cyber security Crossword Puzzles
Cyber Security Day 2022 Crossword Quiz 2022-10-10
Across
- Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
- An app developed by the National Crime Prevention Council to help fight scam messages and calls which plague mobile phone users.
- Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
- Type of scam that recorded the highest reported cases in Jan-Jun 2022
Down
- Two Factor _______
- Malware designed to deny a user/organization access to files on their computer, demanding a ransom to restore access
6 Clues: Two Factor _______ • Type of scam that recorded the highest reported cases in Jan-Jun 2022 • Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day • Malware designed to deny a user/organization access to files on their computer, demanding a ransom to restore access • ...
Cyber Security #5 2013-06-13
Across
- Computer program that can run independently, propagate a complete working version of itself onto another host network and consume computer resources destructively.
- Malicious logic, often self-replicating. Cannot run by itself.
- Network based on internet technology that an organization uses for its own internal, and usually private purposes that is closed to outsiders.
- The need to ensure that people involved with the company, emplyess ETC are protected from harm.
Down
- A potential for violation of security, exist when there is a circumstance, capability, action, or event that could breach security and caise harm.
- What you are when using a computer or service.Person, organization entity that has access to a system authorized or not.
- A term to describe connecting multiple seperate networks together.
7 Clues: Malicious logic, often self-replicating. Cannot run by itself. • A term to describe connecting multiple seperate networks together. • The need to ensure that people involved with the company, emplyess ETC are protected from harm. • What you are when using a computer or service.Person, organization entity that has access to a system authorized or not. • ...
Cyber Security 4 2024-08-04
Across
- B in WBS
- configuration another observation class in VA
- Action of using code to demonstrate how a vulnerability can be misused
Down
- server - one of the observation class in VA
- process of manually verifying if detection result for vulnerabilities is accurate
- one of the tools used to conduct unauthenticated scan
- Level 3 in CMM framework
7 Clues: B in WBS • Level 3 in CMM framework • server - one of the observation class in VA • configuration another observation class in VA • one of the tools used to conduct unauthenticated scan • Action of using code to demonstrate how a vulnerability can be misused • process of manually verifying if detection result for vulnerabilities is accurate
ENGLISH REVISION 2020-03-04
Across
- _________ bullying is a form of bullying that happens through mobile phones, computer etc.
- Cyber bullying can cause low-confidence and self _________.
- About 9000 of school children being admitted due to being _________ of cyber bullying.
- Remember, ___________, report and tell an adult.
- ________ reveal personal information to strangers on the internet.
Down
- __________ yourself from cyber bullying.
- __________ before you post.
- Always keep _________ safe and often change it.
- A cyber _________ is a person who uses internet to harm others.
- There is so much more in life other than our phones and social ___________.
10 Clues: __________ before you post. • __________ yourself from cyber bullying. • Always keep _________ safe and often change it. • Remember, ___________, report and tell an adult. • Cyber bullying can cause low-confidence and self _________. • A cyber _________ is a person who uses internet to harm others. • ________ reveal personal information to strangers on the internet. • ...
ITS2210 Module 7 Crossword 2019-04-02
Across
- This type of warfare often involves propaganda and disinformation campaigns
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- The NSA and ______ have allegedly had one of their cyber spies caught
- Using the Internet to terrorize someone or some group of individuals
Down
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- This type of loss is the most likely damage to occur in an act of cyber terrorism
- This conflict in 1990 had a cyber warfare component
- A political group that has used the internet for political intimidation
- This virus is an example of domestic cyber terrorism
- Hacking conducted for ideological purposes
10 Clues: Hacking conducted for ideological purposes • This conflict in 1990 had a cyber warfare component • This virus is an example of domestic cyber terrorism • Using the Internet to terrorize someone or some group of individuals • The NSA and ______ have allegedly had one of their cyber spies caught • ...
chocolate cheeseasurus rex prime puzzle 2024-05-24
Across
- kids get cyber bullied more than adults
- help our kids cuz they need you
- cyber bullying is a very serious issue
- our kids are to depressed now
- 60% of kids experience cyber bullying
- imaging your kid depressed for ever
Down
- why are kids cyber bulling
- we are sick of getting bullied online
- cyber bulling is a silly billy
- to frear if you don't help them I will
10 Clues: why are kids cyber bulling • our kids are to depressed now • cyber bulling is a silly billy • help our kids cuz they need you • imaging your kid depressed for ever • we are sick of getting bullied online • 60% of kids experience cyber bullying • cyber bullying is a very serious issue • kids get cyber bullied more than adults • to frear if you don't help them I will
Cybersecurity 2024-10-07
Across
- Protection against unauthorized access to personal data
- A type of malware that encrypts data and demands payment for the decryption key
- The process of checking the identity of a user, device, or entity
- A secure gateway that controls traffic between an internal network and the internet
- Software designed to detect, prevent, and remove malware
- Process of converting data into a secret code to prevent unauthorized access
- The secure process of logging into a system with two layers of security
Down
- The practice of attempting to gain unauthorized access to networks by breaking into systems
- Type of security that protects the flow of data on the internet
- A malicious program designed to harm or exploit any programmable device
- The most common method used by hackers to steal sensitive information through email
- Unauthorized access to a computer system to steal or manipulate data
- A cyber attack that floods a network or service to overwhelm it and make it unavailable
- A weakness or flaw in a computer system that can be exploited by hackers
- The study of secure communication in the presence of adversaries
- An attack where an adversary impersonates another user to gain information
16 Clues: Protection against unauthorized access to personal data • Software designed to detect, prevent, and remove malware • Type of security that protects the flow of data on the internet • The study of secure communication in the presence of adversaries • The process of checking the identity of a user, device, or entity • ...
CONTEMPORARY BANKING FOR SENIORS 2026-01-24
Across
- Using your camera to read a QR code.
- Banking that travels with you on your smartphone.
- Where your money is safely stored in the bank.
- The modern device that has replaced the bank branch.
- The invisible network that connects your phone.
- To send money from your account to a family member.
Down
- The type of "space" or "security" we are discussing.
- What you must always do before closing the app.
- The process of entering your username to start.
- The program on your phone you use for banking.
- Your secret combination of letters and numbers.
- When you are connected to the internet.
- The bond between the student and the senior.
- Our beautiful city where this workshop is held.
14 Clues: Using your camera to read a QR code. • When you are connected to the internet. • The bond between the student and the senior. • The program on your phone you use for banking. • Where your money is safely stored in the bank. • What you must always do before closing the app. • The process of entering your username to start. • ...
Cyber Awareness Crossword 2024-10-01
Across
- The act of ensuring data is kept safe from unauthorized access.
- A visual verification tool used to distinguish humans from bots.
- Stronger than a basic password, this adds an extra layer of security.
- The process of confirming a user’s identity.
- Software designed to track user activity without consent.
Down
- The main goal of Cybersecurity Awareness Month.
- The practice of safeguarding digital information.
- A common method to protect data by encoding it.
- The term for unauthorized access to a network.
- A program that appears legitimate but performs harmful actions.
- A type of software update that protects against vulnerabilities.
- A common cyber threat involving deceptive emails.
12 Clues: The process of confirming a user’s identity. • The term for unauthorized access to a network. • The main goal of Cybersecurity Awareness Month. • A common method to protect data by encoding it. • The practice of safeguarding digital information. • A common cyber threat involving deceptive emails. • Software designed to track user activity without consent. • ...
Industry 5.0 Forensics 2020-10-09
Across
- API-aware networking and security at the kernel layer powered Berkeley packet filter technology
- It defines a system of rules telling what a process is allowed to do in containers
- A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
- It is a tool used by investigators to extract data when there is no app support in drones
- An open-source vulnerability scanner tool that powers CoreOS’s container registry
- Collaborative robots designed for simple and intuitive interaction with humans
- These are special drones used for surveillance that store data on user’s online account
- A software from Nexus that is expected to drive the transformation of an industrial company
Down
- A container security tool manufactured by Aqua
- The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
- Kubernetes based tool with behavioral activity monitoring with deep container visibility
11 Clues: A container security tool manufactured by Aqua • Collaborative robots designed for simple and intuitive interaction with humans • It defines a system of rules telling what a process is allowed to do in containers • An open-source vulnerability scanner tool that powers CoreOS’s container registry • ...
Cyber Security Day 2022 Crossword Quiz 2022-10-10
Across
- Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
- An app developed by the National Crime Prevention Coundil to help fight scam messages and calls which plague mobile phone users.
- Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
- Type of scam that recorded the highest reported cases in Jan-Jun 2022
Down
- Two Factor _______
- Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access
6 Clues: Two Factor _______ • Type of scam that recorded the highest reported cases in Jan-Jun 2022 • Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day • Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access • ...
cyber security quiz 2021-11-05
Across
- when someone looks over someone's shoulder.
- a digital wall which computers have to prevent access to personal information.
- when somebody fakes being a friend saying "help! I'm lost! I need money!" for free money.
Down
- when people disguise as a proper company to ask for details.
- a thing which enters a computer through downloading something of a sketchy website. It comes through the downloaded file.
- to one of the answers, it comes through a fake app download of a sketchy website. It attacks the WIFI in your household.
- a thing that is on your computer. It doesn't need to attach itself to a file, it can also replicate itself.
7 Clues: when someone looks over someone's shoulder. • when people disguise as a proper company to ask for details. • a digital wall which computers have to prevent access to personal information. • when somebody fakes being a friend saying "help! I'm lost! I need money!" for free money. • ...
Cyber Security #2 2013-06-13
Across
- someone ot what something is,the name by which something is known.
- Hinderence of a system operation by placing excess burden on the performance capabilaties of a system.
- Transformaton of data into a form that conceals the datas otininal meaning.
- process of updating software to a different version.
- Finite step by step insrtuctions for a problem solving or a comutation procedure.
Down
- Network point that acts as an entrance to another network. Needs to be protected.
- need to ensure that information is disclosed only to those who are authorized to view it.
7 Clues: process of updating software to a different version. • someone ot what something is,the name by which something is known. • Transformaton of data into a form that conceals the datas otininal meaning. • Network point that acts as an entrance to another network. Needs to be protected. • ...
Cyber Security #3 2013-06-13
Across
- electronic junk mailor junk newsgroup postings.
- An adverse network event in an information system.
- Process of identifying and fixing vulnerabilities on a system.
- Process of updating software to a different version.
Down
- information gathering and analysis of asseys to ensure such things as policy compliaance and security from vulnerabilities.
- used to specify which packets will or will not be used. Also determine which packets get blocked.
- Process of transforming an encrypted message into its original plaintext.
7 Clues: electronic junk mailor junk newsgroup postings. • An adverse network event in an information system. • Process of updating software to a different version. • Process of identifying and fixing vulnerabilities on a system. • Process of transforming an encrypted message into its original plaintext. • ...
Cyber security crossword 2024-09-25
Across
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, or credit card details, by pretending to be a trustworthy entity, often via email or fake websites.
- Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, and ransomware.
- The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks.
Down
- A cyberattack where users are directed to a fake website that looks like a legitimate one in order to steal personal information, such as login credentials or financial data.
- Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others.
- Unwanted, unsolicited messages, usually sent in bulk through email, advertising products or services, or containing links to malicious sites.
- The act of gaining unauthorized access to computer systems or networks, often with malicious intent, such as stealing data or causing disruption.
7 Clues: Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others. • The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks. • ...
CyberSecurity Law 2025-11-20
Across
- This is information that can be used to identify an individual and it is related to their health
- This is Japan's 2003 data privacy and protection law, protecting use, consent, and security
- This is Mexico's federal law regulating the data held by private entities
- This is a common principle amongst the laws that requires the companies to gain _____ before collecting and using the data
- This is a data protection law/rule that originates from Canada and has 10 main principles
- This is a commission that oversees the nations overall power system and regulates the transmission companies that connect to the power grid
- This rule requires banking and other regulators to develop reasonable policies and procedures, to prevent identity theft
- This security rule specifically applies to covered entities who can include health plans and providers who transmit health information electronically
- This is a rule that 3 nations have that is all about ensuring they follow the rules and if not there needs to be someone who can be held responsible for the actions
Down
- This is the most common requirement across all the laws, requiring companies employ this to help protect the data
- The rule that financial institutes must follow in terms of cybersecurity
- Companies that accept or use debit or credit cards are required to comply with this ruleset
- This is a template to help provide a framework for states to develop data security and breach laws
- This rule applies to nuclear power plant operators, to protect their computer systems from cyber attacks
- This is a regulation of data protection and breach policy rules in Europe
- This state has a specific IoT law that requires manufactures to make reasonable security features on their connected devices
- The rule from the FTC regulating places like mortgage brokers, retailers that offer credit, and consumer reporting agencies
- This is another common principle amongst the laws that requires companies to ensure the data they store is up to date
- This is a common rule amongst the data protection laws/rules that state the companies must be _____ with what they need the data for, why they need it, and how they will use the data
- This is another data protection law however originating from China that has been modified recently with 5 new additions
20 Clues: The rule that financial institutes must follow in terms of cybersecurity • This is Mexico's federal law regulating the data held by private entities • This is a regulation of data protection and breach policy rules in Europe • This is a data protection law/rule that originates from Canada and has 10 main principles • ...
