cyber security Crossword Puzzles

CISO Crossword Quiz - 1925 2025-05-14

CISO Crossword Quiz - 1925 crossword puzzle
Across
  1. Face swapping, lip-syncing, Audio Overlays, Voice-Only Cloning, Full-Body Re-enactment techniques are used in which type of cyber scam
  2. A software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features
  3. The action or process of spoiling the appearance of a website in a cyber attack
  4. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  5. The process of monitoring and capturing all data packets passing through a given network
  6. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
Down
  1. The unethical act of violating the privacy of an organization in order to leak internal data or confidential information
  2. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  3. The use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
  4. Phishing Techniques used to target senior executives of an organization

10 Clues: Phishing Techniques used to target senior executives of an organizationThe action or process of spoiling the appearance of a website in a cyber attackThe process of monitoring and capturing all data packets passing through a given network...

Computer Networks 2019-05-16

Computer Networks crossword puzzle
Across
  1. gaining unauthorised access to a computer.
  2. computers connected that share information
  3. unique identification (IP or MAC)
  4. programs used by a computer
  5. a copper cable used to connect computers to a network.
  6. wireless technology used for transmitting data over short distances.
Down
  1. Local Area Network a network of computers that covers a small area
  2. equipment adapted for a particular purpose
  3. ways to protect data on a computer
  4. a set of rules for how messages are transmitted across networks
  5. packet a piece of data sent over a network.

11 Clues: programs used by a computerunique identification (IP or MAC)ways to protect data on a computerequipment adapted for a particular purposegaining unauthorised access to a computer.computers connected that share informationpacket a piece of data sent over a network.a copper cable used to connect computers to a network....

Week 4 – The Cyber Sleuth’s Final Puzzle 2025-10-21

Week 4 – The Cyber Sleuth’s Final Puzzle crossword puzzle
Across
  1. Another word for a fake or deceptive email
  2. What hackers send to trick you into clicking bad links
  3. Software that secretly infects your computer
  4. Security feature that requires a code and a password
  5. A common red flag to identify a phishing email
  6. A code that proves who you are when logging in
  7. You should never reuse the same one twice
Down
  1. Keeping systems protected by installing patches
  2. Something you click that can hide danger
  3. Small image that can link to malicious sites
  4. What you should never share with coworkers or friends
  5. Where you report suspicious messages
  6. The process of teaching staff to avoid cyber threats

13 Clues: Where you report suspicious messagesSomething you click that can hide dangerYou should never reuse the same one twiceAnother word for a fake or deceptive emailSmall image that can link to malicious sitesSoftware that secretly infects your computerA common red flag to identify a phishing emailA code that proves who you are when logging in...

VOCABULARY REVIEW 2025-02-20

VOCABULARY REVIEW crossword puzzle
Across
  1. - object used to write with
  2. - a fluid used to make impressions on paper
  3. - the ability of consumption to be maintained at a certain rate or level
  4. - use of robotics to aid in large scale production
  5. security - the field of digital privacy
  6. - valuable materials, usually in the form of precious metals or gems
Down
  1. - Technology that can manipulate individual atoms or molecules
  2. - further develop technological advancement
  3. - human remains found in Egypt
  4. - material used for writing on in Egypt
  5. - large Egyptian structures, usually holding deceased pharaohs
  6. intelligence - computer system that can complete tasks usually done by humans
  7. - a person who studies human history through the excavation of historical sites

13 Clues: - object used to write with- human remains found in Egypt- material used for writing on in Egyptsecurity - the field of digital privacy- further develop technological advancement- a fluid used to make impressions on paper- use of robotics to aid in large scale production- Technology that can manipulate individual atoms or molecules...

Impact of AI and blockchain on modern banking 2025-11-25

Impact of AI and blockchain on modern banking crossword puzzle
Across
  1. Verification of customer identity using AI biometrics.
  2. Software that detects suspicious transactions to prevent fraud
  3. Banking using mobile phones or apps
  4. Transactions without physical money.
  5. AI-powered communication tools used by banks for customer service.
Down
  1. A system where control is distributed rather than held by a central authority.
  2. Protection of banking data from cyber threats.
  3. A record of transactions stored in blocks and linked securely
  4. Technology that combines finance and digital innovaions
  5. A digital ledger system used for secure transactions
  6. Studying large data to make predictions for decision-making
  7. Replacing human efforts with intelligent systems to improve efficiency

12 Clues: Banking using mobile phones or appsTransactions without physical money.Protection of banking data from cyber threats.A digital ledger system used for secure transactionsVerification of customer identity using AI biometrics.Technology that combines finance and digital innovaionsStudying large data to make predictions for decision-making...

How can you report hacking? 2022-05-18

How can you report hacking? crossword puzzle
Across
  1. Computer fraud to the...
  2. to National Cyber Security Centre
  3. Received a ____ text?, forward to 7726 (free)
Down
  1. Computer fraud to...
  2. report@________.gov.uk

5 Clues: Computer fraud to...report@________.gov.ukComputer fraud to the...to National Cyber Security CentreReceived a ____ text?, forward to 7726 (free)

EGBANK Frontier Induction 2024-02-27

EGBANK Frontier Induction crossword puzzle
Across
  1. Provides information about all the financial inclusion tools EGBANK tools
  2. You can get in this session tips to avoid cyber security hacks
  3. All you need to know about EGBANK's organizational structure and performance management cycle
Down
  1. Introduces the EGBANK's advertisement side
  2. Helps you to know what formal dress code looks like
  3. Introduce you to EGBANK main health care benefits

6 Clues: Introduces the EGBANK's advertisement sideIntroduce you to EGBANK main health care benefitsHelps you to know what formal dress code looks likeYou can get in this session tips to avoid cyber security hacksProvides information about all the financial inclusion tools EGBANK tools...

Information Security Crossword - 4 2013-07-09

Information Security Crossword - 4 crossword puzzle
Across
  1. Fulfilling contractual requirements is also a ________ requirement.
  2. Internet related.
  3. Ensuring ________ safety is in the scope of information security.
  4. Division of office space into areas with varying degree of physical access controls.
  5. A server getting infected with virus leads to the loss of ________ of the computer system.
Down
  1. Generates random one time passwords.
  2. Emergency exits always open _________.
  3. Personal computers requires ______ as much as office systems.
  4. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
  5. Coming out safely from structure in danger.

10 Clues: Internet related.Generates random one time passwords.Emergency exits always open _________.Coming out safely from structure in danger.Personal computers requires ______ as much as office systems.Ensuring ________ safety is in the scope of information security.Fulfilling contractual requirements is also a ________ requirement....

Meta Product Security 2024-04-25

Meta Product Security crossword puzzle
Across
  1. Secure messaging app with end-to-end encryption
  2. Network security system to block unauthorized access
  3. Data providing information about other data
  4. Social media platform with over 2.7 billion monthly active users
  5. Simulated cyber attack to test system defenses
  6. Photo and video sharing platform with over 1 billion active users
Down
  1. Process of verifying user identity
  2. Method of protecting data by converting it into code
  3. Open standard for authorization and authentication
  4. Secure protocol for online data transfer (now replaced by TLS)

10 Clues: Process of verifying user identityData providing information about other dataSimulated cyber attack to test system defensesSecure messaging app with end-to-end encryptionOpen standard for authorization and authenticationNetwork security system to block unauthorized accessMethod of protecting data by converting it into code...

Communication Review 2025-02-28

Communication Review crossword puzzle
Across
  1. - the condition of being protected from danger
  2. Media- The communication on the internet
  3. - tricking someone into giving personal in formation
  4. - Security software that protects against internet threats
Down
  1. - bullying someone online
  2. - someone you do not know

6 Clues: - bullying someone online- someone you do not knowMedia- The communication on the internet- the condition of being protected from danger- tricking someone into giving personal in formation- Security software that protects against internet threats

Learnig 2023-11-03

Learnig crossword puzzle
Across
  1. Cyber
  2. AI
Down
  1. DGOV
  2. Transformation

4 Clues: AIDGOVCyberTransformation

Brain-Riddle Round 2 2025-02-12

Brain-Riddle Round 2 crossword puzzle
Across
  1. Temporary storage that speeds up data retrieval.
  2. A temporary interaction between a user and a website.
  3. An intermediary server between a user and the internet.
  4. A language used to style web pages.
  5. A method of hiding data within other files.
  6. A communication endpoint for network connections.
Down
  1. The data sent back from a server after a request.
  2. A process of converting data into a fixed-size value.
  3. A software vulnerability unknown to the vendor.
  4. The part of a cyber attack that carries malicious code.
  5. A set of rules for communication between software.
  6. A security feature that controls web resource access.
  7. A network utility used to test connectivity.
  8. A file containing code for automation.
  9. A standard language for creating web pages.

15 Clues: A language used to style web pages.A file containing code for automation.A method of hiding data within other files.A standard language for creating web pages.A network utility used to test connectivity.A software vulnerability unknown to the vendor.Temporary storage that speeds up data retrieval.The data sent back from a server after a request....

Watch Out, We're Watching ... 2024-04-03

Watch Out, We're Watching ... crossword puzzle
Across
  1. Unauthorized access or data compromise event.
  2. Compulsively scrolling through negative news, causing anxiety or distress.
  3. Information collected and analyzed for decision making.
  4. Keeping safe from harm.
  5. What was compromised due to unauthorized data collection?
  6. Your favorite english teacher!
  7. Name of the firm involved in the 2018 data privacy scandal.
Down
  1. The anxiety of feeling left out from experiences others are having.
  2. Financial state Cambridge Analytica declared in 2018.
  3. Protection against unauthorized access or cyber threats.
  4. European data protection regulation enacted in response to privacy concerns.
  5. Weaknesses in a website that can be exploited by attackers.
  6. Complex computer processes used to analyze user data.
  7. Moral principles that govern a person's behavior.
  8. Type of app used to collect data on Facebook users.

15 Clues: Keeping safe from harm.Your favorite english teacher!Unauthorized access or data compromise event.Moral principles that govern a person's behavior.Type of app used to collect data on Facebook users.Financial state Cambridge Analytica declared in 2018.Complex computer processes used to analyze user data....

