cyber security Crossword Puzzles
cyber crime 2024-11-07
Across
- - A secret string of characters used for authentication.
- - Part of the internet that requires special software to access, often associated with illicit activities.
- - Server that acts as an intermediary for requests from clients seeking resources from other servers.
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- - Engineering technique that tricks people into giving away confidential information.
- - Collection of computers and devices connected for communication and resource sharing.
- - Technique of disguising communication from an unknown source as being from a known, trusted source.
- - Software update to fix bugs or vulnerabilities (same as Across).
- - A security system that controls incoming and outgoing network traffic.
- - A deceptive scheme intended to cheat or defraud someone.
Down
- - Person who gains unauthorized access to computer systems.
- - Software that gathers information from a computer without permission.
- - A software update that fixes vulnerabilities or improves functionality.
- - A software tool designed to take advantage of a security flaw.
- - Money demanded by hackers in exchange for access to compromised data.
- - Software that automatically displays or downloads advertising material.
- - Malicious software that gives unauthorized access to a computer system.
- - Malicious code that infects computer files and spreads to others.
- - A type of malware that spreads copies of itself across networks.
- - Prefix related to computers or computer networks.
20 Clues: - Prefix related to computers or computer networks. • - A secret string of characters used for authentication. • - A deceptive scheme intended to cheat or defraud someone. • - Person who gains unauthorized access to computer systems. • - A software tool designed to take advantage of a security flaw. • ...
Security 2022-03-27
Across
- Is a database of computers, users, and services.
- Ensures the integrity of a message.
- A type of asset for an organization.
- Software developed by cybercriminals to perform malicious acts.
- Type of malware where communications are intercepted.
- This needs to be done to your computer when it's left unattended.
- Using this method is a way to protect data.
- Type of malware where a removable device is left in a public place for someone to use and infect their machine.
- A feature that detects phishing websites.
- In order to use this feature in Windows, TPM must be enabled.
- Typically distributed by downloading online software.
Down
- This needed to be updated in order for its anti-malware software to work.
- A mode that allows users to browse the web anonymously.
- A set of objectives to ensure the security of a network.
- Type of malware where the attacker alters packet contents.
- Is a type of lock in Windows that needs a pre-paired device.
- Pretending to need personal information to confirm someone's identity.
- This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
- Prevents unwanted traffic from going into internal networks.
- The most common type of computer malware.
- Can be found in high-security environments.
- A type of lock that needs a key that is separate from the door handle.
22 Clues: Ensures the integrity of a message. • A type of asset for an organization. • The most common type of computer malware. • A feature that detects phishing websites. • Using this method is a way to protect data. • Can be found in high-security environments. • Is a database of computers, users, and services. • Type of malware where communications are intercepted. • ...
Security 2022-02-08
Across
- I copy traffic for you to safely inspect. (6,9)
- If you look at me you can find out "who did what, where, and when". (5,5,4)
- You're not alone and this approach helps reduce risk and cost. (6)
- Enterprise way to adopt a Zero trust approach. (6,4)
- Use me to prevent unwanted traffic reaching your VMs. (8)
- Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
- Use me to classify your data. (5,3)
- I provide insights into your security posture. Acronym(3)
- De-identification technique. (16)
- I detect network based threats. (5,3)
- Do you trust that container image? (6,4)
- Trust no one. (4,5)
- Using me allows you to implment the principle of least privilege. Acronym (3)
Down
- I can tell you when you need to reduce permissions. (11)
- I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
- Apply multiple layers of securty. (7,2,5)
- Use me to mitigate OWASP top 10 risks. (5,5)
- Needs to be kept secret. (12)
- If you use me you do not need a VPN. Acronym(3)
- You can find me at rest or on the move (in-transit). (10)
- If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
- Use me to manage keys outside of Google Cloud. Acronym (3)
22 Clues: Trust no one. (4,5) • Needs to be kept secret. (12) • De-identification technique. (16) • Use me to classify your data. (5,3) • I detect network based threats. (5,3) • Do you trust that container image? (6,4) • Apply multiple layers of securty. (7,2,5) • Use me to mitigate OWASP top 10 risks. (5,5) • I copy traffic for you to safely inspect. (6,9) • ...
Security 2024-10-25
Security 2026-01-12
Across
- A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- An individual who uses computers, networking, or other skills to overcome a technical problem, often used in the context of someone who gains unauthorized access to systems.
- The act of disguising communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, websites, etc.
- A list of entities approved for authorized access or privileged membership in cyberspace often contrasted with blacklist which identifies entities denied access privileges
- A number of Internet-connected devices, each running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS), steal data, send spam, and allow the attacker to access the device and its connection.
- An incident where data is unintentionally exposed in a vulnerable system or stolen outright.
- A piece of software, chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
- In cybersecurity context, this refers to any physical device used for security purposes like authentication tokens which store digital credentials for logging into systems securely.
- A type of malware that misleads users of its true intent, often disguised as legitimate software.
- A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- A function that converts an input (or 'message') into a fixed-length string of bytes. Hash functions are used in various applications including digital signatures and password storage.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Virtual Private Network; extends a private network across public networks like the Internet enabling users to send and receive data as if their devices were directly connected to the private network while benefiting from its functionality and security policies.
- A collection of software tools that enable an unauthorized user to gain control over a computer system without being detected.
- The process of converting information or data into a code to prevent unauthorized access.
- The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources in an information system.
Down
- The act of intercepting and monitoring traffic passing through a digital network.
- A type of attack where the attacker supplies untrusted input into a program. This input is then processed by an interpreter as part of a command or query thereby altering the course of execution of the program.
- The isolation of data files suspected of being infected with malware so they cannot harm your system while you decide whether they should be deleted.
- Distributed Denial of Service; an attack meant to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic from multiple sources.
- A method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (root access) on a computer system, network, or software application.
- Secure Sockets Layer / Transport Layer Security; cryptographic protocols designed to provide communications security over a computer network.
- An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
- Malicious software designed to block access to a computer system until a sum of money is paid.
- An intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your needs.
- A piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs.
- The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communications.
- A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- Criminal activities carried out by means of computers or the Internet.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Multi-Factor Authentication; an authentication method that requires two or more independent credentials for more secure verification.
33 Clues: Criminal activities carried out by means of computers or the Internet. • The act of intercepting and monitoring traffic passing through a digital network. • The process of converting information or data into a code to prevent unauthorized access. • An incident where data is unintentionally exposed in a vulnerable system or stolen outright. • ...
Security 2022-04-13
Across
- Stun something
- What Chickens have
- Like a gun
- Rabbit
- You go ___ and you hit a strike
- Nighttime star.
- An animal that can swim underwater and can kill.
- Something to stun with flash or have an everlasting memory.
- 2 best____ in a room
- NNNNEEEEEEEEEEDS repair
- More Small people.
- Oppisite of Life
- Something you need to buy to get into a movie.
- Needs Repair.
- An animal
Down
- A light that u can turn off and on
- Bunny
- Oppisite of Dark
- A star in the day.
- Oppisite of Dull
- What a wolf has
- Oppisite of Death
- What rich people have.
- A break in
- I ___ in the challange
- You get back at someone
- an animal that can kill you and is sometimes brown.
- A red animal
- A small person.
- You ____ a child
- Something you need to see with
31 Clues: Bunny • Rabbit • An animal • Like a gun • A break in • A red animal • Needs Repair. • Stun something • Nighttime star. • What a wolf has • A small person. • Oppisite of Dark • Oppisite of Dull • You ____ a child • Oppisite of Life • Oppisite of Death • What Chickens have • A star in the day. • More Small people. • 2 best____ in a room • What rich people have. • I ___ in the challange • You get back at someone • ...
Security 2017-08-20
Across
- Second highest principal in SQL Server.
- Turned off when a database is attached
- Not NTLM
- Not even the sysadmin's can see this data.
- aXXX@XXXX.com
- Protocol used when connecting from the server SQL is on.
- Pretending to be someone else
- One SQL instance talking to another.
- Security trump
- Contains 0 or more windows users.
- Uses the private key to encrypt and decrypt data.
- Used to contain a windows id and password.
Down
- Add a permission
- Permission required to create stored procedures.
- Required for all encryption in SQL Server
- One way encryption.
- This database is isolated from other databases.
- Used to add a John Hancock to a stored procedure.
- Workstation-Server-Server
- Alias for a credential
- Uses both a public and private key.
- Bobby
- Add random data to the string before encrypting it.
- Principal that contains other principals.
- Check who did what
25 Clues: Bobby • Not NTLM • aXXX@XXXX.com • Security trump • Add a permission • Check who did what • One way encryption. • Alias for a credential • Workstation-Server-Server • Pretending to be someone else • Contains 0 or more windows users. • Uses both a public and private key. • One SQL instance talking to another. • Turned off when a database is attached • Second highest principal in SQL Server. • ...
