cyber security Crossword Puzzles
cyber security crossword 2023-11-24
Across
- unwanted software that monitors and gathers information on a person and how they use their computer.
- can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- spread through the network and use the system’s resources.
- a large collection of malware-infected devices (zombies).
Down
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- malicious form of self-replicating software.
- software that is designed to gain access to your computer with malicious intent.
- a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
8 Clues: malicious form of self-replicating software. • a large collection of malware-infected devices (zombies). • spread through the network and use the system’s resources. • software that is designed to gain access to your computer with malicious intent. • unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cyber Security Crossword 2024-03-18
Across
- a secure place for storing your passwords
- software used to carry out actions that humans would have done previously
- when someone installs software to record your typing, interactions etc
- numbers, symbols and letters used to access your accounts
Down
- a white hat or black hat who accesses data without always having permission
- internet access which might include personal or public
- an email, link or text that is used to hook you in to sharing your data
- malicious software
8 Clues: malicious software • a secure place for storing your passwords • internet access which might include personal or public • numbers, symbols and letters used to access your accounts • when someone installs software to record your typing, interactions etc • an email, link or text that is used to hook you in to sharing your data • ...
Cyber Security keywords 2024-06-07
Across
- When a person calls you with a made up story to get personal information
- Software that secretly tracks what you do
- When an unauthorised user gains access to your account
- Software that disguises itself as something legitimate
- Software that copies itself over and over when it infects your device
Down
- The way we protect our devices and data online is known as
- When you receive an email from an unknown person telling you a story and asking for personal information
- Software designed to cause harm to a computer and its files
8 Clues: Software that secretly tracks what you do • When an unauthorised user gains access to your account • Software that disguises itself as something legitimate • The way we protect our devices and data online is known as • Software designed to cause harm to a computer and its files • Software that copies itself over and over when it infects your device • ...
Cyber Security Terms 2024-09-24
Across
- A security system that requires more than one method of authentication to verify the user’s identity for a login or other transaction, also known as MFA or 2FA.
- Attackers send fraudulent emails or messages that appear to be from reputable sources to trick individuals into revealing personal information, such as passwords or credit card numbers.
- Similar to phishing, but conducted via SMS text messages. Attackers send messages that appear to be from legitimate sources to trick individuals into clicking on malicious links or providing personal information.
Down
- Generally longer than passwords, often consisting of multiple words, which makes them harder to crack.
- Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure.
- Attackers gain physical access to a secure area by following closely behind an authorized person. This often happens in office buildings where security measures like keycard access are in place.
- are synthetic media in which a person in an existing image or video is replaced with someone else’s likeness using artificial intelligence (AI).
- Attackers use phone calls to trick individuals into revealing personal information. They might pretend to be from a bank, tech support, or another trusted entity.
8 Clues: Generally longer than passwords, often consisting of multiple words, which makes them harder to crack. • Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure. • ...
IEEE CS Git Informed 2025-10-27
Across
- Computation type where multiple processes run simultaneously.
- Iterative and incremental approach to development.
- Pioneer recognized as the father of computer science.
- A fundamental unit of work in a database system.
- Integrated circuit that contains the core of a computer.
- Fundamental structure of a computer system's components.
Down
- Step-by-step procedure for solving a problem.
- Formal documents defining hardware and protocol rules.
- Prefix describing the security field protecting networks.
- The primary focus area of the Computer Society.
- Chip designed for a specific application only.
- Computing resources delivered over the internet.
- The academic field central to the IEEECS mission.
- Peer-reviewed academic publication of the society.
14 Clues: Step-by-step procedure for solving a problem. • Chip designed for a specific application only. • The primary focus area of the Computer Society. • A fundamental unit of work in a database system. • Computing resources delivered over the internet. • The academic field central to the IEEECS mission. • Iterative and incremental approach to development. • ...
Cyber Ethics 2025-05-24
Across
- Bullying the digital technology social media, messaging apps.
- act of using the language and thoughts of another person as one's original work.
- The process of transforming data into unreadable code.
- bombing spam attackers keep sending bulk mails.
Down
- The process of transferring the encrypted file over the network.
- A security system that prevents unauthorised people.
- criminal activities.
- illegal intrusion.
- Piracy when software is copied and distributed illegally.
9 Clues: illegal intrusion. • criminal activities. • A security system that prevents unauthorised people. • bombing spam attackers keep sending bulk mails. • The process of transforming data into unreadable code. • Piracy when software is copied and distributed illegally. • The process of transferring the encrypted file over the network. • ...
Cybersecurity 2023-05-18
Across
- is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
- is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
- bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
- attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- is a general term for any type of intrusive computer software with malicious intent against the user.
- is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
- are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
- is the delivery of hosted services, including software, hardware, and storage, over the Internet.
- every aspect of protecting an organization and its employees and assets against cyber threats.
- is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
- is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
- is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
- is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- is the process of decoding cipher text to plain text so that it is readable by humans
- is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- is a kind of spyware software that records every keystroke made on a computer’s keyboard.
- refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.
18 Clues: is the process of decoding cipher text to plain text so that it is readable by humans • is a kind of spyware software that records every keystroke made on a computer’s keyboard. • every aspect of protecting an organization and its employees and assets against cyber threats. • ...
Product technology 2025-03-17
Across
- you can see it but its not there
- short for application
- access for all
- monosyllabic tall and angry
Down
- ones and zeros
- what you do when you wnat to rease a train and it s unrelaible
- what hits you when you step out of the cinema
- it may take your job?!! But not in the future in our experience
- elon saving the world (again)
9 Clues: ones and zeros • access for all • short for application • monosyllabic tall and angry • elon saving the world (again) • you can see it but its not there • what hits you when you step out of the cinema • what you do when you wnat to rease a train and it s unrelaible • it may take your job?!! But not in the future in our experience
Cyber Security Month Crossword Puzzle 2024-08-29
Across
- A type of malware that disguises itself as legitimate software (6 letters)
- Software designed to disrupt, damage, or gain unauthorized access (7 letters)
- To bring software up to date with the latest patches or fixes (6 letters)
- Software that secretly monitors user activity (7 letters)
- A security system that controls incoming and outgoing network traffic (7 letters)
- A fraudulent attempt to obtain sensitive information (8 letters)
- Software designed to detect and destroy viruses (9 letters)
Down
- Malware that encrypts files and demands payment for decryption (10 letters)
- Information used to verify a user's identity (11 letters)
- A copy of data stored separately to prevent loss (6 letters)
- Unauthorized access to data or systems (6 letters)
- A secret word or phrase used for authentication (8 letters)
- The process of converting information or data into a secure format (10 letters)
- A fraudulent attempt to obtain sensitive information (8 letters)
- Impersonating a legitimate source to gain unauthorized access (7 letters)
- An individual who uses technical skills to gain unauthorized access (6 letters)
- A tool used to secure and anonymize internet connections (3 letters)
17 Clues: Unauthorized access to data or systems (6 letters) • Information used to verify a user's identity (11 letters) • Software that secretly monitors user activity (7 letters) • A secret word or phrase used for authentication (8 letters) • Software designed to detect and destroy viruses (9 letters) • A copy of data stored separately to prevent loss (6 letters) • ...
Truth About Truman School 2015-10-03
Across
- Who is milk and honey?
- Who is Lilly's boyfriend?
- Who was cyber bullied?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- what is the book about?
- Who gets teased because of her skin?
Down
- Who is Amr's best friend?
- What grade grade are they in?
- Who gets involved if there is cyber bulling?
- What is the websites namer?
- What does Recce like?
- Where did Lilly hide?
- What does Trevor like to draw?
- Who is Muslim?
15 Clues: Who is Muslim? • What does Recce like? • Where did Lilly hide? • Who is milk and honey? • Who was cyber bullied? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
Hacktober 2024-09-17
Across
- malicious software that locks users out of their systems until a ransom is paid
- information about potential or ongoing cyber threats
- a secret word or phrase used to authenticate access to a system
- a digital document used to verify the identity of a user or device
- fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- software that detects and removes malware
- a secure environment used to isolate untrusted programs
- converting data into a fixed-size value, often used in password storage
- a network of infected computers controlled remotely by an attacker
- a physical or digital device used to authenticate identity
- the potential for loss or damage when a threat exploits a vulnerability
- analysis of digital evidence to investigate security incidents
- a weakness in a system that can be exploited by attackers
- penetration test, used to simulate attacks on a system to find vulnerabilities
- software that secretly gathers information about users without consent
- a vulnerability in software that is exploited before the vendor is aware
- security operations center, a team responsible for monitoring and defending systems
- an actor or event that can cause harm to a system
- fraudulent attempt to obtain sensitive information through email or websites
- a self-replicating malware that spreads across networks
- a trusted person within an organization who poses a security risk
- following laws and regulations regarding data security and privacy
Down
- systematic examination of security controls and processes
- software designed to damage or disrupt computer systems
- process of verifying the identity of a user
- a security system that controls network traffic based on predetermined rules
- a list of approved entities that are granted access to a system or network
- distributed denial of service, an attack that overwhelms a system with traffic
- a type of malware disguised as legitimate software
- multi-factor authentication, requiring two or more methods to verify identity
- a network security system that monitors and controls incoming and outgoing traffic
- process of converting data into a coded form to prevent unauthorized access
- an incident where data is accessed without authorization
- intrusion detection system, designed to detect malicious activity
- software that records keystrokes to steal sensitive information
- pretending to be someone else or a legitimate service to deceive others
- system used to monitor and analyze security events in real-time
- a software update that fixes bugs and vulnerabilities
- transforming data into a fixed-size value, commonly used in authentication
- identity and access management, used to control user permissions
40 Clues: software that detects and removes malware • process of verifying the identity of a user • an actor or event that can cause harm to a system • a type of malware disguised as legitimate software • information about potential or ongoing cyber threats • a software update that fixes bugs and vulnerabilities • software designed to damage or disrupt computer systems • ...
answers 2025-11-11
7 Clues: Which war began in 2001? • Where is NATO headquartered? • Which country joined NATO in 2024? • What alliance opposed NATO in 1955? • Which country invaded Ukraine in 2022? • What type of security does NATO provide? • What kind of new threats does NATO counter today?
Cyber Mobbing Kreuzworträtsel von Leon Cardinale 2015-01-20
Across
- Strafbestand des Cyber Mobbings im StGB?
- Wie werden die Täter auch genannt?
- Die Tat ist sowohl offen als auch?
- Grund für Mobbing?
- Die Veröffentlichung intimer Informationen ist eine?
- Erste Gegenmaßnahme
- Wie ist die Tat beweisbar?
- Wo sind Straftaten des Cyber Mobbings aufzufinden?
- Schlimmster Ausweg vieler Opfer?
Down
- Was spricht für Cyber Mobbing als für normales Mobbing?
- Letzte Gegenmaßnahme?
- Erster Ansprechpartner?(nicht der Lehrer)
- Was sollte man im Netz schützen?
- Das Massives Versenden von beleidigenden Mails ist eine?
- Die Herkunft des Wortes?