Cyber Law CIA 1 2021-09-05
Across
- digitization of faming sector
- one of the 4 contraints
- one of the general problems of new media
- constructing various contraints within the cyber
- traces back to who is accessing the website
- school of thought proposing independence of the cyber space
Down
- devised a model for cyber space regulation
- man made resource in cyber space
- process of using digital technologies to create new or modify existing business processes, culture, and customer experience.
- another name for the school of thought proposing the use of users for cyber space regulation
10 Clues: one of the 4 contraints • digitization of faming sector • man made resource in cyber space • one of the general problems of new media • devised a model for cyber space regulation • traces back to who is accessing the website • constructing various contraints within the cyber • school of thought proposing independence of the cyber space • ...
Security Awareness NCSAM 2022 Crossword Puzzle 2022-09-30
Across
- Technology that allows access to your files through the internet from anywhere in the world
- The practice of sending malicious communications that appear to come from a reputable source
- The process of defending computers and data from malicious attacks
- Holds your computer files hostage for money
- When data is accessed and taken from a system without authorization
- Software designed to detect computer viruses
- Group of computers under malicious control
- Digital alteration of a person's likeness or voice
Down
- A copy of files to protect and restore digital data in the event of damage or loss
- A computer infected with malware that is part of a botnet
- A computer program used for accessing sites or information on the internet
- Defensive computer technology installed to deny unauthorized entry to a system
- Type of malware that spreads copies of itself from computer to computer
- A program or code designed to take advantage of a security flaw in a computer system
- The potential for loss, damage, or destruction of assets or data
- The action of keeping careful watch for possible danger or threats
- General term to describe malicious software
- Common term for a cybercriminal
- A new piece of software released by the vendor to fix a vulnerability
- Relating to the characteristics and culture of computers, information technology, and virtual reality
20 Clues: Common term for a cybercriminal • Group of computers under malicious control • General term to describe malicious software • Holds your computer files hostage for money • Software designed to detect computer viruses • Digital alteration of a person's likeness or voice • A computer infected with malware that is part of a botnet • ...
Кәмшат 2024-11-19
Across
- A cloud computing environment designed specifically for one organization?
- An infrastructure-as-a-service model?
- What is the process of software allocation of computer resources called?
- Protecting data and systems from cyber attacks?
- The process of automatically adjusting resources based on user demand?
Down
- Google's cloud storage service?
- A collection of key resources such as networks, servers, hardware?
- Special coding process to protect data?
- A software-as-a-service model?
- What is the process of protecting data from unauthorized access called?
- What is the level of service available to users?
- A service for hosting websites and applications on the Internet?
12 Clues: A software-as-a-service model? • Google's cloud storage service? • An infrastructure-as-a-service model? • Special coding process to protect data? • Protecting data and systems from cyber attacks? • What is the level of service available to users? • A service for hosting websites and applications on the Internet? • ...
Crisis Management 2024-07-24
Across
- threat that causes an interruption in processing
- group of people who are assembled to navigate the crisis
- the first call in a crisis (fire/medical/power)
- if it's safe, do what you can to secure this
- how often the crisis management plan is reviewed
- location of crisis contact information sheet
Down
- the instructions you should follow for assessment of product
- first FDF employee you need to call
- type of security that protects company files on computers
- assess this in all areas to determine the impact of the crisis
- updates should be given every (blank) hours
11 Clues: first FDF employee you need to call • updates should be given every (blank) hours • if it's safe, do what you can to secure this • location of crisis contact information sheet • the first call in a crisis (fire/medical/power) • threat that causes an interruption in processing • how often the crisis management plan is reviewed • ...
Cyber Security Day 2022 Crossword Quiz 2022-10-10
Across
- Type of social engineering attack often used to steal user data like login details and credit card numbers (often through emails)
- An app developed by the National Crime Prevention Coundil to help fight scam messages and calls which plague mobile phone users.
- Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day
- Highest type of scam cases reported in Jan-Jun 2022
Down
- Two Factor _______
- Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access
6 Clues: Two Factor _______ • Highest type of scam cases reported in Jan-Jun 2022 • Redefining & Shaping our Cyber _____ (Theme of this year's Cyber Security Day • Malware designed to deny a user/organization access to files on their computer, demanding ransom to restore access • ...
Insider threats 2022-10-13
Across
- When looking for an insider threat, watch out for ______ signs
- Unauthorized ________ of information can result from an insider threat
- What employees are protecting. Property both tangible and intangible that the company owns and has a monetary value
- A person within an organization who can become an insider threat
- An acronym for the person in charge of the company’s insider threat response
- When company information gets out
- What employees should do if they suspect an insider threat
- A type of insider threat where a malicious actor befriends an employee in order to get company information
- An insider threat who is making mistakes rather than acting in malice is _____
- Once insider threat behaviors are reported, they need to be _________ by the FSO
- An employee might become an insider threat for ________ gain
Down
- What the FSO must do when they suspect an insider threat
- Someone secretly collecting information on the company
- Keep an eye out for _________ behavior
- _____ Nationals can pose a threat to the company
- deliberately destroying, damaging, or stopping something. A malicious insider threat may do this
- A type of insider threat where an attractive person tries to seduce someone for information
- The possibility of loss from a threat, security incident or event
- Without proper ________, cleared employees won’t be able to spot insider threats
- Cyber security is part of protecting company ____
20 Clues: When company information gets out • Keep an eye out for _________ behavior • _____ Nationals can pose a threat to the company • Cyber security is part of protecting company ____ • Someone secretly collecting information on the company • What the FSO must do when they suspect an insider threat • What employees should do if they suspect an insider threat • ...
SECURITY 2014-09-17
Across
- This is a type of elicitation (manipulation of a conversation) used by foreign agents. The agent will praise you to make you feel important so you will be willing to talk about yourself.
- This is art of manipulating a conversation to get a person to talk about themselves without the person knowing it. It is also how a foreign agent “elicits” company information and government secrets from employees.
- ALONE If someone wants to steal company information or classified documents, they will often ask to ________ ________ because they don’t want other employees around.
- Organized activity of an intelligence service designed to block an enemy's sources of information, to deceive the enemy, to prevent sabotage, and to gather political and military information.
- This is a type of elicitation used by spies. They will criticize your company in the hopes you will reveal sensitive information when you defend your company.
- KNOWLEDGE This is a type of Elicitation. The foreign agent will say something to make you think he has knowledge of a subject you may have in common. For example; “According to the computer guys I used to work with the frequency range for that item is….” This is designed to make you assume you have some knowledge in common with the agent. The agent knows people are more willing to talk when they feel they have something in common.
- STRIPE A Cobham employee with a security clearance has a badge with a red stripe on the bottom. A Cobham employee without a clearance has a badge with a _____ _____ across the bottom?
- This is the abbreviation for International Traffic Arms Regulation
Down
- There are two levels of this type of information that we work with here at Cobham, San Diego; “Secret” and “Confidential”. Items with these markings are “____________”.
- SECURITY OFFICER Joe Dominguez has two titles; one is the Director of Security, the other is _____ _____ _____, also known as FSO.
- This is the lower of the two levels of classified we work with at Cobham San Diego. The highest is “SECRET”.
- BAIT This is a type of Elicitation. The foreign agent will try to gain your confidence by baiting you. He will pretend he is telling you something he shouldn’t in the hopes you will do the same for him. “Just between you and me...” or “Off the record…”
- TRAVEL BRIEFING If you have a security clearance and are going on foreign travel outside of the United States you are required to receive this briefing before leaving.
- COMPLIANCE Located on the second floor of building 1, David Romero is the contact for _______ _______. If an item we produce is for EXPORT, David makes sure we are in COMPLIANCE with the law.
- AREA If you do not have a security clearance you cannot enter one of these areas unless you are escorted.
- 1 The Cobham Security Department is located in this building.
- This is the abbreviation for “Information System Security Manager”
- Fill in the missing word; “_______ don’t Compromise”. This phrase refers to remembering a combination instead of writing it down.
- READER Every time you enter a Cobham building you must pass/swipe your badge in front of this device.
- This is a three letter designation for “Department Security Representative”. These are employees that have volunteered to assist the Security Department with security education and awareness.
20 Clues: 1 The Cobham Security Department is located in this building. • This is the abbreviation for “Information System Security Manager” • This is the abbreviation for International Traffic Arms Regulation • READER Every time you enter a Cobham building you must pass/swipe your badge in front of this device. • ...
Security 2025-02-26
Across
- A type of malware that records keystrokes to steal sensitive data.
- A technique where an attacker sends fraudulent emails to steal sensitive information.
- A network device that filters incoming and outgoing traffic based on security rules.
- The process of disguising data within an image or another file to hide its presence.
- A wireless attack that involves setting up a fraudulent Wi-Fi access point.
- An attack that overloads a system with excessive requests, making it unavailable.
- A network of compromised computers controlled remotely by an attacker.
- An attack where an unauthorized person intercepts communication between two parties.
- An attack where an unauthorized user gains access by following an authorized user.
Down
- A cryptographic attack that attempts to find two different inputs producing the same hash.
- A social engineering technique where an attacker manipulates victims by creating a sense of urgency.
- Software that automatically displays or downloads advertisements, often without user consent.
- Software that secretly gathers information about a user without their knowledge.
- The process of confirming a user’s identity before granting access.
- A type of malware that enables persistent, unauthorized access to a computer.
- The principle that ensures only authorized users can access certain data.
- A type of malware that locks users out of their system until a payment is made.
- A malicious program that disguises itself as legitimate software.
- A security protocol that provides encrypted communication over a computer network.
19 Clues: A malicious program that disguises itself as legitimate software. • A type of malware that records keystrokes to steal sensitive data. • The process of confirming a user’s identity before granting access. • A network of compromised computers controlled remotely by an attacker. • The principle that ensures only authorized users can access certain data. • ...
Security 2023-03-28
Across
- - The practice of secure communication in the presence of third parties.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - A group of computers and other devices that are connected together to share resources and information.
- - A network of compromised computers that can be used to perform malicious activities.
- - A method of transferring data securely across an untrusted network, by encapsulating data
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
- - The study of analyzing and breaking encryption systems.
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A global network of interconnected computer networks.
- - A security algorithm for wireless networks.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
Tec cross word puzzell 2022-04-13
Across
- network security device that monitors outgoing network traffic
- something designed to make something known to
- data that is left behind when users have been online
- data that describes other data
- bully someone over the internet
- activities a company undertaken to promote the buying or selling of a product or service
Down
- The opportunity to establish a protect network connection when using public networks
- where people can create, share or exchange information in virtual communities and networks
- A file or code
- A way that cyber criminals steal private information
- A network that connects computers all over the world
11 Clues: A file or code • data that describes other data • bully someone over the internet • something designed to make something known to • A way that cyber criminals steal private information • data that is left behind when users have been online • A network that connects computers all over the world • network security device that monitors outgoing network traffic • ...
Industry 5.0 Forensics 2020-10-09
Across
- The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
- It defines a system of rules telling what a process is allowed to do in containers
- Collaborative robots designed for simple and intuitive interaction with humans
- A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
- A container security tool manufactured by Aqua
Down
- API-aware networking and security at the kernel layer powered Berkeley packet filter technology
- A software from Nexus that is expected to drive the transformation of an industrial company
- Kubernetes based tool with behavioral activity monitoring with deep container visibility
- An open-source vulnerability scanner tool that powers CoreOS’s container registry
- These are special drones used for surveillance that store data on user’s online account
- It is a tool used by investigators to extract data when there is no app support in drones
11 Clues: A container security tool manufactured by Aqua • Collaborative robots designed for simple and intuitive interaction with humans • It defines a system of rules telling what a process is allowed to do in containers • An open-source vulnerability scanner tool that powers CoreOS’s container registry • ...
