cyber security Crossword Puzzles

cyber crime 2024-11-07

cyber crime crossword puzzle
Across
  1. - A secret string of characters used for authentication.
  2. - Part of the internet that requires special software to access, often associated with illicit activities.
  3. - Server that acts as an intermediary for requests from clients seeking resources from other servers.
  4. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  5. - Engineering technique that tricks people into giving away confidential information.
  6. - Collection of computers and devices connected for communication and resource sharing.
  7. - Technique of disguising communication from an unknown source as being from a known, trusted source.
  8. - Software update to fix bugs or vulnerabilities (same as Across).
  9. - A security system that controls incoming and outgoing network traffic.
  10. - A deceptive scheme intended to cheat or defraud someone.
Down
  1. - Person who gains unauthorized access to computer systems.
  2. - Software that gathers information from a computer without permission.
  3. - A software update that fixes vulnerabilities or improves functionality.
  4. - A software tool designed to take advantage of a security flaw.
  5. - Money demanded by hackers in exchange for access to compromised data.
  6. - Software that automatically displays or downloads advertising material.
  7. - Malicious software that gives unauthorized access to a computer system.
  8. - Malicious code that infects computer files and spreads to others.
  9. - A type of malware that spreads copies of itself across networks.
  10. - Prefix related to computers or computer networks.

20 Clues: - Prefix related to computers or computer networks.- A secret string of characters used for authentication.- A deceptive scheme intended to cheat or defraud someone.- Person who gains unauthorized access to computer systems.- A software tool designed to take advantage of a security flaw....

Security 2022-03-27

Security crossword puzzle
Across
  1. Is a database of computers, users, and services.
  2. Ensures the integrity of a message.
  3. A type of asset for an organization.
  4. Software developed by cybercriminals to perform malicious acts.
  5. Type of malware where communications are intercepted.
  6. This needs to be done to your computer when it's left unattended.
  7. Using this method is a way to protect data.
  8. Type of malware where a removable device is left in a public place for someone to use and infect their machine.
  9. A feature that detects phishing websites.
  10. In order to use this feature in Windows, TPM must be enabled.
  11. Typically distributed by downloading online software.
Down
  1. This needed to be updated in order for its anti-malware software to work.
  2. A mode that allows users to browse the web anonymously.
  3. A set of objectives to ensure the security of a network.
  4. Type of malware where the attacker alters packet contents.
  5. Is a type of lock in Windows that needs a pre-paired device.
  6. Pretending to need personal information to confirm someone's identity.
  7. This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
  8. Prevents unwanted traffic from going into internal networks.
  9. The most common type of computer malware.
  10. Can be found in high-security environments.
  11. A type of lock that needs a key that is separate from the door handle.

22 Clues: Ensures the integrity of a message.A type of asset for an organization.The most common type of computer malware.A feature that detects phishing websites.Using this method is a way to protect data.Can be found in high-security environments.Is a database of computers, users, and services.Type of malware where communications are intercepted....

Security 2022-02-08

Security crossword puzzle
Across
  1. I copy traffic for you to safely inspect. (6,9)
  2. If you look at me you can find out "who did what, where, and when". (5,5,4)
  3. You're not alone and this approach helps reduce risk and cost. (6)
  4. Enterprise way to adopt a Zero trust approach. (6,4)
  5. Use me to prevent unwanted traffic reaching your VMs. (8)
  6. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  7. Use me to classify your data. (5,3)
  8. I provide insights into your security posture. Acronym(3)
  9. De-identification technique. (16)
  10. I detect network based threats. (5,3)
  11. Do you trust that container image? (6,4)
  12. Trust no one. (4,5)
  13. Using me allows you to implment the principle of least privilege. Acronym (3)
Down
  1. I can tell you when you need to reduce permissions. (11)
  2. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  3. Apply multiple layers of securty. (7,2,5)
  4. Use me to mitigate OWASP top 10 risks. (5,5)
  5. Needs to be kept secret. (12)
  6. If you use me you do not need a VPN. Acronym(3)
  7. You can find me at rest or on the move (in-transit). (10)
  8. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
  9. Use me to manage keys outside of Google Cloud. Acronym (3)

22 Clues: Trust no one. (4,5)Needs to be kept secret. (12)De-identification technique. (16)Use me to classify your data. (5,3)I detect network based threats. (5,3)Do you trust that container image? (6,4)Apply multiple layers of securty. (7,2,5)Use me to mitigate OWASP top 10 risks. (5,5)I copy traffic for you to safely inspect. (6,9)...

Security 2024-10-25

Security crossword puzzle
Across
  1. 5
  2. 16
  3. 19
  4. 12
  5. 2
  6. 9
  7. 1
  8. 7
  9. 4
  10. 13
Down
  1. 20
  2. 15
  3. 11
  4. 8
  5. 10
  6. 3
  7. 14
  8. 6
  9. 18
  10. 17

20 Clues: 5832961742015111619101214181713

Security 2026-01-12

Security crossword puzzle
Across
  1. A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  2. An individual who uses computers, networking, or other skills to overcome a technical problem, often used in the context of someone who gains unauthorized access to systems.
  3. The act of disguising communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, websites, etc.
  4. A list of entities approved for authorized access or privileged membership in cyberspace often contrasted with blacklist which identifies entities denied access privileges
  5. A number of Internet-connected devices, each running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS), steal data, send spam, and allow the attacker to access the device and its connection.
  6. An incident where data is unintentionally exposed in a vulnerable system or stolen outright.
  7. A piece of software, chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
  8. In cybersecurity context, this refers to any physical device used for security purposes like authentication tokens which store digital credentials for logging into systems securely.
  9. A type of malware that misleads users of its true intent, often disguised as legitimate software.
  10. A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  11. A function that converts an input (or 'message') into a fixed-length string of bytes. Hash functions are used in various applications including digital signatures and password storage.
  12. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  13. Virtual Private Network; extends a private network across public networks like the Internet enabling users to send and receive data as if their devices were directly connected to the private network while benefiting from its functionality and security policies.
  14. A collection of software tools that enable an unauthorized user to gain control over a computer system without being detected.
  15. The process of converting information or data into a code to prevent unauthorized access.
  16. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources in an information system.
Down
  1. The act of intercepting and monitoring traffic passing through a digital network.
  2. A type of attack where the attacker supplies untrusted input into a program. This input is then processed by an interpreter as part of a command or query thereby altering the course of execution of the program.
  3. The isolation of data files suspected of being infected with malware so they cannot harm your system while you decide whether they should be deleted.
  4. Distributed Denial of Service; an attack meant to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic from multiple sources.
  5. A method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (root access) on a computer system, network, or software application.
  6. Secure Sockets Layer / Transport Layer Security; cryptographic protocols designed to provide communications security over a computer network.
  7. An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
  8. Malicious software designed to block access to a computer system until a sum of money is paid.
  9. An intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your needs.
  10. A piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs.
  11. The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communications.
  12. A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
  13. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  14. Criminal activities carried out by means of computers or the Internet.
  15. A standalone malware computer program that replicates itself in order to spread to other computers.
  16. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  17. Multi-Factor Authentication; an authentication method that requires two or more independent credentials for more secure verification.

33 Clues: Criminal activities carried out by means of computers or the Internet.The act of intercepting and monitoring traffic passing through a digital network.The process of converting information or data into a code to prevent unauthorized access.An incident where data is unintentionally exposed in a vulnerable system or stolen outright....

Security 2022-04-13

Security crossword puzzle
Across
  1. Stun something
  2. What Chickens have
  3. Like a gun
  4. Rabbit
  5. You go ___ and you hit a strike
  6. Nighttime star.
  7. An animal that can swim underwater and can kill.
  8. Something to stun with flash or have an everlasting memory.
  9. 2 best____ in a room
  10. NNNNEEEEEEEEEEDS repair
  11. More Small people.
  12. Oppisite of Life
  13. Something you need to buy to get into a movie.
  14. Needs Repair.
  15. An animal
Down
  1. A light that u can turn off and on
  2. Bunny
  3. Oppisite of Dark
  4. A star in the day.
  5. Oppisite of Dull
  6. What a wolf has
  7. Oppisite of Death
  8. What rich people have.
  9. A break in
  10. I ___ in the challange
  11. You get back at someone
  12. an animal that can kill you and is sometimes brown.
  13. A red animal
  14. A small person.
  15. You ____ a child
  16. Something you need to see with

31 Clues: BunnyRabbitAn animalLike a gunA break inA red animalNeeds Repair.Stun somethingNighttime star.What a wolf hasA small person.Oppisite of DarkOppisite of DullYou ____ a childOppisite of LifeOppisite of DeathWhat Chickens haveA star in the day.More Small people.2 best____ in a roomWhat rich people have.I ___ in the challangeYou get back at someone...

Security 2017-08-20

Security crossword puzzle
Across
  1. Second highest principal in SQL Server.
  2. Turned off when a database is attached
  3. Not NTLM
  4. Not even the sysadmin's can see this data.
  5. aXXX@XXXX.com
  6. Protocol used when connecting from the server SQL is on.
  7. Pretending to be someone else
  8. One SQL instance talking to another.
  9. Security trump
  10. Contains 0 or more windows users.
  11. Uses the private key to encrypt and decrypt data.
  12. Used to contain a windows id and password.
Down
  1. Add a permission
  2. Permission required to create stored procedures.
  3. Required for all encryption in SQL Server
  4. One way encryption.
  5. This database is isolated from other databases.
  6. Used to add a John Hancock to a stored procedure.
  7. Workstation-Server-Server
  8. Alias for a credential
  9. Uses both a public and private key.
  10. Bobby
  11. Add random data to the string before encrypting it.
  12. Principal that contains other principals.
  13. Check who did what

25 Clues: BobbyNot NTLMaXXX@XXXX.comSecurity trumpAdd a permissionCheck who did whatOne way encryption.Alias for a credentialWorkstation-Server-ServerPretending to be someone elseContains 0 or more windows users.Uses both a public and private key.One SQL instance talking to another.Turned off when a database is attachedSecond highest principal in SQL Server....