15 Clues: Grund für Mobbing? • Erste Gegenmaßnahme • Letzte Gegenmaßnahme? • Die Herkunft des Wortes? • Wie ist die Tat beweisbar? • Was sollte man im Netz schützen? • Schlimmster Ausweg vieler Opfer? • Wie werden die Täter auch genannt? • Die Tat ist sowohl offen als auch? • Strafbestand des Cyber Mobbings im StGB? • Erster Ansprechpartner?(nicht der Lehrer) • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
Down
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
Down
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- A security mechanism requiring two or more forms of verification before granting access to a system
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
Down
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
Cybersecurity Crossword Puzzle 2023-08-03
Across
- The team that facilitates collaboration between red and blue teams
- A tool that monitors network traffic for potential security breaches
Down
- A team that simulates cyber attacks to find vulnerabilities
- The team responsible for defending against cyber threats
- The act of tricking individuals into revealing sensitive information
5 Clues: The team responsible for defending against cyber threats • A team that simulates cyber attacks to find vulnerabilities • The team that facilitates collaboration between red and blue teams • The act of tricking individuals into revealing sensitive information • A tool that monitors network traffic for potential security breaches
Online Child Safety 2013-05-13
Across
- scam that involves a fraudulent e-mail
- hardware and code
- Security-any software or technique used to prevent online crime
- The Communications Decency Act
- unsolicited adds on your computer
Down
- predator- An adult internet user who exploits children or teens
- unsolicited email or junk mail
- rules/manners of inline usage
- person who access internet files either legally or illegally
- Controls-software that allows parents to control what their children do online
- hostile, strongly worded message that may contain obscene language
- Media-online site where people can post information about themselves
- virtual sexual encounters
- a sexual message sent to someone
- Rooms-an interactive forum where you can talk in real time
15 Clues: hardware and code • virtual sexual encounters • rules/manners of inline usage • unsolicited email or junk mail • The Communications Decency Act • a sexual message sent to someone • unsolicited adds on your computer • scam that involves a fraudulent e-mail • Rooms-an interactive forum where you can talk in real time • ...
Edasiõppimine ja karjäär 2022-02-03
Across
- asutas koos Steve Jobs'iga Apple'i (perekonnanimi)
- asutus, mis korraldab võistlusi alates aastast 2017
- Tallinna Tehnikaülikooli ja Tartu ülikooli ühisprogramm
- Cyber Security Network asutaja (ainult perekonnanimi)
- Austraalia internetiaktivist ja ajakirjanik, WikiLeaks asutaja (perekonnanimi)
- saadavad korda head, eesmärgiks leida süsteemist turvavigu ning neid parandada
- tegeleb nõrkust leidmise ja ründamisega
- Eesti Infotehnoloogia ja Telekommunikatsiooni Liidu algatus, kust saab teada milliseid ameteid IT-valdkonnas on
Down
- Vastavalt olukorrast teevad nii head või tegutsevad oma kasu eesmärgil
- laager, kuhu pääsevad KüberNaaskel võistlusel osalenutest parimad
- tegeleb šifrite loomise ja lahendamisega, loogikaülesannetega, räsi ja plokiahelaga ning stenograafiaga
- tegeleb koodianalüüsi ja skriptide automatiseerimisega
- morrise ussi looja (perekonnanimi)
- kurjade motiividega häkkerid
- Euroopa Liidu kodanike digiteemade oskamise ja kasutamse mudeli nimi
15 Clues: kurjade motiividega häkkerid • morrise ussi looja (perekonnanimi) • tegeleb nõrkust leidmise ja ründamisega • asutas koos Steve Jobs'iga Apple'i (perekonnanimi) • asutus, mis korraldab võistlusi alates aastast 2017 • Cyber Security Network asutaja (ainult perekonnanimi) • tegeleb koodianalüüsi ja skriptide automatiseerimisega • ...
Crossword 2 2024-07-11
Across
- A cloud deployment model where services are provided over the public internet and available to anyone.
- A cloud computing feature that allows for automatic scaling of resources as needed.
- A secure network that uses the internet to connect remote sites or users together.
- A cloud service that provides a way to manage identities and access for users and systems.
- A security measure that involves scanning incoming network traffic for malicious activities.
- A model of cloud computing where hardware is provided as a service.
- A type of cyber attack that involves overwhelming a service with excessive traffic from multiple sources.
Down
- A method of ensuring only authorized users can access certain data or resources.
- A strategy for making copies of data to protect against loss or corruption.
- A cloud computing term for the partitioning of a physical server into smaller virtual servers.
- A type of security testing that is used to find vulnerabilities of a system.
- A cloud computing service model that offers development tools and platforms to users.
- A security protocol that provides encrypted communication and secure identification of a network web server.
- A shared responsibility model in cloud computing means both the provider and the customer must manage these.
- A cloud computing service model that delivers software applications over the internet.
15 Clues: A model of cloud computing where hardware is provided as a service. • A strategy for making copies of data to protect against loss or corruption. • A type of security testing that is used to find vulnerabilities of a system. • A method of ensuring only authorized users can access certain data or resources. • ...
doctor who 2014-11-23
Across
- ------ will fall
- 2d
- a version of the master
- tv
- a telapaphic alien
- rino
- shapehifter
- planet of the timelordes
- a cyborg
- piranas of the air
- suit
- serve
- the --------
- are you my mummy
- potato head
- cyber-----
- skin with a face
- a spider like alien
- men and robot put together
- rival timelord
- dog
- mythical
Down
- appere in a wound of time
- Name of the show
- -----man
- emotion + angel
- a place and tv show
- cyber-----
- our planet
- a slime thing with teeth
- time and relevent dimension in space
- has an iron fist
- dummy
- maker of the daleks
- time
- mummy
- main character
- cyber ____
- cyber---
- exterminate
40 Clues: 2d • tv • dog • rino • suit • time • dummy • serve • mummy • -----man • a cyborg • cyber--- • mythical • cyber----- • our planet • cyber----- • cyber ____ • shapehifter • potato head • exterminate • the -------- • main character • rival timelord • emotion + angel • ------ will fall • Name of the show • has an iron fist • are you my mummy • skin with a face • a telapaphic alien • piranas of the air • a place and tv show • maker of the daleks • ...
Basic puzzle 2022-12-13
Across
- This controls the ALU and tells it what to do
- A extra layer of security
- Does IF statements
- This stores either an address in memory or data
- A standard for coding for use with differnt coding languages
- Where all your computer data is stored(permanent)
- A standard data encoding format
- A piece of a computer that accelerates graphic rendering
Down
- The operating speed of a computer and its microprocessor
- A bigger piece of a gigabyte
- This is used to switch electrical signals
- A coding system using 1 and 0s
- Helps apps load faster by storing temporary files
- A type of cyber attack in disguise of a email
- The central piece of a computer
15 Clues: Does IF statements • A extra layer of security • A bigger piece of a gigabyte • A coding system using 1 and 0s • A standard data encoding format • The central piece of a computer • This is used to switch electrical signals • This controls the ALU and tells it what to do • A type of cyber attack in disguise of a email • This stores either an address in memory or data • ...
Truth About Truman School 2015-10-03
Across
- Who was cyber bullied?
- What grade grade are they in?
- Who is Amr's best friend?
- Who is Lilly's boyfriend?
- What is the websites namer?
- Who gets teased because of her skin?
- Who is Muslim?
Down
- Who gets involved if there is cyber bulling?
- what is the book about?
- Where did Lilly hide?
- What does Recce like?
- What does Trevor like to draw?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- Who is milk and honey?
15 Clues: Who is Muslim? • Where did Lilly hide? • What does Recce like? • Who was cyber bullied? • Who is milk and honey? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
Truth About Truman School 2015-10-03
Across
- Who was cyber bullied?
- What grade grade are they in?
- Who is Amr's best friend?
- Who is Lilly's boyfriend?
- What is the websites namer?
- Who gets teased because of her skin?
- Who is Muslim?
Down
- Who gets involved if there is cyber bulling?
- what is the book about?
- Where did Lilly hide?
- What does Recce like?
- What does Trevor like to draw?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- Who is milk and honey?
15 Clues: Who is Muslim? • Where did Lilly hide? • What does Recce like? • Who was cyber bullied? • Who is milk and honey? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
BCAW 2022 2022-06-13
Across
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- In order to prepare for cyber resilience, speed and agility are required.
- One of the UMW Group Crisis Management Team Structure
Down
- The capacity to recover quickly from difficulties
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- What is the third UMW Group BCM risk events?
- A thing made by combining two different elements
8 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • One of the UMW Group Crisis Management Team Structure • In order to prepare for cyber resilience, speed and agility are required. • ...
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Eden's Virus Vocab Crossword :/ 2018-11-15
Across
- online mail
- explosion of data that paralyzes a network
- security system for a computer that limits the exposure of a computer network
- used to protect computers from viruses
- type of malware that saves users data without the users knowing it
- programs used by a computer
- virus that replicates itself
- misleads users of its true intent
Down
- most used virus worm
- electronic device that stores data
- cyber crime in which people pretend to be a fake institution to lure you in so you will give out personal data
- unwanted computer software that turns a computer against itself
- software intended to damage systems
- unwanted program that delivers advertising content
- makes a virus look legitimate
15 Clues: online mail • most used virus worm • programs used by a computer • virus that replicates itself • makes a virus look legitimate • misleads users of its true intent • electronic device that stores data • software intended to damage systems • used to protect computers from viruses • explosion of data that paralyzes a network • unwanted program that delivers advertising content • ...
Cyber Security Awareness Puzzle 2021-10-11
Across
- A software that is designed and destroy computer viruses
- Also known as malicious software any; any program or file that is harmful to a computer user
- The state of being free from danger and threat
- Choose a password that is easy for you _______________ but hard for you someone to guess
- Always _______your computer when you leave your desk
- Email scam or attempt to trick you into giving your password or personal information
Down
- Do not leave your laptop or computer
- Never share your _________ with another person
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
- Passwords should always be at least this many characters long.
11 Clues: Do not leave your laptop or computer • Never share your _________ with another person • The state of being free from danger and threat • Always _______your computer when you leave your desk • A software that is designed and destroy computer viruses • Passwords should always be at least this many characters long. • ...
Cyber Security By Zara 2021-11-05
Across
- fake version of the app, loaded up with malware
- If something looks fake
- a type of malware that spreads copies of itself from computer to computer
- someone makes up a story to gain a person's interest and uses this to encourage them to give away information about themselves
- Looking over someone's shoulder to see their password
- What is the first thing you type in on your computer
Down
- a software utility program designed to protect a system from internal attacks from viruses
- If you click on a link you might get this
- PayPal Scam...
- decides whether to allow or block specific traffic
- What is the second thing you type in on your computer
11 Clues: PayPal Scam... • If something looks fake • If you click on a link you might get this • fake version of the app, loaded up with malware • decides whether to allow or block specific traffic • What is the first thing you type in on your computer • What is the second thing you type in on your computer • Looking over someone's shoulder to see their password • ...