Security 2023-03-28
Across
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - The practice of secure communication in the presence of third parties.
- - A security algorithm for wireless networks.
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A global network of interconnected computer networks.
- - A group of computers and other devices that are connected together to share resources and information.
- - A method of transferring data securely across an untrusted network, by encapsulating data
Down
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - The study of analyzing and breaking encryption systems.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A network of compromised computers that can be used to perform malicious activities.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
Industry 5.0 Forensics 2020-10-09
Across
- An open-source vulnerability scanner tool that powers CoreOS’s container registry
- A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
- The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
Down
- A container security tool manufactured by Aqua
- It is a tool used by investigators to extract data when there is no app support in drones
- A software from Nexus that is expected to drive the transformation of an industrial company
- It defines a system of rules telling what a process is allowed to do in containers
- Collaborative robots designed for simple and intuitive interaction with humans
- API-aware networking and security at the kernel layer powered Berkeley packet filter technology
- These are special drones used for surveillance that store data on user’s online account
- Kubernetes based tool with behavioral activity monitoring with deep container visibility
11 Clues: A container security tool manufactured by Aqua • Collaborative robots designed for simple and intuitive interaction with humans • It defines a system of rules telling what a process is allowed to do in containers • An open-source vulnerability scanner tool that powers CoreOS’s container registry • ...
Industry 5.0 Forensics 2020-10-09
Across
- A virtual representation of a physical product, process, or service using cyber Physical Systems (CPS)
- It defines a system of rules telling what a process is allowed to do in containers
- These are special drones used for surveillance that store data on user’s online account
- An open-source vulnerability scanner tool that powers CoreOS’s container registry
- The classification of the Internet in which Cisco has placed of machine-to-machine or M2M communication
- Kubernetes based tool with behavioral activity monitoring with deep container visibility
Down
- API-aware networking and security at the kernel layer powered Berkeley packet filter technology
- A software from Nexus that is expected to drive the transformation of an industrial company
- A container security tool manufactured by Aqua
- It is a tool used by investigators to extract data when there is no app support in drones
- Collaborative robots designed for simple and intuitive interaction with humans
11 Clues: A container security tool manufactured by Aqua • Collaborative robots designed for simple and intuitive interaction with humans • It defines a system of rules telling what a process is allowed to do in containers • An open-source vulnerability scanner tool that powers CoreOS’s container registry • ...
cyber bulling 2013-05-03
Across
- what is one type of cyber bulling
- how does it make people feel
- who should you tell first if you are being cyber bulled
- who could get cyber bulled
Down
- who get effected the most in cyber bulling
- what is a useful cyber bulling help line
- what is one of the most common cyber bulling web sites
- what should you do if the cyber bulling gets out of hand
8 Clues: who could get cyber bulled • how does it make people feel • what is one type of cyber bulling • what is a useful cyber bulling help line • who get effected the most in cyber bulling • what is one of the most common cyber bulling web sites • who should you tell first if you are being cyber bulled • what should you do if the cyber bulling gets out of hand
Cyber law 2021-09-05
Across
- school of thought using stakeholders to regulate the cyber space
- enables exchange of data
Down
- The worldwide interconnection of communications networks, computers, databases, and consumer electronics.
- hiding one's identity
- digitalization of the indian economy
- conversion of information into a digital format
- stakeholder of cyber space
- natural resource of cyber space
- a false or fictitious name
- author of a declaration of the independence of the cyber space
10 Clues: hiding one's identity • enables exchange of data • stakeholder of cyber space • a false or fictitious name • natural resource of cyber space • digitalization of the indian economy • conversion of information into a digital format • author of a declaration of the independence of the cyber space • school of thought using stakeholders to regulate the cyber space • ...
Crossword Cyber Security Quiz - 01, 2023 2022-12-28
Across
- Scrambling of text in order to ensure the security of data/ information
- Existence of weakness in a system or network
- Socially or politically motivated hackers
- Software designed to help the user's computer detect viruses & avoid them
- Hackers with main motive to gain financial profit by doing cyber crimes
- Emails sent to trick users to reveal their sensitive information.
Down
- Technique of Hiding data behind a photo
- Phishing Techniques used to target CEO,CFO etc.
- Just going behind an authorized person into a secured area
- Sending bulk messages by abusing electronic messaging system
- Unauthorized softwares installed on computer to gather sensitive information
11 Clues: Technique of Hiding data behind a photo • Socially or politically motivated hackers • Existence of weakness in a system or network • Phishing Techniques used to target CEO,CFO etc. • Just going behind an authorized person into a secured area • Sending bulk messages by abusing electronic messaging system • ...
Round 3 2025-08-22
Across
- What is the most common form of malicious code?
- Which action compromise cyber security ?
- Name the type of attack which usesa fraudulent server with a relay address?
- What is the act of posting abusive messages online ?
- What is the legal field dealing with internet behavior called ?
- What is the process by which robots interact with their environment ?
Down
- Write the full form of ASP?
- Who coined the term "cyberspace" ?
8 Clues: Write the full form of ASP? • Who coined the term "cyberspace" ? • Which action compromise cyber security ? • What is the most common form of malicious code? • What is the act of posting abusive messages online ? • What is the legal field dealing with internet behavior called ? • What is the process by which robots interact with their environment ? • ...
Security CrossWord 2014-03-28
Across
- Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
- A program/attack used by which the cracked/attacked part of network is inoperable
- The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
- A harmful software program in disguise
- The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
- Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
- If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
- A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
- URL when added in this list can bypass all the Enforcement filters.
- The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
- Cryptographic transformation of data results in ________ text
- Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
- Attack through which the system gets compromised by trying only a possible set of passwords
13 Clues: A harmful software program in disguise • Cryptographic transformation of data results in ________ text • URL when added in this list can bypass all the Enforcement filters. • A program/attack used by which the cracked/attacked part of network is inoperable • Attack through which the system gets compromised by trying only a possible set of passwords • ...
Crossword-InfoSec 2022-11-26
Across
- It's not an insect, but crawls and replicates within a network
- A challenge-response test to determine human users
- A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
- It records everything that you type.
- Malicious activity by internal users. It’s sometimes unintentional also.
- A spy software that intends to compromise your personal information
- Collection of hijacked systems to carry out a large-scale flood attack
Down
- Exploiting the human element to obtain sensitive information
- If you are cautious, you will use multi-level authentication
- Disguised cyber-criminal pretend to commit malicious acts
- A targeted cyber attack to steal critical and classified information of an organization or entity
- Process of converting encrypted data into readable form
- An intelligently crafted software intended to harm your system
- Flooding victims with unwanted requests to restrict the availability of services
- An isolated environment to test, research, and analyze without affecting the production environment
15 Clues: It records everything that you type. • A challenge-response test to determine human users • Process of converting encrypted data into readable form • Disguised cyber-criminal pretend to commit malicious acts • Exploiting the human element to obtain sensitive information • If you are cautious, you will use multi-level authentication • ...
Office Management 2025-10-11
Across
- A room or building used for commercial or professional work.
- The process of making plans for something.
- programs and operating information used by a computer.
- The fact or quality of being on time.
- The state of keeping or being kept secret or private.
Down
- The process of entrusting a task or responsibility to a subordinate.
- A system or organization where people are ranked by status or authority.
- SECURITY Protecting networks and data from unauthorized use.
- INTELLIGENCE Computer systems able to perform tasks normally requiring human intelligence.
- Distinctive attributes or characteristics.
10 Clues: The fact or quality of being on time. • The process of making plans for something. • Distinctive attributes or characteristics. • The state of keeping or being kept secret or private. • programs and operating information used by a computer. • A room or building used for commercial or professional work. • SECURITY Protecting networks and data from unauthorized use. • ...
Hazards at the Airport 2025-09-24
Across
- You need this document to travel (8)
- An alternative to a hard copy ticket (7)
- These have a lot of your personal information (6,6) on them
- An employee must wear this in restricted areas (7)
- An employee needs this to work airside (3,5)
Down
- Required to meet destination entry requirement (6,4)s
- Watch for these people trying to steal things from you (11)
- One of these must be a true likeness of you (10)
- A kind of attack on technology(5)
- This airport area will check you and your hand luggage(8)
10 Clues: A kind of attack on technology(5) • You need this document to travel (8) • An alternative to a hard copy ticket (7) • An employee needs this to work airside (3,5) • One of these must be a true likeness of you (10) • An employee must wear this in restricted areas (7) • Required to meet destination entry requirement (6,4)s • ...
9.1 Vocab 2026-02-06
Across
- - When A Creditor Takes A Chunk Of Income
- - Buying Of Unplanned Goods Driven By Sudden Emotion
- - Loyalty Points Towards A Company
- - Online Crime Where Attackers Mimic Trusted Establishments Using Fake Emails To To Trick Them.
- - Cyber Security Process Of Converting Readable Data Into A Unreadable Font
Down
- - Offer Cash Back After Purchase Of Products
- - Process Of Evaluating Options Like Price, Features , & Quality Of Products To Secure The Best Value.
- - Ability To Make Considered Decisions
- - Refusal Of Permission Or Cancel Something
- - Credit That Is Left Over On Your Account
10 Clues: - Loyalty Points Towards A Company • - Ability To Make Considered Decisions • - When A Creditor Takes A Chunk Of Income • - Credit That Is Left Over On Your Account • - Refusal Of Permission Or Cancel Something • - Offer Cash Back After Purchase Of Products • - Buying Of Unplanned Goods Driven By Sudden Emotion • ...
NCSAM 2021 Crossword 2021-08-05
Across
- TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
- Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
- What malware propagates without a host program?
- Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
- A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
- What does the A in CAP stand for?
- What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
- What malware encrypts files and demands money for the decryption key?
- This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
- What is the last name of the TIAA Bank CISO?
- A good way to secure your devices at home is by regularly _______
- What type of attack do patches not prevent against?
- The probability of exposure or loss of assets is considered what?
- What type of information is private and identifies people?
- What technology allows information sent over the internet to remain private or confidential?
- What do most modern websites use to provide encryption?
- Which industry is most targeted by social engineers?
- Multifactor _____ adds extra layers of security when logging in.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
19 Clues: What does the A in CAP stand for? • What is the last name of the TIAA Bank CISO? • What malware propagates without a host program? • What type of attack do patches not prevent against? • Which industry is most targeted by social engineers? • What do most modern websites use to provide encryption? • This year Cyber has rebranded as TIAA _____ Cybersecurity • ...
Crossword Puzzle #1 - Phishing Exposed! 2026-02-09
Across
- An Enterprise's portal that provides cybersecurity information to enhance security awareness of employees
- Also known as Two-Factor Authentication
- _ _ _ _ _ _ Engineering is tricking people to gain access
- Cyber _ _ _ _ _ _ is any malicious attempt to breach or gain unauthorized access to data
Down
- Impersonate a trusted source to deceive individuals or systems
- Suspicious messages designed to fool you into clicking, downloading, or giving information
- Unsolicited junk mail, often phishing related
- Common delivery method for phishing messages
- Is the chance that a threat will exploit a vulnerability and cause damage
- Login information sought by phishers
10 Clues: Login information sought by phishers • Also known as Two-Factor Authentication • Common delivery method for phishing messages • Unsolicited junk mail, often phishing related • _ _ _ _ _ _ Engineering is tricking people to gain access • Impersonate a trusted source to deceive individuals or systems • ...
Roman's crossword for English class at UTMN 2023-04-10
Across
- Specialist engaged in shaping regulatory interaction on the Internet and devising legal protection systems for people and property on the Internet.
- Professional who designs interfaces compatible with the human nervous system, for controlling computers and household and industrial robots, taking into account the psychological and physiological traits of the user.
- Specialist that Audits complex IT systems processing data and making decisions based on such data.
- Specialist tasked with dealing with the lower levels of information infrastructure, ensuring the security of dedicated network segments.
- This professional develops user-friendly, adaptive and safe interfaces for equipment, devices and software of various levels.
- This specialist designs databases, develops action algorithms, ensures effective access of users to data storages, controls the quality and logic of information storage and extraction.
Down
- Specialist investigating cyber crimes.