Security 2013-08-04

Security crossword puzzle
Across
  1. An offence that can be summary or indictable?
  2. Section 494 of the Criminal Code of Canada deals with ________ arrest authority?
  3. When a person does not leave, after directed to do so, the person would considered to be __________
  4. Touch someone without consent, Intentionally, either directly or indirectly
  5. What does 10-4 mean?
  6. Surveillance from a place hidden from view is what type of Surveillance?
  7. Evidence of prior bad acts is __________ __________ evidence (2 words)
  8. A minor offence under the Criminal Code of Canada
  9. Without colour of right if you convert something to your own use it is considered ______?
  10. __________________ Laws are also called By-laws
  11. Level of Government that operates the OPP?
  12. A witness on the stand is giving what type of evidence?
  13. PIPEDA is a __________ act
  14. who's responsibility is safety in the workplace?
  15. a wrong against society
Down
  1. Under the Criminal Code of Canada the offence when a fire is deliberately set?
  2. a serious offernce
  3. section 10 of the Charter of Rights and Freedoms deals with rights upon ___________
  4. Fingerprints, Hair Samples, and Mineral Samples are considered what type of evidence?
  5. what does "Z" stand for in the Phonetic Alphabet?
  6. Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
  7. Class C fires involve _______________ equipment
  8. only the police can _______________
  9. term for evidence that is allowed in a trail or hearing
  10. A trail within a trail
  11. Who determines what evidence will be allowed in court?
  12. The act that regulates security guards in Ontario?
  13. all security guards shall act with honesty and ____________
  14. The police officers are __________ officers
  15. under the LLA (Liquor License Act) you can not arrest, you can only ____________

30 Clues: a serious offernceWhat does 10-4 mean?A trail within a traila wrong against societyPIPEDA is a __________ actonly the police can _______________Level of Government that operates the OPP?The police officers are __________ officersAn offence that can be summary or indictable?Class C fires involve _______________ equipment...

security 2023-02-27

security crossword puzzle
Across
  1. Interazione online ostile che comporta messaggi di insulto tra gli utenti
  2. Quella a 2 fattori è un tipo di ....... forte
  3. Simile a una password, ma generalmente più lunga per una maggiore sicurezza
  4. Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
  5. L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
  6. Una persona che prende o usa le informazioni del vostro computer
  7. Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
  8. Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
  9. Malware che si replica per diffondersi ad altri computer della rete
  10. Programma che registra i tasti premuti da un utente
  11. Genera e memorizza in modo sicuro password complesse in un unico luogo
Down
  1. Non aprire se non ci si fida del mittente
  2. Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
  3. Il computer avrà molti popup se ne viene infettato
  4. Una delle password più comuni nel 2022: un evergreen!
  5. L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
  6. _________ sempre il computer quando si lascia la scrivania
  7. Quando i criminali usano gli sms fake stanno cercando di fare….
  8. Un programma software progettato per prevenire i virus
  9. Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
  10. Chiamate o messaggi vocali fraudolenti

21 Clues: Chiamate o messaggi vocali fraudolentiNon aprire se non ci si fida del mittenteQuella a 2 fattori è un tipo di ....... forteIl computer avrà molti popup se ne viene infettatoProgramma che registra i tasti premuti da un utenteUna delle password più comuni nel 2022: un evergreen!Un programma software progettato per prevenire i virus...

Security 2025-08-14

Security crossword puzzle
Across
  1. A secret word or phrase used to gain access to an account
  2. Granted official permission to access or manage an account
  3. A feature that confirms client identity using a mobile app (two words)
  4. A person permitted to act on behalf of the account owner
  5. Consent given to perform specific actions
  6. Signs of suspicious or potentially fraudulent activity (two words)
  7. A method of verifying identity using vocal characteristics (two words)
  8. The ability to log into and manage an account via the internet (two words)
  9. Ability to access account online when security Q&A status is locked (two words)
  10. Someone other than the account owner involved in a call or transaction (two words)
Down
  1. Authorized access or actions on an account.
  2. Notifications or warnings about significant account activity or potential security concerns
  3. Actions intended to fraudulently gain unauthorized access to
  4. Abbreviation for Additional Security Questions
  5. How many attempts do callers have to pass decedent security
  6. The process of identifying and resolving system or device issues (two words)
  7. The careful and thorough evaluation of potential risks and issues (two words)
  8. An electronic tool used to access accounts, such as a phone or computer (two words)
  9. A confidential code used to confirm identity and enable access
  10. personal prompts used to verify identity during login (two words)
  11. A unique identifier used to access an account
  12. Cues or hints provided to assist in answering security questions

22 Clues: Consent given to perform specific actionsAuthorized access or actions on an account.A unique identifier used to access an accountAbbreviation for Additional Security QuestionsA person permitted to act on behalf of the account ownerA secret word or phrase used to gain access to an accountGranted official permission to access or manage an account...

Cyber 2022-10-15

Cyber crossword puzzle
Across
  1. Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
  2. If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
  3. a type of software designed to help the user's computer detect viruses and avoid them.
  4. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
  5. (main objective of Cyber Security?)
Down
  1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
  2. (main objective of Cyber Security?)
  3. world’s very first antivirus program?
  4. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
  5. Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
  6. the hackers who's main motive is to gain financial profit by doing cyber crimes.
  7. DNS would translate any Domain name into ___________.
  8. (main objective of Cyber Security?)

13 Clues: (main objective of Cyber Security?)(main objective of Cyber Security?)(main objective of Cyber Security?)world’s very first antivirus program?DNS would translate any Domain name into ___________.the hackers who's main motive is to gain financial profit by doing cyber crimes....

Cyber Security 2018-09-20

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2021-11-03

cyber security crossword puzzle
Across
  1. when someone you via email
  2. a virus indside something like an email
Down
  1. someone getting your details with no one knowing
  2. a word that keeps your computer safe
  3. something someones sent to you by someone looking for attention

5 Clues: when someone you via emaila word that keeps your computer safea virus indside something like an emailsomeone getting your details with no one knowingsomething someones sent to you by someone looking for attention

Cyber Security 2023-09-15

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2023-09-13

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2020-10-19

Cyber Security crossword puzzle
Across
  1. the process of encoding information.
  2. malware on your computer when it is not secured.
  3. the program and other operating information used by computers.
Down
  1. a device we use in our daily life. (hint: it ends with an R)
  2. something that protects our device from unauthorized access.

5 Clues: the process of encoding information.malware on your computer when it is not secured.a device we use in our daily life. (hint: it ends with an R)something that protects our device from unauthorized access.the program and other operating information used by computers.

Cyber Security 2020-08-24

Cyber Security crossword puzzle
Across
  1. es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
  2. es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
  1. son pequeños archivos que algunos sitios web guardan en tu ordenador. Las cookies almacenan información sobre tí, como nombre de usuario o información de registro, o preferencias de usuario, pero no espían, como el spyware.
  2. son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
  3. es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.

5 Clues: es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador....

Cyber security 2024-09-07

Cyber security crossword puzzle
Across
  1. a kind of malware demands for ransom
  2. deceive revealing personal info via emails
  3. Voice based phishing
Down
  1. injects viruses, Trojan’s
  2. fraudulent text messages

5 Clues: Voice based phishingfraudulent text messagesinjects viruses, Trojan’sa kind of malware demands for ransomdeceive revealing personal info via emails

Cyber security 2024-03-18

Cyber security crossword puzzle
Across
  1. Protected from or not exposed to danger or risk
  2. A fault or flaw in a computer program
  3. Look over a machine or system to detect potential vulnerabilities.
Down
  1. A complex system of interconnected elements
  2. Irrelevant or unsolicited messages sent over the Internet.

5 Clues: A fault or flaw in a computer programA complex system of interconnected elementsProtected from or not exposed to danger or riskIrrelevant or unsolicited messages sent over the Internet.Look over a machine or system to detect potential vulnerabilities.

CYBER SECURITY 2024-08-19

CYBER SECURITY crossword puzzle
Across
  1. taking away confidential information
  2. a secret word
  3. software used to prevent virus
Down
  1. malicious software or malware
  2. network that connects computers

5 Clues: a secret wordmalicious software or malwaresoftware used to prevent virusnetwork that connects computerstaking away confidential information

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

Cybersecurity Ethics, Laws & Standards 2025-10-09

Cybersecurity Ethics, Laws & Standards crossword puzzle
Across
  1. unauthorized access to computer systems
  2. moral principles that govern a person's behavior or actions
  3. policy that defines proper and improper use of technology and networks
  4. process of converting data into a code to prevent unauthorized access
  5. copies of data stored separately for recovery in case of loss
  6. using someone else's work without giving proper credit
  7. law that protects sensitive health information
  8. coordinates international cybercrime investigations
  9. security process requiring two separate forms of identification
  10. online platforms for sharing content and communication
  11. software designed to damage or disrupt a computer system
  12. legal right that grants the creator control over their work
  13. network security system that monitors and controls incoming and outgoing traffic
Down
  1. criminal activity carried out using computers or the internet
  2. trail of data created by a person’s online activity
  3. software that secretly monitors user activity
  4. option that controls who can see your online information
  5. protects us critical infrastructure from cyber threats
  6. deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
  7. unauthorized access and release of confidential information
  8. using digital technology to harass or intimidate someone
  9. crime of obtaining someone’s personal information to commit fraud
  10. manipulating people to give up confidential information
  11. study of ethical issues surrounding computer use
  12. protects student education records and data
  13. a secret word or phrase used to gain access to a system
  14. software designed to detect and remove malicious programs
  15. malware that locks users out of their files until a payment is made
  16. update to software that fixes vulnerabilities or bugs
  17. proper and respectful behavior when communicating online
  18. practices and steps taken to maintain system health and improve security
  19. internet crime complaint center that accepts and investigates online crime reports

32 Clues: unauthorized access to computer systemsprotects student education records and datasoftware that secretly monitors user activitylaw that protects sensitive health informationstudy of ethical issues surrounding computer usetrail of data created by a person’s online activitycoordinates international cybercrime investigations...

