cyber security Crossword Puzzles
Digital Citizenship and Cyber Hygiene Vocabulary 2022-09-20
Across
- How companies use your data
- Identity theft, stealing money, stealing private information, controlling private computers.
- A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
- Protection of computer systems, networks, and data from digital attacks.
- The information about a particular person that exists on the Internet as a result of their online activity.
- A computer security specialist who breaks into protected systems and networks to test and assess their security
- The use of electronic communication to bully a person
- Legal document outlining how a company can collect and use your data
10 Clues: How companies use your data • The use of electronic communication to bully a person • Legal document outlining how a company can collect and use your data • Protection of computer systems, networks, and data from digital attacks. • Identity theft, stealing money, stealing private information, controlling private computers. • ...
Cyber Crossword 2019-06-25
Across
- Malware that attempts to extort money by locking files
- A weakness that may be exploited by a threat actor
- Software that protects your device from malware
- Cyber security regulation that applies to operators of essential services
- Incident where information or systems are accessed in an unauthorised way
Down
- EU data protection law enforced May 2018
- Something likely to cause damage or disruption
- Process of granting or denying access requests
- Email scam targeted towards a specific individual
- Assurance that information is trustworthy
- Something of value
11 Clues: Something of value • EU data protection law enforced May 2018 • Assurance that information is trustworthy • Something likely to cause damage or disruption • Process of granting or denying access requests • Software that protects your device from malware • Email scam targeted towards a specific individual • A weakness that may be exploited by a threat actor • ...
CYBER AND DIGITAL LITERALLY 2024-04-30
Across
- Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
- Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
- Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
- Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
- The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
- Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
- Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
- The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
- The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
- The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
- Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
- Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
- Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
- Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
- A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
- The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
- The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
- The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
- Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
- Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
- Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
- Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
- Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
- Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
- Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
- The global network of interconnected computers that allows for the exchange of data and communication.
- Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
- Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
- Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
- The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
- The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
- Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
- Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
- Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
- Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
- The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
- The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
- Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
- Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
- Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
- Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
- Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
- The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
- Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
- Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
- Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
- Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.
50 Clues: The global network of interconnected computers that allows for the exchange of data and communication. • Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks. • Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet. • ...
INF KELAS 8 DAMPAK SOSIAL 2025-05-21
Across
- sikap yang diperlukan dalam menyikapi setiap informasi di media sosial
- perangkat IoT untuk menertibkan pengendara bermotor
- menyebarkan keburukan orang untuk merusak reputasi
- perangkat IoT di rumah tangga terhubung ke CCTV, AC, dan TV
- dampak fisik dari korban cyber bullying
- pesan berisi ujaran kemarahan
- Perangkat yang terhubung ke internet dan bisa dikendalikan jarak jauh
Down
- menyebarkan data rahasia milik orang lain
- informasi yang masuk akal
- undang-undang yang mengatur tentang cyber bullying
- unsur IoT yang mengumpulkan data dari lingkungan sekitar
- salah satu dampak psikologis korban cyber bullying
- tindakan yang dilakukan jika menjumpai cyber bullying
- berita palsu yang disebarkan di internet
- unsur IoT yang menghubungkan sensor ke pengolah data
15 Clues: informasi yang masuk akal • pesan berisi ujaran kemarahan • dampak fisik dari korban cyber bullying • berita palsu yang disebarkan di internet • menyebarkan data rahasia milik orang lain • undang-undang yang mengatur tentang cyber bullying • salah satu dampak psikologis korban cyber bullying • menyebarkan keburukan orang untuk merusak reputasi • ...
RIMA week puzzle 2023-08-09
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
Cyber law 2021-08-31
Across
- one of the general problems of new media
- fake identity
- school of thought supporting no regulation of cyber space.
- man made resource in cyber space
- traces back to who is accessing the website
Down
- another name for cyber paternalism
- stakeholder of cyber space
- digitalization of the Indian Economy
- proponent of cyber paternalism
- constructing various contraints within the cyber space
10 Clues: fake identity • stakeholder of cyber space • proponent of cyber paternalism • man made resource in cyber space • another name for cyber paternalism • digitalization of the Indian Economy • one of the general problems of new media • traces back to who is accessing the website • constructing various contraints within the cyber space • ...
DIYA CYBER SAFETY CROSSWORD 2016-05-25
Across
- A bad thing on the computer
- security - Its help to stop online crimes
- - They help you to get virus off
- - A website you text on
- app- A website you can send messages and chat on
- - You can't share it with anyone
- - Part of your computer saves all your datas
- - A device you watch on
- - Website which give you information
Down
- A popular web site
- - They help on the internet
- - They hlep you on the computer
- - A device which knows everything
- - Instructios to set your computer
- - A device you can chat on
- - something that loads things quickly
- - A website you can send pictures on
- - They can be rude to you on the internet
- -A website which you can chat on
- -They pop up on your screen
20 Clues: A popular web site • - A website you text on • - A device you watch on • - A device you can chat on • - They help on the internet • -They pop up on your screen • A bad thing on the computer • - They hlep you on the computer • - They help you to get virus off • - You can't share it with anyone • - A device which knows everything • -A website which you can chat on • ...
Cyber 2023-03-17
Across
- Attack that attempts to put a machine into request overload to the point of making it impossible to deliver the requested services
- Probability x Impact
- It helps validate identity for access to an application or data via something you know, have or are
- Who oversees the compliance
- First step in the risk management process
- Fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
- Kind of data, like a fingerprint
- It helps control and manage access to applications, data and networks by internal staff and external individuals and organisations
- Guarantee that the information receiver can confirm the identity of the sender
- Ensure that the origin of data can be deduced with certainty
- Proactively monitors the network and endpoints for threats, and includes analytics and event correlation capabilities to improve response speeds
- Gateway device that monitors and controls incoming and outgoing network traffic
- Type of software that is specifically designed to cause harm to a computer system, network, or device
- Attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter
- The consent for email marketing should be…
Down
- European regulation on the processing of personal data
- It should be following a data breach
- Type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability
- It helps you identify and minimise the data protection risks of a project
- A phase of Cyber Kill Chain Attack
- It allows an attacker to coerce the application to send a crafted request to an unexpected destination
- Legal document provided to users about individual rights about data processing
- It usually allows to process data
- Technique for identifying the password through the use of all possible combinations of characters
- It helps ensuring the efficiency and effectiveness of business processes by ensuring the well-being of the company
- Data is unable to be referred to an individual
- It is achieved when data are not changed improperly
- It delivers faster response times, with streamlined and automated incident response workflows
- Person who acts for ideology purposes
- Any person other than the Data Subject, Data Controller or Data Processor
- It specifies the requirements for establishing, carrying out, maintain and continuously improve a management system for information security
- Hardware and software responsible of monitoring and/or control of physical devices, processes and events in the enterprise
32 Clues: Probability x Impact • Who oversees the compliance • Kind of data, like a fingerprint • It usually allows to process data • A phase of Cyber Kill Chain Attack • It should be following a data breach • Person who acts for ideology purposes • First step in the risk management process • The consent for email marketing should be… • Data is unable to be referred to an individual • ...
Bullying 2016-06-08
Across
- Based on the 2010-2011 school Crime Supplement, what % of students in grades 6-121 experience cyber bullying?
- Kids who are cyber bullied are more likely to have these (2 words, no spaces)
- True or False - It is easy to delete inappropriate or harassing messages, texts and pictures after they've been sent/posted
- A 2013 study finds what percentage of high school students were bullied in 2014?
- that takes place using electronic technology
- If you are bullied or see someone else being bullied with whom should you speak?
- Kids who are cyber bullied are more likely to receive (2 words, no spaces)
- If you see someone being bullied, one of the tactics to say "stop" is to use this
Down
- Posting these are a form of cyber bullying (2 words, no spaces)
- Kids who are cyber bullied are more likely to use this
- Many cyber bullying messages and pictures are posted this way
- One of the best things you can do for a student being bullied is to be one of these
- Cyber bullying can happen how many hours a day?
13 Clues: that takes place using electronic technology • Cyber bullying can happen how many hours a day? • Kids who are cyber bullied are more likely to use this • Many cyber bullying messages and pictures are posted this way • Posting these are a form of cyber bullying (2 words, no spaces) • Kids who are cyber bullied are more likely to receive (2 words, no spaces) • ...
Total Defense Pillars 2021-08-16
6 Clues: network, cyber security • people living in harmony • safety and needs of country • confidence in nation's future • protect the country from external threats • government, business and industry supporting the economy
Cybersecurity Awareness Crossword 2024-10-17
Across
- A piece of data about your online history that creates a trail of crumbs
- A file or program that appears legitimate but is actually malicious
- Manipulating individuals to divulge confidential information
- An authentication method of verifying a user’s identity using two or more different methods
- A network security system that monitors and controls incoming and outgoing network traffic
- Software that secretly monitors and collects information from a computer
- A method of securing data by converting it into a code
- When bad actors create a fake identity to send phishing emails
Down
- A decoy system set up to attract and analyze cyber attackers
- Protects your computer from viruses
- Unauthorized access by following someone into a secure area
- A type of malware that demands payment to restore access to data
- A software update that fixes security vulnerabilities
- A secret word or phrase used to access a computer system
- Unauthorized access to data in a system
- A method of securing data by converting it into a code
- Software designed to harm or exploit any programmable device
- A scam where a person is tricked into giving personal information
18 Clues: Protects your computer from viruses • Unauthorized access to data in a system • A software update that fixes security vulnerabilities • A method of securing data by converting it into a code • A method of securing data by converting it into a code • A secret word or phrase used to access a computer system • Unauthorized access by following someone into a secure area • ...
Cyber Security Crossword 2024-09-05
8 Clues: Network security system • Secret authentication key • Software to prevent malware • App for generating MFA codes • Secures data by scrambling it • A common email scam technique • Popular video conferencing platform • Authentication method using fingerprints or facial recognition
cyber law cia 1 component 1 2021-09-05
Across
- "A declaration of independence of cyberspace" was written by whom?
