cyber security Crossword Puzzles

Year 11 GCSE 2025-05-01

Year 11 GCSE crossword puzzle
Across
  1. A network that covers a large geographical area
  2. Hardware and software that together form a system
  3. A number system using only the digits 0 and 1
  4. A type of software that helps maintain or enhance the computer system
  5. A legal framework governing the use and storage of personal data
  6. A method of reducing the amount of data required to store a file
  7. A type of network where all devices are connected to a central hub or switch
  8. A table showing the output of a logic gate or circuit for all possible inputs
  9. The part of the CPU that performs arithmetic and logical operations
  10. A collection of organised data
  11. A type of cyber threat that attempts to trick users into revealing sensitive information
  12. The number of bits used to represent the colour of a single pixel
Down
  1. A type of network that connects devices within a limited geographical area
  2. Software that performs tasks for the user
  3. A security method that restricts access to a network based on physical address
  4. A global network of interconnected computer networks
  5. A security method that uses mathematical algorithms to scramble data
  6. A measure of the number of samples taken per second when digitising sound
  7. The main circuit board of a computer
  8. Software that controls and manages the computer hardware and provides a platform for application software
  9. Temporary storage for frequently accessed data or instructions
  10. The component of a computer that carries out instructions

22 Clues: A collection of organised dataThe main circuit board of a computerSoftware that performs tasks for the userA number system using only the digits 0 and 1A network that covers a large geographical areaHardware and software that together form a systemA global network of interconnected computer networks...

Cyberland Magazine Crossword Puzzle 2021-05-06

Cyberland Magazine Crossword Puzzle crossword puzzle
Across
  1. virtual vacancy
  2. misguide in virtual world
  3. virtual tyranny
  4. safeness of virtual world
  5. science of virtual fields
  6. acts of virtual world
Down
  1. being literate in virtual world
  2. virtual assault
  3. half human half robot
  4. virtual offense
  5. virtual
  6. pirate of cyber world

12 Clues: virtualvirtual vacancyvirtual tyrannyvirtual assaultvirtual offensehalf human half robotpirate of cyber worldacts of virtual worldmisguide in virtual worldsafeness of virtual worldscience of virtual fieldsbeing literate in virtual world

Security 2023-03-12

Security crossword puzzle
Across
  1. Armed service which deploys drones abroad
  2. Agency known as MI6
  3. Country of significant threat to UK security
  4. Travel document required to visit another country
  5. Service agency known as MI5
  6. Shortened name of Cabinet Office Briefing Room
  7. Location of twin towers attacked on 11/09/02
Down
  1. Police force that leads on terrorism
  2. Process by which a person becomes an extremist
  3. Govt department who oversees police & prison services
  4. Enemy states known as HSAs
  5. Lincolnshire RAF base that has the Eurofighter
  6. Location of 2017 arena attack
  7. UK official who chairs COBRA meetings
  8. Country invaded by Russia in February 2022
  9. Agency that protects UK borders
  10. Agency that deals with communications intelligence

17 Clues: Agency known as MI6Enemy states known as HSAsService agency known as MI5Location of 2017 arena attackAgency that protects UK bordersPolice force that leads on terrorismUK official who chairs COBRA meetingsArmed service which deploys drones abroadCountry invaded by Russia in February 2022Country of significant threat to UK security...

Online safety(1) 2020-03-02

Online safety(1) crossword puzzle
Across
  1. This type of software does the same thing as malware.
  2. Only ___ should see your private information.
  3. Never arrange a meeting with a person you only know ___.
  4. Short for something that is between you and the server.
  5. You have no control of this when using public Wi-Fi.
Down
  1. Cyber criminals want you to do this to malware.
  2. Try not to ___ you to another person online.
  3. A fun, social and creative place online. It is also a good place for research.
  4. If a website is marked with this it is a secure website.
  5. Having a ___ between internet and real life is important.

10 Clues: Try not to ___ you to another person online.Only ___ should see your private information.Cyber criminals want you to do this to malware.You have no control of this when using public Wi-Fi.This type of software does the same thing as malware.Short for something that is between you and the server....

Technology 2025-01-06

Technology crossword puzzle
Across
  1. any program or file that's intentionally harmful to a computer
  2. a flaw or error in a computer program
  3. any small device with a particular purpose
  4. an instruction given to an artificial intelligence
  5. a person who seeks to exploit the cyber security vulnerabilities in network infrastructures
Down
  1. made by human work or art, not by nature, not natural
  2. created by computer technology and appearing exist but not existing in the physical world
  3. the set of keys on a computer or typewriter that you press in order to make it work
  4. the name of a search engine
  5. computer programs

10 Clues: computer programsthe name of a search enginea flaw or error in a computer programany small device with a particular purposean instruction given to an artificial intelligencemade by human work or art, not by nature, not naturalany program or file that's intentionally harmful to a computer...

TSA Acronyms 2022-03-28

TSA Acronyms crossword puzzle
Across
  1. Liquid Container Screening
  2. Transportation Security Officer
  3. Transportation Security Administration
  4. Federal Security Director
  5. Federal Flight Deck Officer
  6. Travel Document Checker
  7. Explosive Trace Detection
  8. Hand Held Metal Detector
  9. Selectee
  10. Advanced Imaging Technology
  11. Property Search Officer
Down
  1. Law Enforcement Officer
  2. Walk Through Metal Detector
  3. Lead Transportation Security Officer
  4. Assistant Federal Director
  5. Transportation Security Manager
  6. Explosive Detection System
  7. Department Of Homeland Security
  8. Divestiture Officer
  9. Supervisor Transportation Security Officer

20 Clues: SelecteeDivestiture OfficerLaw Enforcement OfficerTravel Document CheckerProperty Search OfficerHand Held Metal DetectorFederal Security DirectorExplosive Trace DetectionLiquid Container ScreeningAssistant Federal DirectorExplosive Detection SystemWalk Through Metal DetectorFederal Flight Deck OfficerAdvanced Imaging Technology...

Crossword Corner 2025-10-09

Crossword Corner crossword puzzle
Across
  1. Security protocol framework increasingly used in healthcare APIs (5)
  2. Foundation model type driving GenAI clinical applications (3)
  3. Emerging architecture enabling federated data exchange across trusted health networks (4)
  4. Movement emphasizing explainability in clinical AI models (3)
Down
  1. Cyber threat that exploits legitimate channels to bypass defenses (6)
  2. International terminology standard used in decision support and clinical analytics (6)
  3. Secure environment for controlled API testing and FHIR app pilots (7)
  4. Dominant interoperability framework enabling patient-directed APIs (5)

8 Clues: Foundation model type driving GenAI clinical applications (3)Movement emphasizing explainability in clinical AI models (3)Security protocol framework increasingly used in healthcare APIs (5)Cyber threat that exploits legitimate channels to bypass defenses (6)Secure environment for controlled API testing and FHIR app pilots (7)...

Cybersecurity 2024-05-04

Cybersecurity crossword puzzle
Across
  1. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.

10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process.A software update designed to fix security vulnerabilities or address other issues within a program or operating system....

Cybver-Mobbing 2019-05-07

Cybver-Mobbing crossword puzzle
Across
  1. Plattform auf der Cyber-Mobbing stark verbreitet ist
  2. Wo sollte man sich Hilfe holen?
  3. Gefahr im Internet
  4. Wie wird Cyber-Mobbing noch genannt
Down
  1. Telefonnummer die dir mit deinen Problemen hilft
  2. was sollte man bei einem Mobbing-Opfer tun
  3. Cyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden
  4. Englisches Wort für Mobbing

8 Clues: Gefahr im InternetEnglisches Wort für MobbingWo sollte man sich Hilfe holen?Wie wird Cyber-Mobbing noch genanntwas sollte man bei einem Mobbing-Opfer tunTelefonnummer die dir mit deinen Problemen hilftPlattform auf der Cyber-Mobbing stark verbreitet istCyber-Mobbing kann zu Problemen für die Mobber und die Gemobbten werden

Tech 2023-11-29

Tech crossword puzzle
Across
  1. What do you do in that device?
  2. Computer security center?
Down
  1. Important IT device?
  2. Basic entertainment?

