of virussomeone who is a policesomeone that keeps you safesomeone who is like a parentadults who you are related tosomething that keeps you safesomething that can be detroedsomething that you can play oncard A card that has money on ita person that teaches you thingsa way you feel when your not scared...

Cybersecurity 2023-07-15

Cybersecurity crossword puzzle
Across
  1. cybersecurity professionals who identify and fix security vulnerabilities
  2. collect and transmit private user information
  3. creates and stores strong passwords
  4. exploits a new vulnerability in software
  5. prevents unauthorized changes to a system’s settings and files
  6. software that combats malware infections
  7. codes that protect data during encryption
  8. floods a website or server with traffic
  9. a network of compromised computers
Down
  1. ubiquitous access points using wireless hotspots
  2. tricks users into clicking on hidden elements
  3. looks safe, but isn't
  4. a secure service that connects remotely to another network
  5. training to protect sensitive information from cyber-attacks.
  6. they illegally exploit network vulnerabilities to gain unauthorized access
  7. blocks unauthorized access to or from a computer network
  8. steals sensitive information or gains access
  9. fake email that fools users into providing information
  10. scrambles data to prevent unauthorized access
  11. locks users out of their computer for a ransom

20 Clues: looks safe, but isn'ta network of compromised computerscreates and stores strong passwordsfloods a website or server with trafficexploits a new vulnerability in softwaresoftware that combats malware infectionscodes that protect data during encryptionsteals sensitive information or gains accesstricks users into clicking on hidden elements...

Madness Project Nexus 2023-12-18

Madness Project Nexus crossword puzzle
Across
  1. Place, two soda cans
  2. clawing at their heads
  3. ominous metal mask
  4. cross-faced
  5. summoned by him
  6. the leader of the cult
  7. extractor
  8. pure of chaos
  9. englishmen
  10. Quo, enmesh the mandatus
  11. militant faction
  12. a faction leader
  13. lives on the outskirts
  14. volleyball tryouts
  15. the masked host
  16. residential sector
  17. directed outwards
  18. head of security
  19. weapons expert
  20. originally began as a meme
  21. a vehicle operator
  22. machines
  23. slightly armored
Down
  1. superfans
  2. any variation in this
  3. hodge-podges
  4. cogwrecked
  5. hiveminded
  6. vices and virtues
  7. to understand
  8. two thousand years
  9. complexities
  10. militant industry
  11. irradiation
  12. a cloning program
  13. devisive
  14. headphones
  15. robombers
  16. yellow blood
  17. check in
  18. generation 5
  19. extremely buoyant
  20. Zed, in the sewers
  21. a complete nerd
  22. the p is silent

45 Clues: devisivecheck inmachinessuperfansextractorrobomberscogwreckedhivemindedenglishmenheadphonescross-facedirradiationhodge-podgescomplexitiesyellow bloodgeneration 5to understandpure of chaosweapons expertsummoned by himthe masked hosta complete nerdthe p is silentmilitant factiona faction leaderhead of securityslightly armoredvices and virtues...

G8 Network with a Purpose 2025-02-19

G8 Network with a Purpose crossword puzzle
Across
  1. secretly collects user data without permission.
  2. A security measure that isolates infected files or systems to prevent malware from spreading.
  3. directs data to the correct destination.
  4. displays unwanted advertisements
  5. replicates itself to spread
  6. A private network
  7. A private network that allows external users
  8. fingerprints or facial recognition
  9. coded format
  10. provides data
  11. A set of rules
  12. two network to a single network.
Down
  1. Malicious software designed to harm
  2. Online communication between multiple users
  3. A wireless technology in short distances.
  4. verifying your identity
  5. connected to share resources and data.
  6. A live, online seminar
  7. converting encrypted data
  8. A networking device that connects multiple devices
  9. unauthorized access
  10. disguised as legitimate software
  11. protect against cyber threats.
  12. attaches itself to a file or program
  13. A global network
  14. wireless connection
  15. from telephone lines or fiber optics.
  16. Server A server that manages printing tasks

28 Clues: coded formatprovides dataA set of rulesA global networkA private networkunauthorized accesswireless connectionA live, online seminarverifying your identityconverting encrypted datareplicates itself to spreadprotect against cyber threats.displays unwanted advertisementsdisguised as legitimate softwaretwo network to a single network....

RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5) 2025-03-17

RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5) crossword puzzle
Across
  1. Scam that tricks people into revealing sensitive information via email by impersonating a trusted entity.
  2. SMS phishing scam
  3. Security incidents where unauthorized access exposes sensitive data
  4. Malicious program that replicates and spreads, infecting systems to cause harm.
  5. An attack that overloads a system or network to disrupt its normal functioning
  6. Deliberate deception for financial or personal gain.
  7. Converting data into a secure, unreadable format to protect it from unauthorized access.
  8. Unauthorized system access
  9. Block untrusted communication
  10. Verifying identity credentials
Down
  1. Fake websites that act as a legit business and ask for personal information
  2. Unique biological individuals identification
  3. Voice-based phishing that tricks people into revealing sensitive information over phone calls
  4. Granting access permissions
  5. False defamatory statement
  6. Set of rules or guidelines that govern decisions and actions
  7. Cyber weapon virus
  8. Restricts Computer use without authorization
  9. Use of hacking to promote political or social causes
  10. Exposing unethical behavior

20 Clues: SMS phishing scamCyber weapon virusFalse defamatory statementUnauthorized system accessGranting access permissionsExposing unethical behaviorBlock untrusted communicationVerifying identity credentialsUnique biological individuals identificationRestricts Computer use without authorizationDeliberate deception for financial or personal gain....

Cyber Tricks and Treats 2025-08-28

Cyber Tricks and Treats crossword puzzle
Across
  1. What you use to login in, but should be unique and complex for each account
  2. The cyber equivalent of a stake through the heart, used to remove viruses
  3. A virtual private network, protecting your data while you surf the web
  4. A digital skeleton key that can unlock your secure account
  5. A wireless connection standard, like a witch's cauldron of swirling energy
  6. A malevolent program disguised as a harmless application, like a wooden horse
  7. A "ghost network" created by hackers to trick you into connecting to it
  8. A sweet treat that hackers can use to track your online activities
  9. The "I" in the CIA triad, protecting your data from unauthorized modifications
Down
  1. Like a ghost in your machine, it is a type of malicious software that hides in plain sight
  2. What you should always do with your software to protect it from new cyber ghouls
  3. The most frightening kind of malware that holds your computer hostage for a ransom
  4. When you're tricked into revealing sensitive information over the phone
  5. A web address, but you should hover over a suspicious one before you "treat" it with a click
  6. A security measure that stands guard like a sentry against unauthorized access
  7. The "treat" that protects your data from prying eyes
  8. A malicious program that replicates itself, like a zombie spreading a virus
  9. A sneaky attack that pretends to be a legitimate source to steal your information

18 Clues: The "treat" that protects your data from prying eyesA digital skeleton key that can unlock your secure accountA sweet treat that hackers can use to track your online activitiesA virtual private network, protecting your data while you surf the webWhen you're tricked into revealing sensitive information over the phone...

Digital literacy 2024-05-01

Digital literacy crossword puzzle
Across
  1. Is the transfer of data from one digital devices to another
  2. Privilegedaccessmanagement
  3. Is about expressing ourselves artistically online
  4. To add security features within the computer apps or software to prevent it from cyber attack
  5. Allows sharing ideas and information, including text and visual, through virtual network and communities
  6. Having the knowledge and skills you need to participate in making change in your community
  7. a sever site,or method that delivers media to an audience
  8. Process of transferring files from a user computers to the webserver
  9. A person who commits fraud or participate in a dishonest scheme
  10. A secret word or expression used by authorized person to prove their right to access information, etc.
  11. The process of transferring files from a computer
  12. The hardware and software use to create, store, transmit, manipulate and display information and data.
  13. acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
  14. A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
  15. Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
  16. individual ability to find evaluate,and communicate information using typing or digital media platform
  17. Safeguards information from loss through backup and recovery
  18. The right to control how your information is view and used
  19. Operating system
  20. Constructivedigitalliteracy
Down
  1. Global network of billions of computers and other electronic devices
  2. security Process that prevents sensitive information from getting into the wrong hands
  3. Vertualprivatenetwork
  4. address. Address is a string of numbers separated by periods
  5. Malware
  6. A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
  7. Civicdigitalliteracy
  8. Unauthorizedaccess
  9. The use of technology to harass, threaten, embarrass, or target another person
  10. Emailspoofing
  11. Communicationdigitalliteracy
  12. The ability to find, evaluate, use, share and create content using digital devices
  13. form of media that uses dectronic devices distribution
  14. appreciating and respecting different cultures online
  15. Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
  16. Impression made by the papilarry ridges on the ends of the fingers and thombs
  17. It is a process of transferring files from the users computers to the webserver (on the internet)
  18. Understanding where to go on the internet to find reliable and correct information
  19. Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
  20. are any illegitimate internet website used to deceive users into fraud or malicious attack s
  21. Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
  22. To aid the user doing specific task
  23. Popups
  24. Any activity designed to protect the ability and integrity of your network and data
  25. Is a way to conceal information by altering it so that it appears to be random data
  26. Collection of programs and data that tell computer running
  27. The trial of data you leave when using the internet
  28. Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
  29. Tells a machine which actions to perform and how to complete task

