cyber security Crossword Puzzles

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Security 2013-06-27

Security crossword puzzle
Across
  1. What is the code number for a Firearm?
  2. What colour should drivers follow in the freight yard on the way in?
  3. What does the T stand for in OTS?
  4. What is your base channel when receiving radio calls?
  5. What type of industry are we in?
  6. What is Angela’s title other than Manager?
  7. Who has the final say when allowing freight to enter the yard?
  8. Stick to what path when in the freight yard?
  9. A non MSIC holder must also have what for access into the LRZ?
Down
  1. What does the I stand for in MSIC?
  2. What lights must be on when in the freight yard?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. Who takes passengers on/off via the buggy?
  5. What need must you have to request an MSIC?
  6. What is the name of the contractor company for security?
  7. What does the L stand for in LRZ?
  8. What must a non MSIC holder have whilst in the LRZ?
  9. What must you display in the LRZ?
  10. Your MSIC must be above what?
  11. What channel do you call for Security?

20 Clues: Your MSIC must be above what?What type of industry are we in?What does the T stand for in OTS?What does the L stand for in LRZ?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?...

security 2013-05-09

security crossword puzzle
Across
  1. A NSF cheque in a court procedure is what type of evidence?
  2. A security guard should keep a good?
  3. Crossword
  4. Class B fires involve what type of liquids
  5. An offence under section 494 (1) ccc anyone can arrest found committing
  6. Security guards are ________ Peace Officers
  7. Under the Liquor License Act a security guard may only ______ a person
  8. 10-9 means?
  9. Section 8 of the Charter Of Rights deals with?
  10. What would go off in most buildings if there was a fire?
Down
  1. Who does the security guard answer to ultimately when on duty
  2. When a witness is on the stand they are giving what type of evidence?
  3. The Trespass to Property Act is?
  4. 10-3 means stop ?
  5. Once a security guard arrests a person they must contact?
  6. A criminal offence considered a minor offence
  7. Section 26 of the Criminal Code regulates the amount of?
  8. Who can report a security guard for code of conduct violation?
  9. The Criminal Code is a ________ act
  10. A fingerprint is what type of evidence?
  11. A gun is what type of evidence?

21 Clues: Crossword10-9 means?10-3 means stop ?A gun is what type of evidence?The Trespass to Property Act is?The Criminal Code is a ________ actA security guard should keep a good?A fingerprint is what type of evidence?Class B fires involve what type of liquidsSecurity guards are ________ Peace OfficersA criminal offence considered a minor offence...

Security 2025-03-31

Security crossword puzzle
Across
  1. Indicators of potential fraud or suspicious activity (two words)
  2. A secret word or phrase used to gain access to an account.
  3. A person authorized to act on behalf of the account owner
  4. A unique identifier used to log into an account
  5. The careful and thorough evaluation of potential risks and issues (two words)
  6. A feature that allows clients to verify their identity using a mobile app (two words)
  7. Authentication method using the client's voice (two words)
  8. Abbreviation for Additional Security Questions
  9. Someone other than the account owner involved in a call or transaction (two words)
  10. Consent given to perform specific actions
Down
  1. Granted official permission to access or manage an account
  2. The process of diagnosing and resolving technical issues (two words)
  3. An electronic tool used to access accounts, such as a phone or computer (two words)
  4. A secret code used to verify identity and grant access
  5. Permission granted to access or perform actions on an account
  6. Personal questions used to verify identity during authentication (two words)
  7. Deceptive actions intended to gain unauthorized access to assets
  8. The ability to log into and manage an account online (two words)
  9. Notifications or warnings about important account activities or security issues
  10. Providing guidance or hints to help someone answer questions

20 Clues: Consent given to perform specific actionsAbbreviation for Additional Security QuestionsA unique identifier used to log into an accountA secret code used to verify identity and grant accessA person authorized to act on behalf of the account ownerGranted official permission to access or manage an account...

Browsing safety 2025-06-13

Browsing safety crossword puzzle
Across
  1. is any criminal activities intended to harm anyone using a computer and an internet connection . = Cybercrime
  2. A collection of technologies, process, and practices designed to protect network. = Cyber security
  3. _____ are like online thieves.= Cyber criminals
Down
  1. An illegal entry into a computer system or network. = Hacking
  2. Short form of vital information resources under seize.= Virus
  3. is act of sending an email to a user= phishing

6 Clues: is act of sending an email to a user= phishing_____ are like online thieves.= Cyber criminalsAn illegal entry into a computer system or network. = HackingShort form of vital information resources under seize.= VirusA collection of technologies, process, and practices designed to protect network. = Cyber security...

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

Cyber Bullying Crossword Puzzle 2013-06-04

Cyber Bullying Crossword Puzzle crossword puzzle
Across
  1. Be ______ for your words and actions online.
  2. When cyber bullying, we should ______ the evidence as it will help in further investigation.
  3. cyber bullying can _______ people’s feeling.
  4. Cyber bullying is using the ______ or phone to repeatedly say rude and hurtful things about a person.
  5. Do not ________ or respond bad word to others.
Down
  1. Stop _________ people hurtful names.
  2. when you are being cyber bullied, ________ the incident.
  3. ________ means posting or sending a lot of unnecessary information.
  4. ___________ means online manners.
  5. _______ bullying is to bully others online.

10 Clues: ___________ means online manners.Stop _________ people hurtful names._______ bullying is to bully others online.cyber bullying can _______ people’s feeling.Be ______ for your words and actions online.Do not ________ or respond bad word to others.when you are being cyber bullied, ________ the incident....

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Security 2020-03-04

Security crossword puzzle
Across
  1. продавец
  2. разрешать
  3. возможность идентификации
  4. одна из составляющих триады
  5. перемена
  6. надежность
  7. Устройство
  8. включать
  9. способ
Down
  1. невозможность отказа от авторства
  2. телекоммуникации
  3. служба поддержки
  4. лимит
  5. полезность
  6. подлинность
  7. ядро
  8. правда
  9. получать
  10. фальсификация
  11. попытка

20 Clues: ядролимитправдаспособпопыткапродавецпеременаполучатьвключатьразрешатьполезностьнадежностьУстройствоподлинностьфальсификациятелекоммуникациислужба поддержкивозможность идентификацииодна из составляющих триадыневозможность отказа от авторства

Security 2013-05-09

Security crossword puzzle
Across
  1. Who can report a security guard for code of conduct violation?
  2. What would go off in most buildings if there was a fire?
  3. Security guards are ________ Peace Officers
  4. Under the Liquor License Act a security guard may only ______ a person
  5. A NSF cheque in a court proceedure is what type of evidence?
  6. Once a security guard arrests a person they must contact?
  7. A criminal offence considered a minor offence
  8. A fingerprint is what type of evidence?
  9. Class C fires involve what type of liquids
  10. A gun is what type of evidence?
Down
  1. Who does the security guard answer to ultimately when on duty
  2. An offence under section 494 (1) ccc anyone can arrest found committing
  3. Section 26 of the Criminal Code regulates the amount of?
  4. The Trespass to Property Act is?
  5. When a witness is on the stand they are giving what type of evidence?
  6. 10-9 means?
  7. 10-3 means stop ?
  8. A security guard should keep a good?
  9. Section 8 of the Charter Of Rights deals with?
  10. The Criminal Code is a ________ act

20 Clues: 10-9 means?10-3 means stop ?A gun is what type of evidence?The Trespass to Property Act is?The Criminal Code is a ________ actA security guard should keep a good?A fingerprint is what type of evidence?Class C fires involve what type of liquidsSecurity guards are ________ Peace OfficersA criminal offence considered a minor offence...

Security 2013-06-27

Security crossword puzzle
Across
  1. What must you display in the LRZ?
  2. What is the name of the contractor company for security?
  3. What is the code number for a Firearm?
  4. What does the T stand for in OTS?
  5. What need must you have to request an MSIC?
  6. Who has the final say when allowing freight to enter the yard?
  7. What is your base channel when receiving radio calls?
  8. A non MSIC holder must also have what for access into the LRZ?
  9. Stick to what path when in the freight yard?
  10. What is Angela’s title other than Manager?
Down
  1. What must a non MSIC holder have whilst in the LRZ?
  2. What does the I stand for in MSIC?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. What colour should drivers follow in the freight yard on the way in?
  5. What lights must be on when in the freight yard?
  6. Who takes passengers on/off via the buggy?
  7. What channel do you call for Security?
  8. What type of industry are we in?
  9. What does the L stand for in LRZ?
  10. Your MSIC must be above what?

20 Clues: Your MSIC must be above what?What type of industry are we in?What must you display in the LRZ?What does the T stand for in OTS?What does the L stand for in LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?...

Security 2014-02-23

Security crossword puzzle
Across
  1. Technology created by Microsoft to control interactivity on web pages
  2. also known as junk mail
  3. Computer and ________ security helps to ensure that only authorized personnel have access
  4. self-replicating program that is harmful to networks
  5. Type of security that uses human interface, like a thumb scanner
  6. Monitors users and sends reports back to the host
  7. Threat from a user outside of the network
  8. Code used to login to a locked account
  9. Data is transformed using a complicated algorithm to make it unreadable
  10. Windows feature that can encrypt data
  11. An attack on the actual hardware
  12. Threat from user inside the network.
  13. malicious software that is disguised as a legitimate program
Down
  1. The first generation security standard for wireless.
  2. Type of attack that focuses on the software
  3. Program that controls the traffic in and out of a computer
  4. A program written with malicious intent, sent by hackers
  5. Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
  6. Type of encryption that requires two keys, a private key and a public key.
  7. Minimum number of characters recommended in a password
  8. Displaying unwanted ads on your computer
  9. When the attacker pretends to be a legit organization
  10. ensures that messages are not corrupted or tampered with during transmission
  11. malicious program that gains full access to a computer system
  12. A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.

25 Clues: also known as junk mailAn attack on the actual hardwareThreat from user inside the network.Windows feature that can encrypt dataCode used to login to a locked accountDisplaying unwanted ads on your computerThreat from a user outside of the networkType of attack that focuses on the softwareMonitors users and sends reports back to the host...