- Specialist in the information security of technological processes at automated industrial facilities.
- Qualified specialist for a wide spectrum of operations involving data processing systems.
- Specialist in designing systems for collecting and processing large arrays of data received from the Internet, and developing analytical models and interfaces for assembling them.
- Advisor on the information security of Internet users.
- A specialist who creates ready-made IT solutions from prebuilt templates using a graphical user interface instead of classical programming.
- Specialist in communications with end users of IT products and promotion of new solutions to groups having a conservative attitude towards advanced technology.
- Professional who develops linguistic systems for semantic translation and text information processing.
14 Clues: Specialist investigating cyber crimes. • Advisor on the information security of Internet users. • Qualified specialist for a wide spectrum of operations involving data processing systems. • Specialist that Audits complex IT systems processing data and making decisions based on such data. • ...
Crossword-InfoSec 2022-11-28
Across
- A challenge-response test to determine human users
- An isolated environment to test, research, and analyze without affecting the production environment
- Process of converting encrypted data into readable form
- A spy software that intends to compromise your personal information
- An intelligently crafted software, with the intent to harm your system
- A targeted cyber attack to steal critical and classified information of an organization or entity
- Exploiting the human element to obtain sensitive information
- It's not an insect, but crawls and replicates within a network
- If you are cautious, you will use multi-level authentication
Down
- Collection of hijacked systems to carry out a large-scale flood attack
- Flooding victims with unwanted requests to restrict the availability of services
- Malicious activity by internal users. It’s sometimes unintentional also.
- It records everything that you type.
- A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
- Disguised cyber-criminals pretend to commit malicious acts
15 Clues: It records everything that you type. • A challenge-response test to determine human users • Process of converting encrypted data into readable form • Disguised cyber-criminals pretend to commit malicious acts • Exploiting the human element to obtain sensitive information • If you are cautious, you will use multi-level authentication • ...
Cyber Security Learing Aim A 2023-09-15
Across
- This is most commonly carried out by sending fake text messages
- an example of a company that suffered from financial loss
- a form of software that looks like a real program but is actually a type of malware in disguise.
- the process where actions are accurately recorded in a secure location
- this is where these cards can be read using a smartphone.
- external threat
- physical security measure
- form of security measure that recognised individuals by their unique physical characteristics.
Down
- the group responsible for looking after the security of an organization is a part of the security operations centre
- a state or quality which could render you to the possibility of being attacked
- their main purpose is to protect the malware and can enable any malware installed to still be on the system after many multiple reboots.
- a main form of of loss
- one of the different types of hacking
13 Clues: external threat • a main form of of loss • physical security measure • one of the different types of hacking • an example of a company that suffered from financial loss • this is where these cards can be read using a smartphone. • This is most commonly carried out by sending fake text messages • the process where actions are accurately recorded in a secure location • ...
Cross Word Puzzle - Cyber Security 2023-10-02
Across
- a string of characters that allows access to a computer system or service
- malware that misleads users of its true intent by disguising itself as a standard program
- the gaining of unauthorised access to data in a system or computer
- a system that connects two or more computer devices for transmitting and sharing information
- software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
- a security system designed to prevent unauthorised access into or out of a computer network
Down
- a type of malware that spreads between computers and damages data and software
- individuals or teams of people who use technology to commit malicious activities on digital systems or networks
- the protection of personal data from those who should not have access to it
- the actual person or organisation who is directly affected by the hacker's use of stolen data or information
- the practice of protecting systems, networks and programs from digital attacks
- a type of software program created to protect information technology systems and individual computers from malicious software or malware
- a term that relates to the security of a computer system being compromised
13 Clues: the gaining of unauthorised access to data in a system or computer • a string of characters that allows access to a computer system or service • a term that relates to the security of a computer system being compromised • the protection of personal data from those who should not have access to it • ...
Exploring IT Audit Essentials 2025-01-06
Across
- The process of granting users permission to access systems or data based on predefined policies
- The process of verifying the identity of a user, system, or device before granting access
- The evaluation of risks, controls, and compliance to identify weaknesses and areas for improvement
- Policies, procedures, and safeguards to ensure systems operate effectively and securely
- The independent examination of systems, processes, and controls to assess their effectiveness
- The creation and presentation of audit findings, assessments, and recommendations to management or stakeholders
- The practice of dividing duties or responsibilities to reduce the risk of fraud or errors
- Weaknesses or flaws in IT systems that can be exploited by threats to cause harm
- The actions taken to address and correct identified issues, vulnerabilities, or non-compliance
- A controlled, simulated cyberattack to identify vulnerabilities within a system
- The ability of systems and processes to be examined, traced, and verified during an audit
- Protecting computer systems and networks from cyber threats and attacks.
Down
- Adhering to laws, regulations, and company policies.
- The process of converting data into a secure format to prevent unauthorized access
- The set of processes and structures used to direct and manage an organization’s IT
- The ongoing process of observing and tracking the performance, security, and compliance of IT systems and networks
- Records of system events, transactions, and user activities used to track and review operations
- Any event or breach that disrupts IT services or compromises security
- Protection of IT systems, data, and networks from unauthorized access or attacks
- The ability to enter or use IT systems, networks, or data, controlled by permissions
- Information that is stored, processed, and transmitted within IT systems
- The possibility of loss, damage, or any negative impact arising from a potential threat to an organization's IT systems or operations.
- The accuracy, consistency, and reliability of data throughout its lifecycle
- The process of evaluating and verifying the effectiveness of IT systems, controls, and security measures
- Documentation or data collected during an audit to support findings and conclusions
25 Clues: Adhering to laws, regulations, and company policies. • Any event or breach that disrupts IT services or compromises security • Information that is stored, processed, and transmitted within IT systems • Protecting computer systems and networks from cyber threats and attacks. • The accuracy, consistency, and reliability of data throughout its lifecycle • ...
ELEMENTS OF CITIZENSHIP 2025-07-01
Across
- Exchanging information and ideas using digital technologies
- Availability and affordability of technology and internet access
- Legal framework governing online activities
- Ability to find, evaluate, and use information effectively online.
- Protecting personal information and devices from cyber threats. Rights&Responsibilities Freedoms and obligations in the digital world
Down
- Buying and selling goods and services online
- Rules for polite and respectful online behavior
- Impact of technology on physical and mental well-being
8 Clues: Legal framework governing online activities • Buying and selling goods and services online • Rules for polite and respectful online behavior • Impact of technology on physical and mental well-being • Exchanging information and ideas using digital technologies • Availability and affordability of technology and internet access • ...
BCAW 2022 2022-06-13
Across
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- In order to prepare for cyber resilience, speed and agility are required.
Down
- Technologies, cyber threats, knowledge and skills, innovation, and ________ are five of the most significant advancements in the universal law of security decay.
- The capacity to recover quickly from difficulties
- A thing made by combining two different elements
5 Clues: A thing made by combining two different elements • The capacity to recover quickly from difficulties • In order to prepare for cyber resilience, speed and agility are required. • In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes? • ...
Irregular Warfare Crossword 2025-12-17
Across
- Works with NATO and partners in Europe, Russia, and parts of Eurasia.
- Conducts globally integrated mobility operations, leads the broader Joint Deployment and Distribution Enterprise, and provides enabling capabilities.
- Covers the Middle East, parts of Central Asia, and South Asia.
- The U.S. Department of Defense unified command responsible for homeland defense and civil support in North America
- key component of Irregular Warfare (IW), focusing on influencing foreign audiences
- Unified combatant command charged with overseeing the various special operations component commands of the US. Armed Forces
Down
- Oversees U.S. military operations in space.
- Focuses on security and defense in Africa
- Responsible for providing contingency planning, operations, and security cooperation for Central and South America, the Caribbean (except in Territories of the United States)
- Defends and advances U.S. cyber interests.
- Encompasses about half the earth's surface, stretching from the waters off the west coast of the U.S. to the western border of India, and from Antarctica to the North Pole.
- Manages global strike, nuclear deterrence, and missile defense.
12 Clues: Focuses on security and defense in Africa • Defends and advances U.S. cyber interests. • Oversees U.S. military operations in space. • Covers the Middle East, parts of Central Asia, and South Asia. • Manages global strike, nuclear deterrence, and missile defense. • Works with NATO and partners in Europe, Russia, and parts of Eurasia. • ...
Lökwest's "Leftovers are Awesome" Puzzle 2023-11-20
Across
- Sky-high camera operator
- Desktop roamer
- Digital reading format
- Digital river of content
- Pound's new identity
- Pandemic-era meeting spot
- Apple's stratospheric service
- Cryptic programmer's construct
- Light beam sharper
- Inbox filler
- Asimov's brainchild
- Invisible network connector
- Sky-like data storage
- Serpentine language for coders
- Sci-fi intelligence, for short
- Lady's name in coding history
- Home to billions of stars
- Digital gold
- Orchard's virtual helper
- Modern magic slate
- Google's shiny browser
Down
- Gravity-inspired tech brand
- Data's small bite
- Space trailblazer Valentina
- Opposite of analog in tech
- Quantum computing's crux
- Gateway to the net
- Current choice for electric mobility
- Celestial showstopper
- Bot-like OS from Mountain View
- Cyber intruder
- Cyber plague
- Typist's battlefield
- Bird-like chatter platform
- Thinking part of a PC
- Starship entrepreneur
- Dots that make up a picture
- Cyber gateway
- Recipe for coders
- Toy storytellers
40 Clues: Cyber plague • Inbox filler • Digital gold • Cyber gateway • Desktop roamer • Cyber intruder • Toy storytellers • Data's small bite • Recipe for coders • Gateway to the net • Light beam sharper • Modern magic slate • Asimov's brainchild • Pound's new identity • Typist's battlefield • Celestial showstopper • Thinking part of a PC • Starship entrepreneur • Sky-like data storage • Digital reading format • ...
Let's Revise Cyber Security Fundamentals !! 2021-08-16
Across
- deliberate attempt to compromise security using malicious activity
- Naming system followed to identify computers connected to Internet
- criminal activity performed using computer or a network
- ready to access for authorized people
- state of maintaining secrecy of communication
- malicious software that prevents the users from
- use of Computers and Networks to gain illegal access for confidential information for some gain
Down
- way of confirmation of individual's identity
- unskilled individual who uses programs written by others to initiate attacks
- Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- their own data for want of money
- computer program designed to protect computer
- illegal piece of software designed to cause harm to computers/networks
13 Clues: their own data for want of money • ready to access for authorized people • way of confirmation of individual's identity • state of maintaining secrecy of communication • computer program designed to protect computer • malicious software that prevents the users from • criminal activity performed using computer or a network • ...
FIT 2013-05-16
Across
- Central Processing Unit
- The primary circuit board
- Where you plug in speakers/earbuds
- The smalleststorage size
- Wireless Internet
- Liquid Crystal Display/Light emitting diod
- An object in a computer that stores data
- Way you act and behave online
- A potable Device
- National Cyber Security Alliance
- Example: Google
- A device that connects to a computer
- Online storage
- The cloud based presentation maker with rooming features
- Machinery of the computer
Down
- Something that comes out of a computer such as a speaker
- An ad in paper form.
- Visual Display Unit
- You and your safety online
- The biggest storage size
- The space you type in
- A saying representing a company
- Location for CD in a laptop
- Picture or symbol representing a company
- Flash drive port
- Something that would go into a computer like a mouse
- The programs and other operating systems used by computers
- Example: Temple Run
- Random Access Memory
29 Clues: Online storage • Example: Google • Flash drive port • A potable Device • Wireless Internet • Visual Display Unit • Example: Temple Run • An ad in paper form. • Random Access Memory • The space you type in • Central Processing Unit • The biggest storage size • The smalleststorage size • The primary circuit board • Machinery of the computer • You and your safety online • ...
malware 2022-10-21
Across
- steal user login credentials
- standalone malware
- A type of malware that allows a cyber-security attacker to take control of an infected
- When attackers try to access your details via emails
- Bugs are errors in someone's code or program
Down
- A rootkit can be installed on a user's computer once an authorized user has initially gained access
- This is malware that holds computer system captive
- something dangerous
- A piece of code which can copy itself and typically has a detriment effect
9 Clues: standalone malware • something dangerous • steal user login credentials • Bugs are errors in someone's code or program • This is malware that holds computer system captive • When attackers try to access your details via emails • A piece of code which can copy itself and typically has a detriment effect • ...
malware 2022-10-21
Across
- steal user login credentials
- standalone malware
- A type of malware that allows a cyber-security attacker to take control of an infected
- When attackers try to access your details via emails
- Bugs are errors in someone's code or program
Down
- A rootkit can be installed on a user's computer once an authorized user has initially gained access
- This is malware that holds computer system captive
- something dangerous
- A piece of code which can copy itself and typically has a detriment effect
9 Clues: standalone malware • something dangerous • steal user login credentials • Bugs are errors in someone's code or program • This is malware that holds computer system captive • When attackers try to access your details via emails • A piece of code which can copy itself and typically has a detriment effect • ...