Cyber security crossword search 2025-10-15
Across
- Keeping your personal information safe and not sharing it without permission.
- A program that finds and removes harmful software from your device.
- A trick where someone pretends to be trustworthy to steal your personal info.
- A security step where you need two things (like a password and a code) to log in.
- A small update that fixes problems or security holes in software.
Down
- A way to lock your data so only the right person can read it.
- Malicious software that can damage your computer or steal your data.
- A secret word or code you use to log in and keep your accounts safe.
- A machine that cuts paper into tiny pieces so no one can read it.
- A sneaky program that watches what you do on your computer without you knowing.
- A tool that protects your computer by blocking unwanted internet traffic.
11 Clues: A way to lock your data so only the right person can read it. • A machine that cuts paper into tiny pieces so no one can read it. • A small update that fixes problems or security holes in software. • A program that finds and removes harmful software from your device. • Malicious software that can damage your computer or steal your data. • ...
Let's Recap: Cyberbullying 2021-07-10
Across
- Where cyber bullying can take place
- ________ experience bullying more
- A type of bullying behavior
- Confidence in your leadership
- To be kept private on social media
- Cyber bullying occurs through ___________
- Opposite of staying quiet
- Words have _________
Down
- To harm, intimidate or coerce someone
- A type of information posted about someone
- The change you want to see
- Perform _________ acts of kindness
- Counter bullying
13 Clues: Counter bullying • Words have _________ • Opposite of staying quiet • The change you want to see • A type of bullying behavior • Confidence in your leadership • ________ experience bullying more • To be kept private on social media • Perform _________ acts of kindness • Where cyber bullying can take place • To harm, intimidate or coerce someone • ...
Cybersecurity Crossword Puzzle 2023-04-17
Across
- Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- It is a software or hardware which is used to filter network traffic based on rules.
- It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- Is a software that operates on different OS which is used to prevent malicious software.
- security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- Is an action or event that might compromise the security.
- It is a malicious software that installs on your computer without your consent for a bad purpose.
- security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Is an assault on the system security that is delivered by a person or a machine to a system.
11 Clues: Is an action or event that might compromise the security. • It is a software or hardware which is used to filter network traffic based on rules. • Is a software that operates on different OS which is used to prevent malicious software. • Is an assault on the system security that is delivered by a person or a machine to a system. • ...
BCAW 2022 2022-06-13
Across
- What is the color alert codes for the partial activation?
- The capacity to recover quickly from difficulties
- In order to prepare for cyber resilience, speed and agility are required.
- What is the third UMW Group BCM risk events?
Down
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- One of the UMW Group Crisis Management Team Structure
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- A thing made by combining two different elements
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
10 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • One of the UMW Group Crisis Management Team Structure • What is the color alert codes for the partial activation? • In order to prepare for cyber resilience, speed and agility are required. • ...
Social media 2021-01-26
7 Clues: to press a button • using the internet • protection of someone or something • using computers, especially the internet • a small thing that you press to work on a computer • to keep someone or something from dangerius things • the right or opportunity to use or look at something
CISO Crossword Puzzle 0523 2023-08-28
Across
- The right to control how your information is viewed and used, while being protected against threats or danger.
- A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
- A technique by which cyber criminals steal potentially sensitive user information by injecting malicious JavaScript code in various forms/pages of targeted website.
- A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes
- A Security incident in which a malicious threat actor gains access to systems without authorization.
- Property of data which gives assurance that the data can only be accessed/modified by authorized users.
Down
- Software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features.
- The destruction of the data on a data storage device by removing its magnetism.
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- A social engineering technique through which a cybercriminal disguises themselves as a known or trusted source.
- Format of a message or data in readable form; extremely vulnerable from a confidentiality perspective.
- A documented, lowest level of security configuration allowed by an organization.
12 Clues: The destruction of the data on a data storage device by removing its magnetism. • A documented, lowest level of security configuration allowed by an organization. • A Security incident in which a malicious threat actor gains access to systems without authorization. • ...
Cyber Security Crossword Puzzle 2024-10-03
Across
- A person who uses computers to gain unauthorized data
- A user illegally accessing a website
- An attempt to steal sensitive information
- A bug that disrupts the system
- Data from a website that is stored in a web browser
Down
- When people bully others online
- A digital trail left by everything you do online
- A dangerous program that destroys and corrupts devices
- A network that allows you to play online
- A user who's allowed to access a website
- A code that protects private information
11 Clues: A bug that disrupts the system • When people bully others online • A user illegally accessing a website • A network that allows you to play online • A user who's allowed to access a website • A code that protects private information • An attempt to steal sensitive information • A digital trail left by everything you do online • ...
El 2025-07-01
Across
- Impact of technology on physical and mental well-being
- Availability and affordability of technology and internet access
- Rules for polite and respectful online behavior
- Exchanging information and ideas using digital technologies
Down
- Freedoms and obligations in the digital world
- Legal framework governing online activities
- Protecting personal information and devices from cyber threats.
- Ability to find, evaluate, and use information effectively online.
- Buying and selling goods and services online
9 Clues: Legal framework governing online activities • Buying and selling goods and services online • Freedoms and obligations in the digital world • Rules for polite and respectful online behavior • Impact of technology on physical and mental well-being • Exchanging information and ideas using digital technologies • ...
BCAW 2022 2022-06-13
Across
- In order to prepare for cyber resilience, speed and agility are required.
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
- The capacity to recover quickly from difficulties
- What is the third UMW Group BCM risk events?
- A thing made by combining two different elements
Down
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- One of the UMW Group Crisis Management Team Structure
- What color for alert codes of partial activation?
10 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • What color for alert codes of partial activation? • One of the UMW Group Crisis Management Team Structure • In order to prepare for cyber resilience, speed and agility are required. • ...
cybercrime 2022-10-11
Across
- variety of crimes carried out online,
- a security incident where sensitive data is accidentally exposed
- a place where you can ethicly use cybercrime
- type of cybercrime
- keep updated to protect youreself
Down
- the company who lost passwords in 2011
- a measure taken in advance to prevent something dangerous, unpleasant, or inconvenient from happening
- punishment for commiting cybercrime
- the country with the most cybercrime
- traditional crimes which can be increased in scale by usingcomputers( cyber-crimes)
10 Clues: type of cybercrime • keep updated to protect youreself • punishment for commiting cybercrime • the country with the most cybercrime • variety of crimes carried out online, • the company who lost passwords in 2011 • a place where you can ethicly use cybercrime • a security incident where sensitive data is accidentally exposed • ...
Social media 2021-01-26
7 Clues: to press a button • using the internet • protection of someone or something • using computers, especially the internet • a small thing that you press to work on a computer • to keep someone or something from dangerius things • the right or opportunity to use or look at something
Tech, Trends, and Titans 2025-04-01
Across
- A celestial event where the moon blocks the sun, last seen in April 2024.
- A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
- The tech giant behind Facebook, Instagram, and its growing metaverse.
- OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
- A security essential that should be strong and frequently updated.
- Female country legend and philanthropist who helped fund the COVID-19 vaccine.
- Word used to describe viral topics on social media and news.
Down
- Essential for protecting businesses from modern digital threats.
- The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
- Remote servers that store data online instead of locally.
- A critical software update that fixes security vulnerabilities.
- Celebrated on April 22 to promote environmental awareness.
- A cyber scam that tricks users into revealing sensitive information.
- Boxing champ turned entrepreneur, still known for his iconic grill.
- The season of new beginnings, blooming flowers, and warmer days.
- Month known for spring showers, tax deadlines, and pranks on the 1st.
16 Clues: Remote servers that store data online instead of locally. • Celebrated on April 22 to promote environmental awareness. • Word used to describe viral topics on social media and news. • A critical software update that fixes security vulnerabilities. • Essential for protecting businesses from modern digital threats. • ...
Cybersecurity Awareness 2025-01-16
Across
- The opposite of risky.
- A secret used to unlock your account.
- When sensitive info gets exposed.
- Software that fights against malware.
- A common way hackers send fake messages.
- A virtual barrier that blocks bad stuff online.
- What you shouldn't do without checking the link first.
- To scramble data so only the right person can read it.
Down
- The prefix for security in the digital world.
- What keeps your software secure and current.
- A fake email trying to steal your information.
- Unwanted emails clogging your inbox.
- What you use to protect your phone or laptop screen.
- A copy of your files in case something goes wrong.
- Something you shouldn't give to suspicious websites.
- A second step to prove it'd really you.
16 Clues: The opposite of risky. • When sensitive info gets exposed. • Unwanted emails clogging your inbox. • A secret used to unlock your account. • Software that fights against malware. • A second step to prove it'd really you. • A common way hackers send fake messages. • What keeps your software secure and current. • The prefix for security in the digital world. • ...
iSOC Crossword - Basic 2014-10-14
Across
- Security is in your own _______.
- A person who steals information from your system without you knowing about it.
- A computer _______ is a group of interconnected computers.
- Never turn off your ______ or else your computer and the company data will be at risk
- The A in APT
- your password is like a _______, use it regularly, change it often and do not share it with anyone else.
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
- Never share your _______ with another person.
- Password should be changed every 2-3 months.
- Protect your laptop or cellphone by treating it like _____.
- Be cyber savvy, be a ______ user.
Down
- Classic form of Malware
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- Viruses, Worms and Trojans etc
- A ____ is a web page address.
- A software that is designed to detect and destroy computer viruses.
- Hidden entrance into a system
- An army of malware infected PCs
- passwords should always be at least ______ characters long.
- The state of being free from danger or threat.
- The chance you take when you download unknown content from the internet or leave your computer open
- Always _____ your computer when you leave your desk.
22 Clues: The A in APT • Classic form of Malware • A ____ is a web page address. • Hidden entrance into a system • Viruses, Worms and Trojans etc • An army of malware infected PCs • Security is in your own _______. • Be cyber savvy, be a ______ user. • Password should be changed every 2-3 months. • Never share your _______ with another person. • ...
Küberturvalisus 2020-05-28
Across
- ametiseisundi kuritarvitamine omakasu eesmärgil.
- see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil.
- jalakäijate või sõidukite liikumine ja paiknemine teel.
- ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused).
- psühhotroopne aine, mis tekitab sõltuvust.
Down
- cyber Security
- sisenemine arvutisüstemi
- protsess, milles üksikisik või inimrühm võtab omaks äärmuslikud poliitilised, sotsiaalsed või usulised seisukohad, mis vastanduvad kehtivale korrale ja kaasaegsetele ideedele.
8 Clues: cyber Security • sisenemine arvutisüstemi • psühhotroopne aine, mis tekitab sõltuvust. • ametiseisundi kuritarvitamine omakasu eesmärgil. • jalakäijate või sõidukite liikumine ja paiknemine teel. • see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil. • ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused). • ...
Cyber Security - Social Engineering 2021-11-02
Across
- The use of viruses and exploits to redirect victims trying to reach legitimate websites to identical but fake websites in which their data is not secure. (e.g. A fake bank login website that steals bank account and login information).
- The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information.