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. _____rights/issues
  2. a system of government where people of a country can vote to elect their leaders
  3. the environmental______of tourism
  4. that is legally or officially acceptable
  5. a feeling that you have a link with somebody/something or are part of a group
  6. ​a device that can react to light, heat, pressure, etc. in order to make a machine
  7. Kingdom of Talossa;Sealand; Liberians are______
  8. someone who steals your information through the internet
  9. every adult has the right to vote
Down
  1. antonym of specific
  2. racial/social/gender______
  3. someone who is rich and powerful
  4. a country that has a king or a queen as the leader
  5. the activities involved in protecting Sth
  6. connected with electronic communication networks, especially the internet

15 Clues: _____rights/issuesantonym of specificracial/social/gender______someone who is rich and powerfulthe environmental______of tourismevery adult has the right to votethat is legally or officially acceptablethe activities involved in protecting SthKingdom of Talossa;Sealand; Liberians are______a country that has a king or a queen as the leader...

Cyber Warfare 2022-08-08

Cyber Warfare crossword puzzle
Across
  1. Where you can find GCHQ
  2. The use of computer technology to disrupt the activities of a state or organisation.
  3. Activists enthusiastic about hacking with neither good nor bad intentions.
  4. Term for a recently discovered exploit/weakness.
  5. "Father" of code-breaking.
  6. Act of compromising digital devices and networks through unauthorised access.
Down
  1. Where Joan Clarke worked during WW2.
  2. Breaks into protected systems and networks with permission to test their security.
  3. Malicious computer worm uncovered in 2010.
  4. UK's intelligence agency.
  5. Another term for "Malicious Software".
  6. Cyber criminals with malicious intent.
  7. A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
  8. Code created by German's during WW2.
  9. Overwhelming a service or network with internet traffic.

15 Clues: Where you can find GCHQUK's intelligence agency."Father" of code-breaking.Where Joan Clarke worked during WW2.Code created by German's during WW2.Another term for "Malicious Software".Cyber criminals with malicious intent.Malicious computer worm uncovered in 2010.Term for a recently discovered exploit/weakness....

Introduction to Cyber Security - Harjap Nahal 2023-09-08

Introduction to Cyber Security - Harjap Nahal crossword puzzle
Across
  1. protects your data including employee and customer data
  2. protecting data and the systems that store it from attacks
  3. Operating information used by the computer
  4. offer services to the client such as outsourced technology support
  5. creates a copy of the data that can be recovered incase something happens
  6. bring up to date, modernize
  7. prevents phishing attacks from happening
  8. unauthorized parties gaining access to confidential information
  9. used to protect data from being stolen, changed, or compromised
  10. an action of fraud
Down
  1. the process of verifying a user or device before allowing access to a system or resources
  2. a cyber attack where someone tricks other computers networks
  3. to keep an eye on something
  4. an attempt by hackers to damage or destroy a computer network or system
  5. secure place to store online content
  6. checking or proving something is true
  7. something that protects and gives safety
  8. tricking internet users into revealing their personal or private information
  9. needed to get into something
  10. encrypts data sent over by the internet to prevent hackers from seeing it

20 Clues: an action of fraudto keep an eye on somethingbring up to date, modernizeneeded to get into somethingsecure place to store online contentchecking or proving something is truesomething that protects and gives safetyprevents phishing attacks from happeningOperating information used by the computerprotects your data including employee and customer data...

Computer Crime and Cyber Security (KS3) 2025-06-06

Computer Crime and Cyber Security (KS3) crossword puzzle
Across
  1. This type of attack tries to crack a password by checking words from a dictionary.
  2. The way you sit, which can affect your back health when using computers.
  3. Obtaining personal information, like passwords, by looking over someone's shoulder.
  4. A legal framework in the UK that protects personal information, updated in 2018.
  5. A boolean value representing logical false (from starter activity).
  6. An error in the program's thinking that causes unexpected results, even if it runs.
  7. This type of email scam tries to trick you into revealing personal information like login details.
  8. A problem that can arise from looking at screens for too long.
  9. This scam promises large sums of money but requires an upfront payment.
  10. A specific type of malicious software disguised as a legitimate program.
  11. A type of malware that is able to replicate itself.
  12. Malicious software.
  13. A condition caused by repeating the same actions over and over, making it painful to type or use a mouse.
Down
  1. When files are scrambled and unreadable, often by ransomware.
  2. Legal protection for the owner of a creative work from illegal copying.
  3. Secret words or phrases used to protect accounts and systems.
  4. Information directly linked to a person, like their name or mobile number.
  5. Accessing a computer system or files without permission.
  6. The act of illegally accessing a computer or data without permission.
  7. The organisation in the UK responsible for data protection.
  8. Files sent with an email, which can sometimes contain malware.
  9. A type of fire extinguisher safe for electrical fires.
  10. This type of attack attempts to guess a password by trying every single combination.
  11. Copying someone else's work and presenting it as your own.
  12. Malware that encrypts files and demands payment for the decryption key.
  13. Penalties that can be issued for serious copyright offences or data breaches.
  14. Storing a copy of data to restore from if original files are lost or encrypted.
  15. The process of finding and fixing errors in code.
  16. Unwanted or junk email.
  17. An emotion expressed by the word "Blimey".

30 Clues: Malicious software.Unwanted or junk email.An emotion expressed by the word "Blimey".The process of finding and fixing errors in code.A type of malware that is able to replicate itself.A type of fire extinguisher safe for electrical fires.Accessing a computer system or files without permission....

CTI Crossword 2025-02-18

CTI Crossword crossword puzzle
Across
  1. A tool for analyzing logs for security incidents (owned by Cisco)
  2. A group of indicators that define a malicious activity pattern
  3. A system that monitors network traffic for malicious activity
  4. Malware that locks files and demands payment
Down
  1. Technique for disguising malicious activity as legitimate
  2. Unauthorized access to or control over a computer system
  3. An attack that overwhelms a network with traffic
  4. A method of tricking users into revealing sensitive information
  5. Framework for describing cyber threat information
  6. Malicious software that spreads without user action

10 Clues: Malware that locks files and demands paymentAn attack that overwhelms a network with trafficFramework for describing cyber threat informationMalicious software that spreads without user actionUnauthorized access to or control over a computer systemTechnique for disguising malicious activity as legitimate...

Tech 2024-01-12

Tech crossword puzzle
Across
  1. Malicious software (5)
  2. The process of converting information into code to prevent unauthorized access (10)
  3. An attempt to trick people into giving away sensitive information (9)
  4. A type of cyber attack that floods a network with traffic (6)
  5. A program that replicates itself and spreads to other computers (8)
  6. Protects against unauthorized access (9)
Down
  1. A security measure using a unique identifier (8)
  2. Encryption method (7)
  3. The best MSP around (5)
  4. A set of rules that controls network traffic (7)

10 Clues: Encryption method (7)Malicious software (5)The best MSP around (5)Protects against unauthorized access (9)A security measure using a unique identifier (8)A set of rules that controls network traffic (7)A type of cyber attack that floods a network with traffic (6)A program that replicates itself and spreads to other computers (8)...

Business Continuity Awareness Week 2023 2022-12-13

Business Continuity Awareness Week 2023 crossword puzzle
Across
  1. people need to be able to call you using these.
  2. Consistent operations
  3. allows computers to talk to each other and the internet.
  4. access to and from this is vital
  5. Hosts data and services for your business
  6. duplication of resources for better continuity
Down
  1. Keeping bad guys out both physically and in the cyber realm.
  2. None of your electronics will run without this.
  3. this service allows you to send and receive messages over the internet.

9 Clues: Consistent operationsaccess to and from this is vitalHosts data and services for your businessduplication of resources for better continuitypeople need to be able to call you using these.None of your electronics will run without this.allows computers to talk to each other and the internet.Keeping bad guys out both physically and in the cyber realm....

Crossword 2020-11-24

Crossword crossword puzzle
Across
  1. traffic
  2. city
Down
  1. security
  2. off

4 Clues: offcitytrafficsecurity

Responsible AI Principles Crossword 2024-11-19

Responsible AI Principles Crossword crossword puzzle
Across
  1. Environmental consideration in AI deployment
  2. Principle focusing on treating all groups equally
  3. Making AI processes and decisions clear and understandable
Down
  1. Having clear roles and responsibilities in AI governance
  2. Understanding impact on people when deploying AI
  3. Protecting AI systems from cyber-threats
  4. Evaluating and mitigating potential harm in AI systems

7 Clues: Protecting AI systems from cyber-threatsEnvironmental consideration in AI deploymentUnderstanding impact on people when deploying AIPrinciple focusing on treating all groups equallyEvaluating and mitigating potential harm in AI systemsHaving clear roles and responsibilities in AI governanceMaking AI processes and decisions clear and understandable

Internet saftey 2023-10-24

Internet saftey crossword puzzle
Across
  1. - a security device that protects users online
  2. - fake emails or messages to get personal information
  3. the name given to the type of bullying when online
  4. When a stranger tries to start a relationship with a child for unlawful purposes
  5. information, stored on computers and other storage devices
Down
  1. wireless connection to the internet
  2. A diary or personal journal kept on a website
  3. should be a minimum of 12 characters long
  4. - illegally breaking into computer devices
  5. - a famous search engine

10 Clues: - a famous search enginewireless connection to the internetshould be a minimum of 12 characters long- illegally breaking into computer devicesA diary or personal journal kept on a website- a security device that protects users onlinethe name given to the type of bullying when online- fake emails or messages to get personal information...

Join the Elite Cyber Team 2020-06-26

Join the Elite Cyber Team crossword puzzle
Across
  1. Shift cipher named after a famous Roman, Julius ?
  2. The largest WAN of these is the internet.
  3. Subject does research & development, lab coats optional.
  4. Convert a coded message into intelligible words.
  5. Statement of intention to inflict damage / hostile action
Down
  1. Knowing these will help you pass exams.
  2. Machine used in WW2 to send secret messages in Germany.
  3. To protect data and humans ensure you have S?
  4. Attack that damages or destroys online systems is called?
  5. Updated typewriter, spell checking and rocket launching.