- Which act in singapore limitd the liability of network service providers for accessed content?
- "code and other laws of cyberspace" was written by whom?
- Singapore actively supports global efforts in eradicating cyber crime by participating in schemes such as the _________ arrangement that promotes the fight against terrorism.
- who was the creator and driving force of napster?
Down
- Harassment in the form of cyber stalking and cyber bullying was prosecuted in singapore under which act?
- ____________________ refers to “the action or process of digitizing; the conversion of analogue data (esp. in later use images, video, and text) into digital form.”
- The flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- the lawsuit in the plaintiff is a computer scientist who wrote an encryption program which he wanted to share with his students and colleagues and post on his website. This lawsuit seeks to protect and even extend societal free speech values.
- Which is the governmental organisation responsible for singapore's infocom development and security?
10 Clues: who was the creator and driving force of napster? • "code and other laws of cyberspace" was written by whom? • "A declaration of independence of cyberspace" was written by whom? • Which act in singapore limitd the liability of network service providers for accessed content? • ...
gdgc crossword 2025-01-14
Across
- A prefix related to technology, especially the internet and security
- A step-by-step procedure for solving a problem or performing a task
- A system of numerical notation using only 0s and 1s
- Machines Simulated environments that run operating systems and applications
- The part of a website or app that users directly interact with
- The physical components of a computer, like the CPU or motherboard
- A program that converts code from a high-level language to machine language
Down
- A group of interconnected computers or devices for sharing resources
- A scripting language used to add interactivity to websites
- A security system that monitors and controls incoming and outgoing network traffic
- A reusable block of code designed to perform a specific task in programming
- Technology that mimics human intelligence, including learning and decision-making
- Remote servers used for storing, processing, and accessing data over the internet
- A structured platform for building applications, like React or Angular
- The server-side of a web application, handling logic, databases, and APIs
15 Clues: A system of numerical notation using only 0s and 1s • A scripting language used to add interactivity to websites • The part of a website or app that users directly interact with • The physical components of a computer, like the CPU or motherboard • A step-by-step procedure for solving a problem or performing a task • ...
Cyber Law CIA 1 2021-09-03
Across
- school of thought supporting no regulation of cyber space.
- another name for cyber paternalism
- a false or fictitious name
- a declaration of the independence of the cyber space
- one of the general problems of new media
Down
- man made resource of cyber space
- digitalization of the Indian economy
- stakeholder of cyber space
- traces back to who is accessing the website
- constructing various contraints within the cyber
10 Clues: stakeholder of cyber space • a false or fictitious name • man made resource of cyber space • another name for cyber paternalism • digitalization of the Indian economy • one of the general problems of new media • traces back to who is accessing the website • constructing various contraints within the cyber • a declaration of the independence of the cyber space • ...
October 2022 Newsletter 2022-10-31
Across
- Abbreviation for Division holding an Information Session on November 2
- Number of CIO Portfolio projects opened in October
- Division now located in Michie North
- Number of New Hires
Down
- Guest for Cyber Security Month
- Slides from this meeting are now available on the intranet
- Number of Job Postings
- Opportunity to support nonprofit and charitable organizations
8 Clues: Number of New Hires • Number of Job Postings • Guest for Cyber Security Month • Division now located in Michie North • Number of CIO Portfolio projects opened in October • Slides from this meeting are now available on the intranet • Opportunity to support nonprofit and charitable organizations • Abbreviation for Division holding an Information Session on November 2
CS Month Week 1 2023-09-14
Across
- A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.
8 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data. • ...
Steve Jobs 2018-06-05
Across
- having great excitement and/or interest.
- old vs [fill in the blank].
- protection from threat or danger.
- portable computer.
- the result of humankind's advancement in science and engineering.
Down
- physical and "permanent" components of any electronic device
- speed up the movement of something.
- each segment of world population who were, regarded collectively, born in the same period of time.
- associated with computer network or the internet.
- workers who are in the workforce.
10 Clues: portable computer. • old vs [fill in the blank]. • workers who are in the workforce. • protection from threat or danger. • speed up the movement of something. • having great excitement and/or interest. • associated with computer network or the internet. • physical and "permanent" components of any electronic device • ...
Browsing Safely 2025-06-17
Across
- Security : collection of technologies, process and practices
- vital information under seize
- theft: the act of stealing and misusing someone's personal information
- illegal entry into a computer system
- one time password
- Terrorism: it is used to conduct terrorism through the use of computers
Down
- it is a software that helps in preventing unauthorized access
- it is an act of harming or harassing
- It is the act of sending an email to a user
- Frauds: illegal methods to get money
- program designed to protect computers from malicious software
- criminal activity intended to harm anyone
12 Clues: one time password • vital information under seize • it is an act of harming or harassing • Frauds: illegal methods to get money • illegal entry into a computer system • criminal activity intended to harm anyone • It is the act of sending an email to a user • Security : collection of technologies, process and practices • ...
Christmas 2023 2022-12-25
Across
- Where I wandered around downtown the Friday before Halloween.
- Fighter pilot who claims to have seen UFOs.
- Conspiracy book left at a bar.
- Necessary thing to get a job as a software engineer.
- Thing on the ground in the hallway of the hotel from the Airbnb.
- New UFO acronym.
Down
- Country where sociologist friend is from.
- Rain’s voice assistant for mechanics.
- Aerospace technical society.
- Collection of scrolls read by cyber security engineer at philosophy group.
- Founder of the Fish Welfare Initiative.
11 Clues: New UFO acronym. • Aerospace technical society. • Conspiracy book left at a bar. • Rain’s voice assistant for mechanics. • Founder of the Fish Welfare Initiative. • Country where sociologist friend is from. • Fighter pilot who claims to have seen UFOs. • Necessary thing to get a job as a software engineer. • Where I wandered around downtown the Friday before Halloween. • ...
cyber security Games 2023-09-29
Across
- A fraudulent email or message that appears to be from a legitimate source.
- A type of malicious software that encrypts files and demands a ransom for decryption.
- A strong, complex, and unique string of characters used to protect accounts.
- The act of protecting information from unauthorized access.
- A device or software used to protect against malware and other cyber threats.
Down
- A method of authenticating users based on their physical or behavioral traits.
- A program designed to detect and remove malicious software.
- A technique used to trick individuals into revealing sensitive information.
8 Clues: A program designed to detect and remove malicious software. • The act of protecting information from unauthorized access. • A fraudulent email or message that appears to be from a legitimate source. • A technique used to trick individuals into revealing sensitive information. • A strong, complex, and unique string of characters used to protect accounts. • ...
"Revolutionizing HSSE: The Role of AI & Digitalization at Work" 2025-04-27
Across
- Logs Digital records for workplace safety analysis
- Digital training exercises using VR/AR for HSSE learning
- Technology detecting and preventing cyber threats
- Sensors System monitoring marine environmental conditions
- Simulator A training tool used for simulating marine navigation
- AI-driven robotic tools used in hazardous environments
- Enhances security with facial and object recognition
Down
- The process of automating HSSE reporting
- Compactor A device that uses solar energy to compress waste
- A system digitally tracking environmental compliance
- Wearable technology improving worker safety
- Checks AI-driven inspections replacing manual quality control
12 Clues: The process of automating HSSE reporting • Wearable technology improving worker safety • Technology detecting and preventing cyber threats • Logs Digital records for workplace safety analysis • A system digitally tracking environmental compliance • Enhances security with facial and object recognition • AI-driven robotic tools used in hazardous environments • ...
Cybersecurity Brainteaser 2025-01-02
Across
- A service that encrypts your internet traffic and protects your online identity
- A secret word or phrase used to gain entry or authenticate identity
- The ability or permission to enter, view, or use a system or resource
- An additional security process requiring more than one form of verification
- What you should do when you receive a suspicious email
Down
- A network security system that monitors and controls incoming and outgoing traffic
- Information meant to be kept private and not shared without permission
- The most common cyber attack
- What you should do with your computer when you step away
- Software designed to disrupt, damage, or gain unauthorised access to a computer system
10 Clues: The most common cyber attack • What you should do when you receive a suspicious email • What you should do with your computer when you step away • A secret word or phrase used to gain entry or authenticate identity • The ability or permission to enter, view, or use a system or resource • Information meant to be kept private and not shared without permission • ...
Cyber Ethics 2025-05-24
Across
- Bullying the digital technology social media, messaging apps.
- illegal intrusion.
- A security system that prevents unauthorised people.
- The process of transforming data into unreadable code.
- bombing spam attackers keep sending bulk mails.
Down
- criminal activities.
- Piracy when software is copied and distributed illegally.
- act of using the language and thoughts of another person as one's original work.
- The process of transferring the encrypted file over the network.
9 Clues: illegal intrusion. • criminal activities. • A security system that prevents unauthorised people. • bombing spam attackers keep sending bulk mails. • The process of transforming data into unreadable code. • Piracy when software is copied and distributed illegally. • Bullying the digital technology social media, messaging apps. • ...
All About EXIM! 2022-09-14
Across
- Must be carried for every client that uses our services.
- Our valued clients needs this the most.
- Security gives you peace of mind.
- A method of Cyber Attack
- Save the date, and don't be late!
- We couldn't do what we do best without them.
Down
- I was once the head of this great institution.
- In order for a business to gain profit, you need this.
- The quickest of them all.
- This is an important part of the loan approval process.
- One of our key sectors in development
- Sometimes we just have to start again.
- The day has just begun.
13 Clues: The day has just begun. • A method of Cyber Attack • The quickest of them all. • Security gives you peace of mind. • Save the date, and don't be late! • One of our key sectors in development • Sometimes we just have to start again. • Our valued clients needs this the most. • We couldn't do what we do best without them. • I was once the head of this great institution. • ...
Crossword Puzzle Game 1 2022-10-06
Across
- , To whom you will report the suspicious email you have received in PDAX email?
