cyber security Crossword Puzzles

Chapter 3 Activity 2024-09-11

Chapter 3 Activity crossword puzzle
Across
  1. Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
  2. A harmful program that resides in the active memory of the computer and duplicates itself
  3. The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
  4. What organization is mentioned as a resource for cybersecurity guidance?
  5. An attack on an information system that takes advantage of a particular system vulnerability
  6. Software that generates and grades tests that humans can pass but computer programs cannot
  7. The process of scrambling messages or data in such a way that only authorized parties can read it
  8. What federal agency is responsible for protecting U.S. cyber infrastructure?
  9. Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
  10. Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
  11. The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
  12. A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
  13. An attack that occurs before the security community is aware of a vulnerability
  14. Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
  15. Federal Laws: Addresses fraud and related activities in association with computers
Down
  1. Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
  2. A specific sequence of bytes that indicates the presence of a previously identified virus
  3. What type of phishing specifically targets an organization's employees?
  4. Malware that encrypts data and demands a ransom
  5. What does BYOD mean?
  6. A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
  7. What type of attack floods a target with data requests to make a site unavailable?
  8. Many organizations use this to monitor, manage, and maintain their computer and network security
  9. Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
  10. Perpetrators: An individual whose goal is to promote a political ideology
  11. Confidentiality, Integrity, Availability
  12. Federal Laws: Defines cyberterrorism and associated penalties
  13. Phishing using SMS
  14. A networking device that connects multiple networks and transmits data packets between networks
  15. What type of malware disguises itself as legitimate software?

30 Clues: Phishing using SMSWhat does BYOD mean?Confidentiality, Integrity, AvailabilityMalware that encrypts data and demands a ransomFederal Laws: Defines cyberterrorism and associated penaltiesWhat type of malware disguises itself as legitimate software?What type of phishing specifically targets an organization's employees?...

Digital Technology Crossword 2021-08-23

Digital Technology Crossword crossword puzzle
Across
  1. a notation resembling a simplified programming language, used in program design.
  2. facts and statistics collected together for reference or analysis
  3. the imparting or exchanging of information by speaking, writing or using some other medium
  4. the process of assigning a code to something for classification or identification
  5. the notional environment in which communication over computer networks occurs
  6. the machines, wiring, and other physical components of a computer or other electronic system
  7. a pocket-sized computer that introduces you to how software and hardware work together
  8. a high-level general-purpose programming language.
  9. a positional numeral system employing 2 as the base and so requiring only two different symbols for its digits
  10. an electronic device for storing and processing data, usually in binary form
Down
  1. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  2. is a block of code that can be referenced by name to run the code it contains.
  3. the process of converting information or data into a code, especially to prevent unauthorised access
  4. the information about a particular person that exists on the internet as a result of their online activity
  5. a web-based environment for learning to code with physical computing devices such as the micro:bit
  6. a group or system of interconnected computers
  7. The individual 1's and 0's you see in binary
  8. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardised communication protocols.
  9. security the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
  10. the process or activity of writing a computer program

20 Clues: The individual 1's and 0's you see in binarya group or system of interconnected computersa high-level general-purpose programming language.the process or activity of writing a computer programfacts and statistics collected together for reference or analysisan electronic device for storing and processing data, usually in binary form...

Cyber Security Month 2020 2020-09-18

Cyber Security Month 2020 crossword puzzle
Across
  1. people who engages in criminal activity by means of computers or the Internet (2 words)
  2. type of software that helps protect your computer against malware and cybercriminals
  3. a broad range of data that could identify an individual (2 words)
  4. a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
  5. attacks that use email or malicious websites to infect your machine
Down
  1. means of sending or receiving information, such as telephone lines or computers
  2. the process of converting information or data into a code, especially to prevent unauthorized access
  3. a secret word or phrase that must be used to gain admission to something
  4. an email or electronic communications scam targeted towards a specific individual, organization or business

9 Clues: a broad range of data that could identify an individual (2 words)attacks that use email or malicious websites to infect your machinea secret word or phrase that must be used to gain admission to somethingmeans of sending or receiving information, such as telephone lines or computers...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Cyber Security Crossword 0123 2022-12-30

Cyber Security Crossword 0123 crossword puzzle
Across
  1. Emails sent to trick users to reveal their sensitive information.
  2. Unauthorized softwares installed on computer to gather sensitive information
  3. Phishing Techniques used to target CEO,CFO etc.
  4. Just going behind an authorized person into a secured area
  5. Existence of weakness in a system or network
Down
  1. Scrambling of text in order to ensure the security of data/ information
  2. Technique of Hiding data behind a photo
  3. Software designed to help the user's computer detect viruses & avoid them
  4. Socially or politically motivated hackers
  5. Sending bulk messages by abusing electronic messaging system

10 Clues: Technique of Hiding data behind a photoSocially or politically motivated hackersExistence of weakness in a system or networkPhishing Techniques used to target CEO,CFO etc.Just going behind an authorized person into a secured areaSending bulk messages by abusing electronic messaging system...

Cyber Security Month 2023 2023-09-27

Cyber Security Month 2023 crossword puzzle
Across
  1. Word, phrase, or image that you can click on to jump to a new document or a new section, or webpage
  2. A secret word or phrase that must be used to gain admission to something
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. General term for sending or receiving information, such as telephone lines or email
  5. A broad range of data that could identify an individual (Two Words)
Down
  1. A person who engages in criminal activity by means of computer or internet (Two words)
  2. An email or electronic communication scam targeted towards a specific individual, organization, or business (Two Words)
  3. Attacks that use email or malicious websites to infect your machine
  4. Type of software that helps protect your computer against malware and cyber criminals

9 Clues: Attacks that use email or malicious websites to infect your machineA broad range of data that could identify an individual (Two Words)A secret word or phrase that must be used to gain admission to somethingGeneral term for sending or receiving information, such as telephone lines or email...

Cyber security crossword puzzle 2025-03-18

Cyber security crossword puzzle crossword puzzle
Across
  1. A technique of verifying identities before granting access to information.
  2. The practice of keeping sensitive information in private and secure places.
  3. Preventing attackers from gathering personal or sensitive information about you.
  4. Management The action of identifying and managing risks in an organization’s security plan.
  5. A social engineering technique where attackers attempt to manipulate victims using fake identities.
  6. Keeping track of who accesses sensitive information and when.
Down
  1. A method used to ensure that only authorized users can access sensitive data.
  2. The process of verifying a person’s identity through various means, like passwords, biometrics, or tokens.
  3. The act of notifying employees about security risks and best practices.

9 Clues: Keeping track of who accesses sensitive information and when.The act of notifying employees about security risks and best practices.A technique of verifying identities before granting access to information.The practice of keeping sensitive information in private and secure places....

Cyber Security Cross Word 2025-05-21

Cyber Security Cross Word crossword puzzle
Across
  1. Scrambling data so only the right person can read it (10 letters)
  2. Blocks unwanted access to or from a network (8 letters)
  3. A weakness in a system a threat actor can take advantage of (13 letters)
Down
  1. Tool used to hide your internet activity (3 letters)
  2. A formal set of rules or guidelines for maintaining security (6 letters)
  3. Fake emails that trick you into giving personal info (9 letters)
  4. Software that blocks computer viruses (9 letters)
  5. A term for harmful software (7 letters)
  6. A type of malware that can be attached to a legitimate file. (5 letters)

9 Clues: A term for harmful software (7 letters)Software that blocks computer viruses (9 letters)Tool used to hide your internet activity (3 letters)Blocks unwanted access to or from a network (8 letters)Fake emails that trick you into giving personal info (9 letters)Scrambling data so only the right person can read it (10 letters)...

Risky Clues 2025-06-25

Risky Clues crossword puzzle
Across
  1. A voice-based scam technique
  2. Use a ______ password to protect your accounts
  3. Latest wireless security protocol for networks
  4. Avoid using this kind of free network in public places
  5. An internal framework that shapes the administration of an organisation
  6. Leakage Unauthorised exposure of sensitive information
  7. Risk Umbrella term for various threats for an organisation
  8. Risk Risk due to obligations or failures in external agreements
  9. Media Avoid these websites on official devices
Down
  1. A calculated step to soften the blow of what might go wrong
  2. Regulation that governs how personal information is stored.
  3. Always lock your system when you leave it
  4. If you find yourself in cyber threat, call me
  5. System or process failing to work as intended
  6. A type of cyberattack using fake emails
  7. Intentional deception for personal or financial gain
  8. Security Protect this sensitive information of clients
  9. Known exposure despite controls
  10. Register Structured risk documentation tool
  11. Controls Tools used to prevent confidential info from leaving the system

20 Clues: A voice-based scam techniqueKnown exposure despite controlsA type of cyberattack using fake emailsAlways lock your system when you leave itRegister Structured risk documentation toolIf you find yourself in cyber threat, call meSystem or process failing to work as intendedUse a ______ password to protect your accounts...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Hack Con Cyber Security 2022-04-01

Hack Con Cyber Security crossword puzzle
Across
  1. authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
  2. a network security device that monitors and filters incoming and outgoing network traffic
  3. a way of scrambling data so that only authorized parties can understand the information
  4. an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
  5. wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
  1. hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
  2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. malware that employs encryption to hold a victim's information for profit.
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers

9 Clues: malware that employs encryption to hold a victim's information for profit.a way of scrambling data so that only authorized parties can understand the informationa network security device that monitors and filters incoming and outgoing network traffic...

Cyber Security Month Crossword 2024-09-24

Cyber Security Month Crossword crossword puzzle
Across
  1. Malicious software that demands payment to restore access
  2. Software designed to disrupt or damage a computer
  3. Malicious program disguised as legitimate software
  4. Process of converting information into a code to prevent unauthorized access
  5. Fraudulent attempt to obtain sensitive information
Down
  1. Network security device that monitors and controls traffic
  2. Software that secretly collects user data
  3. Secure connection over the internet, hiding user location
  4. Software designed to detect and eliminate viruses

9 Clues: Software that secretly collects user dataSoftware designed to disrupt or damage a computerSoftware designed to detect and eliminate virusesMalicious program disguised as legitimate softwareFraudulent attempt to obtain sensitive informationMalicious software that demands payment to restore access...

Security Lingo 2019-02-14

Security Lingo crossword puzzle
Across
  1. When a cyber criminal sends fake emails or links to gather information or spread malware.
  2. When someone gains access to an area they aren't supposed to be in by following behind other people.
  3. A type of malware that locks or exposes your information unless you pay a ransom.
  4. A security system designed to monitor and prevent unauthorized access to a network.
  5. When an attacker tries to get you to reveal information over the phone.
Down
  1. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  2. A flaw in software or a system that that leaves it open to cyber attack.
  3. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
  4. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  5. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.
  6. Software that is designed to do damage or perform unwanted actions on a computer system.
  7. A type of malware that secretly tracks your keystrokes.

12 Clues: A type of malware that secretly tracks your keystrokes.When an attacker tries to get you to reveal information over the phone.A flaw in software or a system that that leaves it open to cyber attack.A type of malware that locks or exposes your information unless you pay a ransom....

Cyber Fraud 2024-12-09

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

Safe Browsing 2025-05-27

Safe Browsing crossword puzzle
Across
  1. unethical hacker
  2. software program or piece of hardware to screen out hackers, viruses, worms that try to reach computer over internet
  3. Vital Information Resources Under Seize.
  4. Information and Communication Technology
  5. threatening over internet
  6. application of technologies to protect programs, data, users from cyber attacks and the risk of using internet
  7. software for identifying, deleting and fixing malicious software.
  8. misleading people by sending email or link pretending its from a trusted organisation or person for stealing their personal details.
  9. a file stores information about visiting of websites in the browser.
  10. malicious software for damaging computer
Down
  1. person hacks information with permission
  2. act of breaking security code of digital devices.
  3. people gain by accessing data remotely in an unauthorized manner.
  4. protect original works of authorship including text, image, music etc
  5. Crime through internet

15 Clues: unethical hackerCrime through internetthreatening over internetperson hacks information with permissionVital Information Resources Under Seize.Information and Communication Technologymalicious software for damaging computeract of breaking security code of digital devices.people gain by accessing data remotely in an unauthorized manner....

