cyber security Crossword Puzzles

Cyber Security Awareness & Education - Crossword 2025-08-26

Cyber Security Awareness & Education - Crossword crossword puzzle
Across
  1. a set of numbers used to unlock a phone.
  2. a phishing attempt directed at a leader of an organisation.
  3. hackers often attempt to seal this from your computer or external storage.
  4. a 14-character phrase to secure an account.
  5. the button in Outlook to declare a phish email.
  6. What is the acronym for artificial intelligence.
  7. when a criminal follows behind you when entering a secure building.
  8. turn on when working on a work device out of office.
Down
  1. software used to blackmail targets for money.
  2. software installed to spy on your device.
  3. never click suspicious _____ in emails.
  4. what action should you take when you leave your work computer?
  5. a fake email used to trick the receiver.
  6. phishing that targets one specific person.
  7. sensitive emails must be sent with correct ___?

15 Clues: never click suspicious _____ in emails.a set of numbers used to unlock a phone.a fake email used to trick the receiver.software installed to spy on your device.phishing that targets one specific person.a 14-character phrase to secure an account.software used to blackmail targets for money.the button in Outlook to declare a phish email....

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Attack using precompiled lists of common passwords.
  2. Searching for insecure wireless networks to exploit.
  3. Small piece of code used to exploit a vulnerability.
  4. Technique aimed at disturbing or halting services.
  5. Memory structure targeted in buffer overflow attacks.
  6. Process of gathering information before an attack.
Down
  1. Error caused when data exceeds memory storage limits.
  2. Technique of inserting malicious code into input fields.
  3. Cross-site scripting that injects scripts into web pages.
  4. Code or tool designed to abuse vulnerabilities.
  5. Method of guessing passwords by trying all possibilities.
  6. Attack that makes a system unavailable to users.
  7. Condition where timing flaws lead to security gaps.
  8. Engineering attack that manipulates human behavior.
  9. Database query language often exploited for injection attacks.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Attack using precompiled lists of common passwords.Condition where timing flaws lead to security gaps.Engineering attack that manipulates human behavior....

e-safety 2020-05-19

e-safety crossword puzzle
Across
  1. the opposite of the truth
  2. not actually but it is a barrier of flames
  3. sending someone a false request e.g. saying that there your bank account
Down
  1. another word for cyber
  2. being mean to people online
  3. The best computer science teacher ever
  4. 6 letter word that means security

7 Clues: another word for cyberthe opposite of the truthbeing mean to people online6 letter word that means securityThe best computer science teacher evernot actually but it is a barrier of flamessending someone a false request e.g. saying that there your bank account

EQUATE - Mobile Security Risks Edition 2023-06-21

EQUATE - Mobile Security Risks Edition crossword puzzle
Across
  1. Short for malicious software, it refers to any software designed to harm or exploit computer systems
  2. The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
  3. Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
  4. A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
  1. The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
  2. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
  3. Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  4. A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user

8 Clues: Short for malicious software, it refers to any software designed to harm or exploit computer systemsWireless networking technology that uses radio waves to provide wireless high-speed Internet access.The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people....

Cybersecurity unit 8 and 9 vocabulary 2026-03-26

Cybersecurity unit 8 and 9 vocabulary crossword puzzle
Across
  1. A cyber attack where a hacker alters DNS records to redirect users to a fraudulent website.
  2. small portions of data used to remember user preferences on websites.
  3. A security tool where a password requires multiple different applications all using one time codes to log in.
  4. Standard programming language for communicating with networks.
  5. A security tool to distinguish between humans and bots.
  6. A precise step by step set of instructions or rules to achieve a task or solve a problem.
  7. A one way algorithm that converts data of any size into a fixed-length string of characters, used in cryptography.
  8. A cyberattack where an intruder places themselves in between networks to intercept whatever travels through the network.
  9. A cyberattack where criminals use bots to test stolen username and password pairs on different websites to gain unauthorized access.
Down
  1. A cybersecurity attack where hackers use a list of words and phrases to guess passwords.
  2. A deliberate, unauthorized action to exploit flaws in a network in order to steal or modify data.
  3. Security tool that uses unique traits of a user’s body to grant authentication such as fingerprints or retina.
  4. A technique where a hacker sends data with a falsified source IP to bypass security measures such as firewalls.
  5. A cybersecurity attack where hackers use automated programs to guess every possible combination of characters to guess passwords.
  6. An attempt to exploit vulnerabilities in applications, code, or operating systems to steal data or gain unauthorized access.
  7. A character set comprising both letters and numbers.
  8. A command written in SQL used to communicate with and manipulate data in a database.
  9. A secure, temporary, alphanumerical code used for authentication that only works one time.
  10. A malicious SQL code injected into a database to allow attackers to view or modify data in a database without authorization.
  11. A standardized, structured collection of data.

20 Clues: A standardized, structured collection of data.A character set comprising both letters and numbers.A security tool to distinguish between humans and bots.Standard programming language for communicating with networks.small portions of data used to remember user preferences on websites....

FiGuRe ThIs OuT 2021-11-05

FiGuRe ThIs OuT crossword puzzle
Across
  1. When you say hello you are doing this
  2. Providing information to a group of people
  3. The type of security everyone is concerned about
  4. Something all professionals need
  5. A way to describe things
  6. Telling everyone about an upcoming event
  7. A way to recruit new faculty
  8. An Acronymn that has been in the news alot
  9. How you learn something
  10. You can't be a mentor without one of these
Down
  1. Another word for forum
  2. Made processing payments a lot easier
  3. You need a plan in order for this to work
  4. People that provide instruction
  5. The NSA grants focus on this
  6. Something all professionals need
  7. Nobody likes this
  8. A system with desired outcomes
  9. A lot of this equals information
  10. Funding to perform goals and objectives
  11. You find this as part of a goal
  12. The opposite of local
  13. A very popular night
  14. One of our partners

24 Clues: Nobody likes thisOne of our partnersA very popular nightThe opposite of localAnother word for forumHow you learn somethingA way to describe thingsThe NSA grants focus on thisA way to recruit new facultyA system with desired outcomesPeople that provide instructionYou find this as part of a goalSomething all professionals need...

Digital privacy and data protection 2025-07-08

Digital privacy and data protection crossword puzzle
Across
  1. Shaxsiy yoki individual
  2. Xavfsizlik buzilishi yoki ruxsatsiz kirish
  3. Saqlash yoki ma’lumot joyi
  4. Rozilik yoki ruxsat berish
  5. Hisob (akkaunt) yoki foydalanuvchi profili
  6. Platforma yoki internet xizmat maydoni
  7. Onlayn, internet orqali bog‘langan
  8. Kirish yoki foydalanish huquqi
  9. Kuzatish yoki harakatlarni nazorat qilish
  10. Shaxs yoki kimligingiz haqida ma’lumot
  11. Qonun yoki huquqiy me’yor
  12. Shifrlash yoki maxfiy ma’lumotni kodlash
  13. Internet tarmog‘i
Down
  1. Raqamli yoki elektron shakldagi
  2. Himoya yoki asrash
  3. Xavfsizlik yoki zarar yetmasligi holati
  4. Parol yoki maxfiy so‘z
  5. Ma’lumotlar yoki axborot to‘plami
  6. Texnologiya yoki texnik vositalar tizimi
  7. Nazorat yoki boshqaruv
  8. Siyosat yoki rasmiy qoidalar majmuasi
  9. Shaxsiy hayot daxlsizligi
  10. Axborot yoki ma’lumot
  11. Nozik yoki maxfiy ma’lumot
  12. Doimiy nazorat yoki kuzatuv
  13. Xavfsizlik yoki himoya tizimi
  14. Tartibga solish yoki qonun bilan boshqarish
  15. Foydalanuvchi yoki tizimdan foydalanuvchi shaxs
  16. Ulashish yoki ma’lumot almashish
  17. Internet yoki raqamli muhit bilan bog‘liq

30 Clues: Internet tarmog‘iHimoya yoki asrashAxborot yoki ma’lumotParol yoki maxfiy so‘zNazorat yoki boshqaruvShaxsiy yoki individualShaxsiy hayot daxlsizligiQonun yoki huquqiy me’yorSaqlash yoki ma’lumot joyiRozilik yoki ruxsat berishNozik yoki maxfiy ma’lumotDoimiy nazorat yoki kuzatuvXavfsizlik yoki himoya tizimiKirish yoki foydalanish huquqi...

CTF-CW6 2025-11-14

CTF-CW6 crossword puzzle
Across
  1. The robot butler for incident response
  2. The housekeeper for your digital vault
  3. The digital signature no one can forge
  4. At Tekion, nothing launches past this checkpoint without a security stamp!
  5. Building products with privacy protections from the start
  6. The club bouncer’s preferred guest list
  7. Swapping out names with code numbers in datasets
  8. Not you, not me, but the other guy
  9. The toy box for suspicious files
Down
  1. Hall monitor for regulations
  2. Only requesting essential personal questions on a signup form
  3. The “pest control” for your servers
  4. The Tupperware for your applications
  5. VIP pass for allowed apps and users
  6. No stickynotes—1password’s where Tekion hides the keys!
  7. When your umbrella has a hole—it leaks risk!
  8. The “oops” log for Tekion’s digital slip-ups.
  9. Cyber bouncer’s checklist
  10. Conversation with a website’s memory
  11. Four-letter acronym that stops privacy disasters before they start (abbr.)!

20 Clues: Cyber bouncer’s checklistHall monitor for regulationsThe toy box for suspicious filesNot you, not me, but the other guyThe “pest control” for your serversVIP pass for allowed apps and usersThe Tupperware for your applicationsConversation with a website’s memoryThe robot butler for incident responseThe housekeeper for your digital vault...

Cyber Security Month Crossword 2 ! 2023-10-20

Cyber Security Month  Crossword 2 ! crossword puzzle
Across
  1. A secure network communications protocol
  2. A special code that you need to access your account
  3. Secure remote collaboration tool
  4. Turn on your _____ during video calls to engage with colleagues
  5. Encryption standard used for secure file transfer
  6. A Remote Access Threat. According to some sources, remote workers are more vulnerable to this than those who work in an office environment
  7. Protected Wireless Network
Down
  1. this technology verifies a user's identity by using unique physical or behavioral traits like fingerprints or iris scan
  2. A way to keep your internet connection secure
  3. A document format that's often used for secure sharing
  4. Remote Work Communication Tool
  5. Even though you're at home, it's good to maintain a professional ____ code during work hours
  6. According to a survey by OpenVPN, 73% of vice-presidents and C-Suite IT executives believe remote workers pose a greater risk than on-site employees.Those working from home but not following proper security protocols and _______ _______ form the single biggest threat to organizations in a remote work world.
  7. What you should do when you're not speaking during a video conference.
  8. Cryptographic Protocol used to securely log onto remote systems

15 Clues: Protected Wireless NetworkRemote Work Communication ToolSecure remote collaboration toolA secure network communications protocolA way to keep your internet connection secureEncryption standard used for secure file transferA special code that you need to access your accountA document format that's often used for secure sharing...

Cyber Security Unit-2 Puzzle 2025-10-01

Cyber Security Unit-2 Puzzle crossword puzzle
Across
  1. Technique to rapidly change IP addresses of malicious hosts.
  2. Malware that locks files and demands payment.
  3. Phishing carried out through voice calls.
  4. Phishing carried out through SMS messages.
  5. A person or entity trying to break into systems.
  6. Term used to describe harmful or hostile software/code.
  7. Technique to send data secretly through another network.
  8. Deceptive act intended to gain unlawful advantage.
Down
  1. The reason why attackers launch cyberattacks.
  2. A server used to hide the real identity of a user.
  3. A network of compromised computers controlled remotely.
  4. The underlying network used to support cyberattacks.
  5. Fraudulent attempt to steal information via fake emails/websites.
  6. Software designed to detect and remove malware.
  7. Fake or deceptive programs pretending to be legitimate.

15 Clues: Phishing carried out through voice calls.Phishing carried out through SMS messages.The reason why attackers launch cyberattacks.Malware that locks files and demands payment.Software designed to detect and remove malware.A person or entity trying to break into systems.A server used to hide the real identity of a user....

Cyber Security Unit-1 Puzzle 2025-10-01

Cyber Security Unit-1 Puzzle crossword puzzle
Across
  1. An object representing a user's security context in Windows.
  2. Act that uses vulnerability to do damage to systems.
  3. A security barrier that controls network traffic.
  4. Ensuring data has not been altered or tampered with.
  5. Information safe from accidental or intentional disclosure.
  6. Information is available to authorized users when needed.
  7. The process of converting data into a secret code.
Down
  1. Gaps in a security program.
  2. The act of guaranteeing information is protected.
  3. The art and science of secret communication.
  4. An electronic document used to prove identity online.
  5. The process of verifying who you are.
  6. A type of encryption using only one shared key.
  7. The process of a computer running a program's instructions.
  8. Exploit a vulnerability intentionally or accidentally.

15 Clues: Gaps in a security program.The process of verifying who you are.The art and science of secret communication.A type of encryption using only one shared key.The act of guaranteeing information is protected.A security barrier that controls network traffic.The process of converting data into a secret code....