4 Clues: Important IT device?Basic entertainment?Computer security center?What do you do in that device?

Security 2014-01-24

Security crossword puzzle
Across
  1. can be disabled on the OS to prevent hackers from quickly running malicious activity on a machine via USB
  2. a code update that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  3. malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.
  4. a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
  5. software program that displays advertising on your computer, often displayed in a pop-up window
  6. distributed without user intervention or knowledge, monitors activity on the computer
  7. sending enough requests to overload a resource or even stopping its operation
Down
  1. _____ address filtering is a technique used to deploy device-level security on a wireless LAN.
  2. is a specialized chip installed on the motherboard to be used for hardware and software authentication.
  3. compares physical characteristics against stored profiles to authenticate people.
  4. attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
  5. additional security measure. Hardware and or software packages.
  6. is unsolicited email that can be used to send harmful links or deceptive content.
  7. new viruses are always being developed, therefore security software must be continually updated to keep up with the malicious _________ __________.
  8. a self-replicating program that uses the network to duplicate its code to the hosts on the network. Travels silently.
  9. supports robust encryption, providing government-grade security. (most effective way of securing wireless traffic)
  10. a software code that is deliberately created by an attacker. May collect sensitive information or may alter or destroy information.

17 Clues: additional security measure. Hardware and or software packages.sending enough requests to overload a resource or even stopping its operationcompares physical characteristics against stored profiles to authenticate people.is unsolicited email that can be used to send harmful links or deceptive content....

Test V1 2024-07-26

Test V1 crossword puzzle
Across
  1. Is the practice of developing and using coded algorithms to protect and mask transmitted information. Leads to the exposition of sensitive data in case of failure.
  2. Is the fact that a data has not been modified, accidentally altered or deleted.
  3. Is a computer or device on a network that manages network resources
  4. Is an incorrect setting leading to vulnerabilities.
  5. Is a type of attack where malicious code is inserted into a program.
Down
  1. Is the combination of security software and appliance solutions to provide the infrastructure needed to protect an organization against cyber attacks.
  2. Is a recording format that allows contextualization at a given moment.
  3. Is a procedure used to certify the identity of a person or a computer.
  4. Is the ability to ensure data security
  5. Is an weakness that could be exploited or triggered by a threat source. Is classifies in CVE.

10 Clues: Is the ability to ensure data securityIs an incorrect setting leading to vulnerabilities.Is a computer or device on a network that manages network resourcesIs a type of attack where malicious code is inserted into a program.Is a recording format that allows contextualization at a given moment....

Data Security Awareness Crossword 2025-03-03

Data Security Awareness Crossword crossword puzzle
Across
  1. The regulation that protects EU residents’ data
  2. What is the technique that replace, remove or transform information that identifies individuals, and keep that information separate
  3. Which country enforces the PDPA?
  4. What is the process of verifying user identity?
  5. A form of malware designed to extort
  6. What is the second word in the CIA Trian
  7. What is the process of removing personal identifiers from data?
  8. The type of data protected under GDPR
Down
  1. What is the most common method of stealing passwords?
  2. Which cyber attack attempts to guess passwords repeatedly?
  3. What is a security weakness in software called?
  4. What is the unauthorized tracking of user behaviour online?
  5. Which country enforces the CCPA?
  6. medical records, sexual orientation, biometrics are examples of ……. personal information
  7. The process of encoding information in a manner that permits access and comprehension solely by authorised parties.
  8. What is a common attack that floods a network with traffic?

16 Clues: Which country enforces the CCPA?Which country enforces the PDPA?A form of malware designed to extortThe type of data protected under GDPRWhat is the second word in the CIA TrianWhat is a security weakness in software called?The regulation that protects EU residents’ dataWhat is the process of verifying user identity?...

Security Terminology Puzzle (Participation 3) 2023-01-28

Security Terminology Puzzle (Participation 3) crossword puzzle
Across
  1. compromised computers used for cyberattacks
  2. numbers identifying a internet connected device
  3. personal devices in work space
  4. network pro learning hacking techniques
  5. tricking users to click an image
  6. sensitive information thats unreadable
  7. malware that makes you pay
  8. software that is harmful
  9. shield for data
  10. software that checks for malware
  11. A network that encrypts data
  12. malware pretending to be useful
Down
  1. cyber attacks accessing sensitive information
  2. lots of attackers preventing legitimate users
  3. attacks seeking out personal info
  4. software that tracks you
  5. malware that displays adverts
  6. Training to prevent cyber threats
  7. cybercriminals exploiting unauthorized access to computers
  8. internet access at Starbucks

20 Clues: shield for datasoftware that tracks yousoftware that is harmfulmalware that makes you payinternet access at StarbucksA network that encrypts datamalware that displays advertspersonal devices in work spacemalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal info...

Privacy Awareness Week (May 13-17, 2024) 2024-04-12

Privacy Awareness Week (May 13-17, 2024) crossword puzzle
Across
  1. What term describes the unauthorized access, acquisition, or disclosure of sensitive or confidential information, potentially resulting in harm or loss?
  2. Used to withdraw or withhold consent for the collection, use, and disclosure of their personal health information (PHI) for health care purposes.
  3. What term refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks?
  4. What term describes the voluntary agreement given by an individual for the processing of their personal data for a specific purpose?
  5. What process involves reviewing and evaluating an organization's adherence to established privacy and security measures regarding sensitive information like PHI?
  6. Technique involves attempting to trick individuals into providing sensitive information by pretending to be trustworthy entity.
  7. What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?
  8. What action involves verifying information or details a second time to ensure accuracy or security?
Down
  1. What is the term for the right of individuals to keep their personal information private and away from the public eye?
  2. What technique involves removing personally identifiable information from data sets to protect the privacy of individuals?
  3. What process involves converting plain text or data into a coded form to prevent unauthorized access or interception?
  4. What principle or practice emphasizes keeping sensitive information secret and limiting access to authorized individuals or entities?
  5. What is the term for the unauthorized or covert observation of private or confidential information, often done for malicious purposes?
  6. Any information used to identify the patient?

14 Clues: Any information used to identify the patient?What action involves verifying information or details a second time to ensure accuracy or security?What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?...

GUESS WITH PUNKT.! 2024-11-14

GUESS WITH PUNKT.! crossword puzzle
Across
  1. A secure area where apps can run without affecting the system (8 letters)
  2. Authentication method using physical characteristics (9 letters)
  3. Virtual network for secure internet connections (3 letters)
  4. Design principle that reduces unnecessary features (10 letters)
  5. A security system that requires two forms of identification (10 letters)
  6. A digital barrier that defends your device from cyber intrusions (8 letters)
Down
  1. Control over one's own data without external interference (15 letters)
  2. Technique that scrambles data to protect it from prying eyes (10 letters)
  3. A digital barrier that defends your device from cyber intrusions (8 letters)
  4. The state of keeping personal information protected from others (7 letters)

10 Clues: Virtual network for secure internet connections (3 letters)Design principle that reduces unnecessary features (10 letters)Authentication method using physical characteristics (9 letters)Control over one's own data without external interference (15 letters)A security system that requires two forms of identification (10 letters)...

cyber 2021-09-30

cyber crossword puzzle
Across
  1. Phreaking is a slang term for hacking into secure telecommunication networks.
  2. is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
  3. Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
  4. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
  5. A computer worm is a type of malware that spreads copies of itself from computer to computer.
  6. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  7. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
  8. Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
  9. A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
Down
  1. a method or pathway used by a hacker to access or penetrate the target system.
  2. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
  3. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  4. Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
  5. Hardening is the process by which something becomes harder or is made harder.
  6. The dark web refers to sites and services that aren't indexed by search engines

15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks.Hardening is the process by which something becomes harder or is made harder.a method or pathway used by a hacker to access or penetrate the target system.The dark web refers to sites and services that aren't indexed by search engines...

cyber 2025-09-30

cyber crossword puzzle
Across
  1. Client-side script injection (abbr.)
  2. Product exploited by ProxyLogon in 2021
  3. Worm that sabotaged Iranian centrifuges
  4. Tech giant with 2013 breach affecting 3B accounts
  5. 2017 credit bureau breach (~147M)
  6. Classic database attack via un-sanitized input
  7. 2017 global ransomware outbreak using EternalBlue
  8. 2021 Log4j critical RCE (CVE‑2021‑44228)
  9. Network of compromised devices under one controller
Down
  1. Malware category that encrypts files for payment
  2. 2017 wiper-like outbreak spread via MeDoc
  3. Suspected group tied to those Exchange intrusions
  4. Deceptive emails to steal credentials
  5. hidden
  6. 2014 OpenSSL “bleeding heart” bug

15 Clues: hidden2014 OpenSSL “bleeding heart” bug2017 credit bureau breach (~147M)Client-side script injection (abbr.)Deceptive emails to steal credentialsProduct exploited by ProxyLogon in 2021Worm that sabotaged Iranian centrifuges2021 Log4j critical RCE (CVE‑2021‑44228)2017 wiper-like outbreak spread via MeDocClassic database attack via un-sanitized input...