Security 2022-04-22

Security crossword puzzle
Across
  1. A scam using a redirect which tricks people into entering personal information
  2. Software offered at no cost, but you can't edit it or sell it yourself.
  3. General name for malware that has lots of popups
  4. General name for software that locks a computer until you pay a fee
  5. A type of attack designed to take a website down
  6. Hardware of software, which helps prevent hacking
  7. A method of 'locking' data so that it is unreadable unless you have a key
  8. A form of web encryption protocol
  9. Term for unauthorised access into a network / computer system.
  10. General name for all malicious software
  11. Law that forbids the creation of malware and hacking
  12. The type of basic encryption used on the internet
Down
  1. Genera for mal,ware such as keyloggers
  2. Software offered for free, with access to the source code to edit the software
  3. Law that stops companies / organisations from mis-using your data
  4. The latest form of web encryption protocol
  5. A method of only allowing people the information they need to see.
  6. Server Type of computer that helps prevent DDOS attacks
  7. Software offered on a trial basis
  8. A scam using emails to trick people into entering personal information

20 Clues: A form of web encryption protocolSoftware offered on a trial basisGenera for mal,ware such as keyloggersGeneral name for all malicious softwareThe latest form of web encryption protocolGeneral name for malware that has lots of popupsA type of attack designed to take a website downHardware of software, which helps prevent hacking...

Security 2022-02-08

Security crossword puzzle
Across
  1. You can find me at rest or on the move (in-transit). (10)
  2. Apply multiple layers of securty. (7,2,5)
  3. Needs to be kept secret. (12)
  4. I copy traffic for you to safely inspect. (6,9)
  5. Trust no one. (4,5)
  6. I can tell you when you need to reduce permissions. (11)
  7. Use me to prevent unwanted traffic reaching your VMs. (8)
  8. Using me allows you to implment the principle of least privilege. Acronym (3)
  9. Use me to manage keys outside of Google Cloud. Acronym (3)
  10. Enterprise way to adopt a Zero trust approach. (6,4)
  11. If you look at me you can find out "who did what, where, and when". (5,5,4)
  12. You're not alone and this approach helps reduce risk and cost. (6)
Down
  1. De-identification technique. (16)
  2. If you use me you do not need a VPN. Acronym(3)
  3. I provide insights into your security posture. Acronym(3)
  4. Use me to mitigate OWASP top 10 risks. (5,5)
  5. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  6. Do you trust that container image? (6,4)
  7. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  8. Use me to classify your data. (5,3)
  9. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)

21 Clues: Trust no one. (4,5)Needs to be kept secret. (12)De-identification technique. (16)Use me to classify your data. (5,3)Do you trust that container image? (6,4)Apply multiple layers of securty. (7,2,5)Use me to mitigate OWASP top 10 risks. (5,5)If you use me you do not need a VPN. Acronym(3)I copy traffic for you to safely inspect. (6,9)...

Security 2024-10-31

Security crossword puzzle
Across
  1. These devices are common in homes, often have weak security, and have been exploited to launch DDOS attakcs.
  2. This type of program always executes with the permissions of the owner.
  3. command to write to syslog from terminal
  4. This type of system authentication involves providing more than just a password
  5. Technique to harden a system that involves implementing multiple types of security
  6. Type of cryptography that involves both public and private keys.
  7. Occurs when the sequence of instructions matters but is not enforced
  8. Type of attack involves posing as a trusted figure to induce individuals to reveal personal information.
  9. This file is used to exchange data more quickly between the hard drive and RAM.
  10. Always have more than one of these to recover your system
  11. If an attacker gains access to this account, they can do anything on the system.
Down
  1. Security exercise to determine vulnerabilities in a system
  2. often relies on an access control list to determine what traffic can enter and exit a network.
  3. Linux software that loads kernel
  4. Data structure that defines the starting block and length of a file.
  5. Command to display real-time resource usage
  6. Hash used in current linux distros for shadow file account passwords
  7. failing to use this command in a parent process may create a zombie
  8. A password used with this software can prevent a thief from booting your device.
  9. Release of energy that can fry solid-state electronics.
  10. A secure way to access a system remotely
  11. A process does not want to have this value be high, or else many other processes might run before it
  12. This type of threat is often the most dangerous and unexpected.
  13. This vulnerability can occur when data is written beyond the bounds of an array.

24 Clues: Linux software that loads kernelcommand to write to syslog from terminalA secure way to access a system remotelyCommand to display real-time resource usageRelease of energy that can fry solid-state electronics.Always have more than one of these to recover your systemSecurity exercise to determine vulnerabilities in a system...

Security 2025-03-19

Security crossword puzzle
Across
  1. | Een aanval waarbij schadelijke SQL-code wordt geïnjecteerd in een database-query.
  2. | Een aanval waarbij schadelijke scripts worden geïnjecteerd in webpagina's.
  3. | Een netwerk van geïnfecteerde computers die op afstand worden bestuurd door een aanvaller.
  4. | Extra beveiligingslaag waarbij een gebruiker twee verschillende vormen van verificatie nodig heeft.
  5. | Een beveiligingssysteem dat netwerkverkeer controleert en ongeautoriseerde toegang blokkeert.
  6. | Het proces van het omzetten van leesbare data naar een versleutelde, onleesbare vorm.
  7. | Een versleutelde verbinding die gebruikers anoniem op het internet laat surfen.
  8. | Het onderzoek naar methoden om encryptie toe te passen
  9. | Een type malware dat zich voordoet als legitieme software, maar schadelijke acties uitvoert.
  10. | Kwaadaardige software die schade kan toebrengen aan computers of netwerken.
  11. | Het onderscheppen en analyseren van netwerkverkeer.
  12. | Een vorm van online oplichting waarbij een aanvaller zich voordoet als een betrouwbare entiteit om gevoelige informatie te verkrijgen.
  13. | Een techniek waarbij een aanvaller wachtwoorden probeert te kraken door alle mogelijke combinaties te proberen.
  14. | Een aanval waarbij een hacker een actieve gebruikerssessie overneemt.
Down
  1. | Een kwetsbaarheid die onbekend is bij de leverancier en kan worden misbruikt door hackers.
  2. | Het manipuleren van mensen om vertrouwelijke informatie prijs te geven.
  3. | Software die in het geheim gebruikersgegevens verzamelt.
  4. | Software die malware detecteert en verwijdert.
  5. | Software of hardware die toetsaanslagen registreert.
  6. | Een verborgen toegang tot een systeem, vaak misbruikt door hackers.
  7. | Een eenrichtingsproces dat data omzet in een unieke vaste lengte code.
  8. | Een aanval waarbij een programma meer data ontvangt dan het aankan, wat kan leiden tot het uitvoeren van schadelijke code door een aanvaller.
  9. | Malware die bestanden versleutelt en losgeld eist om ze vrij te geven.
  10. | Een aanval waarbij een server wordt overspoeld met verkeer om deze onbruikbaar te maken.

24 Clues: | Software die malware detecteert en verwijdert.| Het onderscheppen en analyseren van netwerkverkeer.| Software of hardware die toetsaanslagen registreert.| Het onderzoek naar methoden om encryptie toe te passen| Software die in het geheim gebruikersgegevens verzamelt.| Een verborgen toegang tot een systeem, vaak misbruikt door hackers....

Security 2025-09-23

Security crossword puzzle
Across
  1. ask questions or seek information.
  2. Intentional destruction or damage.
  3. of rules or procedures
  4. To monitor or observe closely.
  5. Genuine or legitimate.
  6. let's use Risky doesn't fit, let's use Assessdoesn't fit the bill, let's use Threats
  7. use Probe doesn't fit let's us Inquire
  8. To confirm or verify authenticity.
  9. Protected from threats or risks.
  10. let's use Accreditdoesn't fit let's use Validate
Down
  1. of assets and personnel.
  2. keep safe from harm or damage.
  3. Potential occurrences that could cause harm.
  4. To give permission or approval.
  5. Unauthorized gathering of confidential information.
  6. Thorough background check.
  7. Verification of trustworthiness for access.
  8. Measure to protect against harm or damage.
  9. To examine closely for defects or issues.
  10. ,To ensure compliance with laws or rules.

20 Clues: of rules or proceduresGenuine or legitimate.of assets and personnel.Thorough background check.keep safe from harm or damage.To monitor or observe closely.To give permission or approval.Protected from threats or risks.ask questions or seek information.Intentional destruction or damage.To confirm or verify authenticity....

Security 2025-10-24

Security crossword puzzle
Across
  1. system sentinel
  2. self-replicating, damages computer system
  3. data matches the truth
  4. gathers information
  5. software designed to disrupt and damage
  6. Restricted Access
  7. authentication
  8. bogus website
  9. recovery
  10. virtual autograph
Down
  1. your digital insurance policy
  2. predefined criteria
  3. accuracy, consistency and reliability
  4. bomb triggered based on condition
  5. network gatekeeper
  6. fraud email
  7. last in line, yet first to spot the mistake
  8. self-replicating and spreads through network
  9. Protection of sensitive information
  10. extra bit that keeps the total in line
  11. horse
  12. can launch attacks

22 Clues: horserecoveryfraud emailbogus websiteauthenticationsystem sentinelRestricted Accessvirtual autographnetwork gatekeepercan launch attackspredefined criteriagathers informationdata matches the truthyour digital insurance policybomb triggered based on conditionProtection of sensitive informationaccuracy, consistency and reliability...

Cyber Security Awareness Month 2024-10-11

Cyber Security Awareness Month crossword puzzle
Across
  1. Software designed to detect and remove malware
  2. A form of malware that demands payment to restore access to data
  3. Malicious software that secretly monitors and collects personal information from a user’s device
  4. The practice of keeping personal and sensitive information secure from unauthorized access or disclosure
  5. The process of converting information into a secret code
Down
  1. A method of verifying a user’s identity using something they know, have, or are
  2. A software flaw that can be exploited by attackers
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A string of characters used to verify your identity online
  5. A scam where attackers trick you into giving personal information

10 Clues: Software designed to detect and remove malwareA software flaw that can be exploited by attackersThe process of converting information into a secret codeA string of characters used to verify your identity onlineA form of malware that demands payment to restore access to dataA scam where attackers trick you into giving personal information...

Introduction to Cyber Security 2025-04-04

Introduction to Cyber Security crossword puzzle
Across
  1. An attack that takes advantage of a previously unknown vulnerability in software or hardware before the vendor has released a patch or fix.
  2. The process of converting data into a code to prevent unauthorized access. Only those with the decryption key can access the original data.
  3. Short for "malicious software," malware refers to any software specifically designed to harm or exploit a computer, network, or device. Examples include viruses, worms, and ransomware.
  4. A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm.
  5. The manipulation or deception of individuals into divulging confidential information, often used in phishing and other types of attacks.
  6. A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, designed to block unauthorized access while permitting legitimate communication.
  2. The process of verifying the identity of a user, device, or system before granting access to resources. Common methods include passwords, biometrics, or multi-factor authentication (MFA).
  3. A type of social engineering attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.
  4. A cyberattack aimed at disrupting the normal operation of a network or server by overwhelming it with excessive traffic, causing it to become unavailable to legitimate users.