Quiet their watching you.... 2023-07-16

Quiet their watching you.... crossword puzzle
Across
  1. Breach Result of a hacker breaking into a system
  2. Attack an attempt to breach a security boundary
  3. method of connecting a series of computers
  4. malware used to spy on your computer activities
  5. Horse computer program that looks innocent
  6. video or audio that has been altered
  7. document storage
  8. Where a hacker poses as legitimate business
  9. When someone is tricked into clicking on one object when they want to click on another
  10. Test commonly referred to as a Pen Test
  11. collection of programs that allow hackers to access a computer
Down
  1. system to shield against viruses
  2. document storage
  3. Malware that highjacks your system
  4. Apps that instruct a computer to carry out a task
  5. process of identifying a users identity
  6. Black Hat Tool
  7. When a hacker changes the IP address that comes from a trusted source
  8. Malware that can reproduce itself
  9. Address Pretty much anything connected to the internet

20 Clues: Black Hat Tooldocument storagedocument storagesystem to shield against virusesMalware that can reproduce itselfMalware that highjacks your systemvideo or audio that has been alteredprocess of identifying a users identityTest commonly referred to as a Pen Testmethod of connecting a series of computersWhere a hacker poses as legitimate business...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. A fake email that tricks you into giving personal info
  2. Breaking a system's security to test or exploit it
  3. Pretending to be someone else online
  4. A small file that tracks your website activity
  5. Taking someone else's work without credit
  6. type of malware that is designed to spy on user activity.
  7. The unauthorize use of copyrighted content
  8. The trail of data you leave online
Down
  1. The method of verifying your identity.
  2. Prevents unauthorized access to or from a private network
  3. Stealing and using someone else's online identity
  4. Legal protection for original digital content
  5. Makes judgement on cyber crimes.
  6. A secret combination of characters that protects your account
  7. Software that protects against malicious programs
  8. Unwanted, irrelevant messages sent over internet, usually advertising or phishing.

16 Clues: Makes judgement on cyber crimes.The trail of data you leave onlinePretending to be someone else onlineThe method of verifying your identity.Taking someone else's work without creditThe unauthorize use of copyrighted contentLegal protection for original digital contentA small file that tracks your website activity...

Security 2012-11-03

Security crossword puzzle
Across
  1. A trojan appears to be __________ at first site
  2. There are 8/9 different _____________ in the DPA
  3. of the first worms was called the ______ worm
  4. A good password should contain symbols, numbers, uppercase and ____________letters
  5. The only way to ensure you never get malware on your computer is to ______ the internet cable
  6. __________ in emails can contain viruses
  7. Religion and medical records are considered ______________ information
  8. A ____________ examines all the network traffic coming in and going out of your computer
  9. __________ is the process of making an exact copy of the contents of a HD
Down
  1. Malware intended to steal important personal information
  2. The DPA states that business should ________ data once they no longer need it
  3. To prevent loss of data one needs to ___________ frequently
  4. Before accessing an account one needs to enter a _________ and password
  5. To protect yourself from malware you need to install an ____________
  6. The Data ________ Act regulates the use of data for all businesses
  7. A copy of important data should be kept in an ________ location
  8. One should never follow links sent by _______________ or unknown sources
  9. The act of accessing another person's computer without permission
  10. Dropbox is an ___________ storage site
  11. A malicious software that spreads with the intention of corrupting or deleting files
  12. Passwords should always be kept ______

21 Clues: Dropbox is an ___________ storage sitePasswords should always be kept ________________ in emails can contain virusesof the first worms was called the ______ wormA trojan appears to be __________ at first siteThere are 8/9 different _____________ in the DPAMalware intended to steal important personal information...

Security 2012-11-03

Security crossword puzzle
Across
  1. A good password should contain symbols, numbers, uppercase and ____________letters
  2. One should never follow links sent by _______________ or unknown sources
  3. Before accessing an account one needs to enter a _________ and password
  4. one of the first worms was called the ______ worm
  5. Religion and medical records are considered ______________ information
  6. Malware intended to steal important personal information
  7. A copy of important data should be kept in an ________ location
Down
  1. __________ in emails can contain viruses
  2. A ____________ examines all the network traffic coming in and going out of your computer
  3. A malicious software that spreads with the intention of corrupting or deleting files
  4. __________ is the process of making an exact copy of the contents of a HD
  5. The act of accessing another person's computer without permission
  6. The Data ________ Act regulates the use of data for all businesses
  7. There are 8/9 different _____________ in the DPA
  8. A trojan appears to be __________ at first site
  9. Passwords should always be kept ______
  10. To protect yourself from malware you need to install an ____________
  11. The only way to ensure you never get malware on your computer is to ______ the internet cable
  12. The DPA states that business should ________ data once they no longer need it
  13. Dropbox is an ___________ storage site
  14. To prevent loss of data one needs to ___________ frequently

21 Clues: Passwords should always be kept ______Dropbox is an ___________ storage site__________ in emails can contain virusesA trojan appears to be __________ at first siteThere are 8/9 different _____________ in the DPAone of the first worms was called the ______ wormMalware intended to steal important personal information...

Security 2013-06-27

Security crossword puzzle
Across
  1. Stick to what path when in the freight yard?
  2. Your MSIC must be above what?
  3. What does the I stand for in MSIC?
  4. What type of industry are we in?
  5. What colour should drivers follow in the freight yard on the way in?
  6. What is the name of the contractor company for security?
  7. What lights must be on when in the freight yard?
  8. What channel do you call for Security?
  9. What must a non MSIC holder have whilst in the LRZ?
  10. What does the L stand for in LRZ?
  11. A non MSIC holder must also have what for access into the LRZ?
Down
  1. Who must you radio to have the vehicle booth gates opened/closed?
  2. Who has the final say when allowing freight to enter the yard?
  3. What does the T stand for in OTS?
  4. What need must you have to request an MSIC?
  5. What must you display in the LRZ?
  6. What is your base channel when receiving radio calls?
  7. Who takes passengers on/off via the buggy?
  8. What is the code number for a Firearm?
  9. What is Angela’s title other than Manager?

20 Clues: Your MSIC must be above what?What type of industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the L stand for in LRZ?What does the I stand for in MSIC?What channel do you call for Security?What is the code number for a Firearm?Who takes passengers on/off via the buggy?...

Security 2026-03-12

Security crossword puzzle
Across
  1. Pretty Good Privacy encryption tool (abbr.)
  2. Command to change password aging information
  3. Virtual Private Network (abbr.)
  4. Malicious software that remains hidden in the system
  5. Secure Hash Algorithm family (abbr.)
  6. MIT authentication system that uses tickets
  7. Command to run programs with elevated privileges
  8. Hash function vulnerable to collisions (abbr.)
  9. Secure remote login protocol on port 22 (abbr.)
  10. Successor to SSL for secure communications (abbr.)
  11. Boot loader that can be password protected
Down
  1. Multi-layer security strategy (defense in depth)
  2. Turing test to distinguish humans from computers
  3. Multi-_____ authentication (6 letters)
  4. Linux packet filtering firewall tool
  5. File /etc/______ that stores user account information
  6. Pseudo-device driver for generating random numbers
  7. Security triad; Confidentiality, Integrity, Availability (abbr.)
  8. Advanced Encryption Standard (abbr.)
  9. Centralized logging daemon

20 Clues: Centralized logging daemonVirtual Private Network (abbr.)Linux packet filtering firewall toolSecure Hash Algorithm family (abbr.)Advanced Encryption Standard (abbr.)Multi-_____ authentication (6 letters)Boot loader that can be password protectedPretty Good Privacy encryption tool (abbr.)MIT authentication system that uses tickets...

Principles of Medical Informatics Ethics 2024-02-22

Principles of Medical Informatics Ethics crossword puzzle
Across
  1. Obtaining permission from someone before the use of their personal data.
  2. The clinician's moral obligation to act solely for the benefit of the patient.
  3. The process of safeguarding private patient information.
Down
  1. The process of transforming any given key or a string of characters into another value.
  2. A core duty in medical practice that ensures patient privacy.
  3. Cyber security measures are designed to protect ______ from attack.
  4. Entails the procedures and processes by which one party justifies and takes responsibility for its activities.

7 Clues: The process of safeguarding private patient information.A core duty in medical practice that ensures patient privacy.Cyber security measures are designed to protect ______ from attack.Obtaining permission from someone before the use of their personal data.The clinician's moral obligation to act solely for the benefit of the patient....

October Crossword - Cyber Security 2022-02-07

October Crossword - Cyber Security crossword puzzle
Across
  1. software designed to prevent, detect, and remove malware
  2. cyberattack that tries already compromised usernames and passwords in other sites
  3. username and ... should be complex
  4. any crime committed electronically
  5. pretending to be someone and accessing their information
Down
  1. fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
  2. ensures that you are the only one who has access to your account
  3. campaign launched in 2010 by the Department of Homeland Security
  4. any software intended to damage, disable, or give someone unauthorized access
  5. agency that informs and educates about cybersecurity

10 Clues: username and ... should be complexany crime committed electronicallyagency that informs and educates about cybersecuritysoftware designed to prevent, detect, and remove malwarepretending to be someone and accessing their informationensures that you are the only one who has access to your account...