Fraud 2026-02-05

Fraud crossword puzzle
Across
  1. A form of fraud where people create false identities online, often with the intent to deceive others.
  2. A process that requires businesses to verify the identity of a customer before doing business with them.
  3. A cyber attack technique where an attacker impersonates another user or computer system in a network or a communications system.
  4. A type of fraud that occurs when an attacker gains access to and takes control of an account that belongs to another person.
  5. Any unauthorized access or entry into a secured system or resource, whether intentional or unintentional, in which sensitive data is exposed or stolen.
  6. The illegal misappropriation of funds or assets entrusted to an individual or organization.
  7. Authentication methodology that requires users to provide multiple pieces of authentication evidence when logging into a system.
  8. Malicious software that is used to secretly collect a user's data without their knowledge or consent.
  9. A malicious software that is used to infiltrate a computer system without the user's knowledge or permission.
  10. A person who commits fraud, especially in business or commercial dealings.
  11. An investment fraud that works by paying existing investors with the funds that are collected from new investors.
  12. Any data which can be used to identify an individual. It includes sensitive information such as name, address, Social Security Number, driver’s license information, financial data, usernames and passwords, healthcare information and more.
  13. Fraudulent investment programs that require participants to contribute money in order to join, with promised monetary rewards for recruiting additional participants.
  14. The practice of ensuring the safety of confidential information and assets, as well as the security of mobile devices and networks, when accessing the internet or connecting to networks through mobile devices.
  15. A process of disguising illegal profits or funds obtained from criminal activities such as drug trafficking, corruption, terrorism, or other financial crimes.
Down
  1. A financial institution responsible for safeguarding a customer’s assets.
  2. An authentication credential used to protect computer systems, applications, networks, and other confidential information.
  3. A type of malicious software that is used by cyber criminals, usually to illegally gain access to a computer system or encode and hold important data hostage, in exchange for a ransom.
  4. A federal law that was signed into effect in October 2001 to strengthen national security.
  5. The process of ensuring that organizations, individuals and other entities comply with laws, regulations, rules, codes of practice and industry standards.
  6. The practice of acquiring someone else’s personal information and using it for financial gain.
  7. A technology that relies on Artificial Intelligence (AI) to create false images, audio recordings and video recordings of individuals.
  8. The use of tactics and methods to manipulate people into divulging sensitive information or performing actions that can be used to pave the way for a security breach or malicious activity.
  9. A fraud tactic where bad actors impersonate legitimate people/businesses via SMS/text message to trick unsuspecting victims into sharing personal information (passwords, PII, credit card numbers, etc.).
  10. A type of malicious software that appears to be legitimate but performs a hidden malicious activity without the user's knowledge.
  11. A specialized team within an insurance company that focuses on detecting, investigating, and preventing insurance fraud.
  12. A type of cyberattack that utilizes social engineering techniques to deceive victims into disclosing sensitive personal and financial information or performing tasks that allow the attacker access to a victim’s system.

27 Clues: A financial institution responsible for safeguarding a customer’s assets.A person who commits fraud, especially in business or commercial dealings.A federal law that was signed into effect in October 2001 to strengthen national security.The illegal misappropriation of funds or assets entrusted to an individual or organization....

Join the Elite Cyber Team 2020-06-26

Join the Elite Cyber Team crossword puzzle
Across
  1. To protect data and humans ensure you have S?
  2. You can't cause pain to a computer but this is real
  3. Updated typewriter, spell checking and rocket launching.
Down
  1. The largest WAN of these is the internet.
  2. Subject does research & development, lab coats optional.
  3. Attack that damages or destroys online systems is called?

6 Clues: The largest WAN of these is the internet.To protect data and humans ensure you have S?You can't cause pain to a computer but this is realSubject does research & development, lab coats optional.Updated typewriter, spell checking and rocket launching.Attack that damages or destroys online systems is called?

Q4 December Crossword Contest 2022-01-04

Q4 December Crossword Contest crossword puzzle
Across
  1. EPOS- EPOS expand vision 3T lets you jump into a video meeting with the touch of a ____?
  2. Palo alto- Palo Alto has the world’s first machine learning-powered next-generation ____?
  3. DocuSign- Where is Ms. Jackson located in Arizona?
  4. Zagg- The man in the video who protects the phones from dropping was wearing a sweatshirt that said what?
  5. F5- F5 Solutions protect digital experiences, reduce operational costs, and improve ___ retention.
  6. Opengear- An out-of-band network is an alternative pathway to your network devices when they become ____?
  7. Tripp Lite- Tripp Lite offers a plethora of options to really build out that final back-end piece of their IT ____?
  8. HP- Insight does not require page ____ or minimums.
  9. Trend Micro- Cloud app activity is also logged on a per ___ level as well as a list that is maintained of users that have logged into this endpoint.
  10. Thales- Securing data, ___, and software has never been more important.
  11. SonicWall- To protect against threats SonicWall offers what kind of approach offering endpoint security, network security, email security, remote access security, cloud security and zero trust network access?
Down
  1. Malwarebytes- What percent of businesses need days or weeks to meditate?
  2. Acronis- What percent of companies report being targeted by a cyber attack at least once a week?
  3. Seagate- Seagate provides options for ____ your own storage that are simple, trusted, and efficient.
  4. Legrand- The relentless pursuit of purpose and ____ that binds us.
  5. Commvault- with metallic you can offer customers of every size ___ data protection in the cloud.
  6. Dell- In our client portfolio we offer a _____ device demo program through our intel battle pack program.
  7. AddOn- By partnering with AddOn you have a ____ team at your disposal simply by calling your insight.
  8. Lenovo- ThinkStation P6 20 is the first workstation with ___ rising thread ripper pro power.
  9. Micron- The P5 Plus M.2 is engineered for hardcore gamers,____, and creatives who demand high-performance computing.
  10. McAfee- What is Patrick Ludlow known as?
  11. Eset- Eset makes it easy for you with simple to understand ___.
  12. Paessler- No hidden costs, fully featured, ___ licensing, and fair pricing.
  13. Belkin- What platform did Belkin use to create their video?
  14. ViewSonic- Immersive audio experience with ___ front-facing soundbar.
  15. Kingston- Kingston Solutions include: system specific, ValueRAM, USB drives, flash cards, and ____?
  16. Dell- How many cats were shown in Dons video?
  17. LG: Lg One- Quick|Works ___-in-one.

28 Clues: LG: Lg One- Quick|Works ___-in-one.McAfee- What is Patrick Ludlow known as?Dell- How many cats were shown in Dons video?DocuSign- Where is Ms. Jackson located in Arizona?HP- Insight does not require page ____ or minimums.Belkin- What platform did Belkin use to create their video?Eset- Eset makes it easy for you with simple to understand ___....

Insider Threat 2025-06-27

Insider Threat crossword puzzle
Across
  1. National security ___________ is a determination that a person is able and willing to safeguard classified national security information and/or occupy a national security sensitive position.
  2. Any individual, group, organization, or government that conducts or has the intent and capability to conduct activities detrimental to the US Government or its assets.
  3. Any form of violence that is directed at an individual or group, for a specific reason. In other words, not a random act of violence.
  4. An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy any national defense or war materiel, premises, or utilities, to include human and natural resources.
  5. ____ -4 establishes the single, common adjuducative criteria for all covered individuals who require initial or continued eligibility for access to classified information or to hold a sensitive position. (Abbrev.)
  6. To take advantage of (a person, situation, etc.) especially unethically or unjustly for one’s own ends.
  7. A person actively engaged in killing or trying to kill people in a confined and populated area. (two words)
Down
  1. Intelligence activity directed towards the acquisition of information through clandestine means.
  2. An adversary having the intent, capability, and opportunity to cause loss or damage.
  3. _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
  4. Information, which if improperly disclosed, could be expected to cause serious damage to the national security.
  5. _______ information is any information that negatively reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security.
  6. Financial, business, scientific, technical, or other information that the owner has taken measures to keep secret; and which has independent economic value from not being generally known to the public is called a ____________ secret.
  7. Any person with authorized access to DOD resources by virtue of employment, volunteer activities, or contractual relationship with DOD.
  8. The process by which information is transformed into intelligence; systemic examinations of information to identify significant facts, make judgments, and draw conclusions.
  9. Free and confidential counseling and referral service for a variety of personal and professional concerns. (Abbrev.)
  10. Deliberate disclosures of classified or unclassified information to the media.

17 Clues: Deliberate disclosures of classified or unclassified information to the media.An adversary having the intent, capability, and opportunity to cause loss or damage.Intelligence activity directed towards the acquisition of information through clandestine means....