10 Clues: A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm....

Cyber Security Month Crossword! 2025-10-01

Cyber Security Month Crossword! crossword puzzle
Across
  1. A highly realistic video, image or audio clip generated by AI depicting someone saying or doing something that they didn't actually do
  2. A method of protecting data by encoding it to make it unreadable by unauthorised users
  3. A phishing attack that uses SMS instead of email
  4. A hacker pretending to be someone else to trick you into giving away money or information
  5. Malicious software that locks access to a computer until a ransom is paid
Down
  1. A relatively new cyberattack technique that injects malicious code within digital ads
  2. When a hacker gains access to a business email account to trick users into transferring money out of an organisation
  3. Kyogle Councils' email filtering and web security program
  4. A virtual private network that encrypts your data, preventing hackers from viewing it
  5. A cybersecurity method that protects your data by requiring more than one method of verifying your identity

10 Clues: A phishing attack that uses SMS instead of emailKyogle Councils' email filtering and web security programMalicious software that locks access to a computer until a ransom is paidA relatively new cyberattack technique that injects malicious code within digital adsA virtual private network that encrypts your data, preventing hackers from viewing it...

Pokemon TYPES <---------------------------- 2022-11-01

Pokemon TYPES <---------------------------- crossword puzzle
Across
  1. shiny crystals
  2. cold
  3. tiny and disgusting
  4. poisonous
  5. flies and might breathe fire
  6. very strong and is most effective against five other types of Pokemon
  7. shocking
  8. mainly for nature-y type Pokemon
  9. shiny!!!
  10. for Pokemon in the sky
  11. WHO TURNED OFF LIGHTS??!!!
Down
  1. uses mind powers and is very intelligent
  2. for strong Pokemon on the ground
  3. boo...
  4. mostly found in the ocean
  5. stony
  6. it burns!!!
  7. the most basic type
  8. this type for Pokemon can be found in the cyber simulation
  9. music
  10. cute and tough

21 Clues: coldstonymusicboo...shockingshiny!!!poisonousit burns!!!shiny crystalscute and toughtiny and disgustingthe most basic typefor Pokemon in the skymostly found in the oceanWHO TURNED OFF LIGHTS??!!!flies and might breathe firefor strong Pokemon on the groundmainly for nature-y type Pokemonuses mind powers and is very intelligent...

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  2. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
  3. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  4. They are software programs created to automatically perform specific operations
  5. It is a string of characters used to verify the identity of a user during the authentication process.
  6. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
  1. It is a global system of interconnected computer networks
  2. It is a type of malware that functions by spying on user activity without their knowledge.
  3. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. It is a type of malware that automatically delivers advertisements.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

Cyber Security For Teenagers 2024-01-04

Cyber Security For Teenagers crossword puzzle
Across
  1. Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)
  2. Apabila menerima emel dari sumber yang tidak dikenali, lebih baik melakukan __________ dan periksa sebelum membuka lampiran atau mengklik pautan (8 huruf)
  3. Inisiatif yang melibatkan aktiviti menyelidik dan menganalisis untuk mencari kelemahan dalam sistem keselamatan siber (11 huruf)
  4. Keadaan di mana sesuatu peranti atau sistem tidak lagi berfungsi dengan baik akibat serangan atau masalah teknikal (5 huruf)
  5. Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)
  6. Inisiatif untuk mengajar remaja mengenai keselamatan siber dan etika dalam penggunaan teknologi (9 huruf)
Down
  1. Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)
  2. Bahagian penting dalam keselamatan siber; pastikan perisian sentiasa ________ untuk menghadapi ancaman terkini (7 huruf)
  3. Jenis serangan di mana penyerang cuba memperoleh maklumat peribadi melalui pertanyaan palsu atau manipulasi emosi (8 huruf)
  4. Untuk melindungi privasi, elakkan daripada memberikan maklumat peribadi di _________ sosial secara terbuka (5 huruf)

10 Clues: Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)...

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

Cyber Security 2022-07-19

Cyber Security crossword puzzle
Across
  1. Malware designed to appear as legitimate software program to gain access to a system
  2. Vital Information Resource Under ___
Down
  1. Routing that uses multi-layered encryption for anonymity
  2. Software that is intentionally harmful to computer
  3. First computer virus

5 Clues: First computer virusVital Information Resource Under ___Software that is intentionally harmful to computerRouting that uses multi-layered encryption for anonymityMalware designed to appear as legitimate software program to gain access to a system

Cyber Security 2022-10-06

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2020-08-24

Cyber Security crossword puzzle
Across
  1. another computer, for example by email,
  2. move to the other computer.
Down
  1. virus can make copies of itself
  2. a computer that has a virus makes a connection
  3. a program that sends a large number of annoying messages to many people’s mobile phones in an uncontrolled way

5 Clues: move to the other computer.virus can make copies of itselfanother computer, for example by email,a computer that has a virus makes a connectiona program that sends a large number of annoying messages to many people’s mobile phones in an uncontrolled way

Cyber Security 2018-09-20

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2023-10-18

Cyber Security crossword puzzle
Across
  1. Universal symbol of an SSL Certificate
  2. prevent unauthorised access from a network
  3. An executable file that spreads within a machine.
Down
  1. The address of a web page
  2. malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: The address of a web pageUniversal symbol of an SSL Certificateprevent unauthorised access from a networkAn executable file that spreads within a machine.malicious software designed to block access to a computer system until a sum of money is paid

Cyber Security 2024-03-14

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2024-10-21

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2024-11-14

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

LJJ INAC Revision 2024-06-29

LJJ INAC Revision crossword puzzle
Across
  1. A type of assessment that should identify the likelihood and potential loss
  2. Vital control over the issue of invoices or orders
  3. A input control that data is correct eg £3.49 or 0<>10
  4. One of the few disadvantages of cloud accounting
  5. A level of management which formulates the long-term plans for the organisation
  6. Should be taken frequently and kept in a safe location
  7. Collection of humungous amounts of information, often for AI
  8. A type of data security which includes maintaining a log of all failed access attempts
  9. Physical security measure of computer system which includes the building
  10. A type of report which acts as an output control to ensure completeness and accuracy of processing
  11. A level of management which requires semi-detailed information from MIS
  12. Set of characters that can be allocated to a terminal, person or room, allowing access
  13. A general control over information systems which includes firewalls and anti-virus checkers
  14. Protection of internet-connected systems, including hardware, software and data
  15. One of the issues that may be problematic if data is held about individuals
  16. Perhaps one of the main advantages of a computerised system
Down
  1. The completeness and accuracy of data
  2. An advantage of computerisation when used as an aid to communication
  3. Information Technology
  4. Stand-by procedures, recovery procedures and management policies are essential parts of this plan
  5. Variety, velocity, veracity and ?
  6. A general control over information systems which includes procedures for program amendments
  7. Descriptive and diagnostic analytics provide historical information about ???
  8. A type of data security which includes periodic data protection audits of the computer systems
  9. A mnemonic to remember general controls over the environment within which a computer-based system operates
  10. The mnemonic which defines the characteristics of good information

26 Clues: Information TechnologyVariety, velocity, veracity and ?The completeness and accuracy of dataOne of the few disadvantages of cloud accountingVital control over the issue of invoices or ordersA input control that data is correct eg £3.49 or 0<>10Should be taken frequently and kept in a safe location...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een gevolg van (cyber)pesten
  2. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  3. Iemand met woorden pijn doen is ... pesten
  4. Een verregaand gevolg van (cyber)pesten
  5. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
Down
  1. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  2. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Iemand met opzet een ... sturen
  5. Iemand lichamelijk pijn doen is ... pesten
  6. Een andere naam voor cyberpesten
  7. De eerste stap om iets aan (cyber)pesten te doen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

Puzzle No. 2 2022-09-06

Puzzle No. 2 crossword puzzle
Across
  1. A string of characters used to verify the identity of a user during the authentication process.
  2. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  3. Ensuring that authorized users have access to information and associated assets when required.
  4. Sentence-like format of password which is strong but easier to remember.
  5. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  6. You should not write down your password in this type of physical medium.
Down
  1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Safeguarding the accuracy and completeness of information.
  4. Complete the sentence: ________ is everyone’s responsibility.
  5. A weakness in your security policy, implementation, design, and controls.
  6. These fix general software problems and provide new security patches where criminals might get in.
  7. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  8. An event that will cause harm to you or your asset.
  9. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.

15 Clues: An event that will cause harm to you or your asset.Safeguarding the accuracy and completeness of information.Complete the sentence: ________ is everyone’s responsibility.Sentence-like format of password which is strong but easier to remember.You should not write down your password in this type of physical medium....

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
  2. pretending to be a genuine organisation to get someone's details.
  3. a virus that usually come embedded within another file that looks genuine.
Down
  1. horse malware that is disguised as a genuine file that gives hackers access to a computer.
  2. engineering the art of tricking or manipulation to get someone to reveal their personal info.

5 Clues: pretending to be a genuine organisation to get someone's details.a virus that usually come embedded within another file that looks genuine.horse malware that is disguised as a genuine file that gives hackers access to a computer.engineering the art of tricking or manipulation to get someone to reveal their personal info....

CYBER SECURITY 2016-05-22

CYBER SECURITY crossword puzzle
Across
  1. attempt to acquire sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. never respond to unusual___.
  2. never give your ___ information online.
  3. bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

5 Clues: never respond to unusual___.never give your ___ information online.bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive....

cyber security 2022-09-15

cyber security crossword puzzle
Across
  1. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  2. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
Down
  1. hat hacking Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
  2. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  3. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.

5 Clues: Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.Programs that automatically execute tasks as ordered by the creator of the program that has infected them.An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies....

cyber security 2021-10-06

cyber security crossword puzzle
Across
  1. a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information
  2. often called advertising-supported software by its developers
  3. a person who tries to steal personal information
Down
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without
  2. Unlike a computer virus, it does not need to attach itself to an existing program.

5 Clues: a person who tries to steal personal informationoften called advertising-supported software by its developersUnlike a computer virus, it does not need to attach itself to an existing program.any software that installs itself on your computer and starts covertly monitoring your online behavior without...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. a computer program that replicates itself
  2. sends emails in order to reveal personal information such as passwords and credit cards numbers
  3. software that automatically displays or downloads advertising materials
Down
  1. a program that steals login credentials
  2. such as tacking software that gathers information about a person without their knowledge

5 Clues: a program that steals login credentialsa computer program that replicates itselfsoftware that automatically displays or downloads advertising materialssuch as tacking software that gathers information about a person without their knowledgesends emails in order to reveal personal information such as passwords and credit cards numbers

cyber security 2022-11-28

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2018-01-22

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Flying mammal

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2025-07-08

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security engineer 2024-07-18

cyber security engineer crossword puzzle
Across
  1. The systematic process of finding and fixing security holes in software or networks.
  2. The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
  3. A process to determine and document potential threats to an organization
  4. The analysis and examination of digital data for evidence or investigation.
Down
  1. The method used to protect information by transforming it into an unreadable format
  2. The response to and management of a security breach or attack.
  3. The practice of securing information systems against unauthorized access and threats.