- , It is an extra layer of security that requires to enable for PDAX employee
- , Security is everyone's ___________
- ,This is a type of cyber attacks where criminals sends an email asking you to click on link or ask for your personal information
Down
- , It is intrusive software developed by cybercriminals who typically use it to steal or extract data that they can leverage over victims for financial gain.
- , SAfEPDAX mean Security _____________ for Everyone in PDAX
- , You are sending company's important file via email. What do you think you should do to protect your data in the file from security breaches?
- , It is a type of phishing that instead of email they attack through sending an SMS
- , You should change this frequently whenever you suspect that it could have been compromise and whenever PDAX policy requires it.
- , What should you do If you click or download a malicious attachment or fall victim to ransomware attacks?
10 Clues: , Security is everyone's ___________ • , SAfEPDAX mean Security _____________ for Everyone in PDAX • , It is an extra layer of security that requires to enable for PDAX employee • , To whom you will report the suspicious email you have received in PDAX email? • , It is a type of phishing that instead of email they attack through sending an SMS • ...
Cyber 2019-02-11
Across
- Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
- Any unsolicited e-mail, or junk mail
- A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
- A hostile, strongly worded message that may contain obscene language
- Any Internet-related illegal activity
- Methods individuals use to track, lure, or harass another person online
- In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- A diary or personal journal kept on a website
- To send information from your computer to another computer
- Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- A tracking feature of Internet browsers that shows all the recent websites visited
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- The name a user selects to be identified on a computer, on a network, or in an online gaming forum
Down
- To upload information to the Web
- A program, or set of instructions, that runs on a computer
- A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- To copy a file from one computer system to another via the Internet
- A location online that allows multiple users to communicate electronically with each other in real time
- A form of malicious code that displays unsolicited advertising on your computer
- “Live” time; the actual time during which something takes place
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- Willful and repeated harm inflicted through the medium of electronic text
- Refers to virtual sexual encounters between two or more persons
- Rules or manners for interacting courteously with others online
- A piece of information about your visit to a website that some websites record automatically on your computer
- Software that attempts to block malicious programs from harming your computer
- A secret word or number that must be used to gain access to an online service
- A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
30 Clues: To upload information to the Web • Any unsolicited e-mail, or junk mail • Any Internet-related illegal activity • A diary or personal journal kept on a website • A program, or set of instructions, that runs on a computer • To send information from your computer to another computer • “Live” time; the actual time during which something takes place • ...
Cyber 2025-11-05
Across
- Related to computers and online adventures
- A place to store things online so you can get them anywhere
- Something you do before sleeping to know what happened in a story
- A small problem or glitch that’s annoying but sometimes funny
- Imagine a party with a billion people
- To make someone part of a game or activity
- Your online picture and info about yourself
- Too much candy can be this
- When your backpack falls over suddenly
- When someone sneaks a joke on you and you fall for it
- Something that happens when you spill juice on your laptop
- over When a new game, app, or person grabs all your attention
Down
- a link Pressing a button online to see what happens
- To type your info in a website or form
- A group or club that does fun or serious things
- Something that happens very fast or without warning
- You want to remove a silly text from your phone
- When you make your friend laugh uncontrollably
- A nasty bug that makes you sneeze or cough
- A place where you keep funny photos or school projects
- When you ask someone nicely for help or a favor
- Something that can hurt your feelings or your friendship
- Trying something weird, like juggling bananas
23 Clues: Too much candy can be this • Imagine a party with a billion people • To type your info in a website or form • When your backpack falls over suddenly • Related to computers and online adventures • To make someone part of a game or activity • A nasty bug that makes you sneeze or cough • Your online picture and info about yourself • ...
The Eye of Minds Crossword 2022-06-01
Across
- The ___ of Minds
- the _________ Doctrine
- last of the author
- device used to make a digital screen appear in front of you
- the main skill of most of the characters use
- the name of the virtual world
- Kaine isn't human, he is a _______
- The War of ________
- Michael's nanny
Down
- Michael's other best friend
- VNS stands for Virtnet ________
- The place that everyone is trying to reach, lifeblood _____
- name of the box used to enter the digital world
- the point of "Devils of Destruction"
- The main villain of the story
- One of Michael's best friends
- Who Michael misses the most, despite not remembering them
- Kaine is considered a "_____ terrorist"
- what keeps you alive if you die in the Virtnet
- what the three main characters use to locate Kaine
20 Clues: Michael's nanny • The ___ of Minds • last of the author • The War of ________ • the _________ Doctrine • Michael's other best friend • The main villain of the story • One of Michael's best friends • the name of the virtual world • VNS stands for Virtnet ________ • Kaine isn't human, he is a _______ • the point of "Devils of Destruction" • Kaine is considered a "_____ terrorist" • ...
Tech 2025-08-24
Across
- → Word used with security to mean “online safety” 🔒
- → Open-source operating system 🐧
- → Popular programming language, also a kind of coffee ☕
- → A programming language named after a snake 🐍
- → World’s most used search engine 🔍
Down
- → Electric car company founded by Elon Musk 🚗⚡
- → Online storage like Google Drive ☁
- → iPhone and MacBook company 🍏
- → A machine that can act like humans 🤖
- → First name of Tesla and SpaceX founder 🚀
10 Clues: → iPhone and MacBook company 🍏 • → Open-source operating system 🐧 • → World’s most used search engine 🔍 • → Online storage like Google Drive ☁ • → A machine that can act like humans 🤖 • → First name of Tesla and SpaceX founder 🚀 • → Electric car company founded by Elon Musk 🚗⚡ • → A programming language named after a snake 🐍 • ...
Cyber Security Awareness Month 2025-09-08
Across
- process of converting readable data, or plaintext, into an unreadable, encoded format called ciphertext
- Someone who breaks into computer systems
- Form of digital mail
- Type of scam/cyber attack
- protects internal network from untrusted external traffic
Down
- A Person that logs into a computer
- Attack that encrypts files and demands payment
- Authentication method to enhance security
- Weakness in a system that can be exploited
- Digital lock that protects your account
10 Clues: Form of digital mail • Type of scam/cyber attack • A Person that logs into a computer • Digital lock that protects your account • Someone who breaks into computer systems • Authentication method to enhance security • Weakness in a system that can be exploited • Attack that encrypts files and demands payment • protects internal network from untrusted external traffic • ...
Kaylie and Eli Sip and Solve 2025-08-31
Across
- Engagement Location
- The mascot of the oposing team at the game when they starting dating
- Security Eli graduated in 2026 majoring in
- John Their first concert
- World Their first trip together
- Swift kaylie's favorite singer
- Their favorite energy drink
- First Date Location
- County Kaylie was Miss __ in 2023
- New Groove Kaylie's favorite movie
Down
- Bears Eli's favorite sports team
- Sigma Tau The name of Kaylie's sorority
- The college Kaylie graduated with her bachelor's degree
- Eli's favorite type of cookie
- Five Eli's football number in high school
- Kaylie's maiden name
- Kaylie's favorite color
- Roadhouse Their favorite restaurant
- Eli's favorite band
- Their high school mascot
- Christmas Story Eli's favorite christmas movie
- their total number of siblings
- Eli's middle name
- The name of Eli's childhood pet
- the month they started dating
25 Clues: Eli's middle name • Engagement Location • Eli's favorite band • First Date Location • Kaylie's maiden name • Kaylie's favorite color • John Their first concert • Their high school mascot • Their favorite energy drink • Eli's favorite type of cookie • the month they started dating • Swift kaylie's favorite singer • their total number of siblings • World Their first trip together • ...
Cyber Terms and Concepts Review 2016-11-08
Across
- Cyber capability considered an ISR activity
- "Deny" effect w/ intent to permanently and completely deny access to the target
- Any device, computer program, or technique designed to create an effect in or through cyberspace (2 words, no space)
- One of the 4 cyber capabilities, secures DoD networks (2 words, no space)
- Interconnected, end-to-end set of information capabilities for warfighters
- Mission type intended to project power by the application of force
- Principle that cyberspace is a global, ___-____ domain
- OCO effects are classified as denial or _______
Down
- "Deny" effect meant to completely but temporarily deny access to the target
- Employment of cyber capes to achieve objectives in or through cyberspace (2 words, no space)
- Global domain within the information environment
- Cyberspace can be described in terms of 3 layers: Physical, ____, Cyber-Persona
- Cyber capability considered a non-intelligence activity to support follow on military ops
- Cyberspace limitation, can be difficult to confirm _____ in cyberspace
- OCO effect that can include degrade, disrupt or destroy
- Mission type intended to preserve the ability to use friendly cyberspace
16 Clues: Cyber capability considered an ISR activity • OCO effects are classified as denial or _______ • Global domain within the information environment • Principle that cyberspace is a global, ___-____ domain • OCO effect that can include degrade, disrupt or destroy • Mission type intended to project power by the application of force • ...
Network 2025-05-29
Across
- A device that directs data between different networks.
- Computing Storing and accessing data online instead of on local devices.
- A small unit of data transmitted over a network.
- A wired networking technology for local area networks.
- Legal protection for creators of digital content.
- Address A unique identifier for a device on the internet.
- A security system that filters incoming and outgoing network traffic.
- Footprint The trail of data left behind when using the internet.
- System that translates domain names into IP addresses.
- A secure connection that hides your online activities.
Down
- The right to keep personal information safe online.
- should make for an engaging crossword! Want me to add more or refine the hints further?
- Authentication An extra layer of security requiring two forms of verification.
- Malicious software designed to harm a computer.
- The delay in data transmission over a network.
- Hacking Using hacking skills to protect systems legally.
- Harassing or intimidating someone over the internet.
- The maximum data transfer rate of a network.
- A cyber-attack where fraudsters trick people into revealing personal data. Hacking Gaining unauthorized access to a system. Encryption – The process of converting data into a secure format.