49 Clues: PopupsMalwareEmailspoofingOperating systemUnauthorizedaccessCivicdigitalliteracyVertualprivatenetworkPrivilegedaccessmanagementConstructivedigitalliteracyCommunicationdigitalliteracyTo aid the user doing specific taskIs about expressing ourselves artistically onlineThe process of transferring files from a computer...

FitAVocab.hp 2013-05-15

FitAVocab.hp crossword puzzle
Across
  1. Formal induction into office
  2. Internet Service Provider
  3. Stores all documents
  4. The main circuit board of the computer
  5. Light Emitting Diode
  6. Wireless Fidelity
  7. A laser operated disc drive
  8. Service Set Identifier
  9. National Cyber Security Alliance
  10. Pointing device that navigates the screen
  11. Who, When, Why
  12. Information security applied to computers and networks
  13. Programs used to direct the operation of a computer
  14. To insert something into a machine
  15. A program that lets your program be online
  16. Data transmission in which a single wire can carry several channels at one time
  17. Drive A high-capacity storage device containing a read-write mechanism plus hard drives main storage
  18. A computer program that manages access to a centralized resource of service in a network
  19. An oath someone takes before entering an office by election
  20. Is an interent server that holds photos,music, and videos
  21. EX: "Just Do It"
  22. A device that makes a transmission of data
  23. EX: Camera
Down
  1. EX: Keyboard
  2. Connection from telephone switching station
  3. A device for observing(screen)
  4. Computer networking, broadcasting, using radio signals instead of wires
  5. Type of port to connect a mouse or keyboard to a PC
  6. EX: Angry Birds
  7. How you behave online
  8. Search Gives you information from the top hits from the best search engines, not just one
  9. Mechanical equipment necessary for an activity
  10. The collection of software that directs a computers operation
  11. A mouse that uses a ball
  12. A portable wireless computing device that is small enough to be used while held in the hand
  13. A slot that allows you add more plug ins
  14. A port that allows you to hardwire on internet connection
  15. Virtual reality
  16. A mouse that uses a laser
  17. Being careful and responsible using the web
  18. Engine Program that allows you to search the internet
  19. Computer memory that holds data (Random Access Memory)
  20. A piece of written,printed, or electronic matter that provides information
  21. To give credit
  22. Liquid Crystal Display
  23. Processes information (Central Processing Unit)

46 Clues: EX: CameraEX: KeyboardWho, When, WhyTo give creditEX: Angry BirdsVirtual realityEX: "Just Do It"Wireless FidelityStores all documentsLight Emitting DiodeHow you behave onlineService Set IdentifierLiquid Crystal DisplayA mouse that uses a ballInternet Service ProviderA mouse that uses a laserA laser operated disc driveFormal induction into office...

Darcy Fenwick Cyber safety 2016-05-31

Darcy Fenwick Cyber safety crossword puzzle
Across
  1. to send information from your own computer to another
  2. an electronic mail message sent from one computer
  3. a description of you in photos or words
  4. tag the nickname a user has chosen to be identified
  5. control specific features or software to manage
  6. a location online that allows multiple users
  7. security any technique of soft ware
  8. methods individual to track,lure or harass
  9. engine an Internet server that helps you search
  10. time when something is happening at that moment
Down
  1. Something that slows your computer down
  2. hostile ,strongly worded message
  3. an add that shows up randomly
  4. a program, or a set of instructions that on a computer
  5. a method of sending short messages
  6. a word or number that allows access
  7. the name for bookmarks
  8. any internet-realated illegal activity
  9. to copy a file from one computer system
  10. Pages the site that is the starting point

20 Clues: the name for bookmarksan add that shows up randomlyhostile ,strongly worded messagea method of sending short messagesa word or number that allows accesssecurity any technique of soft wareany internet-realated illegal activitySomething that slows your computer downto copy a file from one computer systema description of you in photos or words...

