cyber security Crossword Puzzles

Information Security Crossword - 11 2013-07-09

Information Security Crossword - 11 crossword puzzle
Across
  1. Originally created in 1969.
  2. A type of attack in which the traffic to a website is redirected to a fake website by manipulating host file on your system or DNS server.
  3. A statement or a set of statements adopted by management and binding on all the employees to follow.
  4. Viruses _______ vulnerabilities in a system to infect it.
  5. IRDA is a ___________.
  6. Generally a bug fix.
  7. US equivalent to Indian MOD.
  8. Password is to ___________ just as user ID is to Identification.
  9. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
  10. _________requires constant monitoring in a data center.
  11. ACL stands for _______ Control List
  12. Provides backup power.
  13. Mail _____- sending huge quantities of mails.
  14. Fulfilling contractual requirements is also a ________ requirement.
  15. Digital _______ - Science of computer investigation.
  16. Vulnerability in software is a ____ or a programming flaw which can get exploited leading to unstable behavior.
  17. Emergency exits always open _________.
  18. _________ configures and manages a system as per the data owner’s requirements.
  19. Generates random one time passwords.
  20. Data _______ defines the security requirements of data.
  21. Content ______ dynamically inspects the contents being exchanged over mail or web, blocks or logs the communication.
Down
  1. Ensuring ________ safety is in the scope of information security.
  2. Your window to the internet.
  3. Weakest link in information security.
  4. A server getting infected with virus leads to the loss of ________ of the computer system.
  5. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
  6. Earliest predecessor of Internet.
  7. AES is an encryption ___________.
  8. Personal computers requires ______ as much as office systems.
  9. Inherent weakness in something which makes it prone to damage.
  10. Security _________ defines how the information should be handled.
  11. ______ encrypts hard disk.
  12. During crisis you should go out and never return or enter from an _______ exit.
  13. Daily dose of updates for an antivirus.
  14. Coming out safely from structure in danger.
  15. A popular antivirus software.
  16. Blocks unwanted network traffic to your computer.
  17. An internet browser.
  18. Division of office space into areas with varying degree of physical access controls.
  19. Internet related.

40 Clues: Internet related.Generally a bug fix.An internet browser.IRDA is a ___________.Provides backup power.______ encrypts hard disk.Originally created in 1969.Your window to the internet.US equivalent to Indian MOD.A popular antivirus software.Earliest predecessor of Internet.AES is an encryption ___________.ACL stands for _______ Control List...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. Unauthorized use of personal information.
  2. Practices for maintaining cybersecurity.
  3. Potential harm from cyber threats.
  4. Protecting networks from unauthorized access.
  5. Understanding cybersecurity risks.
  6. Potential dangers to digital systems.
  7. Rules governing cybersecurity practices.
  8. Safeguarding data from unauthorized access.
  9. Measures to protect against cyber threats.
  10. Malicious software designed to harm systems.
  11. response Reacting to and mitigating cyber incidents.
  12. Individuals working in cybersecurity roles.
  13. Fraudulent attempt to obtain sensitive information.
  14. Ability to use digital tools effectively.
  15. Bullying using electronic means.
  16. Ensuring a healthy digital lifestyle.
  17. Measures to protect digital assets.
  18. Security event affecting digital systems.
  19. Learning about cybersecurity practices.
  20. Criminal activities conducted online.
  21. Manipulating individuals to divulge information.
  22. Self-replicating malicious code.
  23. Practice of protecting digital systems.
  24. Practices for staying safe online.
  25. Dual verification for user identity.
  26. Secret code for accessing systems.
  27. Legal regulations governing cyberspace.
  28. Converting data into a code to secure it.
  29. Deceptive attempt to acquire sensitive information.
  30. Traces of online activity.
  31. Virtual Private Network for secure connections.
  32. a type of malicious software that self-replicates and spreads to other computer systems
  33. Unsolicited and often irrelevant messages.
Down
  1. Unauthorized access to sensitive data.
  2. Responsible behavior online.
  3. Covertly obtaining information from digital systems.
  4. Gathering and analyzing data to prevent cyber threats.
  5. the state of being protected from harm, danger, or risk,
  6. Verifying user identity.
  7. Intentional assault on computer systems.
  8. Protecting network endpoints from threats.
  9. Malware that encrypts data for ransom.
  10. Moral principles guiding online behavior.
  11. Encrypted and protected communication channels.
  12. Global network connecting computers worldwide.
  13. Safely navigating the internet.
  14. Storing and accessing data over the internet.
  15. Maintaining a healthy digital lifestyle.
  16. Ability to withstand and recover from cyber attacks.
  17. are individuals or groups with advanced technical skills who use their expertise to gain unauthorized access to computer systems,
  18. Control over personal data usage.

51 Clues: Verifying user identity.Traces of online activity.Responsible behavior online.Safely navigating the internet.Bullying using electronic means.Self-replicating malicious code.Control over personal data usage.Potential harm from cyber threats.Understanding cybersecurity risks.Practices for staying safe online.Secret code for accessing systems....

Cyber Security Challenge: Remote Financial Data Privacy 2023-12-29

Cyber Security Challenge: Remote Financial Data Privacy crossword puzzle
Across
  1. This type of software is specifically developed to identify and eliminate computer viruses.
  2. This term describes an event that compromises the security, confidentiality, or integrity of personal data, often involving a breach of privacy.
  3. This term refers to unwanted emails, often sent for advertising purposes and distributed widely to numerous recipients.
  4. This security approach involves confirming a user's identity by requiring multiple forms of evidence before granting system access.
  5. This technology is a secure network that allows data transmission over public networks as if the devices were directly connected to a private network.
  6. This principle involves restricting the availability of information solely to individuals who are authorized to access it.
Down
  1. This term described a harmful action that intentionally disrupts or damages computer networks or systems.
  2. This type of malware is designed to restrict access to a computer system and demands a ransom to be paid for its removal.
  3. These plans and procedures help an organization bounce back after unexpected events like flood or cyber attacks.
  4. Ensuring the essential operations continue uninterrupted, even during crises, is the essence of this practice.
  5. This process involves transforming data or information into a secret code to prevent unauthorized access.
  6. This cybersecurity measure involves backup systems and resources, offering added security and reliability, especially with remote financial data.
  7. This advanced security technology facilitates password-free authentication, enhancing user verification in online transactions.
  8. This system acts as a protective barrier to prevent unauthorized access to or from a private network.
  9. This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle.
  10. This term describes an incident where there is unauthorized access or disclosure of personal information, compromising your privacy.
  11. This technique is a deceptive method used to obtain sensitive information by posing as a legitimate entity in digital communications.

17 Clues: This type of software is specifically developed to identify and eliminate computer viruses.This system acts as a protective barrier to prevent unauthorized access to or from a private network.This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle....

FIT 2013-05-16

FIT crossword puzzle
Across
  1. Something that would go into a computer like a mouse
  2. Machinery of the computer
  3. Liquid Crystal Display/Light emitting diod
  4. Central Processing Unit
  5. The cloud based presentation maker with rooming features
  6. Picture or symbol representing a company
  7. Example: Google
  8. You and your safety online
  9. Visual Display Unit
  10. An ad in paper form.
  11. A potable Device
  12. The smalleststorage size
  13. The programs and other operating systems used by computers
  14. Where you plug in speakers/earbuds
Down
  1. A device that connects to a computer
  2. Wireless Internet
  3. An object in a computer that stores data
  4. Location for CD in a laptop
  5. The space you type in
  6. Something that comes out of a computer such as a speaker
  7. National Cyber Security Alliance
  8. The primary circuit board
  9. Online storage
  10. Example: Temple Run
  11. Random Access Memory
  12. The biggest storage size
  13. Way you act and behave online
  14. A saying representing a company
  15. Flash drive port

29 Clues: Online storageExample: GoogleA potable DeviceFlash drive portWireless InternetExample: Temple RunVisual Display UnitRandom Access MemoryAn ad in paper form.The space you type inCentral Processing UnitThe biggest storage sizeThe smalleststorage sizeMachinery of the computerThe primary circuit boardYou and your safety online...

LBIU Crossword 2022-02-17

LBIU Crossword crossword puzzle
Across
  1. participating in a probe that repeats endlessly.
  2. a concrete room used for storage in the backtimes, now used by squatters as homes.
  3. a mindprobe about life in Eden.
  4. a person who carries messages illegally between the
  5. a tunnel system that used to transport water.
  6. a prepackaged food item that tastes like chocolate.
  7. a virtual reality experienced by your mind via an electrode needle.
  8. a Tactical Urban Vehicle; an armored cyber-driven van.
  9. a person addicted to mindprobes.
  10. a beverage that provides energy.
  11. Eden from the Urb.
Down
  1. a machine that converts the spoken word into text.
  2. a Technical Security Guard.
  3. dumb, lame (used as an adjective or a noun).
  4. what proovs call their birth parents.
  5. Zone an area planted with land mines that
  6. the area inhabited by normals.
  7. a genetically improved human.
  8. a secure area within the Urb where proovs live.
  9. a medical technician; like a doctor in the backtimes.
  10. a person who has not been genetically improved.

21 Clues: Eden from the Urb.a Technical Security Guard.a genetically improved human.the area inhabited by normals.a mindprobe about life in Eden.a person addicted to mindprobes.a beverage that provides energy.what proovs call their birth parents.Zone an area planted with land mines thatdumb, lame (used as an adjective or a noun)....

All things DAIL 2025-07-21

All things DAIL crossword puzzle
Across
  1. Where to go to sign up for AHS trainings and events.
  2. Supportive care provided outside of institutional settings.
  3. Division housing Adult Protective Services and Survey and Certification.
  4. Number of public guardians.
  5. Community partners across the state, Howard Center is one.
  6. Karma Chameleon.
  7. Program providing home care under moderate, high, or highest needs.
  8. Person-centered, meaningful job matches, full inclusion in the Vermont workforce, and creative strategies that broaden employment opportunities are cornerstone practices.
  9. DEI meets Star Wars.
Down
  1. A type of lifestyle emphasizing self-sufficiency and autonomy.
  2. Provides DAIL interactive cyber security training.
  3. One section of a larger group.
  4. Location of last 2024 EAD.
  5. The process of growing older.
  6. Helps people move out of nursing homes into their preferred community-based setting.
  7. Focus of ADA legislation.
  8. Name change.
  9. AHS Commissioner.
  10. Division Director
  11. DBVI grant providing training to schools and students for post-school success.
  12. Name of two consecutive commissioners.

21 Clues: Name change.Karma Chameleon.AHS Commissioner.Division DirectorDEI meets Star Wars.Focus of ADA legislation.Location of last 2024 EAD.Number of public guardians.The process of growing older.One section of a larger group.Name of two consecutive commissioners.Provides DAIL interactive cyber security training....

News notes week 5 2025-09-24

News notes week 5 crossword puzzle
Across
  1. KInd of attack that wreak havoc for air travel
  2. Place that had deadly Attack
  3. Person that was named WNBA MVP for a record 4th time
  4. age golfer pledged to keep golfing
  5. Day that Jimmy Kimmel returned
  6. Fmr Bengals running back that died at 45
  7. Type of animal that killed trainer
  8. Name of storm that went from Ohio to Hong kong
  9. airline company that had to have an emergency landing
  10. Name of person found guilty of trump assasination
Down
  1. Place that boosts security for U.N. meeting
  2. actor injured on spiderman set
  3. Nfl team's "tush push" that faced renewed scrutiny
  4. kind of racing park where cessna crashed
  5. person who returns to their live show
  6. Number of arrests for the plot to crash NYC phone towers
  7. Number of people that went to Charlie Kirk memorial
  8. reason why delta jet had to have an emergency landing
  9. Place that had a tiger attack the trainer
  10. medication that leads to autism

20 Clues: Place that had deadly Attackactor injured on spiderman setDay that Jimmy Kimmel returnedmedication that leads to autismage golfer pledged to keep golfingType of animal that killed trainerperson who returns to their live showkind of racing park where cessna crashedFmr Bengals running back that died at 45Place that had a tiger attack the trainer...