19 Clues: The maximum data transfer rate of a network. • The delay in data transmission over a network. • Malicious software designed to harm a computer. • A small unit of data transmitted over a network. • Legal protection for creators of digital content. • The right to keep personal information safe online. • Harassing or intimidating someone over the internet. • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
MMolloy_CIS-Word.pptx 2024-06-06
Across
- intentionally taking over the administrative position
- An observable occurrence in an information system or network.
- A program used for, and writing html and css documents
- Malicious program data which can damage software
- An unusual message from an unknown source, with malicious intent behind it.
- A kind of.. "Warden" that protects personal information, frequently found in websites with personal information.
- Unauthorized program code dedicated to carrying out a malicious commands, changes, etc.
- A value computed with a cryptographic process using a private key and then appended to a data object
- The activities that refer to the short and long term development of a cyber-incident
- The manner/method someone uses to infiltrate a secure system
Down
- refers to anything that could seriously affect a given system, infrastructure, or data center
- An ethical hacking method used to gather unfamiliar system data
- The result of unintentionally or accidentally deleting data
- a method used to infiltrate unauthorized systems in violation of security policy
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- A chain of text used to make calculations in Excel
- contains information, text, and can be used to write specific mathematical equasions
- A type of cyber-attack that is automized for this specific type of e-attack
- Things like firewalls, services, password prompts, etc.
19 Clues: Malicious program data which can damage software • A chain of text used to make calculations in Excel • intentionally taking over the administrative position • A program used for, and writing html and css documents • Things like firewalls, services, password prompts, etc. • The result of unintentionally or accidentally deleting data • ...
IT English 1 2025-09-14
Across
- to unexpectedly meet or be faced with something or someone
- a person who designs, writes, and tests software and applications
- a professional who protects an organization's computer systems and networks from cyber threats
- a secure, digital, and decentralized record of transactions
- the skill or knowledge that a person has in a particular area
- a security specialist who simulates cyber attacks to find vulnerabilities in computer systems
- teachable abilities or specific knowledge sets, like programming or accounting
- a person who prepares technical drawings and plans for machinery, buildings, or products
Down
- to start a project or task from the very beginning
- the point where a user and a computer system interact
- a person who publicly supports or recommends a particular cause, policy, or group
- a writer who creates the text that guides users through a product, like buttons and menu labels
- giving a lot of information clearly and in a few words
- a person who introduces new methods, ideas, or products
- someone who examines, cleans, and models data to find useful information and support decision-making
- a professional who installs, maintains, and repairs electrical equipment and systems
- an engineer who designs, constructs, and programs robots and robotic systems
- people skills, help you collaborate with people
- an engineer who helps integrate and launch new software or systems for customers
19 Clues: people skills, help you collaborate with people • to start a project or task from the very beginning • the point where a user and a computer system interact • giving a lot of information clearly and in a few words • a person who introduces new methods, ideas, or products • to unexpectedly meet or be faced with something or someone • ...
Security Education Week 2019 2019-02-20
Across
- a weakness in a system or internal controls that could be exploited by a threat source
- a fancy term for scamming people, ripping them off is social __________
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
- this is granted to an employee for access to classified information
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
Down
- this type of email can be reported using the add-in button on the Outlook toolbar
- provide advanced notice of this type of travel in advance to trade and security
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
Security Education Week 2019 2019-02-20
Across
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- a fancy term for scamming people, ripping them off is social __________
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- provide advanced notice of this type of travel in advance to trade and security
Down
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
- this is granted to an employee for access to classified information
- a weakness in a system or internal controls that could be exploited by a threat source
- this type of email can be reported using the add-in button on the Outlook toolbar
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
Security Education Week 2019 2019-02-20
Across
- this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
- a weakness in a system or internal controls that could be exploited by a threat source
- while in a DRS facility, a visitor must be ________ at all times unless approved by security
- this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
- a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
- this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
Down
- this is granted to an employee for access to classified information
- performing unrequired work outside of normal duty hours is an indicator of this (2 words)
- a fancy term for scamming people, ripping them off is social __________
- the level of facility security clearance at DRS Laurel Technologies Johnstown
- this type of email can be reported using the add-in button on the Outlook toolbar
- unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination
- provide advanced notice of this type of travel in advance to trade and security
13 Clues: this is granted to an employee for access to classified information • a fancy term for scamming people, ripping them off is social __________ • the level of facility security clearance at DRS Laurel Technologies Johnstown • provide advanced notice of this type of travel in advance to trade and security • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
Cyber Security Puzzle 2017-04-11
Across
- Our team name
- Don't Click these if you find them in an email
- Facebook,Instagram and Twitter are types of this account
- _____ million homes have had serious virus problem on at least one computer
Down
- A form of bullying or harassment using electronic means
- People you meet on the internet who you don't know personally
- A free browser add-on that blocks potentially harmful ads
- Software designed to prevent and remove malicious software
8 Clues: Our team name • Don't Click these if you find them in an email • A form of bullying or harassment using electronic means • Facebook,Instagram and Twitter are types of this account • A free browser add-on that blocks potentially harmful ads • Software designed to prevent and remove malicious software • People you meet on the internet who you don't know personally • ...
Cyber Security Tips 2023-07-21
8 Clues: _____ yourself • Caution in _____ • Use strong _____ • Enable 2 factors _____ • Secure your home _____ • Be mindful of public _____ • Regularly backup your _____ • Be cautious of _____ attempts
cyber security crossword 2023-11-24
Across
- unwanted software that monitors and gathers information on a person and how they use their computer.
- can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- spread through the network and use the system’s resources.
- a large collection of malware-infected devices (zombies).
Down
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- malicious form of self-replicating software.
- software that is designed to gain access to your computer with malicious intent.
- a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
8 Clues: malicious form of self-replicating software. • a large collection of malware-infected devices (zombies). • spread through the network and use the system’s resources. • software that is designed to gain access to your computer with malicious intent. • unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cyber Security Crossword 2024-03-18
Across
- a secure place for storing your passwords
- software used to carry out actions that humans would have done previously
- when someone installs software to record your typing, interactions etc
- numbers, symbols and letters used to access your accounts
Down
- a white hat or black hat who accesses data without always having permission
- internet access which might include personal or public
- an email, link or text that is used to hook you in to sharing your data
- malicious software
8 Clues: malicious software • a secure place for storing your passwords • internet access which might include personal or public • numbers, symbols and letters used to access your accounts • when someone installs software to record your typing, interactions etc • an email, link or text that is used to hook you in to sharing your data • ...
Cyber Security keywords 2024-06-07
Across
- When a person calls you with a made up story to get personal information
- Software that secretly tracks what you do
- When an unauthorised user gains access to your account
- Software that disguises itself as something legitimate
- Software that copies itself over and over when it infects your device
Down
- The way we protect our devices and data online is known as
- When you receive an email from an unknown person telling you a story and asking for personal information
- Software designed to cause harm to a computer and its files
8 Clues: Software that secretly tracks what you do • When an unauthorised user gains access to your account • Software that disguises itself as something legitimate • The way we protect our devices and data online is known as • Software designed to cause harm to a computer and its files • Software that copies itself over and over when it infects your device • ...
Cyber Security Terms 2024-09-24
Across
- A security system that requires more than one method of authentication to verify the user’s identity for a login or other transaction, also known as MFA or 2FA.
- Attackers send fraudulent emails or messages that appear to be from reputable sources to trick individuals into revealing personal information, such as passwords or credit card numbers.
- Similar to phishing, but conducted via SMS text messages. Attackers send messages that appear to be from legitimate sources to trick individuals into clicking on malicious links or providing personal information.
Down
- Generally longer than passwords, often consisting of multiple words, which makes them harder to crack.
- Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure.
- Attackers gain physical access to a secure area by following closely behind an authorized person. This often happens in office buildings where security measures like keycard access are in place.
- are synthetic media in which a person in an existing image or video is replaced with someone else’s likeness using artificial intelligence (AI).
- Attackers use phone calls to trick individuals into revealing personal information. They might pretend to be from a bank, tech support, or another trusted entity.
8 Clues: Generally longer than passwords, often consisting of multiple words, which makes them harder to crack. • Fixes from software developers to correct vulnerabilities in their software. They are essential for keeping systems and data secure. • ...
HIM 3350 Ch. 10 2025-03-20
Across
- A contract required between a covered entity and business associates to ensure data protection.
- The type of threat that includes phishing and ransomware
- A term for disguising data to protect it from unauthorized access
- The federal office responsible for enforcing HIPAA regulations since 2009
- The type of plan that ensures a healthcare entity can recover after a disaster
- A malicious program that replicates itself and spreads across a network
- The safeguard category that includes facility access controls and workstation security
Down
- A requirement of the HIPAA Security Rule that prevents alteration or destruction of data
- A technical safeguard that ensures only authorized users can access ePHI
- The federal act that introduced medical identity theft regulations in 1998
10 Clues: The type of threat that includes phishing and ransomware • A term for disguising data to protect it from unauthorized access • The federal office responsible for enforcing HIPAA regulations since 2009 • A malicious program that replicates itself and spreads across a network • A technical safeguard that ensures only authorized users can access ePHI • ...
IEEE CS Git Informed 2025-10-27
Across
- Computation type where multiple processes run simultaneously.
- Iterative and incremental approach to development.
- Pioneer recognized as the father of computer science.
- A fundamental unit of work in a database system.
- Integrated circuit that contains the core of a computer.
- Fundamental structure of a computer system's components.
Down
- Step-by-step procedure for solving a problem.
- Formal documents defining hardware and protocol rules.
- Prefix describing the security field protecting networks.
- The primary focus area of the Computer Society.
- Chip designed for a specific application only.
- Computing resources delivered over the internet.
- The academic field central to the IEEECS mission.
- Peer-reviewed academic publication of the society.
14 Clues: Step-by-step procedure for solving a problem. • Chip designed for a specific application only. • The primary focus area of the Computer Society. • A fundamental unit of work in a database system. • Computing resources delivered over the internet. • The academic field central to the IEEECS mission. • Iterative and incremental approach to development. • ...