CISO Crossword Quiz - 1825 2025-03-28
Across
- Passwords that contain easy-to-guess information like common words, personal information like names or dates, simple sequences, or easily guessed keyboard patterns called ____ password
- All the data about a person generated while interacting with the internet, from browsing history and social media posts to online purchases and app usage called _____
- The process of sending indiscriminately unsolicited bulk messages/emails to a large number of internet users with the intention of scamming is called ____
- Cybercriminals creating sophisticated scams like advanced phishing, deepfakes etc by using a technology that enable computers to simulate human-like intelligence
Down
- A security feature where the first eight digits of your Aadhaar number are hidden and only the last four digits are displayed, enhancing privacy and reducing the risk of misuse of your Aadhaar data
- A cyber scam in which fraudsters convince the victim to merge the WhatsApp registration OTP call to access the OTP & to take over the account of victim
- Often called the weakest link in the cyber security chain because of fear, greed and lack of awareness
- is a type of malware that downloads onto a computer disguised as a legitimate program
- Scammers exploit vulnerabilities in connected devices that are embedded with sensors and software for the purpose of connecting and exchanging data with other devices over the internet
- It's crucial to exercise caution and verify the sender's legitimacy before taking any action in email ___ attacks
10 Clues: is a type of malware that downloads onto a computer disguised as a legitimate program • Often called the weakest link in the cyber security chain because of fear, greed and lack of awareness • It's crucial to exercise caution and verify the sender's legitimacy before taking any action in email ___ attacks • ...
Qeet 2025-01-27
Across
- - Related to electronic technology
- - Related to computers and internet
- - Harmful computer program
- - Trick to steal passwords
- - Rules for cyber crimes
Down
- - Breaking into computers illegally
- - Tampering with computer source code (IT Act)
- - Protection of personal information
- - Indian cyber law (abbreviation)
- - Unwanted emails
10 Clues: - Unwanted emails • - Rules for cyber crimes • - Harmful computer program • - Trick to steal passwords • - Indian cyber law (abbreviation) • - Related to electronic technology • - Breaking into computers illegally • - Related to computers and internet • - Protection of personal information • - Tampering with computer source code (IT Act)
malware 2022-10-21
Across
- steal user login credentials
- standalone malware
- A type of malware that allows a cyber-security attacker to take control of an infected
- When attackers try to access your details via emails
- Bugs are errors in someone's code or program
Down
- A rootkit can be installed on a user's computer once an authorized user has initially gained access
- This is malware that holds computer system captive
- something dangerous
- A piece of code which can copy itself and typically has a detriment effect
9 Clues: standalone malware • something dangerous • steal user login credentials • Bugs are errors in someone's code or program • This is malware that holds computer system captive • When attackers try to access your details via emails • A piece of code which can copy itself and typically has a detriment effect • ...
malware 2022-10-21
Across
- steal user login credentials
- standalone malware
- A type of malware that allows a cyber-security attacker to take control of an infected
- When attackers try to access your details via emails
- Bugs are errors in someone's code or program
Down
- A rootkit can be installed on a user's computer once an authorized user has initially gained access
- This is malware that holds computer system captive
- something dangerous
- A piece of code which can copy itself and typically has a detriment effect
9 Clues: standalone malware • something dangerous • steal user login credentials • Bugs are errors in someone's code or program • This is malware that holds computer system captive • When attackers try to access your details via emails • A piece of code which can copy itself and typically has a detriment effect • ...
The Break In 2025-10-13
Across
- Acronym for the control that makes hackers cry (3)
- month named after a roman emperor (6)
- Professional troublemaker with a keyboard (6)
- Your goal in this room — and our favourite key (6)
- What you claim to have until we test it (8)
- Old enough to vote, not old enough to secure your network (8)
Down
- What you wrote on a sticky note under your keyboard (8)
- Fraudulent attempt to obtain sensitive info by pretending to be someone else (8)
- Prefix for everything from warfare to insurance (5)
9 Clues: month named after a roman emperor (6) • What you claim to have until we test it (8) • Professional troublemaker with a keyboard (6) • Acronym for the control that makes hackers cry (3) • Your goal in this room — and our favourite key (6) • Prefix for everything from warfare to insurance (5) • What you wrote on a sticky note under your keyboard (8) • ...
malware 2022-10-21
Across
- steal user login credentials
- standalone malware
- A type of malware that allows a cyber-security attacker to take control of an infected
- When attackers try to access your details via emails
- Bugs are errors in someone's code or program
Down
- A rootkit can be installed on a user's computer once an authorized user has initially gained access
- This is malware that holds computer system captive
- something dangerous
- A piece of code which can copy itself and typically has a detriment effect
9 Clues: standalone malware • something dangerous • steal user login credentials • Bugs are errors in someone's code or program • This is malware that holds computer system captive • When attackers try to access your details via emails • A piece of code which can copy itself and typically has a detriment effect • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- Unauthorized use of personal information.
- Practices for maintaining cybersecurity.
- Potential harm from cyber threats.
- Protecting networks from unauthorized access.
- Understanding cybersecurity risks.
- Potential dangers to digital systems.
- Rules governing cybersecurity practices.
- Safeguarding data from unauthorized access.
- Measures to protect against cyber threats.
- Malicious software designed to harm systems.
- response Reacting to and mitigating cyber incidents.
- Individuals working in cybersecurity roles.
- Fraudulent attempt to obtain sensitive information.
- Ability to use digital tools effectively.
- Bullying using electronic means.
- Ensuring a healthy digital lifestyle.
- Measures to protect digital assets.
- Security event affecting digital systems.
- Learning about cybersecurity practices.
- Criminal activities conducted online.
- Manipulating individuals to divulge information.
- Self-replicating malicious code.
- Practice of protecting digital systems.
- Practices for staying safe online.
- Dual verification for user identity.
- Secret code for accessing systems.
- Legal regulations governing cyberspace.
- Converting data into a code to secure it.
- Deceptive attempt to acquire sensitive information.
- Traces of online activity.
- Virtual Private Network for secure connections.
- a type of malicious software that self-replicates and spreads to other computer systems
- Unsolicited and often irrelevant messages.
Down
- Unauthorized access to sensitive data.
- Responsible behavior online.
- Covertly obtaining information from digital systems.
- Gathering and analyzing data to prevent cyber threats.
- the state of being protected from harm, danger, or risk,
- Verifying user identity.
- Intentional assault on computer systems.
- Protecting network endpoints from threats.
- Malware that encrypts data for ransom.
- Moral principles guiding online behavior.
- Encrypted and protected communication channels.
- Global network connecting computers worldwide.
- Safely navigating the internet.
- Storing and accessing data over the internet.
- Maintaining a healthy digital lifestyle.
- Ability to withstand and recover from cyber attacks.
- are individuals or groups with advanced technical skills who use their expertise to gain unauthorized access to computer systems,
- Control over personal data usage.
51 Clues: Verifying user identity. • Traces of online activity. • Responsible behavior online. • Safely navigating the internet. • Bullying using electronic means. • Self-replicating malicious code. • Control over personal data usage. • Potential harm from cyber threats. • Understanding cybersecurity risks. • Practices for staying safe online. • Secret code for accessing systems. • ...
Information Security Crossword - 11 2013-07-09
Across
- Originally created in 1969.
- A type of attack in which the traffic to a website is redirected to a fake website by manipulating host file on your system or DNS server.
- A statement or a set of statements adopted by management and binding on all the employees to follow.
- Viruses _______ vulnerabilities in a system to infect it.
- IRDA is a ___________.
- Generally a bug fix.
- US equivalent to Indian MOD.
- Password is to ___________ just as user ID is to Identification.
- Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
- _________requires constant monitoring in a data center.
- ACL stands for _______ Control List
- Provides backup power.
- Mail _____- sending huge quantities of mails.
- Fulfilling contractual requirements is also a ________ requirement.
- Digital _______ - Science of computer investigation.
- Vulnerability in software is a ____ or a programming flaw which can get exploited leading to unstable behavior.
- Emergency exits always open _________.
- _________ configures and manages a system as per the data owner’s requirements.
- Generates random one time passwords.
- Data _______ defines the security requirements of data.
- Content ______ dynamically inspects the contents being exchanged over mail or web, blocks or logs the communication.
Down
- Ensuring ________ safety is in the scope of information security.
- Your window to the internet.
- Weakest link in information security.
- A server getting infected with virus leads to the loss of ________ of the computer system.
- Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
- Earliest predecessor of Internet.
- AES is an encryption ___________.
- Personal computers requires ______ as much as office systems.
- Inherent weakness in something which makes it prone to damage.
- Security _________ defines how the information should be handled.
- ______ encrypts hard disk.
- During crisis you should go out and never return or enter from an _______ exit.
- Daily dose of updates for an antivirus.
- Coming out safely from structure in danger.
- A popular antivirus software.
- Blocks unwanted network traffic to your computer.
- An internet browser.
- Division of office space into areas with varying degree of physical access controls.
- Internet related.
40 Clues: Internet related. • Generally a bug fix. • An internet browser. • IRDA is a ___________. • Provides backup power. • ______ encrypts hard disk. • Originally created in 1969. • Your window to the internet. • US equivalent to Indian MOD. • A popular antivirus software. • Earliest predecessor of Internet. • AES is an encryption ___________. • ACL stands for _______ Control List • ...
Kiewit Cyber Security Awareness 2022 2022-09-15
Across
- ___must be 14 characters long, including upper case, lower case, and special characters
- Use____________ information only for the purposes for which it was collected.
- A security incident or compromise can occur even with security ________ and security awareness training in place.
- Ensure downloaded ____________ is properly licensed and authorized before installing.
- _________________attacks, such as spear phishing and CEO Fraud, involve research on the target before the attack is launched.
Down
- Safe ______ handling practices are critical at each step of accessing, sharing, transmitting, retaining, and destroying ______.
- When somebody sends an e-mail with a link to a bogus website it is called______.
- Users should_________their systems when leaving them unattended.
- This can slow down your computer AND watch everywhere you go on the internet.
- A software used to perform malicious actions.
- Chief Information Security Officer
- Kiewit may ___________ your internet usage.
- Kiewit systems will automatically lock after ______ failed attempts.
13 Clues: Chief Information Security Officer • Kiewit may ___________ your internet usage. • A software used to perform malicious actions. • Users should_________their systems when leaving them unattended. • Kiewit systems will automatically lock after ______ failed attempts. • Use____________ information only for the purposes for which it was collected. • ...
FIT 2013-05-16
Across
- Something that would go into a computer like a mouse
- Machinery of the computer
- Liquid Crystal Display/Light emitting diod
- Central Processing Unit
- The cloud based presentation maker with rooming features
- Picture or symbol representing a company
- Example: Google
- You and your safety online
- Visual Display Unit
- An ad in paper form.
- A potable Device
- The smalleststorage size
- The programs and other operating systems used by computers
- Where you plug in speakers/earbuds
Down
- A device that connects to a computer
- Wireless Internet
- An object in a computer that stores data
- Location for CD in a laptop
- The space you type in
- Something that comes out of a computer such as a speaker
- National Cyber Security Alliance
- The primary circuit board
- Online storage
- Example: Temple Run
- Random Access Memory
- The biggest storage size
- Way you act and behave online
- A saying representing a company
- Flash drive port
29 Clues: Online storage • Example: Google • A potable Device • Flash drive port • Wireless Internet • Example: Temple Run • Visual Display Unit • Random Access Memory • An ad in paper form. • The space you type in • Central Processing Unit • The biggest storage size • The smalleststorage size • Machinery of the computer • The primary circuit board • You and your safety online • ...
LBIU Crossword 2022-02-17
Across
- participating in a probe that repeats endlessly.