Security 2013-08-04
Across
- An offence that can be summary or indictable?
- Section 494 of the Criminal Code of Canada deals with ________ arrest authority?
- When a person does not leave, after directed to do so, the person would considered to be __________
- Touch someone without consent, Intentionally, either directly or indirectly
- What does 10-4 mean?
- Surveillance from a place hidden from view is what type of Surveillance?
- Evidence of prior bad acts is __________ __________ evidence (2 words)
- A minor offence under the Criminal Code of Canada
- Without colour of right if you convert something to your own use it is considered ______?
- __________________ Laws are also called By-laws
- Level of Government that operates the OPP?
- A witness on the stand is giving what type of evidence?
- PIPEDA is a __________ act
- who's responsibility is safety in the workplace?
- a wrong against society
Down
- Under the Criminal Code of Canada the offence when a fire is deliberately set?
- a serious offernce
- section 10 of the Charter of Rights and Freedoms deals with rights upon ___________
- Fingerprints, Hair Samples, and Mineral Samples are considered what type of evidence?
- what does "Z" stand for in the Phonetic Alphabet?
- Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
- Class C fires involve _______________ equipment
- only the police can _______________
- term for evidence that is allowed in a trail or hearing
- A trail within a trail
- Who determines what evidence will be allowed in court?
- The act that regulates security guards in Ontario?
- all security guards shall act with honesty and ____________
- The police officers are __________ officers
- under the LLA (Liquor License Act) you can not arrest, you can only ____________
30 Clues: a serious offernce • What does 10-4 mean? • A trail within a trail • a wrong against society • PIPEDA is a __________ act • only the police can _______________ • Level of Government that operates the OPP? • The police officers are __________ officers • An offence that can be summary or indictable? • Class C fires involve _______________ equipment • ...
security 2023-02-27
Across
- Interazione online ostile che comporta messaggi di insulto tra gli utenti
- Quella a 2 fattori è un tipo di ....... forte
- Simile a una password, ma generalmente più lunga per una maggiore sicurezza
- Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
- L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
- Una persona che prende o usa le informazioni del vostro computer
- Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
- Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
- Malware che si replica per diffondersi ad altri computer della rete
- Programma che registra i tasti premuti da un utente
- Genera e memorizza in modo sicuro password complesse in un unico luogo
Down
- Non aprire se non ci si fida del mittente
- Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
- Il computer avrà molti popup se ne viene infettato
- Una delle password più comuni nel 2022: un evergreen!
- L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
- _________ sempre il computer quando si lascia la scrivania
- Quando i criminali usano gli sms fake stanno cercando di fare….
- Un programma software progettato per prevenire i virus
- Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
- Chiamate o messaggi vocali fraudolenti
21 Clues: Chiamate o messaggi vocali fraudolenti • Non aprire se non ci si fida del mittente • Quella a 2 fattori è un tipo di ....... forte • Il computer avrà molti popup se ne viene infettato • Programma che registra i tasti premuti da un utente • Una delle password più comuni nel 2022: un evergreen! • Un programma software progettato per prevenire i virus • ...
Security 2025-08-14
Across
- A secret word or phrase used to gain access to an account
- Granted official permission to access or manage an account
- A feature that confirms client identity using a mobile app (two words)
- A person permitted to act on behalf of the account owner
- Consent given to perform specific actions
- Signs of suspicious or potentially fraudulent activity (two words)
- A method of verifying identity using vocal characteristics (two words)
- The ability to log into and manage an account via the internet (two words)
- Ability to access account online when security Q&A status is locked (two words)
- Someone other than the account owner involved in a call or transaction (two words)
Down
- Authorized access or actions on an account.
- Notifications or warnings about significant account activity or potential security concerns
- Actions intended to fraudulently gain unauthorized access to
- Abbreviation for Additional Security Questions
- How many attempts do callers have to pass decedent security
- The process of identifying and resolving system or device issues (two words)
- The careful and thorough evaluation of potential risks and issues (two words)
- An electronic tool used to access accounts, such as a phone or computer (two words)
- A confidential code used to confirm identity and enable access
- personal prompts used to verify identity during login (two words)
- A unique identifier used to access an account
- Cues or hints provided to assist in answering security questions
22 Clues: Consent given to perform specific actions • Authorized access or actions on an account. • A unique identifier used to access an account • Abbreviation for Additional Security Questions • A person permitted to act on behalf of the account owner • A secret word or phrase used to gain access to an account • Granted official permission to access or manage an account • ...
Cyber 2022-10-15
Across
- Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
- If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
- a type of software designed to help the user's computer detect viruses and avoid them.
- Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
- (main objective of Cyber Security?)
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
- (main objective of Cyber Security?)
- world’s very first antivirus program?
- Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
- Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
- the hackers who's main motive is to gain financial profit by doing cyber crimes.
- DNS would translate any Domain name into ___________.
- (main objective of Cyber Security?)
13 Clues: (main objective of Cyber Security?) • (main objective of Cyber Security?) • (main objective of Cyber Security?) • world’s very first antivirus program? • DNS would translate any Domain name into ___________. • the hackers who's main motive is to gain financial profit by doing cyber crimes. • ...
Cyber Security 2018-09-20
cyber security 2021-11-03
5 Clues: when someone you via email • a word that keeps your computer safe • a virus indside something like an email • someone getting your details with no one knowing • something someones sent to you by someone looking for attention
Cyber Security 2023-09-15
cyber security 2023-09-13
Cyber Security 2020-10-19
5 Clues: the process of encoding information. • malware on your computer when it is not secured. • a device we use in our daily life. (hint: it ends with an R) • something that protects our device from unauthorized access. • the program and other operating information used by computers.
Cyber Security 2020-08-24
Across
- es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
- son pequeños archivos que algunos sitios web guardan en tu ordenador. Las cookies almacenan información sobre tí, como nombre de usuario o información de registro, o preferencias de usuario, pero no espían, como el spyware.
- son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
5 Clues: es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias. • es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador. • ...
Cyber security 2024-09-07
5 Clues: Voice based phishing • fraudulent text messages • injects viruses, Trojan’s • a kind of malware demands for ransom • deceive revealing personal info via emails
Cyber security 2024-03-18
5 Clues: A fault or flaw in a computer program • A complex system of interconnected elements • Protected from or not exposed to danger or risk • Irrelevant or unsolicited messages sent over the Internet. • Look over a machine or system to detect potential vulnerabilities.
CYBER SECURITY 2024-08-19
5 Clues: a secret word • malicious software or malware • software used to prevent virus • network that connects computers • taking away confidential information
Cybersecurity Fundamental Chapter 2 2022-11-24
Across
- a type of storage device retains the data when no user or process is using it.
- cyber criminals can capture, save and steal data in-transit.
- uses removable media to physically move data from one computer to another.
- procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- devices, and product available to protect information systems and fend off cyber criminals.
- verifies the identify of a user to prevent unauthorized access.
- uses cable to transmit data.
Down
- verifies determine which resources users can access, along with the operations that users can perform.
- is the principle used to describe the need to maintain availability of information systems and services at all times.
- involves sending information from one device to another.
- cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- cyber criminals can intercept and alter data in-transit.
- aware and knowledgeable about their world and the dangers that threaten their world.
- keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- prevents the disclosure of information to unauthorize people, resource and processes.
- uses the airways to transmit data.
16 Clues: uses cable to transmit data. • uses the airways to transmit data. • involves sending information from one device to another. • cyber criminals can intercept and alter data in-transit. • cyber criminals can capture, save and steal data in-transit. • verifies the identify of a user to prevent unauthorized access. • ...
Cybersecurity Ethics, Laws & Standards 2025-10-09
Across
- unauthorized access to computer systems
- moral principles that govern a person's behavior or actions
- policy that defines proper and improper use of technology and networks
- process of converting data into a code to prevent unauthorized access
- copies of data stored separately for recovery in case of loss
- using someone else's work without giving proper credit
- law that protects sensitive health information
- coordinates international cybercrime investigations
- security process requiring two separate forms of identification
- online platforms for sharing content and communication
- software designed to damage or disrupt a computer system
- legal right that grants the creator control over their work
- network security system that monitors and controls incoming and outgoing traffic
Down
- criminal activity carried out using computers or the internet
- trail of data created by a person’s online activity
- software that secretly monitors user activity
- option that controls who can see your online information
- protects us critical infrastructure from cyber threats
- deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
- unauthorized access and release of confidential information
- using digital technology to harass or intimidate someone
- crime of obtaining someone’s personal information to commit fraud
- manipulating people to give up confidential information
- study of ethical issues surrounding computer use
- protects student education records and data
- a secret word or phrase used to gain access to a system
- software designed to detect and remove malicious programs
- malware that locks users out of their files until a payment is made
- update to software that fixes vulnerabilities or bugs
- proper and respectful behavior when communicating online
- practices and steps taken to maintain system health and improve security
- internet crime complaint center that accepts and investigates online crime reports
32 Clues: unauthorized access to computer systems • protects student education records and data • software that secretly monitors user activity • law that protects sensitive health information • study of ethical issues surrounding computer use • trail of data created by a person’s online activity • coordinates international cybercrime investigations • ...