7 Clues: The response to and management of a security breach or attack.A process to determine and document potential threats to an organizationThe analysis and examination of digital data for evidence or investigation.The method used to protect information by transforming it into an unreadable format...

Cyber Security - Incidents 2025-09-28

Cyber Security - Incidents crossword puzzle
Across
  1. - Damage to trust and credibility due to incidents.
  2. - Deliberate change of data, not always with bad intentions.
  3. - Deliberate deletion or erasure of stored data.
  4. - Business impact involving delays or system failures.
  5. - Penalties for breaking data protection laws.
Down
  1. - Changing data with the intent to trick or harm.
  2. - Taking or copying data without permission.

7 Clues: - Taking or copying data without permission.- Penalties for breaking data protection laws.- Deliberate deletion or erasure of stored data.- Changing data with the intent to trick or harm.- Damage to trust and credibility due to incidents.- Business impact involving delays or system failures....

Cyber Security Crossword Puzzle 2024-09-20

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. A type of attack where the hacker pretends to be someone else
  2. Criminal activity involving computers or networks
  3. Code injected into a website to gain unauthorized access
  4. Malicious software designed to damage or disrupt systems
  5. Protects the boundary of a network from unauthorized access
Down
  1. Secure connection method, often used with Wi-Fi
  2. Unauthorized access to systems or data
  3. A weakness in a system that can be exploited
  4. Secret word used to access an account
  5. Program used to protect against malware

10 Clues: Secret word used to access an accountUnauthorized access to systems or dataProgram used to protect against malwareA weakness in a system that can be exploitedSecure connection method, often used with Wi-FiCriminal activity involving computers or networksCode injected into a website to gain unauthorized access...

Cyber Security Awareness Month 2024-09-30

Cyber Security Awareness Month crossword puzzle
Across
  1. A type of cybercrime where criminals steal personal information for financial gain.
  2. A type of malicious software that encrypts files and demands a ransom payment.
  3. A type of social engineering attack that tricks victims into revealing sensitive information via email.
  4. A technique used to gain unauthorised access to a computer system.
Down
  1. Any kind of computer software with malicious intent to harm your device
  2. A form of phishing attack that uses QR codes instead of text-based links in emails, digital platforms or on physical items.
  3. A security system that prevents unauthorised access to a network
  4. A security measure that protects data from unauthorised access or disclosure.
  5. A security practice that involves regularly updating software and systems.
  6. A type of malicious software that replicates itself

10 Clues: A type of malicious software that replicates itselfA security system that prevents unauthorised access to a networkA technique used to gain unauthorised access to a computer system.Any kind of computer software with malicious intent to harm your deviceA security practice that involves regularly updating software and systems....

Cyber Security Word Search Challenge 2025-08-26

Cyber Security Word Search Challenge crossword puzzle
Across
  1. An update that fixes security vulnerabilities.
  2. Online servers used to store data.
  3. Security system that blocks or allows network traffic.
  4. Malware that spreads itself without human interaction.
  5. Process of converting data into a secure, unreadable format.
  6. Secret word or phrase used to access accounts.
  7. Malware disguised as legitimate software.
  8. A vulnerability unknown to the vendor, exploited by hackers.
Down
  1. Hidden access point used by attackers to bypass security.
  2. Software designed to harm, exploit, or disable systems.
  3. Fake emails that trick people into giving up sensitive info
  4. Tool that encrypts your internet connection and hides your IP address.
  5. Malware that locks files and demands payment.
  6. Software that secretly monitors your activities.

14 Clues: Online servers used to store data.Malware disguised as legitimate software.Malware that locks files and demands payment.An update that fixes security vulnerabilities.Secret word or phrase used to access accounts.Software that secretly monitors your activities.Security system that blocks or allows network traffic....

Reporting cyber crime 2022-05-18

Reporting cyber crime crossword puzzle
Across
  1. Received a ____ text? Forward to 7726 (free)
  2. Report computer fraud to the ______
  3. ____ to National Cyber Security Centre
Down
  1. fraud can also be reported to ____
  2. Report@_______.gov.uk

5 Clues: Report@_______.gov.ukfraud can also be reported to ____Report computer fraud to the __________ to National Cyber Security CentreReceived a ____ text? Forward to 7726 (free)

Reporting cyber crime 2022-05-18

Reporting cyber crime crossword puzzle
Across
  1. Received a ____ text? Forward to 7726 (free)
  2. Report computer fraud to the ______
  3. ____ to National Cyber Security Centre
Down
  1. fraud can also be reported to ____
  2. Report@_______.gov.uk

5 Clues: Report@_______.gov.ukfraud can also be reported to ____Report computer fraud to the __________ to National Cyber Security CentreReceived a ____ text? Forward to 7726 (free)

Reporting cyber crime v2 2022-05-23

Reporting cyber crime v2 crossword puzzle
Across
  1. report computer fraud to the ______
  2. ____ to National Cyber Security Centre
  3. received a ____ text? Forward to 7726 (free)
Down
  1. fraud can also be reported to _____
  2. Report@______.gov.uk

5 Clues: Report@______.gov.ukfraud can also be reported to _____report computer fraud to the __________ to National Cyber Security Centrereceived a ____ text? Forward to 7726 (free)

Cyber Security Day 2022 Crossword Quiz 2022-10-10

Cyber Security Day 2022 Crossword Quiz crossword puzzle
Across
  1. Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
  2. An app developed by the National Crime Prevention Council to help fight scam messages and calls which plague mobile phone users.
  3. Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
  4. Type of scam that recorded the highest reported cases in Jan-Jun 2022
Down
  1. Two Factor _______
  2. Malware designed to deny a user/organization access to files on their computer, demanding a ransom to restore access

6 Clues: Two Factor _______Type of scam that recorded the highest reported cases in Jan-Jun 2022Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security DayMalware designed to deny a user/organization access to files on their computer, demanding a ransom to restore access...

Inside the ransomware playbook 2024-10-25

Inside the ransomware playbook crossword puzzle
Across
  1. - Notorious group known for exploiting vulnerabilities for profit
  2. - The tool of choice for a thief who likes to play hide and seek
  3. - The process of scrambling information to keep it secret
  4. - The principle of limiting access based on user needs
  5. - Protocol used for authentication in Microsoft networks
Down
  1. - Crafty crew that snatches your secrets without a sword
  2. - Ritual of sharpening defenses to keep the bad guys at bay
  3. - Structured guide that outlines how to respond to threats
  4. - Secretive moves of an attacker, often hidden in plain sight
  5. - The secret playbook of cyber mischief-makers
  6. - Legendary flaw that opens doors without knocking
  7. - Ransomware tactic that involves manipulating security software

12 Clues: - The secret playbook of cyber mischief-makers- Legendary flaw that opens doors without knocking- The principle of limiting access based on user needs- Crafty crew that snatches your secrets without a sword- Protocol used for authentication in Microsoft networks- The process of scrambling information to keep it secret...

Protect the House for the Holidays 2025-11-04

Protect the House for the Holidays crossword puzzle
Across
  1. Think before you do it
  2. Digital shield
  3. What we feel this season
  4. Our community
  5. Campus tech backbone
  6. What we do for each other
  7. Key to cyber safety
  8. How we keep our systems
Down
  1. Holiday inbox trick
  2. Campus leaders
  3. Central Morehouse value
  4. Spirit color of the House
  5. Cyber training hub
  6. Before you click
  7. Strength of our community
  8. Protect it wherever you take it
  9. Where you find tools and training
  10. Campus champions
  11. The heart of our mission

19 Clues: Our communityCampus leadersDigital shieldBefore you clickCampus championsCyber training hubHoliday inbox trickKey to cyber safetyCampus tech backboneThink before you do itCentral Morehouse valueHow we keep our systemsWhat we feel this seasonThe heart of our missionSpirit color of the HouseStrength of our communityWhat we do for each other...

Cyber Security Crossword 2023-05-13

Cyber Security Crossword crossword puzzle
Across
  1. a type of security that uses our unique features to secure our systems, such as fingerprint or voice
  2. when someone pretends to be someone they are not to steal personal information
  3. a type of malware that infects and damages computers
  4. someone who gains access to a computer system through unconventional means
Down
  1. a type of scam normally done by email or text message, usually impersonating a company or bank
  2. a combination of letters, numbers and symbols we use to gain access to computer systems
  3. a piece of malware that pretends to be another piece of software to trick you into downloading and installing it

7 Clues: a type of malware that infects and damages computerssomeone who gains access to a computer system through unconventional meanswhen someone pretends to be someone they are not to steal personal informationa combination of letters, numbers and symbols we use to gain access to computer systems...

cyber security threat 2023-07-21

cyber security threat crossword puzzle
Across
  1. : Be cautious of ______ attempts
  2. : Regularly back up your ______
  3. : Caution in _____
Down
  1. Enable 2 Factor _______
  2. : _______ yourself
  3. : Secure your home _____
  4. : Use strong ______

7 Clues: : _______ yourself: Caution in _____: Use strong ______Enable 2 Factor _______: Secure your home _____: Regularly back up your ______: Be cautious of ______ attempts

Cyber Security #5 2013-06-13

Cyber Security #5 crossword puzzle
Across
  1. Computer program that can run independently, propagate a complete working version of itself onto another host network and consume computer resources destructively.
  2. Malicious logic, often self-replicating. Cannot run by itself.
  3. Network based on internet technology that an organization uses for its own internal, and usually private purposes that is closed to outsiders.
  4. The need to ensure that people involved with the company, emplyess ETC are protected from harm.
Down
  1. A potential for violation of security, exist when there is a circumstance, capability, action, or event that could breach security and caise harm.
  2. What you are when using a computer or service.Person, organization entity that has access to a system authorized or not.
  3. A term to describe connecting multiple seperate networks together.

7 Clues: Malicious logic, often self-replicating. Cannot run by itself.A term to describe connecting multiple seperate networks together.The need to ensure that people involved with the company, emplyess ETC are protected from harm.What you are when using a computer or service.Person, organization entity that has access to a system authorized or not....