Ketimpangan smansabat25 2025-01-18

Ketimpangan smansabat25 crossword puzzle
Across
  1. Ancaman di dalam perangkat lunak
  2. Menyusup sistem computer Tanpa izin
  3. kelompok prentas asal Rusia
  4. yang dapat menimbulkan sybercrime
  5. kasus cybercrime yang terjadi tahun 2022
  6. apa saja serangan cyber
  7. langkah melindungi privasi online
  8. Kejahatan yang memanfaatkan data
  9. Serangaki kode sekali pakai
  10. Tiket terbesar indonesia
  11. apa arti internet aman
  12. Ancaman di lakukan menyisipkan
Down
  1. Korban kejahatan cyber
  2. apa saja jenis² hacker
  3. bully Penindasan secara online melalui internet
  4. Informasi tidak benar internet
  5. Apasaja jenis serangan cybercrime
  6. siapa pendiri cisa
  7. Memancing korban memberikan identitas
  8. inisial dari pelaku peretasan website

20 Clues: siapa pendiri cisaKorban kejahatan cyberapa saja jenis² hackerapa arti internet amanapa saja serangan cyberTiket terbesar indonesiakelompok prentas asal RusiaSerangaki kode sekali pakaiInformasi tidak benar internetAncaman di lakukan menyisipkanAncaman di dalam perangkat lunakKejahatan yang memanfaatkan datayang dapat menimbulkan sybercrime...

Security 2022-02-08

Security crossword puzzle
Across
  1. A deployment area for Google Cloud resources within a region. (4)
  2. I am an affordable compute instance suitable for batch and fault-tolerant workloads. (4)
  3. I am a high performance persistent disk. Acronym(3)
  4. A technology to keep your virtual machine instances running even when a host system event, such as a software or hardware update, occurs. (4,9)
  5. I am dedicated to hosting only your project's VMs.(4,6)
  6. A discount in return for committing to paying for Compute Engine resources for 1 year or 3 years. Acronym(3)
  7. I collect telemetry from Compute Engine instances. (3,5)
  8. I can speed up compute jobs. Acronym(3)
  9. An automatic discount for running specific Compute Engine resources a significant portion of the billing month. Acronym(3)
  10. A specific geographical location where you can host your resources. (6)
  11. A licensing model that lets companies use their licenses flexibly, whether on-premise, or in the cloud. Acronym(4)
Down
  1. I am a type of storage created automatically when you create a Compute Engine instance. (4,4)
  2. I will need to be created to periodically back up data from your zonal persistent disks or regional persistent disks. (8)
  3. I am a Compute Engine VM running on hosts based on the second generation of AMD Epyc processors and have built-in optimization of both performance and security for enterprise-class high memory workloads. (12)
  4. I run when a virtual machine (VM) instance boots. (7,6)
  5. I am a type of VM that helps to protect enterprise workloads from threats like remote attacks, privilege escalation, and malicious insiders. (8)
  6. A collection of virtual machine (VM) instances that you can manage as a single entity. Acronym (3)
  7. I am Machine type that allows you to optimally choose a CPU and Memory configuration of your choice and not be limited to standard configurations. (8)

18 Clues: I can speed up compute jobs. Acronym(3)I am a high performance persistent disk. Acronym(3)I run when a virtual machine (VM) instance boots. (7,6)I am dedicated to hosting only your project's VMs.(4,6)I collect telemetry from Compute Engine instances. (3,5)A deployment area for Google Cloud resources within a region. (4)...

Cyber Safety 2024-06-28

Cyber Safety crossword puzzle
Across
  1. A secret word or phrase used to authenticate access to a system or account.
  2. The process of converting information into a secure format to prevent unauthorized access.
  3. Software designed to detect and remove malicious software from a computer.
  4. A software update that fixes vulnerabilities and improves security.
Down
  1. A method of authentication that requires two different forms of identification to access an account.
  2. A copy of data stored separately to prevent data loss in case of a cyber attack or system failure.
  3. The process of installing the latest versions of software to protect against vulnerabilities
  4. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
  5. A network security system that monitors and controls incoming and outgoing network traffic.
  6. A Virtual Private Network that creates a secure connection over the internet.

10 Clues: A software update that fixes vulnerabilities and improves security.Software designed to detect and remove malicious software from a computer.A secret word or phrase used to authenticate access to a system or account.A Virtual Private Network that creates a secure connection over the internet....

Kiewit Cyber Security Awareness 2022 2022-09-15

Kiewit Cyber Security Awareness 2022 crossword puzzle
Across
  1. ___must be 14 characters long, including upper case, lower case, and special characters
  2. Use____________ information only for the purposes for which it was collected.
  3. A security incident or compromise can occur even with security ________ and security awareness training in place.
  4. Ensure downloaded ____________ is properly licensed and authorized before installing.
  5. _________________attacks, such as spear phishing and CEO Fraud, involve research on the target before the attack is launched.
Down
  1. Safe ______ handling practices are critical at each step of accessing, sharing, transmitting, retaining, and destroying ______.
  2. When somebody sends an e-mail with a link to a bogus website it is called______.
  3. Users should_________their systems when leaving them unattended.
  4. This can slow down your computer AND watch everywhere you go on the internet.
  5. A software used to perform malicious actions.
  6. Chief Information Security Officer
  7. Kiewit may ___________ your internet usage.
  8. Kiewit systems will automatically lock after ______ failed attempts.

13 Clues: Chief Information Security OfficerKiewit may ___________ your internet usage.A software used to perform malicious actions.Users should_________their systems when leaving them unattended.Kiewit systems will automatically lock after ______ failed attempts.Use____________ information only for the purposes for which it was collected....

RU ITEC41 2025-04-18

RU ITEC41 crossword puzzle
Across
  1. Converting data into a secure format to prevent unauthorized access.
  2. Protection of data and systems from cyber threats.
  3. Ensuring information is only accessible to authorized individuals.
  4. Safeguarding data from unauthorized access or damage.
  5. Legal rights over creations, such as digital content.
  6. Legal entitlements related to digital privacy and data.
  7. A weakness that can be exploited in a system.
  8. Deceptive attempts to acquire sensitive information, often via email.
  9. Software designed to disrupt or damage systems.
  10. Unauthorized access to or exposure of data.
Down
  1. Limiting access to data or systems based on authorization.
  2. The accuracy and consistency of data.
  3. Responsibility for actions and decisions, especially regarding data.
  4. Permission granted for the use of personal data.
  5. Illegal activities conducted through digital means.
  6. The trace of an individual's online activity.
  7. Defense against digital threats and attacks.
  8. Monitoring or tracking of online activity.
  9. Unauthorized access to systems or networks.
  10. The right to keep personal information secure and undisclosed.

20 Clues: The accuracy and consistency of data.Monitoring or tracking of online activity.Unauthorized access to systems or networks.Unauthorized access to or exposure of data.Defense against digital threats and attacks.The trace of an individual's online activity.A weakness that can be exploited in a system.Software designed to disrupt or damage systems....

Ketimpangan smansabat25 2025-01-18

Ketimpangan smansabat25 crossword puzzle
Across
  1. Ancaman di dalam perangkat lunak
  2. Menyusup sistem computer Tanpa izin
  3. kelompok prentas asal Rusia
  4. yang dapat menimbulkan sybercrime
  5. kasus cybercrime yang terjadi tahun 2022
  6. apa saja serangan cyber
  7. langkah melindungi privasi online
  8. Kejahatan yang memanfaatkan data
  9. Serangaki kode sekali pakai
  10. Tiket terbesar indonesia
  11. apa arti internet aman
  12. Ancaman di lakukan menyisipkan
Down
  1. Korban kejahatan cyber
  2. apa saja jenis² hacker
  3. bully Penindasan secara online melalui internet
  4. Informasi tidak benar internet
  5. Apasaja jenis serangan cybercrime
  6. siapa pendiri cisa
  7. Memancing korban memberikan identitas
  8. inisial dari pelaku peretasan website

20 Clues: siapa pendiri cisaKorban kejahatan cyberapa saja jenis² hackerapa arti internet amanapa saja serangan cyberTiket terbesar indonesiakelompok prentas asal RusiaSerangaki kode sekali pakaiInformasi tidak benar internetAncaman di lakukan menyisipkanAncaman di dalam perangkat lunakKejahatan yang memanfaatkan datayang dapat menimbulkan sybercrime...

PHW Compliance Week 2024-10-08

PHW Compliance Week crossword puzzle
Across
  1. 2. You should call the _____________ to report a suspected or known violation.
  2. 3. Wrongful or criminal deception intended to result in financial or personal gain.
  3. 14. Any possible ______________ event should be reported to the compliance team as soon as it is discovered.
  4. 13. Compliance _____________ is my favorite time of the year!
  5. 4. The Compliance program is supported by _____________ and Procedures.
  6. 9. Abusive, Offensive or Discriminatory remarks are what type of abuse?
  7. 8. PHW will strictly prohibit and will not tolerate any form of ___________ or bullying.
  8. 7. All _______________ are responsible for the information in the Code of Conduct and Compliance Program and will be held accountable for failing to comply.
Down
  1. 6. An official inspection of an individual’s or organization’s accounts.
  2. 15. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the __________ home page.
  3. 1. The _________________ Officer is responsible for implementing and supporting the effectiveness of the Compliance Program.
  4. 5. Computer Security.
  5. 10. All employees are required to complete these in Centene University by the assigned due dates.
  6. 12. Sending an email securely means it has been _____________________.
  7. 11. FWA stands for Fraud, ____________ and Abuse.

15 Clues: 5. Computer Security.11. FWA stands for Fraud, ____________ and Abuse.13. Compliance _____________ is my favorite time of the year!12. Sending an email securely means it has been _____________________.4. The Compliance program is supported by _____________ and Procedures.9. Abusive, Offensive or Discriminatory remarks are what type of abuse?...

August 2020 Newsletter Crossword Puzzle 2020-08-07

August 2020 Newsletter Crossword Puzzle crossword puzzle
Across
  1. A form of social engineering where an attacker tries to convince a victim to give up valuable information or access to a service or system.
  2. A cyber hacker poses as another person when apprehended for breaking the law.
  3. A cyber criminal uses another person's identity to obtain credit, goods and services.
  4. A type of identity theft where a theft uses a person’s name, address, and social security number to file a fraudulent tax return.
Down
  1. This activity involves rummaging through trash for personal information.
  2. A technique used by an individual to discreetly watch or listen to others providing valuable personal information.
  3. A type of identity theft when a hacker assumes another person's identity to obtain prescriptions.
  4. A type of identity theft where a hacker poses as another person when apprehended for a crime.
  5. A cyber criminal uses another person's information to assume his or her identity in daily life.
  6. A minor’s identity is used for an impostor’s personal gain.

10 Clues: A minor’s identity is used for an impostor’s personal gain.This activity involves rummaging through trash for personal information.A cyber hacker poses as another person when apprehended for breaking the law.A cyber criminal uses another person's identity to obtain credit, goods and services....

Security Terminology Puzzle (Participation 3) 2023-01-27

Security Terminology Puzzle (Participation 3) crossword puzzle
Across
  1. security program looking for malware
  2. multiple devices trying to flood a site in order to shut it down
  3. malicious software
  4. a network of computers used to carry out cyberattacks
  5. a unique string of numbers that identifies a device
  6. virtual private network
  7. online harassment
  8. media manipulation of an image or video to create a false reality
  9. attack that exploits a vulnerability in software for the first time
  10. collecting private information without consent
  11. tries to gather your private information
  12. cyber attack to tricks users into clicking on hidden elements
Down
  1. wifi that is public to everyone in range
  2. when sensitive data was leaked
  3. an attack that wants money for access to your system back
  4. protection against unauthorized access to data
  5. protection codes
  6. malware that appears to be harmless
  7. a method of scrambling data so only authorized users have access
  8. a trend in which people use person devices instead of work provided devices

20 Clues: protection codesonline harassmentmalicious softwarevirtual private networkwhen sensitive data was leakedmalware that appears to be harmlesssecurity program looking for malwarewifi that is public to everyone in rangetries to gather your private informationprotection against unauthorized access to datacollecting private information without consent...

INFORMATIKA XI MIPA 2_04 2023-10-15

INFORMATIKA XI MIPA 2_04 crossword puzzle
Across
  1. Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
  2. keluarga sistem operasi komputer pribadi
  3. Metode autentikasi terhadap akses dengan memberitahukan kunci
  4. karakteristik penting robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
  5. Pusat jaringan dengan koneksi tertinggi dalam topologi
  6. aplikasi operasi angka komputer dengan komponen beberapa cell
  7. perangkat lunak
  8. embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
Down
  1. Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
  2. Tingkat ancaman tertinggi
  3. Fungsi database management system untuk memastikan data sesuai aturan
  4. Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
  5. perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
  6. Reduced Intruction Set Computer
  7. Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan banyan topologi sederhana dua komputer
  8. Sesuatu yang diberikan
  9. Metode air terjun pada pembagian tahapan dalam pengembangan sistem
  10. perekam kamera video
  11. Sistem keamanan pada file sistem operasi
  12. segmen angka yang digunakan pada dunia digital

20 Clues: perangkat lunakperekam kamera videoSesuatu yang diberikanTingkat ancaman tertinggiReduced Intruction Set Computerkeluarga sistem operasi komputer pribadiSistem keamanan pada file sistem operasisegmen angka yang digunakan pada dunia digitalPusat jaringan dengan koneksi tertinggi dalam topologi...