KNOWLEDGE OF THE WORLD 2018-02-23

KNOWLEDGE OF THE WORLD crossword puzzle
Across
  1. World’s fifth largest diamond discovered in
  2. Alphabet unveils new cyber security business called
  3. 2nd largest contributor to IBM’s 9,000 patents in 2017
  4. Richest city in the world.
  5. Richest Person on Earth
  6. Celebrates 31st state day
  7. Which of the state has first ever to opt out of Modicare?
  8. Host of ‘Baby Olympics’
  9. Bank of Baroda will no longer operate in this country.
  10. Launched ‘World’s Most Powerful Rocket’
Down
  1. First India-designed vaccine to pass WHO test
  2. Country to impose carbon tax from 2019
  3. State with highest gold medals in Khelo India Games.
  4. The Christian evangelist who preached to more than 200 million people in 185 countries but especially know for consuling United States presidents.
  5. 24K Magic
  6. Brand ambassador of Sikkim
  7. Ingvar Kamprad
  8. Which of the social media has approved to launch BHIM UPI?
  9. World’s 4th most punctual ‘mega carrier.’
  10. Launches its first food retail service in India

20 Clues: 24K MagicIngvar KampradRichest Person on EarthHost of ‘Baby Olympics’Celebrates 31st state dayBrand ambassador of SikkimRichest city in the world.Country to impose carbon tax from 2019Launched ‘World’s Most Powerful Rocket’World’s 4th most punctual ‘mega carrier.’World’s fifth largest diamond discovered in...

Skye and Brendan OO 2025-10-02

Skye and Brendan OO crossword puzzle
Across
  1. Groom's go-to drink.
  2. Groom's first car. (5,2)
  3. Class Bride & Groom met in.
  4. Groom's degree (_____ Security)
  5. Name of the couple's youngest dog.
  6. Name of Groom's childhood dog.
  7. Name of the couple's oldest dog.
  8. Bride's college.
  9. Name of Groom's fraternity and Bride's place of work.
  10. Bride's favorite color.
  11. Sport Bride played in college.
  12. Street the couple lives on.
  13. High school Bride & Groom attended.
  14. The Bride & Groom's cat’s name.
  15. Name of Bride's childhood dog.
Down
  1. Groom's zodiac sign.
  2. Year Bride & Groom started dating.
  3. Sport Groom played in highschool.
  4. Bride's degree (_____ Engineering)
  5. Where Groom proposed. (8,4)
  6. The couple's favorite board game.
  7. Bride's first car. (5,5)
  8. Street bride grew up on.
  9. How many years they’ve been together.
  10. Bride & Groom's favorite artist. (3,9)
  11. Street groom grew up.
  12. Groom's college.
  13. Bride's go-to drink. (6,4)
  14. Bride's zodiac sign.
  15. Groom's favorite color.

30 Clues: Bride's college.Groom's college.Groom's zodiac sign.Groom's go-to drink.Bride's zodiac sign.Street groom grew up.Bride's favorite color.Groom's favorite color.Groom's first car. (5,2)Bride's first car. (5,5)Street bride grew up on.Bride's go-to drink. (6,4)Where Groom proposed. (8,4)Class Bride & Groom met in.Street the couple lives on....

EST News Issue 179 2022-04-11

EST News Issue 179 crossword puzzle
Across
  1. the likelihood of a hazard causing harm
  2. health is extremely important
  3. full __ by 2050, is the aim of the Paris Agreement
Down
  1. The “__ and Cyber security” manual can be found in the DM library
  2. This can affect the global supply chain
  3. these practices improve safety standards onboard
  4. these email accounts can also be hacked
  5. Shipping will face high costs due to climate __

8 Clues: health is extremely importantthe likelihood of a hazard causing harmThis can affect the global supply chainthese email accounts can also be hackedShipping will face high costs due to climate __these practices improve safety standards onboardfull __ by 2050, is the aim of the Paris Agreement...