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  2. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
  3. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  4. They are software programs created to automatically perform specific operations
  5. It is a string of characters used to verify the identity of a user during the authentication process.
  6. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
  1. It is a global system of interconnected computer networks
  2. It is a type of malware that functions by spying on user activity without their knowledge.
  3. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. It is a type of malware that automatically delivers advertisements.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malware that automatically delivers advertisements.
  2. They are software programs created to automatically perform specific operations
  3. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
  4. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  5. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
  1. It is a global system of interconnected computer networks
  2. It is a string of characters used to verify the identity of a user during the authentication process.
  3. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  4. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  5. It is a type of malware that functions by spying on user activity without their knowledge.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

pocketsiem's cyber security crossword 2023-04-27

pocketsiem's cyber security crossword crossword puzzle
Across
  1. Malicious software that is designed to cause damage to a computer system
  2. A type of attack where the attacker attempts to guess a user's password
  3. A type of software that is designed to prevent unauthorized access to a computer system
  4. A network of compromised computers that can be used to carry out attacks
  5. A program that monitors and controls incoming and outgoing network traffic
  6. A type of attack that involves taking control of a computer or device and demanding payment for its release
  7. The practice of tricking someone into giving away sensitive information
  8. The act of finding vulnerabilities in computer systems in order to exploit them
Down
  1. The practice of using deception to trick someone into revealing sensitive information
  2. A type of encryption that uses two keys: one for encryption and one for decryption
  3. A method of verifying a user's identity through a combination of something they know, have, and are

11 Clues: A type of attack where the attacker attempts to guess a user's passwordThe practice of tricking someone into giving away sensitive informationMalicious software that is designed to cause damage to a computer systemA network of compromised computers that can be used to carry out attacks...

BT 2021-07-21

BT crossword puzzle
Across
  1. Australian government policy used to protect systems and information for cyber threats
  2. the maximum amount of megabytes than can be sent via Defence email
  3. Spills Something you want to prevent/avoid in order to maintain your security responsibilites
  4. one of the main software applications used by Defence members, particularly PCS
  5. The manual which describes the policies and roles and responsibilities of Defence personnel while using ICT
  6. The DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)
Down
  1. The equipment and resources that support Defence employees in the conduct of their business
  2. the main form of electronic communication used by Defence members
  3. The framework used by Defence to define protective security policies and procedures

9 Clues: the main form of electronic communication used by Defence membersthe maximum amount of megabytes than can be sent via Defence emailone of the main software applications used by Defence members, particularly PCSThe DPN and DSN System User Acceptable Usage Standard Operating Procedures (abbr)...

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. errors in someone's code or program
  2. technology that that aids in gathering information
Down
  1. computer program that replicates itself in order to spread to other computers
  2. allows a cyber security attacker to take control
  3. someone who seeks and exploits weaknesses in a computer system

5 Clues: errors in someone's code or programallows a cyber security attacker to take controltechnology that that aids in gathering informationsomeone who seeks and exploits weaknesses in a computer systemcomputer program that replicates itself in order to spread to other computers

Cyber Security 2021-06-06

Cyber Security crossword puzzle
Across
  1. The internet is _______.
  2. Don't put ________information online.
  3. Don't forget about smart _____ safety.
Down
  1. Handle hacking _____________.
  2. If you get hacked, change your ________.

5 Clues: The internet is _______.Handle hacking _____________.Don't put ________information online.Don't forget about smart _____ safety.If you get hacked, change your ________.

Cyber Security 2023-09-21

Cyber Security crossword puzzle
Across
  1. It is a way to scramble data so that only authorized parties can unscramble it.
  2. It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
Down
  1. It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
  2. It is a network security device that monitors traffic to or from your network
  3. It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.

5 Clues: It is a network security device that monitors traffic to or from your networkIt is a way to scramble data so that only authorized parties can unscramble it.It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication....

cyber security 2021-02-12

cyber security crossword puzzle
Across
  1. don't like roman
  2. come out in rain
  3. to remain safe
Down
  1. a type of malicious software
  2. not known or meant to be seen by others

5 Clues: to remain safedon't like romancome out in raina type of malicious softwarenot known or meant to be seen by others

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
  2. in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
Down
  1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. a malware which replicates it self eating your storage its harmless when it doesn't contain a virus
  3. is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

5 Clues: a malware which replicates it self eating your storage its harmless when it doesn't contain a virussoftware which is specifically designed to disrupt, damage, or gain authorized access to a computer system.is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm....

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. a wall or partition designed to do harm
  2. to fight a virus
Down
  1. A type of virus
  2. intending or intended to do harm.
  3. allows cyber security hackers to take control

5 Clues: A type of virusto fight a virusintending or intended to do harm.a wall or partition designed to do harmallows cyber security hackers to take control

cyber security 2021-11-05

cyber security crossword puzzle
Across
  1. you can type it but you can also use your face for it to work.
  2. this stops you accessing scam websites
  3. this is where someone is looking over your shoulders to try see your passwords
Down
  1. this is where someone sends a message on one of your friends devices
  2. when people disguise them selves as another trying to take advantage of you

5 Clues: this stops you accessing scam websitesyou can type it but you can also use your face for it to work.this is where someone sends a message on one of your friends deviceswhen people disguise them selves as another trying to take advantage of youthis is where someone is looking over your shoulders to try see your passwords

Security 2013-06-27

Security crossword puzzle
Across
  1. What is the code number for a Firearm?
  2. What colour should drivers follow in the freight yard on the way in?
  3. What does the T stand for in OTS?
  4. What is your base channel when receiving radio calls?
  5. What type of industry are we in?
  6. What is Angela’s title other than Manager?
  7. Who has the final say when allowing freight to enter the yard?
  8. Stick to what path when in the freight yard?
  9. A non MSIC holder must also have what for access into the LRZ?
Down
  1. What does the I stand for in MSIC?
  2. What lights must be on when in the freight yard?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. Who takes passengers on/off via the buggy?
  5. What need must you have to request an MSIC?
  6. What is the name of the contractor company for security?
  7. What does the L stand for in LRZ?
  8. What must a non MSIC holder have whilst in the LRZ?
  9. What must you display in the LRZ?
  10. Your MSIC must be above what?
  11. What channel do you call for Security?

20 Clues: Your MSIC must be above what?What type of industry are we in?What does the T stand for in OTS?What does the L stand for in LRZ?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?...

security 2013-05-09

security crossword puzzle
Across
  1. A NSF cheque in a court procedure is what type of evidence?
  2. A security guard should keep a good?
  3. Crossword
  4. Class B fires involve what type of liquids
  5. An offence under section 494 (1) ccc anyone can arrest found committing
  6. Security guards are ________ Peace Officers
  7. Under the Liquor License Act a security guard may only ______ a person
  8. 10-9 means?
  9. Section 8 of the Charter Of Rights deals with?
  10. What would go off in most buildings if there was a fire?
Down
  1. Who does the security guard answer to ultimately when on duty
  2. When a witness is on the stand they are giving what type of evidence?
  3. The Trespass to Property Act is?
  4. 10-3 means stop ?
  5. Once a security guard arrests a person they must contact?
  6. A criminal offence considered a minor offence
  7. Section 26 of the Criminal Code regulates the amount of?
  8. Who can report a security guard for code of conduct violation?
  9. The Criminal Code is a ________ act
  10. A fingerprint is what type of evidence?
  11. A gun is what type of evidence?

21 Clues: Crossword10-9 means?10-3 means stop ?A gun is what type of evidence?The Trespass to Property Act is?The Criminal Code is a ________ actA security guard should keep a good?A fingerprint is what type of evidence?Class B fires involve what type of liquidsSecurity guards are ________ Peace OfficersA criminal offence considered a minor offence...

Security 2025-03-31

Security crossword puzzle
Across
  1. Indicators of potential fraud or suspicious activity (two words)
  2. A secret word or phrase used to gain access to an account.
  3. A person authorized to act on behalf of the account owner
  4. A unique identifier used to log into an account
  5. The careful and thorough evaluation of potential risks and issues (two words)
  6. A feature that allows clients to verify their identity using a mobile app (two words)
  7. Authentication method using the client's voice (two words)
  8. Abbreviation for Additional Security Questions
  9. Someone other than the account owner involved in a call or transaction (two words)
  10. Consent given to perform specific actions
Down
  1. Granted official permission to access or manage an account
  2. The process of diagnosing and resolving technical issues (two words)
  3. An electronic tool used to access accounts, such as a phone or computer (two words)
  4. A secret code used to verify identity and grant access
  5. Permission granted to access or perform actions on an account
  6. Personal questions used to verify identity during authentication (two words)
  7. Deceptive actions intended to gain unauthorized access to assets
  8. The ability to log into and manage an account online (two words)
  9. Notifications or warnings about important account activities or security issues
  10. Providing guidance or hints to help someone answer questions

20 Clues: Consent given to perform specific actionsAbbreviation for Additional Security QuestionsA unique identifier used to log into an accountA secret code used to verify identity and grant accessA person authorized to act on behalf of the account ownerGranted official permission to access or manage an account...

SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) 2025-05-12

SkillScoop XI (Submit your answer: mailto:orange.businesscampus@orange.com?subject=Crossword 1) crossword puzzle
Across
  1. GDO
  2. TRAINING CAP
Down
  1. HAT
  2. SECURITY SETTINGS

4 Clues: GDOHATTRAINING CAPSECURITY SETTINGS

Browsing safety 2025-06-13

Browsing safety crossword puzzle
Across
  1. is any criminal activities intended to harm anyone using a computer and an internet connection . = Cybercrime
  2. A collection of technologies, process, and practices designed to protect network. = Cyber security
  3. _____ are like online thieves.= Cyber criminals
Down
  1. An illegal entry into a computer system or network. = Hacking
  2. Short form of vital information resources under seize.= Virus
  3. is act of sending an email to a user= phishing

6 Clues: is act of sending an email to a user= phishing_____ are like online thieves.= Cyber criminalsAn illegal entry into a computer system or network. = HackingShort form of vital information resources under seize.= VirusA collection of technologies, process, and practices designed to protect network. = Cyber security...