INFORMATIKA XI MIPA 2_04 2023-10-16

INFORMATIKA XI MIPA 2_04 crossword puzzle
Across
  1. Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
  2. karakteristik penting pada robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
  3. perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
  4. Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
  5. Pusat jaringan dengan koneksi tertinggi dalam topologi
  6. Sesuatu yang diberikan
  7. Metode air terju pada pembagian tahapan dalam pengembangan sistem
  8. Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan topologi sederhana dua komputer
  9. aplikasi operasi angka komputer dengan komponen beberapa cell
  10. keluarga sistem operasi komputer pribadi
Down
  1. Fungsi database management system untuk memastikan data sesuai aturan
  2. segmen angka yang digunakan pada dunia digital
  3. Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
  4. perangkat lunak
  5. Sistem keamanan pada file sistem operasi
  6. Metode autentikasi terhadap akses dengan memberitahukan kunci
  7. Tingkat ancaman tertinggi
  8. Embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
  9. perekam kamera video
  10. Reduced Intruction Set Computer

20 Clues: perangkat lunakperekam kamera videoSesuatu yang diberikanTingkat ancaman tertinggiReduced Intruction Set ComputerSistem keamanan pada file sistem operasikeluarga sistem operasi komputer pribadisegmen angka yang digunakan pada dunia digitalPusat jaringan dengan koneksi tertinggi dalam topologi...

News notes week 5 2025-09-24

News notes week 5 crossword puzzle
Across
  1. KInd of attack that wreak havoc for air travel
  2. Place that had deadly Attack
  3. Person that was named WNBA MVP for a record 4th time
  4. age golfer pledged to keep golfing
  5. Day that Jimmy Kimmel returned
  6. Fmr Bengals running back that died at 45
  7. Type of animal that killed trainer
  8. Name of storm that went from Ohio to Hong kong
  9. airline company that had to have an emergency landing
  10. Name of person found guilty of trump assasination
Down
  1. Place that boosts security for U.N. meeting
  2. actor injured on spiderman set
  3. Nfl team's "tush push" that faced renewed scrutiny
  4. kind of racing park where cessna crashed
  5. person who returns to their live show
  6. Number of arrests for the plot to crash NYC phone towers
  7. Number of people that went to Charlie Kirk memorial
  8. reason why delta jet had to have an emergency landing
  9. Place that had a tiger attack the trainer
  10. medication that leads to autism

20 Clues: Place that had deadly Attackactor injured on spiderman setDay that Jimmy Kimmel returnedmedication that leads to autismage golfer pledged to keep golfingType of animal that killed trainerperson who returns to their live showkind of racing park where cessna crashedFmr Bengals running back that died at 45Place that had a tiger attack the trainer...

cyber 2023-03-08

cyber crossword puzzle
Across
  1. internet
  2. danger
  3. texto
  4. empathie
  5. violence
  6. bipes
  7. signaler
  8. ignorer
  9. aide
Down
  1. cyberespace
  2. securité
  3. localisation
  4. professeur
  5. public
  6. jeunesse
  7. bloque

16 Clues: aidetextobipesdangerpublicbloqueignorersecuritéinternetempathiejeunesseviolencesignalerprofesseurcyberespacelocalisation

Cyber Bulling 2022-05-05

Cyber Bulling crossword puzzle
Across
  1. where does cyber bullying take place
  2. the percent of people who have experienced cyber bullying in the last 6 months
  3. what sort of phones can be used in cyberbullying
  4. who could be cyber bullied
Down
  1. who can you talk to if somebody in the class is sending you mean messages
  2. what’s it called when you watch someone be bullied and do nothing
  3. what’s one thing you can do if you have been cyber bullying someone but you want to stop
  4. who do you call if you feel unsafe or think some will hurt you
  5. who deserves to be Cyber bullied
  6. you should stop and _ before posting something online

10 Clues: who could be cyber bulliedwho deserves to be Cyber bulliedwhere does cyber bullying take placewhat sort of phones can be used in cyberbullyingyou should stop and _ before posting something onlinewho do you call if you feel unsafe or think some will hurt youwhat’s it called when you watch someone be bullied and do nothing...

INFORMATIKA XI MIPA 2_04 2023-10-15

INFORMATIKA XI MIPA 2_04 crossword puzzle
Across
  1. Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
  2. Metode air terju pada pembagian tahapan dalam pengembangan sistem
  3. Reduced Intruction Set Computer
  4. Tingkat ancaman tertinggi
  5. Metode autentikasi terhadap akses dengan memberitahukan kunci
  6. perekam kamera video
  7. Fungsi database management system untuk memastikan data sesuai aturan
  8. karakteristik penting robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
  9. Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan banyan topologi sederhana dua komputer
Down
  1. Pusat jaringan dengan koneksi tertinggi dalam topologi
  2. Sistem keamanan pada file sistem operasi
  3. Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
  4. aplikasi operasi angka komputer dengan komponen beberapa cell
  5. Embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
  6. Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
  7. perangkat lunak
  8. perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
  9. Sesuatu yang diberikan
  10. keluarga sistem operasi komputer pribadi
  11. segmen angka yang digunakan pada dunia digital

20 Clues: perangkat lunakperekam kamera videoSesuatu yang diberikanTingkat ancaman tertinggiReduced Intruction Set ComputerSistem keamanan pada file sistem operasikeluarga sistem operasi komputer pribadisegmen angka yang digunakan pada dunia digitalPusat jaringan dengan koneksi tertinggi dalam topologi...

Kaelyn's Crossword 2024-09-13

Kaelyn's Crossword crossword puzzle
Across
  1. Used to type phrases
  2. Any device
  3. An interal part of a device
  4. blocks computer virus
  5. Another word for a search engine
  6. You need this cord to connect to the internet
  7. Connects to online
  8. An extra security measure
  9. Processes the computers data
  10. An external part of a device
  11. A screen that views what is on the device
Down
  1. Microsoft windows or macOS would be an example of this
  2. Another word for small files
  3. A device most used to research or access the internet
  4. A device that connects an electronic to the internet
  5. Giving credit to a documentation
  6. A type of wire used to connect many devices
  7. Holds content
  8. A cyber attack
  9. Digital record of data tracking
  10. A device that most people carry around
  11. Used to store photos and information
  12. Something needed to access online content
  13. A type of link
  14. Speeds up the computer proccess
  15. Used to screen capture and takes recordings

26 Clues: Any deviceHolds contentA cyber attackA type of linkConnects to onlineUsed to type phrasesblocks computer virusAn extra security measureAn interal part of a deviceAnother word for small filesProcesses the computers dataAn external part of a deviceDigital record of data trackingSpeeds up the computer proccessGiving credit to a documentation...

Project Three Part Two 2021-10-15

Project Three Part Two crossword puzzle
Across
  1. Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
  2. a kind of bullying or harassment that takes place via the internet.
  3. The skill of writing and solving codes, or the study of codes.
  4. a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
  5. cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
  6. a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
  1. Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
  2. the technique of defending vital systems and sensitive data against cyber-attacks.
  3. any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
  4. A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.

10 Clues: The skill of writing and solving codes, or the study of codes.a kind of bullying or harassment that takes place via the internet.the technique of defending vital systems and sensitive data against cyber-attacks.A person in an existing photograph or video is replaced with someone else's likeness in synthetic media....

CH5.1 The Internet 2023-11-29

CH5.1 The Internet crossword puzzle
Across
  1. a link that can be created to allow you to quickly find a web page again
  2. a network of bots that are created to carry out a DDoS attack.
  3. a network component where the web pages for a website are stored
  4. a type of software that scans a computer or device with the purpose of finding and removing malware.
  5. the collection of all the web pages and websites that have been made available
  6. the method of processing all the web page data, such as HTML, to display the web page
  7. small text file that is used to store personal data, by a web browser
  8. a text-based identification that is given to a user that identifies the level of access that they have to stored data and resources
  9. a collection of web pages, normally about a related topic or purpose
  10. a type of digital currency that uses encryption procedures
  11. the physical structure, such as all the components and cables, that are used to connect devices
Down
  1. script used to produce any of the interactive elements of a web page
  2. a software based cyber issue that automatically creates popup advertisements
  3. a single page within a website
  4. a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
  5. a type of malicious software that is downloaded onto a user's computer or device
  6. the section of a web browser where you type the web page address
  7. the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack
  8. a set of rules for transmitting data
  9. a method that is used to track all the transactions made with a cryptocurrency

20 Clues: a single page within a websitea set of rules for transmitting dataa type of digital currency that uses encryption proceduresa network of bots that are created to carry out a DDoS attack.a network component where the web pages for a website are storedthe section of a web browser where you type the web page address...

Puzzle No. 2 2022-09-08

Puzzle No. 2 crossword puzzle
Across
  1. A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
  2. Ensuring that authorized users have access to information and associated assets when required.
  3. These fix general software problems and provide new security patches where criminals might get in.
  4. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  5. Sentence-like format of password which is strong but easier to remember.
  6. A weakness in your security policy, implementation, design, and controls.
  7. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
  8. You should not write down your password in this type of physical medium.
Down
  1. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  2. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  3. Ensuring that information is accessible only to those authorized to have access.
  4. An event that will cause harm to you or your asset.
  5. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  6. ”________ is everyone’s responsibility”.
  7. Safeguarding the accuracy and completeness of information.

15 Clues: ”________ is everyone’s responsibility”.An event that will cause harm to you or your asset.Safeguarding the accuracy and completeness of information.Sentence-like format of password which is strong but easier to remember.You should not write down your password in this type of physical medium....

Security 2023-04-18

Security crossword puzzle
Across
  1. physical or logical subnet that separates an internal network from the internet
  2. It is usually better to lose functionality rather than security.
  3. Hides the data being transferred between parties.
  4. The most common method of tracking a customer accessing an organization’s website is by assigning a unique
  5. Analyzes running code while simulating outside, or “black box” attacks.
  6. is the point where data transfers from the intranet to the internet and vice-versa.
  7. Verifies that the data has not been forged or tampered with.
  8. is a set of algorithms that specifies details such as which shared encryption keys, or session keys, will be used for that particular session.
  9. This type of ethical hacker attempts to break into the application in order to detect vulnerabilities and find potential attack vectors with the aim of protecting the system from a real attack
  10. critical data should be maintained in the event of catastrophic system failure.
  11. is at the root of many security issues.
Down
  1. is the monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
  2. Confidentiality, integrity, and availability
  3. aims to detect security holes from day one in order to prevent security issues
  4. This principle dictates that each task, process, or user is granted the minimum rights required to perform its job.
  5. an attacker can maliciously inject JavaScript into an application running on the victim’s browser.
  6. This requires developers to check their code as they are writing it to ensure that security issues are not being introduced during development.
  7. ensure that a user is who they say they are.

18 Clues: is at the root of many security issues.Confidentiality, integrity, and availabilityensure that a user is who they say they are.Hides the data being transferred between parties.Verifies that the data has not been forged or tampered with.It is usually better to lose functionality rather than security....

Security 2025-11-19

Security crossword puzzle
Across
  1. this is used to show the building is clear
  2. if reporters come into question we refer them to this department
  3. Fire safety is who's responsibility?
  4. you can use this to identify the robber or vehicle
  5. you do this if a fire is to big to contain
  6. how many fire extinguishers are in the building
  7. The acronym for using a fire extinguisher
  8. extortion is kept here
  9. where is our safe meeting spot
Down
  1. We have this many handheld alarms in our branch
  2. this amount is dispensed in a robbery
  3. We use this name to respond if we are in danger
  4. what is the current all clear sign
  5. robbery checklist is kept here
  6. true or false? do not block fire pull stations
  7. this four step emergency plan to guide in a fire situation
  8. dispense keys
  9. Rbfcu has these type of fire extinguishers

18 Clues: dispense keysextortion is kept hererobbery checklist is kept herewhere is our safe meeting spotwhat is the current all clear signFire safety is who's responsibility?this amount is dispensed in a robberyThe acronym for using a fire extinguisherthis is used to show the building is clearyou do this if a fire is to big to contain...

