cyber security Crossword Puzzles
CISO Crossword Quiz - 1925 2025-05-14
Across
- Face swapping, lip-syncing, Audio Overlays, Voice-Only Cloning, Full-Body Re-enactment techniques are used in which type of cyber scam
- A software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features
- The action or process of spoiling the appearance of a website in a cyber attack
- A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
- The process of monitoring and capturing all data packets passing through a given network
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
Down
- The unethical act of violating the privacy of an organization in order to leak internal data or confidential information
- An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
- The use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
- Phishing Techniques used to target senior executives of an organization
10 Clues: Phishing Techniques used to target senior executives of an organization • The action or process of spoiling the appearance of a website in a cyber attack • The process of monitoring and capturing all data packets passing through a given network • ...
Computer Networks 2019-05-16
Across
- gaining unauthorised access to a computer.
- computers connected that share information
- unique identification (IP or MAC)
- programs used by a computer
- a copper cable used to connect computers to a network.
- wireless technology used for transmitting data over short distances.
Down
- Local Area Network a network of computers that covers a small area
- equipment adapted for a particular purpose
- ways to protect data on a computer
- a set of rules for how messages are transmitted across networks
- packet a piece of data sent over a network.
11 Clues: programs used by a computer • unique identification (IP or MAC) • ways to protect data on a computer • equipment adapted for a particular purpose • gaining unauthorised access to a computer. • computers connected that share information • packet a piece of data sent over a network. • a copper cable used to connect computers to a network. • ...
Week 4 – The Cyber Sleuth’s Final Puzzle 2025-10-21
Across
- Another word for a fake or deceptive email
- What hackers send to trick you into clicking bad links
- Software that secretly infects your computer
- Security feature that requires a code and a password
- A common red flag to identify a phishing email
- A code that proves who you are when logging in
- You should never reuse the same one twice
Down
- Keeping systems protected by installing patches
- Something you click that can hide danger
- Small image that can link to malicious sites
- What you should never share with coworkers or friends
- Where you report suspicious messages
- The process of teaching staff to avoid cyber threats
13 Clues: Where you report suspicious messages • Something you click that can hide danger • You should never reuse the same one twice • Another word for a fake or deceptive email • Small image that can link to malicious sites • Software that secretly infects your computer • A common red flag to identify a phishing email • A code that proves who you are when logging in • ...
VOCABULARY REVIEW 2025-02-20
Across
- - object used to write with
- - a fluid used to make impressions on paper
- - the ability of consumption to be maintained at a certain rate or level
- - use of robotics to aid in large scale production
- security - the field of digital privacy
- - valuable materials, usually in the form of precious metals or gems
Down
- - Technology that can manipulate individual atoms or molecules
- - further develop technological advancement
- - human remains found in Egypt
- - material used for writing on in Egypt
- - large Egyptian structures, usually holding deceased pharaohs
- intelligence - computer system that can complete tasks usually done by humans
- - a person who studies human history through the excavation of historical sites
13 Clues: - object used to write with • - human remains found in Egypt • - material used for writing on in Egypt • security - the field of digital privacy • - further develop technological advancement • - a fluid used to make impressions on paper • - use of robotics to aid in large scale production • - Technology that can manipulate individual atoms or molecules • ...
Impact of AI and blockchain on modern banking 2025-11-25
Across
- Verification of customer identity using AI biometrics.
- Software that detects suspicious transactions to prevent fraud
- Banking using mobile phones or apps
- Transactions without physical money.
- AI-powered communication tools used by banks for customer service.
Down
- A system where control is distributed rather than held by a central authority.
- Protection of banking data from cyber threats.
- A record of transactions stored in blocks and linked securely
- Technology that combines finance and digital innovaions
- A digital ledger system used for secure transactions
- Studying large data to make predictions for decision-making
- Replacing human efforts with intelligent systems to improve efficiency
12 Clues: Banking using mobile phones or apps • Transactions without physical money. • Protection of banking data from cyber threats. • A digital ledger system used for secure transactions • Verification of customer identity using AI biometrics. • Technology that combines finance and digital innovaions • Studying large data to make predictions for decision-making • ...
How can you report hacking? 2022-05-18
5 Clues: Computer fraud to... • report@________.gov.uk • Computer fraud to the... • to National Cyber Security Centre • Received a ____ text?, forward to 7726 (free)
EGBANK Frontier Induction 2024-02-27
Across
- Provides information about all the financial inclusion tools EGBANK tools
- You can get in this session tips to avoid cyber security hacks
- All you need to know about EGBANK's organizational structure and performance management cycle
Down
- Introduces the EGBANK's advertisement side
- Helps you to know what formal dress code looks like
- Introduce you to EGBANK main health care benefits
6 Clues: Introduces the EGBANK's advertisement side • Introduce you to EGBANK main health care benefits • Helps you to know what formal dress code looks like • You can get in this session tips to avoid cyber security hacks • Provides information about all the financial inclusion tools EGBANK tools • ...
Information Security Crossword - 4 2013-07-09
Across
- Fulfilling contractual requirements is also a ________ requirement.
- Internet related.
- Ensuring ________ safety is in the scope of information security.
- Division of office space into areas with varying degree of physical access controls.
- A server getting infected with virus leads to the loss of ________ of the computer system.
Down
- Generates random one time passwords.
- Emergency exits always open _________.
- Personal computers requires ______ as much as office systems.
- Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
- Coming out safely from structure in danger.
10 Clues: Internet related. • Generates random one time passwords. • Emergency exits always open _________. • Coming out safely from structure in danger. • Personal computers requires ______ as much as office systems. • Ensuring ________ safety is in the scope of information security. • Fulfilling contractual requirements is also a ________ requirement. • ...
Meta Product Security 2024-04-25
Across
- Secure messaging app with end-to-end encryption
- Network security system to block unauthorized access
- Data providing information about other data
- Social media platform with over 2.7 billion monthly active users
- Simulated cyber attack to test system defenses
- Photo and video sharing platform with over 1 billion active users
Down
- Process of verifying user identity
- Method of protecting data by converting it into code
- Open standard for authorization and authentication
- Secure protocol for online data transfer (now replaced by TLS)
10 Clues: Process of verifying user identity • Data providing information about other data • Simulated cyber attack to test system defenses • Secure messaging app with end-to-end encryption • Open standard for authorization and authentication • Network security system to block unauthorized access • Method of protecting data by converting it into code • ...
Communication Review 2025-02-28
6 Clues: - bullying someone online • - someone you do not know • Media- The communication on the internet • - the condition of being protected from danger • - tricking someone into giving personal in formation • - Security software that protects against internet threats
Learnig 2023-11-03
Brain-Riddle Round 2 2025-02-12
Across
- Temporary storage that speeds up data retrieval.
- A temporary interaction between a user and a website.
- An intermediary server between a user and the internet.
- A language used to style web pages.
- A method of hiding data within other files.
- A communication endpoint for network connections.
Down
- The data sent back from a server after a request.
- A process of converting data into a fixed-size value.
- A software vulnerability unknown to the vendor.
- The part of a cyber attack that carries malicious code.
- A set of rules for communication between software.
- A security feature that controls web resource access.
- A network utility used to test connectivity.
- A file containing code for automation.
- A standard language for creating web pages.
15 Clues: A language used to style web pages. • A file containing code for automation. • A method of hiding data within other files. • A standard language for creating web pages. • A network utility used to test connectivity. • A software vulnerability unknown to the vendor. • Temporary storage that speeds up data retrieval. • The data sent back from a server after a request. • ...
Watch Out, We're Watching ... 2024-04-03
Across
- Unauthorized access or data compromise event.
- Compulsively scrolling through negative news, causing anxiety or distress.
- Information collected and analyzed for decision making.
- Keeping safe from harm.
- What was compromised due to unauthorized data collection?
- Your favorite english teacher!
- Name of the firm involved in the 2018 data privacy scandal.
Down
- The anxiety of feeling left out from experiences others are having.
- Financial state Cambridge Analytica declared in 2018.
- Protection against unauthorized access or cyber threats.
- European data protection regulation enacted in response to privacy concerns.
- Weaknesses in a website that can be exploited by attackers.
- Complex computer processes used to analyze user data.
- Moral principles that govern a person's behavior.
- Type of app used to collect data on Facebook users.
15 Clues: Keeping safe from harm. • Your favorite english teacher! • Unauthorized access or data compromise event. • Moral principles that govern a person's behavior. • Type of app used to collect data on Facebook users. • Financial state Cambridge Analytica declared in 2018. • Complex computer processes used to analyze user data. • ...