Cross Word Puzzle - Cyber Security 2023-10-12

Cross Word Puzzle - Cyber Security crossword puzzle
Across
  1. the gaining of unauthorised access to data in a system or computer
  2. a type of software program created to protect information technology systems and individual computers from malicious software or malware
  3. the practice of protecting systems, networks and programs from digital attacks
  4. a type of malware that spreads between computers and damages data and software
  5. a string of characters that allows access to a computer system or service
  6. software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
  7. malware that misleads users of its true intent by disguising itself as a standard program
Down
  1. the protection of personal data from those who should not have access to it
  2. individuals or teams of people who use technology to commit malicious activities on digital systems or networks
  3. the actual person or organisation who is directly affected by the hacker's use of stolen data or information
  4. a security system designed to prevent unauthorised access into or out of a computer network
  5. a system that connects two or more computer devices for transmitting and sharing information

12 Clues: the gaining of unauthorised access to data in a system or computera string of characters that allows access to a computer system or servicethe protection of personal data from those who should not have access to itthe practice of protecting systems, networks and programs from digital attacks...

16 2024-07-05

16 crossword puzzle
Across
  1. '___ntentions,' teen drama
  2. Video game movie adaptation
  3. Washington's activist role
  4. Space mission crisis
  5. '___idential,' 50s LA crime
  6. Space horror thriller
  7. '___ Doubtfire,' Williams in disguise
  8. Madonna as Argentine icon
  9. Young love and loss
  10. Bullock's cyber thriller
  11. Sanderson sisters' return
  12. Austen's period drama adaptation
  13. De Niro's mercenary thriller
  14. Damon's math genius
Down
  1. Political thriller
  2. Cage's Vegas tale
  3. Carrey's truth-challenged lawyer
  4. Mobster sees a shrink
  5. Cage's airborne action
  6. Comet threatens Earth
  7. Travolta and Cage swap faces
  8. Young cyber rebels
  9. '___ Claiborne,' King adaptation
  10. Political media manipulation
  11. Burton's biopic of a director

25 Clues: Cage's Vegas talePolitical thrillerYoung cyber rebelsYoung love and lossDamon's math geniusSpace mission crisisMobster sees a shrinkComet threatens EarthSpace horror thrillerCage's airborne actionBullock's cyber thrillerMadonna as Argentine iconSanderson sisters' return'___ntentions,' teen dramaWashington's activist roleVideo game movie adaptation...

Cyber Defense Terms 2023-11-20

Cyber Defense Terms crossword puzzle
Across
  1. a program that uses virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing
  2. the process of verifying the identity of a user or piece of information and the veracity of information provided, e.g. with a password or other credential
  3. a bit of code that provides additional, revised, or updated data for an operating system or application
  4. cybersecurity services that operate from within a network and not at the endpoint and can therefore protect any connected device regardless of model or operating system
  5. features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children
  6. the concept of continuing to operate without interruption despite an emergency situation
  7. Secure __________ Layer is the standard security technology for establishing an encrypted link between a web server and a browser
  8. Indicators of ___________ are bits of forensic data from system log entries or files that identify potentially malicious activity on a system or network
  9. An Intrusion ____________ System is a network security system designed to prevent network penetration by malicious actors
  10. __________ Assessment is a structured process used to identify and evaluate various risks that an organization might be exposed to
  11. the concept of ensuring that data and systems have not been accessed or modified and are therefore accurate and trustworthy
Down
  1. a control list that allows and denies elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system
  2. Completely Automated Public Turing test to tell Computers and Humans Apart - a challenge-response test commonly used by websites to verify the user is a real human and not a bot
  3. a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs
  4. a process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
  5. ____________ Authentication combines a static password with an external authentication device such as a phone or email for added security
  6. Security __________ Response is a planned approach to addressing and managing the reaction after a cyber attack or network security breach
  7. a list of permitted items that are automatically let through whatever gate is being used, e.g. allowed sites, users, email addresses
  8. creating an isolated environment on a network that mimics a regular computer in order to safely execute suspicious code without risking harm
  9. a digital boundary that is defined for a system or domain and within which a specified security policy is applied
  10. extends a private network across a public network - essentially a virtual, secure corridor
  11. a facility where information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts
  12. a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating
  13. the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit

24 Clues: the concept of continuing to operate without interruption despite an emergency situationextends a private network across a public network - essentially a virtual, secure corridora bit of code that provides additional, revised, or updated data for an operating system or application...

Knight Owl Cyber Security Crossword 2023-08-24

Knight Owl Cyber Security Crossword crossword puzzle
Across
  1. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  2. a security framework requiring all users, whether in or outside the organization’s network, to be authenticated
  3. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Down
  1. world's first computer virus
  2. a common type of cyber attack in which attackers take a narrow focus and craft detailed, targeted email messages to a specific recipient or group.
  3. a cyber-attack that seeks to damage an organization by targeting less secure elements

6 Clues: world's first computer virusa cyber-attack that seeks to damage an organization by targeting less secure elementsa type of malicious software designed to block access to a computer system until a sum of money is paid.a security framework requiring all users, whether in or outside the organization’s network, to be authenticated...

CYBER ETHICS 2025-05-26

CYBER ETHICS crossword puzzle
Across
  1. THE PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE .
  2. AN ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER .
  3. WHEN A SOFTWARE IS COPIED AND
  4. AN ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION .
Down
  1. HACKING WHICH IS DONE FOR A GOOD CAUSE SUCH AS NATIONAL SECURITY , KNOWN AS
  2. AN ILLEGAL INTRUSION INTO A COMPUTER SYSTEM OR NETWORK .
  3. CYBER ATTACK IS ALSO KNOWN AS ___ .
  4. THE UNWANTED BULK EMAILS THAT COME FROM UNKOWN SOURCE CALLED .

8 Clues: WHEN A SOFTWARE IS COPIED ANDCYBER ATTACK IS ALSO KNOWN AS ___ .THE PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE .AN ILLEGAL INTRUSION INTO A COMPUTER SYSTEM OR NETWORK .THE UNWANTED BULK EMAILS THAT COME FROM UNKOWN SOURCE CALLED .AN ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION ....

Security Vocabulary 2014-04-07

Security Vocabulary crossword puzzle
Across
  1. – the most recent version of a file.
  2. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  3. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  4. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  5. a computer program that performs the same operation many times in a row
  6. access to a computer program that bypasses all security.
  7. is the use of Internet based attacks in terrorist activities
  8. is encrypted text
  9. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.
  10. is any method of encrypting text
Down
  1. signal that identifies user
  2. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  3. is someone who breaks into someone else's computer system
  4. payment of royalties on the Internet
  5. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. a unique code assigned to a buyer to verify transactions
  7. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  8. it is technology that measures the biological part of the computer.
  9. test designed to differentiate humans from automated programs.
  10. are programs that Web sites put on your hard disk.
  11. is any computer program designed to facilitate illegal activity online.
  12. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.

22 Clues: is encrypted textsignal that identifies useris any method of encrypting text– the most recent version of a file.payment of royalties on the Internetare programs that Web sites put on your hard disk.a unique code assigned to a buyer to verify transactionsaccess to a computer program that bypasses all security....

RU ITEC411- Crime and Security 2022-11-06

RU ITEC411- Crime and Security crossword puzzle
Across
  1. - receives hundreds of thousands of complaints of identity theft each year. Losses from identity theft amount to billions of dollars per year in the U.S., with several million victims.
  2. - act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger
  3. - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers
  4. - a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
  5. - Companies began using hackers to analyze and improve security
  6. - A computer worm designed to find and infect a particular piece of industrial hardware, used in an attack against Iranian nuclear plants
  7. - Use of hacking to promote a political cause
  8. - Use their skills to demonstrate system vulnerabilities and improve security
  9. - Attacks used to shut down Websites
  10. - Phishing attacks committed using text messages (SMS)
  11. - Which part of government is considered and treats some cyber attacks as acts of war, and the U.S. might respond with military force.
Down
  1. - read hacker newsletters and participate in chat rooms undercover. They can often track a handle by looking through newsgroups or other archives
  2. - Monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity
  3. - variety of factors contribute to security weaknesses
  4. - various crimes in which criminals use the identity of an unknowing, innocent person
  5. - Intentional, unauthorized access to computer system
  6. - An especially clever piece of code
  7. - trace viruses and hacking attacks by using ISP records and router logs
  8. - An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  9. - has made it easier to steal and use card numbers without having the physical card

20 Clues: - An especially clever piece of code- Attacks used to shut down Websites- Use of hacking to promote a political cause- Intentional, unauthorized access to computer system- variety of factors contribute to security weaknesses- Phishing attacks committed using text messages (SMS)- Companies began using hackers to analyze and improve security...