Quiet their watching you.... 2023-07-16
Across
- Breach Result of a hacker breaking into a system
- Attack an attempt to breach a security boundary
- method of connecting a series of computers
- malware used to spy on your computer activities
- Horse computer program that looks innocent
- video or audio that has been altered
- document storage
- Where a hacker poses as legitimate business
- When someone is tricked into clicking on one object when they want to click on another
- Test commonly referred to as a Pen Test
- collection of programs that allow hackers to access a computer
Down
- system to shield against viruses
- document storage
- Malware that highjacks your system
- Apps that instruct a computer to carry out a task
- process of identifying a users identity
- Black Hat Tool
- When a hacker changes the IP address that comes from a trusted source
- Malware that can reproduce itself
- Address Pretty much anything connected to the internet
20 Clues: Black Hat Tool • document storage • document storage • system to shield against viruses • Malware that can reproduce itself • Malware that highjacks your system • video or audio that has been altered • process of identifying a users identity • Test commonly referred to as a Pen Test • method of connecting a series of computers • Where a hacker poses as legitimate business • ...
Cyber Ethics 2025-06-02
Across
- A fake email that tricks you into giving personal info
- Breaking a system's security to test or exploit it
- Pretending to be someone else online
- A small file that tracks your website activity
- Taking someone else's work without credit
- type of malware that is designed to spy on user activity.
- The unauthorize use of copyrighted content
- The trail of data you leave online
Down
- The method of verifying your identity.
- Prevents unauthorized access to or from a private network
- Stealing and using someone else's online identity
- Legal protection for original digital content
- Makes judgement on cyber crimes.
- A secret combination of characters that protects your account
- Software that protects against malicious programs
- Unwanted, irrelevant messages sent over internet, usually advertising or phishing.
16 Clues: Makes judgement on cyber crimes. • The trail of data you leave online • Pretending to be someone else online • The method of verifying your identity. • Taking someone else's work without credit • The unauthorize use of copyrighted content • Legal protection for original digital content • A small file that tracks your website activity • ...
Security 2012-11-03
Across
- A trojan appears to be __________ at first site
- There are 8/9 different _____________ in the DPA
- of the first worms was called the ______ worm
- A good password should contain symbols, numbers, uppercase and ____________letters
- The only way to ensure you never get malware on your computer is to ______ the internet cable
- __________ in emails can contain viruses
- Religion and medical records are considered ______________ information
- A ____________ examines all the network traffic coming in and going out of your computer
- __________ is the process of making an exact copy of the contents of a HD
Down
- Malware intended to steal important personal information
- The DPA states that business should ________ data once they no longer need it
- To prevent loss of data one needs to ___________ frequently
- Before accessing an account one needs to enter a _________ and password
- To protect yourself from malware you need to install an ____________
- The Data ________ Act regulates the use of data for all businesses
- A copy of important data should be kept in an ________ location
- One should never follow links sent by _______________ or unknown sources
- The act of accessing another person's computer without permission
- Dropbox is an ___________ storage site
- A malicious software that spreads with the intention of corrupting or deleting files
- Passwords should always be kept ______
21 Clues: Dropbox is an ___________ storage site • Passwords should always be kept ______ • __________ in emails can contain viruses • of the first worms was called the ______ worm • A trojan appears to be __________ at first site • There are 8/9 different _____________ in the DPA • Malware intended to steal important personal information • ...
Security 2012-11-03
Across
- A good password should contain symbols, numbers, uppercase and ____________letters
- One should never follow links sent by _______________ or unknown sources
- Before accessing an account one needs to enter a _________ and password
- one of the first worms was called the ______ worm
- Religion and medical records are considered ______________ information
- Malware intended to steal important personal information
- A copy of important data should be kept in an ________ location
Down
- __________ in emails can contain viruses
- A ____________ examines all the network traffic coming in and going out of your computer
- A malicious software that spreads with the intention of corrupting or deleting files
- __________ is the process of making an exact copy of the contents of a HD
- The act of accessing another person's computer without permission
- The Data ________ Act regulates the use of data for all businesses
- There are 8/9 different _____________ in the DPA
- A trojan appears to be __________ at first site
- Passwords should always be kept ______
- To protect yourself from malware you need to install an ____________
- The only way to ensure you never get malware on your computer is to ______ the internet cable
- The DPA states that business should ________ data once they no longer need it
- Dropbox is an ___________ storage site
- To prevent loss of data one needs to ___________ frequently
21 Clues: Passwords should always be kept ______ • Dropbox is an ___________ storage site • __________ in emails can contain viruses • A trojan appears to be __________ at first site • There are 8/9 different _____________ in the DPA • one of the first worms was called the ______ worm • Malware intended to steal important personal information • ...
Security 2013-06-27
Across
- Stick to what path when in the freight yard?
- Your MSIC must be above what?
- What does the I stand for in MSIC?
- What type of industry are we in?
- What colour should drivers follow in the freight yard on the way in?
- What is the name of the contractor company for security?
- What lights must be on when in the freight yard?
- What channel do you call for Security?
- What must a non MSIC holder have whilst in the LRZ?
- What does the L stand for in LRZ?
- A non MSIC holder must also have what for access into the LRZ?
Down
- Who must you radio to have the vehicle booth gates opened/closed?
- Who has the final say when allowing freight to enter the yard?
- What does the T stand for in OTS?
- What need must you have to request an MSIC?
- What must you display in the LRZ?
- What is your base channel when receiving radio calls?
- Who takes passengers on/off via the buggy?
- What is the code number for a Firearm?
- What is Angela’s title other than Manager?
20 Clues: Your MSIC must be above what? • What type of industry are we in? • What does the T stand for in OTS? • What must you display in the LRZ? • What does the L stand for in LRZ? • What does the I stand for in MSIC? • What channel do you call for Security? • What is the code number for a Firearm? • Who takes passengers on/off via the buggy? • ...
Security 2026-03-12
Across
- Pretty Good Privacy encryption tool (abbr.)
- Command to change password aging information
- Virtual Private Network (abbr.)
- Malicious software that remains hidden in the system
- Secure Hash Algorithm family (abbr.)
- MIT authentication system that uses tickets
- Command to run programs with elevated privileges
- Hash function vulnerable to collisions (abbr.)
- Secure remote login protocol on port 22 (abbr.)
- Successor to SSL for secure communications (abbr.)
- Boot loader that can be password protected
Down
- Multi-layer security strategy (defense in depth)
- Turing test to distinguish humans from computers
- Multi-_____ authentication (6 letters)
- Linux packet filtering firewall tool
- File /etc/______ that stores user account information
- Pseudo-device driver for generating random numbers
- Security triad; Confidentiality, Integrity, Availability (abbr.)
- Advanced Encryption Standard (abbr.)
- Centralized logging daemon
20 Clues: Centralized logging daemon • Virtual Private Network (abbr.) • Linux packet filtering firewall tool • Secure Hash Algorithm family (abbr.) • Advanced Encryption Standard (abbr.) • Multi-_____ authentication (6 letters) • Boot loader that can be password protected • Pretty Good Privacy encryption tool (abbr.) • MIT authentication system that uses tickets • ...
Principles of Medical Informatics Ethics 2024-02-22
Across
- Obtaining permission from someone before the use of their personal data.
- The clinician's moral obligation to act solely for the benefit of the patient.
- The process of safeguarding private patient information.
Down
- The process of transforming any given key or a string of characters into another value.
- A core duty in medical practice that ensures patient privacy.
- Cyber security measures are designed to protect ______ from attack.
- Entails the procedures and processes by which one party justifies and takes responsibility for its activities.
7 Clues: The process of safeguarding private patient information. • A core duty in medical practice that ensures patient privacy. • Cyber security measures are designed to protect ______ from attack. • Obtaining permission from someone before the use of their personal data. • The clinician's moral obligation to act solely for the benefit of the patient. • ...