Cyber Security Month Crossword Puzzle 2024-08-29
Across
- A type of malware that disguises itself as legitimate software (6 letters)
- Software designed to disrupt, damage, or gain unauthorized access (7 letters)
- To bring software up to date with the latest patches or fixes (6 letters)
- Software that secretly monitors user activity (7 letters)
- A security system that controls incoming and outgoing network traffic (7 letters)
- A fraudulent attempt to obtain sensitive information (8 letters)
- Software designed to detect and destroy viruses (9 letters)
Down
- Malware that encrypts files and demands payment for decryption (10 letters)
- Information used to verify a user's identity (11 letters)
- A copy of data stored separately to prevent loss (6 letters)
- Unauthorized access to data or systems (6 letters)
- A secret word or phrase used for authentication (8 letters)
- The process of converting information or data into a secure format (10 letters)
- A fraudulent attempt to obtain sensitive information (8 letters)
- Impersonating a legitimate source to gain unauthorized access (7 letters)
- An individual who uses technical skills to gain unauthorized access (6 letters)
- A tool used to secure and anonymize internet connections (3 letters)
17 Clues: Unauthorized access to data or systems (6 letters) • Information used to verify a user's identity (11 letters) • Software that secretly monitors user activity (7 letters) • A secret word or phrase used for authentication (8 letters) • Software designed to detect and destroy viruses (9 letters) • A copy of data stored separately to prevent loss (6 letters) • ...
Cyber Ethics 2025-05-24
Across
- Bullying the digital technology social media, messaging apps.
- act of using the language and thoughts of another person as one's original work.
- The process of transforming data into unreadable code.
- bombing spam attackers keep sending bulk mails.
Down
- The process of transferring the encrypted file over the network.
- A security system that prevents unauthorised people.
- criminal activities.
- illegal intrusion.
- Piracy when software is copied and distributed illegally.
9 Clues: illegal intrusion. • criminal activities. • A security system that prevents unauthorised people. • bombing spam attackers keep sending bulk mails. • The process of transforming data into unreadable code. • Piracy when software is copied and distributed illegally. • The process of transferring the encrypted file over the network. • ...
Bullying 2021-08-31
Truth About Truman School 2015-10-03
Across
- Who is milk and honey?
- Who is Lilly's boyfriend?
- Who was cyber bullied?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- what is the book about?
- Who gets teased because of her skin?
Down
- Who is Amr's best friend?
- What grade grade are they in?
- Who gets involved if there is cyber bulling?
- What is the websites namer?
- What does Recce like?
- Where did Lilly hide?
- What does Trevor like to draw?
- Who is Muslim?
15 Clues: Who is Muslim? • What does Recce like? • Where did Lilly hide? • Who is milk and honey? • Who was cyber bullied? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
Product technology 2025-03-17
Across
- you can see it but its not there
- short for application
- access for all
- monosyllabic tall and angry
Down
- ones and zeros
- what you do when you wnat to rease a train and it s unrelaible
- what hits you when you step out of the cinema
- it may take your job?!! But not in the future in our experience
- elon saving the world (again)
9 Clues: ones and zeros • access for all • short for application • monosyllabic tall and angry • elon saving the world (again) • you can see it but its not there • what hits you when you step out of the cinema • what you do when you wnat to rease a train and it s unrelaible • it may take your job?!! But not in the future in our experience
Cybersecurity 2023-05-18
Across
- is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
- is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
- bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
- attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- is a general term for any type of intrusive computer software with malicious intent against the user.
- is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
- are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
- is the delivery of hosted services, including software, hardware, and storage, over the Internet.
- every aspect of protecting an organization and its employees and assets against cyber threats.
- is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
- is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
- is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
- is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- is the process of decoding cipher text to plain text so that it is readable by humans
- is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- is a kind of spyware software that records every keystroke made on a computer’s keyboard.
- refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.
18 Clues: is the process of decoding cipher text to plain text so that it is readable by humans • is a kind of spyware software that records every keystroke made on a computer’s keyboard. • every aspect of protecting an organization and its employees and assets against cyber threats. • ...
answers 2025-11-11
7 Clues: Which war began in 2001? • Where is NATO headquartered? • Which country joined NATO in 2024? • What alliance opposed NATO in 1955? • Which country invaded Ukraine in 2022? • What type of security does NATO provide? • What kind of new threats does NATO counter today?
Cyber Mobbing Kreuzworträtsel von Leon Cardinale 2015-01-20
Across
- Strafbestand des Cyber Mobbings im StGB?
- Wie werden die Täter auch genannt?
- Die Tat ist sowohl offen als auch?
- Grund für Mobbing?
- Die Veröffentlichung intimer Informationen ist eine?
- Erste Gegenmaßnahme
- Wie ist die Tat beweisbar?
- Wo sind Straftaten des Cyber Mobbings aufzufinden?
- Schlimmster Ausweg vieler Opfer?
Down
- Was spricht für Cyber Mobbing als für normales Mobbing?
- Letzte Gegenmaßnahme?
- Erster Ansprechpartner?(nicht der Lehrer)
- Was sollte man im Netz schützen?
- Das Massives Versenden von beleidigenden Mails ist eine?
- Die Herkunft des Wortes?
15 Clues: Grund für Mobbing? • Erste Gegenmaßnahme • Letzte Gegenmaßnahme? • Die Herkunft des Wortes? • Wie ist die Tat beweisbar? • Was sollte man im Netz schützen? • Schlimmster Ausweg vieler Opfer? • Wie werden die Täter auch genannt? • Die Tat ist sowohl offen als auch? • Strafbestand des Cyber Mobbings im StGB? • Erster Ansprechpartner?(nicht der Lehrer) • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
Down
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
Down
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
Hacktober 2024-09-17
Across
- malicious software that locks users out of their systems until a ransom is paid
- information about potential or ongoing cyber threats
- a secret word or phrase used to authenticate access to a system
- a digital document used to verify the identity of a user or device
- fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- software that detects and removes malware
- a secure environment used to isolate untrusted programs
- converting data into a fixed-size value, often used in password storage
- a network of infected computers controlled remotely by an attacker
- a physical or digital device used to authenticate identity
- the potential for loss or damage when a threat exploits a vulnerability
- analysis of digital evidence to investigate security incidents
- a weakness in a system that can be exploited by attackers
- penetration test, used to simulate attacks on a system to find vulnerabilities
- software that secretly gathers information about users without consent
- a vulnerability in software that is exploited before the vendor is aware
- security operations center, a team responsible for monitoring and defending systems
- an actor or event that can cause harm to a system
- fraudulent attempt to obtain sensitive information through email or websites
- a self-replicating malware that spreads across networks
- a trusted person within an organization who poses a security risk
- following laws and regulations regarding data security and privacy
Down
- systematic examination of security controls and processes
- software designed to damage or disrupt computer systems
- process of verifying the identity of a user
- a security system that controls network traffic based on predetermined rules
- a list of approved entities that are granted access to a system or network
- distributed denial of service, an attack that overwhelms a system with traffic
- a type of malware disguised as legitimate software
- multi-factor authentication, requiring two or more methods to verify identity
- a network security system that monitors and controls incoming and outgoing traffic
- process of converting data into a coded form to prevent unauthorized access
- an incident where data is accessed without authorization
- intrusion detection system, designed to detect malicious activity
- software that records keystrokes to steal sensitive information
- pretending to be someone else or a legitimate service to deceive others
- system used to monitor and analyze security events in real-time
- a software update that fixes bugs and vulnerabilities
- transforming data into a fixed-size value, commonly used in authentication
- identity and access management, used to control user permissions
40 Clues: software that detects and removes malware • process of verifying the identity of a user • an actor or event that can cause harm to a system • a type of malware disguised as legitimate software • information about potential or ongoing cyber threats • a software update that fixes bugs and vulnerabilities • software designed to damage or disrupt computer systems • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- A security mechanism requiring two or more forms of verification before granting access to a system
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
Down
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
Online Child Safety 2013-05-13
Across
- scam that involves a fraudulent e-mail
- hardware and code
- Security-any software or technique used to prevent online crime
- The Communications Decency Act
- unsolicited adds on your computer
Down
- predator- An adult internet user who exploits children or teens
- unsolicited email or junk mail
- rules/manners of inline usage
- person who access internet files either legally or illegally
- Controls-software that allows parents to control what their children do online
- hostile, strongly worded message that may contain obscene language
- Media-online site where people can post information about themselves
- virtual sexual encounters
- a sexual message sent to someone
- Rooms-an interactive forum where you can talk in real time
15 Clues: hardware and code • virtual sexual encounters • rules/manners of inline usage • unsolicited email or junk mail • The Communications Decency Act • a sexual message sent to someone • unsolicited adds on your computer • scam that involves a fraudulent e-mail • Rooms-an interactive forum where you can talk in real time • ...
Edasiõppimine ja karjäär 2022-02-03
Across
- asutas koos Steve Jobs'iga Apple'i (perekonnanimi)
- asutus, mis korraldab võistlusi alates aastast 2017
- Tallinna Tehnikaülikooli ja Tartu ülikooli ühisprogramm
- Cyber Security Network asutaja (ainult perekonnanimi)
- Austraalia internetiaktivist ja ajakirjanik, WikiLeaks asutaja (perekonnanimi)
- saadavad korda head, eesmärgiks leida süsteemist turvavigu ning neid parandada
- tegeleb nõrkust leidmise ja ründamisega
- Eesti Infotehnoloogia ja Telekommunikatsiooni Liidu algatus, kust saab teada milliseid ameteid IT-valdkonnas on
Down
- Vastavalt olukorrast teevad nii head või tegutsevad oma kasu eesmärgil
- laager, kuhu pääsevad KüberNaaskel võistlusel osalenutest parimad
- tegeleb šifrite loomise ja lahendamisega, loogikaülesannetega, räsi ja plokiahelaga ning stenograafiaga
- tegeleb koodianalüüsi ja skriptide automatiseerimisega
- morrise ussi looja (perekonnanimi)
- kurjade motiividega häkkerid
- Euroopa Liidu kodanike digiteemade oskamise ja kasutamse mudeli nimi
15 Clues: kurjade motiividega häkkerid • morrise ussi looja (perekonnanimi) • tegeleb nõrkust leidmise ja ründamisega • asutas koos Steve Jobs'iga Apple'i (perekonnanimi) • asutus, mis korraldab võistlusi alates aastast 2017 • Cyber Security Network asutaja (ainult perekonnanimi) • tegeleb koodianalüüsi ja skriptide automatiseerimisega • ...