- The act of getting into a restricted area by compelling an authorized person to share their credentials. (A security guard may feel compelled to hold a secure door open for a person carrying heavy boxes or an elderly lady).
- The act of creating an invented scenario (the pretext) to convince someone to divulge private information, generally by pretending to be an executive or other high-ranking official.
Down
- The practice of gaining confidential data (passwords, PINs, etc.) by eavesdropping on the keystrokes inputted on their device. This can be done both digitally (with software that records keystrokes) or physically (looking over someone's shoulder).
- Tricking people into getting their personal information without their consent. Can be done using impersonation, or other social engineering practices.
- The practice of sending emails pretending to be from trusted companies in order to trick individuals into revealing personal information, such as passwords and credit card numbers.
- The practice of requesting private data or login credentials in exchange for a service or money (e.g. offering "free" IT assistance in exchange for login credentials)
- The act of closely following an authorized person into a restricted area (e.g. through locked doors) without the person noticing, and gaining access to that location.
- The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information.
- The act of using a malware-infected object (physical or digital) to pique people's curiosity or greed, and lure them into a trap that steals their personal information when they interact with the object.
11 Clues: The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information. • The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information. • ...
e-safety 2020-05-19
7 Clues: another word for cyber • the opposite of the truth • being mean to people online • 6 letter word that means security • The best computer science teacher ever • not actually but it is a barrier of flames • sending someone a false request e.g. saying that there your bank account
E-Commerce Crossword 2016-11-22
Across
- /being connected to the internet
- technology /scrambles data travelling over the internet to prevent unauthorised access
- /the ability to conduct business transactions through a a mobile device
- /electronic retailer
- /software intended to perform unwanted actions on a computer
- /electronic security on the internet
- /a feature highlighted within a document that triggers a link to another document
- /a file that a web server stores on the user’s computer when a website is visited. A cookie gathers information about a user.
Down
- theft /the crime of stealing personal information in order to assume that person's name
- /the use of a fake bank website to elicit a customer’s account details
- of privacy /the wrongful intrusion into the personal life of another
- investing /direct investor trading over the internet
- /the buying and selling of information, goods and services via the internet
- mall /a virtual shopping mall
- /protects an author, artist, musician or publisher by giving them exclusive rights over their creation
- /unlawfully damaging a person’s reputation
- account /an account where a third party holds money until goods are delivered
- buying /buying in bulk so both the buyers and the sellers benefit from the deal
18 Clues: /electronic retailer • mall /a virtual shopping mall • /being connected to the internet • /electronic security on the internet • /unlawfully damaging a person’s reputation • investing /direct investor trading over the internet • /software intended to perform unwanted actions on a computer • of privacy /the wrongful intrusion into the personal life of another • ...
YSC 4.0 2022-11-09
Across
- fundamental knowledge and practical skills of business management especially in core business area and business analytics
- Engineering discipline that is growing rapidly and in importance in the age of computing platform
- thomas edison invented ………
- involves investigating the relationships that exist between the structures and properties of materials
- provides students with fundamental knowledge and practical skills of computer technologies especially in programming, data science, network and software engineering with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
- areas with applications such as telecommunications, computer systems, and power engineering and also extended into areas of applications such as in manufacturing, information technology and many more
- Focuses on the application of engineering principles to the design, construction and operation of industrial processing plants
Down
- fundamental knowledge and practical skills especially in programming, networking and software engineering
- involves the application of Physics principles to the design, construction and operation of various systems and devices
- provide students with a strong understanding of geology and geophysics that relate to exploration, petroleum discovery, development and production
- produce skilled knowledge workers, addressing the nation’s call for more scientists and technologists especially in the areas of Petrochemistry, Sustainable Chemistry and Nanotechnology
- Involves the application of engineering principles and applied sciences to the design, construction, operation, and maintenance of capital projects in a typical asset life cycle
- engineering field that involves activities related to exploration and production of hydrocarbons within the upstream sector
- focuses on providing sound knowledge and expertise in enterprise resource planning, systems analysis and design methods, database management systems and business applications with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
- application of engineering principles to the design, development and manufacturing of mechanical devices and systems
15 Clues: thomas edison invented ……… • Engineering discipline that is growing rapidly and in importance in the age of computing platform • involves investigating the relationships that exist between the structures and properties of materials • fundamental knowledge and practical skills especially in programming, networking and software engineering • ...
EQUATE - Mobile Security Risks Edition 2023-06-21
Across
- Short for malicious software, it refers to any software designed to harm or exploit computer systems
- The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
- Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
- A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
- The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
- A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
- Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
8 Clues: Short for malicious software, it refers to any software designed to harm or exploit computer systems • Wireless networking technology that uses radio waves to provide wireless high-speed Internet access. • The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people. • ...
CIS101 Cybersecurity Questions by Cale Therault 2025-06-04
Across
- A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
- The process of identifying, analyzing, and evaluating potential risks to a system.
- A method of authentication that require two or more methods to gain access.
- Unsolicited or undesired electronic messages, typically email.
- The practice and study of techniques for secure communication in the presence of adversaries.
- The process of verifying the identity of a user or system.
- A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
- Software designed to detect, prevent, and remove malicious software.
- An incident where unauthorized access to data or systems occurs.
- Short for malicious software.
- A software update released to fix vulnerabilities and bugs.
Down
- A cyber attack made from numerous compromised computer systems.
- An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
- The process of converting data into code, especially to prevent unauthorized access.
- Making full use of and/or derive benefit from a resource.
- A weakness or flaw in a system that can be exploited by a threat.
- A type of malware that maliciously encrypts files and demands money for release.
- A potential danger that might exploit a vulnerability to breach security.
- A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
20 Clues: Short for malicious software. • Making full use of and/or derive benefit from a resource. • The process of verifying the identity of a user or system. • A software update released to fix vulnerabilities and bugs. • Unsolicited or undesired electronic messages, typically email. • A cyber attack made from numerous compromised computer systems. • ...
09 Innovation through IoE 2025-02-25
Across
- A method to process IoT data closer to the source
- The ability of machines to function without human intervention
- An example of an IoT-enabled wearable device
- A city using IoT for urban management
- A high-speed wireless network that enhances IoT communication
- The ability of IoT devices to communicate with each other
- Protection of IoT systems against cyber threats
- Technology used for tracking objects in IoT
- The process of machines operating independently
- IoT-enabled device for tracking energy consumption
- IoT-based monitoring for security purposes
- IoT-enabled devices worn on the body
- The concept of connecting physical objects to the Internet
- A method used to enhance IoT systems through software-based solutions
Down
- The integration of IoT in household appliances
- Machine-to-Machine communication in IoT
- A technology linked to digital currencies and IoT security
- The interconnected digital environment created by IoE
- The process of combining multiple IoT systems
- A major concern in the IoT era
- Components that enable movement in IoT devices
- Devices that collect data in IoT systems
- A threat faced by IoT devices connected to the Internet
- Large-scale information generated by IoT devices
- A vehicle using IoT and AI for autonomous navigation
- Technology expected to manage the massive data from IoE
- The process of interpreting IoT-generated data
- A platform where IoT data is often stored and analyzed
- A key benefit of IoT, improving time and resource management
- The foundation of IoT, collected and used for decision-making
30 Clues: A major concern in the IoT era • IoT-enabled devices worn on the body • A city using IoT for urban management • Machine-to-Machine communication in IoT • Devices that collect data in IoT systems • IoT-based monitoring for security purposes • Technology used for tracking objects in IoT • An example of an IoT-enabled wearable device • ...
cyber security class 7-8 2025-07-07
Across
- A person who tries to break into computers or networks
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- Small data stored by websites to remember what you did
- A program that helps protect your computer from harmful software
- A program or device that guards your network from threats
Down
- Something you install to fix or improve software
- Any software made to harm your computer or data
- A harmful program that spreads and damages your files
- A test websites use to check if you’re a human
- A small window that appears on your screen, sometimes as part of a scam
- A harmful file that tricks you by looking like something safe
- A tool that helps block unwanted content or messages
- A scam where someone pretends to be trustworthy to steal your info
- A tool that blocks unwanted connections to your computer or network
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
cyber security class 7-8 2025-07-07
Across
- A tool that blocks unwanted connections to your computer or network
- Something you install to fix or improve software
- Small data stored by websites to remember what you did
- A harmful program that spreads and damages your files
- A tool that helps block unwanted content or messages
- A program that secretly collects what you do on your device
- A scam where someone pretends to be trustworthy to steal your info
- A test websites use to check if you’re a human
Down
- Any software made to harm your computer or data
- A personal profile you log into on websites or apps
- A program that helps protect your computer from harmful software
- A harmful file that tricks you by looking like something safe
- A person who tries to break into computers or networks
- A small window that appears on your screen, sometimes as part of a scam
- A part of a website or message that takes you to another page
- A program or device that guards your network from threats
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
Cyber Security Awareness & Education - Crossword 2025-08-26
Across
- a set of numbers used to unlock a phone.
- a phishing attempt directed at a leader of an organisation.
- hackers often attempt to seal this from your computer or external storage.
- a 14-character phrase to secure an account.
- the button in Outlook to declare a phish email.
- What is the acronym for artificial intelligence.
- when a criminal follows behind you when entering a secure building.
- turn on when working on a work device out of office.
Down
- software used to blackmail targets for money.
- software installed to spy on your device.
- never click suspicious _____ in emails.
- what action should you take when you leave your work computer?
- a fake email used to trick the receiver.
- phishing that targets one specific person.
- sensitive emails must be sent with correct ___?
15 Clues: never click suspicious _____ in emails. • a set of numbers used to unlock a phone. • a fake email used to trick the receiver. • software installed to spy on your device. • phishing that targets one specific person. • a 14-character phrase to secure an account. • software used to blackmail targets for money. • the button in Outlook to declare a phish email. • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Technique aimed at disturbing or halting services.
- Memory structure targeted in buffer overflow attacks.
- Process of gathering information before an attack.
Down
- Error caused when data exceeds memory storage limits.
- Technique of inserting malicious code into input fields.
- Cross-site scripting that injects scripts into web pages.
- Code or tool designed to abuse vulnerabilities.
- Method of guessing passwords by trying all possibilities.
- Attack that makes a system unavailable to users.
- Condition where timing flaws lead to security gaps.
- Engineering attack that manipulates human behavior.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
FiGuRe ThIs OuT 2021-11-05
Across
- When you say hello you are doing this
- Providing information to a group of people
- The type of security everyone is concerned about
- Something all professionals need
- A way to describe things
- Telling everyone about an upcoming event
- A way to recruit new faculty
- An Acronymn that has been in the news alot
- How you learn something
- You can't be a mentor without one of these
Down
- Another word for forum
- Made processing payments a lot easier
- You need a plan in order for this to work
- People that provide instruction
- The NSA grants focus on this
- Something all professionals need
- Nobody likes this
- A system with desired outcomes
- A lot of this equals information
- Funding to perform goals and objectives
- You find this as part of a goal
- The opposite of local
- A very popular night
- One of our partners
24 Clues: Nobody likes this • One of our partners • A very popular night • The opposite of local • Another word for forum • How you learn something • A way to describe things • The NSA grants focus on this • A way to recruit new faculty • A system with desired outcomes • People that provide instruction • You find this as part of a goal • Something all professionals need • ...