Networking concept 2025-06-11

Networking concept crossword puzzle
Across
  1. – A program that detects and removes malicious software.
  2. – Someone who illegally gains access to computer systems.
  3. – Shared elements in a network, like printers, files, or servers.
  4. – A security system that monitors and controls network traffic.
  5. Address – A unique number that identifies a device on a network.
  6. System – Software that manages computer hardware and software resources.
  7. – A digital message sent over the internet between users.
  8. – A device that directs data between networks.
  9. – A cyber attack that tricks users into revealing sensitive information.
Down
  1. – Using digital platforms to harass or intimidate others.
  2. – Online promotion or marketing meant to attract attention or sales.
  3. – Unwanted or junk messages sent in bulk, usually via email.
  4. – The global network that connects computers and devices worldwide.
  5. – The physical or logical arrangement of a network.
  6. – Harmful software like viruses, worms, or trojans.

15 Clues: – A device that directs data between networks.– The physical or logical arrangement of a network.– Harmful software like viruses, worms, or trojans.– A program that detects and removes malicious software.– Using digital platforms to harass or intimidate others.– Someone who illegally gains access to computer systems....

How well do you know security lingo? 2019-02-14

How well do you know security lingo? crossword puzzle
Across
  1. When an attacker tries to get you to reveal information over the phone.
  2. A type of malware that locks or exposes your information unless you pay a ransom.
  3. Software that is designed to do damage or perform unwanted actions on a computer system.
  4. When someone gains access to an area they aren't supposed to be in by following behind other people.
  5. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  6. When a cyber criminal sends fake emails or links to gather information or spread malware.
  7. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
Down
  1. A type of malware that secretly tracks your keystrokes.
  2. A security system designed to monitor and prevent unauthorized access to a network.
  3. A flaw in software or a system that that leaves it open to cyber attack.
  4. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  5. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.

12 Clues: A type of malware that secretly tracks your keystrokes.When an attacker tries to get you to reveal information over the phone.A flaw in software or a system that that leaves it open to cyber attack.A type of malware that locks or exposes your information unless you pay a ransom....

CYBERCRIME INVESTIGATION 2021-07-19

CYBERCRIME INVESTIGATION crossword puzzle
Across
  1. refers to a set of instructions executed by the computer to achieve intended results.
  2. the interactional space or environment created by linking computers together into a communication network.
  3. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  4. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  5. means any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds
  6. the system of hardware,software, facilities and service components that support the delivery of business systems and digital-enabled processes.
  7. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  8. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  9. It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
  10. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
  11. refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
  12. refers to the transmission of information through ICT media, including voice, video and other forms of data.
  13. t is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
  14. refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
  15. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  16. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  17. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175, Cyber Crime Prevention Act of 2012, DICT National Cyber Security 2022, and R.A. 10173, Data Privacy Act of 2012.
  18. refers to a secret code which secures and defends sensitive information that cross over public channels into a form decipherable only with a matching electronic key.
  19. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  20. is acquired and integrated to deliver and support the business outcomes, and the service objectives of cybercrime prevention and privacy protected data collection, retention, transmission, utilization, presentation, sharing, repurposing, and disposal.
  21. is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
  22. represents the definitive view of the of privacy rights, privacy principles and security measuresin the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  23. is preservation of confidentiality, integrity and availability of
Down
  1. The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  2. The access to the whole or any part of a computer system without right.
  3. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
  4. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
  5. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
  6. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  7. refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
  8. physical security is most sensitive component, as prevention from cybercrime. Computer network should be protected from access of unauthorized persons.
  9. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
  10. means transferring, or otherwise disposing of, to another, or obtaining control of, with intent to transfer or dispose of.
  11. refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
  12. is about single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.
  13. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  14. It is when personal information is made accessible due to negligence and without being authorized by any existing law.
  15. refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  16. malicious software programs which are infiltrated into computers disguised as benign applications or data.
  17. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
  18. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  19. physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error,accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
  20. The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  21. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  22. terrorist activity that targets computer networks and information systems for attack.
  23. the act of copying digital material posted online into the storage medium on one’s computer.
  24. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,
  25. refers to a computer or a computer network, the electronic medium in which online communication takes place.
  26. is the condition of being protected
  27. the right to be left alone; freedom from observation and interference from others.

50 Clues: is the condition of being protectedis preservation of confidentiality, integrity and availability ofThe access to the whole or any part of a computer system without right.the right to be left alone; freedom from observation and interference from others.refers to a set of instructions executed by the computer to achieve intended results....

Cyber Bullying Crossword Puzzle 2013-06-04

Cyber Bullying Crossword Puzzle crossword puzzle
Across
  1. do not _______ or reply to cyber bullies.
  2. ______ is flooding others with too much unnecessary information .
  3. we must ___ the evidence when cyber bullied.
  4. tell your ______ at home or teachers in school when you are cyber bullied.
  5. cyber bullying is saying _______and hurtful things about a person.
  6. do not post things that will__________ or hurt others.
Down
  1. be______ for your words and action online.
  2. netiquette is having good ____online.
  3. _________others when online by helping them and speaking positively.
  4. we must be _______ when visiting online social networking sites.

10 Clues: netiquette is having good ____online.we must ___ the evidence when cyber bullied.do not _______ or reply to cyber bullies.be______ for your words and action online.do not post things that will__________ or hurt others.______ is flooding others with too much unnecessary information ....

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity crossword puzzle
Across
  1. The practice of protecting computers and networks from digital threats like hackers and viruses.
  2. Harmful software designed to damage or disrupt systems
  3. Unwanted or junk email messages
  4. Someone who breaks into computer systems, often illegally
  5. A secret string used to verify identity
  6. A scam where attackers trick you into giving up personal info via fake emails
Down
  1. Cyber Security Awareness Month is observed in ---?
  2. A type of malware disguised as a legitimate program
  3. A digital barrier that blocks unauthorized access to a network
  4. Software that detects and removes viruses and other malwares
  5. The name you use to log into a computer or website account.
  6. A copy of your data saved in case something goes wrong

12 Clues: Unwanted or junk email messagesA secret string used to verify identityCyber Security Awareness Month is observed in ---?A type of malware disguised as a legitimate programHarmful software designed to damage or disrupt systemsA copy of your data saved in case something goes wrongSomeone who breaks into computer systems, often illegally...

Know Your Oragnisation! 2023-07-14

Know Your Oragnisation! crossword puzzle
Across
  1. Engineering Landscape
  2. An initiative powered by Women in Tech; a platform for everyone to connect with prominent leaders on different topics from innovations to work-life balance
  3. Biggest Truck Manufacturing Plant in World
  4. One of the the Purpose (SMART)
  5. One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck
  6. Employees engagement committee
  7. Newest addition to truck series
  8. People System that reflects the whole spectrum of our HR development environment
Down
  1. New Innitiative for R&D on Battery and e-Powertrain
  2. Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing
  3. The Daimler Truck Legal & Compliance Chatbot
  4. Committe for preventing Harassment
  5. One of the Values

13 Clues: One of the ValuesEngineering LandscapeOne of the the Purpose (SMART)Employees engagement committeeNewest addition to truck seriesCommitte for preventing HarassmentBiggest Truck Manufacturing Plant in WorldThe Daimler Truck Legal & Compliance ChatbotNew Innitiative for R&D on Battery and e-Powertrain...

Cybersecurity Crossword Puzzle 2023-05-15

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
  2. is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
  3. -factor authentication is a second layer of security that protects our networks from cyber-attack.
  4. Alert Button We report phishing by using the
  5. threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
  1. is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
  2. Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
  3. such as curiosity, urgency, greed, and fear are used in phishing emails.
  4. can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.

9 Clues: Alert Button We report phishing by using thesuch as curiosity, urgency, greed, and fear are used in phishing emails.-factor authentication is a second layer of security that protects our networks from cyber-attack.can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data....

October's Blackink Crossword 2024-09-24

October's Blackink Crossword crossword puzzle
Across
  1. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. process of converting information or data into a code to prevent unauthorized access.
  3. type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. maximum rate of data transfer across a given path, measured in bits per second (bps).
  5. method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
  6. A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
  7. A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
  1. A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  2. delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
  3. A method of trying to gather personal information using deceptive e-mails and websites.

10 Clues: process of converting information or data into a code to prevent unauthorized access.maximum rate of data transfer across a given path, measured in bits per second (bps).A method of trying to gather personal information using deceptive e-mails and websites....

cyber 2021-09-30

cyber crossword puzzle
Across
  1. is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
  2. The dark web refers to sites and services that aren't indexed by search engines
  3. Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
  4. A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
  5. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
  6. Hardening is the process by which something becomes harder or is made harder.
  7. a method or pathway used by a hacker to access or penetrate the target system.
Down
  1. Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
  2. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  3. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
  4. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  5. Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
  6. A computer worm is a type of malware that spreads copies of itself from computer to computer.
  7. Phreaking is a slang term for hacking into secure telecommunication networks.
  8. A computer program that can copy itself and infect a computer without permission or knowledge of the user.

15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks.Hardening is the process by which something becomes harder or is made harder.a method or pathway used by a hacker to access or penetrate the target system.The dark web refers to sites and services that aren't indexed by search engines...

Holiday Cyber Safety Crossword 2023-11-20

Holiday Cyber Safety Crossword crossword puzzle
Across
  1. Tis the e-Season. Safeguard your Online ________.
  2. When shopping online make sure to double-checking the websites ___ to verify that the website is not fake.
  3. On the last day November every year, it is _______ security day.
  4. The biggest online shopping day of the year. Cyber _______.
  5. The name for the Friday after Thanksgiving
  6. Every year, the ______ week of November is, Fraud Awareness Week.
  7. Scammers are known to hijack ____ cards during the holiday season.
Down
  1. The “P” when referencing PII identity protection.
  2. Small pieces of code stored on your computer when visiting a website.
  3. Preferred holiday payment method. Second only to cash.

10 Clues: The name for the Friday after ThanksgivingTis the e-Season. Safeguard your Online ________.The “P” when referencing PII identity protection.Preferred holiday payment method. Second only to cash.The biggest online shopping day of the year. Cyber _______.On the last day November every year, it is _______ security day....

ACTIVITY 1: Crossword Puzzle 2A 2024-04-30

ACTIVITY 1: Crossword Puzzle 2A crossword puzzle
Across
  1. Relating to digital technology.
  2. Bullying online.
  3. Protection from harm.
  4. Protecting digital systems.
  5. Control over personal information.
  6. Malicious software.
  7. Connected to the internet.
  8. Fraudulent information request.
  9. Having knowledge and using technology safely and effective
  10. Malicious self-replicating code.
  11. Software to access websites.
  12. Unique characteristics of an individual.
  13. Interconnected computers.
  14. Intentional attack on systems.
  15. Global computer network.
  16. Secret access code.
  17. Traces of online activity.
  18. Unsolicited messages.
  19. Criminal activities online.
  20. Hardware with a function.
  21. Deceptive scheme.
  22. Information in digital form.
  23. Computer programs.
Down
  1. Relating to society.
  2. the ability to analyze and evaluate infomation.
  3. A cyber attack that redirects website traffic to a fraudulent site
  4. Organized and meaningful data.
  5. Unauthorized system access.
  6. Moral principles online.
  7. Traces of online activity.
  8. Verifying user identity.
  9. Making a copy of data to protect against loss or damage
  10. Practices for cybersecurity.
  11. Communication channels.
  12. Protecting systems from attacks.
  13. Converting data into code.
  14. Ability to use digital tools.
  15. Understanding cybersecurity threats.
  16. Laws governing cyberspace.
  17. Membership in a country.
  18. Unauthorized use of personal information.
  19. Network security system.
  20. A secret codr used to access a computer system or online account
  21. Data stored by websites.
  22. Knowledge or perception of a situation.
  23. Dual authentication.
  24. Software to detect and remove viruses.
  25. Device forwarding data.
  26. Physical computer components.
  27. Measures for protection.
  28. Unauthorized data access.

51 Clues: Bullying online.Deceptive scheme.Computer programs.Malicious software.Secret access code.Relating to society.Dual authentication.Protection from harm.Unsolicited messages.Communication channels.Device forwarding data.Moral principles online.Verifying user identity.Membership in a country.Network security system.Data stored by websites....