Cyber Ethics 2025-06-15

Cyber Ethics crossword puzzle
Across
  1. using another's work without proper credit.
  2. illegal intrusion into a computer system
  3. the act of bullying or harassing individuals online.
  4. fake news or misleading information online
  5. unauthorized copying or distribution of digital content.
  6. the process of verifying someone's identity online.
  7. manipulating digital media to spread false information.
Down
  1. software designed to detect, prevent and remove malicious programs from a computer system.
  2. fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  3. the practice of protecting networks and systems from cyber threats.
  4. unwanted or unsolicited digital messages.
  5. encryption method ensuring data security during transmission.
  6. the set of polite and respectful behavior expected in online communication.
  7. software designed to harm or exploit computer systems.
  8. the right to control access personal information online.
  9. someone who hacks into one's computer system illegally.
  10. computer virus that disguises itself as a harmless program.

17 Clues: illegal intrusion into a computer systemunwanted or unsolicited digital messages.fake news or misleading information onlineusing another's work without proper credit.the process of verifying someone's identity online.the act of bullying or harassing individuals online.software designed to harm or exploit computer systems....

Cybercrime Crossword 2025-10-22

Cybercrime Crossword crossword puzzle
Across
  1. a popular cryptocurrency of a dog that has become a meme
  2. A section of the internet that is used for illegal intent
  3. A digital aid that protects
  4. An email scam trying to steal login credentials, starts with "PH"
  5. completely digital currency
  6. a network security system that monitors tragic, often referred to as a wall
  7. the first and most well known crypto currency
  8. general term for malicious software
Down
  1. deliberate deception to make personal gain
  2. when sensitive information is accessed or disclosed without authorization when someone gets through your data.
  3. an unauthorized person who gains access to a system
  4. scrambling data to protect from unauthorized access
  5. software or code that takes advantage
  6. a deceptive scheme used to trick someone out of money
  7. malware that encrypts and demands money
  8. software that secretly monitors a user's data.
  9. the target of a cyber attack.

17 Clues: A digital aid that protectscompletely digital currencythe target of a cyber attack.general term for malicious softwaresoftware or code that takes advantagemalware that encrypts and demands moneydeliberate deception to make personal gainthe first and most well known crypto currencysoftware that secretly monitors a user's data....

cyber bullying 2013-06-04

cyber bullying crossword puzzle
Across
  1. Be __________for your words and actions online as ought you take charge of your own words.
  2. Sending the same message to many people on the Internet.
  3. do not ________ or reply after you are cyber bullied.
  4. ______ bullying is to bully others online.
  5. when you are cyber bullied, __________the incident to an adult.
  6. cyber bullying can ______ people’s feelings as they will feel sad
Down
  1. cyber bullying is using the ________________or phone to repeatedly say rude and hurtful things about a person.
  2. do not use _____________ in your speech on the internet.
  3. _________ is online manners.
  4. when you tell an adult, always ________ the evidence as it will help crack the case.

10 Clues: _________ is online manners.______ bullying is to bully others online.do not ________ or reply after you are cyber bullied.do not use _____________ in your speech on the internet.Sending the same message to many people on the Internet.when you are cyber bullied, __________the incident to an adult....

DEAR 2024-12-17 2024-12-17

DEAR 2024-12-17 crossword puzzle
Across
  1. Which cyber security company was mentioned in the article?
  2. Which month did the cyberattack happen?
Down
  1. Cyberattacks have also caused disruption to ____________.
  2. Some customers have been unable to make _________ orders due to the attack.
  3. Due to the cyberattack, Krispy Kreme have lost digital ________.
  4. Krispy Kreme has 1,400 ________ worldwide.

6 Clues: Which month did the cyberattack happen?Krispy Kreme has 1,400 ________ worldwide.Cyberattacks have also caused disruption to ____________.Which cyber security company was mentioned in the article?Due to the cyberattack, Krispy Kreme have lost digital ________.Some customers have been unable to make _________ orders due to the attack.

Abby Puttin- Bullying 2020-11-30

Abby Puttin- Bullying crossword puzzle
Across
  1. Someone who stands up to the bully.
  2. Someone who's doing the bullying.
  3. The "B" in the ABC's of bullying.
  4. Type of bullying, spreading rumors,or excluding
  5. Type of cyber bullying that is pretending to be someone.
  6. The "D" in the ABC's of bullying.
  7. Type of bullying online.
Down
  1. Type of bullying, name calling or threatening.
  2. Someone who stands by and watches.
  3. Someone who is attacked in the bullying.
  4. Type of cyber that is tricking someone into revealing personal information.
  5. The "A" in the ABC's of bullying.
  6. Type of bullying that is attacking.
  7. The "C" in the ABC's of bullying.

14 Clues: Type of bullying online.Someone who's doing the bullying.The "B" in the ABC's of bullying.The "A" in the ABC's of bullying.The "C" in the ABC's of bullying.The "D" in the ABC's of bullying.Someone who stands by and watches.Someone who stands up to the bully.Type of bullying that is attacking.Someone who is attacked in the bullying....

Cybersecurity Fundamental Chapter 7 2024-06-05

Cybersecurity Fundamental Chapter 7 crossword puzzle
Across
  1. A model used in cybersecurity to describe the stages of an information systems attack.
  2. Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
  3. The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
  4. The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
  5. A technology used for tracking and identifying objects using radio waves.
  6. The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
  7. The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
  8. The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
  1. The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
  2. The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
  3. Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
  4. Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
  5. The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
  6. The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
  7. Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
  8. Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.

16 Clues: A technology used for tracking and identifying objects using radio waves.A model used in cybersecurity to describe the stages of an information systems attack.The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Cyber security for kids 2022-02-02

Cyber security for kids crossword puzzle
Across
  1. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  3. players interact with objects displayed on a screen for the sake of entertainment.
  4. a secret word or phrase that must be used to gain admission to a place.
  5. a link from a hypertext document to another location, activated by clicking on a highlighted word or image.
Down
  1. the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. designed to detect and destroy computer viruses.
  3. facts provided or learned about something or someone.
  4. protect (a network or system) from unauthorized access.

9 Clues: designed to detect and destroy computer viruses.facts provided or learned about something or someone.protect (a network or system) from unauthorized access.a secret word or phrase that must be used to gain admission to a place.players interact with objects displayed on a screen for the sake of entertainment....

Modules 18 to 20 Crossword 2023-03-31

Modules 18 to 20 Crossword crossword puzzle
Across
  1. Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
  2. A weakness in a system or its design that could be exploited by a threat actor.
  3. BYOD means Bring Your Own ____
  4. This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
  5. The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
  1. Any potential danger to an asset.
  2. This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
  3. This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
  4. A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
  5. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.

10 Clues: BYOD means Bring Your Own ____Any potential danger to an asset.A weakness in a system or its design that could be exploited by a threat actor.This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector....

Gradline Crossword 2017-05-20

Gradline Crossword crossword puzzle
Across
  1. The ______ HSE Day has been introduced across Woodside recently (7)
  2. Name of the malware from the recent cyber security incident (8)
  3. The ninth Golden Safety Rule (10,2,6)
  4. What the letter T represents in TBOSIET (8)
Down
  1. Woodside employees participated in this HBF-sponsored event (3,3,1,6)
  2. Public speaking organisation starting up at Woodside (12)
  3. A quiz night on 25th May supported this charity (8)
  4. The type of laces being given out for IDAHOT day (7)

8 Clues: The ninth Golden Safety Rule (10,2,6)What the letter T represents in TBOSIET (8)A quiz night on 25th May supported this charity (8)The type of laces being given out for IDAHOT day (7)Public speaking organisation starting up at Woodside (12)Name of the malware from the recent cyber security incident (8)...

Risky Clues 2025-06-25

Risky Clues crossword puzzle
Across
  1. A voice-based scam technique
  2. Use a ______ password to protect your accounts
  3. Latest wireless security protocol for networks
  4. Avoid using this kind of free network in public places
  5. An internal framework that shapes the administration of an organisation
  6. Leakage Unauthorised exposure of sensitive information
  7. Risk Umbrella term for various threats for an organisation
  8. Risk Risk due to obligations or failures in external agreements
  9. Media Avoid these websites on official devices
Down
  1. A calculated step to soften the blow of what might go wrong
  2. Regulation that governs how personal information is stored.
  3. Always lock your system when you leave it
  4. If you find yourself in cyber threat, call me
  5. System or process failing to work as intended
  6. A type of cyberattack using fake emails
  7. Intentional deception for personal or financial gain
  8. Security Protect this sensitive information of clients
  9. Known exposure despite controls
  10. Register Structured risk documentation tool
  11. Controls Tools used to prevent confidential info from leaving the system

20 Clues: A voice-based scam techniqueKnown exposure despite controlsA type of cyberattack using fake emailsAlways lock your system when you leave itRegister Structured risk documentation toolIf you find yourself in cyber threat, call meSystem or process failing to work as intendedUse a ______ password to protect your accounts...

Chapter 3 Activity 2024-09-11

Chapter 3 Activity crossword puzzle
Across
  1. Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
  2. A harmful program that resides in the active memory of the computer and duplicates itself
  3. The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
  4. What organization is mentioned as a resource for cybersecurity guidance?
  5. An attack on an information system that takes advantage of a particular system vulnerability
  6. Software that generates and grades tests that humans can pass but computer programs cannot
  7. The process of scrambling messages or data in such a way that only authorized parties can read it
  8. What federal agency is responsible for protecting U.S. cyber infrastructure?
  9. Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
  10. Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
  11. The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
  12. A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
  13. An attack that occurs before the security community is aware of a vulnerability
  14. Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
  15. Federal Laws: Addresses fraud and related activities in association with computers
Down
  1. Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
  2. A specific sequence of bytes that indicates the presence of a previously identified virus
  3. What type of phishing specifically targets an organization's employees?
  4. Malware that encrypts data and demands a ransom
  5. What does BYOD mean?
  6. A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
  7. What type of attack floods a target with data requests to make a site unavailable?
  8. Many organizations use this to monitor, manage, and maintain their computer and network security
  9. Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
  10. Perpetrators: An individual whose goal is to promote a political ideology
  11. Confidentiality, Integrity, Availability
  12. Federal Laws: Defines cyberterrorism and associated penalties
  13. Phishing using SMS
  14. A networking device that connects multiple networks and transmits data packets between networks
  15. What type of malware disguises itself as legitimate software?

30 Clues: Phishing using SMSWhat does BYOD mean?Confidentiality, Integrity, AvailabilityMalware that encrypts data and demands a ransomFederal Laws: Defines cyberterrorism and associated penaltiesWhat type of malware disguises itself as legitimate software?What type of phishing specifically targets an organization's employees?...

Cyber Fraud 2024-12-09

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

Safe Browsing 2025-05-27

Safe Browsing crossword puzzle
Across
  1. unethical hacker
  2. software program or piece of hardware to screen out hackers, viruses, worms that try to reach computer over internet
  3. Vital Information Resources Under Seize.
  4. Information and Communication Technology
  5. threatening over internet
  6. application of technologies to protect programs, data, users from cyber attacks and the risk of using internet
  7. software for identifying, deleting and fixing malicious software.
  8. misleading people by sending email or link pretending its from a trusted organisation or person for stealing their personal details.
  9. a file stores information about visiting of websites in the browser.
  10. malicious software for damaging computer
Down
  1. person hacks information with permission
  2. act of breaking security code of digital devices.
  3. people gain by accessing data remotely in an unauthorized manner.
  4. protect original works of authorship including text, image, music etc
  5. Crime through internet

15 Clues: unethical hackerCrime through internetthreatening over internetperson hacks information with permissionVital Information Resources Under Seize.Information and Communication Technologymalicious software for damaging computeract of breaking security code of digital devices.people gain by accessing data remotely in an unauthorized manner....

Networking concept 2025-06-11

Networking concept crossword puzzle
Across
  1. – A program that detects and removes malicious software.
  2. – Someone who illegally gains access to computer systems.
  3. – Shared elements in a network, like printers, files, or servers.
  4. – A security system that monitors and controls network traffic.
  5. Address – A unique number that identifies a device on a network.
  6. System – Software that manages computer hardware and software resources.
  7. – A digital message sent over the internet between users.
  8. – A device that directs data between networks.
  9. – A cyber attack that tricks users into revealing sensitive information.
Down
  1. – Using digital platforms to harass or intimidate others.
  2. – Online promotion or marketing meant to attract attention or sales.
  3. – Unwanted or junk messages sent in bulk, usually via email.
  4. – The global network that connects computers and devices worldwide.
  5. – The physical or logical arrangement of a network.
  6. – Harmful software like viruses, worms, or trojans.

15 Clues: – A device that directs data between networks.– The physical or logical arrangement of a network.– Harmful software like viruses, worms, or trojans.– A program that detects and removes malicious software.– Using digital platforms to harass or intimidate others.– Someone who illegally gains access to computer systems....