- a concrete room used for storage in the backtimes, now used by squatters as homes.
- a mindprobe about life in Eden.
- a person who carries messages illegally between the
- a tunnel system that used to transport water.
- a prepackaged food item that tastes like chocolate.
- a virtual reality experienced by your mind via an electrode needle.
- a Tactical Urban Vehicle; an armored cyber-driven van.
- a person addicted to mindprobes.
- a beverage that provides energy.
- Eden from the Urb.
Down
- a machine that converts the spoken word into text.
- a Technical Security Guard.
- dumb, lame (used as an adjective or a noun).
- what proovs call their birth parents.
- Zone an area planted with land mines that
- the area inhabited by normals.
- a genetically improved human.
- a secure area within the Urb where proovs live.
- a medical technician; like a doctor in the backtimes.
- a person who has not been genetically improved.
21 Clues: Eden from the Urb. • a Technical Security Guard. • a genetically improved human. • the area inhabited by normals. • a mindprobe about life in Eden. • a person addicted to mindprobes. • a beverage that provides energy. • what proovs call their birth parents. • Zone an area planted with land mines that • dumb, lame (used as an adjective or a noun). • ...
All things DAIL 2025-07-21
Across
- Where to go to sign up for AHS trainings and events.
- Supportive care provided outside of institutional settings.
- Division housing Adult Protective Services and Survey and Certification.
- Number of public guardians.
- Community partners across the state, Howard Center is one.
- Karma Chameleon.
- Program providing home care under moderate, high, or highest needs.
- Person-centered, meaningful job matches, full inclusion in the Vermont workforce, and creative strategies that broaden employment opportunities are cornerstone practices.
- DEI meets Star Wars.
Down
- A type of lifestyle emphasizing self-sufficiency and autonomy.
- Provides DAIL interactive cyber security training.
- One section of a larger group.
- Location of last 2024 EAD.
- The process of growing older.
- Helps people move out of nursing homes into their preferred community-based setting.
- Focus of ADA legislation.
- Name change.
- AHS Commissioner.
- Division Director
- DBVI grant providing training to schools and students for post-school success.
- Name of two consecutive commissioners.
21 Clues: Name change. • Karma Chameleon. • AHS Commissioner. • Division Director • DEI meets Star Wars. • Focus of ADA legislation. • Location of last 2024 EAD. • Number of public guardians. • The process of growing older. • One section of a larger group. • Name of two consecutive commissioners. • Provides DAIL interactive cyber security training. • ...
News notes week 5 2025-09-24
Across
- KInd of attack that wreak havoc for air travel
- Place that had deadly Attack
- Person that was named WNBA MVP for a record 4th time
- age golfer pledged to keep golfing
- Day that Jimmy Kimmel returned
- Fmr Bengals running back that died at 45
- Type of animal that killed trainer
- Name of storm that went from Ohio to Hong kong
- airline company that had to have an emergency landing
- Name of person found guilty of trump assasination
Down
- Place that boosts security for U.N. meeting
- actor injured on spiderman set
- Nfl team's "tush push" that faced renewed scrutiny
- kind of racing park where cessna crashed
- person who returns to their live show
- Number of arrests for the plot to crash NYC phone towers
- Number of people that went to Charlie Kirk memorial
- reason why delta jet had to have an emergency landing
- Place that had a tiger attack the trainer
- medication that leads to autism
20 Clues: Place that had deadly Attack • actor injured on spiderman set • Day that Jimmy Kimmel returned • medication that leads to autism • age golfer pledged to keep golfing • Type of animal that killed trainer • person who returns to their live show • kind of racing park where cessna crashed • Fmr Bengals running back that died at 45 • Place that had a tiger attack the trainer • ...
Ketimpangan smansabat25 2025-01-18
Across
- Ancaman di dalam perangkat lunak
- Menyusup sistem computer Tanpa izin
- kelompok prentas asal Rusia
- yang dapat menimbulkan sybercrime
- kasus cybercrime yang terjadi tahun 2022
- apa saja serangan cyber
- langkah melindungi privasi online
- Kejahatan yang memanfaatkan data
- Serangaki kode sekali pakai
- Tiket terbesar indonesia
- apa arti internet aman
- Ancaman di lakukan menyisipkan
Down
- Korban kejahatan cyber
- apa saja jenis² hacker
- bully Penindasan secara online melalui internet
- Informasi tidak benar internet
- Apasaja jenis serangan cybercrime
- siapa pendiri cisa
- Memancing korban memberikan identitas
- inisial dari pelaku peretasan website
20 Clues: siapa pendiri cisa • Korban kejahatan cyber • apa saja jenis² hacker • apa arti internet aman • apa saja serangan cyber • Tiket terbesar indonesia • kelompok prentas asal Rusia • Serangaki kode sekali pakai • Informasi tidak benar internet • Ancaman di lakukan menyisipkan • Ancaman di dalam perangkat lunak • Kejahatan yang memanfaatkan data • yang dapat menimbulkan sybercrime • ...
Cyber Security Challenge: Remote Financial Data Privacy 2023-12-29
Across
- This type of software is specifically developed to identify and eliminate computer viruses.
- This term describes an event that compromises the security, confidentiality, or integrity of personal data, often involving a breach of privacy.
- This term refers to unwanted emails, often sent for advertising purposes and distributed widely to numerous recipients.
- This security approach involves confirming a user's identity by requiring multiple forms of evidence before granting system access.
- This technology is a secure network that allows data transmission over public networks as if the devices were directly connected to a private network.
- This principle involves restricting the availability of information solely to individuals who are authorized to access it.
Down
- This term described a harmful action that intentionally disrupts or damages computer networks or systems.
- This type of malware is designed to restrict access to a computer system and demands a ransom to be paid for its removal.
- These plans and procedures help an organization bounce back after unexpected events like flood or cyber attacks.
- Ensuring the essential operations continue uninterrupted, even during crises, is the essence of this practice.
- This process involves transforming data or information into a secret code to prevent unauthorized access.
- This cybersecurity measure involves backup systems and resources, offering added security and reliability, especially with remote financial data.
- This advanced security technology facilitates password-free authentication, enhancing user verification in online transactions.
- This system acts as a protective barrier to prevent unauthorized access to or from a private network.
- This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle.
- This term describes an incident where there is unauthorized access or disclosure of personal information, compromising your privacy.
- This technique is a deceptive method used to obtain sensitive information by posing as a legitimate entity in digital communications.
17 Clues: This type of software is specifically developed to identify and eliminate computer viruses. • This system acts as a protective barrier to prevent unauthorized access to or from a private network. • This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle. • ...
Cyber Safety 2024-06-28
Across
- A secret word or phrase used to authenticate access to a system or account.
- The process of converting information into a secure format to prevent unauthorized access.
- Software designed to detect and remove malicious software from a computer.
- A software update that fixes vulnerabilities and improves security.
Down
- A method of authentication that requires two different forms of identification to access an account.
- A copy of data stored separately to prevent data loss in case of a cyber attack or system failure.
- The process of installing the latest versions of software to protect against vulnerabilities
- The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A Virtual Private Network that creates a secure connection over the internet.
10 Clues: A software update that fixes vulnerabilities and improves security. • Software designed to detect and remove malicious software from a computer. • A secret word or phrase used to authenticate access to a system or account. • A Virtual Private Network that creates a secure connection over the internet. • ...
RU ITEC41 2025-04-18
Across
- Converting data into a secure format to prevent unauthorized access.
- Protection of data and systems from cyber threats.
- Ensuring information is only accessible to authorized individuals.
- Safeguarding data from unauthorized access or damage.
- Legal rights over creations, such as digital content.
- Legal entitlements related to digital privacy and data.
- A weakness that can be exploited in a system.
- Deceptive attempts to acquire sensitive information, often via email.
- Software designed to disrupt or damage systems.
- Unauthorized access to or exposure of data.
Down
- Limiting access to data or systems based on authorization.
- The accuracy and consistency of data.
- Responsibility for actions and decisions, especially regarding data.
- Permission granted for the use of personal data.
- Illegal activities conducted through digital means.
- The trace of an individual's online activity.
- Defense against digital threats and attacks.
- Monitoring or tracking of online activity.
- Unauthorized access to systems or networks.
- The right to keep personal information secure and undisclosed.
20 Clues: The accuracy and consistency of data. • Monitoring or tracking of online activity. • Unauthorized access to systems or networks. • Unauthorized access to or exposure of data. • Defense against digital threats and attacks. • The trace of an individual's online activity. • A weakness that can be exploited in a system. • Software designed to disrupt or damage systems. • ...
Security Terminology Puzzle (Participation 3) 2023-01-27
Across
- security program looking for malware
- multiple devices trying to flood a site in order to shut it down
- malicious software
- a network of computers used to carry out cyberattacks
- a unique string of numbers that identifies a device
- virtual private network
- online harassment
- media manipulation of an image or video to create a false reality
- attack that exploits a vulnerability in software for the first time
- collecting private information without consent
- tries to gather your private information
- cyber attack to tricks users into clicking on hidden elements
Down
- wifi that is public to everyone in range
- when sensitive data was leaked
- an attack that wants money for access to your system back
- protection against unauthorized access to data
- protection codes
- malware that appears to be harmless
- a method of scrambling data so only authorized users have access
- a trend in which people use person devices instead of work provided devices
20 Clues: protection codes • online harassment • malicious software • virtual private network • when sensitive data was leaked • malware that appears to be harmless • security program looking for malware • wifi that is public to everyone in range • tries to gather your private information • protection against unauthorized access to data • collecting private information without consent • ...
INFORMATIKA XI MIPA 2_04 2023-10-15
Across
- Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
- keluarga sistem operasi komputer pribadi
- Metode autentikasi terhadap akses dengan memberitahukan kunci
- karakteristik penting robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
- Pusat jaringan dengan koneksi tertinggi dalam topologi
- aplikasi operasi angka komputer dengan komponen beberapa cell
- perangkat lunak
- embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
Down
- Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
- Tingkat ancaman tertinggi
- Fungsi database management system untuk memastikan data sesuai aturan
- Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
- perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
- Reduced Intruction Set Computer
- Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan banyan topologi sederhana dua komputer
- Sesuatu yang diberikan
- Metode air terjun pada pembagian tahapan dalam pengembangan sistem
- perekam kamera video
- Sistem keamanan pada file sistem operasi
- segmen angka yang digunakan pada dunia digital
20 Clues: perangkat lunak • perekam kamera video • Sesuatu yang diberikan • Tingkat ancaman tertinggi • Reduced Intruction Set Computer • keluarga sistem operasi komputer pribadi • Sistem keamanan pada file sistem operasi • segmen angka yang digunakan pada dunia digital • Pusat jaringan dengan koneksi tertinggi dalam topologi • ...
INFORMATIKA XI MIPA 2_04 2023-10-16
Across
- Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
- karakteristik penting pada robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
- perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
- Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
- Pusat jaringan dengan koneksi tertinggi dalam topologi
- Sesuatu yang diberikan
- Metode air terju pada pembagian tahapan dalam pengembangan sistem
- Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan topologi sederhana dua komputer
- aplikasi operasi angka komputer dengan komponen beberapa cell
- keluarga sistem operasi komputer pribadi
Down
- Fungsi database management system untuk memastikan data sesuai aturan
- segmen angka yang digunakan pada dunia digital
- Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
- perangkat lunak
- Sistem keamanan pada file sistem operasi
- Metode autentikasi terhadap akses dengan memberitahukan kunci
- Tingkat ancaman tertinggi
- Embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
- perekam kamera video
- Reduced Intruction Set Computer
20 Clues: perangkat lunak • perekam kamera video • Sesuatu yang diberikan • Tingkat ancaman tertinggi • Reduced Intruction Set Computer • Sistem keamanan pada file sistem operasi • keluarga sistem operasi komputer pribadi • segmen angka yang digunakan pada dunia digital • Pusat jaringan dengan koneksi tertinggi dalam topologi • ...