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Cyber Bullying Crossword Puzzle 2013-06-04

Cyber Bullying Crossword Puzzle crossword puzzle
Across
  1. Be ______ for your words and actions online.
  2. When cyber bullying, we should ______ the evidence as it will help in further investigation.
  3. cyber bullying can _______ people’s feeling.
  4. Cyber bullying is using the ______ or phone to repeatedly say rude and hurtful things about a person.
  5. Do not ________ or respond bad word to others.
Down
  1. Stop _________ people hurtful names.
  2. when you are being cyber bullied, ________ the incident.
  3. ________ means posting or sending a lot of unnecessary information.
  4. ___________ means online manners.
  5. _______ bullying is to bully others online.

10 Clues: ___________ means online manners.Stop _________ people hurtful names._______ bullying is to bully others online.cyber bullying can _______ people’s feeling.Be ______ for your words and actions online.Do not ________ or respond bad word to others.when you are being cyber bullied, ________ the incident....

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Cyber Security Awareness Month 2024-10-11

Cyber Security Awareness Month crossword puzzle
Across
  1. Software designed to detect and remove malware
  2. A form of malware that demands payment to restore access to data
  3. Malicious software that secretly monitors and collects personal information from a user’s device
  4. The practice of keeping personal and sensitive information secure from unauthorized access or disclosure
  5. The process of converting information into a secret code
Down
  1. A method of verifying a user’s identity using something they know, have, or are
  2. A software flaw that can be exploited by attackers
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A string of characters used to verify your identity online
  5. A scam where attackers trick you into giving personal information

10 Clues: Software designed to detect and remove malwareA software flaw that can be exploited by attackersThe process of converting information into a secret codeA string of characters used to verify your identity onlineA form of malware that demands payment to restore access to dataA scam where attackers trick you into giving personal information...

Introduction to Cyber Security 2025-04-04

Introduction to Cyber Security crossword puzzle
Across
  1. An attack that takes advantage of a previously unknown vulnerability in software or hardware before the vendor has released a patch or fix.
  2. The process of converting data into a code to prevent unauthorized access. Only those with the decryption key can access the original data.
  3. Short for "malicious software," malware refers to any software specifically designed to harm or exploit a computer, network, or device. Examples include viruses, worms, and ransomware.
  4. A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm.
  5. The manipulation or deception of individuals into divulging confidential information, often used in phishing and other types of attacks.
  6. A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, designed to block unauthorized access while permitting legitimate communication.
  2. The process of verifying the identity of a user, device, or system before granting access to resources. Common methods include passwords, biometrics, or multi-factor authentication (MFA).
  3. A type of social engineering attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.
  4. A cyberattack aimed at disrupting the normal operation of a network or server by overwhelming it with excessive traffic, causing it to become unavailable to legitimate users.

10 Clues: A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm....

Cyber Security Month Crossword! 2025-10-01

Cyber Security Month Crossword! crossword puzzle
Across
  1. A highly realistic video, image or audio clip generated by AI depicting someone saying or doing something that they didn't actually do
  2. A method of protecting data by encoding it to make it unreadable by unauthorised users
  3. A phishing attack that uses SMS instead of email
  4. A hacker pretending to be someone else to trick you into giving away money or information
  5. Malicious software that locks access to a computer until a ransom is paid
Down
  1. A relatively new cyberattack technique that injects malicious code within digital ads
  2. When a hacker gains access to a business email account to trick users into transferring money out of an organisation
  3. Kyogle Councils' email filtering and web security program
  4. A virtual private network that encrypts your data, preventing hackers from viewing it
  5. A cybersecurity method that protects your data by requiring more than one method of verifying your identity

10 Clues: A phishing attack that uses SMS instead of emailKyogle Councils' email filtering and web security programMalicious software that locks access to a computer until a ransom is paidA relatively new cyberattack technique that injects malicious code within digital adsA virtual private network that encrypts your data, preventing hackers from viewing it...

Starter task - Cyber Security 2021-07-14

Starter task - Cyber Security crossword puzzle
Across
  1. It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  2. This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
  3. It is a form of malware that essentially holds a computer system captive while demanding a ransom.
  4. They are software programs created to automatically perform specific operations
  5. It is a string of characters used to verify the identity of a user during the authentication process.
  6. a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
  1. It is a global system of interconnected computer networks
  2. It is a type of malware that functions by spying on user activity without their knowledge.
  3. It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. It is a type of malware that automatically delivers advertisements.

10 Clues: It is a global system of interconnected computer networksIt is a type of malware that automatically delivers advertisements.They are software programs created to automatically perform specific operationsIt is any kind of unwanted, unsolicited digital communication that gets sent out in bulk....

Cyber Security For Teenagers 2024-01-04

Cyber Security For Teenagers crossword puzzle
Across
  1. Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)
  2. Apabila menerima emel dari sumber yang tidak dikenali, lebih baik melakukan __________ dan periksa sebelum membuka lampiran atau mengklik pautan (8 huruf)
  3. Inisiatif yang melibatkan aktiviti menyelidik dan menganalisis untuk mencari kelemahan dalam sistem keselamatan siber (11 huruf)
  4. Keadaan di mana sesuatu peranti atau sistem tidak lagi berfungsi dengan baik akibat serangan atau masalah teknikal (5 huruf)
  5. Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)
  6. Inisiatif untuk mengajar remaja mengenai keselamatan siber dan etika dalam penggunaan teknologi (9 huruf)
Down
  1. Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)
  2. Bahagian penting dalam keselamatan siber; pastikan perisian sentiasa ________ untuk menghadapi ancaman terkini (7 huruf)
  3. Jenis serangan di mana penyerang cuba memperoleh maklumat peribadi melalui pertanyaan palsu atau manipulasi emosi (8 huruf)
  4. Untuk melindungi privasi, elakkan daripada memberikan maklumat peribadi di _________ sosial secara terbuka (5 huruf)

10 Clues: Peraturan yang penting bagi kata laluan: Jangan ber-________ dengan sesiapa(6 huruf)Jenis perisian yang membantu mengawal dan menyekat akses ke laman web tertentu (8 huruf)Program yang bertujuan untuk memerangi dan menghapuskan ancaman keselamatan siber (9 huruf)...

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

cyber security crossword puzzle 2026-02-27

cyber security crossword puzzle crossword puzzle
Across
  1. A security method that requires two different forms of verification to log in.
  2. A person who illegally gains access to computer systems.
  3. A deceptive method used to trick users into revealing personal information through fake emails or websites.
  4. The process of verifying a user’s identity before granting access.
Down
  1. Harmful software designed to damage or disrupt computer systems.
  2. A malicious program that spreads and infects other files or systems.
  3. The protection of personal and sensitive information from misuse.
  4. The process of converting information into secure code to protect it from unauthorized access.
  5. A security system that monitors and blocks unauthorized network access.
  6. A secret combination of characters used to access an account.

10 Clues: A person who illegally gains access to computer systems.A secret combination of characters used to access an account.Harmful software designed to damage or disrupt computer systems.The protection of personal and sensitive information from misuse.The process of verifying a user’s identity before granting access....

Cyber Security Crossword Puzzle 2026-03-23

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. "Creates a private, secure tunnel for your internet connection."
  2. A quick software update designed to fix a security vulnerability.
  3. A spare copy of files kept in case of data loss.
  4. "Using physical traits, like fingerprints, to verify your identity."
  5. A digital barrier that monitors and blocks unauthorized network traffic.
Down
  1. A long string of random words used as a secure password.
  2. Scrambles data so only authorized users can read it.
  3. "Disguising a communication to appear from a trusted, known source."
  4. Fake emails used to trick people into sharing private information.
  5. Harmful software designed to damage or gain access to a computer.

10 Clues: A spare copy of files kept in case of data loss.Scrambles data so only authorized users can read it.A long string of random words used as a secure password."Creates a private, secure tunnel for your internet connection."A quick software update designed to fix a security vulnerability.Harmful software designed to damage or gain access to a computer....

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

LJJ INAC Revision 2024-06-29

LJJ INAC Revision crossword puzzle
Across
  1. A type of assessment that should identify the likelihood and potential loss
  2. Vital control over the issue of invoices or orders
  3. A input control that data is correct eg £3.49 or 0<>10
  4. One of the few disadvantages of cloud accounting
  5. A level of management which formulates the long-term plans for the organisation
  6. Should be taken frequently and kept in a safe location
  7. Collection of humungous amounts of information, often for AI
  8. A type of data security which includes maintaining a log of all failed access attempts
  9. Physical security measure of computer system which includes the building
  10. A type of report which acts as an output control to ensure completeness and accuracy of processing
  11. A level of management which requires semi-detailed information from MIS
  12. Set of characters that can be allocated to a terminal, person or room, allowing access
  13. A general control over information systems which includes firewalls and anti-virus checkers
  14. Protection of internet-connected systems, including hardware, software and data
  15. One of the issues that may be problematic if data is held about individuals
  16. Perhaps one of the main advantages of a computerised system
Down
  1. The completeness and accuracy of data
  2. An advantage of computerisation when used as an aid to communication
  3. Information Technology
  4. Stand-by procedures, recovery procedures and management policies are essential parts of this plan
  5. Variety, velocity, veracity and ?
  6. A general control over information systems which includes procedures for program amendments
  7. Descriptive and diagnostic analytics provide historical information about ???
  8. A type of data security which includes periodic data protection audits of the computer systems
  9. A mnemonic to remember general controls over the environment within which a computer-based system operates
  10. The mnemonic which defines the characteristics of good information

26 Clues: Information TechnologyVariety, velocity, veracity and ?The completeness and accuracy of dataOne of the few disadvantages of cloud accountingVital control over the issue of invoices or ordersA input control that data is correct eg £3.49 or 0<>10Should be taken frequently and kept in a safe location...