Digital privacy and data protection 2025-07-08
Across
- Shaxsiy yoki individual
- Xavfsizlik buzilishi yoki ruxsatsiz kirish
- Saqlash yoki ma’lumot joyi
- Rozilik yoki ruxsat berish
- Hisob (akkaunt) yoki foydalanuvchi profili
- Platforma yoki internet xizmat maydoni
- Onlayn, internet orqali bog‘langan
- Kirish yoki foydalanish huquqi
- Kuzatish yoki harakatlarni nazorat qilish
- Shaxs yoki kimligingiz haqida ma’lumot
- Qonun yoki huquqiy me’yor
- Shifrlash yoki maxfiy ma’lumotni kodlash
- Internet tarmog‘i
Down
- Raqamli yoki elektron shakldagi
- Himoya yoki asrash
- Xavfsizlik yoki zarar yetmasligi holati
- Parol yoki maxfiy so‘z
- Ma’lumotlar yoki axborot to‘plami
- Texnologiya yoki texnik vositalar tizimi
- Nazorat yoki boshqaruv
- Siyosat yoki rasmiy qoidalar majmuasi
- Shaxsiy hayot daxlsizligi
- Axborot yoki ma’lumot
- Nozik yoki maxfiy ma’lumot
- Doimiy nazorat yoki kuzatuv
- Xavfsizlik yoki himoya tizimi
- Tartibga solish yoki qonun bilan boshqarish
- Foydalanuvchi yoki tizimdan foydalanuvchi shaxs
- Ulashish yoki ma’lumot almashish
- Internet yoki raqamli muhit bilan bog‘liq
30 Clues: Internet tarmog‘i • Himoya yoki asrash • Axborot yoki ma’lumot • Parol yoki maxfiy so‘z • Nazorat yoki boshqaruv • Shaxsiy yoki individual • Shaxsiy hayot daxlsizligi • Qonun yoki huquqiy me’yor • Saqlash yoki ma’lumot joyi • Rozilik yoki ruxsat berish • Nozik yoki maxfiy ma’lumot • Doimiy nazorat yoki kuzatuv • Xavfsizlik yoki himoya tizimi • Kirish yoki foydalanish huquqi • ...
CTF-CW6 2025-11-14
Across
- The robot butler for incident response
- The housekeeper for your digital vault
- The digital signature no one can forge
- At Tekion, nothing launches past this checkpoint without a security stamp!
- Building products with privacy protections from the start
- The club bouncer’s preferred guest list
- Swapping out names with code numbers in datasets
- Not you, not me, but the other guy
- The toy box for suspicious files
Down
- Hall monitor for regulations
- Only requesting essential personal questions on a signup form
- The “pest control” for your servers
- The Tupperware for your applications
- VIP pass for allowed apps and users
- No stickynotes—1password’s where Tekion hides the keys!
- When your umbrella has a hole—it leaks risk!
- The “oops” log for Tekion’s digital slip-ups.
- Cyber bouncer’s checklist
- Conversation with a website’s memory
- Four-letter acronym that stops privacy disasters before they start (abbr.)!
20 Clues: Cyber bouncer’s checklist • Hall monitor for regulations • The toy box for suspicious files • Not you, not me, but the other guy • The “pest control” for your servers • VIP pass for allowed apps and users • The Tupperware for your applications • Conversation with a website’s memory • The robot butler for incident response • The housekeeper for your digital vault • ...
Tech Crossword Puzzle 2023-10-16
Across
- All public websites to access on the internet
- Tech process for telling a computer which tasks to fulfill
- Open source operating source modeled on UNIX
- Trace and correct faults in a computer
- A computer part or network to block unauthorized access
- Making a website accessible and giving adaptable resources
- Using microwave or radio signals to transmit signals
- Hypertext language
- The ability to acquire and apply knowledge and skills
- Security Controls to protect systems and the network from cyber attacks
- Is a sequence of instruction that is continually until a certain condition is reached
- Organized collection of structured info or data
Down
- System Software that after being loaded into the computer by an initial boot program and manages a computers resources
- Foundation for a system,organization or an electronic system
- A process or set of rules to be followed
- Interconnecting computing devices that can exchange data with each other
- Technology that you can use to create virtual representations of servers
- A mark up language that provides rules to define any data
- force Hacking method that uses trial and error to crack passwords
- Capture or retain digital tech info on storage inside of media
- The programs and other operations information used by a computer
- Exact copy of a dataset
- The process of converting information or data into a code to prevent unauthorized access
- Computer program that can capture or manipulate data in rows or columns
- Delivery of computing servers
25 Clues: Hypertext language • Exact copy of a dataset • Delivery of computing servers • Trace and correct faults in a computer • A process or set of rules to be followed • Open source operating source modeled on UNIX • All public websites to access on the internet • Organized collection of structured info or data • Using microwave or radio signals to transmit signals • ...
cyber 2025-05-19
Across
- The danger that comes from companies or people outside your business
- Doing what a reasonable person would do to protect others
- A copy of data kept in case the original is lost
- How rules, decisions, and controls are managed in a company
- A fake message that tricks people into giving away personal info
- When private information is stolen or exposed
- A written rule or guide that staff must follow
- Giving your risk to another party, like an insurance company
- A way to decide who can or can’t see or use something
- Proving you are who you say you are, like with a password
- A weak point in a system that attackers can use
Down
- The steps taken after a cyberattack happens
- Checking carefully before making a business or security decision
- Following the laws, rules, or standards required by authorities
- Keeping information private and protected
- Someone who causes or tries to cause harm in cyberspace
- Hiding data by changing it into secret code
- An official check to see if rules are being followed
- A tool that blocks unsafe internet traffic from entering a system
19 Clues: Keeping information private and protected • The steps taken after a cyberattack happens • Hiding data by changing it into secret code • When private information is stolen or exposed • A written rule or guide that staff must follow • A weak point in a system that attackers can use • A copy of data kept in case the original is lost • ...
AB1401 puzzle 2020-09-12
Across
- The use of deception to manipulate individuals into revealing confidential information.
- Who are the most vulnerable to be manipulated by hackers?
- What security feature did the hacker exploit in the sim swap hack?
- What is the most commonly reported security attack?
- Which company experienced the biggest cyber attack in Singapore?
Down
- How can we guard against social engineering tactics?
6 Clues: What is the most commonly reported security attack? • How can we guard against social engineering tactics? • Who are the most vulnerable to be manipulated by hackers? • Which company experienced the biggest cyber attack in Singapore? • What security feature did the hacker exploit in the sim swap hack? • ...
Cyber Crossword 2025-10-30
Across
- crime investigation; comes after “digital”
- attack stage involving traversal between systems
- slang term for “hacked”
- attack component that performs the target malicious action
- to gain attacker presence on a system
- field focusing on protecting computers
- attack stage where NMAP may be used
- facility whose analysts may use a SIEM
- investigation of system and network records
- principle of least ___
- phrase an attacker says after gaining access
- network layer protocol with pings
- THE defensive cyber club
- fancy term for Google-fu
- smartcards using close-proximity communication
- fun term for a CDRU member
- evidence of malicious activity
- evil computer program
Down
- short form of “covered writing”
- comes before “base” or “science”
- a tantalizing trap for attackers
- engineering type that works on people
- act of sending a malicious email
- the shield to red’s sword
- authorized cyberattack to identify vulnerabilities
- proactive defense, or our theme this semester
- bypassing physical security devices without a key
- IT person in charge of organization computers
- act of smuggling data from a system
- common term for offensive security person
- short form of “secret writing”
- often a network packet filter
- collections of connected computers
- either 0 or 1
34 Clues: either 0 or 1 • evil computer program • principle of least ___ • slang term for “hacked” • THE defensive cyber club • fancy term for Google-fu • the shield to red’s sword • fun term for a CDRU member • often a network packet filter • short form of “secret writing” • evidence of malicious activity • short form of “covered writing” • comes before “base” or “science” • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Database query language often exploited for injection attacks.
- Method of guessing passwords by trying all possibilities.
- Condition where timing flaws lead to security gaps.
- Technique of inserting malicious code into input fields.
- Memory structure targeted in buffer overflow attacks.
- Small piece of code used to exploit a vulnerability.
- Process of gathering information before an attack.
- Code or tool designed to abuse vulnerabilities.
Down
- Technique aimed at disturbing or halting services.
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Error caused when data exceeds memory storage limits.
- Engineering attack that manipulates human behavior.
- Attack that makes a system unavailable to users.
- Cross-site scripting that injects scripts into web pages.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
Cyber Security Unit-2 Puzzle 2025-10-01
Across
- Fake or deceptive programs pretending to be legitimate.
- Software designed to detect and remove malware.
- Malware that locks files and demands payment.
- Phishing carried out through voice calls.
- Technique to rapidly change IP addresses of malicious hosts.
- A person or entity trying to break into systems.
- Phishing carried out through SMS messages.
- Deceptive act intended to gain unlawful advantage.
Down
- The reason why attackers launch cyberattacks.
- The underlying network used to support cyberattacks.
- Technique to send data secretly through another network.
- A server used to hide the real identity of a user.
- A network of compromised computers controlled remotely.
- Fraudulent attempt to steal information via fake emails/websites.
- Term used to describe harmful or hostile software/code.
15 Clues: Phishing carried out through voice calls. • Phishing carried out through SMS messages. • The reason why attackers launch cyberattacks. • Malware that locks files and demands payment. • Software designed to detect and remove malware. • A person or entity trying to break into systems. • A server used to hide the real identity of a user. • ...
Cyber Security Month Crossword 2 ! 2023-10-20
Across
- A secure network communications protocol
- A special code that you need to access your account
- Secure remote collaboration tool
- Turn on your _____ during video calls to engage with colleagues
- Encryption standard used for secure file transfer
- A Remote Access Threat. According to some sources, remote workers are more vulnerable to this than those who work in an office environment
- Protected Wireless Network
Down
- this technology verifies a user's identity by using unique physical or behavioral traits like fingerprints or iris scan
- A way to keep your internet connection secure
- A document format that's often used for secure sharing
- Remote Work Communication Tool
- Even though you're at home, it's good to maintain a professional ____ code during work hours
- According to a survey by OpenVPN, 73% of vice-presidents and C-Suite IT executives believe remote workers pose a greater risk than on-site employees.Those working from home but not following proper security protocols and _______ _______ form the single biggest threat to organizations in a remote work world.
- What you should do when you're not speaking during a video conference.
- Cryptographic Protocol used to securely log onto remote systems
15 Clues: Protected Wireless Network • Remote Work Communication Tool • Secure remote collaboration tool • A secure network communications protocol • A way to keep your internet connection secure • Encryption standard used for secure file transfer • A special code that you need to access your account • A document format that's often used for secure sharing • ...
Cyber Security Unit-1 Puzzle 2025-10-01
Across
- An object representing a user's security context in Windows.