October Crossword - Cyber Security 2022-02-07
Across
- software designed to prevent, detect, and remove malware
- cyberattack that tries already compromised usernames and passwords in other sites
- username and ... should be complex
- any crime committed electronically
- pretending to be someone and accessing their information
Down
- fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
- ensures that you are the only one who has access to your account
- campaign launched in 2010 by the Department of Homeland Security
- any software intended to damage, disable, or give someone unauthorized access
- agency that informs and educates about cybersecurity
10 Clues: username and ... should be complex • any crime committed electronically • agency that informs and educates about cybersecurity • software designed to prevent, detect, and remove malware • pretending to be someone and accessing their information • ensures that you are the only one who has access to your account • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malware that automatically delivers advertisements.
- They are software programs created to automatically perform specific operations
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
- It is a global system of interconnected computer networks
- It is a string of characters used to verify the identity of a user during the authentication process.
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- It is a type of malware that functions by spying on user activity without their knowledge.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
pocketsiem's cyber security crossword 2023-04-27
Across
- Malicious software that is designed to cause damage to a computer system
- A type of attack where the attacker attempts to guess a user's password
- A type of software that is designed to prevent unauthorized access to a computer system
- A network of compromised computers that can be used to carry out attacks
- A program that monitors and controls incoming and outgoing network traffic
- A type of attack that involves taking control of a computer or device and demanding payment for its release
- The practice of tricking someone into giving away sensitive information
- The act of finding vulnerabilities in computer systems in order to exploit them
Down
- The practice of using deception to trick someone into revealing sensitive information
- A type of encryption that uses two keys: one for encryption and one for decryption
- A method of verifying a user's identity through a combination of something they know, have, and are
11 Clues: A type of attack where the attacker attempts to guess a user's password • The practice of tricking someone into giving away sensitive information • Malicious software that is designed to cause damage to a computer system • A network of compromised computers that can be used to carry out attacks • ...
BT 2021-07-21
Across
- Australian government policy used to protect systems and information for cyber threats
- the maximum amount of megabytes than can be sent via Defence email
- Spills Something you want to prevent/avoid in order to maintain your security responsibilites
- one of the main software applications used by Defence members, particularly PCS
- The manual which describes the policies and roles and responsibilities of Defence personnel while using ICT
- The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)
Down
- The equipment and resources that support Defence employees in the conduct of their business
- the main form of electronic communication used by Defence members
- The framework used by Defence to define protective security policies and procedures
9 Clues: the main form of electronic communication used by Defence members • the maximum amount of megabytes than can be sent via Defence email • one of the main software applications used by Defence members, particularly PCS • The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr) • ...
Cyber Security 2021-10-06
5 Clues: errors in someone's code or program • allows a cyber security attacker to take control • technology that that aids in gathering information • someone who seeks and exploits weaknesses in a computer system • computer program that replicates itself in order to spread to other computers
Cyber Security 2021-06-06
5 Clues: The internet is _______. • Handle hacking _____________. • Don't put ________information online. • Don't forget about smart _____ safety. • If you get hacked, change your ________.
Cyber Security 2023-09-21
Across
- It is a way to scramble data so that only authorized parties can unscramble it.
- It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
Down
- It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
- It is a network security device that monitors traffic to or from your network
- It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
5 Clues: It is a network security device that monitors traffic to or from your network • It is a way to scramble data so that only authorized parties can unscramble it. • It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication. • ...
cyber security 2021-02-12
cyber security 2017-06-30
Across
- software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
Down
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- a malware which replicates it self eating your storage its harmless when it doesn't contain a virus
- is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
5 Clues: a malware which replicates it self eating your storage its harmless when it doesn't contain a virus • software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. • is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. • ...
Cyber Security 2021-10-06
5 Clues: A type of virus • to fight a virus • intending or intended to do harm. • a wall or partition designed to do harm • allows cyber security hackers to take control
cyber security 2021-11-05
Across
- you can type it but you can also use your face for it to work.
- this stops you accessing scam websites
- this is where someone is looking over your shoulders to try see your passwords
Down
- this is where someone sends a message on one of your friends devices
- when people disguise them selves as another trying to take advantage of you
5 Clues: this stops you accessing scam websites • you can type it but you can also use your face for it to work. • this is where someone sends a message on one of your friends devices • when people disguise them selves as another trying to take advantage of you • this is where someone is looking over your shoulders to try see your passwords
Security 2013-06-27
Across
- What is the code number for a Firearm?
- What colour should drivers follow in the freight yard on the way in?
- What does the T stand for in OTS?
- What is your base channel when receiving radio calls?
- What type of industry are we in?
- What is Angela’s title other than Manager?
- Who has the final say when allowing freight to enter the yard?
- Stick to what path when in the freight yard?
- A non MSIC holder must also have what for access into the LRZ?
Down
- What does the I stand for in MSIC?
- What lights must be on when in the freight yard?
- Who must you radio to have the vehicle booth gates opened/closed?
- Who takes passengers on/off via the buggy?
- What need must you have to request an MSIC?
- What is the name of the contractor company for security?
- What does the L stand for in LRZ?
- What must a non MSIC holder have whilst in the LRZ?
- What must you display in the LRZ?
- Your MSIC must be above what?
- What channel do you call for Security?
20 Clues: Your MSIC must be above what? • What type of industry are we in? • What does the T stand for in OTS? • What does the L stand for in LRZ? • What must you display in the LRZ? • What does the I stand for in MSIC? • What is the code number for a Firearm? • What channel do you call for Security? • Who takes passengers on/off via the buggy? • ...
security 2013-05-09
Across
- A NSF cheque in a court procedure is what type of evidence?
- A security guard should keep a good?
- Crossword
- Class B fires involve what type of liquids
- An offence under section 494 (1) ccc anyone can arrest found committing
- Security guards are ________ Peace Officers
- Under the Liquor License Act a security guard may only ______ a person
- 10-9 means?
- Section 8 of the Charter Of Rights deals with?
- What would go off in most buildings if there was a fire?
Down
- Who does the security guard answer to ultimately when on duty
- When a witness is on the stand they are giving what type of evidence?
- The Trespass to Property Act is?
- 10-3 means stop ?
- Once a security guard arrests a person they must contact?
- A criminal offence considered a minor offence
- Section 26 of the Criminal Code regulates the amount of?
- Who can report a security guard for code of conduct violation?
- The Criminal Code is a ________ act
- A fingerprint is what type of evidence?
- A gun is what type of evidence?
21 Clues: Crossword • 10-9 means? • 10-3 means stop ? • A gun is what type of evidence? • The Trespass to Property Act is? • The Criminal Code is a ________ act • A security guard should keep a good? • A fingerprint is what type of evidence? • Class B fires involve what type of liquids • Security guards are ________ Peace Officers • A criminal offence considered a minor offence • ...
Security 2025-03-31
Across
- Indicators of potential fraud or suspicious activity (two words)
- A secret word or phrase used to gain access to an account.
- A person authorized to act on behalf of the account owner
- A unique identifier used to log into an account
- The careful and thorough evaluation of potential risks and issues (two words)
- A feature that allows clients to verify their identity using a mobile app (two words)
- Authentication method using the client's voice (two words)
- Abbreviation for Additional Security Questions
- Someone other than the account owner involved in a call or transaction (two words)
- Consent given to perform specific actions
Down
- Granted official permission to access or manage an account
- The process of diagnosing and resolving technical issues (two words)
- An electronic tool used to access accounts, such as a phone or computer (two words)
- A secret code used to verify identity and grant access
- Permission granted to access or perform actions on an account
- Personal questions used to verify identity during authentication (two words)
- Deceptive actions intended to gain unauthorized access to assets
- The ability to log into and manage an account online (two words)
- Notifications or warnings about important account activities or security issues
- Providing guidance or hints to help someone answer questions
20 Clues: Consent given to perform specific actions • Abbreviation for Additional Security Questions • A unique identifier used to log into an account • A secret code used to verify identity and grant access • A person authorized to act on behalf of the account owner • Granted official permission to access or manage an account • ...
SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) 2025-05-12
Browsing safety 2025-06-13
Across
- is any criminal activities intended to harm anyone using a computer and an internet connection . = Cybercrime
- A collection of technologies, process, and practices designed to protect network. = Cyber security
- _____ are like online thieves.= Cyber criminals
Down
- An illegal entry into a computer system or network. = Hacking
- Short form of vital information resources under seize.= Virus
- is act of sending an email to a user= phishing
6 Clues: is act of sending an email to a user= phishing • _____ are like online thieves.= Cyber criminals • An illegal entry into a computer system or network. = Hacking • Short form of vital information resources under seize.= Virus • A collection of technologies, process, and practices designed to protect network. = Cyber security • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Cyber Bullying Crossword Puzzle 2013-06-04
Across
- Be ______ for your words and actions online.
- When cyber bullying, we should ______ the evidence as it will help in further investigation.
- cyber bullying can _______ people’s feeling.
- Cyber bullying is using the ______ or phone to repeatedly say rude and hurtful things about a person.