10 Clues: Knowing these will help you pass exams.The largest WAN of these is the internet.To protect data and humans ensure you have S?Convert a coded message into intelligible words.Shift cipher named after a famous Roman, Julius ?Machine used in WW2 to send secret messages in Germany.Subject does research & development, lab coats optional....

CJCC Crossword 2023-05-10

CJCC Crossword crossword puzzle
Across
  1. Who handles all media requests?
  2. Who is going to remind you to do your cyber security training?
  3. What branch of government does CJCC fall under?
  4. How many seats are there on the Council?
  5. This division handles data collection and analysis (abbv.)
  6. Our current Council Chairman
  7. Jay goes here to meet with legislators about the CJCC budget
  8. Governor Brian P._____
  9. The Chairman of Victims Compensation Board (last name)
  10. Where did our CJCC attorneys go to law school? (abbv.)
  11. Our friendly neighborhood CFO
Down
  1. Who lets you know when we are closing early?
  2. Who has worked at CJCC the longest?
  3. Our office is located in this building
  4. Our Executive Director
  5. CJCC was founded in 198_
  6. Criminal Justice Coordinating Council (abbv.)
  7. ____ Kemp. The member of the First Family who works to tackle human trafficking.

18 Clues: Our Executive DirectorGovernor Brian P._____CJCC was founded in 198_Our current Council ChairmanOur friendly neighborhood CFOWho handles all media requests?Who has worked at CJCC the longest?Our office is located in this buildingHow many seats are there on the Council?Who lets you know when we are closing early?...

CSA CROSSWORD #1 2022-01-07

CSA CROSSWORD #1 crossword puzzle
Across
  1. industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  2. form of cloud computing that provides virtualized computing resources over the internet.
  3. cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
  4. a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
  5. This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
  1. cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  2. Centre of expertise for cyber security in Europe
  3. widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  4. way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
  5. cybersecurity control framework for cloud computing

10 Clues: Centre of expertise for cyber security in Europecybersecurity control framework for cloud computingform of cloud computing that provides virtualized computing resources over the internet.cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

tentang ai runway gen 3 alpha 2024-10-30

tentang ai runway gen 3 alpha crossword puzzle
Across
  1. AI
  2. Security
  3. manual
Down
  1. video

4 Clues: AIvideomanualSecurity

Cyber Security Scavenger Hunt 2014-10-28

Cyber Security Scavenger Hunt crossword puzzle
Across
  1. Decrypt me: 00000000 43 4e 4f 4
  2. This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
  3. Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
  4. SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
  5. Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
  1. These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
  2. The unofficial mascot of this shop is the Pink Unicorn.
  3. Decrypt me: VEFPDQo=

8 Clues: Decrypt me: VEFPDQo=Decrypt me: 00000000 43 4e 4f 4The unofficial mascot of this shop is the Pink Unicorn.Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.Gives us access to the building, most are blue, but ours are DEFCON 2.SIGDEVERs that focus on discovery and documentation of foreign communications & networks....

Why is Cybersecurity Necessary? 2023-01-27

Why is Cybersecurity Necessary? crossword puzzle
Across
  1. Set of defined actions to take in accordance with established policy.
  2. Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
  3. Set of actions taken after a cyber event has occurred.
  4. Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
  1. Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
  2. Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
  3. Technical and non-technical measures to know that you have been compromised.
  4. People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.

8 Clues: Set of actions taken after a cyber event has occurred.Set of defined actions to take in accordance with established policy.Technical and non-technical measures to know that you have been compromised.Cybersecurity programs must be established, maintained, and is not a set it and forget it matter....

The Wild World of Incident Response – How It Could Save Your Organization's Life! 2024-09-18

The Wild World of Incident Response – How It Could Save Your Organization's Life! crossword puzzle
Across
  1. Always think before you do this.
  2. How to check a URL.
  3. Something social engineers are good at.
Down
  1. Never open an unsolicited one from an unknown sender.
  2. Type of scam where the attacker impersonates a senior executive.
  3. What you should do with a phishing email.
  4. Cyberattack involving malicious emails.
  5. Who you should talk to if you have questions about cyber security and information protection.

8 Clues: How to check a URL.Always think before you do this.Cyberattack involving malicious emails.Something social engineers are good at.What you should do with a phishing email.Never open an unsolicited one from an unknown sender.Type of scam where the attacker impersonates a senior executive....

Round 3 2025-08-25

Round 3 crossword puzzle
Across
  1. What is the act of posting abusive messages online ?
  2. Write the full form of ASP
  3. Which action compromise cyber security ?
  4. Theft of digital property?
Down
  1. Which device links to homogenous packed broadcast local networks ?
  2. Who coined the term "cyberspace" ?
  3. Name the type of attack which uses a fraudulent server with a relay address?
  4. What is the legal field dealing with internet behavior called ?

8 Clues: Write the full form of ASPTheft of digital property?Who coined the term "cyberspace" ?Which action compromise cyber security ?What is the act of posting abusive messages online ?What is the legal field dealing with internet behavior called ?Which device links to homogenous packed broadcast local networks ?...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een andere naam voor cyberpesten
  2. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
  1. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
  2. Iemand lichamelijk pijn doen is ... pesten
  3. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  4. Een gevolg van (cyber)pesten
  5. De eerste stap om iets aan (cyber)pesten te doen
  6. Iemand met woorden pijn doen is ... pesten
  7. Een verregaand gevolg van (cyber)pesten
  8. Iemand met opzet een ... sturen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een andere naam voor cyberpesten
  2. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
  1. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
  2. Iemand lichamelijk pijn doen is ... pesten
  3. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  4. Een gevolg van (cyber)pesten
  5. De eerste stap om iets aan (cyber)pesten te doen
  6. Iemand met woorden pijn doen is ... pesten
  7. Een verregaand gevolg van (cyber)pesten
  8. Iemand met opzet een ... sturen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

FSA 1 2021-02-03

FSA 1 crossword puzzle
Across
  1. THE AMOUNT THAT A BORROWER CAN BORROW FOR A SECURED LOAN IS USUALLY ____ THAN AN UNSECURED LOAN
  2. INTEREST RATES USED BY BANKS WHEN LENDING UNSECURED FUNDS TO EACH OTHER
  3. A PLATFORM THAT CAN ALLOW BUSINESSES TO POOL MONEY FROM A VARIETY OF SOURCES
  4. THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN
  5. THIS FORM OF LOGOUT CLOSES A USER’S ACCESS AFTER A FEW MINUTES OF INACTIVITY
  6. THE TYPE OF LOAN THAT THE BORROWER DOES NOT NEED TO PLEDGE AN ASSET AS COLLATERAL
  7. A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN
  8. AN EXAMPLE OF WHICH IS A SIX-DIGIT CODE SENT TO A CUSTOMER’S CELL PHONE FOR ADDITIONAL SECURITY
  9. DURING A SLUMP, THE GOVERNMENT CAN ____ THE INTEREST RATE TO ENCOURAGE SPENDING
Down
  1. FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION
  2. A FORM OF AUTHENTICATION THAT RELIES ON RETINA SCANS, THUMBPRINTS OR FACIAL RECOGNITION
  3. THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY
  4. HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME
  5. THE MARKET VALUE OF AL GOODS AND SERVICES PRODUCED WITHIN THE COUNTRY
  6. MAS IS SINGAPORE’S _____ BANK.
  7. THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH
  8. A CYBER-SECURITY DEVICE AND CONFIGURATION TO BLOCK ATTACKS

17 Clues: MAS IS SINGAPORE’S _____ BANK.A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWNTHE ORGANIZATION TO REGISTER YOUR BUSINESS WITHTHE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGINHAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOMETHE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITYFOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION...

computer apps crossword 2022-05-02

computer apps crossword crossword puzzle
Across
  1. each individual box in sheets
  2. text at the top of the document
  3. picture w a transparent background
  4. the way one slide changes to another
  5. where everything is stored
  6. spaces at the sides of the document
  7. which google app can be used to make posters and pamphlets
  8. which google app is used for making videos
  9. which googles app allows you to create websites
  10. a video sharing platform for entertainment and information
Down
  1. when you take away the background of a picture to put on top of another
  2. when you steal info and claim it as your own
  3. #1 cause for cyber security breaches
  4. where you make your citations
  5. which google app is used for surveys
  6. movements you can give pictures or text
  7. has to be in every sheets equation
  8. every good email starts with this
  9. text at the bottom of the document

19 Clues: where everything is storedeach individual box in sheetswhere you make your citationstext at the top of the documentevery good email starts with thispicture w a transparent backgroundhas to be in every sheets equationtext at the bottom of the documentspaces at the sides of the document#1 cause for cyber security breaches...

risk 2024-07-15

risk crossword puzzle
Across
  1. - JKL Financial Services detects unusual activity in its system, indicating a cyber-attack. What risk is this?
  2. - ABC Bank's loan portfolio is concentrated in real estate, and the market shows signs of a downturn. What risk is this?
  3. - GHI Insurance faces more claims due to frequent natural disasters. What risk is this?
  4. - XYZ Investment Firm uses insurance to manage foreign instability risk. What strategy is this?
  5. - XYZ Investment Firm faces losses due to instability in a foreign market. What risk is this?
Down
  1. - JKL Financial Services improves security to prevent cyber-attacks. What approach is this?
  2. - DEF Corporation enters an interest rate swap to manage rising rates. What strategy is this?
  3. - GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this?
  4. - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this?
  5. - DEF Corporation's debt has variable interest rates, and rates are rising. What risk is this?