- Act that uses vulnerability to do damage to systems.
- A security barrier that controls network traffic.
- Ensuring data has not been altered or tampered with.
- Information safe from accidental or intentional disclosure.
- Information is available to authorized users when needed.
- The process of converting data into a secret code.
Down
- Gaps in a security program.
- The act of guaranteeing information is protected.
- The art and science of secret communication.
- An electronic document used to prove identity online.
- The process of verifying who you are.
- A type of encryption using only one shared key.
- The process of a computer running a program's instructions.
- Exploit a vulnerability intentionally or accidentally.
15 Clues: Gaps in a security program. • The process of verifying who you are. • The art and science of secret communication. • A type of encryption using only one shared key. • The act of guaranteeing information is protected. • A security barrier that controls network traffic. • The process of converting data into a secret code. • ...
Cyber Security Unit-5 Puzzle 2025-10-07
Across
- Analysis that observes behavior without executing malware.
- Analysis that runs malware to observe its actions.
- Person performing memory or malware analysis.
- Set of tools or methods used in forensic analysis.
- Collection of scripts/tools to aid memory analysis.
- Assigning identifiers or categories to malicious code.
- Scientific investigation of digital evidence.
Down
- Running program or task, sometimes hidden by malware.
- Volatile storage analyzed during forensic investigations.
- Processes or data intentionally concealed by attackers.
- Copying physical memory for analysis.
- Decoy system designed to attract and study attackers.
- Malicious software analyzed in automated systems.
- Analysis performed by a system without human intervention.
- Tool/framework for analyzing memory dumps.
15 Clues: Copying physical memory for analysis. • Tool/framework for analyzing memory dumps. • Person performing memory or malware analysis. • Scientific investigation of digital evidence. • Malicious software analyzed in automated systems. • Analysis that runs malware to observe its actions. • Set of tools or methods used in forensic analysis. • ...
Cyber Security Unit-5 Puzzle 2025-10-07
Across
- Analysis that runs malware to observe its actions.
- Tool/framework for analyzing memory dumps.
- Volatile storage analyzed during forensic investigations.
- Scientific investigation of digital evidence.
- Collection of scripts/tools to aid memory analysis.
Down
- Processes or data intentionally concealed by attackers.
- Assigning identifiers or categories to malicious code.
- Analysis that observes behavior without executing malware.
- Decoy system designed to attract and study attackers.
- Malicious software analyzed in automated systems.
- Set of tools or methods used in forensic analysis.
- Copying physical memory for analysis.
- Person performing memory or malware analysis.
- Running program or task, sometimes hidden by malware.
- Analysis performed by a system without human intervention.
15 Clues: Copying physical memory for analysis. • Tool/framework for analyzing memory dumps. • Person performing memory or malware analysis. • Scientific investigation of digital evidence. • Malicious software analyzed in automated systems. • Analysis that runs malware to observe its actions. • Set of tools or methods used in forensic analysis. • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Memory structure targeted in buffer overflow attacks.
- Technique aimed at disturbing or halting services.
- Cross-site scripting that injects scripts into web pages.
- Process of gathering information before an attack.
- Method of guessing passwords by trying all possibilities.
- Engineering attack that manipulates human behavior.
Down
- Condition where timing flaws lead to security gaps.
- Code or tool designed to abuse vulnerabilities.
- Attack using precompiled lists of common passwords.
- Error caused when data exceeds memory storage limits.
- Attack that makes a system unavailable to users.
- Technique of inserting malicious code into input fields.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Condition where timing flaws lead to security gaps. • Attack using precompiled lists of common passwords. • Engineering attack that manipulates human behavior. • ...
Cyber Security Unit-4 Puzzle 2025-10-07
Across
- Stealing data entered into online forms.
- Malware that stays active after reboots.
- Add-on program that extends browser functionality, often abused.
- Technique of hiding malicious code to avoid detection.
- Shared library file targeted in injection attacks.
- Special system rights that attackers try to escalate.
- Stealthy software designed to hide the presence of malware.
Down
- Stealing security tokens to impersonate a legitimate user.
- Malware that secretly monitors and collects user data.
- Malicious program that attaches itself to files and spreads.
- Application used to access the web, targeted by malware.
- Process of gaining higher access rights than intended.
- Attack that intercepts communication between two parties.
- Self-replicating malicious code that spreads across systems.
- Virtual Machine environment bypassed or checked by malware.
15 Clues: Stealing data entered into online forms. • Malware that stays active after reboots. • Shared library file targeted in injection attacks. • Special system rights that attackers try to escalate. • Malware that secretly monitors and collects user data. • Process of gaining higher access rights than intended. • Technique of hiding malicious code to avoid detection. • ...
Cyber Security Unit-2 Puzzle 2025-10-01
Across
- Technique to rapidly change IP addresses of malicious hosts.
- Malware that locks files and demands payment.
- Phishing carried out through voice calls.
- Phishing carried out through SMS messages.
- A person or entity trying to break into systems.
- Term used to describe harmful or hostile software/code.
- Technique to send data secretly through another network.
- Deceptive act intended to gain unlawful advantage.
Down
- The reason why attackers launch cyberattacks.
- A server used to hide the real identity of a user.
- A network of compromised computers controlled remotely.
- The underlying network used to support cyberattacks.
- Fraudulent attempt to steal information via fake emails/websites.
- Software designed to detect and remove malware.
- Fake or deceptive programs pretending to be legitimate.
15 Clues: Phishing carried out through voice calls. • Phishing carried out through SMS messages. • The reason why attackers launch cyberattacks. • Malware that locks files and demands payment. • Software designed to detect and remove malware. • A person or entity trying to break into systems. • A server used to hide the real identity of a user. • ...
Cs 2023-10-16
Across
- Malware that tracks and records a user's keystrokes, often used for stealing sensitive information.
- the act of downloading or streaming music games and other programes or work without any credit or cracked
- Driver Software that enables the operating system to communicate with and control specific hardware devices.
- high level programming language
- one example of operating system
- physical components of a computer system.
- one example of closed source software associated with microsoft
- malware used to collect data from users (hint tlauncher funny)
- Determines how much memory to allocate to each process.
- A type of cyber attack that redirects website traffic to a malicious website without the user's knowledge or consent.
Down
- A type of cyber attack where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- It takes responsibility for a range of functions including managing processor time, memory management, inputs/outputs, and security.
- a type of license software that allows software code to be studied and changed by anyone.
- practice of downloading or distributing digital content without permission
- Swaps tasks in and out of the processor so it appears the computer is doing more than one task at the same time.
- Malware that spreads by replicating itself and infecting other files or systems.
- A type of malware that disguises itself as legitimate software or files.
- Allocates time to processes that are deemed urgent.
- low level programming language
- A type of malware that encrypts files and demands a ransom for their release.
20 Clues: low level programming language • high level programming language • one example of operating system • physical components of a computer system. • Allocates time to processes that are deemed urgent. • Determines how much memory to allocate to each process. • malware used to collect data from users (hint tlauncher funny) • ...
Complete the puzzle with the help of hints: 2023-02-07
Across
- ________ programs are used to check the user’s keystrokes and get important information, such as passwords.
- Name the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments, and enemies also for military, political, or economic advantage.
Down
- Name the most expensive virus in the world and in cyber security history.
- ________ are one of the most sophisticated types of crime-ware applications that perform a wide variety of automated tasks on behalf of the cyber criminals.
- ________ hacking is done for a good cause, such as national security,etc.
5 Clues: Name the most expensive virus in the world and in cyber security history. • ________ hacking is done for a good cause, such as national security,etc. • ________ programs are used to check the user’s keystrokes and get important information, such as passwords. • ...
2021 Security Awareness Training 2021-08-31
7 Clues: International standard • ... via any device, at any time • Course completion is ... for all staff • training content that is updated every year • The number of bite-sized modules in the training • attacks aimed to access our network, or corrupt our • Example of an awareness module on popular cyber threats.
ypdva-y9-CS-unit-1-revision-keywords 2025-12-03
Across
- Tool used on emails and networks to block spam or suspicious traffic
- Prevention method that ensures people know how to spot a cyber trick
- Software designed to protect your device from malware
- Copies of data needed to recover from a ransomware attack
- Attack that floods a server with requests from many sources
- The process used with 2FA to verify a user's identity
- Tempting downloads or USB sticks to trick someone into giving data
- Prevention method for this threat is being aware of who is watching your screen
- General term for malicious software
- Installing these will fix security holes and vulnerabilities
- A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
- Security system that monitors and filters network traffic
- Attack that floods a server with requests, often from a single source
- Malware that locks your files and demands payment
- Sending fake emails to trick a user into clicking a link
- Attack that guesses passwords by trying lots of different combinations
- Accessing a computer system without permission
- A secret set of characters used to secure an account
- A dishonest scheme used to trick people
- Type of password that makes brute force attacks take a very long time
20 Clues: General term for malicious software • A dishonest scheme used to trick people • Accessing a computer system without permission • Malware that locks your files and demands payment • A secret set of characters used to secure an account • Software designed to protect your device from malware • The process used with 2FA to verify a user's identity • ...
2021 Security Awareness Training 2021-08-31
7 Clues: International standard • ... via any device, at any time • Course completion is ... for all staff • training content that is updated every year • The number of bite-sized modules in the training • attacks aimed to access our network, or corrupt our • Example of an awareness module on popular cyber threats.
Cybersecurity 2022-11-16
Across
- Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
- The Sarbanes Oxly Act covers which type of activity?
- Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
- Defined as an intense and selfish desire for something, especially wealth or power.
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- One common error when considering people in Cybersecurity is using TRUST instead of
- In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
- Falsifying header information is a serious violation of the _ Act.
- Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
- Allows the user to determine how to trust the keys, so its a trust model.
- Financial regulations
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
12 Clues: Financial regulations • The Sarbanes Oxly Act covers which type of activity? • Falsifying header information is a serious violation of the _ Act. • Allows the user to determine how to trust the keys, so its a trust model. • Defined as an intense and selfish desire for something, especially wealth or power. • ...
Summertime Reminders 2025-07-02
Across
- Posting too much personal information on social media.
- A cyber attack in which a compromised USB charging station transfers malware to a connected device.
- Wireless internet often used in public places.
- Document required for foreign travel.
Down
- A notification or warning about potential security risks.
- Time off for personal travel.
- Do not leave these in a vehicle overnight.
- Converting data into a code for protection.
- Protect your devices by setting this numerical code.
- Do this when planning foreign travel.
10 Clues: Time off for personal travel. • Do this when planning foreign travel. • Document required for foreign travel. • Do not leave these in a vehicle overnight. • Converting data into a code for protection. • Wireless internet often used in public places. • Protect your devices by setting this numerical code. • Posting too much personal information on social media. • ...
Cyber Security Awareness & Education - Crossword 2025-08-26
Across
- a set of numbers used to unlock a phone.
- software installed to spy on your device.
- a code used to unlock a device.
- use this when working on a work device out of office.
- when a criminal follows behind you when entering a secure building.