IT Profession 2023-10-02

IT Profession crossword puzzle
Across
  1. Who collects, processes, and analyzes data to provide insights and support decisionmaking?
  2. Who combines software development and IT operations to improve the software delivery process?
  3. Who specializes in securing computer networks and data against cyber threats?
  4. Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
  5. Who manages and maintains an organization's computer systems and networks?
  6. Who evaluates software for defects and ensures it meets quality standards?
  7. Who develops algorithms and models for artificial intelligence and machine learning applications?
  8. Who analyzes business processes and designs IT systems to improve efficiency and productivity?
  9. Who specializes in the design, implementation, and management of cloud computing solutions?
  10. Who protects computer systems and data from security breaches and cyberattacks?
  11. Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
  12. Who creates applications specifically for mobile devices, such as smartphones and tablets?
  13. Who oversees the storage, organization, and security of databases?
  14. Who writes and tests code to create software applications and systems?
  15. Who educates individuals or employees on using IT systems and software effectively?
Down
  1. Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
  2. Who implements and manages integrated software systems for business processes?
  3. Who designs, implements, and manages computer networks for data communication?
  4. Who assesses an organization's IT systems and practices to ensure compliance and security?
  5. Who designs, develops, and tests software solutions for specific purposes?
  6. Who provides technical assistance and support to endusers and resolves ITrelated issues?
  7. Who identifies business needs and uses technology to find solutions to business problems?
  8. Developer Who works on blockchain technology to create secure and decentralized applications?
  9. Who designs and creates websites, web applications, and user interfaces?
  10. Who offers expert advice and solutions to organizations for their ITrelated challenges?

25 Clues: Who oversees the storage, organization, and security of databases?Who writes and tests code to create software applications and systems?Who designs and creates websites, web applications, and user interfaces?Who designs, develops, and tests software solutions for specific purposes?...

Cyber Insurance & IT 2025-07-23

Cyber Insurance & IT crossword puzzle
Across
  1. Fraudulent emails attempting to steal sensitive information.
  2. Malicious software that holds digital files hostage for payment.
  3. Requests made for compensation after a covered cyber event.
  4. A circumstance or loss not covered by an insurance policy.
  5. Type of authentication that requires more than a password.
  6. The process of evaluating cyber risks for insurance coverage.
Down
  1. An addition or amendment made to a cyber insurance policy.
  2. The amount paid regularly to maintain an insurance policy.
  3. Insurance purchased by insurers to limit exposure to major losses.
  4. Legal responsibility for data breaches or cyber incidents.

10 Clues: An addition or amendment made to a cyber insurance policy.The amount paid regularly to maintain an insurance policy.Legal responsibility for data breaches or cyber incidents.A circumstance or loss not covered by an insurance policy.Type of authentication that requires more than a password.Requests made for compensation after a covered cyber event....

Cyber Security Awareness Month Crossword 2022-09-23

Cyber Security Awareness Month Crossword crossword puzzle
Across
  1. A flaw or weakness in a computer system that could be exploited to violate the security of a system
  2. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until money is paid
  3. Written compliance requirement with regards your obligation as an employee
  4. Assurance that information is only exposed to those who are authorised to access it
  5. Assignation of identifying mark to guide handling and storage
  6. A fraudulent email supposedly from a reputable company attempting to get personal information
  7. Verifying identity
Down
  1. Information is present in the required form at the time it is required
  2. Method for making information unreadable unless authorised
  3. If you see something, say something! Report all security ___________________.
  4. The "I" in the CIA triad. It Ensures that information maintains its accuracy
  5. Secure passwords are great but ___________________ are even better

12 Clues: Verifying identityMethod for making information unreadable unless authorisedAssignation of identifying mark to guide handling and storageSecure passwords are great but ___________________ are even betterInformation is present in the required form at the time it is requiredWritten compliance requirement with regards your obligation as an employee...

Show How Much You Know About Social Engineering 2025-09-04

Show How Much You Know About Social Engineering crossword puzzle
Across
  1. Cybercriminals use social engineering to get users to share confidential information or download this.
  2. A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
  3. A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
  4. The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
  5. The highest defense rating for passwords is "____"
  6. A single compromised password can put your organization's security and personal information at ____.
  7. This is a common way cyber villains get into computer networks.
Down
  1. This password level uses simple passwords and the same password for every account.
  2. The password defense rating for a "Level 1: Beginner" is "____".
  3. An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
  4. The name of the character that uses "convince" and "impersonate" attacks.
  5. The human firewall manifesto recommends using this for every account.
  6. Cybercriminals rely on being able to convince users to click on these.
  7. The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.

14 Clues: The highest defense rating for passwords is "____"This is a common way cyber villains get into computer networks.The password defense rating for a "Level 1: Beginner" is "____".The human firewall manifesto recommends using this for every account.Cybercriminals rely on being able to convince users to click on these....

Malware 2021-10-06

Malware crossword puzzle
Across
  1. computer worm is a standalone malware computer
  2. adware is software that displays unwanted pop-up advert
  3. type of malware that allows a cyber-security attacker to take control of an infected computer without the user knowing it is happening ​
  4. a type of social engineering attack often used to steal user data
Down
  1. like to run after a tennis ball
  2. like to chase mice
  3. errors in someones code or program
  4. someone who seeks and exploits weaknesses in a computer

8 Clues: like to chase micelike to run after a tennis ballerrors in someones code or programcomputer worm is a standalone malware computeradware is software that displays unwanted pop-up advertsomeone who seeks and exploits weaknesses in a computera type of social engineering attack often used to steal user data...

December Crossword 2025-12-24

December Crossword crossword puzzle
Across
  1. The process of using technology to perform tasks with minimal human input.
  2. Prefix often used in terms like security or warfare in tech contexts.
  3. A futuristic computing paradigm leveraging physics for massive parallelism.
  4. An open-source operating system widely used in servers and development.
Down
  1. A deep learning framework popular in AI research.
  2. A distributed ledger technology powering cryptocurrencies and secure transactions.
  3. A robotic vehicle often used in space exploration.
  4. A small, fast memory that stores frequently accessed data.
  5. A structured collection of data used for training AI models.

9 Clues: A deep learning framework popular in AI research.A robotic vehicle often used in space exploration.A small, fast memory that stores frequently accessed data.A structured collection of data used for training AI models.Prefix often used in terms like security or warfare in tech contexts....

Cyber Law 2021-09-03

Cyber Law crossword puzzle
Across
  1. enables exchange of data
  2. school of thought against the regulation of cyber space
  3. process of conversion from analog to digital
Down
  1. regulation by the use of users
  2. "what things regulate"
  3. natural resource of cyber space
  4. devised a model for regulation of cyber space
  5. hidden identity
  6. use of fake identity
  7. allows sites to record your browsing activities

10 Clues: hidden identityuse of fake identity"what things regulate"enables exchange of dataregulation by the use of usersnatural resource of cyber spaceprocess of conversion from analog to digitaldevised a model for regulation of cyber spaceallows sites to record your browsing activitiesschool of thought against the regulation of cyber space

Security Vocabulary 2014-04-07

Security Vocabulary crossword puzzle
Across
  1. is the use of Internet based attacks in terrorist activities
  2. is someone who breaks into someone else's computer system
  3. a unique code assigned to a buyer to verify transactions
  4. are programs that Web sites put on your hard disk.
  5. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  7. access to a computer program that bypasses all security.
  8. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  9. is any computer program designed to facilitate illegal activity online.
  10. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.
Down
  1. is encrypted text
  2. it is technology that measures the biological part of the computer.
  3. is any method of encrypting text
  4. signal that identifies user
  5. the most recent version of a file.
  6. payment of royalties on the Internet
  7. test designed to differentiate humans from automated programs.
  8. computer program that performs the same operation many times in a row
  9. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  10. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  11. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  12. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.

22 Clues: is encrypted textsignal that identifies useris any method of encrypting textthe most recent version of a file.payment of royalties on the Internetare programs that Web sites put on your hard disk.a unique code assigned to a buyer to verify transactionsaccess to a computer program that bypasses all security....

Cyber Bullying 2014-06-19

Cyber Bullying crossword puzzle
Across
  1. Another word for stealing
  2. Cyber bullying can lead to
  3. A medical condition
  4. An emotion
  5. Following someone around
  6. Against the law
Down
  1. Going somewhere you should not be going
  2. Illegal,crime, hacker
  3. Cyber bullying can be classed as.
  4. Unidentifiable
  5. Horrible People
  6. People tend to _______ when being bullied

12 Clues: An emotionUnidentifiableHorrible PeopleAgainst the lawA medical conditionIllegal,crime, hackerFollowing someone aroundAnother word for stealingCyber bullying can lead toCyber bullying can be classed as.Going somewhere you should not be goingPeople tend to _______ when being bullied

Let's Revise Cyber Security Fundamentals !! 2021-08-16

Let's Revise Cyber Security Fundamentals !! crossword puzzle
Across
  1. deliberate attempt to compromise security using malicious activity
  2. state of maintaining secrecy of communication
  3. Naming system followed to identify computers connected to Internet
  4. criminal activity performed using computer or a network
  5. way of confirmation of individual's identity
  6. illegal piece of software designed to cause harm to computers/networks
Down
  1. ready to access for authorized people
  2. unskilled individual who uses programs written by others to initiate attacks
  3. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
  4. use of Computers and Networks to gain illegal access for confidential information for some gain
  5. computer program designed to protect computer
  6. malicious software that prevents the users from accessing their own data for want of money

12 Clues: ready to access for authorized peopleway of confirmation of individual's identitystate of maintaining secrecy of communicationcomputer program designed to protect computercriminal activity performed using computer or a networkdeliberate attempt to compromise security using malicious activity...