News notes week 5 2025-09-24
Across
- KInd of attack that wreak havoc for air travel
- Place that had deadly Attack
- Person that was named WNBA MVP for a record 4th time
- age golfer pledged to keep golfing
- Day that Jimmy Kimmel returned
- Fmr Bengals running back that died at 45
- Type of animal that killed trainer
- Name of storm that went from Ohio to Hong kong
- airline company that had to have an emergency landing
- Name of person found guilty of trump assasination
Down
- Place that boosts security for U.N. meeting
- actor injured on spiderman set
- Nfl team's "tush push" that faced renewed scrutiny
- kind of racing park where cessna crashed
- person who returns to their live show
- Number of arrests for the plot to crash NYC phone towers
- Number of people that went to Charlie Kirk memorial
- reason why delta jet had to have an emergency landing
- Place that had a tiger attack the trainer
- medication that leads to autism
20 Clues: Place that had deadly Attack • actor injured on spiderman set • Day that Jimmy Kimmel returned • medication that leads to autism • age golfer pledged to keep golfing • Type of animal that killed trainer • person who returns to their live show • kind of racing park where cessna crashed • Fmr Bengals running back that died at 45 • Place that had a tiger attack the trainer • ...
PHW Compliance Week 2024-10-08
Across
- 2. You should call the _____________ to report a suspected or known violation.
- 3. Wrongful or criminal deception intended to result in financial or personal gain.
- 14. Any possible ______________ event should be reported to the compliance team as soon as it is discovered.
- 13. Compliance _____________ is my favorite time of the year!
- 4. The Compliance program is supported by _____________ and Procedures.
- 9. Abusive, Offensive or Discriminatory remarks are what type of abuse?
- 8. PHW will strictly prohibit and will not tolerate any form of ___________ or bullying.
- 7. All _______________ are responsible for the information in the Code of Conduct and Compliance Program and will be held accountable for failing to comply.
Down
- 6. An official inspection of an individual’s or organization’s accounts.
- 15. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the __________ home page.
- 1. The _________________ Officer is responsible for implementing and supporting the effectiveness of the Compliance Program.
- 5. Computer Security.
- 10. All employees are required to complete these in Centene University by the assigned due dates.
- 12. Sending an email securely means it has been _____________________.
- 11. FWA stands for Fraud, ____________ and Abuse.
15 Clues: 5. Computer Security. • 11. FWA stands for Fraud, ____________ and Abuse. • 13. Compliance _____________ is my favorite time of the year! • 12. Sending an email securely means it has been _____________________. • 4. The Compliance program is supported by _____________ and Procedures. • 9. Abusive, Offensive or Discriminatory remarks are what type of abuse? • ...
Ketimpangan smansabat25 2025-01-18
Across
- Ancaman di dalam perangkat lunak
- Menyusup sistem computer Tanpa izin
- kelompok prentas asal Rusia
- yang dapat menimbulkan sybercrime
- kasus cybercrime yang terjadi tahun 2022
- apa saja serangan cyber
- langkah melindungi privasi online
- Kejahatan yang memanfaatkan data
- Serangaki kode sekali pakai
- Tiket terbesar indonesia
- apa arti internet aman
- Ancaman di lakukan menyisipkan
Down
- Korban kejahatan cyber
- apa saja jenis² hacker
- bully Penindasan secara online melalui internet
- Informasi tidak benar internet
- Apasaja jenis serangan cybercrime
- siapa pendiri cisa
- Memancing korban memberikan identitas
- inisial dari pelaku peretasan website
20 Clues: siapa pendiri cisa • Korban kejahatan cyber • apa saja jenis² hacker • apa arti internet aman • apa saja serangan cyber • Tiket terbesar indonesia • kelompok prentas asal Rusia • Serangaki kode sekali pakai • Informasi tidak benar internet • Ancaman di lakukan menyisipkan • Ancaman di dalam perangkat lunak • Kejahatan yang memanfaatkan data • yang dapat menimbulkan sybercrime • ...
August 2020 Newsletter Crossword Puzzle 2020-08-07
Across
- A form of social engineering where an attacker tries to convince a victim to give up valuable information or access to a service or system.
- A cyber hacker poses as another person when apprehended for breaking the law.
- A cyber criminal uses another person's identity to obtain credit, goods and services.
- A type of identity theft where a theft uses a person’s name, address, and social security number to file a fraudulent tax return.
Down
- This activity involves rummaging through trash for personal information.
- A technique used by an individual to discreetly watch or listen to others providing valuable personal information.
- A type of identity theft when a hacker assumes another person's identity to obtain prescriptions.
- A type of identity theft where a hacker poses as another person when apprehended for a crime.
- A cyber criminal uses another person's information to assume his or her identity in daily life.
- A minor’s identity is used for an impostor’s personal gain.
10 Clues: A minor’s identity is used for an impostor’s personal gain. • This activity involves rummaging through trash for personal information. • A cyber hacker poses as another person when apprehended for breaking the law. • A cyber criminal uses another person's identity to obtain credit, goods and services. • ...
cyber 2023-03-08
16 Clues: aide • texto • bipes • danger • public • bloque • ignorer • securité • internet • empathie • jeunesse • violence • signaler • professeur • cyberespace • localisation
Security 2022-02-08
Across
- A deployment area for Google Cloud resources within a region. (4)
- I am an affordable compute instance suitable for batch and fault-tolerant workloads. (4)
- I am a high performance persistent disk. Acronym(3)
- A technology to keep your virtual machine instances running even when a host system event, such as a software or hardware update, occurs. (4,9)
- I am dedicated to hosting only your project's VMs.(4,6)
- A discount in return for committing to paying for Compute Engine resources for 1 year or 3 years. Acronym(3)
- I collect telemetry from Compute Engine instances. (3,5)
- I can speed up compute jobs. Acronym(3)
- An automatic discount for running specific Compute Engine resources a significant portion of the billing month. Acronym(3)
- A specific geographical location where you can host your resources. (6)
- A licensing model that lets companies use their licenses flexibly, whether on-premise, or in the cloud. Acronym(4)
Down
- I am a type of storage created automatically when you create a Compute Engine instance. (4,4)
- I will need to be created to periodically back up data from your zonal persistent disks or regional persistent disks. (8)
- I am a Compute Engine VM running on hosts based on the second generation of AMD Epyc processors and have built-in optimization of both performance and security for enterprise-class high memory workloads. (12)
- I run when a virtual machine (VM) instance boots. (7,6)
- I am a type of VM that helps to protect enterprise workloads from threats like remote attacks, privilege escalation, and malicious insiders. (8)
- A collection of virtual machine (VM) instances that you can manage as a single entity. Acronym (3)
- I am Machine type that allows you to optimally choose a CPU and Memory configuration of your choice and not be limited to standard configurations. (8)
18 Clues: I can speed up compute jobs. Acronym(3) • I am a high performance persistent disk. Acronym(3) • I run when a virtual machine (VM) instance boots. (7,6) • I am dedicated to hosting only your project's VMs.(4,6) • I collect telemetry from Compute Engine instances. (3,5) • A deployment area for Google Cloud resources within a region. (4) • ...
INFORMATIKA XI MIPA 2_04 2023-10-15
Across
- Jenis DBMS yang merepresentasikan susunan tabel dalam bentuk baris dan kolom yang saling berhubungan
- Metode air terju pada pembagian tahapan dalam pengembangan sistem
- Reduced Intruction Set Computer
- Tingkat ancaman tertinggi
- Metode autentikasi terhadap akses dengan memberitahukan kunci
- perekam kamera video
- Fungsi database management system untuk memastikan data sesuai aturan
- karakteristik penting robot untuk menggerakkan komponen elektrik dan mekanika yang terpasang
- Menghubungkan komputer satu dengan komputer lain sehingga menjadi sebuah jaringan dengan banyan topologi sederhana dua komputer
Down
- Pusat jaringan dengan koneksi tertinggi dalam topologi
- Sistem keamanan pada file sistem operasi
- Tindakan hacker untuk memanfaatkan kelemahan orang yg memiliki akses
- aplikasi operasi angka komputer dengan komponen beberapa cell
- Embbeded untuk menghubungkan jaringan dengan interface ke sumber akses
- Kejahatan Cyber crime dengan menguasai sistem tanpa keseluruhan
- perangkat lunak
- perangkat otomatis yang terprogam untuk pengendali alat elektronik rumah
- Sesuatu yang diberikan
- keluarga sistem operasi komputer pribadi
- segmen angka yang digunakan pada dunia digital
20 Clues: perangkat lunak • perekam kamera video • Sesuatu yang diberikan • Tingkat ancaman tertinggi • Reduced Intruction Set Computer • Sistem keamanan pada file sistem operasi • keluarga sistem operasi komputer pribadi • segmen angka yang digunakan pada dunia digital • Pusat jaringan dengan koneksi tertinggi dalam topologi • ...
Kaelyn's Crossword 2024-09-13
Across
- Used to type phrases
- Any device
- An interal part of a device
- blocks computer virus
- Another word for a search engine
- You need this cord to connect to the internet
- Connects to online
- An extra security measure
- Processes the computers data
- An external part of a device
- A screen that views what is on the device
Down
- Microsoft windows or macOS would be an example of this
- Another word for small files
- A device most used to research or access the internet
- A device that connects an electronic to the internet
- Giving credit to a documentation
- A type of wire used to connect many devices
- Holds content
- A cyber attack
- Digital record of data tracking
- A device that most people carry around
- Used to store photos and information
- Something needed to access online content
- A type of link
- Speeds up the computer proccess
- Used to screen capture and takes recordings
26 Clues: Any device • Holds content • A cyber attack • A type of link • Connects to online • Used to type phrases • blocks computer virus • An extra security measure • An interal part of a device • Another word for small files • Processes the computers data • An external part of a device • Digital record of data tracking • Speeds up the computer proccess • Giving credit to a documentation • ...
2.2 Quels dangers la cyber-société pose-t-elle? 2026-01-30
Across
- To promote (9)
- Manipulative (12)
- To download (11)
- Risk (6)
- Connected (7)
- Email (20)
- To log on (12)
- Bullying (11)
- Computer programme (8)
- To combat / to fight (8)
- To affect (7)
- Device (8)
- To eliminate (8)
- To spread / broadcast (8)
- Trustworthiness (9)
- Policy (8)
- Freedom (7)
- To dare (4)
- To spread (10)
- Under age (under 18) (6)
- To use (9)
- Cyber crime (16)
- To face up to (10)
Down
- Vulnerable / at risk (10)
- To intervene (9)
- Intrusion (9)
- Messaging service (10)
- File (7)
- Real (4)
- Trustworthy (6)
- Internet user (11)
- Unknown (7)
- Victim (7)
- Scare (7)
- Manipulation (12)
- To believe (6)
- Password (10)
- Cyberbullying (16)
- Adult (over 18) (6)
- Unique identifier (18)
- To monitor (10)
- Fraud (6)
- Security / safety (8)
- Report (9)
- To send (6)
- Meeting (9)
46 Clues: File (7) • Real (4) • Risk (6) • Scare (7) • Fraud (6) • Victim (7) • Email (20) • Device (8) • Policy (8) • Report (9) • To use (9) • Unknown (7) • Freedom (7) • To dare (4) • To send (6) • Meeting (9) • Intrusion (9) • Connected (7) • Bullying (11) • Password (10) • To affect (7) • To promote (9) • To log on (12) • To believe (6) • To spread (10) • Trustworthy (6) • To monitor (10) • To intervene (9) • To download (11) • ...
Security 2023-04-18
Across
- physical or logical subnet that separates an internal network from the internet
- It is usually better to lose functionality rather than security.
- Hides the data being transferred between parties.
- The most common method of tracking a customer accessing an organization’s website is by assigning a unique
- Analyzes running code while simulating outside, or “black box” attacks.
- is the point where data transfers from the intranet to the internet and vice-versa.
- Verifies that the data has not been forged or tampered with.
- is a set of algorithms that specifies details such as which shared encryption keys, or session keys, will be used for that particular session.
- This type of ethical hacker attempts to break into the application in order to detect vulnerabilities and find potential attack vectors with the aim of protecting the system from a real attack
- critical data should be maintained in the event of catastrophic system failure.
- is at the root of many security issues.
Down
- is the monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
- Confidentiality, integrity, and availability
- aims to detect security holes from day one in order to prevent security issues
- This principle dictates that each task, process, or user is granted the minimum rights required to perform its job.
- an attacker can maliciously inject JavaScript into an application running on the victim’s browser.
- This requires developers to check their code as they are writing it to ensure that security issues are not being introduced during development.
- ensure that a user is who they say they are.
18 Clues: is at the root of many security issues. • Confidentiality, integrity, and availability • ensure that a user is who they say they are. • Hides the data being transferred between parties. • Verifies that the data has not been forged or tampered with. • It is usually better to lose functionality rather than security. • ...