Cyber Security Unit-5 Puzzle 2025-10-07

Cyber Security Unit-5 Puzzle crossword puzzle
Across
  1. Analysis that observes behavior without executing malware.
  2. Analysis that runs malware to observe its actions.
  3. Person performing memory or malware analysis.
  4. Set of tools or methods used in forensic analysis.
  5. Collection of scripts/tools to aid memory analysis.
  6. Assigning identifiers or categories to malicious code.
  7. Scientific investigation of digital evidence.
Down
  1. Running program or task, sometimes hidden by malware.
  2. Volatile storage analyzed during forensic investigations.
  3. Processes or data intentionally concealed by attackers.
  4. Copying physical memory for analysis.
  5. Decoy system designed to attract and study attackers.
  6. Malicious software analyzed in automated systems.
  7. Analysis performed by a system without human intervention.
  8. Tool/framework for analyzing memory dumps.

15 Clues: Copying physical memory for analysis.Tool/framework for analyzing memory dumps.Person performing memory or malware analysis.Scientific investigation of digital evidence.Malicious software analyzed in automated systems.Analysis that runs malware to observe its actions.Set of tools or methods used in forensic analysis....

Cyber Security Unit-5 Puzzle 2025-10-07

Cyber Security Unit-5 Puzzle crossword puzzle
Across
  1. Analysis that runs malware to observe its actions.
  2. Tool/framework for analyzing memory dumps.
  3. Volatile storage analyzed during forensic investigations.
  4. Scientific investigation of digital evidence.
  5. Collection of scripts/tools to aid memory analysis.
Down
  1. Processes or data intentionally concealed by attackers.
  2. Assigning identifiers or categories to malicious code.
  3. Analysis that observes behavior without executing malware.
  4. Decoy system designed to attract and study attackers.
  5. Malicious software analyzed in automated systems.
  6. Set of tools or methods used in forensic analysis.
  7. Copying physical memory for analysis.
  8. Person performing memory or malware analysis.
  9. Running program or task, sometimes hidden by malware.
  10. Analysis performed by a system without human intervention.

15 Clues: Copying physical memory for analysis.Tool/framework for analyzing memory dumps.Person performing memory or malware analysis.Scientific investigation of digital evidence.Malicious software analyzed in automated systems.Analysis that runs malware to observe its actions.Set of tools or methods used in forensic analysis....

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Searching for insecure wireless networks to exploit.
  2. Small piece of code used to exploit a vulnerability.
  3. Memory structure targeted in buffer overflow attacks.
  4. Technique aimed at disturbing or halting services.
  5. Cross-site scripting that injects scripts into web pages.
  6. Process of gathering information before an attack.
  7. Method of guessing passwords by trying all possibilities.
  8. Engineering attack that manipulates human behavior.
Down
  1. Condition where timing flaws lead to security gaps.
  2. Code or tool designed to abuse vulnerabilities.
  3. Attack using precompiled lists of common passwords.
  4. Error caused when data exceeds memory storage limits.
  5. Attack that makes a system unavailable to users.
  6. Technique of inserting malicious code into input fields.
  7. Database query language often exploited for injection attacks.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Condition where timing flaws lead to security gaps.Attack using precompiled lists of common passwords.Engineering attack that manipulates human behavior....

Cyber Security Unit-4 Puzzle 2025-10-07

Cyber Security Unit-4 Puzzle crossword puzzle
Across
  1. Stealing data entered into online forms.
  2. Malware that stays active after reboots.
  3. Add-on program that extends browser functionality, often abused.
  4. Technique of hiding malicious code to avoid detection.
  5. Shared library file targeted in injection attacks.
  6. Special system rights that attackers try to escalate.
  7. Stealthy software designed to hide the presence of malware.
Down
  1. Stealing security tokens to impersonate a legitimate user.
  2. Malware that secretly monitors and collects user data.
  3. Malicious program that attaches itself to files and spreads.
  4. Application used to access the web, targeted by malware.
  5. Process of gaining higher access rights than intended.
  6. Attack that intercepts communication between two parties.
  7. Self-replicating malicious code that spreads across systems.
  8. Virtual Machine environment bypassed or checked by malware.

15 Clues: Stealing data entered into online forms.Malware that stays active after reboots.Shared library file targeted in injection attacks.Special system rights that attackers try to escalate.Malware that secretly monitors and collects user data.Process of gaining higher access rights than intended.Technique of hiding malicious code to avoid detection....

cyber 2025-05-19

cyber crossword puzzle
Across
  1. The danger that comes from companies or people outside your business
  2. Doing what a reasonable person would do to protect others
  3. A copy of data kept in case the original is lost
  4. How rules, decisions, and controls are managed in a company
  5. A fake message that tricks people into giving away personal info
  6. When private information is stolen or exposed
  7. A written rule or guide that staff must follow
  8. Giving your risk to another party, like an insurance company
  9. A way to decide who can or can’t see or use something
  10. Proving you are who you say you are, like with a password
  11. A weak point in a system that attackers can use
Down
  1. The steps taken after a cyberattack happens
  2. Checking carefully before making a business or security decision
  3. Following the laws, rules, or standards required by authorities
  4. Keeping information private and protected
  5. Someone who causes or tries to cause harm in cyberspace
  6. Hiding data by changing it into secret code
  7. An official check to see if rules are being followed
  8. A tool that blocks unsafe internet traffic from entering a system

19 Clues: Keeping information private and protectedThe steps taken after a cyberattack happensHiding data by changing it into secret codeWhen private information is stolen or exposedA written rule or guide that staff must followA weak point in a system that attackers can useA copy of data kept in case the original is lost...

Tech Crossword Puzzle 2023-10-16

Tech Crossword Puzzle crossword puzzle
Across
  1. All public websites to access on the internet
  2. Tech process for telling a computer which tasks to fulfill
  3. Open source operating source modeled on UNIX
  4. Trace and correct faults in a computer
  5. A computer part or network to block unauthorized access
  6. Making a website accessible and giving adaptable resources
  7. Using microwave or radio signals to transmit signals
  8. Hypertext language
  9. The ability to acquire and apply knowledge and skills
  10. Security Controls to protect systems and the network from cyber attacks
  11. Is a sequence of instruction that is continually until a certain condition is reached
  12. Organized collection of structured info or data
Down
  1. System Software that after being loaded into the computer by an initial boot program and manages a computers resources
  2. Foundation for a system,organization or an electronic system
  3. A process or set of rules to be followed
  4. Interconnecting computing devices that can exchange data with each other
  5. Technology that you can use to create virtual representations of servers
  6. A mark up language that provides rules to define any data
  7. force Hacking method that uses trial and error to crack passwords
  8. Capture or retain digital tech info on storage inside of media
  9. The programs and other operations information used by a computer
  10. Exact copy of a dataset
  11. The process of converting information or data into a code to prevent unauthorized access
  12. Computer program that can capture or manipulate data in rows or columns
  13. Delivery of computing servers

25 Clues: Hypertext languageExact copy of a datasetDelivery of computing serversTrace and correct faults in a computerA process or set of rules to be followedOpen source operating source modeled on UNIXAll public websites to access on the internetOrganized collection of structured info or dataUsing microwave or radio signals to transmit signals...

Cyber Crossword 2025-10-30

Cyber Crossword crossword puzzle
Across
  1. crime investigation; comes after “digital”
  2. attack stage involving traversal between systems
  3. slang term for “hacked”
  4. attack component that performs the target malicious action
  5. to gain attacker presence on a system
  6. field focusing on protecting computers
  7. attack stage where NMAP may be used
  8. facility whose analysts may use a SIEM
  9. investigation of system and network records
  10. principle of least ___
  11. phrase an attacker says after gaining access
  12. network layer protocol with pings
  13. THE defensive cyber club
  14. fancy term for Google-fu
  15. smartcards using close-proximity communication
  16. fun term for a CDRU member
  17. evidence of malicious activity
  18. evil computer program
Down
  1. short form of “covered writing”
  2. comes before “base” or “science”
  3. a tantalizing trap for attackers
  4. engineering type that works on people
  5. act of sending a malicious email
  6. the shield to red’s sword
  7. authorized cyberattack to identify vulnerabilities
  8. proactive defense, or our theme this semester
  9. bypassing physical security devices without a key
  10. IT person in charge of organization computers
  11. act of smuggling data from a system
  12. common term for offensive security person
  13. short form of “secret writing”
  14. often a network packet filter
  15. collections of connected computers
  16. either 0 or 1

34 Clues: either 0 or 1evil computer programprinciple of least ___slang term for “hacked”THE defensive cyber clubfancy term for Google-futhe shield to red’s swordfun term for a CDRU memberoften a network packet filtershort form of “secret writing”evidence of malicious activityshort form of “covered writing”comes before “base” or “science”...

Cyber Security Unit-3 Puzzle 2025-10-07

Cyber Security Unit-3 Puzzle crossword puzzle
Across
  1. Database query language often exploited for injection attacks.
  2. Method of guessing passwords by trying all possibilities.
  3. Condition where timing flaws lead to security gaps.
  4. Technique of inserting malicious code into input fields.
  5. Memory structure targeted in buffer overflow attacks.
  6. Small piece of code used to exploit a vulnerability.
  7. Process of gathering information before an attack.
  8. Code or tool designed to abuse vulnerabilities.
Down
  1. Technique aimed at disturbing or halting services.
  2. Attack using precompiled lists of common passwords.
  3. Searching for insecure wireless networks to exploit.
  4. Error caused when data exceeds memory storage limits.
  5. Engineering attack that manipulates human behavior.
  6. Attack that makes a system unavailable to users.
  7. Cross-site scripting that injects scripts into web pages.

15 Clues: Code or tool designed to abuse vulnerabilities.Attack that makes a system unavailable to users.Technique aimed at disturbing or halting services.Process of gathering information before an attack.Attack using precompiled lists of common passwords.Condition where timing flaws lead to security gaps.Engineering attack that manipulates human behavior....

Cyber Security Unit-2 Puzzle 2025-10-01

Cyber Security Unit-2 Puzzle crossword puzzle
Across
  1. Fake or deceptive programs pretending to be legitimate.
  2. Software designed to detect and remove malware.
  3. Malware that locks files and demands payment.
  4. Phishing carried out through voice calls.
  5. Technique to rapidly change IP addresses of malicious hosts.
  6. A person or entity trying to break into systems.
  7. Phishing carried out through SMS messages.
  8. Deceptive act intended to gain unlawful advantage.
Down
  1. The reason why attackers launch cyberattacks.
  2. The underlying network used to support cyberattacks.
  3. Technique to send data secretly through another network.
  4. A server used to hide the real identity of a user.
  5. A network of compromised computers controlled remotely.
  6. Fraudulent attempt to steal information via fake emails/websites.
  7. Term used to describe harmful or hostile software/code.

15 Clues: Phishing carried out through voice calls.Phishing carried out through SMS messages.The reason why attackers launch cyberattacks.Malware that locks files and demands payment.Software designed to detect and remove malware.A person or entity trying to break into systems.A server used to hide the real identity of a user....

Cs 2023-10-16

Cs crossword puzzle
Across
  1. Malware that tracks and records a user's keystrokes, often used for stealing sensitive information.
  2. the act of downloading or streaming music games and other programes or work without any credit or cracked
  3. Driver Software that enables the operating system to communicate with and control specific hardware devices.
  4. high level programming language
  5. one example of operating system
  6. physical components of a computer system.
  7. one example of closed source software associated with microsoft
  8. malware used to collect data from users (hint tlauncher funny)
  9. Determines how much memory to allocate to each process.
  10. A type of cyber attack that redirects website traffic to a malicious website without the user's knowledge or consent.
Down
  1. A type of cyber attack where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
  2. It takes responsibility for a range of functions including managing processor time, memory management, inputs/outputs, and security.
  3. a type of license software that allows software code to be studied and changed by anyone.
  4. practice of downloading or distributing digital content without permission
  5. Swaps tasks in and out of the processor so it appears the computer is doing more than one task at the same time.
  6. Malware that spreads by replicating itself and infecting other files or systems.
  7. A type of malware that disguises itself as legitimate software or files.
  8. Allocates time to processes that are deemed urgent.
  9. low level programming language
  10. A type of malware that encrypts files and demands a ransom for their release.

20 Clues: low level programming languagehigh level programming languageone example of operating systemphysical components of a computer system.Allocates time to processes that are deemed urgent.Determines how much memory to allocate to each process.malware used to collect data from users (hint tlauncher funny)...

AB1401 puzzle 2020-09-12

AB1401 puzzle crossword puzzle
Across
  1. The use of deception to manipulate individuals into revealing confidential information.
  2. Who are the most vulnerable to be manipulated by hackers?
  3. What security feature did the hacker exploit in the sim swap hack?
  4. What is the most commonly reported security attack?
  5. Which company experienced the biggest cyber attack in Singapore?
Down
  1. How can we guard against social engineering tactics?

6 Clues: What is the most commonly reported security attack?How can we guard against social engineering tactics?Who are the most vulnerable to be manipulated by hackers?Which company experienced the biggest cyber attack in Singapore?What security feature did the hacker exploit in the sim swap hack?...