10 Clues: - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this?- GHI Insurance faces more claims due to frequent natural disasters. What risk is this?- GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this?- JKL Financial Services improves security to prevent cyber-attacks. What approach is this?...

technology 2024-06-07

technology crossword puzzle
Across
  1. screen
  2. computer
  3. device
  4. phone
  5. Social media (add a dash between words)
  6. Online (add a dash between words)
  7. Videogames (add a dash between words)
  8. TV
Down
  1. remote
  2. Cyber-bullying
  3. app
  4. mouse
  5. charger
  6. keyboard

14 Clues: TVappmousephoneremotescreendevicechargercomputerkeyboardCyber-bullyingOnline (add a dash between words)Videogames (add a dash between words)Social media (add a dash between words)

Computing Networks 2019-05-16

Computing Networks crossword puzzle
Across
  1. The internet is the world's largest (15 letters)
  2. A set of rules for how messages are turned into data packets and sent across networks. (8 letters)
Down
  1. Consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. (14 letters)
  2. Information stored and transferred between devices by binary packets. (4 letters)
  3. A device or system used to protect a network from unauthorized access. (8 letters)
  4. Internet protocol address. A unique identifier issued to each device connected to a network. (9 letters)
  5. the process of converting information or data into a code, especially to prevent unauthorized access. (10 letters)
  6. A computer that holds data to be shared with other computers. (6 letters)

8 Clues: The internet is the world's largest (15 letters)A computer that holds data to be shared with other computers. (6 letters)Information stored and transferred between devices by binary packets. (4 letters)A device or system used to protect a network from unauthorized access. (8 letters)...

citoyenneté numérique pages 68 et 106 CDO 1 2023-11-21

citoyenneté numérique pages 68 et 106  CDO  1 crossword puzzle
Across
  1. user
  2. to access
  3. to share
  4. easy
  5. cyber-dependant
  6. tastes
Down
  1. cyber harassment
  2. to have fun
  3. to upload, download
  4. disadvantages
  5. interests
  6. advantages

12 Clues: usereasytastesto shareto accessinterestsadvantagesto have fundisadvantagescyber-dependantcyber harassmentto upload, download

Viruses:Matthew Savoie 2018-11-16

Viruses:Matthew Savoie crossword puzzle
Across
  1. Viruses sent through messaging websites
  2. the go to tool for today's cyber criminals
  3. appeared on May 4 2000
  4. Programs that you download to watch out for viruses
  5. A small piece of software that piggybacks on programs
  6. Computer program that has the ability to copy it self from machine to machine
  7. Program that you download to protect you against viruses
Down
  1. Caused microsoft to shut down there email systems
  2. Infected a quarter million computers
  3. first virus designed to cause actual damage
  4. more insidious type of attack
  5. Denial of service attack
  6. A internet wall with a password to get into information
  7. virus sent to a person multiple times
  8. A program that says it does one thing but does damage as it runs

15 Clues: appeared on May 4 2000Denial of service attackmore insidious type of attackInfected a quarter million computersvirus sent to a person multiple timesViruses sent through messaging websitesthe go to tool for today's cyber criminalsfirst virus designed to cause actual damageCaused microsoft to shut down there email systems...

Cyber Warfare 2022-08-08

Cyber Warfare crossword puzzle
Across
  1. Where you can find GCHQ
  2. The use of computer technology to disrupt the activities of a state or organisation.
  3. Activists enthusiastic about hacking with neither good nor bad intentions.
  4. Term for a recently discovered exploit/weakness.
  5. "Father" of code-breaking.
  6. Act of compromising digital devices and networks through unauthorised access.
Down
  1. Where Joan Clarke worked during WW2.
  2. Breaks into protected systems and networks with permission to test their security.
  3. Malicious computer worm uncovered in 2010.
  4. UK's intelligence agency.
  5. Another term for "Malicious Software".
  6. Cyber criminals with malicious intent.
  7. A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
  8. Code created by German's during WW2.
  9. Overwhelming a service or network with internet traffic.

15 Clues: Where you can find GCHQUK's intelligence agency."Father" of code-breaking.Where Joan Clarke worked during WW2.Code created by German's during WW2.Another term for "Malicious Software".Cyber criminals with malicious intent.Malicious computer worm uncovered in 2010.Term for a recently discovered exploit/weakness....

IT Careers 2024-04-11

IT Careers crossword puzzle
Across
  1. Build and maintain the client-side components of websites and web applications, including HTML, CSS, and JavaScript code.
  2. Plan, coordinate, and oversee web design projects from initiation to completion. They manage resources, timelines, and budgets, communicate with stakeholders, and ensure project objectives are met within scope and quality standards.
  3. Create visually compelling designs, graphics, and branding elements for websites and digital media.
  4. Design, develop, and maintain software applications and systems.
  5. Manage and maintain computer systems, networks, and servers. They are responsible for ensuring the smooth operation, security, and reliability of IT infrastructure.
  6. Protect computer systems, networks, and data from cyber threats and attacks. They monitor security incidents, conduct risk assessments, and implement security measures to safeguard information assets.
Down
  1. Develop and maintain the server-side components of websites and web applications, including databases, APIs, and server logic.
  2. Manage and maintain databases, including installation, configuration, backup, and optimization. They ensure data integrity, security, and availability for efficient data management.
  3. Develop and maintain websites and web applications, specializing in areas such as frontend, backend, or full stack development
  4. Test software applications and systems to identify defects, bugs, and performance issues. They develop test plans, execute test cases, and report findings to ensure software quality and reliability
  5. Analyze website performance, user behavior, and traffic data to identify trends, insights, and opportunities for improvement
  6. Design, implement, and manage computer networks, including hardware, software, and protocols. They ensure network performance, security, and availability.
  7. Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces.

13 Clues: Design, develop, and maintain software applications and systems.Create visually compelling designs, graphics, and branding elements for websites and digital media.Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces....

Security 2022-03-27

Security crossword puzzle
Across
  1. Is a database of computers, users, and services.
  2. Ensures the integrity of a message.
  3. A type of asset for an organization.
  4. Software developed by cybercriminals to perform malicious acts.
  5. Type of malware where communications are intercepted.
  6. This needs to be done to your computer when it's left unattended.
  7. Using this method is a way to protect data.
  8. Type of malware where a removable device is left in a public place for someone to use and infect their machine.
  9. A feature that detects phishing websites.
  10. In order to use this feature in Windows, TPM must be enabled.
  11. Typically distributed by downloading online software.
Down
  1. This needed to be updated in order for its anti-malware software to work.
  2. A mode that allows users to browse the web anonymously.
  3. A set of objectives to ensure the security of a network.
  4. Type of malware where the attacker alters packet contents.
  5. Is a type of lock in Windows that needs a pre-paired device.
  6. Pretending to need personal information to confirm someone's identity.
  7. This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
  8. Prevents unwanted traffic from going into internal networks.
  9. The most common type of computer malware.
  10. Can be found in high-security environments.
  11. A type of lock that needs a key that is separate from the door handle.

22 Clues: Ensures the integrity of a message.A type of asset for an organization.The most common type of computer malware.A feature that detects phishing websites.Using this method is a way to protect data.Can be found in high-security environments.Is a database of computers, users, and services.Type of malware where communications are intercepted....

Security 2022-02-08

Security crossword puzzle
Across
  1. I copy traffic for you to safely inspect. (6,9)
  2. If you look at me you can find out "who did what, where, and when". (5,5,4)
  3. You're not alone and this approach helps reduce risk and cost. (6)
  4. Enterprise way to adopt a Zero trust approach. (6,4)
  5. Use me to prevent unwanted traffic reaching your VMs. (8)
  6. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  7. Use me to classify your data. (5,3)
  8. I provide insights into your security posture. Acronym(3)
  9. De-identification technique. (16)
  10. I detect network based threats. (5,3)
  11. Do you trust that container image? (6,4)
  12. Trust no one. (4,5)
  13. Using me allows you to implment the principle of least privilege. Acronym (3)
Down
  1. I can tell you when you need to reduce permissions. (11)
  2. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  3. Apply multiple layers of securty. (7,2,5)
  4. Use me to mitigate OWASP top 10 risks. (5,5)
  5. Needs to be kept secret. (12)
  6. If you use me you do not need a VPN. Acronym(3)
  7. You can find me at rest or on the move (in-transit). (10)
  8. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
  9. Use me to manage keys outside of Google Cloud. Acronym (3)

22 Clues: Trust no one. (4,5)Needs to be kept secret. (12)De-identification technique. (16)Use me to classify your data. (5,3)I detect network based threats. (5,3)Do you trust that container image? (6,4)Apply multiple layers of securty. (7,2,5)Use me to mitigate OWASP top 10 risks. (5,5)I copy traffic for you to safely inspect. (6,9)...

Security 2024-10-25

Security crossword puzzle
Across
  1. 5
  2. 16
  3. 19
  4. 12
  5. 2
  6. 9
  7. 1
  8. 7
  9. 4
  10. 13
Down
  1. 20
  2. 15
  3. 11
  4. 8
  5. 10
  6. 3
  7. 14
  8. 6
  9. 18
  10. 17

20 Clues: 5832961742015111619101214181713

CIS 178 cyber security crossword puzzle 2023-04-20

CIS 178 cyber security crossword puzzle crossword puzzle
Across
  1. allowing employees to use own device
  2. digital information user leaves behind
  3. maicious software encrypts file device
  4. small program
  5. fraudulent or malicious practices
  6. network of infected devices
  7. software spreads from one computer to another
  8. computer virus designed to infect macros
  9. setting up a fake website
  10. floods system with data packets
  11. updates to software to improve security
Down
  1. software to detect and remove viruses
  2. gets you to tell them your information
  3. part of body for security
  4. used to get control of phone number
  5. type of malicious software code
  6. unreadable mathematical function
  7. advertising supported software
  8. disguised as legitimate software
  9. protects against unauthorized malicious activity

20 Clues: small programpart of body for securitysetting up a fake websitenetwork of infected devicesadvertising supported softwaretype of malicious software codefloods system with data packetsunreadable mathematical functiondisguised as legitimate softwarefraudulent or malicious practicesused to get control of phone numberallowing employees to use own device...