Let's Revise Cyber Security Fundamentals !! 2021-08-16

Let's Revise Cyber Security Fundamentals !! crossword puzzle
Across
  1. deliberate attempt to compromise security using malicious activity
  2. state of maintaining secrecy of communication
  3. Naming system followed to identify computers connected to Internet
  4. criminal activity performed using computer or a network
  5. way of confirmation of individual's identity
  6. illegal piece of software designed to cause harm to computers/networks
Down
  1. ready to access for authorized people
  2. unskilled individual who uses programs written by others to initiate attacks
  3. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
  4. use of Computers and Networks to gain illegal access for confidential information for some gain
  5. computer program designed to protect computer
  6. malicious software that prevents the users from accessing their own data for want of money

12 Clues: ready to access for authorized peopleway of confirmation of individual's identitystate of maintaining secrecy of communicationcomputer program designed to protect computercriminal activity performed using computer or a networkdeliberate attempt to compromise security using malicious activity...

Risk Culture and Cyber Security 2024-07-09

Risk Culture and Cyber Security crossword puzzle
Across
  1. results in breaches of our Scotiabank Code of Conduct
  2. type of spear phishing that largely targets companies conducting regular payment processing activities
  3. should act as Risk Culture ambassadors
  4. a targeted attempt to steal sensitive information, such as account credentials, from a specific victim, often for malicious reasons
  5. is a type of computer program designed to gain unauthorized access or to cause damage to a computer
  6. tactic that adversaries use to trick you into revealing sensitive information
  7. helps ensure that risk-taking activities are consistent with the bank's risk appetite
Down
  1. are responsible for cascading and reinforcing Senior Management Risk Culture messages within their teams
  2. a password that is easy to remember difficult to hack, & satisfies Scotiabank’s complexity requirements
  3. is the telephone equivalent of phishing
  4. a form of phishing involving criminals using SMS message to try and obtain sensitive information from the recipient
  5. type of malware that is designed to extort money from victims by blocking access to files or the computer system until a ransom is paid

12 Clues: should act as Risk Culture ambassadorsis the telephone equivalent of phishingresults in breaches of our Scotiabank Code of Conducttactic that adversaries use to trick you into revealing sensitive informationhelps ensure that risk-taking activities are consistent with the bank's risk appetite...

IEM January Social Media Crossword Puzzle 2022-01-30

IEM January Social Media Crossword Puzzle crossword puzzle
Across
  1. When you get emails, texts, or calls that seem to be from companies you know.
  2. Who said, “We must use time creatively, in the knowledge that the time is always ripe to do right.”
  3. IEMer appointed by President Biden to FEMA Assistant Administrator, Grants, Resilience (last name)
  4. A new _____ outlining available federal resources to help Puerto Rico recover, rebuild, and modernize its infrastructure has been released by the U.S. Department of Homeland Security and the U.S. Department of Education.
  5. National _____ _____ appreciation day is where we thank the people who protect and serve our communities.
  6. Applications for FEMA’s Youth _____ Council is open.
Down
  1. National ____ Day is where we thank those administering vaccines to combat the coronavirus and provide lifesaving medication to our communities.
  2. At IEM, we are dedicated to serving our ____ to help build a more resilient world.
  3. Home Office Safety and Security week emphasizes the importance of securing home networks to ____ cyber threats.
  4. On January 11th we wear what color to bring awareness to human trafficking?
  5. 1985 was the year IEM was _______.

11 Clues: 1985 was the year IEM was _______.Applications for FEMA’s Youth _____ Council is open.On January 11th we wear what color to bring awareness to human trafficking?When you get emails, texts, or calls that seem to be from companies you know.At IEM, we are dedicated to serving our ____ to help build a more resilient world....

500D 2023-12-11

500D crossword puzzle
Across
  1. Salah satu drakor yang kita ikutin
  2. Target utama kamu di flashsale
  3. Salah satu hal yang aku biasa beli di Indomaret
  4. Username tiktok aku
  5. Album Taylor Swift kesukaan kamu
  6. DN pertama aku di cyber
  7. Kesukaan papa kamu
Down
  1. Lagu kelima di Harry's House
  2. Film pertama yang kita tonton bareng
  3. Username cyber aku
  4. Nama penjual Ayam Bakar Madu
  5. Nama sahabatnya Sherina
  6. Lagu terakhir yang aku post di akun Janitra
  7. Nama panggilan kamu
  8. Siapa yang difotocopy
  9. Lagu the 1975 favorite aku

16 Clues: Username cyber akuKesukaan papa kamuUsername tiktok akuNama panggilan kamuSiapa yang difotocopyNama sahabatnya SherinaDN pertama aku di cyberLagu the 1975 favorite akuLagu kelima di Harry's HouseNama penjual Ayam Bakar MaduTarget utama kamu di flashsaleAlbum Taylor Swift kesukaan kamuSalah satu drakor yang kita ikutin...

Tech Controls 2020-08-13

Tech Controls crossword puzzle
Across
  1. What needs to be done to a change record before the change is made
  2. A business initiative is an example of something that would ______ the change process
  3. What needs to be done regularly to identify security vulnerabilities
  4. Antivirus software is a type of ______ control
Down
  1. Any change made in production must be ______
  2. Problems are loaded in the problem management ____ with a suitable priority assigned
  3. The peer _____ process is the task that authorises a change to proceed
  4. An IT Service Continuity Plan helps ensure the ______of customer and business data
  5. Controls help mitigate business _____

9 Clues: Controls help mitigate business _____Any change made in production must be ______Antivirus software is a type of ______ controlWhat needs to be done to a change record before the change is madeWhat needs to be done regularly to identify security vulnerabilitiesThe peer _____ process is the task that authorises a change to proceed...

eSafety-Privacy 2020-01-15

eSafety-Privacy crossword puzzle
Across
  1. confidential
  2. communication
  3. message
  4. licence
  5. threat
  6. profile
  7. picture
  8. mates
  9. wired
  10. identification
  11. electronic
Down
  1. nameless
  2. data
  3. photos
  4. courier
  5. appreciation
  6. fraud
  7. nasty
  8. insulting
  9. junk-mail

20 Clues: datafraudnastymateswiredphotosthreatcouriermessagelicenceprofilepicturenamelessinsultingjunk-mailelectronicconfidentialappreciationcommunicationidentification

Hacker Cracker/ Jed Curtis 2023-01-26

Hacker Cracker/ Jed Curtis crossword puzzle
Across
  1. bad
  2. gains
  3. sick
  4. code
  5. Rain
  6. own
  7. steal
  8. fake
  9. popup
  10. crime
Down
  1. core
  2. harass
  3. Validate
  4. Bug
  5. weak
  6. web
  7. Cyber
  8. tech
  9. case
  10. space

20 Clues: badBugwebowncoreweaksickcodetechRaincasefakegainsCyberspacestealpopupcrimeharassValidate

supercoulafragolisticexpeouladotis crossword by collin 2013-08-28

supercoulafragolisticexpeouladotis crossword by collin crossword puzzle
Across
  1. no monkey business
  2. the opposite of software
  3. violins, basses, violas, and cellos
  4. the former producers of minecraft
  5. fruits berry and other produce items
  6. they help earth
  7. I can see your bones
  8. so logical
  9. they make vents
  10. they update yahoo pages
Down
  1. these graphics are amazing
  2. open wide for the nurse...
  3. programs they make programs for managers
  4. they make flashdrives
  5. they give info
  6. the opposite of hardware
  7. they make cars
  8. cyber space
  9. designer they make radars
  10. they make kindles
  11. the update the web
  12. pure water water that is ultra pure
  13. they transport luggage
  14. high quality items!
  15. they make docks
  16. they make zipcode doors

26 Clues: so logicalcyber spacethey give infothey make carsthey help earththey make docksthey make ventsthey make kindlesno monkey businessthe update the webhigh quality items!I can see your bonesthey make flashdrivesthey transport luggagethey make zipcode doorsthey update yahoo pagesthe opposite of softwarethe opposite of hardwaredesigner they make radars...