Vocab Review 2022-07-24
Across
- _____rights/issues
- a system of government where people of a country can vote to elect their leaders
- the environmental______of tourism
- that is legally or officially acceptable
- a feeling that you have a link with somebody/something or are part of a group
- a device that can react to light, heat, pressure, etc. in order to make a machine
- Kingdom of Talossa;Sealand; Liberians are______
- someone who steals your information through the internet
- every adult has the right to vote
Down
- antonym of specific
- racial/social/gender______
- someone who is rich and powerful
- a country that has a king or a queen as the leader
- the activities involved in protecting Sth
- connected with electronic communication networks, especially the internet
15 Clues: _____rights/issues • antonym of specific • racial/social/gender______ • someone who is rich and powerful • the environmental______of tourism • every adult has the right to vote • that is legally or officially acceptable • the activities involved in protecting Sth • Kingdom of Talossa;Sealand; Liberians are______ • a country that has a king or a queen as the leader • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
Introduction to Cyber Security - Harjap Nahal 2023-09-08
Across
- protects your data including employee and customer data
- protecting data and the systems that store it from attacks
- Operating information used by the computer
- offer services to the client such as outsourced technology support
- creates a copy of the data that can be recovered incase something happens
- bring up to date, modernize
- prevents phishing attacks from happening
- unauthorized parties gaining access to confidential information
- used to protect data from being stolen, changed, or compromised
- an action of fraud
Down
- the process of verifying a user or device before allowing access to a system or resources
- a cyber attack where someone tricks other computers networks
- to keep an eye on something
- an attempt by hackers to damage or destroy a computer network or system
- secure place to store online content
- checking or proving something is true
- something that protects and gives safety
- tricking internet users into revealing their personal or private information
- needed to get into something
- encrypts data sent over by the internet to prevent hackers from seeing it
20 Clues: an action of fraud • to keep an eye on something • bring up to date, modernize • needed to get into something • secure place to store online content • checking or proving something is true • something that protects and gives safety • prevents phishing attacks from happening • Operating information used by the computer • protects your data including employee and customer data • ...
Computer Crime and Cyber Security (KS3) 2025-06-06
Across
- This type of attack tries to crack a password by checking words from a dictionary.
- The way you sit, which can affect your back health when using computers.
- Obtaining personal information, like passwords, by looking over someone's shoulder.
- A legal framework in the UK that protects personal information, updated in 2018.
- A boolean value representing logical false (from starter activity).
- An error in the program's thinking that causes unexpected results, even if it runs.
- This type of email scam tries to trick you into revealing personal information like login details.
- A problem that can arise from looking at screens for too long.
- This scam promises large sums of money but requires an upfront payment.
- A specific type of malicious software disguised as a legitimate program.
- A type of malware that is able to replicate itself.
- Malicious software.
- A condition caused by repeating the same actions over and over, making it painful to type or use a mouse.
Down
- When files are scrambled and unreadable, often by ransomware.
- Legal protection for the owner of a creative work from illegal copying.
- Secret words or phrases used to protect accounts and systems.
- Information directly linked to a person, like their name or mobile number.
- Accessing a computer system or files without permission.
- The act of illegally accessing a computer or data without permission.
- The organisation in the UK responsible for data protection.
- Files sent with an email, which can sometimes contain malware.
- A type of fire extinguisher safe for electrical fires.
- This type of attack attempts to guess a password by trying every single combination.
- Copying someone else's work and presenting it as your own.
- Malware that encrypts files and demands payment for the decryption key.
- Penalties that can be issued for serious copyright offences or data breaches.
- Storing a copy of data to restore from if original files are lost or encrypted.
- The process of finding and fixing errors in code.
- Unwanted or junk email.
- An emotion expressed by the word "Blimey".
30 Clues: Malicious software. • Unwanted or junk email. • An emotion expressed by the word "Blimey". • The process of finding and fixing errors in code. • A type of malware that is able to replicate itself. • A type of fire extinguisher safe for electrical fires. • Accessing a computer system or files without permission. • ...
CTI Crossword 2025-02-18
Across
- A tool for analyzing logs for security incidents (owned by Cisco)
- A group of indicators that define a malicious activity pattern
- A system that monitors network traffic for malicious activity
- Malware that locks files and demands payment
Down
- Technique for disguising malicious activity as legitimate
- Unauthorized access to or control over a computer system
- An attack that overwhelms a network with traffic
- A method of tricking users into revealing sensitive information
- Framework for describing cyber threat information
- Malicious software that spreads without user action
10 Clues: Malware that locks files and demands payment • An attack that overwhelms a network with traffic • Framework for describing cyber threat information • Malicious software that spreads without user action • Unauthorized access to or control over a computer system • Technique for disguising malicious activity as legitimate • ...
Tech 2024-01-12
Across
- Malicious software (5)
- The process of converting information into code to prevent unauthorized access (10)
- An attempt to trick people into giving away sensitive information (9)
- A type of cyber attack that floods a network with traffic (6)
- A program that replicates itself and spreads to other computers (8)
- Protects against unauthorized access (9)
Down
- A security measure using a unique identifier (8)
- Encryption method (7)
- The best MSP around (5)
- A set of rules that controls network traffic (7)
10 Clues: Encryption method (7) • Malicious software (5) • The best MSP around (5) • Protects against unauthorized access (9) • A security measure using a unique identifier (8) • A set of rules that controls network traffic (7) • A type of cyber attack that floods a network with traffic (6) • A program that replicates itself and spreads to other computers (8) • ...
Business Continuity Awareness Week 2023 2022-12-13
Across
- people need to be able to call you using these.
- Consistent operations
- allows computers to talk to each other and the internet.
- access to and from this is vital
- Hosts data and services for your business
- duplication of resources for better continuity
Down
- Keeping bad guys out both physically and in the cyber realm.
- None of your electronics will run without this.
- this service allows you to send and receive messages over the internet.
9 Clues: Consistent operations • access to and from this is vital • Hosts data and services for your business • duplication of resources for better continuity • people need to be able to call you using these. • None of your electronics will run without this. • allows computers to talk to each other and the internet. • Keeping bad guys out both physically and in the cyber realm. • ...
Crossword 2020-11-24
Responsible AI Principles Crossword 2024-11-19
Across
- Environmental consideration in AI deployment
- Principle focusing on treating all groups equally
- Making AI processes and decisions clear and understandable
Down
- Having clear roles and responsibilities in AI governance
- Understanding impact on people when deploying AI
- Protecting AI systems from cyber-threats
- Evaluating and mitigating potential harm in AI systems
7 Clues: Protecting AI systems from cyber-threats • Environmental consideration in AI deployment • Understanding impact on people when deploying AI • Principle focusing on treating all groups equally • Evaluating and mitigating potential harm in AI systems • Having clear roles and responsibilities in AI governance • Making AI processes and decisions clear and understandable
Internet saftey 2023-10-24
Across
- - a security device that protects users online
- - fake emails or messages to get personal information
- the name given to the type of bullying when online
- When a stranger tries to start a relationship with a child for unlawful purposes
- information, stored on computers and other storage devices
Down
- wireless connection to the internet
- A diary or personal journal kept on a website
- should be a minimum of 12 characters long
- - illegally breaking into computer devices
- - a famous search engine
10 Clues: - a famous search engine • wireless connection to the internet • should be a minimum of 12 characters long • - illegally breaking into computer devices • A diary or personal journal kept on a website • - a security device that protects users online • the name given to the type of bullying when online • - fake emails or messages to get personal information • ...
Join the Elite Cyber Team 2020-06-26
Across
- Shift cipher named after a famous Roman, Julius ?
- The largest WAN of these is the internet.
- Subject does research & development, lab coats optional.
- Convert a coded message into intelligible words.
- Statement of intention to inflict damage / hostile action
Down
- Knowing these will help you pass exams.
- Machine used in WW2 to send secret messages in Germany.
- To protect data and humans ensure you have S?
- Attack that damages or destroys online systems is called?
- Updated typewriter, spell checking and rocket launching.
10 Clues: Knowing these will help you pass exams. • The largest WAN of these is the internet. • To protect data and humans ensure you have S? • Convert a coded message into intelligible words. • Shift cipher named after a famous Roman, Julius ? • Machine used in WW2 to send secret messages in Germany. • Subject does research & development, lab coats optional. • ...
CJCC Crossword 2023-05-10
Across
- Who handles all media requests?
- Who is going to remind you to do your cyber security training?
- What branch of government does CJCC fall under?
- How many seats are there on the Council?
- This division handles data collection and analysis (abbv.)
- Our current Council Chairman
- Jay goes here to meet with legislators about the CJCC budget
- Governor Brian P._____
- The Chairman of Victims Compensation Board (last name)
- Where did our CJCC attorneys go to law school? (abbv.)
- Our friendly neighborhood CFO
Down
- Who lets you know when we are closing early?
- Who has worked at CJCC the longest?
- Our office is located in this building
- Our Executive Director
- CJCC was founded in 198_
- Criminal Justice Coordinating Council (abbv.)
- ____ Kemp. The member of the First Family who works to tackle human trafficking.