- what criminals want to steal from your computer
Down
- never click suspicious _____ in emails.
- a 14-character phrase to secure an account.
- the button in Outlook to declare a phish email.
- sensitive emails must be sent with correct ___?
- a fake email used to trick the receiver.
- phishing that targets one specific person.
- software used to blackmail targets for money.
- what to do when you leave your work device?
- the advancement of this has broadened phishing attempts across Australia.
15 Clues: a code used to unlock a device. • never click suspicious _____ in emails. • a set of numbers used to unlock a phone. • a fake email used to trick the receiver. • software installed to spy on your device. • phishing that targets one specific person. • a 14-character phrase to secure an account. • what to do when you leave your work device? • ...
vocab 30-45 2022-09-25
Across
- Portrait stands out and appears raised off the paper; contains clear red and blue fibers woven throughout the bill; has clear, distinct border edges; treasury seal is shown clear, sharp saw-tooth points; watermark appears on the right side of the bull in the light:the security thread is evident- a thin embedded vertical strip with the denomination of the bill printed in it; there is minute printing on the security threads, as well as around the portrait; when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green.
- What was first known case in which handwriting analysis played a role?
- Handwriting is difficult to disguise and forge
- What are the overall height width and size of the letters?
- Also called pen testing or ethical hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
- When false documents or other items are copied for the purpose of deception
- The agency that investigates forgery cases
Down
- Good tool for including or excluding persons when determining a match
- Any prewritten handwriting samples from a suspect(S)
- currency/paper money, traveler’s checks. Food vouchers/ WIC coupons, certain bonds, postage stamps
- Similar to fingerprints, every person's handwriting is what it is
- The year the us court of appeals determine that handwriting ana;ysiss qualifies as a form of expert testimony
- Chemically sensitive paper large font size requires more ink and makes alterations more difficult high resolution borders that are difficult to copy multiple color patterns on paper embed fibers that glow under different light use chemical wash detection systems that change color when a check is altered
- Maximum prison term for forgery. Forgery is a federal felony
- A computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate
15 Clues: The agency that investigates forgery cases • Handwriting is difficult to disguise and forge • Any prewritten handwriting samples from a suspect(S) • What are the overall height width and size of the letters? • Maximum prison term for forgery. Forgery is a federal felony • Similar to fingerprints, every person's handwriting is what it is • ...
2021 Security Awareness Training 2021-08-31
7 Clues: International standard • ... via any device, at any time • Course completion is ... for all staff • training content that is updated every year • The number of bite-sized modules in the training • attacks aimed to access our network, or corrupt our • Example of an awareness module on popular cyber threats.
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Cyber safety-by Angelica Honan 2016-06-08
Across
- someone who is like a parent
- where you go on to find out information
- something you do when you are holding something fragile
- a type of virus
- something that keeps you safe
- someone who is a police
- where you live
- a person that teaches you things
- messages something similar to Emails
- something that can be detroed
- a way you feel when your not scared
Down
- when you have to make sure that something is not to Voilt
- something that you can play on
- something a bad person puts on your computer
- adults who you are related to
- card A card that has money on it
- someone that keeps you safe
- when someone sends you something on the computer
- when so one is telling you to get in there car
- when a bad person watches you on a app
20 Clues: where you live • a type of virus • someone who is a police • someone that keeps you safe • someone who is like a parent • adults who you are related to • something that keeps you safe • something that can be detroed • something that you can play on • card A card that has money on it • a person that teaches you things • a way you feel when your not scared • ...
Cybersecurity 2023-07-15
Across
- cybersecurity professionals who identify and fix security vulnerabilities
- collect and transmit private user information
- creates and stores strong passwords
- exploits a new vulnerability in software
- prevents unauthorized changes to a system’s settings and files
- software that combats malware infections
- codes that protect data during encryption
- floods a website or server with traffic
- a network of compromised computers
Down
- ubiquitous access points using wireless hotspots
- tricks users into clicking on hidden elements
- looks safe, but isn't
- a secure service that connects remotely to another network
- training to protect sensitive information from cyber-attacks.
- they illegally exploit network vulnerabilities to gain unauthorized access
- blocks unauthorized access to or from a computer network
- steals sensitive information or gains access
- fake email that fools users into providing information
- scrambles data to prevent unauthorized access
- locks users out of their computer for a ransom
20 Clues: looks safe, but isn't • a network of compromised computers • creates and stores strong passwords • floods a website or server with traffic • exploits a new vulnerability in software • software that combats malware infections • codes that protect data during encryption • steals sensitive information or gains access • tricks users into clicking on hidden elements • ...
Madness Project Nexus 2023-12-18
Across
- Place, two soda cans
- clawing at their heads
- ominous metal mask
- cross-faced
- summoned by him
- the leader of the cult
- extractor
- pure of chaos
- englishmen
- Quo, enmesh the mandatus
- militant faction
- a faction leader
- lives on the outskirts
- volleyball tryouts
- the masked host
- residential sector
- directed outwards
- head of security
- weapons expert
- originally began as a meme
- a vehicle operator
- machines
- slightly armored
Down
- superfans
- any variation in this
- hodge-podges
- cogwrecked
- hiveminded
- vices and virtues
- to understand
- two thousand years
- complexities
- militant industry
- irradiation
- a cloning program
- devisive
- headphones
- robombers
- yellow blood
- check in
- generation 5
- extremely buoyant
- Zed, in the sewers
- a complete nerd
- the p is silent
45 Clues: devisive • check in • machines • superfans • extractor • robombers • cogwrecked • hiveminded • englishmen • headphones • cross-faced • irradiation • hodge-podges • complexities • yellow blood • generation 5 • to understand • pure of chaos • weapons expert • summoned by him • the masked host • a complete nerd • the p is silent • militant faction • a faction leader • head of security • slightly armored • vices and virtues • ...
G8 Network with a Purpose 2025-02-19
Across
- secretly collects user data without permission.
- A security measure that isolates infected files or systems to prevent malware from spreading.
- directs data to the correct destination.
- displays unwanted advertisements
- replicates itself to spread
- A private network
- A private network that allows external users
- fingerprints or facial recognition
- coded format
- provides data
- A set of rules
- two network to a single network.
Down
- Malicious software designed to harm
- Online communication between multiple users
- A wireless technology in short distances.
- verifying your identity
- connected to share resources and data.
- A live, online seminar
- converting encrypted data
- A networking device that connects multiple devices
- unauthorized access
- disguised as legitimate software
- protect against cyber threats.
- attaches itself to a file or program
- A global network
- wireless connection
- from telephone lines or fiber optics.
- Server A server that manages printing tasks
28 Clues: coded format • provides data • A set of rules • A global network • A private network • unauthorized access • wireless connection • A live, online seminar • verifying your identity • converting encrypted data • replicates itself to spread • protect against cyber threats. • displays unwanted advertisements • disguised as legitimate software • two network to a single network. • ...
RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5) 2025-03-17
Across
- Scam that tricks people into revealing sensitive information via email by impersonating a trusted entity.
- SMS phishing scam
- Security incidents where unauthorized access exposes sensitive data
- Malicious program that replicates and spreads, infecting systems to cause harm.
- An attack that overloads a system or network to disrupt its normal functioning
- Deliberate deception for financial or personal gain.
- Converting data into a secure, unreadable format to protect it from unauthorized access.
- Unauthorized system access
- Block untrusted communication
- Verifying identity credentials
Down
- Fake websites that act as a legit business and ask for personal information
- Unique biological individuals identification
- Voice-based phishing that tricks people into revealing sensitive information over phone calls
- Granting access permissions
- False defamatory statement
- Set of rules or guidelines that govern decisions and actions
- Cyber weapon virus
- Restricts Computer use without authorization
- Use of hacking to promote political or social causes
- Exposing unethical behavior
20 Clues: SMS phishing scam • Cyber weapon virus • False defamatory statement • Unauthorized system access • Granting access permissions • Exposing unethical behavior • Block untrusted communication • Verifying identity credentials • Unique biological individuals identification • Restricts Computer use without authorization • Deliberate deception for financial or personal gain. • ...
Cyber Tricks and Treats 2025-08-28
Across
- What you use to login in, but should be unique and complex for each account
- The cyber equivalent of a stake through the heart, used to remove viruses
- A virtual private network, protecting your data while you surf the web
- A digital skeleton key that can unlock your secure account
- A wireless connection standard, like a witch's cauldron of swirling energy
- A malevolent program disguised as a harmless application, like a wooden horse
- A "ghost network" created by hackers to trick you into connecting to it
- A sweet treat that hackers can use to track your online activities
- The "I" in the CIA triad, protecting your data from unauthorized modifications
Down
- Like a ghost in your machine, it is a type of malicious software that hides in plain sight
- What you should always do with your software to protect it from new cyber ghouls
- The most frightening kind of malware that holds your computer hostage for a ransom
- When you're tricked into revealing sensitive information over the phone
- A web address, but you should hover over a suspicious one before you "treat" it with a click
- A security measure that stands guard like a sentry against unauthorized access
- The "treat" that protects your data from prying eyes
- A malicious program that replicates itself, like a zombie spreading a virus
- A sneaky attack that pretends to be a legitimate source to steal your information
18 Clues: The "treat" that protects your data from prying eyes • A digital skeleton key that can unlock your secure account • A sweet treat that hackers can use to track your online activities • A virtual private network, protecting your data while you surf the web • When you're tricked into revealing sensitive information over the phone • ...
Digital literacy 2024-05-01
Across
- Is the transfer of data from one digital devices to another
- Privilegedaccessmanagement
- Is about expressing ourselves artistically online
- To add security features within the computer apps or software to prevent it from cyber attack
- Allows sharing ideas and information, including text and visual, through virtual network and communities
- Having the knowledge and skills you need to participate in making change in your community
- a sever site,or method that delivers media to an audience
- Process of transferring files from a user computers to the webserver
- A person who commits fraud or participate in a dishonest scheme
- A secret word or expression used by authorized person to prove their right to access information, etc.
- The process of transferring files from a computer
- The hardware and software use to create, store, transmit, manipulate and display information and data.
- acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
- A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
- Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
- individual ability to find evaluate,and communicate information using typing or digital media platform
- Safeguards information from loss through backup and recovery
- The right to control how your information is view and used
- Operating system
- Constructivedigitalliteracy
Down
- Global network of billions of computers and other electronic devices
- security Process that prevents sensitive information from getting into the wrong hands
- Vertualprivatenetwork
- address. Address is a string of numbers separated by periods
- Malware
- A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
- Civicdigitalliteracy
- Unauthorizedaccess
- The use of technology to harass, threaten, embarrass, or target another person
- Emailspoofing
- Communicationdigitalliteracy
- The ability to find, evaluate, use, share and create content using digital devices
- form of media that uses dectronic devices distribution
- appreciating and respecting different cultures online
- Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
- Impression made by the papilarry ridges on the ends of the fingers and thombs
- It is a process of transferring files from the users computers to the webserver (on the internet)
- Understanding where to go on the internet to find reliable and correct information
- Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
- are any illegitimate internet website used to deceive users into fraud or malicious attack s
- Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
- To aid the user doing specific task
- Popups
- Any activity designed to protect the ability and integrity of your network and data
- Is a way to conceal information by altering it so that it appears to be random data
- Collection of programs and data that tell computer running
- The trial of data you leave when using the internet
- Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
- Tells a machine which actions to perform and how to complete task
49 Clues: Popups • Malware • Emailspoofing • Operating system • Unauthorizedaccess • Civicdigitalliteracy • Vertualprivatenetwork • Privilegedaccessmanagement • Constructivedigitalliteracy • Communicationdigitalliteracy • To aid the user doing specific task • Is about expressing ourselves artistically online • The process of transferring files from a computer • ...