Digital Technology Crossword 2021-08-23

Digital Technology Crossword crossword puzzle
Across
  1. a notation resembling a simplified programming language, used in program design.
  2. facts and statistics collected together for reference or analysis
  3. the imparting or exchanging of information by speaking, writing or using some other medium
  4. the process of assigning a code to something for classification or identification
  5. the notional environment in which communication over computer networks occurs
  6. the machines, wiring, and other physical components of a computer or other electronic system
  7. a pocket-sized computer that introduces you to how software and hardware work together
  8. a high-level general-purpose programming language.
  9. a positional numeral system employing 2 as the base and so requiring only two different symbols for its digits
  10. an electronic device for storing and processing data, usually in binary form
Down
  1. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  2. is a block of code that can be referenced by name to run the code it contains.
  3. the process of converting information or data into a code, especially to prevent unauthorised access
  4. the information about a particular person that exists on the internet as a result of their online activity
  5. a web-based environment for learning to code with physical computing devices such as the micro:bit
  6. a group or system of interconnected computers
  7. The individual 1's and 0's you see in binary
  8. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardised communication protocols.
  9. security the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
  10. the process or activity of writing a computer program

20 Clues: The individual 1's and 0's you see in binarya group or system of interconnected computersa high-level general-purpose programming language.the process or activity of writing a computer programfacts and statistics collected together for reference or analysisan electronic device for storing and processing data, usually in binary form...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Hack Con Cyber Security 2022-04-01

Hack Con Cyber Security crossword puzzle
Across
  1. authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
  2. a network security device that monitors and filters incoming and outgoing network traffic
  3. a way of scrambling data so that only authorized parties can understand the information
  4. an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
  5. wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
  1. hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
  2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. malware that employs encryption to hold a victim's information for profit.
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers

9 Clues: malware that employs encryption to hold a victim's information for profit.a way of scrambling data so that only authorized parties can understand the informationa network security device that monitors and filters incoming and outgoing network traffic...

Cyber Security Month Crossword 2024-09-24

Cyber Security Month Crossword crossword puzzle
Across
  1. Malicious software that demands payment to restore access
  2. Software designed to disrupt or damage a computer
  3. Malicious program disguised as legitimate software
  4. Process of converting information into a code to prevent unauthorized access
  5. Fraudulent attempt to obtain sensitive information
Down
  1. Network security device that monitors and controls traffic
  2. Software that secretly collects user data
  3. Secure connection over the internet, hiding user location
  4. Software designed to detect and eliminate viruses

9 Clues: Software that secretly collects user dataSoftware designed to disrupt or damage a computerSoftware designed to detect and eliminate virusesMalicious program disguised as legitimate softwareFraudulent attempt to obtain sensitive informationMalicious software that demands payment to restore access...

Cybersecurity Crossword Puzzle 2023-05-15

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
  2. is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
  3. -factor authentication is a second layer of security that protects our networks from cyber-attack.
  4. Alert Button We report phishing by using the
  5. threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
  1. is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
  2. Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
  3. such as curiosity, urgency, greed, and fear are used in phishing emails.
  4. can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.

9 Clues: Alert Button We report phishing by using thesuch as curiosity, urgency, greed, and fear are used in phishing emails.-factor authentication is a second layer of security that protects our networks from cyber-attack.can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data....

Cyber Security Month 2020 2020-09-18

Cyber Security Month 2020 crossword puzzle
Across
  1. people who engages in criminal activity by means of computers or the Internet (2 words)
  2. type of software that helps protect your computer against malware and cybercriminals
  3. a broad range of data that could identify an individual (2 words)
  4. a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
  5. attacks that use email or malicious websites to infect your machine
Down
  1. means of sending or receiving information, such as telephone lines or computers
  2. the process of converting information or data into a code, especially to prevent unauthorized access
  3. a secret word or phrase that must be used to gain admission to something
  4. an email or electronic communications scam targeted towards a specific individual, organization or business

9 Clues: a broad range of data that could identify an individual (2 words)attacks that use email or malicious websites to infect your machinea secret word or phrase that must be used to gain admission to somethingmeans of sending or receiving information, such as telephone lines or computers...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Cyber Security Crossword 0123 2022-12-30

Cyber Security Crossword 0123 crossword puzzle
Across
  1. Emails sent to trick users to reveal their sensitive information.
  2. Unauthorized softwares installed on computer to gather sensitive information
  3. Phishing Techniques used to target CEO,CFO etc.
  4. Just going behind an authorized person into a secured area
  5. Existence of weakness in a system or network
Down
  1. Scrambling of text in order to ensure the security of data/ information
  2. Technique of Hiding data behind a photo
  3. Software designed to help the user's computer detect viruses & avoid them
  4. Socially or politically motivated hackers
  5. Sending bulk messages by abusing electronic messaging system

10 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Just going behind an authorized person into a secured areaSending bulk messages by abusing electronic messaging system...

Cyber Security Month 2023 2023-09-27

Cyber Security Month 2023 crossword puzzle
Across
  1. Word, phrase, or image that you can click on to jump to a new document or a new section, or webpage
  2. A secret word or phrase that must be used to gain admission to something
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. General term for sending or receiving information, such as telephone lines or email
  5. A broad range of data that could identify an individual (Two Words)
Down
  1. A person who engages in criminal activity by means of computer or internet (Two words)
  2. An email or electronic communication scam targeted towards a specific individual, organization, or business (Two Words)
  3. Attacks that use email or malicious websites to infect your machine
  4. Type of software that helps protect your computer against malware and cyber criminals

9 Clues: Attacks that use email or malicious websites to infect your machineA broad range of data that could identify an individual (Two Words)A secret word or phrase that must be used to gain admission to somethingGeneral term for sending or receiving information, such as telephone lines or email...

Cyber security crossword puzzle 2025-03-18

Cyber security crossword puzzle crossword puzzle
Across
  1. A technique of verifying identities before granting access to information.
  2. The practice of keeping sensitive information in private and secure places.
  3. Preventing attackers from gathering personal or sensitive information about you.
  4. Management The action of identifying and managing risks in an organization’s security plan.
  5. A social engineering technique where attackers attempt to manipulate victims using fake identities.
  6. Keeping track of who accesses sensitive information and when.
Down
  1. A method used to ensure that only authorized users can access sensitive data.
  2. The process of verifying a person’s identity through various means, like passwords, biometrics, or tokens.
  3. The act of notifying employees about security risks and best practices.

9 Clues: Keeping track of who accesses sensitive information and when.The act of notifying employees about security risks and best practices.A technique of verifying identities before granting access to information.The practice of keeping sensitive information in private and secure places....

Cyber Security Cross Word 2025-05-21

Cyber Security Cross Word crossword puzzle
Across
  1. Scrambling data so only the right person can read it (10 letters)
  2. Blocks unwanted access to or from a network (8 letters)
  3. A weakness in a system a threat actor can take advantage of (13 letters)
Down
  1. Tool used to hide your internet activity (3 letters)
  2. A formal set of rules or guidelines for maintaining security (6 letters)
  3. Fake emails that trick you into giving personal info (9 letters)
  4. Software that blocks computer viruses (9 letters)
  5. A term for harmful software (7 letters)
  6. A type of malware that can be attached to a legitimate file. (5 letters)

9 Clues: A term for harmful software (7 letters)Software that blocks computer viruses (9 letters)Tool used to hide your internet activity (3 letters)Blocks unwanted access to or from a network (8 letters)Fake emails that trick you into giving personal info (9 letters)Scrambling data so only the right person can read it (10 letters)...

Security Lingo 2019-02-14

Security Lingo crossword puzzle
Across
  1. When a cyber criminal sends fake emails or links to gather information or spread malware.
  2. When someone gains access to an area they aren't supposed to be in by following behind other people.
  3. A type of malware that locks or exposes your information unless you pay a ransom.
  4. A security system designed to monitor and prevent unauthorized access to a network.
  5. When an attacker tries to get you to reveal information over the phone.
Down
  1. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  2. A flaw in software or a system that that leaves it open to cyber attack.
  3. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
  4. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  5. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.
  6. Software that is designed to do damage or perform unwanted actions on a computer system.
  7. A type of malware that secretly tracks your keystrokes.

12 Clues: A type of malware that secretly tracks your keystrokes.When an attacker tries to get you to reveal information over the phone.A flaw in software or a system that that leaves it open to cyber attack.A type of malware that locks or exposes your information unless you pay a ransom....

How well do you know security lingo? 2019-02-14

How well do you know security lingo? crossword puzzle
Across
  1. When an attacker tries to get you to reveal information over the phone.
  2. A type of malware that locks or exposes your information unless you pay a ransom.
  3. Software that is designed to do damage or perform unwanted actions on a computer system.
  4. When someone gains access to an area they aren't supposed to be in by following behind other people.
  5. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  6. When a cyber criminal sends fake emails or links to gather information or spread malware.
  7. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
Down
  1. A type of malware that secretly tracks your keystrokes.
  2. A security system designed to monitor and prevent unauthorized access to a network.
  3. A flaw in software or a system that that leaves it open to cyber attack.
  4. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  5. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.

12 Clues: A type of malware that secretly tracks your keystrokes.When an attacker tries to get you to reveal information over the phone.A flaw in software or a system that that leaves it open to cyber attack.A type of malware that locks or exposes your information unless you pay a ransom....

Holiday Cyber Safety Crossword 2023-11-20

Holiday Cyber Safety Crossword crossword puzzle
Across
  1. Tis the e-Season. Safeguard your Online ________.
  2. When shopping online make sure to double-checking the websites ___ to verify that the website is not fake.
  3. On the last day November every year, it is _______ security day.
  4. The biggest online shopping day of the year. Cyber _______.
  5. The name for the Friday after Thanksgiving
  6. Every year, the ______ week of November is, Fraud Awareness Week.
  7. Scammers are known to hijack ____ cards during the holiday season.
Down
  1. The “P” when referencing PII identity protection.
  2. Small pieces of code stored on your computer when visiting a website.
  3. Preferred holiday payment method. Second only to cash.

10 Clues: The name for the Friday after ThanksgivingTis the e-Season. Safeguard your Online ________.The “P” when referencing PII identity protection.Preferred holiday payment method. Second only to cash.The biggest online shopping day of the year. Cyber _______.On the last day November every year, it is _______ security day....

CYBERCRIME INVESTIGATION 2021-07-19

CYBERCRIME INVESTIGATION crossword puzzle
Across
  1. refers to a set of instructions executed by the computer to achieve intended results.
  2. the interactional space or environment created by linking computers together into a communication network.
  3. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  4. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  5. means any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds
  6. the system of hardware,software, facilities and service components that support the delivery of business systems and digital-enabled processes.
  7. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  8. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  9. It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
  10. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
  11. refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
  12. refers to the transmission of information through ICT media, including voice, video and other forms of data.
  13. t is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
  14. refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
  15. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  16. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  17. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175, Cyber Crime Prevention Act of 2012, DICT National Cyber Security 2022, and R.A. 10173, Data Privacy Act of 2012.
  18. refers to a secret code which secures and defends sensitive information that cross over public channels into a form decipherable only with a matching electronic key.
  19. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  20. is acquired and integrated to deliver and support the business outcomes, and the service objectives of cybercrime prevention and privacy protected data collection, retention, transmission, utilization, presentation, sharing, repurposing, and disposal.
  21. is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
  22. represents the definitive view of the of privacy rights, privacy principles and security measuresin the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  23. is preservation of confidentiality, integrity and availability of
Down
  1. The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  2. The access to the whole or any part of a computer system without right.
  3. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
  4. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
  5. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
  6. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  7. refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
  8. physical security is most sensitive component, as prevention from cybercrime. Computer network should be protected from access of unauthorized persons.
  9. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
  10. means transferring, or otherwise disposing of, to another, or obtaining control of, with intent to transfer or dispose of.
  11. refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
  12. is about single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.
  13. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  14. It is when personal information is made accessible due to negligence and without being authorized by any existing law.
  15. refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  16. malicious software programs which are infiltrated into computers disguised as benign applications or data.
  17. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
  18. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  19. physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error,accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
  20. The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  21. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  22. terrorist activity that targets computer networks and information systems for attack.
  23. the act of copying digital material posted online into the storage medium on one’s computer.
  24. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,
  25. refers to a computer or a computer network, the electronic medium in which online communication takes place.
  26. is the condition of being protected
  27. the right to be left alone; freedom from observation and interference from others.