18 Clues: Our Executive Director • Governor Brian P._____ • CJCC was founded in 198_ • Our current Council Chairman • Our friendly neighborhood CFO • Who handles all media requests? • Who has worked at CJCC the longest? • Our office is located in this building • How many seats are there on the Council? • Who lets you know when we are closing early? • ...
CSA CROSSWORD #1 2022-01-07
Across
- industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- form of cloud computing that provides virtualized computing resources over the internet.
- cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
- a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
- This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
- cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- Centre of expertise for cyber security in Europe
- widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
- cybersecurity control framework for cloud computing
10 Clues: Centre of expertise for cyber security in Europe • cybersecurity control framework for cloud computing • form of cloud computing that provides virtualized computing resources over the internet. • cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
tentang ai runway gen 3 alpha 2024-10-30
Cyber Security Scavenger Hunt 2014-10-28
Across
- Decrypt me: 00000000 43 4e 4f 4
- This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
- Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
- SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
- Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
- These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
- The unofficial mascot of this shop is the Pink Unicorn.
- Decrypt me: VEFPDQo=
8 Clues: Decrypt me: VEFPDQo= • Decrypt me: 00000000 43 4e 4f 4 • The unofficial mascot of this shop is the Pink Unicorn. • Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __. • Gives us access to the building, most are blue, but ours are DEFCON 2. • SIGDEVERs that focus on discovery and documentation of foreign communications & networks. • ...
Why is Cybersecurity Necessary? 2023-01-27
Across
- Set of defined actions to take in accordance with established policy.
- Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
- Set of actions taken after a cyber event has occurred.
- Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
- Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
- Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
- Technical and non-technical measures to know that you have been compromised.
- People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.
8 Clues: Set of actions taken after a cyber event has occurred. • Set of defined actions to take in accordance with established policy. • Technical and non-technical measures to know that you have been compromised. • Cybersecurity programs must be established, maintained, and is not a set it and forget it matter. • ...
The Wild World of Incident Response – How It Could Save Your Organization's Life! 2024-09-18
Across
- Always think before you do this.
- How to check a URL.
- Something social engineers are good at.
Down
- Never open an unsolicited one from an unknown sender.
- Type of scam where the attacker impersonates a senior executive.
- What you should do with a phishing email.
- Cyberattack involving malicious emails.
- Who you should talk to if you have questions about cyber security and information protection.
8 Clues: How to check a URL. • Always think before you do this. • Cyberattack involving malicious emails. • Something social engineers are good at. • What you should do with a phishing email. • Never open an unsolicited one from an unknown sender. • Type of scam where the attacker impersonates a senior executive. • ...
Round 3 2025-08-25
Across
- What is the act of posting abusive messages online ?
- Write the full form of ASP
- Which action compromise cyber security ?
- Theft of digital property?
Down
- Which device links to homogenous packed broadcast local networks ?
- Who coined the term "cyberspace" ?
- Name the type of attack which uses a fraudulent server with a relay address?
- What is the legal field dealing with internet behavior called ?
8 Clues: Write the full form of ASP • Theft of digital property? • Who coined the term "cyberspace" ? • Which action compromise cyber security ? • What is the act of posting abusive messages online ? • What is the legal field dealing with internet behavior called ? • Which device links to homogenous packed broadcast local networks ? • ...
Pesten 2016-02-19
Across
- Een andere naam voor cyberpesten
- Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
- (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
- Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
- Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
- Iemand lichamelijk pijn doen is ... pesten
- Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
- Een gevolg van (cyber)pesten
- De eerste stap om iets aan (cyber)pesten te doen
- Iemand met woorden pijn doen is ... pesten
- Een verregaand gevolg van (cyber)pesten
- Iemand met opzet een ... sturen
12 Clues: Een gevolg van (cyber)pesten • Iemand met opzet een ... sturen • Een andere naam voor cyberpesten • Een verregaand gevolg van (cyber)pesten • Iemand lichamelijk pijn doen is ... pesten • Iemand met woorden pijn doen is ... pesten • De eerste stap om iets aan (cyber)pesten te doen • Op deze kanalen wordt heel vaak aan cyberpestenten gedaan • ...
Pesten 2016-02-19
Across
- Een andere naam voor cyberpesten
- Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
- (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
- Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
- Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
- Iemand lichamelijk pijn doen is ... pesten
- Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
- Een gevolg van (cyber)pesten
- De eerste stap om iets aan (cyber)pesten te doen
- Iemand met woorden pijn doen is ... pesten
- Een verregaand gevolg van (cyber)pesten
- Iemand met opzet een ... sturen
12 Clues: Een gevolg van (cyber)pesten • Iemand met opzet een ... sturen • Een andere naam voor cyberpesten • Een verregaand gevolg van (cyber)pesten • Iemand lichamelijk pijn doen is ... pesten • Iemand met woorden pijn doen is ... pesten • De eerste stap om iets aan (cyber)pesten te doen • Op deze kanalen wordt heel vaak aan cyberpestenten gedaan • ...
FSA 1 2021-02-03
Across
- THE AMOUNT THAT A BORROWER CAN BORROW FOR A SECURED LOAN IS USUALLY ____ THAN AN UNSECURED LOAN
- INTEREST RATES USED BY BANKS WHEN LENDING UNSECURED FUNDS TO EACH OTHER
- A PLATFORM THAT CAN ALLOW BUSINESSES TO POOL MONEY FROM A VARIETY OF SOURCES
- THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN
- THIS FORM OF LOGOUT CLOSES A USER’S ACCESS AFTER A FEW MINUTES OF INACTIVITY
- THE TYPE OF LOAN THAT THE BORROWER DOES NOT NEED TO PLEDGE AN ASSET AS COLLATERAL
- A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN
- AN EXAMPLE OF WHICH IS A SIX-DIGIT CODE SENT TO A CUSTOMER’S CELL PHONE FOR ADDITIONAL SECURITY
- DURING A SLUMP, THE GOVERNMENT CAN ____ THE INTEREST RATE TO ENCOURAGE SPENDING
Down
- FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION
- A FORM OF AUTHENTICATION THAT RELIES ON RETINA SCANS, THUMBPRINTS OR FACIAL RECOGNITION
- THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY
- HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME
- THE MARKET VALUE OF AL GOODS AND SERVICES PRODUCED WITHIN THE COUNTRY
- MAS IS SINGAPORE’S _____ BANK.
- THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH
- A CYBER-SECURITY DEVICE AND CONFIGURATION TO BLOCK ATTACKS
17 Clues: MAS IS SINGAPORE’S _____ BANK. • A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN • THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH • THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN • HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME • THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY • FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION • ...
computer apps crossword 2022-05-02
Across
- each individual box in sheets
- text at the top of the document
- picture w a transparent background
- the way one slide changes to another
- where everything is stored
- spaces at the sides of the document
- which google app can be used to make posters and pamphlets
- which google app is used for making videos
- which googles app allows you to create websites
- a video sharing platform for entertainment and information
Down
- when you take away the background of a picture to put on top of another
- when you steal info and claim it as your own
- #1 cause for cyber security breaches
- where you make your citations
- which google app is used for surveys
- movements you can give pictures or text
- has to be in every sheets equation
- every good email starts with this
- text at the bottom of the document
19 Clues: where everything is stored • each individual box in sheets • where you make your citations • text at the top of the document • every good email starts with this • picture w a transparent background • has to be in every sheets equation • text at the bottom of the document • spaces at the sides of the document • #1 cause for cyber security breaches • ...
risk 2024-07-15
Across
- - JKL Financial Services detects unusual activity in its system, indicating a cyber-attack. What risk is this?
- - ABC Bank's loan portfolio is concentrated in real estate, and the market shows signs of a downturn. What risk is this?
- - GHI Insurance faces more claims due to frequent natural disasters. What risk is this?
- - XYZ Investment Firm uses insurance to manage foreign instability risk. What strategy is this?
- - XYZ Investment Firm faces losses due to instability in a foreign market. What risk is this?
Down
- - JKL Financial Services improves security to prevent cyber-attacks. What approach is this?
- - DEF Corporation enters an interest rate swap to manage rising rates. What strategy is this?
- - GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this?
- - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this?
- - DEF Corporation's debt has variable interest rates, and rates are rising. What risk is this?