Introduction to Cyber Security Crossword Puzzle 2023-09-09

Introduction to Cyber Security Crossword Puzzle crossword puzzle
Across
  1. When an intruder takes over a victims information by tricking them in any way they find necessary
  2. A form of malware that can infect a computer, and hurt it and the information stored on said computer
  3. A secondary form of verification in order to log into certain accounts across the internet
  4. A way of keeping your identity safe on the internet by tricking intruders into thinking you are someone, or live somewhere you do not
  5. The cause of all the hurt caused to the victim once an intruder has invaded the victims device
  6. The protection used to prevent intruders from stealing, corrupting, or damaging any data/computing device
  7. A form of protecting certain information by making it into unreadable text that is only readable by having the right authorization
  8. The way a device keeps itself up to date with the latest and most secure version of itself
  9. A connection between two or more devices across the virtual world
Down
  1. A type of malware where the intruder corrupts a victims date, and requires payment before returning said data to the victim
  2. A form of tricking a victim into believing that they are someone they are not via an email
  3. The incident of an intruder gaining unauthorized access to certain information
  4. A way of notifying companies, organizations, or others that you were recently attacked virtually
  5. When an intruder tries to attack ones device via many different methods
  6. A form of keeping certain information hidden behind a certain string of words
  7. Creating a copy of certain data on a separate device or on the same computer in order to keep it in case of said data becoming corrupted in the future
  8. Being able to access certain devices by being completely away from said device
  9. When an intruder tries to disguise themselves as a trusted source to trick a victim to allowing them into there device
  10. A device used to send packets to a certain network on the internet
  11. Information that has been translated into a certain form that is easily readable by computing devices

20 Clues: A connection between two or more devices across the virtual worldA device used to send packets to a certain network on the internetWhen an intruder tries to attack ones device via many different methodsA form of keeping certain information hidden behind a certain string of words...

Business Continuity 2021-04-07

Business Continuity crossword puzzle
Across
  1. duplication of resources for better continuity
  2. access to and from this is vital.
  3. Keeping bad guys out both physically and in the cyber realm.
Down
  1. People need to be able to call you using these.
  2. Hosts data and services for your business
  3. Allows somputers to talk to each other and the internet.
  4. Consistent operations
  5. None of your electronics will run without this.
  6. This service allows you to send and recieve messages over the internet.

9 Clues: Consistent operationsaccess to and from this is vital.Hosts data and services for your businessduplication of resources for better continuityPeople need to be able to call you using these.None of your electronics will run without this.Allows somputers to talk to each other and the internet....

Brain-Riddle Round 2 2025-02-12

Brain-Riddle Round 2 crossword puzzle
Across
  1. A piece of data used for authentication.
  2. A language used to style web pages.
  3. A standard language for creating web pages.
  4. A cyber attack that tricks users into revealing information.
  5. A type of software designed to harm or exploit.
  6. A unique address assigned to a device on a network.
  7. A temporary interaction between a user and a website.
Down
  1. An intermediary server between a user and the internet.
  2. A network security system that monitors traffic.
  3. A hacking method that systematically tries passwords.
  4. A method of converting data into a secure format.
  5. A file containing code for automation.
  6. Temporary storage that speeds up data retrieval.
  7. A system that translates domain names to IP addresses.
  8. A set of rules for communication between software.

15 Clues: A language used to style web pages.A file containing code for automation.A piece of data used for authentication.A standard language for creating web pages.A type of software designed to harm or exploit.A network security system that monitors traffic.Temporary storage that speeds up data retrieval.A method of converting data into a secure format....

CROSSWORD 2025-09-01

CROSSWORD crossword puzzle
Across
  1. Facility used to house computer systems and associated components
  2. Combination of public and private cloud services
  3. Delay in data transfer between client and server
  4. Energy sources like wind and solar for powering data centers
  5. Reducing expenses while maintaining performance in cloud
  6. Systems used in data centers to regulate temperature
  7. Distributing workloads across multiple servers
  8. Environmentally sustainable computing practices
Down
  1. Ability of a system to handle growth in workload
  2. Maximum rate of data transfer across a network path
  3. Technology that allows multiple virtual machines on a single physical server
  4. Capacity to recover quickly from failures
  5. Protecting cloud systems and data from cyber threats
  6. On-demand computing services over the internet
  7. Total greenhouse gas emissions caused by cloud operations

15 Clues: Capacity to recover quickly from failuresOn-demand computing services over the internetDistributing workloads across multiple serversEnvironmentally sustainable computing practicesAbility of a system to handle growth in workloadCombination of public and private cloud servicesDelay in data transfer between client and server...

cyber crime 2024-11-07

cyber crime crossword puzzle
Across
  1. - A secret string of characters used for authentication.
  2. - Part of the internet that requires special software to access, often associated with illicit activities.
  3. - Server that acts as an intermediary for requests from clients seeking resources from other servers.
  4. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  5. - Engineering technique that tricks people into giving away confidential information.
  6. - Collection of computers and devices connected for communication and resource sharing.
  7. - Technique of disguising communication from an unknown source as being from a known, trusted source.
  8. - Software update to fix bugs or vulnerabilities (same as Across).
  9. - A security system that controls incoming and outgoing network traffic.
  10. - A deceptive scheme intended to cheat or defraud someone.
Down
  1. - Person who gains unauthorized access to computer systems.
  2. - Software that gathers information from a computer without permission.
  3. - A software update that fixes vulnerabilities or improves functionality.
  4. - A software tool designed to take advantage of a security flaw.
  5. - Money demanded by hackers in exchange for access to compromised data.
  6. - Software that automatically displays or downloads advertising material.
  7. - Malicious software that gives unauthorized access to a computer system.
  8. - Malicious code that infects computer files and spreads to others.
  9. - A type of malware that spreads copies of itself across networks.
  10. - Prefix related to computers or computer networks.

20 Clues: - Prefix related to computers or computer networks.- A secret string of characters used for authentication.- A deceptive scheme intended to cheat or defraud someone.- Person who gains unauthorized access to computer systems.- A software tool designed to take advantage of a security flaw....

Cyber Security 2018-09-20

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2021-11-03

cyber security crossword puzzle
Across
  1. when someone you via email
  2. a virus indside something like an email
Down
  1. someone getting your details with no one knowing
  2. a word that keeps your computer safe
  3. something someones sent to you by someone looking for attention

5 Clues: when someone you via emaila word that keeps your computer safea virus indside something like an emailsomeone getting your details with no one knowingsomething someones sent to you by someone looking for attention

Cyber Security 2023-09-15

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2023-09-13

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2020-10-19

Cyber Security crossword puzzle
Across
  1. the process of encoding information.
  2. malware on your computer when it is not secured.
  3. the program and other operating information used by computers.
Down
  1. a device we use in our daily life. (hint: it ends with an R)
  2. something that protects our device from unauthorized access.

5 Clues: the process of encoding information.malware on your computer when it is not secured.a device we use in our daily life. (hint: it ends with an R)something that protects our device from unauthorized access.the program and other operating information used by computers.

Cyber Security 2020-08-24

Cyber Security crossword puzzle
Across
  1. es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
  2. es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
  1. son pequeños archivos que algunos sitios web guardan en tu ordenador. Las cookies almacenan información sobre tí, como nombre de usuario o información de registro, o preferencias de usuario, pero no espían, como el spyware.
  2. son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
  3. es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.

5 Clues: es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador....

Cyber security 2024-09-07

Cyber security crossword puzzle
Across
  1. a kind of malware demands for ransom
  2. deceive revealing personal info via emails
  3. Voice based phishing
Down
  1. injects viruses, Trojan’s
  2. fraudulent text messages

5 Clues: Voice based phishingfraudulent text messagesinjects viruses, Trojan’sa kind of malware demands for ransomdeceive revealing personal info via emails

Cyber security 2024-03-18

Cyber security crossword puzzle
Across
  1. Protected from or not exposed to danger or risk
  2. A fault or flaw in a computer program
  3. Look over a machine or system to detect potential vulnerabilities.
Down
  1. A complex system of interconnected elements
  2. Irrelevant or unsolicited messages sent over the Internet.

5 Clues: A fault or flaw in a computer programA complex system of interconnected elementsProtected from or not exposed to danger or riskIrrelevant or unsolicited messages sent over the Internet.Look over a machine or system to detect potential vulnerabilities.

CYBER SECURITY 2024-08-19

CYBER SECURITY crossword puzzle
Across
  1. taking away confidential information
  2. a secret word
  3. software used to prevent virus
Down
  1. malicious software or malware
  2. network that connects computers

5 Clues: a secret wordmalicious software or malwaresoftware used to prevent virusnetwork that connects computerstaking away confidential information

Cybersecurity Ethics, Laws & Standards 2025-10-09

Cybersecurity Ethics, Laws & Standards crossword puzzle
Across
  1. unauthorized access to computer systems
  2. moral principles that govern a person's behavior or actions
  3. policy that defines proper and improper use of technology and networks
  4. process of converting data into a code to prevent unauthorized access
  5. copies of data stored separately for recovery in case of loss
  6. using someone else's work without giving proper credit
  7. law that protects sensitive health information
  8. coordinates international cybercrime investigations
  9. security process requiring two separate forms of identification
  10. online platforms for sharing content and communication
  11. software designed to damage or disrupt a computer system
  12. legal right that grants the creator control over their work
  13. network security system that monitors and controls incoming and outgoing traffic
Down
  1. criminal activity carried out using computers or the internet
  2. trail of data created by a person’s online activity
  3. software that secretly monitors user activity
  4. option that controls who can see your online information
  5. protects us critical infrastructure from cyber threats
  6. deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
  7. unauthorized access and release of confidential information
  8. using digital technology to harass or intimidate someone
  9. crime of obtaining someone’s personal information to commit fraud
  10. manipulating people to give up confidential information
  11. study of ethical issues surrounding computer use
  12. protects student education records and data
  13. a secret word or phrase used to gain access to a system
  14. software designed to detect and remove malicious programs
  15. malware that locks users out of their files until a payment is made
  16. update to software that fixes vulnerabilities or bugs
  17. proper and respectful behavior when communicating online
  18. practices and steps taken to maintain system health and improve security
  19. internet crime complaint center that accepts and investigates online crime reports

32 Clues: unauthorized access to computer systemsprotects student education records and datasoftware that secretly monitors user activitylaw that protects sensitive health informationstudy of ethical issues surrounding computer usetrail of data created by a person’s online activitycoordinates international cybercrime investigations...