CS Month Week 4 2023-09-14

CS Month Week 4 crossword puzzle
Across
  1. Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.
  2. List of approved entities, such as IP addresses or applications, allowed access to a network or system, enhancing security.
  3. Malicious code or software delivered as part of an attack, causing harm once executed.
  4. Unauthorized interception of private conversations or data transmission, often accomplished through network monitoring.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
Down
  1. Ethical Hacker who identifies security vulnerabilities to help organizations improve their systems’ defenses.
  2. Authentication method using unique physical or behavioral traits (fingerprint, facial recognition) for identity verification.
  3. Cyber attack that redirects users from legitimate websites to fake ones, often for the purpose of collecting data.

8 Clues: Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.Malicious code or software delivered as part of an attack, causing harm once executed.Software designed to detect, prevent, and remove malicious software from a computer or network....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Cyber Threats And security 2026-01-19

Cyber Threats And security crossword puzzle
Across
  1. attacks used by cyber criminals for stealing confidential data
  2. user's identity is stolen to commit crimes
  3. used to enter their personal details
  4. thef hackers steal and misuses someones personal information
  5. spoofing technique used in spam attacks to trick users
Down
  1. Stalking attackerharrases a victim through E-Mails, social media and chat rooms
  2. illegal entry into computers
  3. stealing the data by sniffing internet data traffic tools
  4. Dos Attacks uses to spam the system with connection requests

9 Clues: illegal entry into computersused to enter their personal detailsuser's identity is stolen to commit crimesspoofing technique used in spam attacks to trick usersstealing the data by sniffing internet data traffic toolsthef hackers steal and misuses someones personal informationDos Attacks uses to spam the system with connection requests...

Cybersecurity Compliance 2024-05-24

Cybersecurity Compliance crossword puzzle
Across
  1. Scammers use ______ tactics to try to get a fast response.
  2. If you suspect a link or attachment may be suspicious, _______ download it.
  3. A good password is __________ for you, but difficult for others to guess.
  4. If you believe you've clicked a bad link, notify _____ immediately.
  5. Malware is most likely to enter an organization through __________.
  6. Never ____________ old passwords.
  7. Malicious links disguised as legitimate messages.
  8. Be wary of ______________ attachments.
Down
  1. Each should be unique and complicated.
  2. Our e-mail security system is called __________.
  3. Scams can come through e-mail,_______, phone call, or even in person.
  4. No platform is ________ to breaches.
  5. Using a work device for _________ use increases the risk of a cyber threat.
  6. Two-factor __________ protects your account by requiring a second identity verification.
  7. Don't use obvious __________ changes like substituting a number for a letter.
  8. Passwords should never be __________ with anyone.
  9. If you feel you have fallen prey to a scammer, notify CHN or ___________.
  10. 65% of people _________ passwords.
  11. 80% of breaches are related to stolen or ________ passwords.

19 Clues: Never ____________ old passwords.65% of people _________ passwords.No platform is ________ to breaches.Each should be unique and complicated.Be wary of ______________ attachments.Our e-mail security system is called __________.Passwords should never be __________ with anyone.Malicious links disguised as legitimate messages....

Cybersecurity Month 2023-07-24

Cybersecurity Month crossword puzzle
Across
  1. (Hint: Make a copy of your important files for safety)
  2. (Hint: Your data is well-protected and out of harm's way)
  3. (Hint: Being informed and cautious about online risks)
  4. (Hint: Keep your personal information confidential)
  5. (Hint: A secret code you create to protect your accounts)
  6. (Hint: Ensure your online accounts and devices are protected)
  7. (Hint: Converting data into secret code to keep it safe)
Down
  1. (Hint: Relating to computers and the internet)
  2. (Hint: Regularly install software improvements for better security)
  3. (Hint: A protective barrier that keeps hackers out)
  4. (Hint: Secure your device with a digital key)
  5. (Hint: Harmful software that can damage your computer)
  6. (Hint: Tricky schemes to deceive you online)
  7. (Hint: A harmful computer program that can spread)
  8. (Hint: Only rely on reputable sources and websites)
  9. (Hint: Deceptive emails or messages trying to steal your info)

16 Clues: (Hint: Tricky schemes to deceive you online)(Hint: Secure your device with a digital key)(Hint: Relating to computers and the internet)(Hint: A harmful computer program that can spread)(Hint: A protective barrier that keeps hackers out)(Hint: Keep your personal information confidential)(Hint: Only rely on reputable sources and websites)...

Trial 2021-03-13

Trial crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised Platform
  2. Internet prefix

4 Clues: Raised PlatformInternet prefixThe gaining of knowledgeState of bring free from danger

Trial 2021-03-13

Trial crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised floor
  2. Internet prefix

4 Clues: Raised floorInternet prefixThe gaining of knowledgeState of bring free from danger

Information Security 2023-07-25

Information Security crossword puzzle
Across
  1. The practice of securing communication and data in the presence of adversaries.
  2. - Providing proof of the origin or delivery of data to protect against denial by one of the parties involved.
  3. - Ensuring that data remains unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed.
  4. - The methodical approach to managing the aftermath of a security breach or cyber attack, also known as an IT incident, computer incident, or security incident.
  5. - Protecting information from being accessed by unauthorized parties.
Down
  1. Determining what permissions an authenticated user has within a system.
  2. - Adhering to laws and regulations relating to protecting and managing data.
  3. - The process of identifying, assessing, and controlling threats to an organization's digital assets.
  4. The process of verifying the identity of a user, device, or system.
  5. - The practice of gathering, analyzing, and reporting on data in a way that is legally admissible.

10 Clues: The process of verifying the identity of a user, device, or system.- Protecting information from being accessed by unauthorized parties.Determining what permissions an authenticated user has within a system.- Adhering to laws and regulations relating to protecting and managing data....

Security 2023-03-12

Security crossword puzzle
Across
  1. Armed service which deploys drones abroad
  2. Agency known as MI6
  3. Country of significant threat to UK security
  4. Travel document required to visit another country
  5. Service agency known as MI5
  6. Shortened name of Cabinet Office Briefing Room
  7. Location of twin towers attacked on 11/09/02
Down
  1. Police force that leads on terrorism
  2. Process by which a person becomes an extremist
  3. Govt department who oversees police & prison services
  4. Enemy states known as HSAs
  5. Lincolnshire RAF base that has the Eurofighter
  6. Location of 2017 arena attack
  7. UK official who chairs COBRA meetings
  8. Country invaded by Russia in February 2022
  9. Agency that protects UK borders
  10. Agency that deals with communications intelligence

17 Clues: Agency known as MI6Enemy states known as HSAsService agency known as MI5Location of 2017 arena attackAgency that protects UK bordersPolice force that leads on terrorismUK official who chairs COBRA meetingsArmed service which deploys drones abroadCountry invaded by Russia in February 2022Country of significant threat to UK security...

cyber 2021-09-28

cyber crossword puzzle
Across
  1. Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.
  2. Point where the false acceptance rate and false rejection rate are equal.
  3. Physical token inserted into a computer’s USB port.
  4. Database of the network resources on a Microsoft network.
  5. Security strategy in which a user can be granted additional rights to data beyond what is allowed by his or her assigned access level.
  6. Authentication method using measurement and analysis of a biological feature.
  7. Process of validating a user.
Down
  1. Authentication method identifying measurable patterns in human activities.
  2. Allows semi-independent systems to work together so users of one system can access resources from another system.
  3. Ratio of the number of false acceptances divided by the number of identification attempts.
  4. Those a user receives through another object, such as a group.
  5. Ratio of the number of false rejections divided by the number of identification attempts.
  6. Those a user is given at a specific location, such as a folder or a file.
  7. Users cycle through different roles.
  8. Those a user receives by default at a lower level.

15 Clues: Process of validating a user.Users cycle through different roles.Those a user receives by default at a lower level.Physical token inserted into a computer’s USB port.Database of the network resources on a Microsoft network.Those a user receives through another object, such as a group....

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat, pressure, etc. in order to make a machine
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting Sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberlsnd are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting Sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberlsnd are______...

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat etc. in order to make a machine do sth
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberland are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberland are______...

Cyber Fraud 2024-11-27

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

TOPIC 4: STORAGE MANAGEMENT 2024-12-05

TOPIC 4: STORAGE MANAGEMENT crossword puzzle
Across
  1. Secondary storage
  2. The ability to recover the operating system machine to the identical state that it was at a given time
  3. report accuracy of the list
  4. the most active data
  5. restricting the scope of an initiator to a particular target in fabric
  6. supports unlimited online data storage
  7. process of periodically saving data in some other device which different from its hard disk
  8. describes strategies of an organization to fight against potential disasters
  9. components of a database application system
  10. An electronic holding place for instructions and data
Down
  1. cyber-security term that refers to a flaw in a system
  2. Group discussion of recovery, operations, resumption, plans, and procedures
  3. Helps them detect real issues more easily
  4. if disk or RAID fail, booting can be done from CD or …?
  5. types of computer memory

15 Clues: Secondary storagethe most active datatypes of computer memoryreport accuracy of the listsupports unlimited online data storageHelps them detect real issues more easilycomponents of a database application systemcyber-security term that refers to a flaw in a systemAn electronic holding place for instructions and data...

DSA Coding Club CodeQuest 2025-03-13

DSA Coding Club CodeQuest crossword puzzle
Across
  1. A car brand that updates like a smartphone
  2. Created an AI that talks almost like a human
  3. He wants to take humans to Mars
  4. The foundation of every website, but not a programming language
  5. The secret behind interactive buttons and pop-ups
  6. Where your photos live when your phone storage is full
  7. The go-to place for answers (and ads)
Down
  1. The modern designer’s digital sketchbook
  2. Rebranded itself for a virtual future
  3. The backbone of Bitcoin and NFTs
  4. Speeds up UI with reusable components
  5. A virtual assistant that doesn’t need coffee breaks
  6. The OS that powers most servers but not your grandma’s laptop
  7. The invisible bridge between apps and services
  8. It learns, predicts, and sometimes makes mistakes
  9. Controls the look but not the logic of a webpage
  10. A language that’s easy to learn but powerful to use
  11. Often paired with "security" or "attack"
  12. Helps developers time travel through their code

19 Clues: He wants to take humans to MarsThe backbone of Bitcoin and NFTsRebranded itself for a virtual futureSpeeds up UI with reusable componentsThe go-to place for answers (and ads)The modern designer’s digital sketchbookOften paired with "security" or "attack"A car brand that updates like a smartphoneCreated an AI that talks almost like a human...

CROSSWORD 2018-01-11

CROSSWORD crossword puzzle
Across
  1. /The first binding international treaty on cybercrime was drafted here.
  2. /The convergence of cyberspace and terrorism.
  3. /The country backed a convention for combating cybercrime that was rejected at the 12th UN Congress on Crime Prevention and Criminal Justice.
  4. /This Commission guides the activities of the United Nations in the field of crime prevention and criminal justice.
  5. /Organisation intended to promote policies that will improve the economic and social well-being of people around the world.
  6. /An expert group that handles computer security incidents.
Down
  1. /Something that transcends the geographical barriers of nations.
  2. /A phrase used in the field of internet governance to describe governments' desire to exercise control over the Internet within their own borders.
  3. /Coordinates its 21-membered economies to promote cyber security, and to tackle the risks brought about by cybercrime.

9 Clues: /The convergence of cyberspace and terrorism./An expert group that handles computer security incidents./Something that transcends the geographical barriers of nations./The first binding international treaty on cybercrime was drafted here....

dampak sosial informatika 2024-04-24

dampak sosial informatika crossword puzzle
Across
  1. Tempat di mana orang bertemu secara virtual dan membentuk komunitas
  2. Perlunya keamanan cyber untuk melindungi data sensitif
  3. Ketidaksetaraan akses terhadap teknologi informasi di antara berbagai kelompok masyarakat
  4. Pembelajaran jarak jauh menggunakan teknologi digital
  5. Fenomena di mana orang merasa rendah diri karena membandingkan kehidupan mereka dengan apa yang diposting orang lain di media sosial
Down
  1. Penyalahgunaan informasi pribadi untuk tujuan yang merugikan
  2. Istilah untuk menggambarkan kecanduan terhadap penggunaan internet
  3. Istilah untuk menggambarkan pembatasan akses ke informasi online
  4. Perilaku agresif atau pelecehan yang terjadi secara online
  5. Fenomena di mana berita palsu menyebar dengan cepat melalui platform media sosial

10 Clues: Pembelajaran jarak jauh menggunakan teknologi digitalPerlunya keamanan cyber untuk melindungi data sensitifPerilaku agresif atau pelecehan yang terjadi secara onlinePenyalahgunaan informasi pribadi untuk tujuan yang merugikanIstilah untuk menggambarkan pembatasan akses ke informasi online...