Cyber Security 4 2024-08-04

Cyber Security 4 crossword puzzle
Across
  1. B in WBS
  2. configuration another observation class in VA
  3. Action of using code to demonstrate how a vulnerability can be misused
Down
  1. server - one of the observation class in VA
  2. process of manually verifying if detection result for vulnerabilities is accurate
  3. one of the tools used to conduct unauthenticated scan
  4. Level 3 in CMM framework

7 Clues: B in WBSLevel 3 in CMM frameworkserver - one of the observation class in VAconfiguration another observation class in VAone of the tools used to conduct unauthenticated scanAction of using code to demonstrate how a vulnerability can be misusedprocess of manually verifying if detection result for vulnerabilities is accurate

ENGLISH REVISION 2020-03-04

ENGLISH REVISION crossword puzzle
Across
  1. _________ bullying is a form of bullying that happens through mobile phones, computer etc.
  2. Cyber bullying can cause low-confidence and self _________.
  3. About 9000 of school children being admitted due to being _________ of cyber bullying.
  4. Remember, ___________, report and tell an adult.
  5. ________ reveal personal information to strangers on the internet.
Down
  1. __________ yourself from cyber bullying.
  2. __________ before you post.
  3. Always keep _________ safe and often change it.
  4. A cyber _________ is a person who uses internet to harm others.
  5. There is so much more in life other than our phones and social ___________.

10 Clues: __________ before you post.__________ yourself from cyber bullying.Always keep _________ safe and often change it.Remember, ___________, report and tell an adult.Cyber bullying can cause low-confidence and self _________.A cyber _________ is a person who uses internet to harm others.________ reveal personal information to strangers on the internet....

ITS2210 Module 7 Crossword 2019-04-02

ITS2210 Module 7 Crossword crossword puzzle
Across
  1. This type of warfare often involves propaganda and disinformation campaigns
  2. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  3. The NSA and ______ have allegedly had one of their cyber spies caught
  4. Using the Internet to terrorize someone or some group of individuals
Down
  1. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  2. This type of loss is the most likely damage to occur in an act of cyber terrorism
  3. This conflict in 1990 had a cyber warfare component
  4. A political group that has used the internet for political intimidation
  5. This virus is an example of domestic cyber terrorism
  6. Hacking conducted for ideological purposes

10 Clues: Hacking conducted for ideological purposesThis conflict in 1990 had a cyber warfare componentThis virus is an example of domestic cyber terrorismUsing the Internet to terrorize someone or some group of individualsThe NSA and ______ have allegedly had one of their cyber spies caught...

CONTEMPORARY BANKING FOR SENIORS 2026-01-24

CONTEMPORARY BANKING FOR SENIORS crossword puzzle
Across
  1. Using your camera to read a QR code.
  2. Banking that travels with you on your smartphone.
  3. Where your money is safely stored in the bank.
  4. The modern device that has replaced the bank branch.
  5. The invisible network that connects your phone.
  6. To send money from your account to a family member.
Down
  1. The type of "space" or "security" we are discussing.
  2. What you must always do before closing the app.
  3. The process of entering your username to start.
  4. The program on your phone you use for banking.
  5. Your secret combination of letters and numbers.
  6. When you are connected to the internet.
  7. The bond between the student and the senior.
  8. Our beautiful city where this workshop is held.

14 Clues: Using your camera to read a QR code.When you are connected to the internet.The bond between the student and the senior.The program on your phone you use for banking.Where your money is safely stored in the bank.What you must always do before closing the app.The process of entering your username to start....

chocolate cheeseasurus rex prime puzzle 2024-05-24

chocolate cheeseasurus rex prime puzzle crossword puzzle
Across
  1. kids get cyber bullied more than adults
  2. help our kids cuz they need you
  3. cyber bullying is a very serious issue
  4. our kids are to depressed now
  5. 60% of kids experience cyber bullying
  6. imaging your kid depressed for ever
Down
  1. why are kids cyber bulling
  2. we are sick of getting bullied online
  3. cyber bulling is a silly billy
  4. to frear if you don't help them I will

10 Clues: why are kids cyber bullingour kids are to depressed nowcyber bulling is a silly billyhelp our kids cuz they need youimaging your kid depressed for everwe are sick of getting bullied online60% of kids experience cyber bullyingcyber bullying is a very serious issuekids get cyber bullied more than adultsto frear if you don't help them I will

Cybersecurity 2024-10-07

Cybersecurity crossword puzzle
Across
  1. Protection against unauthorized access to personal data
  2. A type of malware that encrypts data and demands payment for the decryption key
  3. The process of checking the identity of a user, device, or entity
  4. A secure gateway that controls traffic between an internal network and the internet
  5. Software designed to detect, prevent, and remove malware
  6. Process of converting data into a secret code to prevent unauthorized access
  7. The secure process of logging into a system with two layers of security
Down
  1. The practice of attempting to gain unauthorized access to networks by breaking into systems
  2. Type of security that protects the flow of data on the internet
  3. A malicious program designed to harm or exploit any programmable device
  4. The most common method used by hackers to steal sensitive information through email
  5. Unauthorized access to a computer system to steal or manipulate data
  6. A cyber attack that floods a network or service to overwhelm it and make it unavailable
  7. A weakness or flaw in a computer system that can be exploited by hackers
  8. The study of secure communication in the presence of adversaries
  9. An attack where an adversary impersonates another user to gain information

16 Clues: Protection against unauthorized access to personal dataSoftware designed to detect, prevent, and remove malwareType of security that protects the flow of data on the internetThe study of secure communication in the presence of adversariesThe process of checking the identity of a user, device, or entity...

Industry 5.0 Forensics 2020-10-09

Industry 5.0 Forensics crossword puzzle
Across
  1. API-aware networking and security at the kernel layer powered Berkeley packet filter technology
  2. It defines a system of rules telling what a process is allowed to do in containers
  3. A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
  4. It is a tool used by investigators to extract data when there is no app support in drones
  5. An open-source vulnerability scanner tool that powers CoreOS’s container registry
  6. Collaborative robots designed for simple and intuitive interaction with humans
  7. These are special drones used for surveillance that store data on user’s online account
  8. A software from Nexus that is expected to drive the transformation of an industrial company
Down
  1. A container security tool manufactured by Aqua
  2. The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
  3. Kubernetes based tool with behavioral activity monitoring with deep container visibility

11 Clues: A container security tool manufactured by AquaCollaborative robots designed for simple and intuitive interaction with humansIt defines a system of rules telling what a process is allowed to do in containersAn open-source vulnerability scanner tool that powers CoreOS’s container registry...

CyberSecurity Law 2025-11-20

CyberSecurity Law crossword puzzle
Across
  1. This is information that can be used to identify an individual and it is related to their health
  2. This is Japan's 2003 data privacy and protection law, protecting use, consent, and security
  3. This is Mexico's federal law regulating the data held by private entities
  4. This is a common principle amongst the laws that requires the companies to gain _____ before collecting and using the data
  5. This is a data protection law/rule that originates from Canada and has 10 main principles
  6. This is a commission that oversees the nations overall power system and regulates the transmission companies that connect to the power grid
  7. This rule requires banking and other regulators to develop reasonable policies and procedures, to prevent identity theft
  8. This security rule specifically applies to covered entities who can include health plans and providers who transmit health information electronically
  9. This is a rule that 3 nations have that is all about ensuring they follow the rules and if not there needs to be someone who can be held responsible for the actions
Down
  1. This is the most common requirement across all the laws, requiring companies employ this to help protect the data
  2. The rule that financial institutes must follow in terms of cybersecurity
  3. Companies that accept or use debit or credit cards are required to comply with this ruleset
  4. This is a template to help provide a framework for states to develop data security and breach laws
  5. This rule applies to nuclear power plant operators, to protect their computer systems from cyber attacks
  6. This is a regulation of data protection and breach policy rules in Europe
  7. This state has a specific IoT law that requires manufactures to make reasonable security features on their connected devices
  8. The rule from the FTC regulating places like mortgage brokers, retailers that offer credit, and consumer reporting agencies
  9. This is another common principle amongst the laws that requires companies to ensure the data they store is up to date
  10. This is a common rule amongst the data protection laws/rules that state the companies must be _____ with what they need the data for, why they need it, and how they will use the data
  11. This is another data protection law however originating from China that has been modified recently with 5 new additions

20 Clues: The rule that financial institutes must follow in terms of cybersecurityThis is Mexico's federal law regulating the data held by private entitiesThis is a regulation of data protection and breach policy rules in EuropeThis is a data protection law/rule that originates from Canada and has 10 main principles...

Cyber Awareness Crossword 2024-10-01

Cyber Awareness Crossword crossword puzzle
Across
  1. The act of ensuring data is kept safe from unauthorized access.
  2. A visual verification tool used to distinguish humans from bots.
  3. Stronger than a basic password, this adds an extra layer of security.
  4. The process of confirming a user’s identity.
  5. Software designed to track user activity without consent.
Down
  1. The main goal of Cybersecurity Awareness Month.
  2. The practice of safeguarding digital information.
  3. A common method to protect data by encoding it.
  4. The term for unauthorized access to a network.
  5. A program that appears legitimate but performs harmful actions.
  6. A type of software update that protects against vulnerabilities.
  7. A common cyber threat involving deceptive emails.

12 Clues: The process of confirming a user’s identity.The term for unauthorized access to a network.The main goal of Cybersecurity Awareness Month.A common method to protect data by encoding it.The practice of safeguarding digital information.A common cyber threat involving deceptive emails.Software designed to track user activity without consent....

Cyber Security Day 2022 Crossword Quiz 2022-10-10

Cyber Security Day 2022 Crossword Quiz crossword puzzle
Across
  1. Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
  2. An app developed by the National Crime Prevention Coundil to help fight scam messages and calls which plague mobile phone users.
  3. Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
  4. Type of scam that recorded the highest reported cases in Jan-Jun 2022
Down
  1. Two Factor _______
  2. Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access

6 Clues: Two Factor _______Type of scam that recorded the highest reported cases in Jan-Jun 2022Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security DayMalware designed to deny a user/organization access to files on their computer, demanding ransom to restore access...