10 Clues: - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this? • - GHI Insurance faces more claims due to frequent natural disasters. What risk is this? • - GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this? • - JKL Financial Services improves security to prevent cyber-attacks. What approach is this? • ...
technology 2024-06-07
14 Clues: TV • app • mouse • phone • remote • screen • device • charger • computer • keyboard • Cyber-bullying • Online (add a dash between words) • Videogames (add a dash between words) • Social media (add a dash between words)
Computing Networks 2019-05-16
Across
- The internet is the world's largest (15 letters)
- A set of rules for how messages are turned into data packets and sent across networks. (8 letters)
Down
- Consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. (14 letters)
- Information stored and transferred between devices by binary packets. (4 letters)
- A device or system used to protect a network from unauthorized access. (8 letters)
- Internet protocol address. A unique identifier issued to each device connected to a network. (9 letters)
- the process of converting information or data into a code, especially to prevent unauthorized access. (10 letters)
- A computer that holds data to be shared with other computers. (6 letters)
8 Clues: The internet is the world's largest (15 letters) • A computer that holds data to be shared with other computers. (6 letters) • Information stored and transferred between devices by binary packets. (4 letters) • A device or system used to protect a network from unauthorized access. (8 letters) • ...
citoyenneté numérique pages 68 et 106 CDO 1 2023-11-21
12 Clues: user • easy • tastes • to share • to access • interests • advantages • to have fun • disadvantages • cyber-dependant • cyber harassment • to upload, download
Viruses:Matthew Savoie 2018-11-16
Across
- Viruses sent through messaging websites
- the go to tool for today's cyber criminals
- appeared on May 4 2000
- Programs that you download to watch out for viruses
- A small piece of software that piggybacks on programs
- Computer program that has the ability to copy it self from machine to machine
- Program that you download to protect you against viruses
Down
- Caused microsoft to shut down there email systems
- Infected a quarter million computers
- first virus designed to cause actual damage
- more insidious type of attack
- Denial of service attack
- A internet wall with a password to get into information
- virus sent to a person multiple times
- A program that says it does one thing but does damage as it runs
15 Clues: appeared on May 4 2000 • Denial of service attack • more insidious type of attack • Infected a quarter million computers • virus sent to a person multiple times • Viruses sent through messaging websites • the go to tool for today's cyber criminals • first virus designed to cause actual damage • Caused microsoft to shut down there email systems • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
IT Careers 2024-04-11
Across
- Build and maintain the client-side components of websites and web applications, including HTML, CSS, and JavaScript code.
- Plan, coordinate, and oversee web design projects from initiation to completion. They manage resources, timelines, and budgets, communicate with stakeholders, and ensure project objectives are met within scope and quality standards.
- Create visually compelling designs, graphics, and branding elements for websites and digital media.
- Design, develop, and maintain software applications and systems.
- Manage and maintain computer systems, networks, and servers. They are responsible for ensuring the smooth operation, security, and reliability of IT infrastructure.
- Protect computer systems, networks, and data from cyber threats and attacks. They monitor security incidents, conduct risk assessments, and implement security measures to safeguard information assets.
Down
- Develop and maintain the server-side components of websites and web applications, including databases, APIs, and server logic.
- Manage and maintain databases, including installation, configuration, backup, and optimization. They ensure data integrity, security, and availability for efficient data management.
- Develop and maintain websites and web applications, specializing in areas such as frontend, backend, or full stack development
- Test software applications and systems to identify defects, bugs, and performance issues. They develop test plans, execute test cases, and report findings to ensure software quality and reliability
- Analyze website performance, user behavior, and traffic data to identify trends, insights, and opportunities for improvement
- Design, implement, and manage computer networks, including hardware, software, and protocols. They ensure network performance, security, and availability.
- Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces.
13 Clues: Design, develop, and maintain software applications and systems. • Create visually compelling designs, graphics, and branding elements for websites and digital media. • Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces. • ...
Security 2022-03-27
Across
- Is a database of computers, users, and services.
- Ensures the integrity of a message.
- A type of asset for an organization.
- Software developed by cybercriminals to perform malicious acts.
- Type of malware where communications are intercepted.
- This needs to be done to your computer when it's left unattended.
- Using this method is a way to protect data.
- Type of malware where a removable device is left in a public place for someone to use and infect their machine.
- A feature that detects phishing websites.
- In order to use this feature in Windows, TPM must be enabled.
- Typically distributed by downloading online software.
Down
- This needed to be updated in order for its anti-malware software to work.
- A mode that allows users to browse the web anonymously.
- A set of objectives to ensure the security of a network.
- Type of malware where the attacker alters packet contents.
- Is a type of lock in Windows that needs a pre-paired device.
- Pretending to need personal information to confirm someone's identity.
- This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
- Prevents unwanted traffic from going into internal networks.
- The most common type of computer malware.
- Can be found in high-security environments.
- A type of lock that needs a key that is separate from the door handle.
22 Clues: Ensures the integrity of a message. • A type of asset for an organization. • The most common type of computer malware. • A feature that detects phishing websites. • Using this method is a way to protect data. • Can be found in high-security environments. • Is a database of computers, users, and services. • Type of malware where communications are intercepted. • ...
Security 2022-02-08
Across
- I copy traffic for you to safely inspect. (6,9)
- If you look at me you can find out "who did what, where, and when". (5,5,4)
- You're not alone and this approach helps reduce risk and cost. (6)
- Enterprise way to adopt a Zero trust approach. (6,4)
- Use me to prevent unwanted traffic reaching your VMs. (8)
- Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
- Use me to classify your data. (5,3)
- I provide insights into your security posture. Acronym(3)
- De-identification technique. (16)
- I detect network based threats. (5,3)
- Do you trust that container image? (6,4)
- Trust no one. (4,5)
- Using me allows you to implment the principle of least privilege. Acronym (3)
Down
- I can tell you when you need to reduce permissions. (11)
- I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
- Apply multiple layers of securty. (7,2,5)
- Use me to mitigate OWASP top 10 risks. (5,5)
- Needs to be kept secret. (12)
- If you use me you do not need a VPN. Acronym(3)
- You can find me at rest or on the move (in-transit). (10)
- If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
- Use me to manage keys outside of Google Cloud. Acronym (3)
22 Clues: Trust no one. (4,5) • Needs to be kept secret. (12) • De-identification technique. (16) • Use me to classify your data. (5,3) • I detect network based threats. (5,3) • Do you trust that container image? (6,4) • Apply multiple layers of securty. (7,2,5) • Use me to mitigate OWASP top 10 risks. (5,5) • I copy traffic for you to safely inspect. (6,9) • ...
Security 2024-10-25
CIS 178 cyber security crossword puzzle 2023-04-20
Across
- allowing employees to use own device
- digital information user leaves behind
- maicious software encrypts file device
- small program
- fraudulent or malicious practices
- network of infected devices
- software spreads from one computer to another
- computer virus designed to infect macros
- setting up a fake website
- floods system with data packets
- updates to software to improve security
Down
- software to detect and remove viruses
- gets you to tell them your information
- part of body for security
- used to get control of phone number
- type of malicious software code
- unreadable mathematical function
- advertising supported software
- disguised as legitimate software
- protects against unauthorized malicious activity
20 Clues: small program • part of body for security • setting up a fake website • network of infected devices • advertising supported software • type of malicious software code • floods system with data packets • unreadable mathematical function • disguised as legitimate software • fraudulent or malicious practices • used to get control of phone number • allowing employees to use own device • ...
Introduction to Cyber Security Crossword Puzzle 2023-09-09
Across
- When an intruder takes over a victims information by tricking them in any way they find necessary
- A form of malware that can infect a computer, and hurt it and the information stored on said computer
- A secondary form of verification in order to log into certain accounts across the internet
- A way of keeping your identity safe on the internet by tricking intruders into thinking you are someone, or live somewhere you do not
- The cause of all the hurt caused to the victim once an intruder has invaded the victims device
- The protection used to prevent intruders from stealing, corrupting, or damaging any data/computing device
- A form of protecting certain information by making it into unreadable text that is only readable by having the right authorization
- The way a device keeps itself up to date with the latest and most secure version of itself
- A connection between two or more devices across the virtual world
Down
- A type of malware where the intruder corrupts a victims date, and requires payment before returning said data to the victim
- A form of tricking a victim into believing that they are someone they are not via an email
- The incident of an intruder gaining unauthorized access to certain information
- A way of notifying companies, organizations, or others that you were recently attacked virtually
- When an intruder tries to attack ones device via many different methods
- A form of keeping certain information hidden behind a certain string of words
- Creating a copy of certain data on a separate device or on the same computer in order to keep it in case of said data becoming corrupted in the future
- Being able to access certain devices by being completely away from said device
- When an intruder tries to disguise themselves as a trusted source to trick a victim to allowing them into there device
- A device used to send packets to a certain network on the internet
- Information that has been translated into a certain form that is easily readable by computing devices
20 Clues: A connection between two or more devices across the virtual world • A device used to send packets to a certain network on the internet • When an intruder tries to attack ones device via many different methods • A form of keeping certain information hidden behind a certain string of words • ...
Business Continuity 2021-04-07
Across
- duplication of resources for better continuity
- access to and from this is vital.
- Keeping bad guys out both physically and in the cyber realm.
Down
- People need to be able to call you using these.
- Hosts data and services for your business
- Allows somputers to talk to each other and the internet.