FitAVocab.hp 2013-05-15
Across
- Formal induction into office
- Internet Service Provider
- Stores all documents
- The main circuit board of the computer
- Light Emitting Diode
- Wireless Fidelity
- A laser operated disc drive
- Service Set Identifier
- National Cyber Security Alliance
- Pointing device that navigates the screen
- Who, When, Why
- Information security applied to computers and networks
- Programs used to direct the operation of a computer
- To insert something into a machine
- A program that lets your program be online
- Data transmission in which a single wire can carry several channels at one time
- Drive A high-capacity storage device containing a read-write mechanism plus hard drives main storage
- A computer program that manages access to a centralized resource of service in a network
- An oath someone takes before entering an office by election
- Is an interent server that holds photos,music, and videos
- EX: "Just Do It"
- A device that makes a transmission of data
- EX: Camera
Down
- EX: Keyboard
- Connection from telephone switching station
- A device for observing(screen)
- Computer networking, broadcasting, using radio signals instead of wires
- Type of port to connect a mouse or keyboard to a PC
- EX: Angry Birds
- How you behave online
- Search Gives you information from the top hits from the best search engines, not just one
- Mechanical equipment necessary for an activity
- The collection of software that directs a computers operation
- A mouse that uses a ball
- A portable wireless computing device that is small enough to be used while held in the hand
- A slot that allows you add more plug ins
- A port that allows you to hardwire on internet connection
- Virtual reality
- A mouse that uses a laser
- Being careful and responsible using the web
- Engine Program that allows you to search the internet
- Computer memory that holds data (Random Access Memory)
- A piece of written,printed, or electronic matter that provides information
- To give credit
- Liquid Crystal Display
- Processes information (Central Processing Unit)
46 Clues: EX: Camera • EX: Keyboard • Who, When, Why • To give credit • EX: Angry Birds • Virtual reality • EX: "Just Do It" • Wireless Fidelity • Stores all documents • Light Emitting Diode • How you behave online • Service Set Identifier • Liquid Crystal Display • A mouse that uses a ball • Internet Service Provider • A mouse that uses a laser • A laser operated disc drive • Formal induction into office • ...
Darcy Fenwick Cyber safety 2016-05-31
Across
- to send information from your own computer to another
- an electronic mail message sent from one computer
- a description of you in photos or words
- tag the nickname a user has chosen to be identified
- control specific features or software to manage
- a location online that allows multiple users
- security any technique of soft ware
- methods individual to track,lure or harass
- engine an Internet server that helps you search
- time when something is happening at that moment
Down
- Something that slows your computer down
- hostile ,strongly worded message
- an add that shows up randomly
- a program, or a set of instructions that on a computer
- a method of sending short messages
- a word or number that allows access
- the name for bookmarks
- any internet-realated illegal activity
- to copy a file from one computer system
- Pages the site that is the starting point
20 Clues: the name for bookmarks • an add that shows up randomly • hostile ,strongly worded message • a method of sending short messages • a word or number that allows access • security any technique of soft ware • any internet-realated illegal activity • Something that slows your computer down • to copy a file from one computer system • a description of you in photos or words • ...
KNOWLEDGE OF THE WORLD 2018-02-23
Across
- World’s fifth largest diamond discovered in
- Alphabet unveils new cyber security business called
- 2nd largest contributor to IBM’s 9,000 patents in 2017
- Richest city in the world.
- Richest Person on Earth
- Celebrates 31st state day
- Which of the state has first ever to opt out of Modicare?
- Host of ‘Baby Olympics’
- Bank of Baroda will no longer operate in this country.
- Launched ‘World’s Most Powerful Rocket’
Down
- First India-designed vaccine to pass WHO test
- Country to impose carbon tax from 2019
- State with highest gold medals in Khelo India Games.
- The Christian evangelist who preached to more than 200 million people in 185 countries but especially know for consuling United States presidents.
- 24K Magic
- Brand ambassador of Sikkim
- Ingvar Kamprad
- Which of the social media has approved to launch BHIM UPI?
- World’s 4th most punctual ‘mega carrier.’
- Launches its first food retail service in India
20 Clues: 24K Magic • Ingvar Kamprad • Richest Person on Earth • Host of ‘Baby Olympics’ • Celebrates 31st state day • Brand ambassador of Sikkim • Richest city in the world. • Country to impose carbon tax from 2019 • Launched ‘World’s Most Powerful Rocket’ • World’s 4th most punctual ‘mega carrier.’ • World’s fifth largest diamond discovered in • ...
Skye and Brendan OO 2025-10-02
Across
- Groom's go-to drink.
- Groom's first car. (5,2)
- Class Bride & Groom met in.
- Groom's degree (_____ Security)
- Name of the couple's youngest dog.
- Name of Groom's childhood dog.
- Name of the couple's oldest dog.
- Bride's college.
- Name of Groom's fraternity and Bride's place of work.
- Bride's favorite color.
- Sport Bride played in college.
- Street the couple lives on.
- High school Bride & Groom attended.
- The Bride & Groom's cat’s name.
- Name of Bride's childhood dog.
Down
- Groom's zodiac sign.
- Year Bride & Groom started dating.
- Sport Groom played in highschool.
- Bride's degree (_____ Engineering)
- Where Groom proposed. (8,4)
- The couple's favorite board game.
- Bride's first car. (5,5)
- Street bride grew up on.
- How many years they’ve been together.
- Bride & Groom's favorite artist. (3,9)
- Street groom grew up.
- Groom's college.
- Bride's go-to drink. (6,4)
- Bride's zodiac sign.
- Groom's favorite color.
30 Clues: Bride's college. • Groom's college. • Groom's zodiac sign. • Groom's go-to drink. • Bride's zodiac sign. • Street groom grew up. • Bride's favorite color. • Groom's favorite color. • Groom's first car. (5,2) • Bride's first car. (5,5) • Street bride grew up on. • Bride's go-to drink. (6,4) • Where Groom proposed. (8,4) • Class Bride & Groom met in. • Street the couple lives on. • ...
EST News Issue 179 2022-04-11
Across
- the likelihood of a hazard causing harm
- health is extremely important
- full __ by 2050, is the aim of the Paris Agreement
Down
- The “__ and Cyber security” manual can be found in the DM library
- This can affect the global supply chain
- these practices improve safety standards onboard
- these email accounts can also be hacked
- Shipping will face high costs due to climate __
8 Clues: health is extremely important • the likelihood of a hazard causing harm • This can affect the global supply chain • these email accounts can also be hacked • Shipping will face high costs due to climate __ • these practices improve safety standards onboard • full __ by 2050, is the aim of the Paris Agreement • ...
IEEE CS 2025-12-09
Across
- Fundamental structure of a computer system's components.
- Integrated circuit that contains the core of a computer.
- Programs and applications that run on a computer.
- Formal documents defining hardware and protocol rules.
- Computation type where multiple processes run simultaneously.
- Pioneer recognized as the father of computer science.
Down
- Prefix describing the security field protecting networks.
- Iterative and incremental approach to development.
- A fundamental unit of work in a database system.
- Peer-reviewed academic publication of the society.
- Step-by-step procedure for solving a problem.
- Online platform where data and services are stored and accessed via the internet.
12 Clues: Step-by-step procedure for solving a problem. • A fundamental unit of work in a database system. • Programs and applications that run on a computer. • Iterative and incremental approach to development. • Peer-reviewed academic publication of the society. • Pioneer recognized as the father of computer science. • Formal documents defining hardware and protocol rules. • ...
The last Book in the Universe 2022-02-16
Across
- What does lanaya give to Spaz
- The leader of the bully bangers
- The man ryter was supposed to rob
- who is the new latch boss of the monkey boys
- who took ryters book
- what is a Tactical Urban Vehicle; an armored cyber-driven van
- Where do Ryter and Litt face live
- what do they call old people
- A person who is addicted to probing
- what is one of Billy's rules
Down
- What is one of Gorms rules
- Who is dragging the stick and joins them in the pipe
- the previous boss of the monkey boys
- the proov that passes out edibles
- what did Lotti forbid
- what is a security guard
- Where the bully banger live
- who is the boss of the Vandals
- what does Lotti have under her fingernails
- what is the setting
20 Clues: what is the setting • who took ryters book • what did Lotti forbid • what is a security guard • What is one of Gorms rules • Where the bully banger live • what do they call old people • what is one of Billy's rules • What does lanaya give to Spaz • who is the boss of the Vandals • The leader of the bully bangers • The man ryter was supposed to rob • the proov that passes out edibles • ...
CTF-CW9 2025-11-14
Across
- How long the burglar napped on your couch
- When private information escapes through a security hole
- Security’s holy trinity
- Cyber-spying with nothing but your browser
- The wolf that really is at the door
- “Call in the boss! This is above my pay grade!”
- The mess you started with
- The “seatbelt” for your sensitive files
- The report card for tech companies
- Who’s a good watchdog for Tekion? This one!
- Approach to artificial intelligence that seeks to prevent negative consequences
- Fancy word for “the cool stuff we own”
Down
- The matrix for your servers
- Privacy settings are strict unless the user loosens them
- Obfuscation method that answers queries with a bit of added uncertainty
- Where every hacker at Tekion learns to play defense.
- Rulebook for your info
- Tekion’s own “fraud detector”—spotting fake sites before they fool anyone!
- IKEA instructions for crisis moments
- Your data’s magic decoder ring
20 Clues: Rulebook for your info • Security’s holy trinity • The mess you started with • The matrix for your servers • Your data’s magic decoder ring • The report card for tech companies • The wolf that really is at the door • IKEA instructions for crisis moments • Fancy word for “the cool stuff we own” • The “seatbelt” for your sensitive files • How long the burglar napped on your couch • ...
cyber security class 7-8 2025-07-07
Across
- A person who tries to break into computers or networks
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- Small data stored by websites to remember what you did
- A program that helps protect your computer from harmful software
- A program or device that guards your network from threats
Down
- Something you install to fix or improve software
- Any software made to harm your computer or data
- A harmful program that spreads and damages your files
- A test websites use to check if you’re a human
- A small window that appears on your screen, sometimes as part of a scam
- A harmful file that tricks you by looking like something safe
- A tool that helps block unwanted content or messages
- A scam where someone pretends to be trustworthy to steal your info
- A tool that blocks unwanted connections to your computer or network
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