Cyber 2022-10-15

Cyber crossword puzzle
Across
  1. Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
  2. If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
  3. a type of software designed to help the user's computer detect viruses and avoid them.
  4. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
  5. (main objective of Cyber Security?)
Down
  1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
  2. (main objective of Cyber Security?)
  3. world’s very first antivirus program?
  4. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
  5. Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
  6. the hackers who's main motive is to gain financial profit by doing cyber crimes.
  7. DNS would translate any Domain name into ___________.
  8. (main objective of Cyber Security?)

13 Clues: (main objective of Cyber Security?)(main objective of Cyber Security?)(main objective of Cyber Security?)world’s very first antivirus program?DNS would translate any Domain name into ___________.the hackers who's main motive is to gain financial profit by doing cyber crimes....

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

Security 2022-04-13

Security crossword puzzle
Across
  1. Stun something
  2. What Chickens have
  3. Like a gun
  4. Rabbit
  5. You go ___ and you hit a strike
  6. Nighttime star.
  7. An animal that can swim underwater and can kill.
  8. Something to stun with flash or have an everlasting memory.
  9. 2 best____ in a room
  10. NNNNEEEEEEEEEEDS repair
  11. More Small people.
  12. Oppisite of Life
  13. Something you need to buy to get into a movie.
  14. Needs Repair.
  15. An animal
Down
  1. A light that u can turn off and on
  2. Bunny
  3. Oppisite of Dark
  4. A star in the day.
  5. Oppisite of Dull
  6. What a wolf has
  7. Oppisite of Death
  8. What rich people have.
  9. A break in
  10. I ___ in the challange
  11. You get back at someone
  12. an animal that can kill you and is sometimes brown.
  13. A red animal
  14. A small person.
  15. You ____ a child
  16. Something you need to see with

31 Clues: BunnyRabbitAn animalLike a gunA break inA red animalNeeds Repair.Stun somethingNighttime star.What a wolf hasA small person.Oppisite of DarkOppisite of DullYou ____ a childOppisite of LifeOppisite of DeathWhat Chickens haveA star in the day.More Small people.2 best____ in a roomWhat rich people have.I ___ in the challangeYou get back at someone...

Security 2017-08-20

Security crossword puzzle
Across
  1. Second highest principal in SQL Server.
  2. Turned off when a database is attached
  3. Not NTLM
  4. Not even the sysadmin's can see this data.
  5. aXXX@XXXX.com
  6. Protocol used when connecting from the server SQL is on.
  7. Pretending to be someone else
  8. One SQL instance talking to another.
  9. Security trump
  10. Contains 0 or more windows users.
  11. Uses the private key to encrypt and decrypt data.
  12. Used to contain a windows id and password.
Down
  1. Add a permission
  2. Permission required to create stored procedures.
  3. Required for all encryption in SQL Server
  4. One way encryption.
  5. This database is isolated from other databases.
  6. Used to add a John Hancock to a stored procedure.
  7. Workstation-Server-Server
  8. Alias for a credential
  9. Uses both a public and private key.
  10. Bobby
  11. Add random data to the string before encrypting it.
  12. Principal that contains other principals.
  13. Check who did what

25 Clues: BobbyNot NTLMaXXX@XXXX.comSecurity trumpAdd a permissionCheck who did whatOne way encryption.Alias for a credentialWorkstation-Server-ServerPretending to be someone elseContains 0 or more windows users.Uses both a public and private key.One SQL instance talking to another.Turned off when a database is attachedSecond highest principal in SQL Server....

Security 2013-08-04

Security crossword puzzle
Across
  1. An offence that can be summary or indictable?
  2. Section 494 of the Criminal Code of Canada deals with ________ arrest authority?
  3. When a person does not leave, after directed to do so, the person would considered to be __________
  4. Touch someone without consent, Intentionally, either directly or indirectly
  5. What does 10-4 mean?
  6. Surveillance from a place hidden from view is what type of Surveillance?
  7. Evidence of prior bad acts is __________ __________ evidence (2 words)
  8. A minor offence under the Criminal Code of Canada
  9. Without colour of right if you convert something to your own use it is considered ______?
  10. __________________ Laws are also called By-laws
  11. Level of Government that operates the OPP?
  12. A witness on the stand is giving what type of evidence?
  13. PIPEDA is a __________ act
  14. who's responsibility is safety in the workplace?
  15. a wrong against society
Down
  1. Under the Criminal Code of Canada the offence when a fire is deliberately set?
  2. a serious offernce
  3. section 10 of the Charter of Rights and Freedoms deals with rights upon ___________
  4. Fingerprints, Hair Samples, and Mineral Samples are considered what type of evidence?
  5. what does "Z" stand for in the Phonetic Alphabet?
  6. Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
  7. Class C fires involve _______________ equipment
  8. only the police can _______________
  9. term for evidence that is allowed in a trail or hearing
  10. A trail within a trail
  11. Who determines what evidence will be allowed in court?
  12. The act that regulates security guards in Ontario?
  13. all security guards shall act with honesty and ____________
  14. The police officers are __________ officers
  15. under the LLA (Liquor License Act) you can not arrest, you can only ____________

30 Clues: a serious offernceWhat does 10-4 mean?A trail within a traila wrong against societyPIPEDA is a __________ actonly the police can _______________Level of Government that operates the OPP?The police officers are __________ officersAn offence that can be summary or indictable?Class C fires involve _______________ equipment...

security 2023-02-27

security crossword puzzle
Across
  1. Interazione online ostile che comporta messaggi di insulto tra gli utenti
  2. Quella a 2 fattori è un tipo di ....... forte
  3. Simile a una password, ma generalmente più lunga per una maggiore sicurezza
  4. Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
  5. L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
  6. Una persona che prende o usa le informazioni del vostro computer
  7. Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
  8. Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
  9. Malware che si replica per diffondersi ad altri computer della rete
  10. Programma che registra i tasti premuti da un utente
  11. Genera e memorizza in modo sicuro password complesse in un unico luogo
Down
  1. Non aprire se non ci si fida del mittente
  2. Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
  3. Il computer avrà molti popup se ne viene infettato
  4. Una delle password più comuni nel 2022: un evergreen!
  5. L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
  6. _________ sempre il computer quando si lascia la scrivania
  7. Quando i criminali usano gli sms fake stanno cercando di fare….
  8. Un programma software progettato per prevenire i virus
  9. Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
  10. Chiamate o messaggi vocali fraudolenti

21 Clues: Chiamate o messaggi vocali fraudolentiNon aprire se non ci si fida del mittenteQuella a 2 fattori è un tipo di ....... forteIl computer avrà molti popup se ne viene infettatoProgramma che registra i tasti premuti da un utenteUna delle password più comuni nel 2022: un evergreen!Un programma software progettato per prevenire i virus...

Security 2025-08-14

Security crossword puzzle
Across
  1. A secret word or phrase used to gain access to an account
  2. Granted official permission to access or manage an account
  3. A feature that confirms client identity using a mobile app (two words)
  4. A person permitted to act on behalf of the account owner
  5. Consent given to perform specific actions
  6. Signs of suspicious or potentially fraudulent activity (two words)
  7. A method of verifying identity using vocal characteristics (two words)
  8. The ability to log into and manage an account via the internet (two words)
  9. Ability to access account online when security Q&A status is locked (two words)
  10. Someone other than the account owner involved in a call or transaction (two words)
Down
  1. Authorized access or actions on an account.
  2. Notifications or warnings about significant account activity or potential security concerns
  3. Actions intended to fraudulently gain unauthorized access to
  4. Abbreviation for Additional Security Questions
  5. How many attempts do callers have to pass decedent security
  6. The process of identifying and resolving system or device issues (two words)
  7. The careful and thorough evaluation of potential risks and issues (two words)
  8. An electronic tool used to access accounts, such as a phone or computer (two words)
  9. A confidential code used to confirm identity and enable access
  10. personal prompts used to verify identity during login (two words)
  11. A unique identifier used to access an account
  12. Cues or hints provided to assist in answering security questions

22 Clues: Consent given to perform specific actionsAuthorized access or actions on an account.A unique identifier used to access an accountAbbreviation for Additional Security QuestionsA person permitted to act on behalf of the account ownerA secret word or phrase used to gain access to an accountGranted official permission to access or manage an account...

Quiet their watching you.... 2023-07-16

Quiet their watching you.... crossword puzzle
Across
  1. Breach Result of a hacker breaking into a system
  2. Attack an attempt to breach a security boundary
  3. method of connecting a series of computers
  4. malware used to spy on your computer activities
  5. Horse computer program that looks innocent
  6. video or audio that has been altered
  7. document storage
  8. Where a hacker poses as legitimate business
  9. When someone is tricked into clicking on one object when they want to click on another
  10. Test commonly referred to as a Pen Test
  11. collection of programs that allow hackers to access a computer
Down
  1. system to shield against viruses
  2. document storage
  3. Malware that highjacks your system
  4. Apps that instruct a computer to carry out a task
  5. process of identifying a users identity
  6. Black Hat Tool
  7. When a hacker changes the IP address that comes from a trusted source
  8. Malware that can reproduce itself
  9. Address Pretty much anything connected to the internet

20 Clues: Black Hat Tooldocument storagedocument storagesystem to shield against virusesMalware that can reproduce itselfMalware that highjacks your systemvideo or audio that has been alteredprocess of identifying a users identityTest commonly referred to as a Pen Testmethod of connecting a series of computersWhere a hacker poses as legitimate business...