- Consistent operations
- None of your electronics will run without this.
- This service allows you to send and recieve messages over the internet.
9 Clues: Consistent operations • access to and from this is vital. • Hosts data and services for your business • duplication of resources for better continuity • People need to be able to call you using these. • None of your electronics will run without this. • Allows somputers to talk to each other and the internet. • ...
Brain-Riddle Round 2 2025-02-12
Across
- A piece of data used for authentication.
- A language used to style web pages.
- A standard language for creating web pages.
- A cyber attack that tricks users into revealing information.
- A type of software designed to harm or exploit.
- A unique address assigned to a device on a network.
- A temporary interaction between a user and a website.
Down
- An intermediary server between a user and the internet.
- A network security system that monitors traffic.
- A hacking method that systematically tries passwords.
- A method of converting data into a secure format.
- A file containing code for automation.
- Temporary storage that speeds up data retrieval.
- A system that translates domain names to IP addresses.
- A set of rules for communication between software.
15 Clues: A language used to style web pages. • A file containing code for automation. • A piece of data used for authentication. • A standard language for creating web pages. • A type of software designed to harm or exploit. • A network security system that monitors traffic. • Temporary storage that speeds up data retrieval. • A method of converting data into a secure format. • ...
CROSSWORD 2025-09-01
Across
- Facility used to house computer systems and associated components
- Combination of public and private cloud services
- Delay in data transfer between client and server
- Energy sources like wind and solar for powering data centers
- Reducing expenses while maintaining performance in cloud
- Systems used in data centers to regulate temperature
- Distributing workloads across multiple servers
- Environmentally sustainable computing practices
Down
- Ability of a system to handle growth in workload
- Maximum rate of data transfer across a network path
- Technology that allows multiple virtual machines on a single physical server
- Capacity to recover quickly from failures
- Protecting cloud systems and data from cyber threats
- On-demand computing services over the internet
- Total greenhouse gas emissions caused by cloud operations
15 Clues: Capacity to recover quickly from failures • On-demand computing services over the internet • Distributing workloads across multiple servers • Environmentally sustainable computing practices • Ability of a system to handle growth in workload • Combination of public and private cloud services • Delay in data transfer between client and server • ...
cyber crime 2024-11-07
Across
- - A secret string of characters used for authentication.
- - Part of the internet that requires special software to access, often associated with illicit activities.
- - Server that acts as an intermediary for requests from clients seeking resources from other servers.
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- - Engineering technique that tricks people into giving away confidential information.
- - Collection of computers and devices connected for communication and resource sharing.
- - Technique of disguising communication from an unknown source as being from a known, trusted source.
- - Software update to fix bugs or vulnerabilities (same as Across).
- - A security system that controls incoming and outgoing network traffic.
- - A deceptive scheme intended to cheat or defraud someone.
Down
- - Person who gains unauthorized access to computer systems.
- - Software that gathers information from a computer without permission.
- - A software update that fixes vulnerabilities or improves functionality.
- - A software tool designed to take advantage of a security flaw.
- - Money demanded by hackers in exchange for access to compromised data.
- - Software that automatically displays or downloads advertising material.
- - Malicious software that gives unauthorized access to a computer system.
- - Malicious code that infects computer files and spreads to others.
- - A type of malware that spreads copies of itself across networks.
- - Prefix related to computers or computer networks.
20 Clues: - Prefix related to computers or computer networks. • - A secret string of characters used for authentication. • - A deceptive scheme intended to cheat or defraud someone. • - Person who gains unauthorized access to computer systems. • - A software tool designed to take advantage of a security flaw. • ...
Cyber Security 2018-09-20
cyber security 2021-11-03
5 Clues: when someone you via email • a word that keeps your computer safe • a virus indside something like an email • someone getting your details with no one knowing • something someones sent to you by someone looking for attention
Cyber Security 2023-09-15
cyber security 2023-09-13
Cyber Security 2020-10-19
5 Clues: the process of encoding information. • malware on your computer when it is not secured. • a device we use in our daily life. (hint: it ends with an R) • something that protects our device from unauthorized access. • the program and other operating information used by computers.
Cyber Security 2020-08-24
Across
- es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
- son pequeños archivos que algunos sitios web guardan en tu ordenador. Las cookies almacenan información sobre tí, como nombre de usuario o información de registro, o preferencias de usuario, pero no espían, como el spyware.
- son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
5 Clues: es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias. • es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador. • ...
Cyber security 2024-09-07
5 Clues: Voice based phishing • fraudulent text messages • injects viruses, Trojan’s • a kind of malware demands for ransom • deceive revealing personal info via emails
Cyber security 2024-03-18
5 Clues: A fault or flaw in a computer program • A complex system of interconnected elements • Protected from or not exposed to danger or risk • Irrelevant or unsolicited messages sent over the Internet. • Look over a machine or system to detect potential vulnerabilities.
CYBER SECURITY 2024-08-19
5 Clues: a secret word • malicious software or malware • software used to prevent virus • network that connects computers • taking away confidential information
Cybersecurity Ethics, Laws & Standards 2025-10-09
Across
- unauthorized access to computer systems
- moral principles that govern a person's behavior or actions
- policy that defines proper and improper use of technology and networks
- process of converting data into a code to prevent unauthorized access
- copies of data stored separately for recovery in case of loss
- using someone else's work without giving proper credit
- law that protects sensitive health information
- coordinates international cybercrime investigations
- security process requiring two separate forms of identification
- online platforms for sharing content and communication
- software designed to damage or disrupt a computer system
- legal right that grants the creator control over their work
- network security system that monitors and controls incoming and outgoing traffic
Down
- criminal activity carried out using computers or the internet
- trail of data created by a person’s online activity
- software that secretly monitors user activity
- option that controls who can see your online information
- protects us critical infrastructure from cyber threats
- deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
- unauthorized access and release of confidential information
- using digital technology to harass or intimidate someone
- crime of obtaining someone’s personal information to commit fraud
- manipulating people to give up confidential information
- study of ethical issues surrounding computer use
- protects student education records and data
- a secret word or phrase used to gain access to a system
- software designed to detect and remove malicious programs
- malware that locks users out of their files until a payment is made
- update to software that fixes vulnerabilities or bugs
- proper and respectful behavior when communicating online
- practices and steps taken to maintain system health and improve security
- internet crime complaint center that accepts and investigates online crime reports
32 Clues: unauthorized access to computer systems • protects student education records and data • software that secretly monitors user activity • law that protects sensitive health information • study of ethical issues surrounding computer use • trail of data created by a person’s online activity • coordinates international cybercrime investigations • ...
Cyber 2022-10-15
Across
- Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
- If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
- a type of software designed to help the user's computer detect viruses and avoid them.
- Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
- (main objective of Cyber Security?)
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
- (main objective of Cyber Security?)
- world’s very first antivirus program?
- Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
- Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
- the hackers who's main motive is to gain financial profit by doing cyber crimes.
- DNS would translate any Domain name into ___________.
- (main objective of Cyber Security?)
13 Clues: (main objective of Cyber Security?) • (main objective of Cyber Security?) • (main objective of Cyber Security?) • world’s very first antivirus program? • DNS would translate any Domain name into ___________. • the hackers who's main motive is to gain financial profit by doing cyber crimes. • ...
Cybersecurity Fundamental Chapter 2 2022-11-24
Across
- a type of storage device retains the data when no user or process is using it.
- cyber criminals can capture, save and steal data in-transit.
- uses removable media to physically move data from one computer to another.
- procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- devices, and product available to protect information systems and fend off cyber criminals.
- verifies the identify of a user to prevent unauthorized access.
- uses cable to transmit data.
Down
- verifies determine which resources users can access, along with the operations that users can perform.
- is the principle used to describe the need to maintain availability of information systems and services at all times.
- involves sending information from one device to another.
- cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- cyber criminals can intercept and alter data in-transit.
- aware and knowledgeable about their world and the dangers that threaten their world.
- keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- prevents the disclosure of information to unauthorize people, resource and processes.
- uses the airways to transmit data.
16 Clues: uses cable to transmit data. • uses the airways to transmit data. • involves sending information from one device to another. • cyber criminals can intercept and alter data in-transit. • cyber criminals can capture, save and steal data in-transit. • verifies the identify of a user to prevent unauthorized access. • ...
Security 2022-04-13
Across
- Stun something
- What Chickens have
- Like a gun
- Rabbit
- You go ___ and you hit a strike
- Nighttime star.
- An animal that can swim underwater and can kill.
- Something to stun with flash or have an everlasting memory.
- 2 best____ in a room
- NNNNEEEEEEEEEEDS repair
- More Small people.
- Oppisite of Life
- Something you need to buy to get into a movie.
- Needs Repair.
- An animal
Down
- A light that u can turn off and on
- Bunny
- Oppisite of Dark
- A star in the day.