Contest 2021-03-13

Contest crossword puzzle
Across
  1. The gaining of knowledge
  2. State of bring free from danger
Down
  1. Raised floor
  2. Internet prefix

4 Clues: Raised floorInternet prefixThe gaining of knowledgeState of bring free from danger

Cyberland Magazine Crossword Puzzle 2021-05-06

Cyberland Magazine Crossword Puzzle crossword puzzle
Across
  1. virtual vacancy
  2. misguide in virtual world
  3. virtual tyranny
  4. safeness of virtual world
  5. science of virtual fields
  6. acts of virtual world
Down
  1. being literate in virtual world
  2. virtual assault
  3. half human half robot
  4. virtual offense
  5. virtual
  6. pirate of cyber world

12 Clues: virtualvirtual vacancyvirtual tyrannyvirtual assaultvirtual offensehalf human half robotpirate of cyber worldacts of virtual worldmisguide in virtual worldsafeness of virtual worldscience of virtual fieldsbeing literate in virtual world

CYBER & DIGITAL LITERACY crossword puzzle 2024-04-30

CYBER & DIGITAL LITERACY crossword puzzle crossword puzzle
Across
  1. Status of a member in a community.
  2. Protection for computer systems.
  3. Knowledge or perception.
  4. Legal standards governing the internet.
  5. Global network connecting millions of computers.
  6. Connected to the internet.
  7. Moral guidelines for digital behavior.
  8. Relating to society.
  9. Data conveyed or represented.
  10. Protection against cyber threats.
  11. Attempt to damage or disrupt computers.
  12. Software to access the internet.
  13. Practices for maintaining system health.
  14. Communication outlets or tools.
  15. Protection against threats.
  16. Programs and other operating information.
  17. Skills to effectively use digital technology.
  18. Conversion of data into secure code.
  19. Verification of credentials.
  20. Group of connected computers.
  21. Pertaining to computers or electronics.
  22. Software that detects and removes malware.
  23. Barrier against network intrusion.
  24. Collected information.
Down
  1. Barrier against network intrusion.
  2. Fraudulent attempt to obtain sensitive information.
  3. Investigating digital crimes
  4. Secrecy of personal information.
  5. Ethics in techonology use.
  6. Stealing personal information for fraud.
  7. Tool made for a specific use.
  8. Understanding of online safety risks.
  9. Etiquette in online communication.
  10. Personal characteristics defining an individual.
  11. Data files stored on computers.
  12. Physical parts of a computer.
  13. Harassment using electronic means.
  14. Device that forwards data packets.
  15. Protection from harm or danger.
  16. Verification of credentials.
  17. Crime involving computers.
  18. Unauthorized access to data.
  19. Deceptive scheme or trick.
  20. Unsolicited digital messages.
  21. Record of one's online activity.
  22. Secret code for access.
  23. Trace left by activity.
  24. Enhanced security method requiring two steps.
  25. People who break into computers.
  26. Malicious software.

50 Clues: Malicious software.Relating to society.Collected information.Secret code for access.Trace left by activity.Knowledge or perception.Ethics in techonology use.Connected to the internet.Crime involving computers.Deceptive scheme or trick.Protection against threats.Investigating digital crimesVerification of credentials.Unauthorized access to data....

Year 11 GCSE 2025-05-01

Year 11 GCSE crossword puzzle
Across
  1. A network that covers a large geographical area
  2. Hardware and software that together form a system
  3. A number system using only the digits 0 and 1
  4. A type of software that helps maintain or enhance the computer system
  5. A legal framework governing the use and storage of personal data
  6. A method of reducing the amount of data required to store a file
  7. A type of network where all devices are connected to a central hub or switch
  8. A table showing the output of a logic gate or circuit for all possible inputs
  9. The part of the CPU that performs arithmetic and logical operations
  10. A collection of organised data
  11. A type of cyber threat that attempts to trick users into revealing sensitive information
  12. The number of bits used to represent the colour of a single pixel
Down
  1. A type of network that connects devices within a limited geographical area
  2. Software that performs tasks for the user
  3. A security method that restricts access to a network based on physical address
  4. A global network of interconnected computer networks
  5. A security method that uses mathematical algorithms to scramble data
  6. A measure of the number of samples taken per second when digitising sound
  7. The main circuit board of a computer
  8. Software that controls and manages the computer hardware and provides a platform for application software
  9. Temporary storage for frequently accessed data or instructions
  10. The component of a computer that carries out instructions

22 Clues: A collection of organised dataThe main circuit board of a computerSoftware that performs tasks for the userA number system using only the digits 0 and 1A network that covers a large geographical areaHardware and software that together form a systemA global network of interconnected computer networks...

Online safety(1) 2020-03-02

Online safety(1) crossword puzzle
Across
  1. This type of software does the same thing as malware.
  2. Only ___ should see your private information.
  3. Never arrange a meeting with a person you only know ___.
  4. Short for something that is between you and the server.
  5. You have no control of this when using public Wi-Fi.
Down
  1. Cyber criminals want you to do this to malware.
  2. Try not to ___ you to another person online.
  3. A fun, social and creative place online. It is also a good place for research.
  4. If a website is marked with this it is a secure website.
  5. Having a ___ between internet and real life is important.

10 Clues: Try not to ___ you to another person online.Only ___ should see your private information.Cyber criminals want you to do this to malware.You have no control of this when using public Wi-Fi.This type of software does the same thing as malware.Short for something that is between you and the server....

Technology 2025-01-06

Technology crossword puzzle
Across
  1. any program or file that's intentionally harmful to a computer
  2. a flaw or error in a computer program
  3. any small device with a particular purpose
  4. an instruction given to an artificial intelligence
  5. a person who seeks to exploit the cyber security vulnerabilities in network infrastructures
Down
  1. made by human work or art, not by nature, not natural
  2. created by computer technology and appearing exist but not existing in the physical world
  3. the set of keys on a computer or typewriter that you press in order to make it work
  4. the name of a search engine
  5. computer programs

10 Clues: computer programsthe name of a search enginea flaw or error in a computer programany small device with a particular purposean instruction given to an artificial intelligencemade by human work or art, not by nature, not naturalany program or file that's intentionally harmful to a computer...

Security 2023-03-12

Security crossword puzzle
Across
  1. Armed service which deploys drones abroad
  2. Agency known as MI6
  3. Country of significant threat to UK security
  4. Travel document required to visit another country
  5. Service agency known as MI5
  6. Shortened name of Cabinet Office Briefing Room
  7. Location of twin towers attacked on 11/09/02
Down
  1. Police force that leads on terrorism
  2. Process by which a person becomes an extremist
  3. Govt department who oversees police & prison services
  4. Enemy states known as HSAs
  5. Lincolnshire RAF base that has the Eurofighter
  6. Location of 2017 arena attack
  7. UK official who chairs COBRA meetings
  8. Country invaded by Russia in February 2022
  9. Agency that protects UK borders
  10. Agency that deals with communications intelligence

17 Clues: Agency known as MI6Enemy states known as HSAsService agency known as MI5Location of 2017 arena attackAgency that protects UK bordersPolice force that leads on terrorismUK official who chairs COBRA meetingsArmed service which deploys drones abroadCountry invaded by Russia in February 2022Country of significant threat to UK security...

Cybver-Mobbing 2019-05-07

Cybver-Mobbing crossword puzzle
Across
  1. Plattform auf der Cyber-Mobbing stark verbreitet ist
  2. Wo sollte man sich Hilfe holen?
  3. Gefahr im Internet
  4. Wie wird Cyber-Mobbing noch genannt
Down
  1. Telefonnummer die dir mit deinen Problemen hilft
  2. was sollte man bei einem Mobbing-Opfer tun
  3. Cyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden
  4. Englisches Wort für Mobbing

8 Clues: Gefahr im InternetEnglisches Wort für MobbingWo sollte man sich Hilfe holen?Wie wird Cyber-Mobbing noch genanntwas sollte man bei einem Mobbing-Opfer tunTelefonnummer die dir mit deinen Problemen hilftPlattform auf der Cyber-Mobbing stark verbreitet istCyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden

Security 2014-01-24

Security crossword puzzle
Across
  1. can be disabled on the OS to prevent hackers from quickly running malicious activity on a machine via USB
  2. a code update that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  3. malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.
  4. a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
  5. software program that displays advertising on your computer, often displayed in a pop-up window
  6. distributed without user intervention or knowledge, monitors activity on the computer
  7. sending enough requests to overload a resource or even stopping its operation
Down
  1. _____ address filtering is a technique used to deploy device-level security on a wireless LAN.
  2. is a specialized chip installed on the motherboard to be used for hardware and software authentication.
  3. compares physical characteristics against stored profiles to authenticate people.
  4. attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
  5. additional security measure. Hardware and or software packages.
  6. is unsolicited email that can be used to send harmful links or deceptive content.
  7. new viruses are always being developed, therefore security software must be continually updated to keep up with the malicious _________ __________.
  8. a self-replicating program that uses the network to duplicate its code to the hosts on the network. Travels silently.
  9. supports robust encryption, providing government-grade security. (most effective way of securing wireless traffic)
  10. a software code that is deliberately created by an attacker. May collect sensitive information or may alter or destroy information.

17 Clues: additional security measure. Hardware and or software packages.sending enough requests to overload a resource or even stopping its operationcompares physical characteristics against stored profiles to authenticate people.is unsolicited email that can be used to send harmful links or deceptive content....

Cybersecurity 2024-05-04

Cybersecurity crossword puzzle
Across
  1. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.

10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process.A software update designed to fix security vulnerabilities or address other issues within a program or operating system....

TSA Acronyms 2022-03-28

TSA Acronyms crossword puzzle
Across
  1. Liquid Container Screening
  2. Transportation Security Officer
  3. Transportation Security Administration
  4. Federal Security Director
  5. Federal Flight Deck Officer
  6. Travel Document Checker
  7. Explosive Trace Detection
  8. Hand Held Metal Detector
  9. Selectee
  10. Advanced Imaging Technology
  11. Property Search Officer
Down
  1. Law Enforcement Officer
  2. Walk Through Metal Detector
  3. Lead Transportation Security Officer
  4. Assistant Federal Director
  5. Transportation Security Manager
  6. Explosive Detection System
  7. Department Of Homeland Security
  8. Divestiture Officer
  9. Supervisor Transportation Security Officer

20 Clues: SelecteeDivestiture OfficerLaw Enforcement OfficerTravel Document CheckerProperty Search OfficerHand Held Metal DetectorFederal Security DirectorExplosive Trace DetectionLiquid Container ScreeningAssistant Federal DirectorExplosive Detection SystemWalk Through Metal DetectorFederal Flight Deck OfficerAdvanced Imaging Technology...

Tech 2023-11-29

Tech crossword puzzle
Across
  1. What do you do in that device?
  2. Computer security center?
Down
  1. Important IT device?
  2. Basic entertainment?

4 Clues: Important IT device?Basic entertainment?Computer security center?What do you do in that device?

Crossword Corner 2025-10-09

Crossword Corner crossword puzzle
Across
  1. Security protocol framework increasingly used in healthcare APIs (5)
  2. Foundation model type driving GenAI clinical applications (3)
  3. Emerging architecture enabling federated data exchange across trusted health networks (4)
  4. Movement emphasizing explainability in clinical AI models (3)
Down
  1. Cyber threat that exploits legitimate channels to bypass defenses (6)
  2. International terminology standard used in decision support and clinical analytics (6)
  3. Secure environment for controlled API testing and FHIR app pilots (7)
  4. Dominant interoperability framework enabling patient-directed APIs (5)

8 Clues: Foundation model type driving GenAI clinical applications (3)Movement emphasizing explainability in clinical AI models (3)Security protocol framework increasingly used in healthcare APIs (5)Cyber threat that exploits legitimate channels to bypass defenses (6)Secure environment for controlled API testing and FHIR app pilots (7)...