Security 2012-11-03

Security crossword puzzle
Across
  1. A trojan appears to be __________ at first site
  2. There are 8/9 different _____________ in the DPA
  3. of the first worms was called the ______ worm
  4. A good password should contain symbols, numbers, uppercase and ____________letters
  5. The only way to ensure you never get malware on your computer is to ______ the internet cable
  6. __________ in emails can contain viruses
  7. Religion and medical records are considered ______________ information
  8. A ____________ examines all the network traffic coming in and going out of your computer
  9. __________ is the process of making an exact copy of the contents of a HD
Down
  1. Malware intended to steal important personal information
  2. The DPA states that business should ________ data once they no longer need it
  3. To prevent loss of data one needs to ___________ frequently
  4. Before accessing an account one needs to enter a _________ and password
  5. To protect yourself from malware you need to install an ____________
  6. The Data ________ Act regulates the use of data for all businesses
  7. A copy of important data should be kept in an ________ location
  8. One should never follow links sent by _______________ or unknown sources
  9. The act of accessing another person's computer without permission
  10. Dropbox is an ___________ storage site
  11. A malicious software that spreads with the intention of corrupting or deleting files
  12. Passwords should always be kept ______

21 Clues: Dropbox is an ___________ storage sitePasswords should always be kept ________________ in emails can contain virusesof the first worms was called the ______ wormA trojan appears to be __________ at first siteThere are 8/9 different _____________ in the DPAMalware intended to steal important personal information...

Security 2012-11-03

Security crossword puzzle
Across
  1. A good password should contain symbols, numbers, uppercase and ____________letters
  2. One should never follow links sent by _______________ or unknown sources
  3. Before accessing an account one needs to enter a _________ and password
  4. one of the first worms was called the ______ worm
  5. Religion and medical records are considered ______________ information
  6. Malware intended to steal important personal information
  7. A copy of important data should be kept in an ________ location
Down
  1. __________ in emails can contain viruses
  2. A ____________ examines all the network traffic coming in and going out of your computer
  3. A malicious software that spreads with the intention of corrupting or deleting files
  4. __________ is the process of making an exact copy of the contents of a HD
  5. The act of accessing another person's computer without permission
  6. The Data ________ Act regulates the use of data for all businesses
  7. There are 8/9 different _____________ in the DPA
  8. A trojan appears to be __________ at first site
  9. Passwords should always be kept ______
  10. To protect yourself from malware you need to install an ____________
  11. The only way to ensure you never get malware on your computer is to ______ the internet cable
  12. The DPA states that business should ________ data once they no longer need it
  13. Dropbox is an ___________ storage site
  14. To prevent loss of data one needs to ___________ frequently

21 Clues: Passwords should always be kept ______Dropbox is an ___________ storage site__________ in emails can contain virusesA trojan appears to be __________ at first siteThere are 8/9 different _____________ in the DPAone of the first worms was called the ______ wormMalware intended to steal important personal information...

Security 2013-06-27

Security crossword puzzle
Across
  1. Stick to what path when in the freight yard?
  2. Your MSIC must be above what?
  3. What does the I stand for in MSIC?
  4. What type of industry are we in?
  5. What colour should drivers follow in the freight yard on the way in?
  6. What is the name of the contractor company for security?
  7. What lights must be on when in the freight yard?
  8. What channel do you call for Security?
  9. What must a non MSIC holder have whilst in the LRZ?
  10. What does the L stand for in LRZ?
  11. A non MSIC holder must also have what for access into the LRZ?
Down
  1. Who must you radio to have the vehicle booth gates opened/closed?
  2. Who has the final say when allowing freight to enter the yard?
  3. What does the T stand for in OTS?
  4. What need must you have to request an MSIC?
  5. What must you display in the LRZ?
  6. What is your base channel when receiving radio calls?
  7. Who takes passengers on/off via the buggy?
  8. What is the code number for a Firearm?
  9. What is Angela’s title other than Manager?

20 Clues: Your MSIC must be above what?What type of industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the L stand for in LRZ?What does the I stand for in MSIC?What channel do you call for Security?What is the code number for a Firearm?Who takes passengers on/off via the buggy?...

Principles of Medical Informatics Ethics 2024-02-22

Principles of Medical Informatics Ethics crossword puzzle
Across
  1. Obtaining permission from someone before the use of their personal data.
  2. The clinician's moral obligation to act solely for the benefit of the patient.
  3. The process of safeguarding private patient information.
Down
  1. The process of transforming any given key or a string of characters into another value.
  2. A core duty in medical practice that ensures patient privacy.
  3. Cyber security measures are designed to protect ______ from attack.
  4. Entails the procedures and processes by which one party justifies and takes responsibility for its activities.

7 Clues: The process of safeguarding private patient information.A core duty in medical practice that ensures patient privacy.Cyber security measures are designed to protect ______ from attack.Obtaining permission from someone before the use of their personal data.The clinician's moral obligation to act solely for the benefit of the patient....

October Crossword - Cyber Security 2022-02-07

October Crossword - Cyber Security crossword puzzle
Across
  1. software designed to prevent, detect, and remove malware
  2. cyberattack that tries already compromised usernames and passwords in other sites
  3. username and ... should be complex
  4. any crime committed electronically
  5. pretending to be someone and accessing their information
Down
  1. fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
  2. ensures that you are the only one who has access to your account
  3. campaign launched in 2010 by the Department of Homeland Security
  4. any software intended to damage, disable, or give someone unauthorized access
  5. agency that informs and educates about cybersecurity

10 Clues: username and ... should be complexany crime committed electronicallyagency that informs and educates about cybersecuritysoftware designed to prevent, detect, and remove malwarepretending to be someone and accessing their informationensures that you are the only one who has access to your account...

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  2. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
  3. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  4. They are software programs created to automatically perform specific operations
  5. It is a string of characters used to verify the identity of a user during the authentication process.
  6. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
  1. It is a global system of interconnected computer networks
  2. It is a type of malware that functions by spying on user activity without their knowledge.
  3. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. It is a type of malware that automatically delivers advertisements.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malware that automatically delivers advertisements.
  2. They are software programs created to automatically perform specific operations
  3. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
  4. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  5. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
  1. It is a global system of interconnected computer networks
  2. It is a string of characters used to verify the identity of a user during the authentication process.
  3. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  4. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  5. It is a type of malware that functions by spying on user activity without their knowledge.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

pocketsiem's cyber security crossword 2023-04-27

pocketsiem's cyber security crossword crossword puzzle
Across
  1. Malicious software that is designed to cause damage to a computer system
  2. A type of attack where the attacker attempts to guess a user's password
  3. A type of software that is designed to prevent unauthorized access to a computer system
  4. A network of compromised computers that can be used to carry out attacks
  5. A program that monitors and controls incoming and outgoing network traffic
  6. A type of attack that involves taking control of a computer or device and demanding payment for its release
  7. The practice of tricking someone into giving away sensitive information
  8. The act of finding vulnerabilities in computer systems in order to exploit them
Down
  1. The practice of using deception to trick someone into revealing sensitive information
  2. A type of encryption that uses two keys: one for encryption and one for decryption
  3. A method of verifying a user's identity through a combination of something they know, have, and are

11 Clues: A type of attack where the attacker attempts to guess a user's passwordThe practice of tricking someone into giving away sensitive informationMalicious software that is designed to cause damage to a computer systemA network of compromised computers that can be used to carry out attacks...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. A fake email that tricks you into giving personal info
  2. Breaking a system's security to test or exploit it
  3. Pretending to be someone else online
  4. A small file that tracks your website activity
  5. Taking someone else's work without credit
  6. type of malware that is designed to spy on user activity.
  7. The unauthorize use of copyrighted content
  8. The trail of data you leave online
Down
  1. The method of verifying your identity.
  2. Prevents unauthorized access to or from a private network
  3. Stealing and using someone else's online identity
  4. Legal protection for original digital content
  5. Makes judgement on cyber crimes.
  6. A secret combination of characters that protects your account
  7. Software that protects against malicious programs
  8. Unwanted, irrelevant messages sent over internet, usually advertising or phishing.

16 Clues: Makes judgement on cyber crimes.The trail of data you leave onlinePretending to be someone else onlineThe method of verifying your identity.Taking someone else's work without creditThe unauthorize use of copyrighted contentLegal protection for original digital contentA small file that tracks your website activity...

SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) 2025-05-12

SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) crossword puzzle
Across
  1. GDO
  2. TRAINING CAP
Down
  1. HAT
  2. SECURITY SETTINGS

4 Clues: GDOHATTRAINING CAPSECURITY SETTINGS

cyber security 2021-02-12

cyber security crossword puzzle
Across
  1. don't like roman
  2. come out in rain
  3. to remain safe
Down
  1. a type of malicious software
  2. not known or meant to be seen by others

5 Clues: to remain safedon't like romancome out in raina type of malicious softwarenot known or meant to be seen by others

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
  2. in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
Down
  1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. a malware which replicates it self eating your storage its harmless when it doesn't contain a virus
  3. is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

5 Clues: a malware which replicates it self eating your storage its harmless when it doesn't contain a virussoftware which is specifically designed to disrupt, damage, or gain authorized access to a computer system.is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm....

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. a wall or partition designed to do harm
  2. to fight a virus
Down
  1. A type of virus
  2. intending or intended to do harm.
  3. allows cyber security hackers to take control

5 Clues: A type of virusto fight a virusintending or intended to do harm.a wall or partition designed to do harmallows cyber security hackers to take control

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. you can type it but you can also use your face for it to work.
  2. this stops you accessing scam websites
  3. this is where someone is looking over your shoulders to try see your passwords
Down
  1. this is where someone sends a message on one of your friends devices
  2. when people disguise them selves as another trying to take advantage of you

5 Clues: this stops you accessing scam websitesyou can type it but you can also use your face for it to work.this is where someone sends a message on one of your friends deviceswhen people disguise them selves as another trying to take advantage of youthis is where someone is looking over your shoulders to try see your passwords

BT 2021-07-21

BT crossword puzzle
Across
  1. Australian government policy used to protect systems and information for cyber threats
  2. the maximum amount of megabytes than can be sent via Defence email
  3. Spills Something you want to prevent/avoid in order to maintain your security responsibilites
  4. one of the main software applications used by Defence members, particularly PCS
  5. The manual which describes the policies and roles and responsibilities of Defence personnel while using ICT
  6. The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)
Down
  1. The equipment and resources that support Defence employees in the conduct of their business
  2. the main form of electronic communication used by Defence members
  3. The framework used by Defence to define protective security policies and procedures

9 Clues: the main form of electronic communication used by Defence membersthe maximum amount of megabytes than can be sent via Defence emailone of the main software applications used by Defence members, particularly PCSThe DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)...