- Oppisite of Dull
- What a wolf has
- Oppisite of Death
- What rich people have.
- A break in
- I ___ in the challange
- You get back at someone
- an animal that can kill you and is sometimes brown.
- A red animal
- A small person.
- You ____ a child
- Something you need to see with
31 Clues: Bunny • Rabbit • An animal • Like a gun • A break in • A red animal • Needs Repair. • Stun something • Nighttime star. • What a wolf has • A small person. • Oppisite of Dark • Oppisite of Dull • You ____ a child • Oppisite of Life • Oppisite of Death • What Chickens have • A star in the day. • More Small people. • 2 best____ in a room • What rich people have. • I ___ in the challange • You get back at someone • ...
Security 2017-08-20
Across
- Second highest principal in SQL Server.
- Turned off when a database is attached
- Not NTLM
- Not even the sysadmin's can see this data.
- aXXX@XXXX.com
- Protocol used when connecting from the server SQL is on.
- Pretending to be someone else
- One SQL instance talking to another.
- Security trump
- Contains 0 or more windows users.
- Uses the private key to encrypt and decrypt data.
- Used to contain a windows id and password.
Down
- Add a permission
- Permission required to create stored procedures.
- Required for all encryption in SQL Server
- One way encryption.
- This database is isolated from other databases.
- Used to add a John Hancock to a stored procedure.
- Workstation-Server-Server
- Alias for a credential
- Uses both a public and private key.
- Bobby
- Add random data to the string before encrypting it.
- Principal that contains other principals.
- Check who did what
25 Clues: Bobby • Not NTLM • aXXX@XXXX.com • Security trump • Add a permission • Check who did what • One way encryption. • Alias for a credential • Workstation-Server-Server • Pretending to be someone else • Contains 0 or more windows users. • Uses both a public and private key. • One SQL instance talking to another. • Turned off when a database is attached • Second highest principal in SQL Server. • ...
Security 2013-08-04
Across
- An offence that can be summary or indictable?
- Section 494 of the Criminal Code of Canada deals with ________ arrest authority?
- When a person does not leave, after directed to do so, the person would considered to be __________
- Touch someone without consent, Intentionally, either directly or indirectly
- What does 10-4 mean?
- Surveillance from a place hidden from view is what type of Surveillance?
- Evidence of prior bad acts is __________ __________ evidence (2 words)
- A minor offence under the Criminal Code of Canada
- Without colour of right if you convert something to your own use it is considered ______?
- __________________ Laws are also called By-laws
- Level of Government that operates the OPP?
- A witness on the stand is giving what type of evidence?
- PIPEDA is a __________ act
- who's responsibility is safety in the workplace?
- a wrong against society
Down
- Under the Criminal Code of Canada the offence when a fire is deliberately set?
- a serious offernce
- section 10 of the Charter of Rights and Freedoms deals with rights upon ___________
- Fingerprints, Hair Samples, and Mineral Samples are considered what type of evidence?
- what does "Z" stand for in the Phonetic Alphabet?
- Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
- Class C fires involve _______________ equipment
- only the police can _______________
- term for evidence that is allowed in a trail or hearing
- A trail within a trail
- Who determines what evidence will be allowed in court?
- The act that regulates security guards in Ontario?
- all security guards shall act with honesty and ____________
- The police officers are __________ officers
- under the LLA (Liquor License Act) you can not arrest, you can only ____________
30 Clues: a serious offernce • What does 10-4 mean? • A trail within a trail • a wrong against society • PIPEDA is a __________ act • only the police can _______________ • Level of Government that operates the OPP? • The police officers are __________ officers • An offence that can be summary or indictable? • Class C fires involve _______________ equipment • ...
security 2023-02-27
Across
- Interazione online ostile che comporta messaggi di insulto tra gli utenti
- Quella a 2 fattori è un tipo di ....... forte
- Simile a una password, ma generalmente più lunga per una maggiore sicurezza
- Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
- L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
- Una persona che prende o usa le informazioni del vostro computer
- Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
- Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
- Malware che si replica per diffondersi ad altri computer della rete
- Programma che registra i tasti premuti da un utente
- Genera e memorizza in modo sicuro password complesse in un unico luogo
Down
- Non aprire se non ci si fida del mittente
- Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
- Il computer avrà molti popup se ne viene infettato
- Una delle password più comuni nel 2022: un evergreen!
- L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
- _________ sempre il computer quando si lascia la scrivania
- Quando i criminali usano gli sms fake stanno cercando di fare….
- Un programma software progettato per prevenire i virus
- Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
- Chiamate o messaggi vocali fraudolenti
21 Clues: Chiamate o messaggi vocali fraudolenti • Non aprire se non ci si fida del mittente • Quella a 2 fattori è un tipo di ....... forte • Il computer avrà molti popup se ne viene infettato • Programma che registra i tasti premuti da un utente • Una delle password più comuni nel 2022: un evergreen! • Un programma software progettato per prevenire i virus • ...
Security 2025-08-14
Across
- A secret word or phrase used to gain access to an account
- Granted official permission to access or manage an account
- A feature that confirms client identity using a mobile app (two words)
- A person permitted to act on behalf of the account owner
- Consent given to perform specific actions
- Signs of suspicious or potentially fraudulent activity (two words)
- A method of verifying identity using vocal characteristics (two words)
- The ability to log into and manage an account via the internet (two words)
- Ability to access account online when security Q&A status is locked (two words)
- Someone other than the account owner involved in a call or transaction (two words)
Down
- Authorized access or actions on an account.
- Notifications or warnings about significant account activity or potential security concerns
- Actions intended to fraudulently gain unauthorized access to
- Abbreviation for Additional Security Questions
- How many attempts do callers have to pass decedent security
- The process of identifying and resolving system or device issues (two words)
- The careful and thorough evaluation of potential risks and issues (two words)
- An electronic tool used to access accounts, such as a phone or computer (two words)
- A confidential code used to confirm identity and enable access
- personal prompts used to verify identity during login (two words)
- A unique identifier used to access an account
- Cues or hints provided to assist in answering security questions
22 Clues: Consent given to perform specific actions • Authorized access or actions on an account. • A unique identifier used to access an account • Abbreviation for Additional Security Questions • A person permitted to act on behalf of the account owner • A secret word or phrase used to gain access to an account • Granted official permission to access or manage an account • ...
Quiet their watching you.... 2023-07-16
Across
- Breach Result of a hacker breaking into a system
- Attack an attempt to breach a security boundary
- method of connecting a series of computers
- malware used to spy on your computer activities
- Horse computer program that looks innocent
- video or audio that has been altered
- document storage
- Where a hacker poses as legitimate business
- When someone is tricked into clicking on one object when they want to click on another
- Test commonly referred to as a Pen Test
- collection of programs that allow hackers to access a computer
Down
- system to shield against viruses
- document storage
- Malware that highjacks your system
- Apps that instruct a computer to carry out a task
- process of identifying a users identity
- Black Hat Tool
- When a hacker changes the IP address that comes from a trusted source
- Malware that can reproduce itself
- Address Pretty much anything connected to the internet
20 Clues: Black Hat Tool • document storage • document storage • system to shield against viruses • Malware that can reproduce itself • Malware that highjacks your system • video or audio that has been altered • process of identifying a users identity • Test commonly referred to as a Pen Test • method of connecting a series of computers • Where a hacker poses as legitimate business • ...
Security 2012-11-03
Across
- A trojan appears to be __________ at first site
- There are 8/9 different _____________ in the DPA
- of the first worms was called the ______ worm
- A good password should contain symbols, numbers, uppercase and ____________letters
- The only way to ensure you never get malware on your computer is to ______ the internet cable
- __________ in emails can contain viruses
- Religion and medical records are considered ______________ information
- A ____________ examines all the network traffic coming in and going out of your computer
- __________ is the process of making an exact copy of the contents of a HD
Down
- Malware intended to steal important personal information
- The DPA states that business should ________ data once they no longer need it
- To prevent loss of data one needs to ___________ frequently
- Before accessing an account one needs to enter a _________ and password
- To protect yourself from malware you need to install an ____________
- The Data ________ Act regulates the use of data for all businesses
- A copy of important data should be kept in an ________ location
- One should never follow links sent by _______________ or unknown sources
- The act of accessing another person's computer without permission
- Dropbox is an ___________ storage site
- A malicious software that spreads with the intention of corrupting or deleting files
- Passwords should always be kept ______
21 Clues: Dropbox is an ___________ storage site • Passwords should always be kept ______ • __________ in emails can contain viruses • of the first worms was called the ______ worm • A trojan appears to be __________ at first site • There are 8/9 different _____________ in the DPA • Malware intended to steal important personal information • ...