- Do not ________ or respond bad word to others.
Down
- Stop _________ people hurtful names.
- when you are being cyber bullied, ________ the incident.
- ________ means posting or sending a lot of unnecessary information.
- ___________ means online manners.
- _______ bullying is to bully others online.
10 Clues: ___________ means online manners. • Stop _________ people hurtful names. • _______ bullying is to bully others online. • cyber bullying can _______ people’s feeling. • Be ______ for your words and actions online. • Do not ________ or respond bad word to others. • when you are being cyber bullied, ________ the incident. • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Cyber Security Awareness Month 2024-10-11
Across
- Software designed to detect and remove malware
- A form of malware that demands payment to restore access to data
- Malicious software that secretly monitors and collects personal information from a user’s device
- The practice of keeping personal and sensitive information secure from unauthorized access or disclosure
- The process of converting information into a secret code
Down
- A method of verifying a user’s identity using something they know, have, or are
- A software flaw that can be exploited by attackers
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- A string of characters used to verify your identity online
- A scam where attackers trick you into giving personal information
10 Clues: Software designed to detect and remove malware • A software flaw that can be exploited by attackers • The process of converting information into a secret code • A string of characters used to verify your identity online • A form of malware that demands payment to restore access to data • A scam where attackers trick you into giving personal information • ...
Introduction to Cyber Security 2025-04-04
Across
- An attack that takes advantage of a previously unknown vulnerability in software or hardware before the vendor has released a patch or fix.
- The process of converting data into a code to prevent unauthorized access. Only those with the decryption key can access the original data.
- Short for "malicious software," malware refers to any software specifically designed to harm or exploit a computer, network, or device. Examples include viruses, worms, and ransomware.
- A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm.
- The manipulation or deception of individuals into divulging confidential information, often used in phishing and other types of attacks.
- A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.
Down
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, designed to block unauthorized access while permitting legitimate communication.
- The process of verifying the identity of a user, device, or system before granting access to resources. Common methods include passwords, biometrics, or multi-factor authentication (MFA).
- A type of social engineering attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.
- A cyberattack aimed at disrupting the normal operation of a network or server by overwhelming it with excessive traffic, causing it to become unavailable to legitimate users.
10 Clues: A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key. • A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm. • ...
Cyber Security Month Crossword! 2025-10-01
Across
- A highly realistic video, image or audio clip generated by AI depicting someone saying or doing something that they didn't actually do
- A method of protecting data by encoding it to make it unreadable by unauthorised users
- A phishing attack that uses SMS instead of email
- A hacker pretending to be someone else to trick you into giving away money or information
- Malicious software that locks access to a computer until a ransom is paid
Down
- A relatively new cyberattack technique that injects malicious code within digital ads
- When a hacker gains access to a business email account to trick users into transferring money out of an organisation
- Kyogle Councils' email filtering and web security program
- A virtual private network that encrypts your data, preventing hackers from viewing it
- A cybersecurity method that protects your data by requiring more than one method of verifying your identity
10 Clues: A phishing attack that uses SMS instead of email • Kyogle Councils' email filtering and web security program • Malicious software that locks access to a computer until a ransom is paid • A relatively new cyberattack technique that injects malicious code within digital ads • A virtual private network that encrypts your data, preventing hackers from viewing it • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Cyber Security For Teenagers 2024-01-04
Across
- Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)
- Apabila menerima emel dari sumber yang tidak dikenali, lebih baik melakukan __________ dan periksa sebelum membuka lampiran atau mengklik pautan (8 huruf)
- Inisiatif yang melibatkan aktiviti menyelidik dan menganalisis untuk mencari kelemahan dalam sistem keselamatan siber (11 huruf)
- Keadaan di mana sesuatu peranti atau sistem tidak lagi berfungsi dengan baik akibat serangan atau masalah teknikal (5 huruf)
- Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)
- Inisiatif untuk mengajar remaja mengenai keselamatan siber dan etika dalam penggunaan teknologi (9 huruf)
Down
- Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)
- Bahagian penting dalam keselamatan siber; pastikan perisian sentiasa ________ untuk menghadapi ancaman terkini (7 huruf)
- Jenis serangan di mana penyerang cuba memperoleh maklumat peribadi melalui pertanyaan palsu atau manipulasi emosi (8 huruf)
- Untuk melindungi privasi, elakkan daripada memberikan maklumat peribadi di _________ sosial secara terbuka (5 huruf)
10 Clues: Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf) • Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf) • Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf) • ...
Cyber Security Awareness Month 2022-09-22
Across
- Always hover over these in emails before you click them.
- You can send all suspicious emails to this email address so the security team can review them for you.
- These emails entice you to click an unsafe link or attachment.
- This is cybersecurity awareness month.
- Always tell this person if an incident occurs
Down
- Never leave you company computer or phone like this
- This is a password that contains a long string of words that are easy to remember but hard to guess
- Never share this with anyone
- This can infect your computer when you download unsafe software
- Always get approval from this department before downloading any software
10 Clues: Never share this with anyone • This is cybersecurity awareness month. • Always tell this person if an incident occurs • Never leave you company computer or phone like this • Always hover over these in emails before you click them. • These emails entice you to click an unsafe link or attachment. • This can infect your computer when you download unsafe software • ...
cyber security crossword puzzle 2026-02-27
Across
- A security method that requires two different forms of verification to log in.
- A person who illegally gains access to computer systems.
- A deceptive method used to trick users into revealing personal information through fake emails or websites.
- The process of verifying a user’s identity before granting access.
Down
- Harmful software designed to damage or disrupt computer systems.
- A malicious program that spreads and infects other files or systems.
- The protection of personal and sensitive information from misuse.
- The process of converting information into secure code to protect it from unauthorized access.
- A security system that monitors and blocks unauthorized network access.
- A secret combination of characters used to access an account.
10 Clues: A person who illegally gains access to computer systems. • A secret combination of characters used to access an account. • Harmful software designed to damage or disrupt computer systems. • The protection of personal and sensitive information from misuse. • The process of verifying a user’s identity before granting access. • ...
Cyber Security Crossword Puzzle 2026-03-23
Across
- "Creates a private, secure tunnel for your internet connection."
- A quick software update designed to fix a security vulnerability.
- A spare copy of files kept in case of data loss.
- "Using physical traits, like fingerprints, to verify your identity."
- A digital barrier that monitors and blocks unauthorized network traffic.
Down
- A long string of random words used as a secure password.
- Scrambles data so only authorized users can read it.
- "Disguising a communication to appear from a trusted, known source."
- Fake emails used to trick people into sharing private information.
- Harmful software designed to damage or gain access to a computer.
10 Clues: A spare copy of files kept in case of data loss. • Scrambles data so only authorized users can read it. • A long string of random words used as a secure password. • "Creates a private, secure tunnel for your internet connection." • A quick software update designed to fix a security vulnerability. • Harmful software designed to damage or gain access to a computer. • ...
Cybersecurity Workforce Framework 2020-10-28
Across
- and Operate, Specialized denial and deception operations
- and Development, provide leadership, management, direction, an/or development
- Provision, Conceptualize, design, and build secure IT systems
Down
- and Defend, Identification, analysis and mitigation of threats
- Examine cyber events and/or crimes of IT systems
- Review and evaluate incoming cybersecurity information
- and maintain, Provide support, administration and maintenance
7 Clues: Examine cyber events and/or crimes of IT systems • Review and evaluate incoming cybersecurity information • and Operate, Specialized denial and deception operations • Provision, Conceptualize, design, and build secure IT systems • and Defend, Identification, analysis and mitigation of threats • and maintain, Provide support, administration and maintenance • ...
LJJ INAC Revision 2024-06-29
Across
- A type of assessment that should identify the likelihood and potential loss
- Vital control over the issue of invoices or orders
- A input control that data is correct eg £3.49 or 0<>10
- One of the few disadvantages of cloud accounting
- A level of management which formulates the long-term plans for the organisation
- Should be taken frequently and kept in a safe location
- Collection of humungous amounts of information, often for AI
- A type of data security which includes maintaining a log of all failed access attempts
- Physical security measure of computer system which includes the building
- A type of report which acts as an output control to ensure completeness and accuracy of processing
- A level of management which requires semi-detailed information from MIS
- Set of characters that can be allocated to a terminal, person or room, allowing access
- A general control over information systems which includes firewalls and anti-virus checkers
- Protection of internet-connected systems, including hardware, software and data
- One of the issues that may be problematic if data is held about individuals
- Perhaps one of the main advantages of a computerised system
Down
- The completeness and accuracy of data
- An advantage of computerisation when used as an aid to communication
- Information Technology
- Stand-by procedures, recovery procedures and management policies are essential parts of this plan
- Variety, velocity, veracity and ?