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. errors in someone's code or program
  2. technology that that aids in gathering information
Down
  1. computer program that replicates itself in order to spread to other computers
  2. allows a cyber security attacker to take control
  3. someone who seeks and exploits weaknesses in a computer system

5 Clues: errors in someone's code or programallows a cyber security attacker to take controltechnology that that aids in gathering informationsomeone who seeks and exploits weaknesses in a computer systemcomputer program that replicates itself in order to spread to other computers

Cyber Security 2021-06-06

Cyber Security crossword puzzle
Across
  1. The internet is _______.
  2. Don't put ________information online.
  3. Don't forget about smart _____ safety.
Down
  1. Handle hacking _____________.
  2. If you get hacked, change your ________.

5 Clues: The internet is _______.Handle hacking _____________.Don't put ________information online.Don't forget about smart _____ safety.If you get hacked, change your ________.

Cyber Security 2023-09-21

Cyber Security crossword puzzle
Across
  1. It is a way to scramble data so that only authorized parties can unscramble it.
  2. It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
Down
  1. It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
  2. It is a network security device that monitors traffic to or from your network
  3. It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.

5 Clues: It is a network security device that monitors traffic to or from your networkIt is a way to scramble data so that only authorized parties can unscramble it.It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication....

Cyber Bullying Crossword Puzzle 2013-06-04

Cyber Bullying Crossword Puzzle crossword puzzle
Across
  1. Be ______ for your words and actions online.
  2. When cyber bullying, we should ______ the evidence as it will help in further investigation.
  3. cyber bullying can _______ people’s feeling.
  4. Cyber bullying is using the ______ or phone to repeatedly say rude and hurtful things about a person.
  5. Do not ________ or respond bad word to others.
Down
  1. Stop _________ people hurtful names.
  2. when you are being cyber bullied, ________ the incident.
  3. ________ means posting or sending a lot of unnecessary information.
  4. ___________ means online manners.
  5. _______ bullying is to bully others online.

10 Clues: ___________ means online manners.Stop _________ people hurtful names._______ bullying is to bully others online.cyber bullying can _______ people’s feeling.Be ______ for your words and actions online.Do not ________ or respond bad word to others.when you are being cyber bullied, ________ the incident....

Browsing safety 2025-06-13

Browsing safety crossword puzzle
Across
  1. is any criminal activities intended to harm anyone using a computer and an internet connection . = Cybercrime
  2. A collection of technologies, process, and practices designed to protect network. = Cyber security
  3. _____ are like online thieves.= Cyber criminals
Down
  1. An illegal entry into a computer system or network. = Hacking
  2. Short form of vital information resources under seize.= Virus
  3. is act of sending an email to a user= phishing

6 Clues: is act of sending an email to a user= phishing_____ are like online thieves.= Cyber criminalsAn illegal entry into a computer system or network. = HackingShort form of vital information resources under seize.= VirusA collection of technologies, process, and practices designed to protect network. = Cyber security...

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

Security 2013-06-27

Security crossword puzzle
Across
  1. What is the code number for a Firearm?
  2. What colour should drivers follow in the freight yard on the way in?
  3. What does the T stand for in OTS?
  4. What is your base channel when receiving radio calls?
  5. What type of industry are we in?
  6. What is Angela’s title other than Manager?
  7. Who has the final say when allowing freight to enter the yard?
  8. Stick to what path when in the freight yard?
  9. A non MSIC holder must also have what for access into the LRZ?
Down
  1. What does the I stand for in MSIC?
  2. What lights must be on when in the freight yard?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. Who takes passengers on/off via the buggy?
  5. What need must you have to request an MSIC?
  6. What is the name of the contractor company for security?
  7. What does the L stand for in LRZ?
  8. What must a non MSIC holder have whilst in the LRZ?
  9. What must you display in the LRZ?
  10. Your MSIC must be above what?
  11. What channel do you call for Security?

20 Clues: Your MSIC must be above what?What type of industry are we in?What does the T stand for in OTS?What does the L stand for in LRZ?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?...

security 2013-05-09

security crossword puzzle
Across
  1. A NSF cheque in a court procedure is what type of evidence?
  2. A security guard should keep a good?
  3. Crossword
  4. Class B fires involve what type of liquids
  5. An offence under section 494 (1) ccc anyone can arrest found committing
  6. Security guards are ________ Peace Officers
  7. Under the Liquor License Act a security guard may only ______ a person
  8. 10-9 means?
  9. Section 8 of the Charter Of Rights deals with?
  10. What would go off in most buildings if there was a fire?
Down
  1. Who does the security guard answer to ultimately when on duty
  2. When a witness is on the stand they are giving what type of evidence?
  3. The Trespass to Property Act is?
  4. 10-3 means stop ?
  5. Once a security guard arrests a person they must contact?
  6. A criminal offence considered a minor offence
  7. Section 26 of the Criminal Code regulates the amount of?
  8. Who can report a security guard for code of conduct violation?
  9. The Criminal Code is a ________ act
  10. A fingerprint is what type of evidence?
  11. A gun is what type of evidence?

21 Clues: Crossword10-9 means?10-3 means stop ?A gun is what type of evidence?The Trespass to Property Act is?The Criminal Code is a ________ actA security guard should keep a good?A fingerprint is what type of evidence?Class B fires involve what type of liquidsSecurity guards are ________ Peace OfficersA criminal offence considered a minor offence...

Security 2025-03-31

Security crossword puzzle
Across
  1. Indicators of potential fraud or suspicious activity (two words)
  2. A secret word or phrase used to gain access to an account.
  3. A person authorized to act on behalf of the account owner
  4. A unique identifier used to log into an account
  5. The careful and thorough evaluation of potential risks and issues (two words)
  6. A feature that allows clients to verify their identity using a mobile app (two words)
  7. Authentication method using the client's voice (two words)
  8. Abbreviation for Additional Security Questions
  9. Someone other than the account owner involved in a call or transaction (two words)
  10. Consent given to perform specific actions
Down
  1. Granted official permission to access or manage an account
  2. The process of diagnosing and resolving technical issues (two words)
  3. An electronic tool used to access accounts, such as a phone or computer (two words)
  4. A secret code used to verify identity and grant access
  5. Permission granted to access or perform actions on an account
  6. Personal questions used to verify identity during authentication (two words)
  7. Deceptive actions intended to gain unauthorized access to assets
  8. The ability to log into and manage an account online (two words)
  9. Notifications or warnings about important account activities or security issues
  10. Providing guidance or hints to help someone answer questions

20 Clues: Consent given to perform specific actionsAbbreviation for Additional Security QuestionsA unique identifier used to log into an accountA secret code used to verify identity and grant accessA person authorized to act on behalf of the account ownerGranted official permission to access or manage an account...

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Pokemon TYPES <---------------------------- 2022-11-01

Pokemon TYPES <---------------------------- crossword puzzle
Across
  1. shiny crystals
  2. cold
  3. tiny and disgusting
  4. poisonous
  5. flies and might breathe fire
  6. very strong and is most effective against five other types of Pokemon
  7. shocking
  8. mainly for nature-y type Pokemon
  9. shiny!!!
  10. for Pokemon in the sky
  11. WHO TURNED OFF LIGHTS??!!!
Down
  1. uses mind powers and is very intelligent
  2. for strong Pokemon on the ground
  3. boo...
  4. mostly found in the ocean
  5. stony
  6. it burns!!!
  7. the most basic type
  8. this type for Pokemon can be found in the cyber simulation
  9. music
  10. cute and tough

21 Clues: coldstonymusicboo...shockingshiny!!!poisonousit burns!!!shiny crystalscute and toughtiny and disgustingthe most basic typefor Pokemon in the skymostly found in the oceanWHO TURNED OFF LIGHTS??!!!flies and might breathe firefor strong Pokemon on the groundmainly for nature-y type Pokemonuses mind powers and is very intelligent...

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  2. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
  3. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  4. They are software programs created to automatically perform specific operations
  5. It is a string of characters used to verify the identity of a user during the authentication process.
  6. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
  1. It is a global system of interconnected computer networks
  2. It is a type of malware that functions by spying on user activity without their knowledge.
  3. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. It is a type of malware that automatically delivers advertisements.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

Cyber Security For Teenagers 2024-01-04

Cyber Security For Teenagers crossword puzzle
Across
  1. Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)
  2. Apabila menerima emel dari sumber yang tidak dikenali, lebih baik melakukan __________ dan periksa sebelum membuka lampiran atau mengklik pautan (8 huruf)
  3. Inisiatif yang melibatkan aktiviti menyelidik dan menganalisis untuk mencari kelemahan dalam sistem keselamatan siber (11 huruf)
  4. Keadaan di mana sesuatu peranti atau sistem tidak lagi berfungsi dengan baik akibat serangan atau masalah teknikal (5 huruf)
  5. Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)
  6. Inisiatif untuk mengajar remaja mengenai keselamatan siber dan etika dalam penggunaan teknologi (9 huruf)
Down
  1. Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)
  2. Bahagian penting dalam keselamatan siber; pastikan perisian sentiasa ________ untuk menghadapi ancaman terkini (7 huruf)
  3. Jenis serangan di mana penyerang cuba memperoleh maklumat peribadi melalui pertanyaan palsu atau manipulasi emosi (8 huruf)
  4. Untuk melindungi privasi, elakkan daripada memberikan maklumat peribadi di _________ sosial secara terbuka (5 huruf)

10 Clues: Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)...

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

Security 2020-03-04

Security crossword puzzle
Across
  1. продавец
  2. разрешать
  3. возможность идентификации
  4. одна из составляющих триады
  5. перемена
  6. надежность
  7. Устройство
  8. включать
  9. способ
Down
  1. невозможность отказа от авторства
  2. телекоммуникации
  3. служба поддержки
  4. лимит
  5. полезность
  6. подлинность
  7. ядро
  8. правда
  9. получать
  10. фальсификация
  11. попытка

20 Clues: ядролимитправдаспособпопыткапродавецпеременаполучатьвключатьразрешатьполезностьнадежностьУстройствоподлинностьфальсификациятелекоммуникациислужба поддержкивозможность идентификацииодна из составляющих триадыневозможность отказа от авторства