Security 2012-11-03
Across
- A good password should contain symbols, numbers, uppercase and ____________letters
- One should never follow links sent by _______________ or unknown sources
- Before accessing an account one needs to enter a _________ and password
- one of the first worms was called the ______ worm
- Religion and medical records are considered ______________ information
- Malware intended to steal important personal information
- A copy of important data should be kept in an ________ location
Down
- __________ in emails can contain viruses
- A ____________ examines all the network traffic coming in and going out of your computer
- A malicious software that spreads with the intention of corrupting or deleting files
- __________ is the process of making an exact copy of the contents of a HD
- The act of accessing another person's computer without permission
- The Data ________ Act regulates the use of data for all businesses
- There are 8/9 different _____________ in the DPA
- A trojan appears to be __________ at first site
- Passwords should always be kept ______
- To protect yourself from malware you need to install an ____________
- The only way to ensure you never get malware on your computer is to ______ the internet cable
- The DPA states that business should ________ data once they no longer need it
- Dropbox is an ___________ storage site
- To prevent loss of data one needs to ___________ frequently
21 Clues: Passwords should always be kept ______ • Dropbox is an ___________ storage site • __________ in emails can contain viruses • A trojan appears to be __________ at first site • There are 8/9 different _____________ in the DPA • one of the first worms was called the ______ worm • Malware intended to steal important personal information • ...
Security 2013-06-27
Across
- Stick to what path when in the freight yard?
- Your MSIC must be above what?
- What does the I stand for in MSIC?
- What type of industry are we in?
- What colour should drivers follow in the freight yard on the way in?
- What is the name of the contractor company for security?
- What lights must be on when in the freight yard?
- What channel do you call for Security?
- What must a non MSIC holder have whilst in the LRZ?
- What does the L stand for in LRZ?
- A non MSIC holder must also have what for access into the LRZ?
Down
- Who must you radio to have the vehicle booth gates opened/closed?
- Who has the final say when allowing freight to enter the yard?
- What does the T stand for in OTS?
- What need must you have to request an MSIC?
- What must you display in the LRZ?
- What is your base channel when receiving radio calls?
- Who takes passengers on/off via the buggy?
- What is the code number for a Firearm?
- What is Angela’s title other than Manager?
20 Clues: Your MSIC must be above what? • What type of industry are we in? • What does the T stand for in OTS? • What must you display in the LRZ? • What does the L stand for in LRZ? • What does the I stand for in MSIC? • What channel do you call for Security? • What is the code number for a Firearm? • Who takes passengers on/off via the buggy? • ...
Principles of Medical Informatics Ethics 2024-02-22
Across
- Obtaining permission from someone before the use of their personal data.
- The clinician's moral obligation to act solely for the benefit of the patient.
- The process of safeguarding private patient information.
Down
- The process of transforming any given key or a string of characters into another value.
- A core duty in medical practice that ensures patient privacy.
- Cyber security measures are designed to protect ______ from attack.
- Entails the procedures and processes by which one party justifies and takes responsibility for its activities.
7 Clues: The process of safeguarding private patient information. • A core duty in medical practice that ensures patient privacy. • Cyber security measures are designed to protect ______ from attack. • Obtaining permission from someone before the use of their personal data. • The clinician's moral obligation to act solely for the benefit of the patient. • ...
October Crossword - Cyber Security 2022-02-07
Across
- software designed to prevent, detect, and remove malware
- cyberattack that tries already compromised usernames and passwords in other sites
- username and ... should be complex
- any crime committed electronically
- pretending to be someone and accessing their information
Down
- fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
- ensures that you are the only one who has access to your account
- campaign launched in 2010 by the Department of Homeland Security
- any software intended to damage, disable, or give someone unauthorized access
- agency that informs and educates about cybersecurity
10 Clues: username and ... should be complex • any crime committed electronically • agency that informs and educates about cybersecurity • software designed to prevent, detect, and remove malware • pretending to be someone and accessing their information • ensures that you are the only one who has access to your account • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malware that automatically delivers advertisements.
- They are software programs created to automatically perform specific operations
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
- It is a global system of interconnected computer networks
- It is a string of characters used to verify the identity of a user during the authentication process.
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- It is a type of malware that functions by spying on user activity without their knowledge.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
pocketsiem's cyber security crossword 2023-04-27
Across
- Malicious software that is designed to cause damage to a computer system
- A type of attack where the attacker attempts to guess a user's password
- A type of software that is designed to prevent unauthorized access to a computer system
- A network of compromised computers that can be used to carry out attacks
- A program that monitors and controls incoming and outgoing network traffic
- A type of attack that involves taking control of a computer or device and demanding payment for its release
- The practice of tricking someone into giving away sensitive information
- The act of finding vulnerabilities in computer systems in order to exploit them
Down
- The practice of using deception to trick someone into revealing sensitive information
- A type of encryption that uses two keys: one for encryption and one for decryption
- A method of verifying a user's identity through a combination of something they know, have, and are
11 Clues: A type of attack where the attacker attempts to guess a user's password • The practice of tricking someone into giving away sensitive information • Malicious software that is designed to cause damage to a computer system • A network of compromised computers that can be used to carry out attacks • ...
Cyber Ethics 2025-06-02
Across
- A fake email that tricks you into giving personal info
- Breaking a system's security to test or exploit it
- Pretending to be someone else online
- A small file that tracks your website activity
- Taking someone else's work without credit
- type of malware that is designed to spy on user activity.
- The unauthorize use of copyrighted content
- The trail of data you leave online
Down
- The method of verifying your identity.
- Prevents unauthorized access to or from a private network
- Stealing and using someone else's online identity
- Legal protection for original digital content
- Makes judgement on cyber crimes.
- A secret combination of characters that protects your account
- Software that protects against malicious programs
- Unwanted, irrelevant messages sent over internet, usually advertising or phishing.
16 Clues: Makes judgement on cyber crimes. • The trail of data you leave online • Pretending to be someone else online • The method of verifying your identity. • Taking someone else's work without credit • The unauthorize use of copyrighted content • Legal protection for original digital content • A small file that tracks your website activity • ...
SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) 2025-05-12
cyber security 2021-02-12
cyber security 2017-06-30
Across
- software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
Down
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- a malware which replicates it self eating your storage its harmless when it doesn't contain a virus
- is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
5 Clues: a malware which replicates it self eating your storage its harmless when it doesn't contain a virus • software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. • is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. • ...
Cyber Security 2021-10-06
5 Clues: A type of virus • to fight a virus • intending or intended to do harm. • a wall or partition designed to do harm • allows cyber security hackers to take control
cyber security 2021-11-05
Across
- you can type it but you can also use your face for it to work.
- this stops you accessing scam websites
- this is where someone is looking over your shoulders to try see your passwords
Down
- this is where someone sends a message on one of your friends devices
- when people disguise them selves as another trying to take advantage of you
5 Clues: this stops you accessing scam websites • you can type it but you can also use your face for it to work. • this is where someone sends a message on one of your friends devices • when people disguise them selves as another trying to take advantage of you • this is where someone is looking over your shoulders to try see your passwords
BT 2021-07-21
Across
- Australian government policy used to protect systems and information for cyber threats
- the maximum amount of megabytes than can be sent via Defence email
- Spills Something you want to prevent/avoid in order to maintain your security responsibilites
- one of the main software applications used by Defence members, particularly PCS
- The manual which describes the policies and roles and responsibilities of Defence personnel while using ICT
- The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)
Down
- The equipment and resources that support Defence employees in the conduct of their business
- the main form of electronic communication used by Defence members
- The framework used by Defence to define protective security policies and procedures
9 Clues: the main form of electronic communication used by Defence members • the maximum amount of megabytes than can be sent via Defence email • one of the main software applications used by Defence members, particularly PCS • The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr) • ...
Cyber Security 2021-10-06
5 Clues: errors in someone's code or program • allows a cyber security attacker to take control • technology that that aids in gathering information • someone who seeks and exploits weaknesses in a computer system • computer program that replicates itself in order to spread to other computers
Cyber Security 2021-06-06
5 Clues: The internet is _______. • Handle hacking _____________. • Don't put ________information online. • Don't forget about smart _____ safety. • If you get hacked, change your ________.
Cyber Security 2023-09-21
Across
- It is a way to scramble data so that only authorized parties can unscramble it.
- It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
Down
- It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
- It is a network security device that monitors traffic to or from your network
- It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
5 Clues: It is a network security device that monitors traffic to or from your network • It is a way to scramble data so that only authorized parties can unscramble it. • It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication. • ...
Cyber Bullying Crossword Puzzle 2013-06-04
Across
- Be ______ for your words and actions online.
- When cyber bullying, we should ______ the evidence as it will help in further investigation.
- cyber bullying can _______ people’s feeling.
- Cyber bullying is using the ______ or phone to repeatedly say rude and hurtful things about a person.
- Do not ________ or respond bad word to others.
Down
- Stop _________ people hurtful names.