50 Clues: is the condition of being protectedis preservation of confidentiality, integrity and availability ofThe access to the whole or any part of a computer system without right.the right to be left alone; freedom from observation and interference from others.refers to a set of instructions executed by the computer to achieve intended results....

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity crossword puzzle
Across
  1. The practice of protecting computers and networks from digital threats like hackers and viruses.
  2. Harmful software designed to damage or disrupt systems
  3. Unwanted or junk email messages
  4. Someone who breaks into computer systems, often illegally
  5. A secret string used to verify identity
  6. A scam where attackers trick you into giving up personal info via fake emails
Down
  1. Cyber Security Awareness Month is observed in ---?
  2. A type of malware disguised as a legitimate program
  3. A digital barrier that blocks unauthorized access to a network
  4. Software that detects and removes viruses and other malwares
  5. The name you use to log into a computer or website account.
  6. A copy of your data saved in case something goes wrong

12 Clues: Unwanted or junk email messagesA secret string used to verify identityCyber Security Awareness Month is observed in ---?A type of malware disguised as a legitimate programHarmful software designed to damage or disrupt systemsA copy of your data saved in case something goes wrongSomeone who breaks into computer systems, often illegally...

Cyber Bullying Crossword Puzzle 2013-06-04

Cyber Bullying Crossword Puzzle crossword puzzle
Across
  1. do not _______ or reply to cyber bullies.
  2. ______ is flooding others with too much unnecessary information .
  3. we must ___ the evidence when cyber bullied.
  4. tell your ______ at home or teachers in school when you are cyber bullied.
  5. cyber bullying is saying _______and hurtful things about a person.
  6. do not post things that will__________ or hurt others.
Down
  1. be______ for your words and action online.
  2. netiquette is having good ____online.
  3. _________others when online by helping them and speaking positively.
  4. we must be _______ when visiting online social networking sites.

10 Clues: netiquette is having good ____online.we must ___ the evidence when cyber bullied.do not _______ or reply to cyber bullies.be______ for your words and action online.do not post things that will__________ or hurt others.______ is flooding others with too much unnecessary information ....

ACTIVITY 1: Crossword Puzzle 2A 2024-04-30

ACTIVITY 1: Crossword Puzzle 2A crossword puzzle
Across
  1. Relating to digital technology.
  2. Bullying online.
  3. Protection from harm.
  4. Protecting digital systems.
  5. Control over personal information.
  6. Malicious software.
  7. Connected to the internet.
  8. Fraudulent information request.
  9. Having knowledge and using technology safely and effective
  10. Malicious self-replicating code.
  11. Software to access websites.
  12. Unique characteristics of an individual.
  13. Interconnected computers.
  14. Intentional attack on systems.
  15. Global computer network.
  16. Secret access code.
  17. Traces of online activity.
  18. Unsolicited messages.
  19. Criminal activities online.
  20. Hardware with a function.
  21. Deceptive scheme.
  22. Information in digital form.
  23. Computer programs.
Down
  1. Relating to society.
  2. the ability to analyze and evaluate infomation.
  3. A cyber attack that redirects website traffic to a fraudulent site
  4. Organized and meaningful data.
  5. Unauthorized system access.
  6. Moral principles online.
  7. Traces of online activity.
  8. Verifying user identity.
  9. Making a copy of data to protect against loss or damage
  10. Practices for cybersecurity.
  11. Communication channels.
  12. Protecting systems from attacks.
  13. Converting data into code.
  14. Ability to use digital tools.
  15. Understanding cybersecurity threats.
  16. Laws governing cyberspace.
  17. Membership in a country.
  18. Unauthorized use of personal information.
  19. Network security system.
  20. A secret codr used to access a computer system or online account
  21. Data stored by websites.
  22. Knowledge or perception of a situation.
  23. Dual authentication.
  24. Software to detect and remove viruses.
  25. Device forwarding data.
  26. Physical computer components.
  27. Measures for protection.
  28. Unauthorized data access.

51 Clues: Bullying online.Deceptive scheme.Computer programs.Malicious software.Secret access code.Relating to society.Dual authentication.Protection from harm.Unsolicited messages.Communication channels.Device forwarding data.Moral principles online.Verifying user identity.Membership in a country.Network security system.Data stored by websites....

Know Your Oragnisation! 2023-07-14

Know Your Oragnisation! crossword puzzle
Across
  1. Engineering Landscape
  2. An initiative powered by Women in Tech; a platform for everyone to connect with prominent leaders on different topics from innovations to work-life balance
  3. Biggest Truck Manufacturing Plant in World
  4. One of the the Purpose (SMART)
  5. One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck
  6. Employees engagement committee
  7. Newest addition to truck series
  8. People System that reflects the whole spectrum of our HR development environment
Down
  1. New Innitiative for R&D on Battery and e-Powertrain
  2. Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing
  3. The Daimler Truck Legal & Compliance Chatbot
  4. Committe for preventing Harassment
  5. One of the Values

13 Clues: One of the ValuesEngineering LandscapeOne of the the Purpose (SMART)Employees engagement committeeNewest addition to truck seriesCommitte for preventing HarassmentBiggest Truck Manufacturing Plant in WorldThe Daimler Truck Legal & Compliance ChatbotNew Innitiative for R&D on Battery and e-Powertrain...

October's Blackink Crossword 2024-09-24

October's Blackink Crossword crossword puzzle
Across
  1. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. process of converting information or data into a code to prevent unauthorized access.
  3. type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. maximum rate of data transfer across a given path, measured in bits per second (bps).
  5. method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
  6. A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
  7. A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
  1. A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  2. delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
  3. A method of trying to gather personal information using deceptive e-mails and websites.

10 Clues: process of converting information or data into a code to prevent unauthorized access.maximum rate of data transfer across a given path, measured in bits per second (bps).A method of trying to gather personal information using deceptive e-mails and websites....

cyber 2021-09-30

cyber crossword puzzle
Across
  1. is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
  2. The dark web refers to sites and services that aren't indexed by search engines
  3. Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
  4. A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
  5. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
  6. Hardening is the process by which something becomes harder or is made harder.
  7. a method or pathway used by a hacker to access or penetrate the target system.
Down
  1. Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
  2. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  3. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
  4. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  5. Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
  6. A computer worm is a type of malware that spreads copies of itself from computer to computer.
  7. Phreaking is a slang term for hacking into secure telecommunication networks.
  8. A computer program that can copy itself and infect a computer without permission or knowledge of the user.

15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks.Hardening is the process by which something becomes harder or is made harder.a method or pathway used by a hacker to access or penetrate the target system.The dark web refers to sites and services that aren't indexed by search engines...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

CS Month Week 4 2023-09-14

CS Month Week 4 crossword puzzle
Across
  1. Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.
  2. List of approved entities, such as IP addresses or applications, allowed access to a network or system, enhancing security.
  3. Malicious code or software delivered as part of an attack, causing harm once executed.
  4. Unauthorized interception of private conversations or data transmission, often accomplished through network monitoring.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
Down
  1. Ethical Hacker who identifies security vulnerabilities to help organizations improve their systems’ defenses.
  2. Authentication method using unique physical or behavioral traits (fingerprint, facial recognition) for identity verification.
  3. Cyber attack that redirects users from legitimate websites to fake ones, often for the purpose of collecting data.

8 Clues: Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.Malicious code or software delivered as part of an attack, causing harm once executed.Software designed to detect, prevent, and remove malicious software from a computer or network....

Cybersecurity Month 2023-07-24

Cybersecurity Month crossword puzzle
Across
  1. (Hint: Make a copy of your important files for safety)
  2. (Hint: Your data is well-protected and out of harm's way)
  3. (Hint: Being informed and cautious about online risks)
  4. (Hint: Keep your personal information confidential)
  5. (Hint: A secret code you create to protect your accounts)
  6. (Hint: Ensure your online accounts and devices are protected)
  7. (Hint: Converting data into secret code to keep it safe)
Down
  1. (Hint: Relating to computers and the internet)
  2. (Hint: Regularly install software improvements for better security)
  3. (Hint: A protective barrier that keeps hackers out)
  4. (Hint: Secure your device with a digital key)
  5. (Hint: Harmful software that can damage your computer)
  6. (Hint: Tricky schemes to deceive you online)
  7. (Hint: A harmful computer program that can spread)
  8. (Hint: Only rely on reputable sources and websites)
  9. (Hint: Deceptive emails or messages trying to steal your info)

16 Clues: (Hint: Tricky schemes to deceive you online)(Hint: Secure your device with a digital key)(Hint: Relating to computers and the internet)(Hint: A harmful computer program that can spread)(Hint: A protective barrier that keeps hackers out)(Hint: Keep your personal information confidential)(Hint: Only rely on reputable sources and websites)...

Information Security 2023-07-25

Information Security crossword puzzle
Across
  1. The practice of securing communication and data in the presence of adversaries.
  2. - Providing proof of the origin or delivery of data to protect against denial by one of the parties involved.
  3. - Ensuring that data remains unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed.
  4. - The methodical approach to managing the aftermath of a security breach or cyber attack, also known as an IT incident, computer incident, or security incident.
  5. - Protecting information from being accessed by unauthorized parties.
Down
  1. Determining what permissions an authenticated user has within a system.
  2. - Adhering to laws and regulations relating to protecting and managing data.
  3. - The process of identifying, assessing, and controlling threats to an organization's digital assets.
  4. The process of verifying the identity of a user, device, or system.
  5. - The practice of gathering, analyzing, and reporting on data in a way that is legally admissible.

10 Clues: The process of verifying the identity of a user, device, or system.- Protecting information from being accessed by unauthorized parties.Determining what permissions an authenticated user has within a system.- Adhering to laws and regulations relating to protecting and managing data....

Trial 2021-03-13

Trial crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised floor
  2. Internet prefix

4 Clues: Raised floorInternet prefixThe gaining of knowledgeState of bring free from danger

Trial 2021-03-13

Trial crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised Platform
  2. Internet prefix

4 Clues: Raised PlatformInternet prefixThe gaining of knowledgeState of bring free from danger

Cybersecurity Compliance 2024-05-24

Cybersecurity Compliance crossword puzzle
Across
  1. Scammers use ______ tactics to try to get a fast response.
  2. If you suspect a link or attachment may be suspicious, _______ download it.
  3. A good password is __________ for you, but difficult for others to guess.
  4. If you believe you've clicked a bad link, notify _____ immediately.
  5. Malware is most likely to enter an organization through __________.
  6. Never ____________ old passwords.
  7. Malicious links disguised as legitimate messages.
  8. Be wary of ______________ attachments.
Down
  1. Each should be unique and complicated.
  2. Our e-mail security system is called __________.
  3. Scams can come through e-mail,_______, phone call, or even in person.
  4. No platform is ________ to breaches.
  5. Using a work device for _________ use increases the risk of a cyber threat.
  6. Two-factor __________ protects your account by requiring a second identity verification.
  7. Don't use obvious __________ changes like substituting a number for a letter.
  8. Passwords should never be __________ with anyone.
  9. If you feel you have fallen prey to a scammer, notify CHN or ___________.
  10. 65% of people _________ passwords.
  11. 80% of breaches are related to stolen or ________ passwords.

19 Clues: Never ____________ old passwords.65% of people _________ passwords.No platform is ________ to breaches.Each should be unique and complicated.Be wary of ______________ attachments.Our e-mail security system is called __________.Passwords should never be __________ with anyone.Malicious links disguised as legitimate messages....

cyber 2021-09-28

cyber crossword puzzle
Across
  1. Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.
  2. Point where the false acceptance rate and false rejection rate are equal.
  3. Physical token inserted into a computer’s USB port.
  4. Database of the network resources on a Microsoft network.
  5. Security strategy in which a user can be granted additional rights to data beyond what is allowed by his or her assigned access level.
  6. Authentication method using measurement and analysis of a biological feature.
  7. Process of validating a user.
Down
  1. Authentication method identifying measurable patterns in human activities.
  2. Allows semi-independent systems to work together so users of one system can access resources from another system.
  3. Ratio of the number of false acceptances divided by the number of identification attempts.
  4. Those a user receives through another object, such as a group.
  5. Ratio of the number of false rejections divided by the number of identification attempts.
  6. Those a user is given at a specific location, such as a folder or a file.
  7. Users cycle through different roles.
  8. Those a user receives by default at a lower level.

15 Clues: Process of validating a user.Users cycle through different roles.Those a user receives by default at a lower level.Physical token inserted into a computer’s USB port.Database of the network resources on a Microsoft network.Those a user receives through another object, such as a group....