Redalert CTF 2019-08-05

Redalert CTF crossword puzzle
Across
  1. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
  2. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  3. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  4. May sometime be known as Industroyer
  5. The world’s most murderous malware
Down
  1. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  2. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  3. This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
  4. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
  6. A network security measure employed on one or more computers to physically isolated from another network.
  7. A RAT targeting the ICS industry by the hacking group Dragonfly

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber-attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

bully 2023-02-06

bully crossword puzzle
Across
  1. 12
  2. 14
  3. 5
  4. 17
  5. 7
  6. 15
  7. 11
  8. 8
  9. 3
  10. 13
Down
  1. 2
  2. 10
  3. 19
  4. 20
  5. 9
  6. 6
  7. 4
  8. 1
  9. 18
  10. 16

20 Clues: 2596471831210191420171511181613

How Much Do You Know? 2023-01-17

How Much Do You Know? crossword puzzle
Across
  1. he “Likes” to sing and play music
  2. forget this tidbit of information and the Officer Judy will give you doody
  3. it took this Regional office 20 years to cook Christmas Jiggs
  4. at one time you could find him at the hockey rink Presiding over Port-Aux-Basques Minor Hockey
  5. this Manager swims with the Sharks
  6. cyber security month
Down
  1. plant in NL that is nourished by insects that are trapped and drown in water
  2. Mushophobic Avondale Mayer not permitted to keep a pet mouse in his desk
  3. Honorary Citizen of Wabana because of his Hockey skills
  4. provincial bird of Newfoundland and Labrador
  5. provincial mineral for Newfoundland and Labrador
  6. this Manger won big Feuding with her Family
  7. this Way is meant to strengthen our economy
  8. Paparazzo Manager is great at shooting people and places

14 Clues: cyber security monthhe “Likes” to sing and play musicthis Manager swims with the Sharksthis Manger won big Feuding with her Familythis Way is meant to strengthen our economyprovincial bird of Newfoundland and Labradorprovincial mineral for Newfoundland and LabradorHonorary Citizen of Wabana because of his Hockey skills...

cross 2023-09-07

cross crossword puzzle
Across
  1. central processing unit
  2. theft - user manipulate online platforms to gain access or personal information to intimate a character
  3. - an area in which a computer system and networks are used
  4. a copy of the file/software
  5. a text encryption
  6. - software used as an intent to destroy, disrupt or gander unauthorized access to a computer.
  7. - a malware used to deny organization access to a file system.
  8. the application that provides service for the user and client
  9. - a group of private computers used to infect malicious software.
Down
  1. getting email or text identifying they have your password
  2. process of safeguarding digital information through entire life cycle
  3. the process or action verifying the identification
  4. unwanted software used to deliver targeted advertisements
  5. attack an attempt to gain unauthorized access to a computer
  6. A part of a computer system to block unauthorized data
  7. - bypassing an organization's existing security systems.
  8. engineering - manipulation used to gain access to an unauthorized computer system.
  9. protection from data theft

18 Clues: a text encryptioncentral processing unitprotection from data thefta copy of the file/softwarethe process or action verifying the identificationA part of a computer system to block unauthorized data- bypassing an organization's existing security systems.getting email or text identifying they have your password...

Cyber Komodo EGG Hunt 2022-04-15

Cyber Komodo EGG Hunt crossword puzzle
Across
  1. doggie themed
  2. kills with its saliva
  3. tenth mouth trait found on the test rarity tool
  4. comes out of a bottle and has a PC
  5. first eye trait found on the test rarity tool
  6. powerful energy
Down
  1. where the cyber komodos hang out
  2. hunts for treasure
  3. where you store your money
  4. lucky number
  5. a distributed ledger
  6. what makes something unique
  7. telecoms network in the cyber komodo-verse
  8. nft platform
  9. creator of komodo
  10. you cross it over water
  11. thinks he's the Dogecoin CEO

17 Clues: lucky numbernft platformdoggie themedpowerful energycreator of komodohunts for treasurea distributed ledgerkills with its salivayou cross it over waterwhere you store your moneywhat makes something uniquethinks he's the Dogecoin CEOwhere the cyber komodos hang outcomes out of a bottle and has a PCtelecoms network in the cyber komodo-verse...

French Vocab 2023-09-30

French Vocab crossword puzzle
Across
  1. experience
  2. cyberdissidence
  3. technology
  4. bionic
  5. snitch
  6. revolutionary
  7. invention
  8. researche
  9. theory
Down
  1. ethhical
  2. gene
  3. genetic
  4. innovative
  5. tool
  6. land
  7. cell
  8. tablet
  9. UFO
  10. space
  11. cyberharrasment

20 Clues: UFOgenetoollandcellspacebionicsnitchtablettheorygeneticethhicalinventionresearcheexperienceinnovativetechnologyrevolutionarycyberdissidencecyberharrasment

Cyber Ready Team 2021-09-16

Cyber Ready Team crossword puzzle
Across
  1. How many kiddos does Ben have?
  2. What word makes the Cyber Design Thinking process unique from National Program's Design Thinking process
  3. Who took the longest to get a Questacon email?
  4. What is the name of Cherie's clever doggo?
  5. What did Jin do on his balcony while in quarantine?
  6. The founding group of Cyber Ready was affectionately known as "R & ___"
  7. What is Jordan's most prolific hobby?
Down
  1. Who is most likely to play ukelele during a meeting?
  2. Hiding things in plain sight
  3. The nickname of Michaela's cat
  4. Cyber Ready's favourite little microprocessor
  5. Who is most likely to do a zoom-ba class?
  6. What snack did Ana find that made the whole team happy?

13 Clues: Hiding things in plain sightThe nickname of Michaela's catHow many kiddos does Ben have?What is Jordan's most prolific hobby?Who is most likely to do a zoom-ba class?What is the name of Cherie's clever doggo?Cyber Ready's favourite little microprocessorWho took the longest to get a Questacon email?What did Jin do on his balcony while in quarantine?...

Cyber Bullying 2012-05-05

Cyber Bullying crossword puzzle
Across
  1. using technology to harass someone
  2. mobile device used to send hateful texts
  3. a worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems
  4. used to access the internet
  5. short message sent by a cell phone
Down
  1. common social networking site used by cyber bullies
  2. words or actions intended to annoy, alarm, or abuse another individual
  3. sometimes the fatal consequence of cyber bullying
  4. not giving a name or username so as to stay hidden and undetected, cyber bullies stay this way so as to not get in trouble
  5. the person being cyber bullied

10 Clues: used to access the internetthe person being cyber bulliedusing technology to harass someoneshort message sent by a cell phonemobile device used to send hateful textssometimes the fatal consequence of cyber bullyingcommon social networking site used by cyber bullieswords or actions intended to annoy, alarm, or abuse another individual...

Priya's NWEG Crossword Puzzle 2023-08-29

Priya's NWEG Crossword Puzzle crossword puzzle
Across
  1. Converting data into a secure code to prevent unauthorized access during transmission.
  2. Devices that direct data packets between networks, determining optimal paths for transmission.
  3. Verifying the identity of users, devices, or systems accessing the network.
  4. The ability of a network to handle increased traffic and growth without performance degradation.
  5. The flow of data packets through a network, varying in volume and type.
  6. The speed, efficiency, and effectiveness of network operations and data transmission.
  7. The ability of devices to establish and maintain connections within a network.
Down
  1. The time delay between sending and receiving data across a network, affecting response time.
  2. Establishes secure connections over public networks, ensuring privacy.
  3. The underlying framework and components that support network operations.
  4. Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
  5. The consistency and stability of network operations and services.
  6. Converting data into a secure code to prevent unauthorized access during transmission.
  7. Duplication of critical network components to ensure availability in case of failures.
  8. The capacity of a network to transmit data quickly, often measured in bits per second.
  9. Security devices that control incoming and outgoing network traffic based on predefined rules.
  10. Devices that connect devices within a local network and facilitate data exchange.
  11. Measures to protect network data from unauthorized access, breaches, and cyber threats.
  12. Continuous observation of network activities and performance for troubleshooting and optimization.
  13. The amount of data that can be transmitted successfully over a network in a given time.

20 Clues: The consistency and stability of network operations and services.Establishes secure connections over public networks, ensuring privacy.The flow of data packets through a network, varying in volume and type.The underlying framework and components that support network operations....

NEMR Cross word 2024-07-10

NEMR Cross word crossword puzzle
Across
  1. Go to www._____.net for your internet needs!
  2. A source is probably not reputable if it has _____ words or grammar mistakes.
  3. Check to see if your information is coming from a reputable _____.
  4. Cyber criminal.
  5. Fake news sources often have low numbers of _____.
  6. Don't visit _____ you don't recognize.
  7. Trust your _____! If something feels suspicious it probably is.
  8. Never click on misspelled or suspicious looking _____.
Down
  1. Software that protects against viruses.
  2. Don't accept _____ from people you don't know.
  3. Fake news posts often have a low number of _____.
  4. Check with 3rd party _____ checkers like PolitiFact or SNOPES if you aren't sure.
  5. Fraudulent messages that appear to come from a reputable source, usually through email, with the goal of stealing sensitive data or installing malware on a device.
  6. Security system that blocks malicious internet traffic.
  7. Social media accounts automated in mass to spread fake information and news.