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

ypdva-y9-CS-unit-1-revision-keywords 2025-12-03

ypdva-y9-CS-unit-1-revision-keywords crossword puzzle
Across
  1. Tool used on emails and networks to block spam or suspicious traffic
  2. Prevention method that ensures people know how to spot a cyber trick
  3. Software designed to protect your device from malware
  4. Copies of data needed to recover from a ransomware attack
  5. Attack that floods a server with requests from many sources
  6. The process used with 2FA to verify a user's identity
  7. Tempting downloads or USB sticks to trick someone into giving data
  8. Prevention method for this threat is being aware of who is watching your screen
  9. General term for malicious software
  10. Installing these will fix security holes and vulnerabilities
  11. A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
  1. Security system that monitors and filters network traffic
  2. Attack that floods a server with requests, often from a single source
  3. Malware that locks your files and demands payment
  4. Sending fake emails to trick a user into clicking a link
  5. Attack that guesses passwords by trying lots of different combinations
  6. Accessing a computer system without permission
  7. A secret set of characters used to secure an account
  8. A dishonest scheme used to trick people
  9. Type of password that makes brute force attacks take a very long time

20 Clues: General term for malicious softwareA dishonest scheme used to trick peopleAccessing a computer system without permissionMalware that locks your files and demands paymentA secret set of characters used to secure an accountSoftware designed to protect your device from malwareThe process used with 2FA to verify a user's identity...

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

Cybersecurity 2022-11-16

Cybersecurity crossword puzzle
Across
  1. Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
  2. The Sarbanes Oxly Act covers which type of activity?
  3. Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
  4. Defined as an intense and selfish desire for something, especially wealth or power.
  5. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  6. One common error when considering people in Cybersecurity is using TRUST instead of
  7. In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
  1. Falsifying header information is a serious violation of the _ Act.
  2. Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
  3. Allows the user to determine how to trust the keys, so its a trust model.
  4. Financial regulations
  5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?

12 Clues: Financial regulationsThe Sarbanes Oxly Act covers which type of activity?Falsifying header information is a serious violation of the _ Act.Allows the user to determine how to trust the keys, so its a trust model.Defined as an intense and selfish desire for something, especially wealth or power....

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Cyber safety-by Angelica Honan 2016-06-08

Cyber safety-by Angelica Honan crossword puzzle
Across
  1. someone who is like a parent
  2. where you go on to find out information
  3. something you do when you are holding something fragile
  4. a type of virus
  5. something that keeps you safe
  6. someone who is a police
  7. where you live
  8. a person that teaches you things
  9. messages something similar to Emails
  10. something that can be detroed
  11. a way you feel when your not scared
Down
  1. when you have to make sure that something is not to Voilt
  2. something that you can play on
  3. something a bad person puts on your computer
  4. adults who you are related to
  5. card A card that has money on it
  6. someone that keeps you safe
  7. when someone sends you something on the computer
  8. when so one is telling you to get in there car
  9. when a bad person watches you on a app

20 Clues: where you livea type of virussomeone who is a policesomeone that keeps you safesomeone who is like a parentadults who you are related tosomething that keeps you safesomething that can be detroedsomething that you can play oncard A card that has money on ita person that teaches you thingsa way you feel when your not scared...

Cybersecurity 2023-07-15

Cybersecurity crossword puzzle
Across
  1. cybersecurity professionals who identify and fix security vulnerabilities
  2. collect and transmit private user information
  3. creates and stores strong passwords
  4. exploits a new vulnerability in software
  5. prevents unauthorized changes to a system’s settings and files
  6. software that combats malware infections
  7. codes that protect data during encryption
  8. floods a website or server with traffic
  9. a network of compromised computers
Down
  1. ubiquitous access points using wireless hotspots
  2. tricks users into clicking on hidden elements
  3. looks safe, but isn't
  4. a secure service that connects remotely to another network
  5. training to protect sensitive information from cyber-attacks.
  6. they illegally exploit network vulnerabilities to gain unauthorized access
  7. blocks unauthorized access to or from a computer network
  8. steals sensitive information or gains access
  9. fake email that fools users into providing information
  10. scrambles data to prevent unauthorized access
  11. locks users out of their computer for a ransom

20 Clues: looks safe, but isn'ta network of compromised computerscreates and stores strong passwordsfloods a website or server with trafficexploits a new vulnerability in softwaresoftware that combats malware infectionscodes that protect data during encryptionsteals sensitive information or gains accesstricks users into clicking on hidden elements...

Madness Project Nexus 2023-12-18

Madness Project Nexus crossword puzzle
Across
  1. Place, two soda cans
  2. clawing at their heads
  3. ominous metal mask
  4. cross-faced
  5. summoned by him
  6. the leader of the cult
  7. extractor
  8. pure of chaos
  9. englishmen
  10. Quo, enmesh the mandatus
  11. militant faction
  12. a faction leader
  13. lives on the outskirts
  14. volleyball tryouts
  15. the masked host
  16. residential sector
  17. directed outwards
  18. head of security
  19. weapons expert
  20. originally began as a meme
  21. a vehicle operator
  22. machines
  23. slightly armored
Down
  1. superfans
  2. any variation in this
  3. hodge-podges
  4. cogwrecked
  5. hiveminded
  6. vices and virtues
  7. to understand
  8. two thousand years
  9. complexities
  10. militant industry
  11. irradiation
  12. a cloning program
  13. devisive
  14. headphones
  15. robombers
  16. yellow blood
  17. check in
  18. generation 5
  19. extremely buoyant
  20. Zed, in the sewers
  21. a complete nerd
  22. the p is silent

45 Clues: devisivecheck inmachinessuperfansextractorrobomberscogwreckedhivemindedenglishmenheadphonescross-facedirradiationhodge-podgescomplexitiesyellow bloodgeneration 5to understandpure of chaosweapons expertsummoned by himthe masked hosta complete nerdthe p is silentmilitant factiona faction leaderhead of securityslightly armoredvices and virtues...

G8 Network with a Purpose 2025-02-19

G8 Network with a Purpose crossword puzzle
Across
  1. secretly collects user data without permission.
  2. A security measure that isolates infected files or systems to prevent malware from spreading.
  3. directs data to the correct destination.
  4. displays unwanted advertisements
  5. replicates itself to spread
  6. A private network
  7. A private network that allows external users
  8. fingerprints or facial recognition
  9. coded format
  10. provides data
  11. A set of rules
  12. two network to a single network.
Down
  1. Malicious software designed to harm
  2. Online communication between multiple users
  3. A wireless technology in short distances.
  4. verifying your identity
  5. connected to share resources and data.
  6. A live, online seminar
  7. converting encrypted data
  8. A networking device that connects multiple devices
  9. unauthorized access
  10. disguised as legitimate software
  11. protect against cyber threats.
  12. attaches itself to a file or program
  13. A global network
  14. wireless connection
  15. from telephone lines or fiber optics.
  16. Server A server that manages printing tasks

28 Clues: coded formatprovides dataA set of rulesA global networkA private networkunauthorized accesswireless connectionA live, online seminarverifying your identityconverting encrypted datareplicates itself to spreadprotect against cyber threats.displays unwanted advertisementsdisguised as legitimate softwaretwo network to a single network....

RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5) 2025-03-17

RU ITEC411-Social, Legal, and Ethical Issues for Computing Technology(Chapter 5) crossword puzzle
Across
  1. Scam that tricks people into revealing sensitive information via email by impersonating a trusted entity.
  2. SMS phishing scam
  3. Security incidents where unauthorized access exposes sensitive data
  4. Malicious program that replicates and spreads, infecting systems to cause harm.
  5. An attack that overloads a system or network to disrupt its normal functioning
  6. Deliberate deception for financial or personal gain.
  7. Converting data into a secure, unreadable format to protect it from unauthorized access.
  8. Unauthorized system access
  9. Block untrusted communication
  10. Verifying identity credentials
Down
  1. Fake websites that act as a legit business and ask for personal information
  2. Unique biological individuals identification
  3. Voice-based phishing that tricks people into revealing sensitive information over phone calls
  4. Granting access permissions
  5. False defamatory statement
  6. Set of rules or guidelines that govern decisions and actions
  7. Cyber weapon virus
  8. Restricts Computer use without authorization
  9. Use of hacking to promote political or social causes
  10. Exposing unethical behavior

20 Clues: SMS phishing scamCyber weapon virusFalse defamatory statementUnauthorized system accessGranting access permissionsExposing unethical behaviorBlock untrusted communicationVerifying identity credentialsUnique biological individuals identificationRestricts Computer use without authorizationDeliberate deception for financial or personal gain....

Cyber Tricks and Treats 2025-08-28

Cyber Tricks and Treats crossword puzzle
Across
  1. What you use to login in, but should be unique and complex for each account
  2. The cyber equivalent of a stake through the heart, used to remove viruses
  3. A virtual private network, protecting your data while you surf the web
  4. A digital skeleton key that can unlock your secure account
  5. A wireless connection standard, like a witch's cauldron of swirling energy
  6. A malevolent program disguised as a harmless application, like a wooden horse
  7. A "ghost network" created by hackers to trick you into connecting to it
  8. A sweet treat that hackers can use to track your online activities
  9. The "I" in the CIA triad, protecting your data from unauthorized modifications
Down
  1. Like a ghost in your machine, it is a type of malicious software that hides in plain sight
  2. What you should always do with your software to protect it from new cyber ghouls
  3. The most frightening kind of malware that holds your computer hostage for a ransom
  4. When you're tricked into revealing sensitive information over the phone
  5. A web address, but you should hover over a suspicious one before you "treat" it with a click
  6. A security measure that stands guard like a sentry against unauthorized access
  7. The "treat" that protects your data from prying eyes
  8. A malicious program that replicates itself, like a zombie spreading a virus
  9. A sneaky attack that pretends to be a legitimate source to steal your information

18 Clues: The "treat" that protects your data from prying eyesA digital skeleton key that can unlock your secure accountA sweet treat that hackers can use to track your online activitiesA virtual private network, protecting your data while you surf the webWhen you're tricked into revealing sensitive information over the phone...

Complete the puzzle with the help of hints: 2023-02-07

Complete the puzzle with the help of hints: crossword puzzle
Across
  1. ________ programs are used to check the user’s keystrokes and get important information, such as passwords.
  2. Name the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments, and enemies also for military, political, or economic advantage.
Down
  1. Name the most expensive virus in the world and in cyber security history.
  2. ________ are one of the most sophisticated types of crime-ware applications that perform a wide variety of automated tasks on behalf of the cyber criminals.
  3. ________ hacking is done for a good cause, such as national security,etc.

5 Clues: Name the most expensive virus in the world and in cyber security history.________ hacking is done for a good cause, such as national security,etc.________ programs are used to check the user’s keystrokes and get important information, such as passwords....

vocab 30-45 2022-09-25

vocab 30-45 crossword puzzle
Across
  1. Portrait stands out and appears raised off the paper; contains clear red and blue fibers woven throughout the bill; has clear, distinct border edges; treasury seal is shown clear, sharp saw-tooth points; watermark appears on the right side of the bull in the light:the security thread is evident- a thin embedded vertical strip with the denomination of the bill printed in it; there is minute printing on the security threads, as well as around the portrait; when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green.
  2. What was first known case in which handwriting analysis played a role?
  3. Handwriting is difficult to disguise and forge
  4. What are the overall height width and size of the letters?
  5. Also called pen testing or ethical hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
  6. When false documents or other items are copied for the purpose of deception
  7. The agency that investigates forgery cases
Down
  1. Good tool for including or excluding persons when determining a match
  2. Any prewritten handwriting samples from a suspect(S)
  3. currency/paper money, traveler’s checks. Food vouchers/ WIC coupons, certain bonds, postage stamps
  4. Similar to fingerprints, every person's handwriting is what it is
  5. The year the us court of appeals determine that handwriting ana;ysiss qualifies as a form of expert testimony
  6. Chemically sensitive paper large font size requires more ink and makes alterations more difficult high resolution borders that are difficult to copy multiple color patterns on paper embed fibers that glow under different light use chemical wash detection systems that change color when a check is altered
  7. Maximum prison term for forgery. Forgery is a federal felony
  8. A computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate

15 Clues: The agency that investigates forgery casesHandwriting is difficult to disguise and forgeAny prewritten handwriting samples from a suspect(S)What are the overall height width and size of the letters?Maximum prison term for forgery. Forgery is a federal felonySimilar to fingerprints, every person's handwriting is what it is...