Security 2025-11-19
Across
- this is used to show the building is clear
- if reporters come into question we refer them to this department
- Fire safety is who's responsibility?
- you can use this to identify the robber or vehicle
- you do this if a fire is to big to contain
- how many fire extinguishers are in the building
- The acronym for using a fire extinguisher
- extortion is kept here
- where is our safe meeting spot
Down
- We have this many handheld alarms in our branch
- this amount is dispensed in a robbery
- We use this name to respond if we are in danger
- what is the current all clear sign
- robbery checklist is kept here
- true or false? do not block fire pull stations
- this four step emergency plan to guide in a fire situation
- dispense keys
- Rbfcu has these type of fire extinguishers
18 Clues: dispense keys • extortion is kept here • robbery checklist is kept here • where is our safe meeting spot • what is the current all clear sign • Fire safety is who's responsibility? • this amount is dispensed in a robbery • The acronym for using a fire extinguisher • this is used to show the building is clear • you do this if a fire is to big to contain • ...
Project Three Part Two 2021-10-15
Across
- Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
- a kind of bullying or harassment that takes place via the internet.
- The skill of writing and solving codes, or the study of codes.
- a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
- cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
- a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
- Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
- the technique of defending vital systems and sensitive data against cyber-attacks.
- any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
- A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.
10 Clues: The skill of writing and solving codes, or the study of codes. • a kind of bullying or harassment that takes place via the internet. • the technique of defending vital systems and sensitive data against cyber-attacks. • A person in an existing photograph or video is replaced with someone else's likeness in synthetic media. • ...
Cyber Bulling 2022-05-05
Across
- where does cyber bullying take place
- the percent of people who have experienced cyber bullying in the last 6 months
- what sort of phones can be used in cyberbullying
- who could be cyber bullied
Down
- who can you talk to if somebody in the class is sending you mean messages
- what’s it called when you watch someone be bullied and do nothing
- what’s one thing you can do if you have been cyber bullying someone but you want to stop
- who do you call if you feel unsafe or think some will hurt you
- who deserves to be Cyber bullied
- you should stop and _ before posting something online
10 Clues: who could be cyber bullied • who deserves to be Cyber bullied • where does cyber bullying take place • what sort of phones can be used in cyberbullying • you should stop and _ before posting something online • who do you call if you feel unsafe or think some will hurt you • what’s it called when you watch someone be bullied and do nothing • ...
Puzzle No. 2 2022-09-08
Across
- A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
- Ensuring that authorized users have access to information and associated assets when required.
- These fix general software problems and provide new security patches where criminals might get in.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Sentence-like format of password which is strong but easier to remember.
- A weakness in your security policy, implementation, design, and controls.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
- You should not write down your password in this type of physical medium.
Down
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- Ensuring that information is accessible only to those authorized to have access.
- An event that will cause harm to you or your asset.
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- ”________ is everyone’s responsibility”.
- Safeguarding the accuracy and completeness of information.
15 Clues: ”________ is everyone’s responsibility”. • An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
Cybersecurity Recap 2026-01-22
Across
- Harmful software designed to damage, disrupt, or gain unauthorized access to a computer system
- The process of determining what an authenticated user is allowed to access or do
- A security system that monitors and controls incoming and outgoing network traffic
- The process of proving who you are, such as logging in with a password or fingerprint
- A type of malware that spreads by attaching itself to files and can damage or delete data
- Authentication a security method that requires two forms of verification to access an account
Down
- The process of converting data into a coded format so only authorized users can read it
- Ensuring systems and data are accessible when needed
- Malware that disguises itself as legitimate software to trick users into installing it
- Engineering manipulating people into giving up confidential information rather than hacking systems
- Triad a cybersecurity model that includes confidentiality, integrity, and availability
- A cyber attack where scammers send fake emails or messages to trick people into giving personal information
- Making sure data is accurate and has not been altered without permission
- Ensuring that information is only accessible to authorized users
- A secret word or phrase used to access an account or system
15 Clues: Ensuring systems and data are accessible when needed • A secret word or phrase used to access an account or system • Ensuring that information is only accessible to authorized users • Making sure data is accurate and has not been altered without permission • The process of determining what an authenticated user is allowed to access or do • ...
Cyber Ethics 2025-06-15
Across
- using another's work without proper credit.
- illegal intrusion into a computer system
- the act of bullying or harassing individuals online.
- fake news or misleading information online
- unauthorized copying or distribution of digital content.
- the process of verifying someone's identity online.
- manipulating digital media to spread false information.
Down
- software designed to detect, prevent and remove malicious programs from a computer system.
- fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- the practice of protecting networks and systems from cyber threats.
- unwanted or unsolicited digital messages.
- encryption method ensuring data security during transmission.
- the set of polite and respectful behavior expected in online communication.
- software designed to harm or exploit computer systems.
- the right to control access personal information online.
- someone who hacks into one's computer system illegally.
- computer virus that disguises itself as a harmless program.
17 Clues: illegal intrusion into a computer system • unwanted or unsolicited digital messages. • fake news or misleading information online • using another's work without proper credit. • the process of verifying someone's identity online. • the act of bullying or harassing individuals online. • software designed to harm or exploit computer systems. • ...
Cybercrime Crossword 2025-10-22
Across
- a popular cryptocurrency of a dog that has become a meme
- A section of the internet that is used for illegal intent
- A digital aid that protects
- An email scam trying to steal login credentials, starts with "PH"
- completely digital currency
- a network security system that monitors tragic, often referred to as a wall
- the first and most well known crypto currency
- general term for malicious software
Down
- deliberate deception to make personal gain
- when sensitive information is accessed or disclosed without authorization when someone gets through your data.
- an unauthorized person who gains access to a system
- scrambling data to protect from unauthorized access
- software or code that takes advantage
- a deceptive scheme used to trick someone out of money
- malware that encrypts and demands money
- software that secretly monitors a user's data.
- the target of a cyber attack.
17 Clues: A digital aid that protects • completely digital currency • the target of a cyber attack. • general term for malicious software • software or code that takes advantage • malware that encrypts and demands money • deliberate deception to make personal gain • the first and most well known crypto currency • software that secretly monitors a user's data. • ...
cyber bullying 2013-06-04
Across
- Be __________for your words and actions online as ought you take charge of your own words.
- Sending the same message to many people on the Internet.
- do not ________ or reply after you are cyber bullied.
- ______ bullying is to bully others online.
- when you are cyber bullied, __________the incident to an adult.
- cyber bullying can ______ people’s feelings as they will feel sad
Down
- cyber bullying is using the ________________or phone to repeatedly say rude and hurtful things about a person.
- do not use _____________ in your speech on the internet.
- _________ is online manners.
- when you tell an adult, always ________ the evidence as it will help crack the case.
10 Clues: _________ is online manners. • ______ bullying is to bully others online. • do not ________ or reply after you are cyber bullied. • do not use _____________ in your speech on the internet. • Sending the same message to many people on the Internet. • when you are cyber bullied, __________the incident to an adult. • ...
CH5.1 The Internet 2023-11-29
Across
- a link that can be created to allow you to quickly find a web page again
- a network of bots that are created to carry out a DDoS attack.
- a network component where the web pages for a website are stored
- a type of software that scans a computer or device with the purpose of finding and removing malware.
- the collection of all the web pages and websites that have been made available
- the method of processing all the web page data, such as HTML, to display the web page
- small text file that is used to store personal data, by a web browser
- a text-based identification that is given to a user that identifies the level of access that they have to stored data and resources
- a collection of web pages, normally about a related topic or purpose
- a type of digital currency that uses encryption procedures
- the physical structure, such as all the components and cables, that are used to connect devices
Down
- script used to produce any of the interactive elements of a web page
- a software based cyber issue that automatically creates popup advertisements
- a single page within a website
- a cyber security method that is used to examine incoming and outgoing traffic from a computer or network
- a type of malicious software that is downloaded onto a user's computer or device
- the section of a web browser where you type the web page address
- the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack
- a set of rules for transmitting data
- a method that is used to track all the transactions made with a cryptocurrency
20 Clues: a single page within a website • a set of rules for transmitting data • a type of digital currency that uses encryption procedures • a network of bots that are created to carry out a DDoS attack. • a network component where the web pages for a website are stored • the section of a web browser where you type the web page address • ...
DEAR 2024-12-17 2024-12-17
Across
- Which cyber security company was mentioned in the article?
- Which month did the cyberattack happen?
Down
- Cyberattacks have also caused disruption to ____________.
- Some customers have been unable to make _________ orders due to the attack.
- Due to the cyberattack, Krispy Kreme have lost digital ________.
- Krispy Kreme has 1,400 ________ worldwide.
6 Clues: Which month did the cyberattack happen? • Krispy Kreme has 1,400 ________ worldwide. • Cyberattacks have also caused disruption to ____________. • Which cyber security company was mentioned in the article? • Due to the cyberattack, Krispy Kreme have lost digital ________. • Some customers have been unable to make _________ orders due to the attack.
Abby Puttin- Bullying 2020-11-30
Across
- Someone who stands up to the bully.
- Someone who's doing the bullying.
- The "B" in the ABC's of bullying.
- Type of bullying, spreading rumors,or excluding
- Type of cyber bullying that is pretending to be someone.
- The "D" in the ABC's of bullying.
- Type of bullying online.
Down
- Type of bullying, name calling or threatening.
- Someone who stands by and watches.
- Someone who is attacked in the bullying.
- Type of cyber that is tricking someone into revealing personal information.
- The "A" in the ABC's of bullying.
- Type of bullying that is attacking.
- The "C" in the ABC's of bullying.
14 Clues: Type of bullying online. • Someone who's doing the bullying. • The "B" in the ABC's of bullying. • The "A" in the ABC's of bullying. • The "C" in the ABC's of bullying. • The "D" in the ABC's of bullying. • Someone who stands by and watches. • Someone who stands up to the bully. • Type of bullying that is attacking. • Someone who is attacked in the bullying. • ...
Cybersecurity Fundamental Chapter 7 2024-06-05
Across
- A model used in cybersecurity to describe the stages of an information systems attack.
- Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
- The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
- The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
- A technology used for tracking and identifying objects using radio waves.
- The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
- The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
- The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
- The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
- The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
- Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
- Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
- The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
- The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
- Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
- Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.
16 Clues: A technology used for tracking and identifying objects using radio waves. • A model used in cybersecurity to describe the stages of an information systems attack. • The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target. • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Cyber security for kids 2022-02-02
Across
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- players interact with objects displayed on a screen for the sake of entertainment.
- a secret word or phrase that must be used to gain admission to a place.
- a link from a hypertext document to another location, activated by clicking on a highlighted word or image.
Down
- the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- designed to detect and destroy computer viruses.
- facts provided or learned about something or someone.
- protect (a network or system) from unauthorized access.
9 Clues: designed to detect and destroy computer viruses. • facts provided or learned about something or someone. • protect (a network or system) from unauthorized access. • a secret word or phrase that must be used to gain admission to a place. • players interact with objects displayed on a screen for the sake of entertainment. • ...
Modules 18 to 20 Crossword 2023-03-31
Across
- Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
- A weakness in a system or its design that could be exploited by a threat actor.
- BYOD means Bring Your Own ____
- This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
- The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
- Any potential danger to an asset.
- This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
- This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
- A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
- Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
10 Clues: BYOD means Bring Your Own ____ • Any potential danger to an asset. • A weakness in a system or its design that could be exploited by a threat actor. • This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector. • ...
Gradline Crossword 2017-05-20
Across
- The ______ HSE Day has been introduced across Woodside recently (7)
- Name of the malware from the recent cyber security incident (8)
- The ninth Golden Safety Rule (10,2,6)
- What the letter T represents in TBOSIET (8)
Down
- Woodside employees participated in this HBF-sponsored event (3,3,1,6)
- Public speaking organisation starting up at Woodside (12)
- A quiz night on 25th May supported this charity (8)
- The type of laces being given out for IDAHOT day (7)
8 Clues: The ninth Golden Safety Rule (10,2,6) • What the letter T represents in TBOSIET (8) • A quiz night on 25th May supported this charity (8) • The type of laces being given out for IDAHOT day (7) • Public speaking organisation starting up at Woodside (12) • Name of the malware from the recent cyber security incident (8) • ...