- A general control over information systems which includes procedures for program amendments
- Descriptive and diagnostic analytics provide historical information about ???
- A type of data security which includes periodic data protection audits of the computer systems
- A mnemonic to remember general controls over the environment within which a computer-based system operates
- The mnemonic which defines the characteristics of good information
26 Clues: Information Technology • Variety, velocity, veracity and ? • The completeness and accuracy of data • One of the few disadvantages of cloud accounting • Vital control over the issue of invoices or orders • A input control that data is correct eg £3.49 or 0<>10 • Should be taken frequently and kept in a safe location • ...
Pesten 2016-02-19
Across
- Een gevolg van (cyber)pesten
- Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
- Iemand met woorden pijn doen is ... pesten
- Een verregaand gevolg van (cyber)pesten
- Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
Down
- Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
- Als je cyberpesten gaat aangeven, maak je best ... als bewijs
- (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
- Iemand met opzet een ... sturen
- Iemand lichamelijk pijn doen is ... pesten
- Een andere naam voor cyberpesten
- De eerste stap om iets aan (cyber)pesten te doen
12 Clues: Een gevolg van (cyber)pesten • Iemand met opzet een ... sturen • Een andere naam voor cyberpesten • Een verregaand gevolg van (cyber)pesten • Iemand lichamelijk pijn doen is ... pesten • Iemand met woorden pijn doen is ... pesten • De eerste stap om iets aan (cyber)pesten te doen • Op deze kanalen wordt heel vaak aan cyberpestenten gedaan • ...
Security 2020-03-04
20 Clues: ядро • лимит • правда • способ • попытка • продавец • перемена • получать • включать • разрешать • полезность • надежность • Устройство • подлинность • фальсификация • телекоммуникации • служба поддержки • возможность идентификации • одна из составляющих триады • невозможность отказа от авторства
Security 2013-05-09
Across
- Who can report a security guard for code of conduct violation?
- What would go off in most buildings if there was a fire?
- Security guards are ________ Peace Officers
- Under the Liquor License Act a security guard may only ______ a person
- A NSF cheque in a court proceedure is what type of evidence?
- Once a security guard arrests a person they must contact?
- A criminal offence considered a minor offence
- A fingerprint is what type of evidence?
- Class C fires involve what type of liquids
- A gun is what type of evidence?
Down
- Who does the security guard answer to ultimately when on duty
- An offence under section 494 (1) ccc anyone can arrest found committing
- Section 26 of the Criminal Code regulates the amount of?
- The Trespass to Property Act is?
- When a witness is on the stand they are giving what type of evidence?
- 10-9 means?
- 10-3 means stop ?
- A security guard should keep a good?
- Section 8 of the Charter Of Rights deals with?
- The Criminal Code is a ________ act
20 Clues: 10-9 means? • 10-3 means stop ? • A gun is what type of evidence? • The Trespass to Property Act is? • The Criminal Code is a ________ act • A security guard should keep a good? • A fingerprint is what type of evidence? • Class C fires involve what type of liquids • Security guards are ________ Peace Officers • A criminal offence considered a minor offence • ...
Security 2013-06-27
Across
- What must you display in the LRZ?
- What is the name of the contractor company for security?
- What is the code number for a Firearm?
- What does the T stand for in OTS?
- What need must you have to request an MSIC?
- Who has the final say when allowing freight to enter the yard?
- What is your base channel when receiving radio calls?
- A non MSIC holder must also have what for access into the LRZ?
- Stick to what path when in the freight yard?
- What is Angela’s title other than Manager?
Down
- What must a non MSIC holder have whilst in the LRZ?
- What does the I stand for in MSIC?
- Who must you radio to have the vehicle booth gates opened/closed?
- What colour should drivers follow in the freight yard on the way in?
- What lights must be on when in the freight yard?
- Who takes passengers on/off via the buggy?
- What channel do you call for Security?
- What type of industry are we in?
- What does the L stand for in LRZ?
- Your MSIC must be above what?
20 Clues: Your MSIC must be above what? • What type of industry are we in? • What must you display in the LRZ? • What does the T stand for in OTS? • What does the L stand for in LRZ? • What does the I stand for in MSIC? • What is the code number for a Firearm? • What channel do you call for Security? • Who takes passengers on/off via the buggy? • ...
Security 2014-02-23
Across
- Technology created by Microsoft to control interactivity on web pages
- also known as junk mail
- Computer and ________ security helps to ensure that only authorized personnel have access
- self-replicating program that is harmful to networks
- Type of security that uses human interface, like a thumb scanner
- Monitors users and sends reports back to the host
- Threat from a user outside of the network
- Code used to login to a locked account
- Data is transformed using a complicated algorithm to make it unreadable
- Windows feature that can encrypt data
- An attack on the actual hardware
- Threat from user inside the network.
- malicious software that is disguised as a legitimate program
Down
- The first generation security standard for wireless.
- Type of attack that focuses on the software
- Program that controls the traffic in and out of a computer
- A program written with malicious intent, sent by hackers
- Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
- Type of encryption that requires two keys, a private key and a public key.
- Minimum number of characters recommended in a password
- Displaying unwanted ads on your computer
- When the attacker pretends to be a legit organization
- ensures that messages are not corrupted or tampered with during transmission
- malicious program that gains full access to a computer system
- A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.
25 Clues: also known as junk mail • An attack on the actual hardware • Threat from user inside the network. • Windows feature that can encrypt data • Code used to login to a locked account • Displaying unwanted ads on your computer • Threat from a user outside of the network • Type of attack that focuses on the software • Monitors users and sends reports back to the host • ...
Security 2022-04-22
Across
- A scam using a redirect which tricks people into entering personal information
- Software offered at no cost, but you can't edit it or sell it yourself.
- General name for malware that has lots of popups
- General name for software that locks a computer until you pay a fee
- A type of attack designed to take a website down
- Hardware of software, which helps prevent hacking
- A method of 'locking' data so that it is unreadable unless you have a key
- A form of web encryption protocol
- Term for unauthorised access into a network / computer system.
- General name for all malicious software
- Law that forbids the creation of malware and hacking
- The type of basic encryption used on the internet
Down
- Genera for mal,ware such as keyloggers
- Software offered for free, with access to the source code to edit the software
- Law that stops companies / organisations from mis-using your data
- The latest form of web encryption protocol
- A method of only allowing people the information they need to see.
- Server Type of computer that helps prevent DDOS attacks
- Software offered on a trial basis
- A scam using emails to trick people into entering personal information
20 Clues: A form of web encryption protocol • Software offered on a trial basis • Genera for mal,ware such as keyloggers • General name for all malicious software • The latest form of web encryption protocol • General name for malware that has lots of popups • A type of attack designed to take a website down • Hardware of software, which helps prevent hacking • ...
Security 2022-02-08
Across
- You can find me at rest or on the move (in-transit). (10)
- Apply multiple layers of securty. (7,2,5)
- Needs to be kept secret. (12)
- I copy traffic for you to safely inspect. (6,9)
- Trust no one. (4,5)
- I can tell you when you need to reduce permissions. (11)
- Use me to prevent unwanted traffic reaching your VMs. (8)
- Using me allows you to implment the principle of least privilege. Acronym (3)
- Use me to manage keys outside of Google Cloud. Acronym (3)
- Enterprise way to adopt a Zero trust approach. (6,4)
- If you look at me you can find out "who did what, where, and when". (5,5,4)
- You're not alone and this approach helps reduce risk and cost. (6)
Down
- De-identification technique. (16)
- If you use me you do not need a VPN. Acronym(3)
- I provide insights into your security posture. Acronym(3)
- Use me to mitigate OWASP top 10 risks. (5,5)
- Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
- Do you trust that container image? (6,4)
- I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
- Use me to classify your data. (5,3)
- If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
21 Clues: Trust no one. (4,5) • Needs to be kept secret. (12) • De-identification technique. (16) • Use me to classify your data. (5,3) • Do you trust that container image? (6,4) • Apply multiple layers of securty. (7,2,5) • Use me to mitigate OWASP top 10 risks. (5,5) • If you use me you do not need a VPN. Acronym(3) • I copy traffic for you to safely inspect. (6,9) • ...
Security 2024-10-31
Across
- These devices are common in homes, often have weak security, and have been exploited to launch DDOS attakcs.
- This type of program always executes with the permissions of the owner.
- command to write to syslog from terminal
- This type of system authentication involves providing more than just a password
- Technique to harden a system that involves implementing multiple types of security
- Type of cryptography that involves both public and private keys.
- Occurs when the sequence of instructions matters but is not enforced
- Type of attack involves posing as a trusted figure to induce individuals to reveal personal information.
- This file is used to exchange data more quickly between the hard drive and RAM.