Digital literacy 2024-05-01

Digital literacy crossword puzzle
Across
  1. Is the transfer of data from one digital devices to another
  2. Privilegedaccessmanagement
  3. Is about expressing ourselves artistically online
  4. To add security features within the computer apps or software to prevent it from cyber attack
  5. Allows sharing ideas and information, including text and visual, through virtual network and communities
  6. Having the knowledge and skills you need to participate in making change in your community
  7. a sever site,or method that delivers media to an audience
  8. Process of transferring files from a user computers to the webserver
  9. A person who commits fraud or participate in a dishonest scheme
  10. A secret word or expression used by authorized person to prove their right to access information, etc.
  11. The process of transferring files from a computer
  12. The hardware and software use to create, store, transmit, manipulate and display information and data.
  13. acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
  14. A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
  15. Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
  16. individual ability to find evaluate,and communicate information using typing or digital media platform
  17. Safeguards information from loss through backup and recovery
  18. The right to control how your information is view and used
  19. Operating system
  20. Constructivedigitalliteracy
Down
  1. Global network of billions of computers and other electronic devices
  2. security Process that prevents sensitive information from getting into the wrong hands
  3. Vertualprivatenetwork
  4. address. Address is a string of numbers separated by periods
  5. Malware
  6. A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
  7. Civicdigitalliteracy
  8. Unauthorizedaccess
  9. The use of technology to harass, threaten, embarrass, or target another person
  10. Emailspoofing
  11. Communicationdigitalliteracy
  12. The ability to find, evaluate, use, share and create content using digital devices
  13. form of media that uses dectronic devices distribution
  14. appreciating and respecting different cultures online
  15. Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
  16. Impression made by the papilarry ridges on the ends of the fingers and thombs
  17. It is a process of transferring files from the users computers to the webserver (on the internet)
  18. Understanding where to go on the internet to find reliable and correct information
  19. Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
  20. are any illegitimate internet website used to deceive users into fraud or malicious attack s
  21. Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
  22. To aid the user doing specific task
  23. Popups
  24. Any activity designed to protect the ability and integrity of your network and data
  25. Is a way to conceal information by altering it so that it appears to be random data
  26. Collection of programs and data that tell computer running
  27. The trial of data you leave when using the internet
  28. Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
  29. Tells a machine which actions to perform and how to complete task

49 Clues: PopupsMalwareEmailspoofingOperating systemUnauthorizedaccessCivicdigitalliteracyVertualprivatenetworkPrivilegedaccessmanagementConstructivedigitalliteracyCommunicationdigitalliteracyTo aid the user doing specific taskIs about expressing ourselves artistically onlineThe process of transferring files from a computer...

Cyber Security Awareness & Education - Crossword 2025-08-26

Cyber Security Awareness & Education - Crossword crossword puzzle
Across
  1. a set of numbers used to unlock a phone.
  2. software installed to spy on your device.
  3. a code used to unlock a device.
  4. use this when working on a work device out of office.
  5. when a criminal follows behind you when entering a secure building.
  6. what criminals want to steal from your computer
Down
  1. never click suspicious _____ in emails.
  2. a 14-character phrase to secure an account.
  3. the button in Outlook to declare a phish email.
  4. sensitive emails must be sent with correct ___?
  5. a fake email used to trick the receiver.
  6. phishing that targets one specific person.
  7. software used to blackmail targets for money.
  8. what to do when you leave your work device?
  9. the advancement of this has broadened phishing attempts across Australia.

15 Clues: a code used to unlock a device.never click suspicious _____ in emails.a set of numbers used to unlock a phone.a fake email used to trick the receiver.software installed to spy on your device.phishing that targets one specific person.a 14-character phrase to secure an account.what to do when you leave your work device?...

cyber security class 7-8 2025-07-07

cyber security class 7-8 crossword puzzle
Across
  1. A person who tries to break into computers or networks
  2. A personal profile you log into on websites or apps
  3. A program that secretly collects what you do on your device
  4. Small data stored by websites to remember what you did
  5. A program that helps protect your computer from harmful software
  6. A program or device that guards your network from threats
Down
  1. Something you install to fix or improve software
  2. Any software made to harm your computer or data
  3. A harmful program that spreads and damages your files
  4. A test websites use to check if you’re a human
  5. A small window that appears on your screen, sometimes as part of a scam
  6. A harmful file that tricks you by looking like something safe
  7. A tool that helps block unwanted content or messages
  8. A scam where someone pretends to be trustworthy to steal your info
  9. A tool that blocks unwanted connections to your computer or network
  10. A part of a website or message that takes you to another page

16 Clues: A test websites use to check if you’re a humanAny software made to harm your computer or dataSomething you install to fix or improve softwareA personal profile you log into on websites or appsA tool that helps block unwanted content or messagesA harmful program that spreads and damages your files...

2021 Security Awareness Training 2021-08-31

2021 Security Awareness Training crossword puzzle
Across
  1. ... via any device, at any time
  2. Example of an awareness module on popular cyber threats.
  3. training content that is updated every year
Down
  1. attacks aimed to access our network, or corrupt our
  2. Course completion is ... for all staff
  3. International standard
  4. The number of bite-sized modules in the training

7 Clues: International standard... via any device, at any timeCourse completion is ... for all stafftraining content that is updated every yearThe number of bite-sized modules in the trainingattacks aimed to access our network, or corrupt ourExample of an awareness module on popular cyber threats.

Darcy Fenwick Cyber safety 2016-05-31

Darcy Fenwick Cyber safety crossword puzzle
Across
  1. to send information from your own computer to another
  2. an electronic mail message sent from one computer
  3. a description of you in photos or words
  4. tag the nickname a user has chosen to be identified
  5. control specific features or software to manage
  6. a location online that allows multiple users
  7. security any technique of soft ware
  8. methods individual to track,lure or harass
  9. engine an Internet server that helps you search
  10. time when something is happening at that moment
Down
  1. Something that slows your computer down
  2. hostile ,strongly worded message
  3. an add that shows up randomly
  4. a program, or a set of instructions that on a computer
  5. a method of sending short messages
  6. a word or number that allows access
  7. the name for bookmarks
  8. any internet-realated illegal activity
  9. to copy a file from one computer system
  10. Pages the site that is the starting point

20 Clues: the name for bookmarksan add that shows up randomlyhostile ,strongly worded messagea method of sending short messagesa word or number that allows accesssecurity any technique of soft wareany internet-realated illegal activitySomething that slows your computer downto copy a file from one computer systema description of you in photos or words...

KNOWLEDGE OF THE WORLD 2018-02-23

KNOWLEDGE OF THE WORLD crossword puzzle
Across
  1. World’s fifth largest diamond discovered in
  2. Alphabet unveils new cyber security business called
  3. 2nd largest contributor to IBM’s 9,000 patents in 2017
  4. Richest city in the world.
  5. Richest Person on Earth
  6. Celebrates 31st state day
  7. Which of the state has first ever to opt out of Modicare?
  8. Host of ‘Baby Olympics’
  9. Bank of Baroda will no longer operate in this country.
  10. Launched ‘World’s Most Powerful Rocket’
Down
  1. First India-designed vaccine to pass WHO test
  2. Country to impose carbon tax from 2019
  3. State with highest gold medals in Khelo India Games.
  4. The Christian evangelist who preached to more than 200 million people in 185 countries but especially know for consuling United States presidents.
  5. 24K Magic
  6. Brand ambassador of Sikkim
  7. Ingvar Kamprad
  8. Which of the social media has approved to launch BHIM UPI?
  9. World’s 4th most punctual ‘mega carrier.’
  10. Launches its first food retail service in India

20 Clues: 24K MagicIngvar KampradRichest Person on EarthHost of ‘Baby Olympics’Celebrates 31st state dayBrand ambassador of SikkimRichest city in the world.Country to impose carbon tax from 2019Launched ‘World’s Most Powerful Rocket’World’s 4th most punctual ‘mega carrier.’World’s fifth largest diamond discovered in...

Skye and Brendan OO 2025-10-02

Skye and Brendan OO crossword puzzle
Across
  1. Groom's go-to drink.
  2. Groom's first car. (5,2)
  3. Class Bride & Groom met in.
  4. Groom's degree (_____ Security)
  5. Name of the couple's youngest dog.
  6. Name of Groom's childhood dog.
  7. Name of the couple's oldest dog.
  8. Bride's college.
  9. Name of Groom's fraternity and Bride's place of work.
  10. Bride's favorite color.
  11. Sport Bride played in college.
  12. Street the couple lives on.
  13. High school Bride & Groom attended.
  14. The Bride & Groom's cat’s name.
  15. Name of Bride's childhood dog.
Down
  1. Groom's zodiac sign.
  2. Year Bride & Groom started dating.
  3. Sport Groom played in highschool.
  4. Bride's degree (_____ Engineering)
  5. Where Groom proposed. (8,4)
  6. The couple's favorite board game.
  7. Bride's first car. (5,5)
  8. Street bride grew up on.
  9. How many years they’ve been together.
  10. Bride & Groom's favorite artist. (3,9)
  11. Street groom grew up.
  12. Groom's college.
  13. Bride's go-to drink. (6,4)
  14. Bride's zodiac sign.
  15. Groom's favorite color.

30 Clues: Bride's college.Groom's college.Groom's zodiac sign.Groom's go-to drink.Bride's zodiac sign.Street groom grew up.Bride's favorite color.Groom's favorite color.Groom's first car. (5,2)Bride's first car. (5,5)Street bride grew up on.Bride's go-to drink. (6,4)Where Groom proposed. (8,4)Class Bride & Groom met in.Street the couple lives on....

Cybersecurity 2 Honors Vocab 2026-03-02

Cybersecurity 2 Honors Vocab crossword puzzle
Across
  1. = files that appear to be legitimate programs, but really contain malicious code.
  2. = a broader, often scheduled release of software that includes, but is not limited to, patches.
  3. = specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  4. = the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using cryptographic algorithms.
  5. = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  6. = refers to the extent to which individuals understand that there are potential threats to the information systems they use and the measures they should take to mitigate those threats.
  7. = a collection of internet connected devices such as computers, smartphones, or IoT devices infected with malware and controlled remotely by a single attacker
Down
  1. = proactive strategies, policies, and technologies implemented to reduce the likelihood and impact of cyber threats on an organization's digital assets
  2. = the process of securing a system by reducing its surface of vulnerability
  3. = program that blocks access to files or block use of the device until a ransom is paid
  4. = a network security system that acts as a barrier between a trusted internal network and untrusted external networks (like the Internet).
  5. = any potential malicious act, event, or person aiming to illegally access, damage, disrupt, or steal data, networks, or digital devices
  6. = a set of rules, regulations, and guidelines that dictate how an organization protects its data and IT infrastructure.
  7. Day = an attack that takes advantage of code flaws that have VERY recently been discovered.
  8. = The use of bogus emails and websites to trick you into confidential information
  9. = is a programmatic approach to educating staff on information security risks, including e-learning, newsletters, and simulations (e.g., phishing campaigns) to change behavior and reduce human error.
  10. = a set of changes (code updates) to a computer program or its supporting data designed to update, fix, or improve it.
  11. Control = a security method that regulates who or what can view or use resources in a computing environment.
  12. = any code or application designed to damage, disrupt, or steal data from computer systems

19 Clues: = the process of securing a system by reducing its surface of vulnerability= files that appear to be legitimate programs, but really contain malicious code.= The use of bogus emails and websites to trick you into confidential information= program that blocks access to files or block use of the device until a ransom is paid...

Summertime Reminders 2025-07-02

Summertime Reminders crossword puzzle
Across
  1. Posting too much personal information on social media.
  2. A cyber attack in which a compromised USB charging station transfers malware to a connected device.
  3. Wireless internet often used in public places.
  4. Document required for foreign travel.
Down
  1. A notification or warning about potential security risks.
  2. Time off for personal travel.
  3. Do not leave these in a vehicle overnight.
  4. Converting data into a code for protection.
  5. Protect your devices by setting this numerical code.
  6. Do this when planning foreign travel.

10 Clues: Time off for personal travel.Do this when planning foreign travel.Document required for foreign travel.Do not leave these in a vehicle overnight.Converting data into a code for protection.Wireless internet often used in public places.Protect your devices by setting this numerical code.Posting too much personal information on social media....

IEEE CS 2025-12-09

IEEE CS crossword puzzle
Across
  1. Fundamental structure of a computer system's components.
  2. Integrated circuit that contains the core of a computer.
  3. Programs and applications that run on a computer.
  4. Formal documents defining hardware and protocol rules.
  5. Computation type where multiple processes run simultaneously.
  6. Pioneer recognized as the father of computer science.
Down
  1. Prefix describing the security field protecting networks.
  2. Iterative and incremental approach to development.
  3. A fundamental unit of work in a database system.
  4. Peer-reviewed academic publication of the society.
  5. Step-by-step procedure for solving a problem.
  6. Online platform where data and services are stored and accessed via the internet.

12 Clues: Step-by-step procedure for solving a problem.A fundamental unit of work in a database system.Programs and applications that run on a computer.Iterative and incremental approach to development.Peer-reviewed academic publication of the society.Pioneer recognized as the father of computer science.Formal documents defining hardware and protocol rules....

CISO Crossword Quiz - 1925 2025-05-14

CISO Crossword Quiz - 1925 crossword puzzle
Across
  1. Face swapping, lip-syncing, Audio Overlays, Voice-Only Cloning, Full-Body Re-enactment techniques are used in which type of cyber scam
  2. A software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features
  3. The action or process of spoiling the appearance of a website in a cyber attack
  4. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  5. The process of monitoring and capturing all data packets passing through a given network
  6. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
Down
  1. The unethical act of violating the privacy of an organization in order to leak internal data or confidential information
  2. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  3. The use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
  4. Phishing Techniques used to target senior executives of an organization

10 Clues: Phishing Techniques used to target senior executives of an organizationThe action or process of spoiling the appearance of a website in a cyber attackThe process of monitoring and capturing all data packets passing through a given network...