IEEE CS 2025-12-09

IEEE CS crossword puzzle
Across
  1. Fundamental structure of a computer system's components.
  2. Integrated circuit that contains the core of a computer.
  3. Programs and applications that run on a computer.
  4. Formal documents defining hardware and protocol rules.
  5. Computation type where multiple processes run simultaneously.
  6. Pioneer recognized as the father of computer science.
Down
  1. Prefix describing the security field protecting networks.
  2. Iterative and incremental approach to development.
  3. A fundamental unit of work in a database system.
  4. Peer-reviewed academic publication of the society.
  5. Step-by-step procedure for solving a problem.
  6. Online platform where data and services are stored and accessed via the internet.

12 Clues: Step-by-step procedure for solving a problem.A fundamental unit of work in a database system.Programs and applications that run on a computer.Iterative and incremental approach to development.Peer-reviewed academic publication of the society.Pioneer recognized as the father of computer science.Formal documents defining hardware and protocol rules....

The last Book in the Universe 2022-02-16

The last Book in the Universe crossword puzzle
Across
  1. What does lanaya give to Spaz
  2. The leader of the bully bangers
  3. The man ryter was supposed to rob
  4. who is the new latch boss of the monkey boys
  5. who took ryters book
  6. what is a Tactical Urban Vehicle; an armored cyber-driven van
  7. Where do Ryter and Litt face live
  8. what do they call old people
  9. A person who is addicted to probing
  10. what is one of Billy's rules
Down
  1. What is one of Gorms rules
  2. Who is dragging the stick and joins them in the pipe
  3. the previous boss of the monkey boys
  4. the proov that passes out edibles
  5. what did Lotti forbid
  6. what is a security guard
  7. Where the bully banger live
  8. who is the boss of the Vandals
  9. what does Lotti have under her fingernails
  10. what is the setting

20 Clues: what is the settingwho took ryters bookwhat did Lotti forbidwhat is a security guardWhat is one of Gorms rulesWhere the bully banger livewhat do they call old peoplewhat is one of Billy's rulesWhat does lanaya give to Spazwho is the boss of the VandalsThe leader of the bully bangersThe man ryter was supposed to robthe proov that passes out edibles...

CTF-CW9 2025-11-14

CTF-CW9 crossword puzzle
Across
  1. How long the burglar napped on your couch
  2. When private information escapes through a security hole
  3. Security’s holy trinity
  4. Cyber-spying with nothing but your browser
  5. The wolf that really is at the door
  6. “Call in the boss! This is above my pay grade!”
  7. The mess you started with
  8. The “seatbelt” for your sensitive files
  9. The report card for tech companies
  10. Who’s a good watchdog for Tekion? This one!
  11. Approach to artificial intelligence that seeks to prevent negative consequences
  12. Fancy word for “the cool stuff we own”
Down
  1. The matrix for your servers
  2. Privacy settings are strict unless the user loosens them
  3. Obfuscation method that answers queries with a bit of added uncertainty
  4. Where every hacker at Tekion learns to play defense.
  5. Rulebook for your info
  6. Tekion’s own “fraud detector”—spotting fake sites before they fool anyone!
  7. IKEA instructions for crisis moments
  8. Your data’s magic decoder ring

20 Clues: Rulebook for your infoSecurity’s holy trinityThe mess you started withThe matrix for your serversYour data’s magic decoder ringThe report card for tech companiesThe wolf that really is at the doorIKEA instructions for crisis momentsFancy word for “the cool stuff we own”The “seatbelt” for your sensitive filesHow long the burglar napped on your couch...

cyber security class 7-8 2025-07-07

cyber security class 7-8 crossword puzzle
Across
  1. A person who tries to break into computers or networks
  2. A personal profile you log into on websites or apps
  3. A program that secretly collects what you do on your device
  4. Small data stored by websites to remember what you did
  5. A program that helps protect your computer from harmful software
  6. A program or device that guards your network from threats
Down
  1. Something you install to fix or improve software
  2. Any software made to harm your computer or data
  3. A harmful program that spreads and damages your files
  4. A test websites use to check if you’re a human
  5. A small window that appears on your screen, sometimes as part of a scam
  6. A harmful file that tricks you by looking like something safe
  7. A tool that helps block unwanted content or messages
  8. A scam where someone pretends to be trustworthy to steal your info
  9. A tool that blocks unwanted connections to your computer or network
  10. A part of a website or message that takes you to another page

16 Clues: A test websites use to check if you’re a humanAny software made to harm your computer or dataSomething you install to fix or improve softwareA personal profile you log into on websites or appsA tool that helps block unwanted content or messagesA harmful program that spreads and damages your files...