- Always have more than one of these to recover your system
- If an attacker gains access to this account, they can do anything on the system.
Down
- Security exercise to determine vulnerabilities in a system
- often relies on an access control list to determine what traffic can enter and exit a network.
- Linux software that loads kernel
- Data structure that defines the starting block and length of a file.
- Command to display real-time resource usage
- Hash used in current linux distros for shadow file account passwords
- failing to use this command in a parent process may create a zombie
- A password used with this software can prevent a thief from booting your device.
- Release of energy that can fry solid-state electronics.
- A secure way to access a system remotely
- A process does not want to have this value be high, or else many other processes might run before it
- This type of threat is often the most dangerous and unexpected.
- This vulnerability can occur when data is written beyond the bounds of an array.
24 Clues: Linux software that loads kernel • command to write to syslog from terminal • A secure way to access a system remotely • Command to display real-time resource usage • Release of energy that can fry solid-state electronics. • Always have more than one of these to recover your system • Security exercise to determine vulnerabilities in a system • ...
Security 2025-03-19
Across
- | Een aanval waarbij schadelijke SQL-code wordt geïnjecteerd in een database-query.
- | Een aanval waarbij schadelijke scripts worden geïnjecteerd in webpagina's.
- | Een netwerk van geïnfecteerde computers die op afstand worden bestuurd door een aanvaller.
- | Extra beveiligingslaag waarbij een gebruiker twee verschillende vormen van verificatie nodig heeft.
- | Een beveiligingssysteem dat netwerkverkeer controleert en ongeautoriseerde toegang blokkeert.
- | Het proces van het omzetten van leesbare data naar een versleutelde, onleesbare vorm.
- | Een versleutelde verbinding die gebruikers anoniem op het internet laat surfen.
- | Het onderzoek naar methoden om encryptie toe te passen
- | Een type malware dat zich voordoet als legitieme software, maar schadelijke acties uitvoert.
- | Kwaadaardige software die schade kan toebrengen aan computers of netwerken.
- | Het onderscheppen en analyseren van netwerkverkeer.
- | Een vorm van online oplichting waarbij een aanvaller zich voordoet als een betrouwbare entiteit om gevoelige informatie te verkrijgen.
- | Een techniek waarbij een aanvaller wachtwoorden probeert te kraken door alle mogelijke combinaties te proberen.
- | Een aanval waarbij een hacker een actieve gebruikerssessie overneemt.
Down
- | Een kwetsbaarheid die onbekend is bij de leverancier en kan worden misbruikt door hackers.
- | Het manipuleren van mensen om vertrouwelijke informatie prijs te geven.
- | Software die in het geheim gebruikersgegevens verzamelt.
- | Software die malware detecteert en verwijdert.
- | Software of hardware die toetsaanslagen registreert.
- | Een verborgen toegang tot een systeem, vaak misbruikt door hackers.
- | Een eenrichtingsproces dat data omzet in een unieke vaste lengte code.
- | Een aanval waarbij een programma meer data ontvangt dan het aankan, wat kan leiden tot het uitvoeren van schadelijke code door een aanvaller.
- | Malware die bestanden versleutelt en losgeld eist om ze vrij te geven.
- | Een aanval waarbij een server wordt overspoeld met verkeer om deze onbruikbaar te maken.
24 Clues: | Software die malware detecteert en verwijdert. • | Het onderscheppen en analyseren van netwerkverkeer. • | Software of hardware die toetsaanslagen registreert. • | Het onderzoek naar methoden om encryptie toe te passen • | Software die in het geheim gebruikersgegevens verzamelt. • | Een verborgen toegang tot een systeem, vaak misbruikt door hackers. • ...
Security 2025-09-23
Across
- ask questions or seek information.
- Intentional destruction or damage.
- of rules or procedures
- To monitor or observe closely.
- Genuine or legitimate.
- let's use Risky doesn't fit, let's use Assessdoesn't fit the bill, let's use Threats
- use Probe doesn't fit let's us Inquire
- To confirm or verify authenticity.
- Protected from threats or risks.
- let's use Accreditdoesn't fit let's use Validate
Down
- of assets and personnel.
- keep safe from harm or damage.
- Potential occurrences that could cause harm.
- To give permission or approval.
- Unauthorized gathering of confidential information.
- Thorough background check.
- Verification of trustworthiness for access.
- Measure to protect against harm or damage.
- To examine closely for defects or issues.
- ,To ensure compliance with laws or rules.
20 Clues: of rules or procedures • Genuine or legitimate. • of assets and personnel. • Thorough background check. • keep safe from harm or damage. • To monitor or observe closely. • To give permission or approval. • Protected from threats or risks. • ask questions or seek information. • Intentional destruction or damage. • To confirm or verify authenticity. • ...
Security 2025-10-24
Across
- system sentinel
- self-replicating, damages computer system
- data matches the truth
- gathers information
- software designed to disrupt and damage
- Restricted Access
- authentication
- bogus website
- recovery
- virtual autograph
Down
- your digital insurance policy
- predefined criteria
- accuracy, consistency and reliability
- bomb triggered based on condition
- network gatekeeper
- fraud email
- last in line, yet first to spot the mistake
- self-replicating and spreads through network
- Protection of sensitive information
- extra bit that keeps the total in line
- horse
- can launch attacks
22 Clues: horse • recovery • fraud email • bogus website • authentication • system sentinel • Restricted Access • virtual autograph • network gatekeeper • can launch attacks • predefined criteria • gathers information • data matches the truth • your digital insurance policy • bomb triggered based on condition • Protection of sensitive information • accuracy, consistency and reliability • ...
Pokemon TYPES <---------------------------- 2022-11-01
Across
- shiny crystals
- cold
- tiny and disgusting
- poisonous
- flies and might breathe fire
- very strong and is most effective against five other types of Pokemon
- shocking
- mainly for nature-y type Pokemon
- shiny!!!
- for Pokemon in the sky
- WHO TURNED OFF LIGHTS??!!!
Down
- uses mind powers and is very intelligent
- for strong Pokemon on the ground
- boo...
- mostly found in the ocean
- stony
- it burns!!!
- the most basic type
- this type for Pokemon can be found in the cyber simulation
- music
- cute and tough
21 Clues: cold • stony • music • boo... • shocking • shiny!!! • poisonous • it burns!!! • shiny crystals • cute and tough • tiny and disgusting • the most basic type • for Pokemon in the sky • mostly found in the ocean • WHO TURNED OFF LIGHTS??!!! • flies and might breathe fire • for strong Pokemon on the ground • mainly for nature-y type Pokemon • uses mind powers and is very intelligent • ...
Cyber Security 2022-07-19
5 Clues: First computer virus • Vital Information Resource Under ___ • Software that is intentionally harmful to computer • Routing that uses multi-layered encryption for anonymity • Malware designed to appear as legitimate software program to gain access to a system
Cyber Security 2022-10-06
Cyber Security 2020-08-24
5 Clues: move to the other computer. • virus can make copies of itself • another computer, for example by email, • a computer that has a virus makes a connection • a program that sends a large number of annoying messages to many people’s mobile phones in an uncontrolled way
Cyber Security 2018-09-20
Cyber Security 2023-10-18
5 Clues: The address of a web page • Universal symbol of an SSL Certificate • prevent unauthorised access from a network • An executable file that spreads within a machine. • malicious software designed to block access to a computer system until a sum of money is paid
Cyber Security 2024-03-14
cyber security 2024-10-21
Cyber Security 2024-11-14
Cyber security 2021-11-05
Across
- They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
- pretending to be a genuine organisation to get someone's details.
- a virus that usually come embedded within another file that looks genuine.
Down
- horse malware that is disguised as a genuine file that gives hackers access to a computer.
- engineering the art of tricking or manipulation to get someone to reveal their personal info.
5 Clues: pretending to be a genuine organisation to get someone's details. • a virus that usually come embedded within another file that looks genuine. • horse malware that is disguised as a genuine file that gives hackers access to a computer. • engineering the art of tricking or manipulation to get someone to reveal their personal info. • ...
CYBER SECURITY 2016-05-22
Across
- attempt to acquire sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
- never respond to unusual___.
- never give your ___ information online.
- bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
5 Clues: never respond to unusual___. • never give your ___ information online. • bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. • software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. • ...
cyber security 2022-09-15
Across
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
Down
- hat hacking Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
5 Clues: Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • Programs that automatically execute tasks as ordered by the creator of the program that has infected them. • An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies. • ...
cyber security 2021-10-06
Across
- a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information
- often called advertising-supported software by its developers
- a person who tries to steal personal information
Down
- any software that installs itself on your computer and starts covertly monitoring your online behavior without
- Unlike a computer virus, it does not need to attach itself to an existing program.