Security Terminology Puzzle (Participation 3) 2023-01-28

Security Terminology Puzzle (Participation 3) crossword puzzle
Across
  1. compromised computers used for cyberattacks
  2. numbers identifying a internet connected device
  3. personal devices in work space
  4. network pro learning hacking techniques
  5. tricking users to click an image
  6. sensitive information thats unreadable
  7. malware that makes you pay
  8. software that is harmful
  9. shield for data
  10. software that checks for malware
  11. A network that encrypts data
  12. malware pretending to be useful
Down
  1. cyber attacks accessing sensitive information
  2. lots of attackers preventing legitimate users
  3. attacks seeking out personal info
  4. software that tracks you
  5. malware that displays adverts
  6. Training to prevent cyber threats
  7. cybercriminals exploiting unauthorized access to computers
  8. internet access at Starbucks

20 Clues: shield for datasoftware that tracks yousoftware that is harmfulmalware that makes you payinternet access at StarbucksA network that encrypts datamalware that displays advertspersonal devices in work spacemalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal info...

Test V1 2024-07-26

Test V1 crossword puzzle
Across
  1. Is the practice of developing and using coded algorithms to protect and mask transmitted information. Leads to the exposition of sensitive data in case of failure.
  2. Is the fact that a data has not been modified, accidentally altered or deleted.
  3. Is a computer or device on a network that manages network resources
  4. Is an incorrect setting leading to vulnerabilities.
  5. Is a type of attack where malicious code is inserted into a program.
Down
  1. Is the combination of security software and appliance solutions to provide the infrastructure needed to protect an organization against cyber attacks.
  2. Is a recording format that allows contextualization at a given moment.
  3. Is a procedure used to certify the identity of a person or a computer.
  4. Is the ability to ensure data security
  5. Is an weakness that could be exploited or triggered by a threat source. Is classifies in CVE.

10 Clues: Is the ability to ensure data securityIs an incorrect setting leading to vulnerabilities.Is a computer or device on a network that manages network resourcesIs a type of attack where malicious code is inserted into a program.Is a recording format that allows contextualization at a given moment....

Data Security Awareness Crossword 2025-03-03

Data Security Awareness Crossword crossword puzzle
Across
  1. The regulation that protects EU residents’ data
  2. What is the technique that replace, remove or transform information that identifies individuals, and keep that information separate
  3. Which country enforces the PDPA?
  4. What is the process of verifying user identity?
  5. A form of malware designed to extort
  6. What is the second word in the CIA Trian
  7. What is the process of removing personal identifiers from data?
  8. The type of data protected under GDPR
Down
  1. What is the most common method of stealing passwords?
  2. Which cyber attack attempts to guess passwords repeatedly?
  3. What is a security weakness in software called?
  4. What is the unauthorized tracking of user behaviour online?
  5. Which country enforces the CCPA?
  6. medical records, sexual orientation, biometrics are examples of ……. personal information
  7. The process of encoding information in a manner that permits access and comprehension solely by authorised parties.
  8. What is a common attack that floods a network with traffic?

16 Clues: Which country enforces the CCPA?Which country enforces the PDPA?A form of malware designed to extortThe type of data protected under GDPRWhat is the second word in the CIA TrianWhat is a security weakness in software called?The regulation that protects EU residents’ dataWhat is the process of verifying user identity?...

CEH Chapter 19 Crossword Puzzle 2026-03-14

CEH Chapter 19 Crossword Puzzle crossword puzzle
Across
  1. Container security monitoring platform
  2. Software as a service
  3. Identity and access management
  4. Simulated attack to test security
  5. Role based access control
  6. Network address translation service
  7. Cloud security auditing tool
  8. Intrusion prevention security system
  9. Network segment inside cloud network
  10. Cloud access security broker
  11. Infrastructure as a service
  12. Node agent managing containers
  13. Unauthorized cryptocurrency mining attack
  14. Recording system security activity
  15. Installing security updates for systems
  16. Multi factor authentication security method
  17. Container orchestration platform
  18. Incorrect cloud security settings
  19. Data loss prevention technology
  20. Intrusion detection security system
  21. Serverless monitoring and security tool
Down
  1. Platform as a service
  2. Sensitive credentials stored securely
  3. Cloud security organization promoting best practices
  4. Security weakness in system
  5. Verify every user and device
  6. Cloud object storage
  7. Kubernetes cluster key value database
  8. Federated authentication protocol
  9. Portable application runtime environment
  10. Single sign on authentication
  11. Private cloud network environment
  12. Kubernetes cluster management interface
  13. Container platform for applications
  14. Secure cloud web gateway
  15. Data protection using cryptography
  16. Function execution cloud service
  17. Network traffic filtering security system
  18. Internet based computing
  19. Cloud vulnerability scanning platform

40 Clues: Cloud object storagePlatform as a serviceSoftware as a serviceSecure cloud web gatewayInternet based computingRole based access controlSecurity weakness in systemInfrastructure as a serviceVerify every user and deviceCloud security auditing toolCloud access security brokerSingle sign on authenticationIdentity and access management...

cyber 2021-09-30

cyber crossword puzzle
Across
  1. Phreaking is a slang term for hacking into secure telecommunication networks.
  2. is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
  3. Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
  4. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
  5. A computer worm is a type of malware that spreads copies of itself from computer to computer.
  6. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  7. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
  8. Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
  9. A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
Down
  1. a method or pathway used by a hacker to access or penetrate the target system.
  2. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
  3. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  4. Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
  5. Hardening is the process by which something becomes harder or is made harder.
  6. The dark web refers to sites and services that aren't indexed by search engines

15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks.Hardening is the process by which something becomes harder or is made harder.a method or pathway used by a hacker to access or penetrate the target system.The dark web refers to sites and services that aren't indexed by search engines...

cyber 2025-09-30

cyber crossword puzzle
Across
  1. Client-side script injection (abbr.)
  2. Product exploited by ProxyLogon in 2021
  3. Worm that sabotaged Iranian centrifuges
  4. Tech giant with 2013 breach affecting 3B accounts
  5. 2017 credit bureau breach (~147M)
  6. Classic database attack via un-sanitized input
  7. 2017 global ransomware outbreak using EternalBlue
  8. 2021 Log4j critical RCE (CVE‑2021‑44228)
  9. Network of compromised devices under one controller
Down
  1. Malware category that encrypts files for payment
  2. 2017 wiper-like outbreak spread via MeDoc
  3. Suspected group tied to those Exchange intrusions
  4. Deceptive emails to steal credentials
  5. hidden
  6. 2014 OpenSSL “bleeding heart” bug

15 Clues: hidden2014 OpenSSL “bleeding heart” bug2017 credit bureau breach (~147M)Client-side script injection (abbr.)Deceptive emails to steal credentialsProduct exploited by ProxyLogon in 2021Worm that sabotaged Iranian centrifuges2021 Log4j critical RCE (CVE‑2021‑44228)2017 wiper-like outbreak spread via MeDocClassic database attack via un-sanitized input...

Privacy Awareness Week (May 13-17, 2024) 2024-04-12

Privacy Awareness Week (May 13-17, 2024) crossword puzzle
Across
  1. What term describes the unauthorized access, acquisition, or disclosure of sensitive or confidential information, potentially resulting in harm or loss?
  2. Used to withdraw or withhold consent for the collection, use, and disclosure of their personal health information (PHI) for health care purposes.
  3. What term refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks?
  4. What term describes the voluntary agreement given by an individual for the processing of their personal data for a specific purpose?
  5. What process involves reviewing and evaluating an organization's adherence to established privacy and security measures regarding sensitive information like PHI?
  6. Technique involves attempting to trick individuals into providing sensitive information by pretending to be trustworthy entity.
  7. What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?
  8. What action involves verifying information or details a second time to ensure accuracy or security?
Down
  1. What is the term for the right of individuals to keep their personal information private and away from the public eye?
  2. What technique involves removing personally identifiable information from data sets to protect the privacy of individuals?
  3. What process involves converting plain text or data into a coded form to prevent unauthorized access or interception?
  4. What principle or practice emphasizes keeping sensitive information secret and limiting access to authorized individuals or entities?
  5. What is the term for the unauthorized or covert observation of private or confidential information, often done for malicious purposes?
  6. Any information used to identify the patient?

14 Clues: Any information used to identify the patient?What action involves verifying information or details a second time to ensure accuracy or security?What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?...

Join the Elite Cyber Team 2020-06-26

Join the Elite Cyber Team crossword puzzle
Across
  1. To protect data and humans ensure you have S?
  2. You can't cause pain to a computer but this is real
  3. Updated typewriter, spell checking and rocket launching.
Down
  1. The largest WAN of these is the internet.
  2. Subject does research & development, lab coats optional.
  3. Attack that damages or destroys online systems is called?

6 Clues: The largest WAN of these is the internet.To protect data and humans ensure you have S?You can't cause pain to a computer but this is realSubject does research & development, lab coats optional.Updated typewriter, spell checking and rocket launching.Attack that damages or destroys online systems is called?

Q4 December Crossword Contest 2022-01-04

Q4 December Crossword Contest crossword puzzle
Across
  1. EPOS- EPOS expand vision 3T lets you jump into a video meeting with the touch of a ____?
  2. Palo alto- Palo Alto has the world’s first machine learning-powered next-generation ____?
  3. DocuSign- Where is Ms. Jackson located in Arizona?
  4. Zagg- The man in the video who protects the phones from dropping was wearing a sweatshirt that said what?
  5. F5- F5 Solutions protect digital experiences, reduce operational costs, and improve ___ retention.
  6. Opengear- An out-of-band network is an alternative pathway to your network devices when they become ____?
  7. Tripp Lite- Tripp Lite offers a plethora of options to really build out that final back-end piece of their IT ____?
  8. HP- Insight does not require page ____ or minimums.
  9. Trend Micro- Cloud app activity is also logged on a per ___ level as well as a list that is maintained of users that have logged into this endpoint.
  10. Thales- Securing data, ___, and software has never been more important.
  11. SonicWall- To protect against threats SonicWall offers what kind of approach offering endpoint security, network security, email security, remote access security, cloud security and zero trust network access?
Down
  1. Malwarebytes- What percent of businesses need days or weeks to meditate?
  2. Acronis- What percent of companies report being targeted by a cyber attack at least once a week?
  3. Seagate- Seagate provides options for ____ your own storage that are simple, trusted, and efficient.
  4. Legrand- The relentless pursuit of purpose and ____ that binds us.
  5. Commvault- with metallic you can offer customers of every size ___ data protection in the cloud.
  6. Dell- In our client portfolio we offer a _____ device demo program through our intel battle pack program.
  7. AddOn- By partnering with AddOn you have a ____ team at your disposal simply by calling your insight.
  8. Lenovo- ThinkStation P6 20 is the first workstation with ___ rising thread ripper pro power.
  9. Micron- The P5 Plus M.2 is engineered for hardcore gamers,____, and creatives who demand high-performance computing.
  10. McAfee- What is Patrick Ludlow known as?
  11. Eset- Eset makes it easy for you with simple to understand ___.
  12. Paessler- No hidden costs, fully featured, ___ licensing, and fair pricing.
  13. Belkin- What platform did Belkin use to create their video?
  14. ViewSonic- Immersive audio experience with ___ front-facing soundbar.
  15. Kingston- Kingston Solutions include: system specific, ValueRAM, USB drives, flash cards, and ____?
  16. Dell- How many cats were shown in Dons video?
  17. LG: Lg One- Quick|Works ___-in-one.

28 Clues: LG: Lg One- Quick|Works ___-in-one.McAfee- What is Patrick Ludlow known as?Dell- How many cats were shown in Dons video?DocuSign- Where is Ms. Jackson located in Arizona?HP- Insight does not require page ____ or minimums.Belkin- What platform did Belkin use to create their video?Eset- Eset makes it easy for you with simple to understand ___....