Pesten 2016-02-19

Pesten crossword puzzle
Across
  1. Een gevolg van (cyber)pesten
  2. Op deze kanalen wordt heel vaak aan cyberpestenten gedaan
  3. Iemand met woorden pijn doen is ... pesten
  4. Een verregaand gevolg van (cyber)pesten
  5. Zoveel jongeren worden in Vlaanderen het slachtoffer van pesten
Down
  1. Het grote verschil tussen cyberpesten en gewoon pesten is dat cyberpesten meestal ... gebeurt
  2. Als je cyberpesten gaat aangeven, maak je best ... als bewijs
  3. (Cyber)pesten is strafbaar als het de vorm van ... aanneemt
  4. Iemand met opzet een ... sturen
  5. Iemand lichamelijk pijn doen is ... pesten
  6. Een andere naam voor cyberpesten
  7. De eerste stap om iets aan (cyber)pesten te doen

12 Clues: Een gevolg van (cyber)pestenIemand met opzet een ... sturenEen andere naam voor cyberpestenEen verregaand gevolg van (cyber)pestenIemand lichamelijk pijn doen is ... pestenIemand met woorden pijn doen is ... pestenDe eerste stap om iets aan (cyber)pesten te doenOp deze kanalen wordt heel vaak aan cyberpestenten gedaan...

Security 2020-03-04

Security crossword puzzle
Across
  1. продавец
  2. разрешать
  3. возможность идентификации
  4. одна из составляющих триады
  5. перемена
  6. надежность
  7. Устройство
  8. включать
  9. способ
Down
  1. невозможность отказа от авторства
  2. телекоммуникации
  3. служба поддержки
  4. лимит
  5. полезность
  6. подлинность
  7. ядро
  8. правда
  9. получать
  10. фальсификация
  11. попытка

20 Clues: ядролимитправдаспособпопыткапродавецпеременаполучатьвключатьразрешатьполезностьнадежностьУстройствоподлинностьфальсификациятелекоммуникациислужба поддержкивозможность идентификацииодна из составляющих триадыневозможность отказа от авторства

Security 2013-05-09

Security crossword puzzle
Across
  1. Who can report a security guard for code of conduct violation?
  2. What would go off in most buildings if there was a fire?
  3. Security guards are ________ Peace Officers
  4. Under the Liquor License Act a security guard may only ______ a person
  5. A NSF cheque in a court proceedure is what type of evidence?
  6. Once a security guard arrests a person they must contact?
  7. A criminal offence considered a minor offence
  8. A fingerprint is what type of evidence?
  9. Class C fires involve what type of liquids
  10. A gun is what type of evidence?
Down
  1. Who does the security guard answer to ultimately when on duty
  2. An offence under section 494 (1) ccc anyone can arrest found committing
  3. Section 26 of the Criminal Code regulates the amount of?
  4. The Trespass to Property Act is?
  5. When a witness is on the stand they are giving what type of evidence?
  6. 10-9 means?
  7. 10-3 means stop ?
  8. A security guard should keep a good?
  9. Section 8 of the Charter Of Rights deals with?
  10. The Criminal Code is a ________ act

20 Clues: 10-9 means?10-3 means stop ?A gun is what type of evidence?The Trespass to Property Act is?The Criminal Code is a ________ actA security guard should keep a good?A fingerprint is what type of evidence?Class C fires involve what type of liquidsSecurity guards are ________ Peace OfficersA criminal offence considered a minor offence...

Security 2013-06-27

Security crossword puzzle
Across
  1. What must you display in the LRZ?
  2. What is the name of the contractor company for security?
  3. What is the code number for a Firearm?
  4. What does the T stand for in OTS?
  5. What need must you have to request an MSIC?
  6. Who has the final say when allowing freight to enter the yard?
  7. What is your base channel when receiving radio calls?
  8. A non MSIC holder must also have what for access into the LRZ?
  9. Stick to what path when in the freight yard?
  10. What is Angela’s title other than Manager?
Down
  1. What must a non MSIC holder have whilst in the LRZ?
  2. What does the I stand for in MSIC?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. What colour should drivers follow in the freight yard on the way in?
  5. What lights must be on when in the freight yard?
  6. Who takes passengers on/off via the buggy?
  7. What channel do you call for Security?
  8. What type of industry are we in?
  9. What does the L stand for in LRZ?
  10. Your MSIC must be above what?

20 Clues: Your MSIC must be above what?What type of industry are we in?What must you display in the LRZ?What does the T stand for in OTS?What does the L stand for in LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?...

Security 2014-02-23

Security crossword puzzle
Across
  1. Technology created by Microsoft to control interactivity on web pages
  2. also known as junk mail
  3. Computer and ________ security helps to ensure that only authorized personnel have access
  4. self-replicating program that is harmful to networks
  5. Type of security that uses human interface, like a thumb scanner
  6. Monitors users and sends reports back to the host
  7. Threat from a user outside of the network
  8. Code used to login to a locked account
  9. Data is transformed using a complicated algorithm to make it unreadable
  10. Windows feature that can encrypt data
  11. An attack on the actual hardware
  12. Threat from user inside the network.
  13. malicious software that is disguised as a legitimate program
Down
  1. The first generation security standard for wireless.
  2. Type of attack that focuses on the software
  3. Program that controls the traffic in and out of a computer
  4. A program written with malicious intent, sent by hackers
  5. Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
  6. Type of encryption that requires two keys, a private key and a public key.
  7. Minimum number of characters recommended in a password
  8. Displaying unwanted ads on your computer
  9. When the attacker pretends to be a legit organization
  10. ensures that messages are not corrupted or tampered with during transmission
  11. malicious program that gains full access to a computer system
  12. A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.

25 Clues: also known as junk mailAn attack on the actual hardwareThreat from user inside the network.Windows feature that can encrypt dataCode used to login to a locked accountDisplaying unwanted ads on your computerThreat from a user outside of the networkType of attack that focuses on the softwareMonitors users and sends reports back to the host...

Security 2022-04-22

Security crossword puzzle
Across
  1. A scam using a redirect which tricks people into entering personal information
  2. Software offered at no cost, but you can't edit it or sell it yourself.
  3. General name for malware that has lots of popups
  4. General name for software that locks a computer until you pay a fee
  5. A type of attack designed to take a website down
  6. Hardware of software, which helps prevent hacking
  7. A method of 'locking' data so that it is unreadable unless you have a key
  8. A form of web encryption protocol
  9. Term for unauthorised access into a network / computer system.
  10. General name for all malicious software
  11. Law that forbids the creation of malware and hacking
  12. The type of basic encryption used on the internet
Down
  1. Genera for mal,ware such as keyloggers
  2. Software offered for free, with access to the source code to edit the software
  3. Law that stops companies / organisations from mis-using your data
  4. The latest form of web encryption protocol
  5. A method of only allowing people the information they need to see.
  6. Server Type of computer that helps prevent DDOS attacks
  7. Software offered on a trial basis
  8. A scam using emails to trick people into entering personal information

20 Clues: A form of web encryption protocolSoftware offered on a trial basisGenera for mal,ware such as keyloggersGeneral name for all malicious softwareThe latest form of web encryption protocolGeneral name for malware that has lots of popupsA type of attack designed to take a website downHardware of software, which helps prevent hacking...

Security 2022-02-08

Security crossword puzzle
Across
  1. You can find me at rest or on the move (in-transit). (10)
  2. Apply multiple layers of securty. (7,2,5)
  3. Needs to be kept secret. (12)
  4. I copy traffic for you to safely inspect. (6,9)
  5. Trust no one. (4,5)
  6. I can tell you when you need to reduce permissions. (11)
  7. Use me to prevent unwanted traffic reaching your VMs. (8)
  8. Using me allows you to implment the principle of least privilege. Acronym (3)
  9. Use me to manage keys outside of Google Cloud. Acronym (3)
  10. Enterprise way to adopt a Zero trust approach. (6,4)
  11. If you look at me you can find out "who did what, where, and when". (5,5,4)
  12. You're not alone and this approach helps reduce risk and cost. (6)
Down
  1. De-identification technique. (16)
  2. If you use me you do not need a VPN. Acronym(3)
  3. I provide insights into your security posture. Acronym(3)
  4. Use me to mitigate OWASP top 10 risks. (5,5)
  5. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  6. Do you trust that container image? (6,4)
  7. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  8. Use me to classify your data. (5,3)
  9. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)

21 Clues: Trust no one. (4,5)Needs to be kept secret. (12)De-identification technique. (16)Use me to classify your data. (5,3)Do you trust that container image? (6,4)Apply multiple layers of securty. (7,2,5)Use me to mitigate OWASP top 10 risks. (5,5)If you use me you do not need a VPN. Acronym(3)I copy traffic for you to safely inspect. (6,9)...

Security 2024-10-31

Security crossword puzzle
Across
  1. These devices are common in homes, often have weak security, and have been exploited to launch DDOS attakcs.
  2. This type of program always executes with the permissions of the owner.
  3. command to write to syslog from terminal
  4. This type of system authentication involves providing more than just a password
  5. Technique to harden a system that involves implementing multiple types of security
  6. Type of cryptography that involves both public and private keys.
  7. Occurs when the sequence of instructions matters but is not enforced
  8. Type of attack involves posing as a trusted figure to induce individuals to reveal personal information.
  9. This file is used to exchange data more quickly between the hard drive and RAM.
  10. Always have more than one of these to recover your system
  11. If an attacker gains access to this account, they can do anything on the system.
Down
  1. Security exercise to determine vulnerabilities in a system
  2. often relies on an access control list to determine what traffic can enter and exit a network.
  3. Linux software that loads kernel
  4. Data structure that defines the starting block and length of a file.
  5. Command to display real-time resource usage
  6. Hash used in current linux distros for shadow file account passwords
  7. failing to use this command in a parent process may create a zombie
  8. A password used with this software can prevent a thief from booting your device.
  9. Release of energy that can fry solid-state electronics.
  10. A secure way to access a system remotely
  11. A process does not want to have this value be high, or else many other processes might run before it
  12. This type of threat is often the most dangerous and unexpected.
  13. This vulnerability can occur when data is written beyond the bounds of an array.