5 Clues: a person who tries to steal personal information • often called advertising-supported software by its developers • Unlike a computer virus, it does not need to attach itself to an existing program. • any software that installs itself on your computer and starts covertly monitoring your online behavior without • ...
cyber security 2022-10-21
Across
- a computer program that replicates itself
- sends emails in order to reveal personal information such as passwords and credit cards numbers
- software that automatically displays or downloads advertising materials
Down
- a program that steals login credentials
- such as tacking software that gathers information about a person without their knowledge
5 Clues: a program that steals login credentials • a computer program that replicates itself • software that automatically displays or downloads advertising materials • such as tacking software that gathers information about a person without their knowledge • sends emails in order to reveal personal information such as passwords and credit cards numbers
cyber security 2022-11-28
Cyber Security 2018-01-22
Cyber Security 2025-07-08
Puzzle No. 2 2022-09-06
Across
- A string of characters used to verify the identity of a user during the authentication process.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Ensuring that authorized users have access to information and associated assets when required.
- Sentence-like format of password which is strong but easier to remember.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- You should not write down your password in this type of physical medium.
Down
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- Ensuring that information is accessible only to those authorized to have access.
- Safeguarding the accuracy and completeness of information.
- Complete the sentence: ________ is everyone’s responsibility.
- A weakness in your security policy, implementation, design, and controls.
- These fix general software problems and provide new security patches where criminals might get in.
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- An event that will cause harm to you or your asset.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
15 Clues: An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Complete the sentence: ________ is everyone’s responsibility. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
Cyber Security Word Search Challenge 2025-08-26
Across
- An update that fixes security vulnerabilities.
- Online servers used to store data.
- Security system that blocks or allows network traffic.
- Malware that spreads itself without human interaction.
- Process of converting data into a secure, unreadable format.
- Secret word or phrase used to access accounts.
- Malware disguised as legitimate software.
- A vulnerability unknown to the vendor, exploited by hackers.
Down
- Hidden access point used by attackers to bypass security.
- Software designed to harm, exploit, or disable systems.
- Fake emails that trick people into giving up sensitive info
- Tool that encrypts your internet connection and hides your IP address.
- Malware that locks files and demands payment.
- Software that secretly monitors your activities.
14 Clues: Online servers used to store data. • Malware disguised as legitimate software. • Malware that locks files and demands payment. • An update that fixes security vulnerabilities. • Secret word or phrase used to access accounts. • Software that secretly monitors your activities. • Security system that blocks or allows network traffic. • ...
cyber security engineer 2024-07-18
Across
- The systematic process of finding and fixing security holes in software or networks.
- The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
- A process to determine and document potential threats to an organization
- The analysis and examination of digital data for evidence or investigation.
Down
- The method used to protect information by transforming it into an unreadable format
- The response to and management of a security breach or attack.
- The practice of securing information systems against unauthorized access and threats.
7 Clues: The response to and management of a security breach or attack. • A process to determine and document potential threats to an organization • The analysis and examination of digital data for evidence or investigation. • The method used to protect information by transforming it into an unreadable format • ...
Cyber Security - Incidents 2025-09-28
Across
- - Damage to trust and credibility due to incidents.
- - Deliberate change of data, not always with bad intentions.
- - Deliberate deletion or erasure of stored data.
- - Business impact involving delays or system failures.
- - Penalties for breaking data protection laws.
Down
- - Changing data with the intent to trick or harm.
- - Taking or copying data without permission.
7 Clues: - Taking or copying data without permission. • - Penalties for breaking data protection laws. • - Deliberate deletion or erasure of stored data. • - Changing data with the intent to trick or harm. • - Damage to trust and credibility due to incidents. • - Business impact involving delays or system failures. • ...
Cyber Security Crossword Puzzle 2024-09-20
Across
- A type of attack where the hacker pretends to be someone else
- Criminal activity involving computers or networks
- Code injected into a website to gain unauthorized access
- Malicious software designed to damage or disrupt systems
- Protects the boundary of a network from unauthorized access
Down
- Secure connection method, often used with Wi-Fi
- Unauthorized access to systems or data
- A weakness in a system that can be exploited
- Secret word used to access an account
- Program used to protect against malware
10 Clues: Secret word used to access an account • Unauthorized access to systems or data • Program used to protect against malware • A weakness in a system that can be exploited • Secure connection method, often used with Wi-Fi • Criminal activity involving computers or networks • Code injected into a website to gain unauthorized access • ...
Cyber Security Awareness Month 2024-09-30
Across
- A type of cybercrime where criminals steal personal information for financial gain.
- A type of malicious software that encrypts files and demands a ransom payment.
- A type of social engineering attack that tricks victims into revealing sensitive information via email.
- A technique used to gain unauthorised access to a computer system.
Down
- Any kind of computer software with malicious intent to harm your device
- A form of phishing attack that uses QR codes instead of text-based links in emails, digital platforms or on physical items.
- A security system that prevents unauthorised access to a network
- A security measure that protects data from unauthorised access or disclosure.
- A security practice that involves regularly updating software and systems.
- A type of malicious software that replicates itself
10 Clues: A type of malicious software that replicates itself • A security system that prevents unauthorised access to a network • A technique used to gain unauthorised access to a computer system. • Any kind of computer software with malicious intent to harm your device • A security practice that involves regularly updating software and systems. • ...
Reporting cyber crime 2022-05-18
5 Clues: Report@_______.gov.uk • fraud can also be reported to ____ • Report computer fraud to the ______ • ____ to National Cyber Security Centre • Received a ____ text? Forward to 7726 (free)
Protect the House for the Holidays 2025-11-04
Across
- Think before you do it
- Digital shield
- What we feel this season
- Our community
- Campus tech backbone
- What we do for each other
- Key to cyber safety
- How we keep our systems
Down
- Holiday inbox trick
- Campus leaders
- Central Morehouse value
- Spirit color of the House
- Cyber training hub
- Before you click
- Strength of our community
- Protect it wherever you take it
- Where you find tools and training
- Campus champions
- The heart of our mission
19 Clues: Our community • Campus leaders • Digital shield • Before you click • Campus champions • Cyber training hub • Holiday inbox trick • Key to cyber safety • Campus tech backbone • Think before you do it • Central Morehouse value • How we keep our systems • What we feel this season • The heart of our mission • Spirit color of the House • Strength of our community • What we do for each other • ...
Reporting cyber crime 2022-05-18
5 Clues: Report@_______.gov.uk • fraud can also be reported to ____ • Report computer fraud to the ______ • ____ to National Cyber Security Centre • Received a ____ text? Forward to 7726 (free)
Reporting cyber crime v2 2022-05-23
5 Clues: Report@______.gov.uk • fraud can also be reported to _____ • report computer fraud to the ______ • ____ to National Cyber Security Centre • received a ____ text? Forward to 7726 (free)
Cyber Security Crossword 2023-05-13
Across
- a type of security that uses our unique features to secure our systems, such as fingerprint or voice
- when someone pretends to be someone they are not to steal personal information
- a type of malware that infects and damages computers
- someone who gains access to a computer system through unconventional means
Down
- a type of scam normally done by email or text message, usually impersonating a company or bank
- a combination of letters, numbers and symbols we use to gain access to computer systems
- a piece of malware that pretends to be another piece of software to trick you into downloading and installing it
7 Clues: a type of malware that infects and damages computers • someone who gains access to a computer system through unconventional means • when someone pretends to be someone they are not to steal personal information • a combination of letters, numbers and symbols we use to gain access to computer systems • ...
cyber security threat 2023-07-21
7 Clues: : _______ yourself • : Caution in _____ • : Use strong ______ • Enable 2 Factor _______ • : Secure your home _____ • : Regularly back up your ______ • : Be cautious of ______ attempts
Inside the ransomware playbook 2024-10-25
Across
- - Notorious group known for exploiting vulnerabilities for profit
- - The tool of choice for a thief who likes to play hide and seek
- - The process of scrambling information to keep it secret
- - The principle of limiting access based on user needs
- - Protocol used for authentication in Microsoft networks
Down
- - Crafty crew that snatches your secrets without a sword
- - Ritual of sharpening defenses to keep the bad guys at bay
- - Structured guide that outlines how to respond to threats
- - Secretive moves of an attacker, often hidden in plain sight
- - The secret playbook of cyber mischief-makers
- - Legendary flaw that opens doors without knocking
- - Ransomware tactic that involves manipulating security software
12 Clues: - The secret playbook of cyber mischief-makers • - Legendary flaw that opens doors without knocking • - The principle of limiting access based on user needs • - Crafty crew that snatches your secrets without a sword • - Protocol used for authentication in Microsoft networks • - The process of scrambling information to keep it secret • ...