- when you are being cyber bullied, ________ the incident.
- ________ means posting or sending a lot of unnecessary information.
- ___________ means online manners.
- _______ bullying is to bully others online.
10 Clues: ___________ means online manners. • Stop _________ people hurtful names. • _______ bullying is to bully others online. • cyber bullying can _______ people’s feeling. • Be ______ for your words and actions online. • Do not ________ or respond bad word to others. • when you are being cyber bullied, ________ the incident. • ...
Browsing safety 2025-06-13
Across
- is any criminal activities intended to harm anyone using a computer and an internet connection . = Cybercrime
- A collection of technologies, process, and practices designed to protect network. = Cyber security
- _____ are like online thieves.= Cyber criminals
Down
- An illegal entry into a computer system or network. = Hacking
- Short form of vital information resources under seize.= Virus
- is act of sending an email to a user= phishing
6 Clues: is act of sending an email to a user= phishing • _____ are like online thieves.= Cyber criminals • An illegal entry into a computer system or network. = Hacking • Short form of vital information resources under seize.= Virus • A collection of technologies, process, and practices designed to protect network. = Cyber security • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Cybersecurity Workforce Framework 2020-10-28
Across
- and Operate, Specialized denial and deception operations
- and Development, provide leadership, management, direction, an/or development
- Provision, Conceptualize, design, and build secure IT systems
Down
- and Defend, Identification, analysis and mitigation of threats
- Examine cyber events and/or crimes of IT systems
- Review and evaluate incoming cybersecurity information
- and maintain, Provide support, administration and maintenance
7 Clues: Examine cyber events and/or crimes of IT systems • Review and evaluate incoming cybersecurity information • and Operate, Specialized denial and deception operations • Provision, Conceptualize, design, and build secure IT systems • and Defend, Identification, analysis and mitigation of threats • and maintain, Provide support, administration and maintenance • ...
Security 2013-06-27
Across
- What is the code number for a Firearm?
- What colour should drivers follow in the freight yard on the way in?
- What does the T stand for in OTS?
- What is your base channel when receiving radio calls?
- What type of industry are we in?
- What is Angela’s title other than Manager?
- Who has the final say when allowing freight to enter the yard?
- Stick to what path when in the freight yard?
- A non MSIC holder must also have what for access into the LRZ?
Down
- What does the I stand for in MSIC?
- What lights must be on when in the freight yard?
- Who must you radio to have the vehicle booth gates opened/closed?
- Who takes passengers on/off via the buggy?
- What need must you have to request an MSIC?
- What is the name of the contractor company for security?
- What does the L stand for in LRZ?
- What must a non MSIC holder have whilst in the LRZ?
- What must you display in the LRZ?
- Your MSIC must be above what?
- What channel do you call for Security?
20 Clues: Your MSIC must be above what? • What type of industry are we in? • What does the T stand for in OTS? • What does the L stand for in LRZ? • What must you display in the LRZ? • What does the I stand for in MSIC? • What is the code number for a Firearm? • What channel do you call for Security? • Who takes passengers on/off via the buggy? • ...
security 2013-05-09
Across
- A NSF cheque in a court procedure is what type of evidence?
- A security guard should keep a good?
- Crossword
- Class B fires involve what type of liquids
- An offence under section 494 (1) ccc anyone can arrest found committing
- Security guards are ________ Peace Officers
- Under the Liquor License Act a security guard may only ______ a person
- 10-9 means?
- Section 8 of the Charter Of Rights deals with?
- What would go off in most buildings if there was a fire?
Down
- Who does the security guard answer to ultimately when on duty
- When a witness is on the stand they are giving what type of evidence?
- The Trespass to Property Act is?
- 10-3 means stop ?
- Once a security guard arrests a person they must contact?
- A criminal offence considered a minor offence
- Section 26 of the Criminal Code regulates the amount of?
- Who can report a security guard for code of conduct violation?
- The Criminal Code is a ________ act
- A fingerprint is what type of evidence?
- A gun is what type of evidence?
21 Clues: Crossword • 10-9 means? • 10-3 means stop ? • A gun is what type of evidence? • The Trespass to Property Act is? • The Criminal Code is a ________ act • A security guard should keep a good? • A fingerprint is what type of evidence? • Class B fires involve what type of liquids • Security guards are ________ Peace Officers • A criminal offence considered a minor offence • ...
Security 2025-03-31
Across
- Indicators of potential fraud or suspicious activity (two words)
- A secret word or phrase used to gain access to an account.
- A person authorized to act on behalf of the account owner
- A unique identifier used to log into an account
- The careful and thorough evaluation of potential risks and issues (two words)
- A feature that allows clients to verify their identity using a mobile app (two words)
- Authentication method using the client's voice (two words)
- Abbreviation for Additional Security Questions
- Someone other than the account owner involved in a call or transaction (two words)
- Consent given to perform specific actions
Down
- Granted official permission to access or manage an account
- The process of diagnosing and resolving technical issues (two words)
- An electronic tool used to access accounts, such as a phone or computer (two words)
- A secret code used to verify identity and grant access
- Permission granted to access or perform actions on an account
- Personal questions used to verify identity during authentication (two words)
- Deceptive actions intended to gain unauthorized access to assets
- The ability to log into and manage an account online (two words)
- Notifications or warnings about important account activities or security issues
- Providing guidance or hints to help someone answer questions
20 Clues: Consent given to perform specific actions • Abbreviation for Additional Security Questions • A unique identifier used to log into an account • A secret code used to verify identity and grant access • A person authorized to act on behalf of the account owner • Granted official permission to access or manage an account • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Pokemon TYPES <---------------------------- 2022-11-01
Across
- shiny crystals
- cold
- tiny and disgusting
- poisonous
- flies and might breathe fire
- very strong and is most effective against five other types of Pokemon
- shocking
- mainly for nature-y type Pokemon
- shiny!!!
- for Pokemon in the sky
- WHO TURNED OFF LIGHTS??!!!
Down
- uses mind powers and is very intelligent
- for strong Pokemon on the ground
- boo...
- mostly found in the ocean
- stony
- it burns!!!
- the most basic type
- this type for Pokemon can be found in the cyber simulation
- music
- cute and tough
21 Clues: cold • stony • music • boo... • shocking • shiny!!! • poisonous • it burns!!! • shiny crystals • cute and tough • tiny and disgusting • the most basic type • for Pokemon in the sky • mostly found in the ocean • WHO TURNED OFF LIGHTS??!!! • flies and might breathe fire • for strong Pokemon on the ground • mainly for nature-y type Pokemon • uses mind powers and is very intelligent • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Cyber Security For Teenagers 2024-01-04
Across
- Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)
- Apabila menerima emel dari sumber yang tidak dikenali, lebih baik melakukan __________ dan periksa sebelum membuka lampiran atau mengklik pautan (8 huruf)
- Inisiatif yang melibatkan aktiviti menyelidik dan menganalisis untuk mencari kelemahan dalam sistem keselamatan siber (11 huruf)
- Keadaan di mana sesuatu peranti atau sistem tidak lagi berfungsi dengan baik akibat serangan atau masalah teknikal (5 huruf)
- Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)
- Inisiatif untuk mengajar remaja mengenai keselamatan siber dan etika dalam penggunaan teknologi (9 huruf)
Down
- Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)
- Bahagian penting dalam keselamatan siber; pastikan perisian sentiasa ________ untuk menghadapi ancaman terkini (7 huruf)
- Jenis serangan di mana penyerang cuba memperoleh maklumat peribadi melalui pertanyaan palsu atau manipulasi emosi (8 huruf)
- Untuk melindungi privasi, elakkan daripada memberikan maklumat peribadi di _________ sosial secara terbuka (5 huruf)
10 Clues: Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf) • Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf) • Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf) • ...
Cyber Security Awareness Month 2022-09-22
Across
- Always hover over these in emails before you click them.
- You can send all suspicious emails to this email address so the security team can review them for you.
- These emails entice you to click an unsafe link or attachment.
- This is cybersecurity awareness month.
- Always tell this person if an incident occurs
Down
- Never leave you company computer or phone like this
- This is a password that contains a long string of words that are easy to remember but hard to guess
- Never share this with anyone
- This can infect your computer when you download unsafe software
- Always get approval from this department before downloading any software
10 Clues: Never share this with anyone • This is cybersecurity awareness month. • Always tell this person if an incident occurs • Never leave you company computer or phone like this • Always hover over these in emails before you click them. • These emails entice you to click an unsafe link or attachment. • This can infect your computer when you download unsafe software • ...
Security 2020-03-04
20 Clues: ядро • лимит • правда • способ • попытка • продавец • перемена • получать • включать • разрешать • полезность • надежность • Устройство • подлинность • фальсификация • телекоммуникации • служба поддержки • возможность идентификации • одна из составляющих триады • невозможность отказа от авторства