Cyber Law CIA 1 2021-09-05

Cyber Law CIA 1 crossword puzzle
Across
  1. digitization of faming sector
  2. one of the 4 contraints
  3. one of the general problems of new media
  4. constructing various contraints within the cyber
  5. traces back to who is accessing the website
  6. school of thought proposing independence of the cyber space
Down
  1. devised a model for cyber space regulation
  2. man made resource in cyber space
  3. process of using digital technologies to create new or modify existing business processes, culture, and customer experience.
  4. another name for the school of thought proposing the use of users for cyber space regulation

10 Clues: one of the 4 contraintsdigitization of faming sectorman made resource in cyber spaceone of the general problems of new mediadevised a model for cyber space regulationtraces back to who is accessing the websiteconstructing various contraints within the cyberschool of thought proposing independence of the cyber space...

cyber security quiz 2021-11-05

cyber security quiz crossword puzzle
Across
  1. when someone looks over someone's shoulder.
  2. a digital wall which computers have to prevent access to personal information.
  3. when somebody fakes being a friend saying "help! I'm lost! I need money!" for free money.
Down
  1. when people disguise as a proper company to ask for details.
  2. a thing which enters a computer through downloading something of a sketchy website. It comes through the downloaded file.
  3. to one of the answers, it comes through a fake app download of a sketchy website. It attacks the WIFI in your household.
  4. a thing that is on your computer. It doesn't need to attach itself to a file, it can also replicate itself.

7 Clues: when someone looks over someone's shoulder.when people disguise as a proper company to ask for details.a digital wall which computers have to prevent access to personal information.when somebody fakes being a friend saying "help! I'm lost! I need money!" for free money....

Cyber Security #2 2013-06-13

Cyber Security #2 crossword puzzle
Across
  1. someone ot what something is,the name by which something is known.
  2. Hinderence of a system operation by placing excess burden on the performance capabilaties of a system.
  3. Transformaton of data into a form that conceals the datas otininal meaning.
  4. process of updating software to a different version.
  5. Finite step by step insrtuctions for a problem solving or a comutation procedure.
Down
  1. Network point that acts as an entrance to another network. Needs to be protected.
  2. need to ensure that information is disclosed only to those who are authorized to view it.

7 Clues: process of updating software to a different version.someone ot what something is,the name by which something is known.Transformaton of data into a form that conceals the datas otininal meaning.Network point that acts as an entrance to another network. Needs to be protected....

Cyber Security #3 2013-06-13

Cyber Security #3 crossword puzzle
Across
  1. electronic junk mailor junk newsgroup postings.
  2. An adverse network event in an information system.
  3. Process of identifying and fixing vulnerabilities on a system.
  4. Process of updating software to a different version.
Down
  1. information gathering and analysis of asseys to ensure such things as policy compliaance and security from vulnerabilities.
  2. used to specify which packets will or will not be used. Also determine which packets get blocked.
  3. Process of transforming an encrypted message into its original plaintext.

7 Clues: electronic junk mailor junk newsgroup postings.An adverse network event in an information system.Process of updating software to a different version.Process of identifying and fixing vulnerabilities on a system.Process of transforming an encrypted message into its original plaintext....

Cyber security crossword 2024-09-25

Cyber security crossword crossword puzzle
Across
  1. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, or credit card details, by pretending to be a trustworthy entity, often via email or fake websites.
  2. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, and ransomware.
  3. The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks.
Down
  1. A cyberattack where users are directed to a fake website that looks like a legitimate one in order to steal personal information, such as login credentials or financial data.
  2. Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others.
  3. Unwanted, unsolicited messages, usually sent in bulk through email, advertising products or services, or containing links to malicious sites.
  4. The act of gaining unauthorized access to computer systems or networks, often with malicious intent, such as stealing data or causing disruption.

7 Clues: Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others.The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks....

Кәмшат 2024-11-19

Кәмшат crossword puzzle
Across
  1. A cloud computing environment designed specifically for one organization?
  2. An infrastructure-as-a-service model?
  3. What is the process of software allocation of computer resources called?
  4. Protecting data and systems from cyber attacks?
  5. The process of automatically adjusting resources based on user demand?
Down
  1. Google's cloud storage service?
  2. A collection of key resources such as networks, servers, hardware?
  3. Special coding process to protect data?
  4. A software-as-a-service model?
  5. What is the process of protecting data from unauthorized access called?
  6. What is the level of service available to users?
  7. A service for hosting websites and applications on the Internet?

12 Clues: A software-as-a-service model?Google's cloud storage service?An infrastructure-as-a-service model?Special coding process to protect data?Protecting data and systems from cyber attacks?What is the level of service available to users?A service for hosting websites and applications on the Internet?...

Security Awareness NCSAM 2022 Crossword Puzzle 2022-09-30

Security Awareness NCSAM 2022 Crossword Puzzle crossword puzzle
Across
  1. Technology that allows access to your files through the internet from anywhere in the world
  2. The practice of sending malicious communications that appear to come from a reputable source
  3. The process of defending computers and data from malicious attacks
  4. Holds your computer files hostage for money
  5. When data is accessed and taken from a system without authorization
  6. Software designed to detect computer viruses
  7. Group of computers under malicious control
  8. Digital alteration of a person's likeness or voice
Down
  1. A copy of files to protect and restore digital data in the event of damage or loss
  2. A computer infected with malware that is part of a botnet
  3. A computer program used for accessing sites or information on the internet
  4. Defensive computer technology installed to deny unauthorized entry to a system
  5. Type of malware that spreads copies of itself from computer to computer
  6. A program or code designed to take advantage of a security flaw in a computer system
  7. The potential for loss, damage, or destruction of assets or data
  8. The action of keeping careful watch for possible danger or threats
  9. General term to describe malicious software
  10. Common term for a cybercriminal
  11. A new piece of software released by the vendor to fix a vulnerability
  12. Relating to the characteristics and culture of computers, information technology, and virtual reality

20 Clues: Common term for a cybercriminalGroup of computers under malicious controlGeneral term to describe malicious softwareHolds your computer files hostage for moneySoftware designed to detect computer virusesDigital alteration of a person's likeness or voiceA computer infected with malware that is part of a botnet...

Crisis Management 2024-07-24

Crisis Management crossword puzzle
Across
  1. threat that causes an interruption in processing
  2. group of people who are assembled to navigate the crisis
  3. the first call in a crisis (fire/medical/power)
  4. if it's safe, do what you can to secure this
  5. how often the crisis management plan is reviewed
  6. location of crisis contact information sheet
Down
  1. the instructions you should follow for assessment of product
  2. first FDF employee you need to call
  3. type of security that protects company files on computers
  4. assess this in all areas to determine the impact of the crisis
  5. updates should be given every (blank) hours

11 Clues: first FDF employee you need to callupdates should be given every (blank) hoursif it's safe, do what you can to secure thislocation of crisis contact information sheetthe first call in a crisis (fire/medical/power)threat that causes an interruption in processinghow often the crisis management plan is reviewed...

Insider threats 2022-10-13

Insider threats crossword puzzle
Across
  1. When looking for an insider threat, watch out for ______ signs
  2. Unauthorized ________ of information can result from an insider threat
  3. What employees are protecting. Property both tangible and intangible that the company owns and has a monetary value
  4. A person within an organization who can become an insider threat
  5. An acronym for the person in charge of the company’s insider threat response
  6. When company information gets out
  7. What employees should do if they suspect an insider threat
  8. A type of insider threat where a malicious actor befriends an employee in order to get company information
  9. An insider threat who is making mistakes rather than acting in malice is _____
  10. Once insider threat behaviors are reported, they need to be _________ by the FSO
  11. An employee might become an insider threat for ________ gain
Down
  1. What the FSO must do when they suspect an insider threat
  2. Someone secretly collecting information on the company
  3. Keep an eye out for _________ behavior
  4. _____ Nationals can pose a threat to the company
  5. deliberately destroying, damaging, or stopping something. A malicious insider threat may do this
  6. A type of insider threat where an attractive person tries to seduce someone for information
  7. The possibility of loss from a threat, security incident or event
  8. Without proper ________, cleared employees won’t be able to spot insider threats
  9. Cyber security is part of protecting company ____

20 Clues: When company information gets outKeep an eye out for _________ behavior_____ Nationals can pose a threat to the companyCyber security is part of protecting company ____Someone secretly collecting information on the companyWhat the FSO must do when they suspect an insider threatWhat employees should do if they suspect an insider threat...

Cyber Security Day 2022 Crossword Quiz 2022-10-10

Cyber Security Day 2022 Crossword Quiz crossword puzzle
Across
  1. Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
  2. An app developed by the National Crime Prevention Coundil to help fight scam messages and calls which plague mobile phone users.
  3. Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
  4. Highest type of scam cases reported in Jan-Jun 2022
Down
  1. Two Factor _______
  2. Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access

6 Clues: Two Factor _______Highest type of scam cases reported in Jan-Jun 2022Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security DayMalware designed to deny a user/organization access to files on their computer, demanding ransom to restore access...

cyber bulling 2013-05-03

cyber bulling crossword puzzle
Across
  1. what is one type of cyber bulling
  2. how does it make people feel
  3. who should you tell first if you are being cyber bulled
  4. who could get cyber bulled
Down
  1. who get effected the most in cyber bulling
  2. what is a useful cyber bulling help line
  3. what is one of the most common cyber bulling web sites
  4. what should you do if the cyber bulling gets out of hand

8 Clues: who could get cyber bulledhow does it make people feelwhat is one type of cyber bullingwhat is a useful cyber bulling help linewho get effected the most in cyber bullingwhat is one of the most common cyber bulling web siteswho should you tell first if you are being cyber bulledwhat should you do if the cyber bulling gets out of hand

Security 2023-03-28

Security crossword puzzle
Across
  1. - The practice of secure communication in the presence of third parties.
  2. - A type of DDoS attack that uses long-form field input to overwhelm the target server.
  3. - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
  4. - A group of computers and other devices that are connected together to share resources and information.
  5. - A network of compromised computers that can be used to perform malicious activities.
  6. - A method of transferring data securely across an untrusted network, by encapsulating data
  7. - A protocol suite for securing Internet Protocol (IP) communications.
  8. - A network security system that monitors and controls incoming and outgoing network traffic.
  9. - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
  1. - The study of analyzing and breaking encryption systems.
  2. - A type of cyber attack in which multiple compromised systems attack a target,.
  3. - A type of DDoS attack that floods a victim with ICMP echo request packets.
  4. - A global network of interconnected computer networks.
  5. - A security algorithm for wireless networks.

14 Clues: - A security algorithm for wireless networks.- A global network of interconnected computer networks.- The study of analyzing and breaking encryption systems.- A protocol suite for securing Internet Protocol (IP) communications.- The practice of secure communication in the presence of third parties....