Cybersecurity Crossword Puzzle 2023-08-03
Across
- The team that facilitates collaboration between red and blue teams
- A tool that monitors network traffic for potential security breaches
Down
- A team that simulates cyber attacks to find vulnerabilities
- The team responsible for defending against cyber threats
- The act of tricking individuals into revealing sensitive information
5 Clues: The team responsible for defending against cyber threats • A team that simulates cyber attacks to find vulnerabilities • The team that facilitates collaboration between red and blue teams • The act of tricking individuals into revealing sensitive information • A tool that monitors network traffic for potential security breaches
doctor who 2014-11-23
Across
- ------ will fall
- 2d
- a version of the master
- tv
- a telapaphic alien
- rino
- shapehifter
- planet of the timelordes
- a cyborg
- piranas of the air
- suit
- serve
- the --------
- are you my mummy
- potato head
- cyber-----
- skin with a face
- a spider like alien
- men and robot put together
- rival timelord
- dog
- mythical
Down
- appere in a wound of time
- Name of the show
- -----man
- emotion + angel
- a place and tv show
- cyber-----
- our planet
- a slime thing with teeth
- time and relevent dimension in space
- has an iron fist
- dummy
- maker of the daleks
- time
- mummy
- main character
- cyber ____
- cyber---
- exterminate
40 Clues: 2d • tv • dog • rino • suit • time • dummy • serve • mummy • -----man • a cyborg • cyber--- • mythical • cyber----- • our planet • cyber----- • cyber ____ • shapehifter • potato head • exterminate • the -------- • main character • rival timelord • emotion + angel • ------ will fall • Name of the show • has an iron fist • are you my mummy • skin with a face • a telapaphic alien • piranas of the air • a place and tv show • maker of the daleks • ...
Basic puzzle 2022-12-13
Across
- This controls the ALU and tells it what to do
- A extra layer of security
- Does IF statements
- This stores either an address in memory or data
- A standard for coding for use with differnt coding languages
- Where all your computer data is stored(permanent)
- A standard data encoding format
- A piece of a computer that accelerates graphic rendering
Down
- The operating speed of a computer and its microprocessor
- A bigger piece of a gigabyte
- This is used to switch electrical signals
- A coding system using 1 and 0s
- Helps apps load faster by storing temporary files
- A type of cyber attack in disguise of a email
- The central piece of a computer
15 Clues: Does IF statements • A extra layer of security • A bigger piece of a gigabyte • A coding system using 1 and 0s • A standard data encoding format • The central piece of a computer • This is used to switch electrical signals • This controls the ALU and tells it what to do • A type of cyber attack in disguise of a email • This stores either an address in memory or data • ...
Truth About Truman School 2015-10-03
Across
- Who was cyber bullied?
- What grade grade are they in?
- Who is Amr's best friend?
- Who is Lilly's boyfriend?
- What is the websites namer?
- Who gets teased because of her skin?
- Who is Muslim?
Down
- Who gets involved if there is cyber bulling?
- what is the book about?
- Where did Lilly hide?
- What does Recce like?
- What does Trevor like to draw?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- Who is milk and honey?
15 Clues: Who is Muslim? • Where did Lilly hide? • What does Recce like? • Who was cyber bullied? • Who is milk and honey? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
Truth About Truman School 2015-10-03
Across
- Who was cyber bullied?
- What grade grade are they in?
- Who is Amr's best friend?
- Who is Lilly's boyfriend?
- What is the websites namer?
- Who gets teased because of her skin?
- Who is Muslim?
Down
- Who gets involved if there is cyber bulling?
- what is the book about?
- Where did Lilly hide?
- What does Recce like?
- What does Trevor like to draw?
- What was their school called?
- Who was blamed for all of the cyber bulling?
- Who is milk and honey?
15 Clues: Who is Muslim? • Where did Lilly hide? • What does Recce like? • Who was cyber bullied? • Who is milk and honey? • what is the book about? • Who is Amr's best friend? • Who is Lilly's boyfriend? • What is the websites namer? • What grade grade are they in? • What was their school called? • What does Trevor like to draw? • Who gets teased because of her skin? • ...
BCAW 2022 2022-06-13
Across
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- In order to prepare for cyber resilience, speed and agility are required.
- One of the UMW Group Crisis Management Team Structure
Down
- The capacity to recover quickly from difficulties
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- What is the third UMW Group BCM risk events?
- A thing made by combining two different elements
8 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • One of the UMW Group Crisis Management Team Structure • In order to prepare for cyber resilience, speed and agility are required. • ...
Crossword 2 2024-07-11
Across
- A cloud deployment model where services are provided over the public internet and available to anyone.
- A cloud computing feature that allows for automatic scaling of resources as needed.
- A secure network that uses the internet to connect remote sites or users together.
- A cloud service that provides a way to manage identities and access for users and systems.
- A security measure that involves scanning incoming network traffic for malicious activities.
- A model of cloud computing where hardware is provided as a service.
- A type of cyber attack that involves overwhelming a service with excessive traffic from multiple sources.
Down
- A method of ensuring only authorized users can access certain data or resources.
- A strategy for making copies of data to protect against loss or corruption.
- A cloud computing term for the partitioning of a physical server into smaller virtual servers.
- A type of security testing that is used to find vulnerabilities of a system.
- A cloud computing service model that offers development tools and platforms to users.
- A security protocol that provides encrypted communication and secure identification of a network web server.
- A shared responsibility model in cloud computing means both the provider and the customer must manage these.
- A cloud computing service model that delivers software applications over the internet.
15 Clues: A model of cloud computing where hardware is provided as a service. • A strategy for making copies of data to protect against loss or corruption. • A type of security testing that is used to find vulnerabilities of a system. • A method of ensuring only authorized users can access certain data or resources. • ...
Cyber Security By Zara 2021-11-05
Across
- fake version of the app, loaded up with malware
- If something looks fake
- a type of malware that spreads copies of itself from computer to computer
- someone makes up a story to gain a person's interest and uses this to encourage them to give away information about themselves
- Looking over someone's shoulder to see their password
- What is the first thing you type in on your computer
Down
- a software utility program designed to protect a system from internal attacks from viruses
- If you click on a link you might get this
- PayPal Scam...
- decides whether to allow or block specific traffic
- What is the second thing you type in on your computer
11 Clues: PayPal Scam... • If something looks fake • If you click on a link you might get this • fake version of the app, loaded up with malware • decides whether to allow or block specific traffic • What is the first thing you type in on your computer • What is the second thing you type in on your computer • Looking over someone's shoulder to see their password • ...
Cyber security crossword search 2025-10-15
Across
- Keeping your personal information safe and not sharing it without permission.
- A program that finds and removes harmful software from your device.
- A trick where someone pretends to be trustworthy to steal your personal info.
- A security step where you need two things (like a password and a code) to log in.
- A small update that fixes problems or security holes in software.
Down
- A way to lock your data so only the right person can read it.
- Malicious software that can damage your computer or steal your data.
- A secret word or code you use to log in and keep your accounts safe.
- A machine that cuts paper into tiny pieces so no one can read it.
- A sneaky program that watches what you do on your computer without you knowing.
- A tool that protects your computer by blocking unwanted internet traffic.
11 Clues: A way to lock your data so only the right person can read it. • A machine that cuts paper into tiny pieces so no one can read it. • A small update that fixes problems or security holes in software. • A program that finds and removes harmful software from your device. • Malicious software that can damage your computer or steal your data. • ...
Eden's Virus Vocab Crossword :/ 2018-11-15
Across
- online mail
- explosion of data that paralyzes a network
- security system for a computer that limits the exposure of a computer network
- used to protect computers from viruses
- type of malware that saves users data without the users knowing it
- programs used by a computer
- virus that replicates itself
- misleads users of its true intent
Down
- most used virus worm
- electronic device that stores data
- cyber crime in which people pretend to be a fake institution to lure you in so you will give out personal data
- unwanted computer software that turns a computer against itself
- software intended to damage systems
- unwanted program that delivers advertising content
- makes a virus look legitimate
15 Clues: online mail • most used virus worm • programs used by a computer • virus that replicates itself • makes a virus look legitimate • misleads users of its true intent • electronic device that stores data • software intended to damage systems • used to protect computers from viruses • explosion of data that paralyzes a network • unwanted program that delivers advertising content • ...
Cyber Security Awareness Puzzle 2021-10-11
Across
- A software that is designed and destroy computer viruses
- Also known as malicious software any; any program or file that is harmful to a computer user
- The state of being free from danger and threat
- Choose a password that is easy for you _______________ but hard for you someone to guess
- Always _______your computer when you leave your desk
- Email scam or attempt to trick you into giving your password or personal information
Down
- Do not leave your laptop or computer
- Never share your _________ with another person
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
- Passwords should always be at least this many characters long.
11 Clues: Do not leave your laptop or computer • Never share your _________ with another person • The state of being free from danger and threat • Always _______your computer when you leave your desk • A software that is designed and destroy computer viruses • Passwords should always be at least this many characters long. • ...