Contest 2021-03-13

Contest crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised floor
  2. Internet prefix

4 Clues: Raised floorInternet prefixThe gaining of knowledgeState of bring free from danger

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat, pressure, etc. in order to make a machine
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting Sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberlsnd are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting Sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberlsnd are______...

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat etc. in order to make a machine do sth
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberland are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberland are______...

Cyber Fraud 2024-11-27

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

Security 2023-03-12

Security crossword puzzle
Across
  1. Armed service which deploys drones abroad
  2. Agency known as MI6
  3. Country of significant threat to UK security
  4. Travel document required to visit another country
  5. Service agency known as MI5
  6. Shortened name of Cabinet Office Briefing Room
  7. Location of twin towers attacked on 11/09/02
Down
  1. Police force that leads on terrorism
  2. Process by which a person becomes an extremist
  3. Govt department who oversees police & prison services
  4. Enemy states known as HSAs
  5. Lincolnshire RAF base that has the Eurofighter
  6. Location of 2017 arena attack
  7. UK official who chairs COBRA meetings
  8. Country invaded by Russia in February 2022
  9. Agency that protects UK borders
  10. Agency that deals with communications intelligence

17 Clues: Agency known as MI6Enemy states known as HSAsService agency known as MI5Location of 2017 arena attackAgency that protects UK bordersPolice force that leads on terrorismUK official who chairs COBRA meetingsArmed service which deploys drones abroadCountry invaded by Russia in February 2022Country of significant threat to UK security...

CROSSWORD 2018-01-11

CROSSWORD crossword puzzle
Across
  1. /The first binding international treaty on cybercrime was drafted here.
  2. /The convergence of cyberspace and terrorism.
  3. /The country backed a convention for combating cybercrime that was rejected at the 12th UN Congress on Crime Prevention and Criminal Justice.
  4. /This Commission guides the activities of the United Nations in the field of crime prevention and criminal justice.
  5. /Organisation intended to promote policies that will improve the economic and social well-being of people around the world.
  6. /An expert group that handles computer security incidents.
Down
  1. /Something that transcends the geographical barriers of nations.
  2. /A phrase used in the field of internet governance to describe governments' desire to exercise control over the Internet within their own borders.
  3. /Coordinates its 21-membered economies to promote cyber security, and to tackle the risks brought about by cybercrime.

9 Clues: /The convergence of cyberspace and terrorism./An expert group that handles computer security incidents./Something that transcends the geographical barriers of nations./The first binding international treaty on cybercrime was drafted here....

TOPIC 4: STORAGE MANAGEMENT 2024-12-05

TOPIC 4: STORAGE MANAGEMENT crossword puzzle
Across
  1. Secondary storage
  2. The ability to recover the operating system machine to the identical state that it was at a given time
  3. report accuracy of the list
  4. the most active data
  5. restricting the scope of an initiator to a particular target in fabric
  6. supports unlimited online data storage
  7. process of periodically saving data in some other device which different from its hard disk
  8. describes strategies of an organization to fight against potential disasters
  9. components of a database application system
  10. An electronic holding place for instructions and data
Down
  1. cyber-security term that refers to a flaw in a system
  2. Group discussion of recovery, operations, resumption, plans, and procedures
  3. Helps them detect real issues more easily
  4. if disk or RAID fail, booting can be done from CD or …?
  5. types of computer memory

15 Clues: Secondary storagethe most active datatypes of computer memoryreport accuracy of the listsupports unlimited online data storageHelps them detect real issues more easilycomponents of a database application systemcyber-security term that refers to a flaw in a systemAn electronic holding place for instructions and data...

DSA Coding Club CodeQuest 2025-03-13

DSA Coding Club CodeQuest crossword puzzle
Across
  1. A car brand that updates like a smartphone
  2. Created an AI that talks almost like a human
  3. He wants to take humans to Mars
  4. The foundation of every website, but not a programming language
  5. The secret behind interactive buttons and pop-ups
  6. Where your photos live when your phone storage is full
  7. The go-to place for answers (and ads)
Down
  1. The modern designer’s digital sketchbook
  2. Rebranded itself for a virtual future
  3. The backbone of Bitcoin and NFTs
  4. Speeds up UI with reusable components
  5. A virtual assistant that doesn’t need coffee breaks
  6. The OS that powers most servers but not your grandma’s laptop
  7. The invisible bridge between apps and services
  8. It learns, predicts, and sometimes makes mistakes
  9. Controls the look but not the logic of a webpage
  10. A language that’s easy to learn but powerful to use
  11. Often paired with "security" or "attack"
  12. Helps developers time travel through their code

19 Clues: He wants to take humans to MarsThe backbone of Bitcoin and NFTsRebranded itself for a virtual futureSpeeds up UI with reusable componentsThe go-to place for answers (and ads)The modern designer’s digital sketchbookOften paired with "security" or "attack"A car brand that updates like a smartphoneCreated an AI that talks almost like a human...

dampak sosial informatika 2024-04-24

dampak sosial informatika crossword puzzle
Across
  1. Tempat di mana orang bertemu secara virtual dan membentuk komunitas
  2. Perlunya keamanan cyber untuk melindungi data sensitif
  3. Ketidaksetaraan akses terhadap teknologi informasi di antara berbagai kelompok masyarakat
  4. Pembelajaran jarak jauh menggunakan teknologi digital
  5. Fenomena di mana orang merasa rendah diri karena membandingkan kehidupan mereka dengan apa yang diposting orang lain di media sosial
Down
  1. Penyalahgunaan informasi pribadi untuk tujuan yang merugikan
  2. Istilah untuk menggambarkan kecanduan terhadap penggunaan internet
  3. Istilah untuk menggambarkan pembatasan akses ke informasi online
  4. Perilaku agresif atau pelecehan yang terjadi secara online
  5. Fenomena di mana berita palsu menyebar dengan cepat melalui platform media sosial

10 Clues: Pembelajaran jarak jauh menggunakan teknologi digitalPerlunya keamanan cyber untuk melindungi data sensitifPerilaku agresif atau pelecehan yang terjadi secara onlinePenyalahgunaan informasi pribadi untuk tujuan yang merugikanIstilah untuk menggambarkan pembatasan akses ke informasi online...

Cyberland Magazine Crossword Puzzle 2021-05-06

Cyberland Magazine Crossword Puzzle crossword puzzle
Across
  1. virtual vacancy
  2. misguide in virtual world
  3. virtual tyranny
  4. safeness of virtual world
  5. science of virtual fields
  6. acts of virtual world
Down
  1. being literate in virtual world
  2. virtual assault
  3. half human half robot
  4. virtual offense
  5. virtual
  6. pirate of cyber world

12 Clues: virtualvirtual vacancyvirtual tyrannyvirtual assaultvirtual offensehalf human half robotpirate of cyber worldacts of virtual worldmisguide in virtual worldsafeness of virtual worldscience of virtual fieldsbeing literate in virtual world

Security 2023-03-12

Security crossword puzzle
Across
  1. Armed service which deploys drones abroad
  2. Agency known as MI6
  3. Country of significant threat to UK security
  4. Travel document required to visit another country
  5. Service agency known as MI5
  6. Shortened name of Cabinet Office Briefing Room
  7. Location of twin towers attacked on 11/09/02
Down
  1. Police force that leads on terrorism
  2. Process by which a person becomes an extremist
  3. Govt department who oversees police & prison services
  4. Enemy states known as HSAs
  5. Lincolnshire RAF base that has the Eurofighter
  6. Location of 2017 arena attack
  7. UK official who chairs COBRA meetings
  8. Country invaded by Russia in February 2022
  9. Agency that protects UK borders
  10. Agency that deals with communications intelligence

17 Clues: Agency known as MI6Enemy states known as HSAsService agency known as MI5Location of 2017 arena attackAgency that protects UK bordersPolice force that leads on terrorismUK official who chairs COBRA meetingsArmed service which deploys drones abroadCountry invaded by Russia in February 2022Country of significant threat to UK security...

CYBER & DIGITAL LITERACY crossword puzzle 2024-04-30

CYBER & DIGITAL LITERACY crossword puzzle crossword puzzle
Across
  1. Status of a member in a community.
  2. Protection for computer systems.
  3. Knowledge or perception.
  4. Legal standards governing the internet.
  5. Global network connecting millions of computers.
  6. Connected to the internet.
  7. Moral guidelines for digital behavior.
  8. Relating to society.
  9. Data conveyed or represented.
  10. Protection against cyber threats.
  11. Attempt to damage or disrupt computers.
  12. Software to access the internet.
  13. Practices for maintaining system health.
  14. Communication outlets or tools.
  15. Protection against threats.
  16. Programs and other operating information.
  17. Skills to effectively use digital technology.
  18. Conversion of data into secure code.
  19. Verification of credentials.
  20. Group of connected computers.
  21. Pertaining to computers or electronics.
  22. Software that detects and removes malware.
  23. Barrier against network intrusion.
  24. Collected information.
Down
  1. Barrier against network intrusion.
  2. Fraudulent attempt to obtain sensitive information.
  3. Investigating digital crimes
  4. Secrecy of personal information.
  5. Ethics in techonology use.
  6. Stealing personal information for fraud.
  7. Tool made for a specific use.
  8. Understanding of online safety risks.
  9. Etiquette in online communication.
  10. Personal characteristics defining an individual.
  11. Data files stored on computers.
  12. Physical parts of a computer.
  13. Harassment using electronic means.
  14. Device that forwards data packets.
  15. Protection from harm or danger.
  16. Verification of credentials.
  17. Crime involving computers.
  18. Unauthorized access to data.
  19. Deceptive scheme or trick.
  20. Unsolicited digital messages.
  21. Record of one's online activity.
  22. Secret code for access.
  23. Trace left by activity.
  24. Enhanced security method requiring two steps.
  25. People who break into computers.
  26. Malicious software.

50 Clues: Malicious software.Relating to society.Collected information.Secret code for access.Trace left by activity.Knowledge or perception.Ethics in techonology use.Connected to the internet.Crime involving computers.Deceptive scheme or trick.Protection against threats.Investigating digital crimesVerification of credentials.Unauthorized access to data....

Year 11 GCSE 2025-05-01

Year 11 GCSE crossword puzzle
Across
  1. A network that covers a large geographical area
  2. Hardware and software that together form a system
  3. A number system using only the digits 0 and 1
  4. A type of software that helps maintain or enhance the computer system
  5. A legal framework governing the use and storage of personal data
  6. A method of reducing the amount of data required to store a file
  7. A type of network where all devices are connected to a central hub or switch
  8. A table showing the output of a logic gate or circuit for all possible inputs
  9. The part of the CPU that performs arithmetic and logical operations
  10. A collection of organised data
  11. A type of cyber threat that attempts to trick users into revealing sensitive information
  12. The number of bits used to represent the colour of a single pixel
Down
  1. A type of network that connects devices within a limited geographical area
  2. Software that performs tasks for the user
  3. A security method that restricts access to a network based on physical address
  4. A global network of interconnected computer networks
  5. A security method that uses mathematical algorithms to scramble data
  6. A measure of the number of samples taken per second when digitising sound
  7. The main circuit board of a computer
  8. Software that controls and manages the computer hardware and provides a platform for application software
  9. Temporary storage for frequently accessed data or instructions
  10. The component of a computer that carries out instructions

22 Clues: A collection of organised dataThe main circuit board of a computerSoftware that performs tasks for the userA number system using only the digits 0 and 1A network that covers a large geographical areaHardware and software that together form a systemA global network of interconnected computer networks...

TSA Acronyms 2022-03-28

TSA Acronyms crossword puzzle
Across
  1. Liquid Container Screening
  2. Transportation Security Officer
  3. Transportation Security Administration
  4. Federal Security Director
  5. Federal Flight Deck Officer
  6. Travel Document Checker
  7. Explosive Trace Detection
  8. Hand Held Metal Detector
  9. Selectee
  10. Advanced Imaging Technology
  11. Property Search Officer
Down
  1. Law Enforcement Officer
  2. Walk Through Metal Detector
  3. Lead Transportation Security Officer
  4. Assistant Federal Director
  5. Transportation Security Manager
  6. Explosive Detection System
  7. Department Of Homeland Security
  8. Divestiture Officer
  9. Supervisor Transportation Security Officer

20 Clues: SelecteeDivestiture OfficerLaw Enforcement OfficerTravel Document CheckerProperty Search OfficerHand Held Metal DetectorFederal Security DirectorExplosive Trace DetectionLiquid Container ScreeningAssistant Federal DirectorExplosive Detection SystemWalk Through Metal DetectorFederal Flight Deck OfficerAdvanced Imaging Technology...