FitAVocab.hp 2013-05-15

FitAVocab.hp crossword puzzle
Across
  1. Formal induction into office
  2. Internet Service Provider
  3. Stores all documents
  4. The main circuit board of the computer
  5. Light Emitting Diode
  6. Wireless Fidelity
  7. A laser operated disc drive
  8. Service Set Identifier
  9. National Cyber Security Alliance
  10. Pointing device that navigates the screen
  11. Who, When, Why
  12. Information security applied to computers and networks
  13. Programs used to direct the operation of a computer
  14. To insert something into a machine
  15. A program that lets your program be online
  16. Data transmission in which a single wire can carry several channels at one time
  17. Drive A high-capacity storage device containing a read-write mechanism plus hard drives main storage
  18. A computer program that manages access to a centralized resource of service in a network
  19. An oath someone takes before entering an office by election
  20. Is an interent server that holds photos,music, and videos
  21. EX: "Just Do It"
  22. A device that makes a transmission of data
  23. EX: Camera
Down
  1. EX: Keyboard
  2. Connection from telephone switching station
  3. A device for observing(screen)
  4. Computer networking, broadcasting, using radio signals instead of wires
  5. Type of port to connect a mouse or keyboard to a PC
  6. EX: Angry Birds
  7. How you behave online
  8. Search Gives you information from the top hits from the best search engines, not just one
  9. Mechanical equipment necessary for an activity
  10. The collection of software that directs a computers operation
  11. A mouse that uses a ball
  12. A portable wireless computing device that is small enough to be used while held in the hand
  13. A slot that allows you add more plug ins
  14. A port that allows you to hardwire on internet connection
  15. Virtual reality
  16. A mouse that uses a laser
  17. Being careful and responsible using the web
  18. Engine Program that allows you to search the internet
  19. Computer memory that holds data (Random Access Memory)
  20. A piece of written,printed, or electronic matter that provides information
  21. To give credit
  22. Liquid Crystal Display
  23. Processes information (Central Processing Unit)

46 Clues: EX: CameraEX: KeyboardWho, When, WhyTo give creditEX: Angry BirdsVirtual realityEX: "Just Do It"Wireless FidelityStores all documentsLight Emitting DiodeHow you behave onlineService Set IdentifierLiquid Crystal DisplayA mouse that uses a ballInternet Service ProviderA mouse that uses a laserA laser operated disc driveFormal induction into office...

The last Book in the Universe 2022-02-16

The last Book in the Universe crossword puzzle
Across
  1. What does lanaya give to Spaz
  2. The leader of the bully bangers
  3. The man ryter was supposed to rob
  4. who is the new latch boss of the monkey boys
  5. who took ryters book
  6. what is a Tactical Urban Vehicle; an armored cyber-driven van
  7. Where do Ryter and Litt face live
  8. what do they call old people
  9. A person who is addicted to probing
  10. what is one of Billy's rules
Down
  1. What is one of Gorms rules
  2. Who is dragging the stick and joins them in the pipe
  3. the previous boss of the monkey boys
  4. the proov that passes out edibles
  5. what did Lotti forbid
  6. what is a security guard
  7. Where the bully banger live
  8. who is the boss of the Vandals
  9. what does Lotti have under her fingernails
  10. what is the setting

20 Clues: what is the settingwho took ryters bookwhat did Lotti forbidwhat is a security guardWhat is one of Gorms rulesWhere the bully banger livewhat do they call old peoplewhat is one of Billy's rulesWhat does lanaya give to Spazwho is the boss of the VandalsThe leader of the bully bangersThe man ryter was supposed to robthe proov that passes out edibles...

CTF-CW9 2025-11-14

CTF-CW9 crossword puzzle
Across
  1. How long the burglar napped on your couch
  2. When private information escapes through a security hole
  3. Security’s holy trinity
  4. Cyber-spying with nothing but your browser
  5. The wolf that really is at the door
  6. “Call in the boss! This is above my pay grade!”
  7. The mess you started with
  8. The “seatbelt” for your sensitive files
  9. The report card for tech companies
  10. Who’s a good watchdog for Tekion? This one!
  11. Approach to artificial intelligence that seeks to prevent negative consequences
  12. Fancy word for “the cool stuff we own”
Down
  1. The matrix for your servers
  2. Privacy settings are strict unless the user loosens them
  3. Obfuscation method that answers queries with a bit of added uncertainty
  4. Where every hacker at Tekion learns to play defense.
  5. Rulebook for your info
  6. Tekion’s own “fraud detector”—spotting fake sites before they fool anyone!
  7. IKEA instructions for crisis moments
  8. Your data’s magic decoder ring

20 Clues: Rulebook for your infoSecurity’s holy trinityThe mess you started withThe matrix for your serversYour data’s magic decoder ringThe report card for tech companiesThe wolf that really is at the doorIKEA instructions for crisis momentsFancy word for “the cool stuff we own”The “seatbelt” for your sensitive filesHow long the burglar napped on your couch...

Week 4 – The Cyber Sleuth’s Final Puzzle 2025-10-21

Week 4 – The Cyber Sleuth’s Final Puzzle crossword puzzle
Across
  1. Another word for a fake or deceptive email
  2. What hackers send to trick you into clicking bad links
  3. Software that secretly infects your computer
  4. Security feature that requires a code and a password
  5. A common red flag to identify a phishing email
  6. A code that proves who you are when logging in
  7. You should never reuse the same one twice
Down
  1. Keeping systems protected by installing patches
  2. Something you click that can hide danger
  3. Small image that can link to malicious sites
  4. What you should never share with coworkers or friends
  5. Where you report suspicious messages
  6. The process of teaching staff to avoid cyber threats

13 Clues: Where you report suspicious messagesSomething you click that can hide dangerYou should never reuse the same one twiceAnother word for a fake or deceptive emailSmall image that can link to malicious sitesSoftware that secretly infects your computerA common red flag to identify a phishing emailA code that proves who you are when logging in...

EST News Issue 179 2022-04-11

EST News Issue 179 crossword puzzle
Across
  1. the likelihood of a hazard causing harm
  2. health is extremely important
  3. full __ by 2050, is the aim of the Paris Agreement
Down
  1. The “__ and Cyber security” manual can be found in the DM library
  2. This can affect the global supply chain
  3. these practices improve safety standards onboard
  4. these email accounts can also be hacked
  5. Shipping will face high costs due to climate __

8 Clues: health is extremely importantthe likelihood of a hazard causing harmThis can affect the global supply chainthese email accounts can also be hackedShipping will face high costs due to climate __these practices improve safety standards onboardfull __ by 2050, is the aim of the Paris Agreement...

Computer Networks 2019-05-16

Computer Networks crossword puzzle
Across
  1. gaining unauthorised access to a computer.
  2. computers connected that share information
  3. unique identification (IP or MAC)
  4. programs used by a computer
  5. a copper cable used to connect computers to a network.
  6. wireless technology used for transmitting data over short distances.
Down
  1. Local Area Network a network of computers that covers a small area
  2. equipment adapted for a particular purpose
  3. ways to protect data on a computer
  4. a set of rules for how messages are transmitted across networks
  5. packet a piece of data sent over a network.

11 Clues: programs used by a computerunique identification (IP or MAC)ways to protect data on a computerequipment adapted for a particular purposegaining unauthorised access to a computer.computers connected that share informationpacket a piece of data sent over a network.a copper cable used to connect computers to a network....

VOCABULARY REVIEW 2025-02-20

VOCABULARY REVIEW crossword puzzle
Across
  1. - object used to write with
  2. - a fluid used to make impressions on paper
  3. - the ability of consumption to be maintained at a certain rate or level
  4. - use of robotics to aid in large scale production
  5. security - the field of digital privacy
  6. - valuable materials, usually in the form of precious metals or gems
Down
  1. - Technology that can manipulate individual atoms or molecules
  2. - further develop technological advancement
  3. - human remains found in Egypt
  4. - material used for writing on in Egypt
  5. - large Egyptian structures, usually holding deceased pharaohs
  6. intelligence - computer system that can complete tasks usually done by humans
  7. - a person who studies human history through the excavation of historical sites

13 Clues: - object used to write with- human remains found in Egypt- material used for writing on in Egyptsecurity - the field of digital privacy- further develop technological advancement- a fluid used to make impressions on paper- use of robotics to aid in large scale production- Technology that can manipulate individual atoms or molecules...

Impact of AI and blockchain on modern banking 2025-11-25

Impact of AI and blockchain on modern banking crossword puzzle
Across
  1. Verification of customer identity using AI biometrics.
  2. Software that detects suspicious transactions to prevent fraud
  3. Banking using mobile phones or apps
  4. Transactions without physical money.
  5. AI-powered communication tools used by banks for customer service.
Down
  1. A system where control is distributed rather than held by a central authority.
  2. Protection of banking data from cyber threats.
  3. A record of transactions stored in blocks and linked securely
  4. Technology that combines finance and digital innovaions
  5. A digital ledger system used for secure transactions
  6. Studying large data to make predictions for decision-making
  7. Replacing human efforts with intelligent systems to improve efficiency

12 Clues: Banking using mobile phones or appsTransactions without physical money.Protection of banking data from cyber threats.A digital ledger system used for secure transactionsVerification of customer identity using AI biometrics.Technology that combines finance and digital innovaionsStudying large data to make predictions for decision-making...

How can you report hacking? 2022-05-18

How can you report hacking? crossword puzzle
Across
  1. Computer fraud to the...
  2. to National Cyber Security Centre
  3. Received a ____ text?, forward to 7726 (free)
Down
  1. Computer fraud to...
  2. report@________.gov.uk

5 Clues: Computer fraud to...report@________.gov.ukComputer fraud to the...to National Cyber Security CentreReceived a ____ text?, forward to 7726 (free)

Information Security Crossword - 4 2013-07-09

Information Security Crossword - 4 crossword puzzle
Across
  1. Fulfilling contractual requirements is also a ________ requirement.
  2. Internet related.
  3. Ensuring ________ safety is in the scope of information security.
  4. Division of office space into areas with varying degree of physical access controls.
  5. A server getting infected with virus leads to the loss of ________ of the computer system.
Down
  1. Generates random one time passwords.
  2. Emergency exits always open _________.
  3. Personal computers requires ______ as much as office systems.
  4. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
  5. Coming out safely from structure in danger.

10 Clues: Internet related.Generates random one time passwords.Emergency exits always open _________.Coming out safely from structure in danger.Personal computers requires ______ as much as office systems.Ensuring ________ safety is in the scope of information security.Fulfilling contractual requirements is also a ________ requirement....

Meta Product Security 2024-04-25

Meta Product Security crossword puzzle
Across
  1. Secure messaging app with end-to-end encryption
  2. Network security system to block unauthorized access
  3. Data providing information about other data
  4. Social media platform with over 2.7 billion monthly active users
  5. Simulated cyber attack to test system defenses
  6. Photo and video sharing platform with over 1 billion active users
Down
  1. Process of verifying user identity
  2. Method of protecting data by converting it into code
  3. Open standard for authorization and authentication
  4. Secure protocol for online data transfer (now replaced by TLS)

10 Clues: Process of verifying user identityData providing information about other dataSimulated cyber attack to test system defensesSecure messaging app with end-to-end encryptionOpen standard for authorization and authenticationNetwork security system to block unauthorized accessMethod of protecting data by converting it into code...

CTI Crossword 2025-02-18

CTI Crossword crossword puzzle
Across
  1. A tool for analyzing logs for security incidents (owned by Cisco)
  2. A group of indicators that define a malicious activity pattern
  3. A system that monitors network traffic for malicious activity
  4. Malware that locks files and demands payment
Down
  1. Technique for disguising malicious activity as legitimate
  2. Unauthorized access to or control over a computer system
  3. An attack that overwhelms a network with traffic
  4. A method of tricking users into revealing sensitive information
  5. Framework for describing cyber threat information
  6. Malicious software that spreads without user action

10 Clues: Malware that locks files and demands paymentAn attack that overwhelms a network with trafficFramework for describing cyber threat informationMalicious software that spreads without user actionUnauthorized access to or control over a computer systemTechnique for disguising malicious activity as legitimate...

Communication Review 2025-02-28

Communication Review crossword puzzle
Across
  1. - the condition of being protected from danger
  2. Media- The communication on the internet
  3. - tricking someone into giving personal in formation
  4. - Security software that protects against internet threats
Down
  1. - bullying someone online
  2. - someone you do not know

6 Clues: - bullying someone online- someone you do not knowMedia- The communication on the internet- the condition of being protected from danger- tricking someone into giving personal in formation- Security software that protects against internet threats

Introduction to Cyber Security - Harjap Nahal 2023-09-08

Introduction to Cyber Security - Harjap Nahal crossword puzzle
Across
  1. protects your data including employee and customer data
  2. protecting data and the systems that store it from attacks
  3. Operating information used by the computer
  4. offer services to the client such as outsourced technology support
  5. creates a copy of the data that can be recovered incase something happens
  6. bring up to date, modernize
  7. prevents phishing attacks from happening
  8. unauthorized parties gaining access to confidential information
  9. used to protect data from being stolen, changed, or compromised
  10. an action of fraud
Down
  1. the process of verifying a user or device before allowing access to a system or resources
  2. a cyber attack where someone tricks other computers networks
  3. to keep an eye on something
  4. an attempt by hackers to damage or destroy a computer network or system
  5. secure place to store online content
  6. checking or proving something is true
  7. something that protects and gives safety
  8. tricking internet users into revealing their personal or private information
  9. needed to get into something
  10. encrypts data sent over by the internet to prevent hackers from seeing it

20 Clues: an action of fraudto keep an eye on somethingbring up to date, modernizeneeded to get into somethingsecure place to store online contentchecking or proving something is truesomething that protects and gives safetyprevents phishing attacks from happeningOperating information used by the computerprotects your data including employee and customer data...