Security 2023-03-28

Security crossword puzzle
Across
  1. - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
  2. - The practice of secure communication in the presence of third parties.
  3. - A security algorithm for wireless networks.
  4. - A protocol suite for securing Internet Protocol (IP) communications.
  5. - A global network of interconnected computer networks.
  6. - A group of computers and other devices that are connected together to share resources and information.
  7. - A method of transferring data securely across an untrusted network, by encapsulating data
Down
  1. - A type of cyber attack in which multiple compromised systems attack a target,.
  2. - The study of analyzing and breaking encryption systems.
  3. - A network security system that monitors and controls incoming and outgoing network traffic.
  4. - A network of compromised computers that can be used to perform malicious activities.
  5. - A type of DDoS attack that floods a victim with ICMP echo request packets.
  6. - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
  7. - A type of DDoS attack that uses long-form field input to overwhelm the target server.

14 Clues: - A security algorithm for wireless networks.- A global network of interconnected computer networks.- The study of analyzing and breaking encryption systems.- A protocol suite for securing Internet Protocol (IP) communications.- The practice of secure communication in the presence of third parties....

Industry 5.0 Forensics 2020-10-09

Industry 5.0 Forensics crossword puzzle
Across
  1. The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
  2. It defines a system of rules telling what a process is allowed to do in containers
  3. Collaborative robots designed for simple and intuitive interaction with humans
  4. A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
  5. A container security tool manufactured by Aqua
Down
  1. API-aware networking and security at the kernel layer powered Berkeley packet filter technology
  2. A software from Nexus that is expected to drive the transformation of an industrial company
  3. Kubernetes based tool with behavioral activity monitoring with deep container visibility
  4. An open-source vulnerability scanner tool that powers CoreOS’s container registry
  5. These are special drones used for surveillance that store data on user’s online account
  6. It is a tool used by investigators to extract data when there is no app support in drones

11 Clues: A container security tool manufactured by AquaCollaborative robots designed for simple and intuitive interaction with humansIt defines a system of rules telling what a process is allowed to do in containersAn open-source vulnerability scanner tool that powers CoreOS’s container registry...

Tec cross word puzzell 2022-04-13

Tec cross word puzzell crossword puzzle
Across
  1. network security device that monitors outgoing network traffic
  2. something designed to make something known to
  3. data that is left behind when users have been online
  4. data that describes other data
  5. bully someone over the internet
  6. activities a company undertaken to promote the buying or selling of a product or service
Down
  1. The opportunity to establish a protect network connection when using public networks
  2. where people can create, share or exchange information in virtual communities and networks
  3. A file or code
  4. A way that cyber criminals steal private information
  5. A network that connects computers all over the world

11 Clues: A file or codedata that describes other databully someone over the internetsomething designed to make something known toA way that cyber criminals steal private informationdata that is left behind when users have been onlineA network that connects computers all over the worldnetwork security device that monitors outgoing network traffic...

SECURITY 2014-09-17

SECURITY crossword puzzle
Across
  1. This is a type of elicitation (manipulation of a conversation) used by foreign agents. The agent will praise you to make you feel important so you will be willing to talk about yourself.
  2. This is art of manipulating a conversation to get a person to talk about themselves without the person knowing it. It is also how a foreign agent “elicits” company information and government secrets from employees.
  3. ALONE If someone wants to steal company information or classified documents, they will often ask to ________ ________ because they don’t want other employees around.
  4. Organized activity of an intelligence service designed to block an enemy's sources of information, to deceive the enemy, to prevent sabotage, and to gather political and military information.
  5. This is a type of elicitation used by spies. They will criticize your company in the hopes you will reveal sensitive information when you defend your company.
  6. KNOWLEDGE This is a type of Elicitation. The foreign agent will say something to make you think he has knowledge of a subject you may have in common. For example; “According to the computer guys I used to work with the frequency range for that item is….” This is designed to make you assume you have some knowledge in common with the agent. The agent knows people are more willing to talk when they feel they have something in common.
  7. STRIPE A Cobham employee with a security clearance has a badge with a red stripe on the bottom. A Cobham employee without a clearance has a badge with a _____ _____ across the bottom?
  8. This is the abbreviation for International Traffic Arms Regulation
Down
  1. There are two levels of this type of information that we work with here at Cobham, San Diego; “Secret” and “Confidential”. Items with these markings are “____________”.
  2. SECURITY OFFICER Joe Dominguez has two titles; one is the Director of Security, the other is _____ _____ _____, also known as FSO.
  3. This is the lower of the two levels of classified we work with at Cobham San Diego. The highest is “SECRET”.
  4. BAIT This is a type of Elicitation. The foreign agent will try to gain your confidence by baiting you. He will pretend he is telling you something he shouldn’t in the hopes you will do the same for him. “Just between you and me...” or “Off the record…”
  5. TRAVEL BRIEFING If you have a security clearance and are going on foreign travel outside of the United States you are required to receive this briefing before leaving.
  6. COMPLIANCE Located on the second floor of building 1, David Romero is the contact for _______ _______. If an item we produce is for EXPORT, David makes sure we are in COMPLIANCE with the law.
  7. AREA If you do not have a security clearance you cannot enter one of these areas unless you are escorted.
  8. 1 The Cobham Security Department is located in this building.
  9. This is the abbreviation for “Information System Security Manager”
  10. Fill in the missing word; “_______ don’t Compromise”. This phrase refers to remembering a combination instead of writing it down.
  11. READER Every time you enter a Cobham building you must pass/swipe your badge in front of this device.
  12. This is a three letter designation for “Department Security Representative”. These are employees that have volunteered to assist the Security Department with security education and awareness.

20 Clues: 1 The Cobham Security Department is located in this building.This is the abbreviation for “Information System Security Manager”This is the abbreviation for International Traffic Arms RegulationREADER Every time you enter a Cobham building you must pass/swipe your badge in front of this device....

Security 2025-02-26

Security crossword puzzle
Across
  1. A type of malware that records keystrokes to steal sensitive data.
  2. A technique where an attacker sends fraudulent emails to steal sensitive information.
  3. A network device that filters incoming and outgoing traffic based on security rules.
  4. The process of disguising data within an image or another file to hide its presence.
  5. A wireless attack that involves setting up a fraudulent Wi-Fi access point.
  6. An attack that overloads a system with excessive requests, making it unavailable.
  7. A network of compromised computers controlled remotely by an attacker.
  8. An attack where an unauthorized person intercepts communication between two parties.
  9. An attack where an unauthorized user gains access by following an authorized user.
Down
  1. A cryptographic attack that attempts to find two different inputs producing the same hash.
  2. A social engineering technique where an attacker manipulates victims by creating a sense of urgency.
  3. Software that automatically displays or downloads advertisements, often without user consent.
  4. Software that secretly gathers information about a user without their knowledge.
  5. The process of confirming a user’s identity before granting access.
  6. A type of malware that enables persistent, unauthorized access to a computer.
  7. The principle that ensures only authorized users can access certain data.
  8. A type of malware that locks users out of their system until a payment is made.
  9. A malicious program that disguises itself as legitimate software.
  10. A security protocol that provides encrypted communication over a computer network.

19 Clues: A malicious program that disguises itself as legitimate software.A type of malware that records keystrokes to steal sensitive data.The process of confirming a user’s identity before granting access.A network of compromised computers controlled remotely by an attacker.The principle that ensures only authorized users can access certain data....

Industry 5.0 Forensics 2020-10-09

Industry 5.0 Forensics crossword puzzle
Across
  1. An open-source vulnerability scanner tool that powers CoreOS’s container registry
  2. A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
  3. The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
Down
  1. A container security tool manufactured by Aqua
  2. It is a tool used by investigators to extract data when there is no app support in drones
  3. A software from Nexus that is expected to drive the transformation of an industrial company
  4. It defines a system of rules telling what a process is allowed to do in containers
  5. Collaborative robots designed for simple and intuitive interaction with humans
  6. API-aware networking and security at the kernel layer powered Berkeley packet filter technology
  7. These are special drones used for surveillance that store data on user’s online account
  8. Kubernetes based tool with behavioral activity monitoring with deep container visibility

11 Clues: A container security tool manufactured by AquaCollaborative robots designed for simple and intuitive interaction with humansIt defines a system of rules telling what a process is allowed to do in containersAn open-source vulnerability scanner tool that powers CoreOS’s container registry...

Industry 5.0 Forensics 2020-10-09

Industry 5.0 Forensics crossword puzzle
Across
  1. A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
  2. It defines a system of rules telling what a process is allowed to do in containers
  3. These are special drones used for surveillance that store data on user’s online account
  4. An open-source vulnerability scanner tool that powers CoreOS’s container registry
  5. The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
  6. Kubernetes based tool with behavioral activity monitoring with deep container visibility
Down
  1. API-aware networking and security at the kernel layer powered Berkeley packet filter technology
  2. A software from Nexus that is expected to drive the transformation of an industrial company
  3. A container security tool manufactured by Aqua
  4. It is a tool used by investigators to extract data when there is no app support in drones
  5. Collaborative robots designed for simple and intuitive interaction with humans

11 Clues: A container security tool manufactured by AquaCollaborative robots designed for simple and intuitive interaction with humansIt defines a system of rules telling what a process is allowed to do in containersAn open-source vulnerability scanner tool that powers CoreOS’s container registry...

Cyber law 2021-09-05

Cyber law crossword puzzle
Across
  1. school of thought using stakeholders to regulate the cyber space
  2. enables exchange of data
Down
  1. The worldwide interconnection of communications networks, computers, databases, and consumer electronics.
  2. hiding one's identity
  3. digitalization of the indian economy
  4. conversion of information into a digital format
  5. stakeholder of cyber space
  6. natural resource of cyber space
  7. a false or fictitious name
  8. author of a declaration of the independence of the cyber space

10 Clues: hiding one's identityenables exchange of datastakeholder of cyber spacea false or fictitious namenatural resource of cyber spacedigitalization of the indian economyconversion of information into a digital formatauthor of a declaration of the independence of the cyber spaceschool of thought using stakeholders to regulate the cyber space...

Round 3 2025-08-22

Round 3 crossword puzzle
Across
  1. What is the most common form of malicious code?
  2. Which action compromise cyber security ?
  3. Name the type of attack which usesa fraudulent server with a relay address?
  4. What is the act of posting abusive messages online ?
  5. What is the legal field dealing with internet behavior called ?
  6. What is the process by which robots interact with their environment ?
Down
  1. Write the full form of ASP?
  2. Who coined the term "cyberspace" ?

8 Clues: Write the full form of ASP?Who coined the term "cyberspace" ?Which action compromise cyber security ?What is the most common form of malicious code?What is the act of posting abusive messages online ?What is the legal field dealing with internet behavior called ?What is the process by which robots interact with their environment ?...