Online safety(1) 2020-03-02

Online safety(1) crossword puzzle
Across
  1. This type of software does the same thing as malware.
  2. Only ___ should see your private information.
  3. Never arrange a meeting with a person you only know ___.
  4. Short for something that is between you and the server.
  5. You have no control of this when using public Wi-Fi.
Down
  1. Cyber criminals want you to do this to malware.
  2. Try not to ___ you to another person online.
  3. A fun, social and creative place online. It is also a good place for research.
  4. If a website is marked with this it is a secure website.
  5. Having a ___ between internet and real life is important.

10 Clues: Try not to ___ you to another person online.Only ___ should see your private information.Cyber criminals want you to do this to malware.You have no control of this when using public Wi-Fi.This type of software does the same thing as malware.Short for something that is between you and the server....

Technology 2025-01-06

Technology crossword puzzle
Across
  1. any program or file that's intentionally harmful to a computer
  2. a flaw or error in a computer program
  3. any small device with a particular purpose
  4. an instruction given to an artificial intelligence
  5. a person who seeks to exploit the cyber security vulnerabilities in network infrastructures
Down
  1. made by human work or art, not by nature, not natural
  2. created by computer technology and appearing exist but not existing in the physical world
  3. the set of keys on a computer or typewriter that you press in order to make it work
  4. the name of a search engine
  5. computer programs

10 Clues: computer programsthe name of a search enginea flaw or error in a computer programany small device with a particular purposean instruction given to an artificial intelligencemade by human work or art, not by nature, not naturalany program or file that's intentionally harmful to a computer...

Crossword Corner 2025-10-09

Crossword Corner crossword puzzle
Across
  1. Security protocol framework increasingly used in healthcare APIs (5)
  2. Foundation model type driving GenAI clinical applications (3)
  3. Emerging architecture enabling federated data exchange across trusted health networks (4)
  4. Movement emphasizing explainability in clinical AI models (3)
Down
  1. Cyber threat that exploits legitimate channels to bypass defenses (6)
  2. International terminology standard used in decision support and clinical analytics (6)
  3. Secure environment for controlled API testing and FHIR app pilots (7)
  4. Dominant interoperability framework enabling patient-directed APIs (5)

8 Clues: Foundation model type driving GenAI clinical applications (3)Movement emphasizing explainability in clinical AI models (3)Security protocol framework increasingly used in healthcare APIs (5)Cyber threat that exploits legitimate channels to bypass defenses (6)Secure environment for controlled API testing and FHIR app pilots (7)...

Cybver-Mobbing 2019-05-07

Cybver-Mobbing crossword puzzle
Across
  1. Plattform auf der Cyber-Mobbing stark verbreitet ist
  2. Wo sollte man sich Hilfe holen?
  3. Gefahr im Internet
  4. Wie wird Cyber-Mobbing noch genannt
Down
  1. Telefonnummer die dir mit deinen Problemen hilft
  2. was sollte man bei einem Mobbing-Opfer tun
  3. Cyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden
  4. Englisches Wort für Mobbing

8 Clues: Gefahr im InternetEnglisches Wort für MobbingWo sollte man sich Hilfe holen?Wie wird Cyber-Mobbing noch genanntwas sollte man bei einem Mobbing-Opfer tunTelefonnummer die dir mit deinen Problemen hilftPlattform auf der Cyber-Mobbing stark verbreitet istCyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden

Tech 2023-11-29

Tech crossword puzzle
Across
  1. What do you do in that device?
  2. Computer security center?
Down
  1. Important IT device?
  2. Basic entertainment?

4 Clues: Important IT device?Basic entertainment?Computer security center?What do you do in that device?

Cybersecurity 2024-05-04

Cybersecurity crossword puzzle
Across
  1. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.

10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process.A software update designed to fix security vulnerabilities or address other issues within a program or operating system....

Privacy Awareness Week (May 13-17, 2024) 2024-04-12

Privacy Awareness Week (May 13-17, 2024) crossword puzzle
Across
  1. What term describes the unauthorized access, acquisition, or disclosure of sensitive or confidential information, potentially resulting in harm or loss?
  2. Used to withdraw or withhold consent for the collection, use, and disclosure of their personal health information (PHI) for health care purposes.
  3. What term refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks?
  4. What term describes the voluntary agreement given by an individual for the processing of their personal data for a specific purpose?
  5. What process involves reviewing and evaluating an organization's adherence to established privacy and security measures regarding sensitive information like PHI?
  6. Technique involves attempting to trick individuals into providing sensitive information by pretending to be trustworthy entity.
  7. What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?
  8. What action involves verifying information or details a second time to ensure accuracy or security?
Down
  1. What is the term for the right of individuals to keep their personal information private and away from the public eye?
  2. What technique involves removing personally identifiable information from data sets to protect the privacy of individuals?
  3. What process involves converting plain text or data into a coded form to prevent unauthorized access or interception?
  4. What principle or practice emphasizes keeping sensitive information secret and limiting access to authorized individuals or entities?
  5. What is the term for the unauthorized or covert observation of private or confidential information, often done for malicious purposes?
  6. Any information used to identify the patient?

14 Clues: Any information used to identify the patient?What action involves verifying information or details a second time to ensure accuracy or security?What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?...

Test V1 2024-07-26

Test V1 crossword puzzle
Across
  1. Is the practice of developing and using coded algorithms to protect and mask transmitted information. Leads to the exposition of sensitive data in case of failure.
  2. Is the fact that a data has not been modified, accidentally altered or deleted.
  3. Is a computer or device on a network that manages network resources
  4. Is an incorrect setting leading to vulnerabilities.
  5. Is a type of attack where malicious code is inserted into a program.
Down
  1. Is the combination of security software and appliance solutions to provide the infrastructure needed to protect an organization against cyber attacks.
  2. Is a recording format that allows contextualization at a given moment.
  3. Is a procedure used to certify the identity of a person or a computer.
  4. Is the ability to ensure data security
  5. Is an weakness that could be exploited or triggered by a threat source. Is classifies in CVE.

10 Clues: Is the ability to ensure data securityIs an incorrect setting leading to vulnerabilities.Is a computer or device on a network that manages network resourcesIs a type of attack where malicious code is inserted into a program.Is a recording format that allows contextualization at a given moment....

Security Terminology Puzzle (Participation 3) 2023-01-28

Security Terminology Puzzle (Participation 3) crossword puzzle
Across
  1. compromised computers used for cyberattacks
  2. numbers identifying a internet connected device
  3. personal devices in work space
  4. network pro learning hacking techniques
  5. tricking users to click an image
  6. sensitive information thats unreadable
  7. malware that makes you pay
  8. software that is harmful
  9. shield for data
  10. software that checks for malware
  11. A network that encrypts data
  12. malware pretending to be useful
Down
  1. cyber attacks accessing sensitive information
  2. lots of attackers preventing legitimate users
  3. attacks seeking out personal info
  4. software that tracks you
  5. malware that displays adverts
  6. Training to prevent cyber threats
  7. cybercriminals exploiting unauthorized access to computers
  8. internet access at Starbucks

20 Clues: shield for datasoftware that tracks yousoftware that is harmfulmalware that makes you payinternet access at StarbucksA network that encrypts datamalware that displays advertspersonal devices in work spacemalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal info...

Security 2014-01-24

Security crossword puzzle
Across
  1. can be disabled on the OS to prevent hackers from quickly running malicious activity on a machine via USB
  2. a code update that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  3. malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.
  4. a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
  5. software program that displays advertising on your computer, often displayed in a pop-up window
  6. distributed without user intervention or knowledge, monitors activity on the computer
  7. sending enough requests to overload a resource or even stopping its operation
Down
  1. _____ address filtering is a technique used to deploy device-level security on a wireless LAN.
  2. is a specialized chip installed on the motherboard to be used for hardware and software authentication.
  3. compares physical characteristics against stored profiles to authenticate people.
  4. attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
  5. additional security measure. Hardware and or software packages.
  6. is unsolicited email that can be used to send harmful links or deceptive content.
  7. new viruses are always being developed, therefore security software must be continually updated to keep up with the malicious _________ __________.
  8. a self-replicating program that uses the network to duplicate its code to the hosts on the network. Travels silently.
  9. supports robust encryption, providing government-grade security. (most effective way of securing wireless traffic)
  10. a software code that is deliberately created by an attacker. May collect sensitive information or may alter or destroy information.

17 Clues: additional security measure. Hardware and or software packages.sending enough requests to overload a resource or even stopping its operationcompares physical characteristics against stored profiles to authenticate people.is unsolicited email that can be used to send harmful links or deceptive content....

GUESS WITH PUNKT.! 2024-11-14

GUESS WITH PUNKT.! crossword puzzle
Across
  1. A secure area where apps can run without affecting the system (8 letters)
  2. Authentication method using physical characteristics (9 letters)
  3. Virtual network for secure internet connections (3 letters)
  4. Design principle that reduces unnecessary features (10 letters)
  5. A security system that requires two forms of identification (10 letters)
  6. A digital barrier that defends your device from cyber intrusions (8 letters)
Down
  1. Control over one's own data without external interference (15 letters)
  2. Technique that scrambles data to protect it from prying eyes (10 letters)
  3. A digital barrier that defends your device from cyber intrusions (8 letters)
  4. The state of keeping personal information protected from others (7 letters)

10 Clues: Virtual network for secure internet connections (3 letters)Design principle that reduces unnecessary features (10 letters)Authentication method using physical characteristics (9 letters)Control over one's own data without external interference (15 letters)A security system that requires two forms of identification (10 letters)...

Data Security Awareness Crossword 2025-03-03

Data Security Awareness Crossword crossword puzzle
Across
  1. The regulation that protects EU residents’ data
  2. What is the technique that replace, remove or transform information that identifies individuals, and keep that information separate
  3. Which country enforces the PDPA?
  4. What is the process of verifying user identity?
  5. A form of malware designed to extort
  6. What is the second word in the CIA Trian
  7. What is the process of removing personal identifiers from data?
  8. The type of data protected under GDPR
Down
  1. What is the most common method of stealing passwords?
  2. Which cyber attack attempts to guess passwords repeatedly?
  3. What is a security weakness in software called?
  4. What is the unauthorized tracking of user behaviour online?
  5. Which country enforces the CCPA?
  6. medical records, sexual orientation, biometrics are examples of ……. personal information
  7. The process of encoding information in a manner that permits access and comprehension solely by authorised parties.
  8. What is a common attack that floods a network with traffic?

16 Clues: Which country enforces the CCPA?Which country enforces the PDPA?A form of malware designed to extortThe type of data protected under GDPRWhat is the second word in the CIA TrianWhat is a security weakness in software called?The regulation that protects EU residents’ dataWhat is the process of verifying user identity?...

cyber 2021-09-30

cyber crossword puzzle
Across
  1. Phreaking is a slang term for hacking into secure telecommunication networks.
  2. is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
  3. Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
  4. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
  5. A computer worm is a type of malware that spreads copies of itself from computer to computer.
  6. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  7. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
  8. Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
  9. A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
Down
  1. a method or pathway used by a hacker to access or penetrate the target system.
  2. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
  3. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  4. Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
  5. Hardening is the process by which something becomes harder or is made harder.
  6. The dark web refers to sites and services that aren't indexed by search engines

15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks.Hardening is the process by which something becomes harder or is made harder.a method or pathway used by a hacker to access or penetrate the target system.The dark web refers to sites and services that aren't indexed by search engines...

cyber 2025-09-30

cyber crossword puzzle
Across
  1. Client-side script injection (abbr.)
  2. Product exploited by ProxyLogon in 2021
  3. Worm that sabotaged Iranian centrifuges
  4. Tech giant with 2013 breach affecting 3B accounts
  5. 2017 credit bureau breach (~147M)
  6. Classic database attack via un-sanitized input
  7. 2017 global ransomware outbreak using EternalBlue
  8. 2021 Log4j critical RCE (CVE‑2021‑44228)
  9. Network of compromised devices under one controller
Down
  1. Malware category that encrypts files for payment
  2. 2017 wiper-like outbreak spread via MeDoc
  3. Suspected group tied to those Exchange intrusions
  4. Deceptive emails to steal credentials
  5. hidden
  6. 2014 OpenSSL “bleeding heart” bug

15 Clues: hidden2014 OpenSSL “bleeding heart” bug2017 credit bureau breach (~147M)Client-side script injection (abbr.)Deceptive emails to steal credentialsProduct exploited by ProxyLogon in 2021Worm that sabotaged Iranian centrifuges2021 Log4j critical RCE (CVE‑2021‑44228)2017 wiper-like outbreak spread via MeDocClassic database attack via un-sanitized input...