Computer Crime and Cyber Security (KS3) 2025-06-06

Computer Crime and Cyber Security (KS3) crossword puzzle
Across
  1. This type of attack tries to crack a password by checking words from a dictionary.
  2. The way you sit, which can affect your back health when using computers.
  3. Obtaining personal information, like passwords, by looking over someone's shoulder.
  4. A legal framework in the UK that protects personal information, updated in 2018.
  5. A boolean value representing logical false (from starter activity).
  6. An error in the program's thinking that causes unexpected results, even if it runs.
  7. This type of email scam tries to trick you into revealing personal information like login details.
  8. A problem that can arise from looking at screens for too long.
  9. This scam promises large sums of money but requires an upfront payment.
  10. A specific type of malicious software disguised as a legitimate program.
  11. A type of malware that is able to replicate itself.
  12. Malicious software.
  13. A condition caused by repeating the same actions over and over, making it painful to type or use a mouse.
Down
  1. When files are scrambled and unreadable, often by ransomware.
  2. Legal protection for the owner of a creative work from illegal copying.
  3. Secret words or phrases used to protect accounts and systems.
  4. Information directly linked to a person, like their name or mobile number.
  5. Accessing a computer system or files without permission.
  6. The act of illegally accessing a computer or data without permission.
  7. The organisation in the UK responsible for data protection.
  8. Files sent with an email, which can sometimes contain malware.
  9. A type of fire extinguisher safe for electrical fires.
  10. This type of attack attempts to guess a password by trying every single combination.
  11. Copying someone else's work and presenting it as your own.
  12. Malware that encrypts files and demands payment for the decryption key.
  13. Penalties that can be issued for serious copyright offences or data breaches.
  14. Storing a copy of data to restore from if original files are lost or encrypted.
  15. The process of finding and fixing errors in code.
  16. Unwanted or junk email.
  17. An emotion expressed by the word "Blimey".

30 Clues: Malicious software.Unwanted or junk email.An emotion expressed by the word "Blimey".The process of finding and fixing errors in code.A type of malware that is able to replicate itself.A type of fire extinguisher safe for electrical fires.Accessing a computer system or files without permission....

EGBANK Frontier Induction 2024-02-27

EGBANK Frontier Induction crossword puzzle
Across
  1. Provides information about all the financial inclusion tools EGBANK tools
  2. You can get in this session tips to avoid cyber security hacks
  3. All you need to know about EGBANK's organizational structure and performance management cycle
Down
  1. Introduces the EGBANK's advertisement side
  2. Helps you to know what formal dress code looks like
  3. Introduce you to EGBANK main health care benefits

6 Clues: Introduces the EGBANK's advertisement sideIntroduce you to EGBANK main health care benefitsHelps you to know what formal dress code looks likeYou can get in this session tips to avoid cyber security hacksProvides information about all the financial inclusion tools EGBANK tools...

Learnig 2023-11-03

Learnig crossword puzzle
Across
  1. Cyber
  2. AI
Down
  1. DGOV
  2. Transformation

4 Clues: AIDGOVCyberTransformation

Responsible AI Principles Crossword 2024-11-19

Responsible AI Principles Crossword crossword puzzle
Across
  1. Environmental consideration in AI deployment
  2. Principle focusing on treating all groups equally
  3. Making AI processes and decisions clear and understandable
Down
  1. Having clear roles and responsibilities in AI governance
  2. Understanding impact on people when deploying AI
  3. Protecting AI systems from cyber-threats
  4. Evaluating and mitigating potential harm in AI systems

7 Clues: Protecting AI systems from cyber-threatsEnvironmental consideration in AI deploymentUnderstanding impact on people when deploying AIPrinciple focusing on treating all groups equallyEvaluating and mitigating potential harm in AI systemsHaving clear roles and responsibilities in AI governanceMaking AI processes and decisions clear and understandable

Brain-Riddle Round 2 2025-02-12

Brain-Riddle Round 2 crossword puzzle
Across
  1. Temporary storage that speeds up data retrieval.
  2. A temporary interaction between a user and a website.
  3. An intermediary server between a user and the internet.
  4. A language used to style web pages.
  5. A method of hiding data within other files.
  6. A communication endpoint for network connections.
Down
  1. The data sent back from a server after a request.
  2. A process of converting data into a fixed-size value.
  3. A software vulnerability unknown to the vendor.
  4. The part of a cyber attack that carries malicious code.
  5. A set of rules for communication between software.
  6. A security feature that controls web resource access.
  7. A network utility used to test connectivity.
  8. A file containing code for automation.
  9. A standard language for creating web pages.

15 Clues: A language used to style web pages.A file containing code for automation.A method of hiding data within other files.A standard language for creating web pages.A network utility used to test connectivity.A software vulnerability unknown to the vendor.Temporary storage that speeds up data retrieval.The data sent back from a server after a request....

Watch Out, We're Watching ... 2024-04-03

Watch Out, We're Watching ... crossword puzzle
Across
  1. Unauthorized access or data compromise event.
  2. Compulsively scrolling through negative news, causing anxiety or distress.
  3. Information collected and analyzed for decision making.
  4. Keeping safe from harm.
  5. What was compromised due to unauthorized data collection?
  6. Your favorite english teacher!
  7. Name of the firm involved in the 2018 data privacy scandal.
Down
  1. The anxiety of feeling left out from experiences others are having.
  2. Financial state Cambridge Analytica declared in 2018.
  3. Protection against unauthorized access or cyber threats.
  4. European data protection regulation enacted in response to privacy concerns.
  5. Weaknesses in a website that can be exploited by attackers.
  6. Complex computer processes used to analyze user data.
  7. Moral principles that govern a person's behavior.
  8. Type of app used to collect data on Facebook users.

15 Clues: Keeping safe from harm.Your favorite english teacher!Unauthorized access or data compromise event.Moral principles that govern a person's behavior.Type of app used to collect data on Facebook users.Financial state Cambridge Analytica declared in 2018.Complex computer processes used to analyze user data....

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. _____rights/issues
  2. a system of government where people of a country can vote to elect their leaders
  3. the environmental______of tourism
  4. that is legally or officially acceptable
  5. a feeling that you have a link with somebody/something or are part of a group
  6. ​a device that can react to light, heat, pressure, etc. in order to make a machine
  7. Kingdom of Talossa;Sealand; Liberians are______
  8. someone who steals your information through the internet
  9. every adult has the right to vote
Down
  1. antonym of specific
  2. racial/social/gender______
  3. someone who is rich and powerful
  4. a country that has a king or a queen as the leader
  5. the activities involved in protecting Sth
  6. connected with electronic communication networks, especially the internet

15 Clues: _____rights/issuesantonym of specificracial/social/gender______someone who is rich and powerfulthe environmental______of tourismevery adult has the right to votethat is legally or officially acceptablethe activities involved in protecting SthKingdom of Talossa;Sealand; Liberians are______a country that has a king or a queen as the leader...

Cyber Warfare 2022-08-08

Cyber Warfare crossword puzzle
Across
  1. Where you can find GCHQ
  2. The use of computer technology to disrupt the activities of a state or organisation.
  3. Activists enthusiastic about hacking with neither good nor bad intentions.
  4. Term for a recently discovered exploit/weakness.
  5. "Father" of code-breaking.
  6. Act of compromising digital devices and networks through unauthorised access.
Down
  1. Where Joan Clarke worked during WW2.
  2. Breaks into protected systems and networks with permission to test their security.
  3. Malicious computer worm uncovered in 2010.
  4. UK's intelligence agency.
  5. Another term for "Malicious Software".
  6. Cyber criminals with malicious intent.
  7. A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
  8. Code created by German's during WW2.
  9. Overwhelming a service or network with internet traffic.

15 Clues: Where you can find GCHQUK's intelligence agency."Father" of code-breaking.Where Joan Clarke worked during WW2.Code created by German's during WW2.Another term for "Malicious Software".Cyber criminals with malicious intent.Malicious computer worm uncovered in 2010.Term for a recently discovered exploit/weakness....

CJCC Crossword 2023-05-10

CJCC Crossword crossword puzzle
Across
  1. Who handles all media requests?
  2. Who is going to remind you to do your cyber security training?
  3. What branch of government does CJCC fall under?
  4. How many seats are there on the Council?
  5. This division handles data collection and analysis (abbv.)
  6. Our current Council Chairman
  7. Jay goes here to meet with legislators about the CJCC budget
  8. Governor Brian P._____
  9. The Chairman of Victims Compensation Board (last name)
  10. Where did our CJCC attorneys go to law school? (abbv.)
  11. Our friendly neighborhood CFO
Down
  1. Who lets you know when we are closing early?
  2. Who has worked at CJCC the longest?
  3. Our office is located in this building
  4. Our Executive Director
  5. CJCC was founded in 198_
  6. Criminal Justice Coordinating Council (abbv.)
  7. ____ Kemp. The member of the First Family who works to tackle human trafficking.

18 Clues: Our Executive DirectorGovernor Brian P._____CJCC was founded in 198_Our current Council ChairmanOur friendly neighborhood CFOWho handles all media requests?Who has worked at CJCC the longest?Our office is located in this buildingHow many seats are there on the Council?Who lets you know when we are closing early?...

Internet saftey 2023-10-24

Internet saftey crossword puzzle
Across
  1. - a security device that protects users online
  2. - fake emails or messages to get personal information
  3. the name given to the type of bullying when online
  4. When a stranger tries to start a relationship with a child for unlawful purposes
  5. information, stored on computers and other storage devices
Down
  1. wireless connection to the internet
  2. A diary or personal journal kept on a website
  3. should be a minimum of 12 characters long
  4. - illegally breaking into computer devices
  5. - a famous search engine

10 Clues: - a famous search enginewireless connection to the internetshould be a minimum of 12 characters long- illegally breaking into computer devicesA diary or personal journal kept on a website- a security device that protects users onlinethe name given to the type of bullying when online- fake emails or messages to get personal information...

Join the Elite Cyber Team 2020-06-26

Join the Elite Cyber Team crossword puzzle
Across
  1. Shift cipher named after a famous Roman, Julius ?
  2. The largest WAN of these is the internet.
  3. Subject does research & development, lab coats optional.
  4. Convert a coded message into intelligible words.
  5. Statement of intention to inflict damage / hostile action
Down
  1. Knowing these will help you pass exams.
  2. Machine used in WW2 to send secret messages in Germany.
  3. To protect data and humans ensure you have S?
  4. Attack that damages or destroys online systems is called?
  5. Updated typewriter, spell checking and rocket launching.

10 Clues: Knowing these will help you pass exams.The largest WAN of these is the internet.To protect data and humans ensure you have S?Convert a coded message into intelligible words.Shift cipher named after a famous Roman, Julius ?Machine used in WW2 to send secret messages in Germany.Subject does research & development, lab coats optional....

CSA CROSSWORD #1 2022-01-07

CSA CROSSWORD #1 crossword puzzle
Across
  1. industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  2. form of cloud computing that provides virtualized computing resources over the internet.
  3. cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
  4. a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
  5. This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
  1. cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  2. Centre of expertise for cyber security in Europe
  3. widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  4. way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
  5. cybersecurity control framework for cloud computing

10 Clues: Centre of expertise for cyber security in Europecybersecurity control framework for cloud computingform of cloud computing that provides virtualized computing resources over the internet.cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

Crossword 2020-11-24

Crossword crossword puzzle
Across
  1. traffic
  2. city
Down
  1. security
  2. off

4 Clues: offcitytrafficsecurity

Tech 2024-01-12

Tech crossword puzzle
Across
  1. Malicious software (5)
  2. The process of converting information into code to prevent unauthorized access (10)
  3. An attempt to trick people into giving away sensitive information (9)
  4. A type of cyber attack that floods a network with traffic (6)
  5. A program that replicates itself and spreads to other computers (8)
  6. Protects against unauthorized access (9)
Down
  1. A security measure using a unique identifier (8)
  2. Encryption method (7)
  3. The best MSP around (5)
  4. A set of rules that controls network traffic (7)

10 Clues: Encryption method (7)Malicious software (5)The best MSP around (5)Protects against unauthorized access (9)A security measure using a unique identifier (8)A set of rules that controls network traffic (7)A type of cyber attack that floods a network with traffic (6)A program that replicates itself and spreads to other computers (8)...

Business Continuity Awareness Week 2023 2022-12-13

Business Continuity Awareness Week 2023 crossword puzzle
Across
  1. people need to be able to call you using these.
  2. Consistent operations
  3. allows computers to talk to each other and the internet.
  4. access to and from this is vital
  5. Hosts data and services for your business
  6. duplication of resources for better continuity
Down
  1. Keeping bad guys out both physically and in the cyber realm.
  2. None of your electronics will run without this.
  3. this service allows you to send and receive messages over the internet.

9 Clues: Consistent operationsaccess to and from this is vitalHosts data and services for your businessduplication of resources for better continuitypeople need to be able to call you using these.None of your electronics will run without this.allows computers to talk to each other and the internet.Keeping bad guys out both physically and in the cyber realm....