24 Clues: Linux software that loads kernelcommand to write to syslog from terminalA secure way to access a system remotelyCommand to display real-time resource usageRelease of energy that can fry solid-state electronics.Always have more than one of these to recover your systemSecurity exercise to determine vulnerabilities in a system...

Security 2025-03-19

Security crossword puzzle
Across
  1. | Een aanval waarbij schadelijke SQL-code wordt geïnjecteerd in een database-query.
  2. | Een aanval waarbij schadelijke scripts worden geïnjecteerd in webpagina's.
  3. | Een netwerk van geïnfecteerde computers die op afstand worden bestuurd door een aanvaller.
  4. | Extra beveiligingslaag waarbij een gebruiker twee verschillende vormen van verificatie nodig heeft.
  5. | Een beveiligingssysteem dat netwerkverkeer controleert en ongeautoriseerde toegang blokkeert.
  6. | Het proces van het omzetten van leesbare data naar een versleutelde, onleesbare vorm.
  7. | Een versleutelde verbinding die gebruikers anoniem op het internet laat surfen.
  8. | Het onderzoek naar methoden om encryptie toe te passen
  9. | Een type malware dat zich voordoet als legitieme software, maar schadelijke acties uitvoert.
  10. | Kwaadaardige software die schade kan toebrengen aan computers of netwerken.
  11. | Het onderscheppen en analyseren van netwerkverkeer.
  12. | Een vorm van online oplichting waarbij een aanvaller zich voordoet als een betrouwbare entiteit om gevoelige informatie te verkrijgen.
  13. | Een techniek waarbij een aanvaller wachtwoorden probeert te kraken door alle mogelijke combinaties te proberen.
  14. | Een aanval waarbij een hacker een actieve gebruikerssessie overneemt.
Down
  1. | Een kwetsbaarheid die onbekend is bij de leverancier en kan worden misbruikt door hackers.
  2. | Het manipuleren van mensen om vertrouwelijke informatie prijs te geven.
  3. | Software die in het geheim gebruikersgegevens verzamelt.
  4. | Software die malware detecteert en verwijdert.
  5. | Software of hardware die toetsaanslagen registreert.
  6. | Een verborgen toegang tot een systeem, vaak misbruikt door hackers.
  7. | Een eenrichtingsproces dat data omzet in een unieke vaste lengte code.
  8. | Een aanval waarbij een programma meer data ontvangt dan het aankan, wat kan leiden tot het uitvoeren van schadelijke code door een aanvaller.
  9. | Malware die bestanden versleutelt en losgeld eist om ze vrij te geven.
  10. | Een aanval waarbij een server wordt overspoeld met verkeer om deze onbruikbaar te maken.

24 Clues: | Software die malware detecteert en verwijdert.| Het onderscheppen en analyseren van netwerkverkeer.| Software of hardware die toetsaanslagen registreert.| Het onderzoek naar methoden om encryptie toe te passen| Software die in het geheim gebruikersgegevens verzamelt.| Een verborgen toegang tot een systeem, vaak misbruikt door hackers....

Security 2025-09-23

Security crossword puzzle
Across
  1. ask questions or seek information.
  2. Intentional destruction or damage.
  3. of rules or procedures
  4. To monitor or observe closely.
  5. Genuine or legitimate.
  6. let's use Risky doesn't fit, let's use Assessdoesn't fit the bill, let's use Threats
  7. use Probe doesn't fit let's us Inquire
  8. To confirm or verify authenticity.
  9. Protected from threats or risks.
  10. let's use Accreditdoesn't fit let's use Validate
Down
  1. of assets and personnel.
  2. keep safe from harm or damage.
  3. Potential occurrences that could cause harm.
  4. To give permission or approval.
  5. Unauthorized gathering of confidential information.
  6. Thorough background check.
  7. Verification of trustworthiness for access.
  8. Measure to protect against harm or damage.
  9. To examine closely for defects or issues.
  10. ,To ensure compliance with laws or rules.

20 Clues: of rules or proceduresGenuine or legitimate.of assets and personnel.Thorough background check.keep safe from harm or damage.To monitor or observe closely.To give permission or approval.Protected from threats or risks.ask questions or seek information.Intentional destruction or damage.To confirm or verify authenticity....

Security 2025-10-24

Security crossword puzzle
Across
  1. system sentinel
  2. self-replicating, damages computer system
  3. data matches the truth
  4. gathers information
  5. software designed to disrupt and damage
  6. Restricted Access
  7. authentication
  8. bogus website
  9. recovery
  10. virtual autograph
Down
  1. your digital insurance policy
  2. predefined criteria
  3. accuracy, consistency and reliability
  4. bomb triggered based on condition
  5. network gatekeeper
  6. fraud email
  7. last in line, yet first to spot the mistake
  8. self-replicating and spreads through network
  9. Protection of sensitive information
  10. extra bit that keeps the total in line
  11. horse
  12. can launch attacks

22 Clues: horserecoveryfraud emailbogus websiteauthenticationsystem sentinelRestricted Accessvirtual autographnetwork gatekeepercan launch attackspredefined criteriagathers informationdata matches the truthyour digital insurance policybomb triggered based on conditionProtection of sensitive informationaccuracy, consistency and reliability...

Pokemon TYPES <---------------------------- 2022-11-01

Pokemon TYPES <---------------------------- crossword puzzle
Across
  1. shiny crystals
  2. cold
  3. tiny and disgusting
  4. poisonous
  5. flies and might breathe fire
  6. very strong and is most effective against five other types of Pokemon
  7. shocking
  8. mainly for nature-y type Pokemon
  9. shiny!!!
  10. for Pokemon in the sky
  11. WHO TURNED OFF LIGHTS??!!!
Down
  1. uses mind powers and is very intelligent
  2. for strong Pokemon on the ground
  3. boo...
  4. mostly found in the ocean
  5. stony
  6. it burns!!!
  7. the most basic type
  8. this type for Pokemon can be found in the cyber simulation
  9. music
  10. cute and tough

21 Clues: coldstonymusicboo...shockingshiny!!!poisonousit burns!!!shiny crystalscute and toughtiny and disgustingthe most basic typefor Pokemon in the skymostly found in the oceanWHO TURNED OFF LIGHTS??!!!flies and might breathe firefor strong Pokemon on the groundmainly for nature-y type Pokemonuses mind powers and is very intelligent...

Cyber Security 2022-07-19

Cyber Security crossword puzzle
Across
  1. Malware designed to appear as legitimate software program to gain access to a system
  2. Vital Information Resource Under ___
Down
  1. Routing that uses multi-layered encryption for anonymity
  2. Software that is intentionally harmful to computer
  3. First computer virus

5 Clues: First computer virusVital Information Resource Under ___Software that is intentionally harmful to computerRouting that uses multi-layered encryption for anonymityMalware designed to appear as legitimate software program to gain access to a system

Cyber Security 2022-10-06

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2020-08-24

Cyber Security crossword puzzle
Across
  1. another computer, for example by email,
  2. move to the other computer.
Down
  1. virus can make copies of itself
  2. a computer that has a virus makes a connection
  3. a program that sends a large number of annoying messages to many people’s mobile phones in an uncontrolled way

5 Clues: move to the other computer.virus can make copies of itselfanother computer, for example by email,a computer that has a virus makes a connectiona program that sends a large number of annoying messages to many people’s mobile phones in an uncontrolled way

Cyber Security 2018-09-20

Cyber Security crossword puzzle
Across
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend
Down
  1. Likes to chase mice
  2. Large marsupial

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2023-10-18

Cyber Security crossword puzzle
Across
  1. Universal symbol of an SSL Certificate
  2. prevent unauthorised access from a network
  3. An executable file that spreads within a machine.
Down
  1. The address of a web page
  2. malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: The address of a web pageUniversal symbol of an SSL Certificateprevent unauthorised access from a networkAn executable file that spreads within a machine.malicious software designed to block access to a computer system until a sum of money is paid

Cyber Security 2024-03-14

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber security 2024-10-21

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2024-11-14

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
  2. pretending to be a genuine organisation to get someone's details.
  3. a virus that usually come embedded within another file that looks genuine.
Down
  1. horse malware that is disguised as a genuine file that gives hackers access to a computer.
  2. engineering the art of tricking or manipulation to get someone to reveal their personal info.

5 Clues: pretending to be a genuine organisation to get someone's details.a virus that usually come embedded within another file that looks genuine.horse malware that is disguised as a genuine file that gives hackers access to a computer.engineering the art of tricking or manipulation to get someone to reveal their personal info....

CYBER SECURITY 2016-05-22

CYBER SECURITY crossword puzzle
Across
  1. attempt to acquire sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. never respond to unusual___.
  2. never give your ___ information online.
  3. bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

5 Clues: never respond to unusual___.never give your ___ information online.bullying- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive....

cyber security 2022-09-15

cyber security crossword puzzle
Across
  1. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  2. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
Down
  1. hat hacking Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
  2. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  3. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.

5 Clues: Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.Programs that automatically execute tasks as ordered by the creator of the program that has infected them.An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies....

cyber security 2021-10-06

cyber security crossword puzzle
Across
  1. a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information
  2. often called advertising-supported software by its developers
  3. a person who tries to steal personal information
Down
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without
  2. Unlike a computer virus, it does not need to attach itself to an existing program.