Crossword Cyber Security Quiz - 01, 2023 2022-12-28

Crossword Cyber Security Quiz - 01, 2023 crossword puzzle
Across
  1. Scrambling of text in order to ensure the security of data/ information
  2. Existence of weakness in a system or network
  3. Socially or politically motivated hackers
  4. Software designed to help the user's computer detect viruses & avoid them
  5. Hackers with main motive to gain financial profit by doing cyber crimes
  6. Emails sent to trick users to reveal their sensitive information.
Down
  1. Technique of Hiding data behind a photo
  2. Phishing Techniques used to target CEO,CFO etc.
  3. Just going behind an authorized person into a secured area
  4. Sending bulk messages by abusing electronic messaging system
  5. Unauthorized softwares installed on computer to gather sensitive information

11 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Just going behind an authorized person into a secured areaSending bulk messages by abusing electronic messaging system...

NCSAM 2021 Crossword 2021-08-05

NCSAM 2021 Crossword crossword puzzle
Across
  1. TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
  2. Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
  3. What malware propagates without a host program?
  4. Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
  5. A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
  6. What does the A in CAP stand for?
  7. What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
  8. What malware encrypts files and demands money for the decryption key?
  9. This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
  1. What is the last name of the TIAA Bank CISO?
  2. A good way to secure your devices at home is by regularly _______
  3. What type of attack do patches not prevent against?
  4. The probability of exposure or loss of assets is considered what?
  5. What type of information is private and identifies people?
  6. What technology allows information sent over the internet to remain private or confidential?
  7. What do most modern websites use to provide encryption?
  8. Which industry is most targeted by social engineers?
  9. Multifactor _____ adds extra layers of security when logging in.
  10. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.

19 Clues: What does the A in CAP stand for?What is the last name of the TIAA Bank CISO?What malware propagates without a host program?What type of attack do patches not prevent against?Which industry is most targeted by social engineers?What do most modern websites use to provide encryption?This year Cyber has rebranded as TIAA _____ Cybersecurity...

Security CrossWord 2014-03-28

Security CrossWord crossword puzzle
Across
  1. Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
  2. A program/attack used by which the cracked/attacked part of network is inoperable
  3. The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
  4. A harmful software program in disguise
  5. The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
  6. Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
  7. If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
  1. A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
  2. URL when added in this list can bypass all the Enforcement filters.
  3. The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
  4. Cryptographic transformation of data results in ________ text
  5. Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
  6. Attack through which the system gets compromised by trying only a possible set of passwords

13 Clues: A harmful software program in disguiseCryptographic transformation of data results in ________ textURL when added in this list can bypass all the Enforcement filters.A program/attack used by which the cracked/attacked part of network is inoperableAttack through which the system gets compromised by trying only a possible set of passwords...

Office Management 2025-10-11

Office Management crossword puzzle
Across
  1. A room or building used for commercial or professional work.
  2. The process of making plans for something.
  3. programs and operating information used by a computer.
  4. The fact or quality of being on time.
  5. The state of keeping or being kept secret or private.
Down
  1. The process of entrusting a task or responsibility to a subordinate.
  2. A system or organization where people are ranked by status or authority.
  3. SECURITY Protecting networks and data from unauthorized use.
  4. INTELLIGENCE Computer systems able to perform tasks normally requiring human intelligence.
  5. Distinctive attributes or characteristics.

10 Clues: The fact or quality of being on time.The process of making plans for something.Distinctive attributes or characteristics.The state of keeping or being kept secret or private.programs and operating information used by a computer.A room or building used for commercial or professional work.SECURITY Protecting networks and data from unauthorized use....

Hazards at the Airport 2025-09-24

Hazards at the Airport crossword puzzle
Across
  1. You need this document to travel (8)
  2. An alternative to a hard copy ticket (7)
  3. These have a lot of your personal information (6,6) on them
  4. An employee must wear this in restricted areas (7)
  5. An employee needs this to work airside (3,5)
Down
  1. Required to meet destination entry requirement (6,4)s
  2. Watch for these people trying to steal things from you (11)
  3. One of these must be a true likeness of you (10)
  4. A kind of attack on technology(5)
  5. This airport area will check you and your hand luggage(8)

10 Clues: A kind of attack on technology(5)You need this document to travel (8)An alternative to a hard copy ticket (7)An employee needs this to work airside (3,5)One of these must be a true likeness of you (10)An employee must wear this in restricted areas (7)Required to meet destination entry requirement (6,4)s...

9.1 Vocab 2026-02-06

9.1 Vocab crossword puzzle
Across
  1. - When A Creditor Takes A Chunk Of Income
  2. - Buying Of Unplanned Goods Driven By Sudden Emotion
  3. - Loyalty Points Towards A Company
  4. - Online Crime Where Attackers Mimic Trusted Establishments Using Fake Emails To To Trick Them.
  5. - Cyber Security Process Of Converting Readable Data Into A Unreadable Font
Down
  1. - Offer Cash Back After Purchase Of Products
  2. - Process Of Evaluating Options Like Price, Features , & Quality Of Products To Secure The Best Value.
  3. - Ability To Make Considered Decisions
  4. - Refusal Of Permission Or Cancel Something
  5. - Credit That Is Left Over On Your Account

10 Clues: - Loyalty Points Towards A Company- Ability To Make Considered Decisions- When A Creditor Takes A Chunk Of Income- Credit That Is Left Over On Your Account- Refusal Of Permission Or Cancel Something- Offer Cash Back After Purchase Of Products- Buying Of Unplanned Goods Driven By Sudden Emotion...

Crossword-InfoSec 2022-11-26

Crossword-InfoSec crossword puzzle
Across
  1. It's not an insect, but crawls and replicates within a network
  2. A challenge-response test to determine human users
  3. A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
  4. It records everything that you type.
  5. Malicious activity by internal users. It’s sometimes unintentional also.
  6. A spy software that intends to compromise your personal information
  7. Collection of hijacked systems to carry out a large-scale flood attack
Down
  1. Exploiting the human element to obtain sensitive information
  2. If you are cautious, you will use multi-level authentication
  3. Disguised cyber-criminal pretend to commit malicious acts
  4. A targeted cyber attack to steal critical and classified information of an organization or entity
  5. Process of converting encrypted data into readable form
  6. An intelligently crafted software intended to harm your system
  7. Flooding victims with unwanted requests to restrict the availability of services
  8. An isolated environment to test, research, and analyze without affecting the production environment

15 Clues: It records everything that you type.A challenge-response test to determine human usersProcess of converting encrypted data into readable formDisguised cyber-criminal pretend to commit malicious actsExploiting the human element to obtain sensitive informationIf you are cautious, you will use multi-level authentication...

Roman's crossword for English class at UTMN 2023-04-10

Roman's crossword for English class at UTMN crossword puzzle
Across
  1. Specialist engaged in shaping regulatory interaction on the Internet and devising legal protection systems for people and property on the Internet.
  2. Professional who designs interfaces compatible with the human nervous system, for controlling computers and household and industrial robots, taking into account the psychological and physiological traits of the user.
  3. Specialist that Audits complex IT systems processing data and making decisions based on such data.
  4. Specialist tasked with dealing with the lower levels of information infrastructure, ensuring the security of dedicated network segments.
  5. This professional develops user-friendly, adaptive and safe interfaces for equipment, devices and software of various levels.
  6. This specialist designs databases, develops action algorithms, ensures effective access of users to data storages, controls the quality and logic of information storage and extraction.
Down
  1. Specialist investigating cyber crimes.
  2. Specialist in the information security of technological processes at automated industrial facilities.
  3. Qualified specialist for a wide spectrum of operations involving data processing systems.
  4. Specialist in designing systems for collecting and processing large arrays of data received from the Internet, and developing analytical models and interfaces for assembling them.
  5. Advisor on the information security of Internet users.
  6. A specialist who creates ready-made IT solutions from prebuilt templates using a graphical user interface instead of classical programming.
  7. Specialist in communications with end users of IT products and promotion of new solutions to groups having a conservative attitude towards advanced technology.
  8. Professional who develops linguistic systems for semantic translation and text information processing.

14 Clues: Specialist investigating cyber crimes.Advisor on the information security of Internet users.Qualified specialist for a wide spectrum of operations involving data processing systems.Specialist that Audits complex IT systems processing data and making decisions based on such data....

BCAW 2022 2022-06-13

BCAW 2022 crossword puzzle
Across
  1. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  2. In order to prepare for cyber resilience, speed and agility are required.
Down
  1. Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay.
  2. The capacity to recover quickly from difficulties
  3. A thing made by combining two different elements

5 Clues: A thing made by combining two different elementsThe capacity to recover quickly from difficultiesIn order to prepare for cyber resilience, speed and agility are required.In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?...

Cyber Security Learing Aim A 2023-09-15

Cyber Security  Learing Aim A crossword puzzle
Across
  1. This is most commonly carried out by sending fake text messages
  2. an example of a company that suffered from financial loss
  3. a form of software that looks like a real program but is actually a type of malware in disguise.
  4. the process where actions are accurately recorded in a secure location
  5. this is where these cards can be read using a smartphone.
  6. external threat
  7. physical security measure
  8. form of security measure that recognised individuals by their unique physical characteristics.
Down
  1. the group responsible for looking after the security of an organization is a part of the security operations centre
  2. a state or quality which could render you to the possibility of being attacked
  3. their main purpose is to protect the malware and can enable any malware installed to still be on the system after many multiple reboots.
  4. a main form of of loss
  5. one of the different types of hacking

13 Clues: external threata main form of of lossphysical security measureone of the different types of hackingan example of a company that suffered from financial lossthis is where these cards can be read using a smartphone.This is most commonly carried out by sending fake text messagesthe process where actions are accurately recorded in a secure location...

Cross Word Puzzle - Cyber Security 2023-10-02

Cross Word Puzzle - Cyber Security crossword puzzle
Across
  1. a string of characters that allows access to a computer system or service
  2. malware that misleads users of its true intent by disguising itself as a standard program
  3. the gaining of unauthorised access to data in a system or computer
  4. a system that connects two or more computer devices for transmitting and sharing information
  5. software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
  6. a security system designed to prevent unauthorised access into or out of a computer network
Down
  1. a type of malware that spreads between computers and damages data and software
  2. individuals or teams of people who use technology to commit malicious activities on digital systems or networks
  3. the protection of personal data from those who should not have access to it
  4. the actual person or organisation who is directly affected by the hacker's use of stolen data or information
  5. the practice of protecting systems, networks and programs from digital attacks
  6. a type of software program created to protect information technology systems and individual computers from malicious software or malware
  7. a term that relates to the security of a computer system being compromised

13 Clues: the gaining of unauthorised access to data in a system or computera string of characters that allows access to a computer system or servicea term that relates to the security of a computer system being compromisedthe protection of personal data from those who should not have access to it...