Cyber Security by Michaela Erica Arcenal 2026-02-28

Cyber Security by Michaela Erica Arcenal crossword puzzle
Across
  1. Information used to verify identity
  2. A cyberattack that tricks users into revealing personal information
  3. A physical or digital device used for authentication
  4. The science of securing information through codes
  5. Malware that locks files and demands payment to restore access
  6. A method used to convert plain text into coded text
  7. Restricting who can view or use resources
  8. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  9. The act of entering credentials to access a system
  10. Malicious software that secretly collects user information
  11. Permission given to collect or use personal data
  12. Protection of computer networks from intruders
  13. Using multiple methods to verify identity
  14. A security system that monitors and controls network traffic
  15. A fraudulent scheme to steal money or information
  16. Identity verification using fingerprints or face recognition
  17. The process of converting information into coded form
  18. A method of blocking or allowing data based on rules
  19. The protection of personal information from misuse
  20. A security process that uses two methods to verify identity
  21. Fake email messages designed to trick recipients
Down
  1. A security expert who tests systems legally
  2. A short numeric password
  3. Pretending to be a trusted source to deceive users
  4. Software designed to detect and remove viruses
  5. The process of verifying a user’s identity
  6. A person who gains unauthorized access to computer systems
  7. Keeping information secret from unauthorized users
  8. A person who commits crimes using computers
  9. A longer version of a password made of multiple words
  10. Malware disguised as legitimate software to trick users
  11. Simulated cyberattack to test system security
  12. When malicious software enters a system
  13. Confirming the identity of a user
  14. The process of converting coded text back to readable form
  15. A type of malware that spreads and infects systems
  16. A temporary code used for login verification
  17. Malware that spreads without user action
  18. A secret word or phrase used to access a system
  19. Safeguarding personal information from misuse

40 Clues: A short numeric passwordConfirming the identity of a userInformation used to verify identityWhen malicious software enters a systemMalware that spreads without user actionRestricting who can view or use resourcesUsing multiple methods to verify identityThe process of verifying a user’s identityA security expert who tests systems legally...

Cyber Security by Michaela Erica Arcenal 2026-02-28

Cyber Security by Michaela Erica Arcenal crossword puzzle
Across
  1. The process of converting information into coded form
  2. A physical or digital device used for authentication
  3. Malware disguised as legitimate software to trick users
  4. Identity verification using fingerprints or face recognition
  5. Restricting who can view or use resources
  6. Software designed to detect and remove viruses
  7. A longer version of a password made of multiple words
  8. When malicious software enters a system
  9. Keeping information secret from unauthorized users
  10. Simulated cyberattack to test system security
  11. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  12. A secret word or phrase used to access a system
  13. A cyberattack that tricks users into revealing personal information
  14. Using multiple methods to verify identity
  15. A method of blocking or allowing data based on rules
  16. A person who gains unauthorized access to computer systems
  17. The protection of personal information from misuse
Down
  1. A security process that uses two methods to verify identity
  2. Permission given to collect or use personal data
  3. Safeguarding personal information from misuse
  4. Information used to verify identity
  5. The process of verifying a user’s identity
  6. Malicious software that secretly collects user information
  7. A security system that monitors and controls network traffic
  8. Confirming the identity of a user
  9. The act of entering credentials to access a system
  10. A type of malware that spreads and infects systems
  11. Protection of computer networks from intruders
  12. A short numeric password
  13. The science of securing information through codes
  14. Malware that locks files and demands payment to restore access
  15. Fake email messages designed to trick recipients
  16. Pretending to be a trusted source to deceive users
  17. A temporary code used for login verification
  18. A person who commits crimes using computers
  19. A fraudulent scheme to steal money or information
  20. The process of converting coded text back to readable form
  21. A method used to convert plain text into coded text
  22. Malware that spreads without user action
  23. A security expert who tests systems legally

40 Clues: A short numeric passwordConfirming the identity of a userInformation used to verify identityWhen malicious software enters a systemMalware that spreads without user actionRestricting who can view or use resourcesUsing multiple methods to verify identityThe process of verifying a user’s identityA person who commits crimes using computers...

Cyber Security by Michaela Erica Arcenal 2026-02-28

Cyber Security by Michaela Erica Arcenal crossword puzzle
Across
  1. The process of converting information into coded form
  2. A physical or digital device used for authentication
  3. Malware disguised as legitimate software to trick users
  4. Identity verification using fingerprints or face recognition
  5. Restricting who can view or use resources
  6. Software designed to detect and remove viruses
  7. A longer version of a password made of multiple words
  8. When malicious software enters a system
  9. Keeping information secret from unauthorized users
  10. Simulated cyberattack to test system security
  11. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  12. A secret word or phrase used to access a system
  13. A cyberattack that tricks users into revealing personal information
  14. Using multiple methods to verify identity
  15. A method of blocking or allowing data based on rules
  16. A person who gains unauthorized access to computer systems
  17. The protection of personal information from misuse
Down
  1. A security process that uses two methods to verify identity
  2. Permission given to collect or use personal data
  3. Safeguarding personal information from misuse
  4. Information used to verify identity
  5. The process of verifying a user’s identity
  6. Malicious software that secretly collects user information
  7. A security system that monitors and controls network traffic
  8. Confirming the identity of a user
  9. The act of entering credentials to access a system
  10. A type of malware that spreads and infects systems
  11. Protection of computer networks from intruders
  12. A short numeric password
  13. The science of securing information through codes
  14. Malware that locks files and demands payment to restore access
  15. Fake email messages designed to trick recipients
  16. Pretending to be a trusted source to deceive users
  17. A temporary code used for login verification
  18. A person who commits crimes using computers
  19. A fraudulent scheme to steal money or information
  20. The process of converting coded text back to readable form
  21. A method used to convert plain text into coded text
  22. Malware that spreads without user action
  23. A security expert who tests systems legally

40 Clues: A short numeric passwordConfirming the identity of a userInformation used to verify identityWhen malicious software enters a systemMalware that spreads without user actionRestricting who can view or use resourcesUsing multiple methods to verify identityThe process of verifying a user’s identityA person who commits crimes using computers...

Why is Cybersecurity Necessary? 2023-01-27

Why is Cybersecurity Necessary? crossword puzzle
Across
  1. Set of defined actions to take in accordance with established policy.
  2. Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
  3. Set of actions taken after a cyber event has occurred.
  4. Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
  1. Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
  2. Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
  3. Technical and non-technical measures to know that you have been compromised.
  4. People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.

8 Clues: Set of actions taken after a cyber event has occurred.Set of defined actions to take in accordance with established policy.Technical and non-technical measures to know that you have been compromised.Cybersecurity programs must be established, maintained, and is not a set it and forget it matter....

FSA 1 2021-02-03

FSA 1 crossword puzzle
Across
  1. THE AMOUNT THAT A BORROWER CAN BORROW FOR A SECURED LOAN IS USUALLY ____ THAN AN UNSECURED LOAN
  2. INTEREST RATES USED BY BANKS WHEN LENDING UNSECURED FUNDS TO EACH OTHER
  3. A PLATFORM THAT CAN ALLOW BUSINESSES TO POOL MONEY FROM A VARIETY OF SOURCES
  4. THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN
  5. THIS FORM OF LOGOUT CLOSES A USER’S ACCESS AFTER A FEW MINUTES OF INACTIVITY
  6. THE TYPE OF LOAN THAT THE BORROWER DOES NOT NEED TO PLEDGE AN ASSET AS COLLATERAL
  7. A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN
  8. AN EXAMPLE OF WHICH IS A SIX-DIGIT CODE SENT TO A CUSTOMER’S CELL PHONE FOR ADDITIONAL SECURITY
  9. DURING A SLUMP, THE GOVERNMENT CAN ____ THE INTEREST RATE TO ENCOURAGE SPENDING
Down
  1. FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION
  2. A FORM OF AUTHENTICATION THAT RELIES ON RETINA SCANS, THUMBPRINTS OR FACIAL RECOGNITION
  3. THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY
  4. HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME
  5. THE MARKET VALUE OF AL GOODS AND SERVICES PRODUCED WITHIN THE COUNTRY
  6. MAS IS SINGAPORE’S _____ BANK.
  7. THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH
  8. A CYBER-SECURITY DEVICE AND CONFIGURATION TO BLOCK ATTACKS

17 Clues: MAS IS SINGAPORE’S _____ BANK.A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWNTHE ORGANIZATION TO REGISTER YOUR BUSINESS WITHTHE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGINHAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOMETHE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITYFOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION...

tentang ai runway gen 3 alpha 2024-10-30

tentang ai runway gen 3 alpha crossword puzzle
Across
  1. AI
  2. Security
  3. manual
Down
  1. video

4 Clues: AIvideomanualSecurity

The Wild World of Incident Response – How It Could Save Your Organization's Life! 2024-09-18

The Wild World of Incident Response – How It Could Save Your Organization's Life! crossword puzzle
Across
  1. Always think before you do this.
  2. How to check a URL.
  3. Something social engineers are good at.
Down
  1. Never open an unsolicited one from an unknown sender.
  2. Type of scam where the attacker impersonates a senior executive.
  3. What you should do with a phishing email.
  4. Cyberattack involving malicious emails.
  5. Who you should talk to if you have questions about cyber security and information protection.

8 Clues: How to check a URL.Always think before you do this.Cyberattack involving malicious emails.Something social engineers are good at.What you should do with a phishing email.Never open an unsolicited one from an unknown sender.Type of scam where the attacker impersonates a senior executive....

Round 3 2025-08-25

Round 3 crossword puzzle
Across
  1. What is the act of posting abusive messages online ?
  2. Write the full form of ASP
  3. Which action compromise cyber security ?
  4. Theft of digital property?
Down
  1. Which device links to homogenous packed broadcast local networks ?
  2. Who coined the term "cyberspace" ?
  3. Name the type of attack which uses a fraudulent server with a relay address?
  4. What is the legal field dealing with internet behavior called ?

8 Clues: Write the full form of ASPTheft of digital property?Who coined the term "cyberspace" ?Which action compromise cyber security ?What is the act of posting abusive messages online ?What is the legal field dealing with internet behavior called ?Which device links to homogenous packed broadcast local networks ?...

risk 2024-07-15

risk crossword puzzle
Across
  1. - JKL Financial Services detects unusual activity in its system, indicating a cyber-attack. What risk is this?
  2. - ABC Bank's loan portfolio is concentrated in real estate, and the market shows signs of a downturn. What risk is this?
  3. - GHI Insurance faces more claims due to frequent natural disasters. What risk is this?
  4. - XYZ Investment Firm uses insurance to manage foreign instability risk. What strategy is this?
  5. - XYZ Investment Firm faces losses due to instability in a foreign market. What risk is this?
Down
  1. - JKL Financial Services improves security to prevent cyber-attacks. What approach is this?
  2. - DEF Corporation enters an interest rate swap to manage rising rates. What strategy is this?
  3. - GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this?
  4. - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this?
  5. - DEF Corporation's debt has variable interest rates, and rates are rising. What risk is this?

10 Clues: - ABC Bank diversifies its loan portfolio to mitigate risk. What technique is this?- GHI Insurance faces more claims due to frequent natural disasters. What risk is this?- GHI Insurance buys reinsurance to manage natural disaster risk. What technique is this?- JKL Financial Services improves security to prevent cyber-attacks. What approach is this?...

Cyber Security Scavenger Hunt 2014-10-28

Cyber Security Scavenger Hunt crossword puzzle
Across
  1. Decrypt me: 00000000 43 4e 4f 4
  2. This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
  3. Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
  4. SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
  5. Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
  1. These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
  2. The unofficial mascot of this shop is the Pink Unicorn.
  3. Decrypt me: VEFPDQo=

8 Clues: Decrypt me: VEFPDQo=Decrypt me: 00000000 43 4e 4f 4The unofficial mascot of this shop is the Pink Unicorn.Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.Gives us access to the building, most are blue, but ours are DEFCON 2.SIGDEVERs that focus on discovery and documentation of foreign communications & networks....