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Tugas 2026-02-25
Across
- melakukan cyber bullying dengan cara cyber stalking merupakan
- cara menghindari tindakan cyber bullying di media sosial seperti... sebelum menyebarkan kepada orang lain
- mendapat rahasia dengan tipu dayanya lalu disebarkan yaitu
- tindakan pengiriman pesan online dengan nada marah atau vulgar disebut
- penyebab seseorang melakukan cyber bullying dapat seperti
- menyamar menjadi orang lain untuk berbuat jahat disebut
Down
- dampak bagi korban yang terkena cyber bullying,korban dapat
- tindakan yang menyebarkan fitnah untuk merusak reputasi orang lain yaitu
- sebagai sanksi atau korban cyber bullying kita haru selalu aktif untuk
- jika terkena cyber bullying di sekolah kita dapat melaporkan kepada
10 Clues: menyamar menjadi orang lain untuk berbuat jahat disebut • penyebab seseorang melakukan cyber bullying dapat seperti • mendapat rahasia dengan tipu dayanya lalu disebarkan yaitu • dampak bagi korban yang terkena cyber bullying,korban dapat • melakukan cyber bullying dengan cara cyber stalking merupakan • ...
BCAW 2022 2022-06-13
Across
- What is the color alert codes for the partial activation?
- The capacity to recover quickly from difficulties
- In order to prepare for cyber resilience, speed and agility are required.
- What is the third UMW Group BCM risk events?
Down
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- One of the UMW Group Crisis Management Team Structure
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- A thing made by combining two different elements
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
10 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • One of the UMW Group Crisis Management Team Structure • What is the color alert codes for the partial activation? • In order to prepare for cyber resilience, speed and agility are required. • ...
CISO Crossword Puzzle 0523 2023-08-28
Across
- The right to control how your information is viewed and used, while being protected against threats or danger.
- A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
- A technique by which cyber criminals steal potentially sensitive user information by injecting malicious JavaScript code in various forms/pages of targeted website.
- A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes
- A Security incident in which a malicious threat actor gains access to systems without authorization.
- Property of data which gives assurance that the data can only be accessed/modified by authorized users.
Down
- Software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features.
- The destruction of the data on a data storage device by removing its magnetism.
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- A social engineering technique through which a cybercriminal disguises themselves as a known or trusted source.
- Format of a message or data in readable form; extremely vulnerable from a confidentiality perspective.
- A documented, lowest level of security configuration allowed by an organization.
12 Clues: The destruction of the data on a data storage device by removing its magnetism. • A documented, lowest level of security configuration allowed by an organization. • A Security incident in which a malicious threat actor gains access to systems without authorization. • ...
Social media 2021-01-26
7 Clues: to press a button • using the internet • protection of someone or something • using computers, especially the internet • a small thing that you press to work on a computer • to keep someone or something from dangerius things • the right or opportunity to use or look at something
Cybersecurity Crossword Puzzle 2023-04-17
Across
- Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- It is a software or hardware which is used to filter network traffic based on rules.
- It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- Is a software that operates on different OS which is used to prevent malicious software.
- security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- Is an action or event that might compromise the security.
- It is a malicious software that installs on your computer without your consent for a bad purpose.
- security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Is an assault on the system security that is delivered by a person or a machine to a system.
11 Clues: Is an action or event that might compromise the security. • It is a software or hardware which is used to filter network traffic based on rules. • Is a software that operates on different OS which is used to prevent malicious software. • Is an assault on the system security that is delivered by a person or a machine to a system. • ...
Cyber Security Crossword Puzzle 2024-10-03
Across
- A person who uses computers to gain unauthorized data
- A user illegally accessing a website
- An attempt to steal sensitive information
- A bug that disrupts the system
- Data from a website that is stored in a web browser
Down
- When people bully others online
- A digital trail left by everything you do online
- A dangerous program that destroys and corrupts devices
- A network that allows you to play online
- A user who's allowed to access a website
- A code that protects private information
11 Clues: A bug that disrupts the system • When people bully others online • A user illegally accessing a website • A network that allows you to play online • A user who's allowed to access a website • A code that protects private information • An attempt to steal sensitive information • A digital trail left by everything you do online • ...
cybercrime 2022-10-11
Across
- variety of crimes carried out online,
- a security incident where sensitive data is accidentally exposed
- a place where you can ethicly use cybercrime
- type of cybercrime
- keep updated to protect youreself
Down
- the company who lost passwords in 2011
- a measure taken in advance to prevent something dangerous, unpleasant, or inconvenient from happening
- punishment for commiting cybercrime
- the country with the most cybercrime
- traditional crimes which can be increased in scale by usingcomputers( cyber-crimes)
10 Clues: type of cybercrime • keep updated to protect youreself • punishment for commiting cybercrime • the country with the most cybercrime • variety of crimes carried out online, • the company who lost passwords in 2011 • a place where you can ethicly use cybercrime • a security incident where sensitive data is accidentally exposed • ...
Cyber Security - Social Engineering 2021-11-02
Across
- The use of viruses and exploits to redirect victims trying to reach legitimate websites to identical but fake websites in which their data is not secure. (e.g. A fake bank login website that steals bank account and login information).
- The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information.
- The act of getting into a restricted area by compelling an authorized person to share their credentials. (A security guard may feel compelled to hold a secure door open for a person carrying heavy boxes or an elderly lady).
- The act of creating an invented scenario (the pretext) to convince someone to divulge private information, generally by pretending to be an executive or other high-ranking official.
Down
- The practice of gaining confidential data (passwords, PINs, etc.) by eavesdropping on the keystrokes inputted on their device. This can be done both digitally (with software that records keystrokes) or physically (looking over someone's shoulder).
- Tricking people into getting their personal information without their consent. Can be done using impersonation, or other social engineering practices.
- The practice of sending emails pretending to be from trusted companies in order to trick individuals into revealing personal information, such as passwords and credit card numbers.
- The practice of requesting private data or login credentials in exchange for a service or money (e.g. offering "free" IT assistance in exchange for login credentials)
- The act of closely following an authorized person into a restricted area (e.g. through locked doors) without the person noticing, and gaining access to that location.
- The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information.
- The act of using a malware-infected object (physical or digital) to pique people's curiosity or greed, and lure them into a trap that steals their personal information when they interact with the object.
11 Clues: The act of texting people through SMS, pretending to be from trusted companies in order to gain their private information. • The act of calling people on the phone, pretending to be from trusted companies in order to gain their private information. • ...
Let's Recap: Cyberbullying 2021-07-10
Across
- Where cyber bullying can take place
- ________ experience bullying more
- A type of bullying behavior
- Confidence in your leadership
- To be kept private on social media
- Cyber bullying occurs through ___________
- Opposite of staying quiet
- Words have _________
Down
- To harm, intimidate or coerce someone
- A type of information posted about someone
- The change you want to see
- Perform _________ acts of kindness
- Counter bullying
13 Clues: Counter bullying • Words have _________ • Opposite of staying quiet • The change you want to see • A type of bullying behavior • Confidence in your leadership • ________ experience bullying more • To be kept private on social media • Perform _________ acts of kindness • Where cyber bullying can take place • To harm, intimidate or coerce someone • ...
Cybersecurity Awareness 2025-01-16
Across
- The opposite of risky.
- A secret used to unlock your account.
- When sensitive info gets exposed.
- Software that fights against malware.
- A common way hackers send fake messages.
- A virtual barrier that blocks bad stuff online.
- What you shouldn't do without checking the link first.
- To scramble data so only the right person can read it.
Down
- The prefix for security in the digital world.
- What keeps your software secure and current.
- A fake email trying to steal your information.
- Unwanted emails clogging your inbox.
- What you use to protect your phone or laptop screen.
- A copy of your files in case something goes wrong.
- Something you shouldn't give to suspicious websites.
- A second step to prove it'd really you.
16 Clues: The opposite of risky. • When sensitive info gets exposed. • Unwanted emails clogging your inbox. • A secret used to unlock your account. • Software that fights against malware. • A second step to prove it'd really you. • A common way hackers send fake messages. • What keeps your software secure and current. • The prefix for security in the digital world. • ...
BCAW 2022 2022-06-13
Across
- In order to prepare for cyber resilience, speed and agility are required.
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
- The capacity to recover quickly from difficulties
- What is the third UMW Group BCM risk events?
- A thing made by combining two different elements
Down
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay
- One of the UMW Group Crisis Management Team Structure
- What color for alert codes of partial activation?
10 Clues: What is the third UMW Group BCM risk events? • A thing made by combining two different elements • The capacity to recover quickly from difficulties • What color for alert codes of partial activation? • One of the UMW Group Crisis Management Team Structure • In order to prepare for cyber resilience, speed and agility are required. • ...
Tech, Trends, and Titans 2025-04-01
Across
- A celestial event where the moon blocks the sun, last seen in April 2024.
- A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
- The tech giant behind Facebook, Instagram, and its growing metaverse.
- OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
- A security essential that should be strong and frequently updated.
- Female country legend and philanthropist who helped fund the COVID-19 vaccine.
- Word used to describe viral topics on social media and news.
Down
- Essential for protecting businesses from modern digital threats.
- The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
- Remote servers that store data online instead of locally.
- A critical software update that fixes security vulnerabilities.
- Celebrated on April 22 to promote environmental awareness.
- A cyber scam that tricks users into revealing sensitive information.
- Boxing champ turned entrepreneur, still known for his iconic grill.
- The season of new beginnings, blooming flowers, and warmer days.
- Month known for spring showers, tax deadlines, and pranks on the 1st.
16 Clues: Remote servers that store data online instead of locally. • Celebrated on April 22 to promote environmental awareness. • Word used to describe viral topics on social media and news. • A critical software update that fixes security vulnerabilities. • Essential for protecting businesses from modern digital threats. • ...
Social media 2021-01-26
7 Clues: to press a button • using the internet • protection of someone or something • using computers, especially the internet • a small thing that you press to work on a computer • to keep someone or something from dangerius things • the right or opportunity to use or look at something
El 2025-07-01
Across
- Impact of technology on physical and mental well-being
- Availability and affordability of technology and internet access
- Rules for polite and respectful online behavior
- Exchanging information and ideas using digital technologies
Down
- Freedoms and obligations in the digital world
- Legal framework governing online activities
- Protecting personal information and devices from cyber threats.