Fraud 2026-02-05

Fraud crossword puzzle
Across
  1. A form of fraud where people create false identities online, often with the intent to deceive others.
  2. A process that requires businesses to verify the identity of a customer before doing business with them.
  3. A cyber attack technique where an attacker impersonates another user or computer system in a network or a communications system.
  4. A type of fraud that occurs when an attacker gains access to and takes control of an account that belongs to another person.
  5. Any unauthorized access or entry into a secured system or resource, whether intentional or unintentional, in which sensitive data is exposed or stolen.
  6. The illegal misappropriation of funds or assets entrusted to an individual or organization.
  7. Authentication methodology that requires users to provide multiple pieces of authentication evidence when logging into a system.
  8. Malicious software that is used to secretly collect a user's data without their knowledge or consent.
  9. A malicious software that is used to infiltrate a computer system without the user's knowledge or permission.
  10. A person who commits fraud, especially in business or commercial dealings.
  11. An investment fraud that works by paying existing investors with the funds that are collected from new investors.
  12. Any data which can be used to identify an individual. It includes sensitive information such as name, address, Social Security Number, driver’s license information, financial data, usernames and passwords, healthcare information and more.
  13. Fraudulent investment programs that require participants to contribute money in order to join, with promised monetary rewards for recruiting additional participants.
  14. The practice of ensuring the safety of confidential information and assets, as well as the security of mobile devices and networks, when accessing the internet or connecting to networks through mobile devices.
  15. A process of disguising illegal profits or funds obtained from criminal activities such as drug trafficking, corruption, terrorism, or other financial crimes.
Down
  1. A financial institution responsible for safeguarding a customer’s assets.
  2. An authentication credential used to protect computer systems, applications, networks, and other confidential information.
  3. A type of malicious software that is used by cyber criminals, usually to illegally gain access to a computer system or encode and hold important data hostage, in exchange for a ransom.
  4. A federal law that was signed into effect in October 2001 to strengthen national security.
  5. The process of ensuring that organizations, individuals and other entities comply with laws, regulations, rules, codes of practice and industry standards.
  6. The practice of acquiring someone else’s personal information and using it for financial gain.
  7. A technology that relies on Artificial Intelligence (AI) to create false images, audio recordings and video recordings of individuals.
  8. The use of tactics and methods to manipulate people into divulging sensitive information or performing actions that can be used to pave the way for a security breach or malicious activity.
  9. A fraud tactic where bad actors impersonate legitimate people/businesses via SMS/text message to trick unsuspecting victims into sharing personal information (passwords, PII, credit card numbers, etc.).
  10. A type of malicious software that appears to be legitimate but performs a hidden malicious activity without the user's knowledge.
  11. A specialized team within an insurance company that focuses on detecting, investigating, and preventing insurance fraud.
  12. A type of cyberattack that utilizes social engineering techniques to deceive victims into disclosing sensitive personal and financial information or performing tasks that allow the attacker access to a victim’s system.

27 Clues: A financial institution responsible for safeguarding a customer’s assets.A person who commits fraud, especially in business or commercial dealings.A federal law that was signed into effect in October 2001 to strengthen national security.The illegal misappropriation of funds or assets entrusted to an individual or organization....

GUESS WITH PUNKT.! 2024-11-14

GUESS WITH PUNKT.! crossword puzzle
Across
  1. A secure area where apps can run without affecting the system (8 letters)
  2. Authentication method using physical characteristics (9 letters)
  3. Virtual network for secure internet connections (3 letters)
  4. Design principle that reduces unnecessary features (10 letters)
  5. A security system that requires two forms of identification (10 letters)
  6. A digital barrier that defends your device from cyber intrusions (8 letters)
Down
  1. Control over one's own data without external interference (15 letters)
  2. Technique that scrambles data to protect it from prying eyes (10 letters)
  3. A digital barrier that defends your device from cyber intrusions (8 letters)
  4. The state of keeping personal information protected from others (7 letters)

10 Clues: Virtual network for secure internet connections (3 letters)Design principle that reduces unnecessary features (10 letters)Authentication method using physical characteristics (9 letters)Control over one's own data without external interference (15 letters)A security system that requires two forms of identification (10 letters)...

Insider Threat 2025-06-27

Insider Threat crossword puzzle
Across
  1. National security ___________ is a determination that a person is able and willing to safeguard classified national security information and/or occupy a national security sensitive position.
  2. Any individual, group, organization, or government that conducts or has the intent and capability to conduct activities detrimental to the US Government or its assets.
  3. Any form of violence that is directed at an individual or group, for a specific reason. In other words, not a random act of violence.
  4. An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy any national defense or war materiel, premises, or utilities, to include human and natural resources.
  5. ____ -4 establishes the single, common adjuducative criteria for all covered individuals who require initial or continued eligibility for access to classified information or to hold a sensitive position. (Abbrev.)
  6. To take advantage of (a person, situation, etc.) especially unethically or unjustly for one’s own ends.
  7. A person actively engaged in killing or trying to kill people in a confined and populated area. (two words)
Down
  1. Intelligence activity directed towards the acquisition of information through clandestine means.
  2. An adversary having the intent, capability, and opportunity to cause loss or damage.
  3. _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
  4. Information, which if improperly disclosed, could be expected to cause serious damage to the national security.
  5. _______ information is any information that negatively reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security.
  6. Financial, business, scientific, technical, or other information that the owner has taken measures to keep secret; and which has independent economic value from not being generally known to the public is called a ____________ secret.
  7. Any person with authorized access to DOD resources by virtue of employment, volunteer activities, or contractual relationship with DOD.
  8. The process by which information is transformed into intelligence; systemic examinations of information to identify significant facts, make judgments, and draw conclusions.
  9. Free and confidential counseling and referral service for a variety of personal and professional concerns. (Abbrev.)
  10. Deliberate disclosures of classified or unclassified information to the media.

17 Clues: Deliberate disclosures of classified or unclassified information to the media.An adversary having the intent, capability, and opportunity to cause loss or damage.Intelligence activity directed towards the acquisition of information through clandestine means....

Cross Word Puzzle - Cyber Security 2023-10-12

Cross Word Puzzle - Cyber Security crossword puzzle
Across
  1. the gaining of unauthorised access to data in a system or computer
  2. a type of software program created to protect information technology systems and individual computers from malicious software or malware
  3. the practice of protecting systems, networks and programs from digital attacks
  4. a type of malware that spreads between computers and damages data and software
  5. a string of characters that allows access to a computer system or service
  6. software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
  7. malware that misleads users of its true intent by disguising itself as a standard program
Down
  1. the protection of personal data from those who should not have access to it
  2. individuals or teams of people who use technology to commit malicious activities on digital systems or networks
  3. the actual person or organisation who is directly affected by the hacker's use of stolen data or information
  4. a security system designed to prevent unauthorised access into or out of a computer network
  5. a system that connects two or more computer devices for transmitting and sharing information

12 Clues: the gaining of unauthorised access to data in a system or computera string of characters that allows access to a computer system or servicethe protection of personal data from those who should not have access to itthe practice of protecting systems, networks and programs from digital attacks...

16 2024-07-05

16 crossword puzzle
Across
  1. '___ntentions,' teen drama
  2. Video game movie adaptation
  3. Washington's activist role
  4. Space mission crisis
  5. '___idential,' 50s LA crime
  6. Space horror thriller
  7. '___ Doubtfire,' Williams in disguise
  8. Madonna as Argentine icon
  9. Young love and loss
  10. Bullock's cyber thriller
  11. Sanderson sisters' return
  12. Austen's period drama adaptation
  13. De Niro's mercenary thriller
  14. Damon's math genius
Down
  1. Political thriller
  2. Cage's Vegas tale
  3. Carrey's truth-challenged lawyer
  4. Mobster sees a shrink
  5. Cage's airborne action
  6. Comet threatens Earth
  7. Travolta and Cage swap faces
  8. Young cyber rebels
  9. '___ Claiborne,' King adaptation
  10. Political media manipulation
  11. Burton's biopic of a director

25 Clues: Cage's Vegas talePolitical thrillerYoung cyber rebelsYoung love and lossDamon's math geniusSpace mission crisisMobster sees a shrinkComet threatens EarthSpace horror thrillerCage's airborne actionBullock's cyber thrillerMadonna as Argentine iconSanderson sisters' return'___ntentions,' teen dramaWashington's activist roleVideo game movie adaptation...

CYBER ETHICS 2025-05-26

CYBER ETHICS crossword puzzle
Across
  1. THE PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE .
  2. AN ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER .
  3. WHEN A SOFTWARE IS COPIED AND
  4. AN ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION .
Down
  1. HACKING WHICH IS DONE FOR A GOOD CAUSE SUCH AS NATIONAL SECURITY , KNOWN AS
  2. AN ILLEGAL INTRUSION INTO A COMPUTER SYSTEM OR NETWORK .
  3. CYBER ATTACK IS ALSO KNOWN AS ___ .
  4. THE UNWANTED BULK EMAILS THAT COME FROM UNKOWN SOURCE CALLED .

8 Clues: WHEN A SOFTWARE IS COPIED ANDCYBER ATTACK IS ALSO KNOWN AS ___ .THE PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE .AN ILLEGAL INTRUSION INTO A COMPUTER SYSTEM OR NETWORK .THE UNWANTED BULK EMAILS THAT COME FROM UNKOWN SOURCE CALLED .AN ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION ....

Cyber Defense Terms 2023-11-20

Cyber Defense Terms crossword puzzle
Across
  1. a program that uses virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing
  2. the process of verifying the identity of a user or piece of information and the veracity of information provided, e.g. with a password or other credential
  3. a bit of code that provides additional, revised, or updated data for an operating system or application
  4. cybersecurity services that operate from within a network and not at the endpoint and can therefore protect any connected device regardless of model or operating system
  5. features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children
  6. the concept of continuing to operate without interruption despite an emergency situation
  7. Secure __________ Layer is the standard security technology for establishing an encrypted link between a web server and a browser
  8. Indicators of ___________ are bits of forensic data from system log entries or files that identify potentially malicious activity on a system or network
  9. An Intrusion ____________ System is a network security system designed to prevent network penetration by malicious actors
  10. __________ Assessment is a structured process used to identify and evaluate various risks that an organization might be exposed to
  11. the concept of ensuring that data and systems have not been accessed or modified and are therefore accurate and trustworthy
Down
  1. a control list that allows and denies elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system
  2. Completely Automated Public Turing test to tell Computers and Humans Apart - a challenge-response test commonly used by websites to verify the user is a real human and not a bot
  3. a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs
  4. a process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
  5. ____________ Authentication combines a static password with an external authentication device such as a phone or email for added security
  6. Security __________ Response is a planned approach to addressing and managing the reaction after a cyber attack or network security breach
  7. a list of permitted items that are automatically let through whatever gate is being used, e.g. allowed sites, users, email addresses
  8. creating an isolated environment on a network that mimics a regular computer in order to safely execute suspicious code without risking harm
  9. a digital boundary that is defined for a system or domain and within which a specified security policy is applied
  10. extends a private network across a public network - essentially a virtual, secure corridor
  11. a facility where information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts
  12. a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating
  13. the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit

24 Clues: the concept of continuing to operate without interruption despite an emergency situationextends a private network across a public network - essentially a virtual, secure corridora bit of code that provides additional, revised, or updated data for an operating system or application...

IT Profession 2023-10-02

IT Profession crossword puzzle
Across
  1. Who collects, processes, and analyzes data to provide insights and support decisionmaking?
  2. Who combines software development and IT operations to improve the software delivery process?
  3. Who specializes in securing computer networks and data against cyber threats?
  4. Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
  5. Who manages and maintains an organization's computer systems and networks?
  6. Who evaluates software for defects and ensures it meets quality standards?
  7. Who develops algorithms and models for artificial intelligence and machine learning applications?
  8. Who analyzes business processes and designs IT systems to improve efficiency and productivity?
  9. Who specializes in the design, implementation, and management of cloud computing solutions?
  10. Who protects computer systems and data from security breaches and cyberattacks?
  11. Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
  12. Who creates applications specifically for mobile devices, such as smartphones and tablets?
  13. Who oversees the storage, organization, and security of databases?
  14. Who writes and tests code to create software applications and systems?
  15. Who educates individuals or employees on using IT systems and software effectively?
Down
  1. Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
  2. Who implements and manages integrated software systems for business processes?
  3. Who designs, implements, and manages computer networks for data communication?
  4. Who assesses an organization's IT systems and practices to ensure compliance and security?
  5. Who designs, develops, and tests software solutions for specific purposes?
  6. Who provides technical assistance and support to endusers and resolves ITrelated issues?
  7. Who identifies business needs and uses technology to find solutions to business problems?
  8. Developer Who works on blockchain technology to create secure and decentralized applications?
  9. Who designs and creates websites, web applications, and user interfaces?
  10. Who offers expert advice and solutions to organizations for their ITrelated challenges?

25 Clues: Who oversees the storage, organization, and security of databases?Who writes and tests code to create software applications and systems?Who designs and creates websites, web applications, and user interfaces?Who designs, develops, and tests software solutions for specific purposes?...