Computing Networks 2019-05-16

Computing Networks crossword puzzle
Across
  1. The internet is the world's largest (15 letters)
  2. A set of rules for how messages are turned into data packets and sent across networks. (8 letters)
Down
  1. Consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. (14 letters)
  2. Information stored and transferred between devices by binary packets. (4 letters)
  3. A device or system used to protect a network from unauthorized access. (8 letters)
  4. Internet protocol address. A unique identifier issued to each device connected to a network. (9 letters)
  5. the process of converting information or data into a code, especially to prevent unauthorized access. (10 letters)
  6. A computer that holds data to be shared with other computers. (6 letters)

8 Clues: The internet is the world's largest (15 letters)A computer that holds data to be shared with other computers. (6 letters)Information stored and transferred between devices by binary packets. (4 letters)A device or system used to protect a network from unauthorized access. (8 letters)...

technology 2024-06-07

technology crossword puzzle
Across
  1. screen
  2. computer
  3. device
  4. phone
  5. Social media (add a dash between words)
  6. Online (add a dash between words)
  7. Videogames (add a dash between words)
  8. TV
Down
  1. remote
  2. Cyber-bullying
  3. app
  4. mouse
  5. charger
  6. keyboard

14 Clues: TVappmousephoneremotescreendevicechargercomputerkeyboardCyber-bullyingOnline (add a dash between words)Videogames (add a dash between words)Social media (add a dash between words)

computer apps crossword 2022-05-02

computer apps crossword crossword puzzle
Across
  1. each individual box in sheets
  2. text at the top of the document
  3. picture w a transparent background
  4. the way one slide changes to another
  5. where everything is stored
  6. spaces at the sides of the document
  7. which google app can be used to make posters and pamphlets
  8. which google app is used for making videos
  9. which googles app allows you to create websites
  10. a video sharing platform for entertainment and information
Down
  1. when you take away the background of a picture to put on top of another
  2. when you steal info and claim it as your own
  3. #1 cause for cyber security breaches
  4. where you make your citations
  5. which google app is used for surveys
  6. movements you can give pictures or text
  7. has to be in every sheets equation
  8. every good email starts with this
  9. text at the bottom of the document

19 Clues: where everything is storedeach individual box in sheetswhere you make your citationstext at the top of the documentevery good email starts with thispicture w a transparent backgroundhas to be in every sheets equationtext at the bottom of the documentspaces at the sides of the document#1 cause for cyber security breaches...

citoyenneté numérique pages 68 et 106 CDO 1 2023-11-21

citoyenneté numérique pages 68 et 106  CDO  1 crossword puzzle
Across
  1. user
  2. to access
  3. to share
  4. easy
  5. cyber-dependant
  6. tastes
Down
  1. cyber harassment
  2. to have fun
  3. to upload, download
  4. disadvantages
  5. interests
  6. advantages

12 Clues: usereasytastesto shareto accessinterestsadvantagesto have fundisadvantagescyber-dependantcyber harassmentto upload, download

Viruses:Matthew Savoie 2018-11-16

Viruses:Matthew Savoie crossword puzzle
Across
  1. Viruses sent through messaging websites
  2. the go to tool for today's cyber criminals
  3. appeared on May 4 2000
  4. Programs that you download to watch out for viruses
  5. A small piece of software that piggybacks on programs
  6. Computer program that has the ability to copy it self from machine to machine
  7. Program that you download to protect you against viruses
Down
  1. Caused microsoft to shut down there email systems
  2. Infected a quarter million computers
  3. first virus designed to cause actual damage
  4. more insidious type of attack
  5. Denial of service attack
  6. A internet wall with a password to get into information
  7. virus sent to a person multiple times
  8. A program that says it does one thing but does damage as it runs

15 Clues: appeared on May 4 2000Denial of service attackmore insidious type of attackInfected a quarter million computersvirus sent to a person multiple timesViruses sent through messaging websitesthe go to tool for today's cyber criminalsfirst virus designed to cause actual damageCaused microsoft to shut down there email systems...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een andere naam voor cyberpesten
  2. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
  1. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
  2. Iemand lichamelijk pijn doen is ... pesten
  3. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  4. Een gevolg van (cyber)pesten
  5. De eerste stap om iets aan (cyber)pesten te doen
  6. Iemand met woorden pijn doen is ... pesten
  7. Een verregaand gevolg van (cyber)pesten
  8. Iemand met opzet een ... sturen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een andere naam voor cyberpesten
  2. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
Down
  1. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
  2. Iemand lichamelijk pijn doen is ... pesten
  3. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  4. Een gevolg van (cyber)pesten
  5. De eerste stap om iets aan (cyber)pesten te doen
  6. Iemand met woorden pijn doen is ... pesten
  7. Een verregaand gevolg van (cyber)pesten
  8. Iemand met opzet een ... sturen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

Cyber Warfare 2022-08-08

Cyber Warfare crossword puzzle
Across
  1. Where you can find GCHQ
  2. The use of computer technology to disrupt the activities of a state or organisation.
  3. Activists enthusiastic about hacking with neither good nor bad intentions.
  4. Term for a recently discovered exploit/weakness.
  5. "Father" of code-breaking.
  6. Act of compromising digital devices and networks through unauthorised access.
Down
  1. Where Joan Clarke worked during WW2.
  2. Breaks into protected systems and networks with permission to test their security.
  3. Malicious computer worm uncovered in 2010.
  4. UK's intelligence agency.
  5. Another term for "Malicious Software".
  6. Cyber criminals with malicious intent.
  7. A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
  8. Code created by German's during WW2.
  9. Overwhelming a service or network with internet traffic.

15 Clues: Where you can find GCHQUK's intelligence agency."Father" of code-breaking.Where Joan Clarke worked during WW2.Code created by German's during WW2.Another term for "Malicious Software".Cyber criminals with malicious intent.Malicious computer worm uncovered in 2010.Term for a recently discovered exploit/weakness....

IT Careers 2024-04-11

IT Careers crossword puzzle
Across
  1. Build and maintain the client-side components of websites and web applications, including HTML, CSS, and JavaScript code.
  2. Plan, coordinate, and oversee web design projects from initiation to completion. They manage resources, timelines, and budgets, communicate with stakeholders, and ensure project objectives are met within scope and quality standards.
  3. Create visually compelling designs, graphics, and branding elements for websites and digital media.
  4. Design, develop, and maintain software applications and systems.
  5. Manage and maintain computer systems, networks, and servers. They are responsible for ensuring the smooth operation, security, and reliability of IT infrastructure.
  6. Protect computer systems, networks, and data from cyber threats and attacks. They monitor security incidents, conduct risk assessments, and implement security measures to safeguard information assets.
Down
  1. Develop and maintain the server-side components of websites and web applications, including databases, APIs, and server logic.
  2. Manage and maintain databases, including installation, configuration, backup, and optimization. They ensure data integrity, security, and availability for efficient data management.
  3. Develop and maintain websites and web applications, specializing in areas such as frontend, backend, or full stack development
  4. Test software applications and systems to identify defects, bugs, and performance issues. They develop test plans, execute test cases, and report findings to ensure software quality and reliability
  5. Analyze website performance, user behavior, and traffic data to identify trends, insights, and opportunities for improvement
  6. Design, implement, and manage computer networks, including hardware, software, and protocols. They ensure network performance, security, and availability.
  7. Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces.

13 Clues: Design, develop, and maintain software applications and systems.Create visually compelling designs, graphics, and branding elements for websites and digital media.Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces....

CIS 178 cyber security crossword puzzle 2023-04-20

CIS 178 cyber security crossword puzzle crossword puzzle
Across
  1. allowing employees to use own device
  2. digital information user leaves behind
  3. maicious software encrypts file device
  4. small program
  5. fraudulent or malicious practices
  6. network of infected devices
  7. software spreads from one computer to another
  8. computer virus designed to infect macros
  9. setting up a fake website
  10. floods system with data packets
  11. updates to software to improve security
Down
  1. software to detect and remove viruses
  2. gets you to tell them your information
  3. part of body for security
  4. used to get control of phone number
  5. type of malicious software code
  6. unreadable mathematical function
  7. advertising supported software
  8. disguised as legitimate software
  9. protects against unauthorized malicious activity

20 Clues: small programpart of body for securitysetting up a fake websitenetwork of infected devicesadvertising supported softwaretype of malicious software codefloods system with data packetsunreadable mathematical functiondisguised as legitimate softwarefraudulent or malicious practicesused to get control of phone numberallowing employees to use own device...

Introduction to Cyber Security Crossword Puzzle 2023-09-09

Introduction to Cyber Security Crossword Puzzle crossword puzzle
Across
  1. When an intruder takes over a victims information by tricking them in any way they find necessary
  2. A form of malware that can infect a computer, and hurt it and the information stored on said computer
  3. A secondary form of verification in order to log into certain accounts across the internet
  4. A way of keeping your identity safe on the internet by tricking intruders into thinking you are someone, or live somewhere you do not
  5. The cause of all the hurt caused to the victim once an intruder has invaded the victims device
  6. The protection used to prevent intruders from stealing, corrupting, or damaging any data/computing device
  7. A form of protecting certain information by making it into unreadable text that is only readable by having the right authorization
  8. The way a device keeps itself up to date with the latest and most secure version of itself
  9. A connection between two or more devices across the virtual world
Down
  1. A type of malware where the intruder corrupts a victims date, and requires payment before returning said data to the victim
  2. A form of tricking a victim into believing that they are someone they are not via an email
  3. The incident of an intruder gaining unauthorized access to certain information
  4. A way of notifying companies, organizations, or others that you were recently attacked virtually
  5. When an intruder tries to attack ones device via many different methods
  6. A form of keeping certain information hidden behind a certain string of words
  7. Creating a copy of certain data on a separate device or on the same computer in order to keep it in case of said data becoming corrupted in the future
  8. Being able to access certain devices by being completely away from said device
  9. When an intruder tries to disguise themselves as a trusted source to trick a victim to allowing them into there device
  10. A device used to send packets to a certain network on the internet
  11. Information that has been translated into a certain form that is easily readable by computing devices

20 Clues: A connection between two or more devices across the virtual worldA device used to send packets to a certain network on the internetWhen an intruder tries to attack ones device via many different methodsA form of keeping certain information hidden behind a certain string of words...

Business Continuity 2021-04-07

Business Continuity crossword puzzle
Across
  1. duplication of resources for better continuity
  2. access to and from this is vital.
  3. Keeping bad guys out both physically and in the cyber realm.
Down
  1. People need to be able to call you using these.
  2. Hosts data and services for your business
  3. Allows somputers to talk to each other and the internet.
  4. Consistent operations
  5. None of your electronics will run without this.
  6. This service allows you to send and recieve messages over the internet.

9 Clues: Consistent operationsaccess to and from this is vital.Hosts data and services for your businessduplication of resources for better continuityPeople need to be able to call you using these.None of your electronics will run without this.Allows somputers to talk to each other and the internet....

Cyber Security by Michaela Erica Arcenal 2026-02-28

Cyber Security by Michaela Erica Arcenal crossword puzzle
Across
  1. The process of converting information into coded form
  2. A physical or digital device used for authentication
  3. Malware disguised as legitimate software to trick users
  4. Identity verification using fingerprints or face recognition
  5. Restricting who can view or use resources
  6. Software designed to detect and remove viruses
  7. A longer version of a password made of multiple words
  8. When malicious software enters a system
  9. Keeping information secret from unauthorized users
  10. Simulated cyberattack to test system security
  11. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  12. A secret word or phrase used to access a system
  13. A cyberattack that tricks users into revealing personal information
  14. Using multiple methods to verify identity
  15. A method of blocking or allowing data based on rules
  16. A person who gains unauthorized access to computer systems
  17. The protection of personal information from misuse
Down
  1. A security process that uses two methods to verify identity
  2. Permission given to collect or use personal data
  3. Safeguarding personal information from misuse
  4. Information used to verify identity
  5. The process of verifying a user’s identity
  6. Malicious software that secretly collects user information
  7. A security system that monitors and controls network traffic
  8. Confirming the identity of a user
  9. The act of entering credentials to access a system
  10. A type of malware that spreads and infects systems
  11. Protection of computer networks from intruders
  12. A short numeric password
  13. The science of securing information through codes
  14. Malware that locks files and demands payment to restore access
  15. Fake email messages designed to trick recipients
  16. Pretending to be a trusted source to deceive users
  17. A temporary code used for login verification
  18. A person who commits crimes using computers
  19. A fraudulent scheme to steal money or information
  20. The process of converting coded text back to readable form
  21. A method used to convert plain text into coded text
  22. Malware that spreads without user action
  23. A security expert who tests systems legally

40 Clues: A short numeric passwordConfirming the identity of a userInformation used to verify identityWhen malicious software enters a systemMalware that spreads without user actionRestricting who can view or use resourcesUsing multiple methods to verify identityThe process of verifying a user’s identityA person who commits crimes using computers...

Brain-Riddle Round 2 2025-02-12

Brain-Riddle Round 2 crossword puzzle
Across
  1. A piece of data used for authentication.
  2. A language used to style web pages.
  3. A standard language for creating web pages.
  4. A cyber attack that tricks users into revealing information.
  5. A type of software designed to harm or exploit.
  6. A unique address assigned to a device on a network.
  7. A temporary interaction between a user and a website.
Down
  1. An intermediary server between a user and the internet.
  2. A network security system that monitors traffic.
  3. A hacking method that systematically tries passwords.
  4. A method of converting data into a secure format.
  5. A file containing code for automation.
  6. Temporary storage that speeds up data retrieval.
  7. A system that translates domain names to IP addresses.
  8. A set of rules for communication between software.

15 Clues: A language used to style web pages.A file containing code for automation.A piece of data used for authentication.A standard language for creating web pages.A type of software designed to harm or exploit.A network security system that monitors traffic.Temporary storage that speeds up data retrieval.A method of converting data into a secure format....

CROSSWORD 2025-09-01

CROSSWORD crossword puzzle
Across
  1. Facility used to house computer systems and associated components
  2. Combination of public and private cloud services
  3. Delay in data transfer between client and server
  4. Energy sources like wind and solar for powering data centers
  5. Reducing expenses while maintaining performance in cloud
  6. Systems used in data centers to regulate temperature
  7. Distributing workloads across multiple servers
  8. Environmentally sustainable computing practices
Down
  1. Ability of a system to handle growth in workload
  2. Maximum rate of data transfer across a network path
  3. Technology that allows multiple virtual machines on a single physical server
  4. Capacity to recover quickly from failures
  5. Protecting cloud systems and data from cyber threats
  6. On-demand computing services over the internet
  7. Total greenhouse gas emissions caused by cloud operations

15 Clues: Capacity to recover quickly from failuresOn-demand computing services over the internetDistributing workloads across multiple serversEnvironmentally sustainable computing practicesAbility of a system to handle growth in workloadCombination of public and private cloud servicesDelay in data transfer between client and server...