5 Clues: a person who tries to steal personal informationoften called advertising-supported software by its developersUnlike a computer virus, it does not need to attach itself to an existing program.any software that installs itself on your computer and starts covertly monitoring your online behavior without...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. a computer program that replicates itself
  2. sends emails in order to reveal personal information such as passwords and credit cards numbers
  3. software that automatically displays or downloads advertising materials
Down
  1. a program that steals login credentials
  2. such as tacking software that gathers information about a person without their knowledge

5 Clues: a program that steals login credentialsa computer program that replicates itselfsoftware that automatically displays or downloads advertising materialssuch as tacking software that gathers information about a person without their knowledgesends emails in order to reveal personal information such as passwords and credit cards numbers

cyber security 2022-11-28

cyber security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2018-01-22

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Flying mammal

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber Security 2025-07-08

Cyber Security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Puzzle No. 2 2022-09-06

Puzzle No. 2 crossword puzzle
Across
  1. A string of characters used to verify the identity of a user during the authentication process.
  2. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  3. Ensuring that authorized users have access to information and associated assets when required.
  4. Sentence-like format of password which is strong but easier to remember.
  5. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  6. You should not write down your password in this type of physical medium.
Down
  1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Safeguarding the accuracy and completeness of information.
  4. Complete the sentence: ________ is everyone’s responsibility.
  5. A weakness in your security policy, implementation, design, and controls.
  6. These fix general software problems and provide new security patches where criminals might get in.
  7. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  8. An event that will cause harm to you or your asset.
  9. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.

15 Clues: An event that will cause harm to you or your asset.Safeguarding the accuracy and completeness of information.Complete the sentence: ________ is everyone’s responsibility.Sentence-like format of password which is strong but easier to remember.You should not write down your password in this type of physical medium....

Cyber Security Word Search Challenge 2025-08-26

Cyber Security Word Search Challenge crossword puzzle
Across
  1. An update that fixes security vulnerabilities.
  2. Online servers used to store data.
  3. Security system that blocks or allows network traffic.
  4. Malware that spreads itself without human interaction.
  5. Process of converting data into a secure, unreadable format.
  6. Secret word or phrase used to access accounts.
  7. Malware disguised as legitimate software.
  8. A vulnerability unknown to the vendor, exploited by hackers.
Down
  1. Hidden access point used by attackers to bypass security.
  2. Software designed to harm, exploit, or disable systems.
  3. Fake emails that trick people into giving up sensitive info
  4. Tool that encrypts your internet connection and hides your IP address.
  5. Malware that locks files and demands payment.
  6. Software that secretly monitors your activities.

14 Clues: Online servers used to store data.Malware disguised as legitimate software.Malware that locks files and demands payment.An update that fixes security vulnerabilities.Secret word or phrase used to access accounts.Software that secretly monitors your activities.Security system that blocks or allows network traffic....

cyber security engineer 2024-07-18

cyber security engineer crossword puzzle
Across
  1. The systematic process of finding and fixing security holes in software or networks.
  2. The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
  3. A process to determine and document potential threats to an organization
  4. The analysis and examination of digital data for evidence or investigation.
Down
  1. The method used to protect information by transforming it into an unreadable format
  2. The response to and management of a security breach or attack.
  3. The practice of securing information systems against unauthorized access and threats.

7 Clues: The response to and management of a security breach or attack.A process to determine and document potential threats to an organizationThe analysis and examination of digital data for evidence or investigation.The method used to protect information by transforming it into an unreadable format...

Cyber Security - Incidents 2025-09-28

Cyber Security - Incidents crossword puzzle
Across
  1. - Damage to trust and credibility due to incidents.
  2. - Deliberate change of data, not always with bad intentions.
  3. - Deliberate deletion or erasure of stored data.
  4. - Business impact involving delays or system failures.
  5. - Penalties for breaking data protection laws.
Down
  1. - Changing data with the intent to trick or harm.
  2. - Taking or copying data without permission.

7 Clues: - Taking or copying data without permission.- Penalties for breaking data protection laws.- Deliberate deletion or erasure of stored data.- Changing data with the intent to trick or harm.- Damage to trust and credibility due to incidents.- Business impact involving delays or system failures....

Cyber Security Crossword Puzzle 2024-09-20

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. A type of attack where the hacker pretends to be someone else
  2. Criminal activity involving computers or networks
  3. Code injected into a website to gain unauthorized access
  4. Malicious software designed to damage or disrupt systems
  5. Protects the boundary of a network from unauthorized access
Down
  1. Secure connection method, often used with Wi-Fi
  2. Unauthorized access to systems or data
  3. A weakness in a system that can be exploited
  4. Secret word used to access an account
  5. Program used to protect against malware

10 Clues: Secret word used to access an accountUnauthorized access to systems or dataProgram used to protect against malwareA weakness in a system that can be exploitedSecure connection method, often used with Wi-FiCriminal activity involving computers or networksCode injected into a website to gain unauthorized access...

Cyber Security Awareness Month 2024-09-30

Cyber Security Awareness Month crossword puzzle
Across
  1. A type of cybercrime where criminals steal personal information for financial gain.
  2. A type of malicious software that encrypts files and demands a ransom payment.
  3. A type of social engineering attack that tricks victims into revealing sensitive information via email.
  4. A technique used to gain unauthorised access to a computer system.
Down
  1. Any kind of computer software with malicious intent to harm your device
  2. A form of phishing attack that uses QR codes instead of text-based links in emails, digital platforms or on physical items.
  3. A security system that prevents unauthorised access to a network
  4. A security measure that protects data from unauthorised access or disclosure.
  5. A security practice that involves regularly updating software and systems.
  6. A type of malicious software that replicates itself

10 Clues: A type of malicious software that replicates itselfA security system that prevents unauthorised access to a networkA technique used to gain unauthorised access to a computer system.Any kind of computer software with malicious intent to harm your deviceA security practice that involves regularly updating software and systems....

Reporting cyber crime 2022-05-18

Reporting cyber crime crossword puzzle
Across
  1. Received a ____ text? Forward to 7726 (free)
  2. Report computer fraud to the ______
  3. ____ to National Cyber Security Centre
Down
  1. fraud can also be reported to ____
  2. Report@_______.gov.uk

5 Clues: Report@_______.gov.ukfraud can also be reported to ____Report computer fraud to the __________ to National Cyber Security CentreReceived a ____ text? Forward to 7726 (free)

Protect the House for the Holidays 2025-11-04

Protect the House for the Holidays crossword puzzle
Across
  1. Think before you do it
  2. Digital shield
  3. What we feel this season
  4. Our community
  5. Campus tech backbone
  6. What we do for each other
  7. Key to cyber safety
  8. How we keep our systems
Down
  1. Holiday inbox trick
  2. Campus leaders
  3. Central Morehouse value
  4. Spirit color of the House
  5. Cyber training hub
  6. Before you click
  7. Strength of our community
  8. Protect it wherever you take it
  9. Where you find tools and training
  10. Campus champions
  11. The heart of our mission

19 Clues: Our communityCampus leadersDigital shieldBefore you clickCampus championsCyber training hubHoliday inbox trickKey to cyber safetyCampus tech backboneThink before you do itCentral Morehouse valueHow we keep our systemsWhat we feel this seasonThe heart of our missionSpirit color of the HouseStrength of our communityWhat we do for each other...

Reporting cyber crime 2022-05-18

Reporting cyber crime crossword puzzle
Across
  1. Received a ____ text? Forward to 7726 (free)
  2. Report computer fraud to the ______
  3. ____ to National Cyber Security Centre
Down
  1. fraud can also be reported to ____
  2. Report@_______.gov.uk

5 Clues: Report@_______.gov.ukfraud can also be reported to ____Report computer fraud to the __________ to National Cyber Security CentreReceived a ____ text? Forward to 7726 (free)

Reporting cyber crime v2 2022-05-23

Reporting cyber crime v2 crossword puzzle
Across
  1. report computer fraud to the ______
  2. ____ to National Cyber Security Centre
  3. received a ____ text? Forward to 7726 (free)
Down
  1. fraud can also be reported to _____
  2. Report@______.gov.uk

5 Clues: Report@______.gov.ukfraud can also be reported to _____report computer fraud to the __________ to National Cyber Security Centrereceived a ____ text? Forward to 7726 (free)

Cyber Security Crossword 2023-05-13

Cyber Security Crossword crossword puzzle
Across
  1. a type of security that uses our unique features to secure our systems, such as fingerprint or voice
  2. when someone pretends to be someone they are not to steal personal information
  3. a type of malware that infects and damages computers
  4. someone who gains access to a computer system through unconventional means
Down
  1. a type of scam normally done by email or text message, usually impersonating a company or bank
  2. a combination of letters, numbers and symbols we use to gain access to computer systems
  3. a piece of malware that pretends to be another piece of software to trick you into downloading and installing it

7 Clues: a type of malware that infects and damages computerssomeone who gains access to a computer system through unconventional meanswhen someone pretends to be someone they are not to steal personal informationa combination of letters, numbers and symbols we use to gain access to computer systems...

cyber security threat 2023-07-21

cyber security threat crossword puzzle
Across
  1. : Be cautious of ______ attempts
  2. : Regularly back up your ______
  3. : Caution in _____
Down
  1. Enable 2 Factor _______
  2. : _______ yourself
  3. : Secure your home _____
  4. : Use strong ______

7 Clues: : _______ yourself: Caution in _____: Use strong ______Enable 2 Factor _______: Secure your home _____: Regularly back up your ______: Be cautious of ______ attempts

Inside the ransomware playbook 2024-10-25

Inside the ransomware playbook crossword puzzle
Across
  1. - Notorious group known for exploiting vulnerabilities for profit
  2. - The tool of choice for a thief who likes to play hide and seek
  3. - The process of scrambling information to keep it secret
  4. - The principle of limiting access based on user needs
  5. - Protocol used for authentication in Microsoft networks
Down
  1. - Crafty crew that snatches your secrets without a sword
  2. - Ritual of sharpening defenses to keep the bad guys at bay
  3. - Structured guide that outlines how to respond to threats
  4. - Secretive moves of an attacker, often hidden in plain sight
  5. - The secret playbook of cyber mischief-makers
  6. - Legendary flaw that opens doors without knocking
  7. - Ransomware tactic that involves manipulating security software

12 Clues: - The secret playbook of cyber mischief-makers- Legendary flaw that opens doors without knocking- The principle of limiting access based on user needs- Crafty crew that snatches your secrets without a sword- Protocol used for authentication in Microsoft networks- The process of scrambling information to keep it secret...