Security Vocabulary 2014-04-07

Security Vocabulary crossword puzzle
Across
  1. – the most recent version of a file.
  2. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  3. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  4. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  5. a computer program that performs the same operation many times in a row
  6. access to a computer program that bypasses all security.
  7. is the use of Internet based attacks in terrorist activities
  8. is encrypted text
  9. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.
  10. is any method of encrypting text
Down
  1. signal that identifies user
  2. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  3. is someone who breaks into someone else's computer system
  4. payment of royalties on the Internet
  5. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. a unique code assigned to a buyer to verify transactions
  7. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  8. it is technology that measures the biological part of the computer.
  9. test designed to differentiate humans from automated programs.
  10. are programs that Web sites put on your hard disk.
  11. is any computer program designed to facilitate illegal activity online.
  12. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.

22 Clues: is encrypted textsignal that identifies useris any method of encrypting text– the most recent version of a file.payment of royalties on the Internetare programs that Web sites put on your hard disk.a unique code assigned to a buyer to verify transactionsaccess to a computer program that bypasses all security....

RU ITEC411- Crime and Security 2022-11-06

RU ITEC411- Crime and Security crossword puzzle
Across
  1. - receives hundreds of thousands of complaints of identity theft each year. Losses from identity theft amount to billions of dollars per year in the U.S., with several million victims.
  2. - act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger
  3. - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers
  4. - a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
  5. - Companies began using hackers to analyze and improve security
  6. - A computer worm designed to find and infect a particular piece of industrial hardware, used in an attack against Iranian nuclear plants
  7. - Use of hacking to promote a political cause
  8. - Use their skills to demonstrate system vulnerabilities and improve security
  9. - Attacks used to shut down Websites
  10. - Phishing attacks committed using text messages (SMS)
  11. - Which part of government is considered and treats some cyber attacks as acts of war, and the U.S. might respond with military force.
Down
  1. - read hacker newsletters and participate in chat rooms undercover. They can often track a handle by looking through newsgroups or other archives
  2. - Monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity
  3. - variety of factors contribute to security weaknesses
  4. - various crimes in which criminals use the identity of an unknowing, innocent person
  5. - Intentional, unauthorized access to computer system
  6. - An especially clever piece of code
  7. - trace viruses and hacking attacks by using ISP records and router logs
  8. - An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  9. - has made it easier to steal and use card numbers without having the physical card

20 Clues: - An especially clever piece of code- Attacks used to shut down Websites- Use of hacking to promote a political cause- Intentional, unauthorized access to computer system- variety of factors contribute to security weaknesses- Phishing attacks committed using text messages (SMS)- Companies began using hackers to analyze and improve security...

Cyber Insurance & IT 2025-07-23

Cyber Insurance & IT crossword puzzle
Across
  1. Fraudulent emails attempting to steal sensitive information.
  2. Malicious software that holds digital files hostage for payment.
  3. Requests made for compensation after a covered cyber event.
  4. A circumstance or loss not covered by an insurance policy.
  5. Type of authentication that requires more than a password.
  6. The process of evaluating cyber risks for insurance coverage.
Down
  1. An addition or amendment made to a cyber insurance policy.
  2. The amount paid regularly to maintain an insurance policy.
  3. Insurance purchased by insurers to limit exposure to major losses.
  4. Legal responsibility for data breaches or cyber incidents.

10 Clues: An addition or amendment made to a cyber insurance policy.The amount paid regularly to maintain an insurance policy.Legal responsibility for data breaches or cyber incidents.A circumstance or loss not covered by an insurance policy.Type of authentication that requires more than a password.Requests made for compensation after a covered cyber event....

Show How Much You Know About Social Engineering 2025-09-04

Show How Much You Know About Social Engineering crossword puzzle
Across
  1. Cybercriminals use social engineering to get users to share confidential information or download this.
  2. A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
  3. A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
  4. The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
  5. The highest defense rating for passwords is "____"
  6. A single compromised password can put your organization's security and personal information at ____.
  7. This is a common way cyber villains get into computer networks.
Down
  1. This password level uses simple passwords and the same password for every account.
  2. The password defense rating for a "Level 1: Beginner" is "____".
  3. An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
  4. The name of the character that uses "convince" and "impersonate" attacks.
  5. The human firewall manifesto recommends using this for every account.
  6. Cybercriminals rely on being able to convince users to click on these.
  7. The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.

14 Clues: The highest defense rating for passwords is "____"This is a common way cyber villains get into computer networks.The password defense rating for a "Level 1: Beginner" is "____".The human firewall manifesto recommends using this for every account.Cybercriminals rely on being able to convince users to click on these....

Malware 2021-10-06

Malware crossword puzzle
Across
  1. computer worm is a standalone malware computer
  2. adware is software that displays unwanted pop-up advert
  3. type of malware that allows a cyber-security attacker to take control of an infected computer without the user knowing it is happening ​
  4. a type of social engineering attack often used to steal user data
Down
  1. like to run after a tennis ball
  2. like to chase mice
  3. errors in someones code or program
  4. someone who seeks and exploits weaknesses in a computer

8 Clues: like to chase micelike to run after a tennis ballerrors in someones code or programcomputer worm is a standalone malware computeradware is software that displays unwanted pop-up advertsomeone who seeks and exploits weaknesses in a computera type of social engineering attack often used to steal user data...

Knight Owl Cyber Security Crossword 2023-08-24

Knight Owl Cyber Security Crossword crossword puzzle
Across
  1. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  2. a security framework requiring all users, whether in or outside the organization’s network, to be authenticated
  3. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Down
  1. world's first computer virus
  2. a common type of cyber attack in which attackers take a narrow focus and craft detailed, targeted email messages to a specific recipient or group.
  3. a cyber-attack that seeks to damage an organization by targeting less secure elements

6 Clues: world's first computer virusa cyber-attack that seeks to damage an organization by targeting less secure elementsa type of malicious software designed to block access to a computer system until a sum of money is paid.a security framework requiring all users, whether in or outside the organization’s network, to be authenticated...

Cyber Security Awareness Month Crossword 2022-09-23

Cyber Security Awareness Month Crossword crossword puzzle
Across
  1. A flaw or weakness in a computer system that could be exploited to violate the security of a system
  2. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until money is paid
  3. Written compliance requirement with regards your obligation as an employee
  4. Assurance that information is only exposed to those who are authorised to access it
  5. Assignation of identifying mark to guide handling and storage
  6. A fraudulent email supposedly from a reputable company attempting to get personal information
  7. Verifying identity
Down
  1. Information is present in the required form at the time it is required
  2. Method for making information unreadable unless authorised
  3. If you see something, say something! Report all security ___________________.
  4. The "I" in the CIA triad. It Ensures that information maintains its accuracy
  5. Secure passwords are great but ___________________ are even better

12 Clues: Verifying identityMethod for making information unreadable unless authorisedAssignation of identifying mark to guide handling and storageSecure passwords are great but ___________________ are even betterInformation is present in the required form at the time it is requiredWritten compliance requirement with regards your obligation as an employee...

Let's Revise Cyber Security Fundamentals !! 2021-08-16

Let's Revise Cyber Security Fundamentals !! crossword puzzle
Across
  1. deliberate attempt to compromise security using malicious activity
  2. state of maintaining secrecy of communication
  3. Naming system followed to identify computers connected to Internet
  4. criminal activity performed using computer or a network
  5. way of confirmation of individual's identity
  6. illegal piece of software designed to cause harm to computers/networks
Down
  1. ready to access for authorized people
  2. unskilled individual who uses programs written by others to initiate attacks
  3. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
  4. use of Computers and Networks to gain illegal access for confidential information for some gain
  5. computer program designed to protect computer
  6. malicious software that prevents the users from accessing their own data for want of money

12 Clues: ready to access for authorized peopleway of confirmation of individual's identitystate of maintaining secrecy of communicationcomputer program designed to protect computercriminal activity performed using computer or a networkdeliberate attempt to compromise security using malicious activity...

Let's Revise Cyber Security Fundamentals !! 2021-08-16

Let's Revise Cyber Security Fundamentals !! crossword puzzle
Across
  1. deliberate attempt to compromise security using malicious activity
  2. state of maintaining secrecy of communication
  3. Naming system followed to identify computers connected to Internet
  4. criminal activity performed using computer or a network
  5. way of confirmation of individual's identity
  6. illegal piece of software designed to cause harm to computers/networks
Down
  1. ready to access for authorized people
  2. unskilled individual who uses programs written by others to initiate attacks
  3. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
  4. use of Computers and Networks to gain illegal access for confidential information for some gain
  5. computer program designed to protect computer
  6. malicious software that prevents the users from accessing their own data for want of money

12 Clues: ready to access for authorized peopleway of confirmation of individual's identitystate of maintaining secrecy of communicationcomputer program designed to protect computercriminal activity performed using computer or a networkdeliberate attempt to compromise security using malicious activity...

Risk Culture and Cyber Security 2024-07-09

Risk Culture and Cyber Security crossword puzzle
Across
  1. results in breaches of our Scotiabank Code of Conduct
  2. type of spear phishing that largely targets companies conducting regular payment processing activities
  3. should act as Risk Culture ambassadors
  4. a targeted attempt to steal sensitive information, such as account credentials, from a specific victim, often for malicious reasons
  5. is a type of computer program designed to gain unauthorized access or to cause damage to a computer
  6. tactic that adversaries use to trick you into revealing sensitive information
  7. helps ensure that risk-taking activities are consistent with the bank's risk appetite
Down
  1. are responsible for cascading and reinforcing Senior Management Risk Culture messages within their teams
  2. a password that is easy to remember difficult to hack, & satisfies Scotiabank’s complexity requirements
  3. is the telephone equivalent of phishing
  4. a form of phishing involving criminals using SMS message to try and obtain sensitive information from the recipient
  5. type of malware that is designed to extort money from victims by blocking access to files or the computer system until a ransom is paid

12 Clues: should act as Risk Culture ambassadorsis the telephone equivalent of phishingresults in breaches of our Scotiabank Code of Conducttactic that adversaries use to trick you into revealing sensitive informationhelps ensure that risk-taking activities are consistent with the bank's risk appetite...

Security Vocabulary 2014-04-07

Security Vocabulary crossword puzzle
Across
  1. is the use of Internet based attacks in terrorist activities
  2. is someone who breaks into someone else's computer system
  3. a unique code assigned to a buyer to verify transactions
  4. are programs that Web sites put on your hard disk.
  5. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  7. access to a computer program that bypasses all security.
  8. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  9. is any computer program designed to facilitate illegal activity online.
  10. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.
Down
  1. is encrypted text
  2. it is technology that measures the biological part of the computer.
  3. is any method of encrypting text
  4. signal that identifies user
  5. the most recent version of a file.
  6. payment of royalties on the Internet
  7. test designed to differentiate humans from automated programs.
  8. computer program that performs the same operation many times in a row
  9. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  10. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  11. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  12. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.

22 Clues: is encrypted textsignal that identifies useris any method of encrypting textthe most recent version of a file.payment of royalties on the Internetare programs that Web sites put on your hard disk.a unique code assigned to a buyer to verify transactionsaccess to a computer program that bypasses all security....

Cyber Law 2021-09-03

Cyber Law crossword puzzle
Across
  1. enables exchange of data
  2. school of thought against the regulation of cyber space
  3. process of conversion from analog to digital
Down
  1. regulation by the use of users
  2. "what things regulate"
  3. natural resource of cyber space
  4. devised a model for regulation of cyber space
  5. hidden identity
  6. use of fake identity
  7. allows sites to record your browsing activities

10 Clues: hidden identityuse of fake identity"what things regulate"enables exchange of dataregulation by the use of usersnatural resource of cyber spaceprocess of conversion from analog to digitaldevised a model for regulation of cyber spaceallows sites to record your browsing activitiesschool of thought against the regulation of cyber space

IEM January Social Media Crossword Puzzle 2022-01-30

IEM January Social Media Crossword Puzzle crossword puzzle
Across
  1. When you get emails, texts, or calls that seem to be from companies you know.
  2. Who said, “We must use time creatively, in the knowledge that the time is always ripe to do right.”
  3. IEMer appointed by President Biden to FEMA Assistant Administrator, Grants, Resilience (last name)
  4. A new _____ outlining available federal resources to help Puerto Rico recover, rebuild, and modernize its infrastructure has been released by the U.S. Department of Homeland Security and the U.S. Department of Education.
  5. National _____ _____ appreciation day is where we thank the people who protect and serve our communities.
  6. Applications for FEMA’s Youth _____ Council is open.
Down
  1. National ____ Day is where we thank those administering vaccines to combat the coronavirus and provide lifesaving medication to our communities.
  2. At IEM, we are dedicated to serving our ____ to help build a more resilient world.
  3. Home Office Safety and Security week emphasizes the importance of securing home networks to ____ cyber threats.
  4. On January 11th we wear what color to bring awareness to human trafficking?
  5. 1985 was the year IEM was _______.