- Ability to find, evaluate, and use information effectively online.
- Buying and selling goods and services online
9 Clues: Legal framework governing online activities • Buying and selling goods and services online • Freedoms and obligations in the digital world • Rules for polite and respectful online behavior • Impact of technology on physical and mental well-being • Exchanging information and ideas using digital technologies • ...
E-Commerce Crossword 2016-11-22
Across
- /being connected to the internet
- technology /scrambles data travelling over the internet to prevent unauthorised access
- /the ability to conduct business transactions through a a mobile device
- /electronic retailer
- /software intended to perform unwanted actions on a computer
- /electronic security on the internet
- /a feature highlighted within a document that triggers a link to another document
- /a file that a web server stores on the user’s computer when a website is visited. A cookie gathers information about a user.
Down
- theft /the crime of stealing personal information in order to assume that person's name
- /the use of a fake bank website to elicit a customer’s account details
- of privacy /the wrongful intrusion into the personal life of another
- investing /direct investor trading over the internet
- /the buying and selling of information, goods and services via the internet
- mall /a virtual shopping mall
- /protects an author, artist, musician or publisher by giving them exclusive rights over their creation
- /unlawfully damaging a person’s reputation
- account /an account where a third party holds money until goods are delivered
- buying /buying in bulk so both the buyers and the sellers benefit from the deal
18 Clues: /electronic retailer • mall /a virtual shopping mall • /being connected to the internet • /electronic security on the internet • /unlawfully damaging a person’s reputation • investing /direct investor trading over the internet • /software intended to perform unwanted actions on a computer • of privacy /the wrongful intrusion into the personal life of another • ...
YSC 4.0 2022-11-09
Across
- fundamental knowledge and practical skills of business management especially in core business area and business analytics
- Engineering discipline that is growing rapidly and in importance in the age of computing platform
- thomas edison invented ………
- involves investigating the relationships that exist between the structures and properties of materials
- provides students with fundamental knowledge and practical skills of computer technologies especially in programming, data science, network and software engineering with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
- areas with applications such as telecommunications, computer systems, and power engineering and also extended into areas of applications such as in manufacturing, information technology and many more
- Focuses on the application of engineering principles to the design, construction and operation of industrial processing plants
Down
- fundamental knowledge and practical skills especially in programming, networking and software engineering
- involves the application of Physics principles to the design, construction and operation of various systems and devices
- provide students with a strong understanding of geology and geophysics that relate to exploration, petroleum discovery, development and production
- produce skilled knowledge workers, addressing the nation’s call for more scientists and technologists especially in the areas of Petrochemistry, Sustainable Chemistry and Nanotechnology
- Involves the application of engineering principles and applied sciences to the design, construction, operation, and maintenance of capital projects in a typical asset life cycle
- engineering field that involves activities related to exploration and production of hydrocarbons within the upstream sector
- focuses on providing sound knowledge and expertise in enterprise resource planning, systems analysis and design methods, database management systems and business applications with opportunities of taking Field Electives in Data Analytics, Cyber Security, Enterprise Systems and Software Quality
- application of engineering principles to the design, development and manufacturing of mechanical devices and systems
15 Clues: thomas edison invented ……… • Engineering discipline that is growing rapidly and in importance in the age of computing platform • involves investigating the relationships that exist between the structures and properties of materials • fundamental knowledge and practical skills especially in programming, networking and software engineering • ...
Küberturvalisus 2020-05-28
Across
- ametiseisundi kuritarvitamine omakasu eesmärgil.
- see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil.
- jalakäijate või sõidukite liikumine ja paiknemine teel.
- ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused).
- psühhotroopne aine, mis tekitab sõltuvust.
Down
- cyber Security
- sisenemine arvutisüstemi
- protsess, milles üksikisik või inimrühm võtab omaks äärmuslikud poliitilised, sotsiaalsed või usulised seisukohad, mis vastanduvad kehtivale korrale ja kaasaegsetele ideedele.
8 Clues: cyber Security • sisenemine arvutisüstemi • psühhotroopne aine, mis tekitab sõltuvust. • ametiseisundi kuritarvitamine omakasu eesmärgil. • jalakäijate või sõidukite liikumine ja paiknemine teel. • see on jõu kasutamine füüsilise või vaimse vigastuse tekitamise eesmärgil. • ennetuses on suur roll inimestel endil (ohtude vähendamine; kindlustused). • ...
iSOC Crossword - Basic 2014-10-14
Across
- Security is in your own _______.
- A person who steals information from your system without you knowing about it.
- A computer _______ is a group of interconnected computers.
- Never turn off your ______ or else your computer and the company data will be at risk
- The A in APT
- your password is like a _______, use it regularly, change it often and do not share it with anyone else.
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
- Never share your _______ with another person.
- Password should be changed every 2-3 months.
- Protect your laptop or cellphone by treating it like _____.
- Be cyber savvy, be a ______ user.
Down
- Classic form of Malware
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- Viruses, Worms and Trojans etc
- A ____ is a web page address.
- A software that is designed to detect and destroy computer viruses.
- Hidden entrance into a system
- An army of malware infected PCs
- passwords should always be at least ______ characters long.
- The state of being free from danger or threat.
- The chance you take when you download unknown content from the internet or leave your computer open
- Always _____ your computer when you leave your desk.
22 Clues: The A in APT • Classic form of Malware • A ____ is a web page address. • Hidden entrance into a system • Viruses, Worms and Trojans etc • An army of malware infected PCs • Security is in your own _______. • Be cyber savvy, be a ______ user. • Password should be changed every 2-3 months. • Never share your _______ with another person. • ...
CIS101 Cybersecurity Questions by Cale Therault 2025-06-04
Across
- A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
- The process of identifying, analyzing, and evaluating potential risks to a system.
- A method of authentication that require two or more methods to gain access.
- Unsolicited or undesired electronic messages, typically email.
- The practice and study of techniques for secure communication in the presence of adversaries.
- The process of verifying the identity of a user or system.
- A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
- Software designed to detect, prevent, and remove malicious software.
- An incident where unauthorized access to data or systems occurs.
- Short for malicious software.
- A software update released to fix vulnerabilities and bugs.
Down
- A cyber attack made from numerous compromised computer systems.
- An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
- The process of converting data into code, especially to prevent unauthorized access.
- Making full use of and/or derive benefit from a resource.
- A weakness or flaw in a system that can be exploited by a threat.
- A type of malware that maliciously encrypts files and demands money for release.
- A potential danger that might exploit a vulnerability to breach security.
- A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
20 Clues: Short for malicious software. • Making full use of and/or derive benefit from a resource. • The process of verifying the identity of a user or system. • A software update released to fix vulnerabilities and bugs. • Unsolicited or undesired electronic messages, typically email. • A cyber attack made from numerous compromised computer systems. • ...
09 Innovation through IoE 2025-02-25
Across
- A method to process IoT data closer to the source
- The ability of machines to function without human intervention
- An example of an IoT-enabled wearable device
- A city using IoT for urban management
- A high-speed wireless network that enhances IoT communication
- The ability of IoT devices to communicate with each other
- Protection of IoT systems against cyber threats
- Technology used for tracking objects in IoT
- The process of machines operating independently
- IoT-enabled device for tracking energy consumption
- IoT-based monitoring for security purposes
- IoT-enabled devices worn on the body
- The concept of connecting physical objects to the Internet
- A method used to enhance IoT systems through software-based solutions
Down
- The integration of IoT in household appliances
- Machine-to-Machine communication in IoT
- A technology linked to digital currencies and IoT security
- The interconnected digital environment created by IoE
- The process of combining multiple IoT systems
- A major concern in the IoT era
- Components that enable movement in IoT devices
- Devices that collect data in IoT systems
- A threat faced by IoT devices connected to the Internet
- Large-scale information generated by IoT devices
- A vehicle using IoT and AI for autonomous navigation
- Technology expected to manage the massive data from IoE
- The process of interpreting IoT-generated data
- A platform where IoT data is often stored and analyzed
- A key benefit of IoT, improving time and resource management
- The foundation of IoT, collected and used for decision-making
30 Clues: A major concern in the IoT era • IoT-enabled devices worn on the body • A city using IoT for urban management • Machine-to-Machine communication in IoT • Devices that collect data in IoT systems • IoT-based monitoring for security purposes • Technology used for tracking objects in IoT • An example of an IoT-enabled wearable device • ...
cyber security class 7-8 2025-07-07
Across
- A person who tries to break into computers or networks
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- Small data stored by websites to remember what you did
- A program that helps protect your computer from harmful software
- A program or device that guards your network from threats
Down
- Something you install to fix or improve software
- Any software made to harm your computer or data
- A harmful program that spreads and damages your files
- A test websites use to check if you’re a human
- A small window that appears on your screen, sometimes as part of a scam
- A harmful file that tricks you by looking like something safe
- A tool that helps block unwanted content or messages
- A scam where someone pretends to be trustworthy to steal your info
- A tool that blocks unwanted connections to your computer or network
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
cyber security class 7-8 2025-07-07
Across
- A tool that blocks unwanted connections to your computer or network
- Something you install to fix or improve software
- Small data stored by websites to remember what you did
- A harmful program that spreads and damages your files
- A tool that helps block unwanted content or messages
- A program that secretly collects what you do on your device
- A scam where someone pretends to be trustworthy to steal your info
- A test websites use to check if you’re a human
Down
- Any software made to harm your computer or data
- A personal profile you log into on websites or apps
- A program that helps protect your computer from harmful software
- A harmful file that tricks you by looking like something safe
- A person who tries to break into computers or networks
- A small window that appears on your screen, sometimes as part of a scam
- A part of a website or message that takes you to another page
- A program or device that guards your network from threats
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