11 Clues: 1985 was the year IEM was _______.Applications for FEMA’s Youth _____ Council is open.On January 11th we wear what color to bring awareness to human trafficking?When you get emails, texts, or calls that seem to be from companies you know.At IEM, we are dedicated to serving our ____ to help build a more resilient world....

December Crossword 2025-12-24

December Crossword crossword puzzle
Across
  1. The process of using technology to perform tasks with minimal human input.
  2. Prefix often used in terms like security or warfare in tech contexts.
  3. A futuristic computing paradigm leveraging physics for massive parallelism.
  4. An open-source operating system widely used in servers and development.
Down
  1. A deep learning framework popular in AI research.
  2. A distributed ledger technology powering cryptocurrencies and secure transactions.
  3. A robotic vehicle often used in space exploration.
  4. A small, fast memory that stores frequently accessed data.
  5. A structured collection of data used for training AI models.

9 Clues: A deep learning framework popular in AI research.A robotic vehicle often used in space exploration.A small, fast memory that stores frequently accessed data.A structured collection of data used for training AI models.Prefix often used in terms like security or warfare in tech contexts....

500D 2023-12-11

500D crossword puzzle
Across
  1. Salah satu drakor yang kita ikutin
  2. Target utama kamu di flashsale
  3. Salah satu hal yang aku biasa beli di Indomaret
  4. Username tiktok aku
  5. Album Taylor Swift kesukaan kamu
  6. DN pertama aku di cyber
  7. Kesukaan papa kamu
Down
  1. Lagu kelima di Harry's House
  2. Film pertama yang kita tonton bareng
  3. Username cyber aku
  4. Nama penjual Ayam Bakar Madu
  5. Nama sahabatnya Sherina
  6. Lagu terakhir yang aku post di akun Janitra
  7. Nama panggilan kamu
  8. Siapa yang difotocopy
  9. Lagu the 1975 favorite aku

16 Clues: Username cyber akuKesukaan papa kamuUsername tiktok akuNama panggilan kamuSiapa yang difotocopyNama sahabatnya SherinaDN pertama aku di cyberLagu the 1975 favorite akuLagu kelima di Harry's HouseNama penjual Ayam Bakar MaduTarget utama kamu di flashsaleAlbum Taylor Swift kesukaan kamuSalah satu drakor yang kita ikutin...

Tech Controls 2020-08-13

Tech Controls crossword puzzle
Across
  1. What needs to be done to a change record before the change is made
  2. A business initiative is an example of something that would ______ the change process
  3. What needs to be done regularly to identify security vulnerabilities
  4. Antivirus software is a type of ______ control
Down
  1. Any change made in production must be ______
  2. Problems are loaded in the problem management ____ with a suitable priority assigned
  3. The peer _____ process is the task that authorises a change to proceed
  4. An IT Service Continuity Plan helps ensure the ______of customer and business data
  5. Controls help mitigate business _____

9 Clues: Controls help mitigate business _____Any change made in production must be ______Antivirus software is a type of ______ controlWhat needs to be done to a change record before the change is madeWhat needs to be done regularly to identify security vulnerabilitiesThe peer _____ process is the task that authorises a change to proceed...

Cyber Bullying 2014-06-19

Cyber Bullying crossword puzzle
Across
  1. Another word for stealing
  2. Cyber bullying can lead to
  3. A medical condition
  4. An emotion
  5. Following someone around
  6. Against the law
Down
  1. Going somewhere you should not be going
  2. Illegal,crime, hacker
  3. Cyber bullying can be classed as.
  4. Unidentifiable
  5. Horrible People
  6. People tend to _______ when being bullied

12 Clues: An emotionUnidentifiableHorrible PeopleAgainst the lawA medical conditionIllegal,crime, hackerFollowing someone aroundAnother word for stealingCyber bullying can lead toCyber bullying can be classed as.Going somewhere you should not be goingPeople tend to _______ when being bullied

eSafety-Privacy 2020-01-15

eSafety-Privacy crossword puzzle
Across
  1. confidential
  2. communication
  3. message
  4. licence
  5. threat
  6. profile
  7. picture
  8. mates
  9. wired
  10. identification
  11. electronic
Down
  1. nameless
  2. data
  3. photos
  4. courier
  5. appreciation
  6. fraud
  7. nasty
  8. insulting
  9. junk-mail

20 Clues: datafraudnastymateswiredphotosthreatcouriermessagelicenceprofilepicturenamelessinsultingjunk-mailelectronicconfidentialappreciationcommunicationidentification

Hacker Cracker/ Jed Curtis 2023-01-26

Hacker Cracker/ Jed Curtis crossword puzzle
Across
  1. bad
  2. gains
  3. sick
  4. code
  5. Rain
  6. own
  7. steal
  8. fake
  9. popup
  10. crime
Down
  1. core
  2. harass
  3. Validate
  4. Bug
  5. weak
  6. web
  7. Cyber
  8. tech
  9. case
  10. space

20 Clues: badBugwebowncoreweaksickcodetechRaincasefakegainsCyberspacestealpopupcrimeharassValidate

bully 2023-02-06

bully crossword puzzle
Across
  1. 12
  2. 14
  3. 5
  4. 17
  5. 7
  6. 15
  7. 11
  8. 8
  9. 3
  10. 13
Down
  1. 2
  2. 10
  3. 19
  4. 20
  5. 9
  6. 6
  7. 4
  8. 1
  9. 18
  10. 16

20 Clues: 2596471831210191420171511181613

cross 2023-09-07

cross crossword puzzle
Across
  1. central processing unit
  2. theft - user manipulate online platforms to gain access or personal information to intimate a character
  3. - an area in which a computer system and networks are used
  4. a copy of the file/software
  5. a text encryption
  6. - software used as an intent to destroy, disrupt or gander unauthorized access to a computer.
  7. - a malware used to deny organization access to a file system.
  8. the application that provides service for the user and client
  9. - a group of private computers used to infect malicious software.
Down
  1. getting email or text identifying they have your password
  2. process of safeguarding digital information through entire life cycle
  3. the process or action verifying the identification
  4. unwanted software used to deliver targeted advertisements
  5. attack an attempt to gain unauthorized access to a computer
  6. A part of a computer system to block unauthorized data
  7. - bypassing an organization's existing security systems.
  8. engineering - manipulation used to gain access to an unauthorized computer system.
  9. protection from data theft

18 Clues: a text encryptioncentral processing unitprotection from data thefta copy of the file/softwarethe process or action verifying the identificationA part of a computer system to block unauthorized data- bypassing an organization's existing security systems.getting email or text identifying they have your password...

Cyber Komodo EGG Hunt 2022-04-15

Cyber Komodo EGG Hunt crossword puzzle
Across
  1. doggie themed
  2. kills with its saliva
  3. tenth mouth trait found on the test rarity tool
  4. comes out of a bottle and has a PC
  5. first eye trait found on the test rarity tool
  6. powerful energy
Down
  1. where the cyber komodos hang out
  2. hunts for treasure
  3. where you store your money
  4. lucky number
  5. a distributed ledger
  6. what makes something unique
  7. telecoms network in the cyber komodo-verse
  8. nft platform
  9. creator of komodo
  10. you cross it over water
  11. thinks he's the Dogecoin CEO

17 Clues: lucky numbernft platformdoggie themedpowerful energycreator of komodohunts for treasurea distributed ledgerkills with its salivayou cross it over waterwhere you store your moneywhat makes something uniquethinks he's the Dogecoin CEOwhere the cyber komodos hang outcomes out of a bottle and has a PCtelecoms network in the cyber komodo-verse...

Redalert CTF 2019-08-05

Redalert CTF crossword puzzle
Across
  1. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
  2. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  3. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  4. May sometime be known as Industroyer
  5. The world’s most murderous malware
Down
  1. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  2. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  3. This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
  4. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
  6. A network security measure employed on one or more computers to physically isolated from another network.
  7. A RAT targeting the ICS industry by the hacking group Dragonfly

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber-attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

supercoulafragolisticexpeouladotis crossword by collin 2013-08-28

supercoulafragolisticexpeouladotis crossword by collin crossword puzzle
Across
  1. no monkey business
  2. the opposite of software
  3. violins, basses, violas, and cellos
  4. the former producers of minecraft
  5. fruits berry and other produce items
  6. they help earth
  7. I can see your bones
  8. so logical
  9. they make vents
  10. they update yahoo pages
Down
  1. these graphics are amazing
  2. open wide for the nurse...
  3. programs they make programs for managers
  4. they make flashdrives
  5. they give info
  6. the opposite of hardware
  7. they make cars
  8. cyber space
  9. designer they make radars
  10. they make kindles
  11. the update the web
  12. pure water water that is ultra pure
  13. they transport luggage
  14. high quality items!
  15. they make docks
  16. they make zipcode doors

26 Clues: so logicalcyber spacethey give infothey make carsthey help earththey make docksthey make ventsthey make kindlesno monkey businessthe update the webhigh quality items!I can see your bonesthey make flashdrivesthey transport luggagethey make zipcode doorsthey update yahoo pagesthe opposite of softwarethe opposite of hardwaredesigner they make radars...

French Vocab 2023-09-30

French Vocab crossword puzzle
Across
  1. experience
  2. cyberdissidence
  3. technology
  4. bionic
  5. snitch
  6. revolutionary
  7. invention
  8. researche
  9. theory
Down
  1. ethhical
  2. gene
  3. genetic
  4. innovative
  5. tool
  6. land
  7. cell
  8. tablet
  9. UFO
  10. space
  11. cyberharrasment

20 Clues: UFOgenetoollandcellspacebionicsnitchtablettheorygeneticethhicalinventionresearcheexperienceinnovativetechnologyrevolutionarycyberdissidencecyberharrasment

How Much Do You Know? 2023-01-17

How Much Do You Know? crossword puzzle
Across
  1. he “Likes” to sing and play music
  2. forget this tidbit of information and the Officer Judy will give you doody
  3. it took this Regional office 20 years to cook Christmas Jiggs
  4. at one time you could find him at the hockey rink Presiding over Port-Aux-Basques Minor Hockey
  5. this Manager swims with the Sharks
  6. cyber security month
Down
  1. plant in NL that is nourished by insects that are trapped and drown in water
  2. Mushophobic Avondale Mayer not permitted to keep a pet mouse in his desk
  3. Honorary Citizen of Wabana because of his Hockey skills
  4. provincial bird of Newfoundland and Labrador
  5. provincial mineral for Newfoundland and Labrador
  6. this Manger won big Feuding with her Family
  7. this Way is meant to strengthen our economy
  8. Paparazzo Manager is great at shooting people and places

14 Clues: cyber security monthhe “Likes” to sing and play musicthis Manager swims with the Sharksthis Manger won big Feuding with her Familythis Way is meant to strengthen our economyprovincial bird of Newfoundland and Labradorprovincial mineral for Newfoundland and LabradorHonorary Citizen of Wabana because of his Hockey skills...

Cyber Bullying 2012-05-05

Cyber Bullying crossword puzzle
Across
  1. using technology to harass someone
  2. mobile device used to send hateful texts
  3. a worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems
  4. used to access the internet
  5. short message sent by a cell phone
Down
  1. common social networking site used by cyber bullies
  2. words or actions intended to annoy, alarm, or abuse another individual
  3. sometimes the fatal consequence of cyber bullying
  4. not giving a name or username so as to stay hidden and undetected, cyber bullies stay this way so as to not get in trouble
  5. the person being cyber bullied

10 Clues: used to access the internetthe person being cyber bulliedusing technology to harass someoneshort message sent by a cell phonemobile device used to send hateful textssometimes the fatal consequence of cyber bullyingcommon social networking site used by cyber bullieswords or actions intended to annoy, alarm, or abuse another individual...