15 Clues: Cyber criminal.Don't visit _____ you don't recognize.Software that protects against viruses.Go to www._____.net for your internet needs!Don't accept _____ from people you don't know.Fake news posts often have a low number of _____.Fake news sources often have low numbers of _____.Never click on misspelled or suspicious looking _____....

Cyber 2023-12-13

Cyber crossword puzzle
Across
  1. an attempt to trick someone into giving information over the internet or by email
  2. bad and harmful software
  3. double-..... = double-check
  4. to ..... a password = to break or gain access to an unknown password
  5. = to keep,
  6. to receive data or a file from the Internet on your computer.
  7. = unsafe
Down
  1. a global computer network providing a variety of information
  2. to send data or a file from your computer to somewhere on the Internet
  3. to catch (data, information)
  4. to go around, avoid (for example, restrictions)
  5. social ..... is manipulating individuals into providing confidential or personal information that may be used for criminal purposes
  6. a dishonest, criminal scheme aimed at tracking people
  7. "доступ"

14 Clues: "доступ"= unsafe= to keep,bad and harmful softwaredouble-..... = double-checkto catch (data, information)to go around, avoid (for example, restrictions)a dishonest, criminal scheme aimed at tracking peoplea global computer network providing a variety of informationto receive data or a file from the Internet on your computer....

Final activity #1 2024-11-21

Final activity #1 crossword puzzle
Across
  1. is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
  2. An action or event that has the potential to compromise and/or violate
  3. The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  4. is a state of well-being of information and infrastructures.
  5. An individual who breaks into computer systems to steal, change, or destroy information.
  6. may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
  7. ensuring that the information/data can be accessed only by those authorized
  8. ensuring that the information is accessible to authorized persons when required without delay
  9. It is the Characteristics of the culture of computers, information, technology and virtual reality
  10. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
  1. the identification and assurance of the origin of information.
  2. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  3. is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
  4. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
  5. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  6. Any action derived from intelligent threats to violate the security of the
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  8. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
  9. ensuring that the information is accurate, complete, reliable, and is in its original form.
  10. A defined method of breaching the security of an IT system through vulnerability.

20 Clues: is a state of well-being of information and infrastructures.the identification and assurance of the origin of information.An action or event that has the potential to compromise and/or violateAny action derived from intelligent threats to violate the security of theensuring that the information/data can be accessed only by those authorized...

CROSSWORD 2025-11-12

CROSSWORD crossword puzzle
Across
  1. Technology Backbone Of Digital World
  2. Place Where Students Learn
Down
  1. Intelligence Technology Simulating Human intelligence
  2. Security Digital Defense System

4 Clues: Place Where Students LearnSecurity Digital Defense SystemTechnology Backbone Of Digital WorldIntelligence Technology Simulating Human intelligence

Harry Hardware of the Internet 2023-03-06

Harry Hardware of the Internet crossword puzzle
Across
  1. the Company who supplies your broadband connection
  2. converts URLs into IP addresses
  3. a network of computers all contained within one location
  4. a category of malicious cyber-attacks that hackers or hackers use in order to make an online service unavailable
  5. a computer program or device that provides a service to another computer program and its user
Down
  1. the fastest part of the internet which connects very powerful servers together using high-speed, high-bandwidth connections.
  2. an electronic device for storing and processing data
  3. a network security device that monitors and filters incoming and outgoing network traffica network security device that monitors and filters incoming and outgoing network traffic
  4. the number of instructions per second the computer executes
  5. a mode of computer data storage in which digital data is stored on servers in off-site locations
  6. a unit of data storage capacity that is roughly equivalent to 1 billion bytes
  7. the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device

12 Clues: converts URLs into IP addressesthe Company who supplies your broadband connectionan electronic device for storing and processing dataa network of computers all contained within one locationthe number of instructions per second the computer executesa unit of data storage capacity that is roughly equivalent to 1 billion bytes...

Cybersecurity Awareness Month - Acronym Edition 2022-10-07

Cybersecurity Awareness Month - Acronym Edition crossword puzzle
Across
  1. An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
  2. A system turns domain names into IP addresses
  3. A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
  4. Also called a "black cloud"
Down
  1. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
  2. A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
  3. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
  4. Provide outsourced monitoring and management of security devices and systems

8 Clues: Also called a "black cloud"A system turns domain names into IP addressesProvide outsourced monitoring and management of security devices and systemsA secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online...

Security 2013-06-27

Security crossword puzzle
Across
  1. What is the name of the contractor company for security?
  2. Stick to what path when in the freight yard?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. Who has the final say when allowing freight to enter the yard?
  5. What lights must be on when in the freight yard?
  6. What is Angela’s title other than Manager?
  7. What colour should drivers follow in the freight yard on the way in?
Down
  1. What must a non MSIC holder have whilst in the LRZ?
  2. What need must you have to request an MSIC?
  3. Your MSIC must be above what?
  4. What must you display in the LRZ?
  5. What does the T stand for in OTS?
  6. What type of industry are we in?
  7. Who takes passengers on/off via the buggy?
  8. A non MSIC holder must also have what for access into the LRZ?
  9. What is your base channel when receiving radio calls?

16 Clues: Your MSIC must be above what?What type of industry are we in?What must you display in the LRZ?What does the T stand for in OTS?Who takes passengers on/off via the buggy?What is Angela’s title other than Manager?What need must you have to request an MSIC?Stick to what path when in the freight yard?What lights must be on when in the freight yard?...

Security 2015-07-17

Security crossword puzzle
Across
  1. Relationship of the sights, trajectory, and the impact of a bullet.
  2. An authorized Safeguards User responsible for the Generation, Storage, and Destruction of SGI.
  3. safely and efficiently generating _____ for the long term.
  4. Equipment to protect yourself
  5. Independent Spent Fuel Storage Installation
  6. Protected Area Security Expansion
  7. Concrete block barriers.
  8. multiple integrated laser engagement system
Down
  1. Nuclear ________
  2. A barrier earthen or otherwise
  3. An area encompassed by physical barriers to which access is controlled per 10 CFR 73.55.
  4. An oversight or review/verification of activities conducted by a second individual.
  5. Firearms, explosives, incendiary devices, etc.
  6. The NRC comes has a _______ inspection of our NSD.
  7. Badge allows short-term, escorted access to the Protected/Vital areas
  8. Sallyport requires __ Members of the Security Force.

16 Clues: Nuclear ________Concrete block barriers.Equipment to protect yourselfA barrier earthen or otherwiseProtected Area Security ExpansionIndependent Spent Fuel Storage Installationmultiple integrated laser engagement systemFirearms, explosives, incendiary devices, etc.The NRC comes has a _______ inspection of our NSD....

Functionality and Performance of an Network System 2024-08-08

Functionality and Performance of an Network System crossword puzzle
Across
  1. Measures and protocols are implemented to protect a network from unauthorised access and cyber threats.
  2. The system that translates user-friendly domain names into IP addresses that computers use to identify each other.
  3. The maximum data transfer rate of a network connection, determining how much data can flow through at once.
  4. The system of assigning unique numerical labels to devices on a network for identification and communication.
  5. The ability of a network to grow and handle increased demand without performance degradation.
  6. The time delay between sending and receiving data across a network.
  7. The actual rate at which data is successfully transmitted over a network.
  8. The percentage of time a network is operational and accessible to users.
  9. A secure connection over the internet that encrypts data.
  10. A small unit of data transmitted over a network, containing both the data itself and control information like destination address.
Down
  1. The likelihood of a network performing its functions without failure over time.
  2. A network protocol that automatically assigns IP addresses to devices on a network.
  3. Establish rules or standards determining how data is transmitted over a network.
  4. A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  5. The inclusion of backup elements in a network to maintain service if a component fails.

15 Clues: A secure connection over the internet that encrypts data.The time delay between sending and receiving data across a network.The percentage of time a network is operational and accessible to users.The actual rate at which data is successfully transmitted over a network.The likelihood of a network performing its functions without failure over time....

Cyber-Security Awareness 2024-05-22

Cyber-Security Awareness crossword puzzle
Across
  1. Regularly changing this can help maintain security
  2. Malicious software that replicates itself and spreads to other devices
  3. A technique used to separate a network into smaller parts to enhance security
Down
  1. Software designed to protect against viruses
  2. Unauthorized intrusion into a computer or network
  3. An unexpected or malicious email that appears legitimate

6 Clues: Software designed to protect against virusesUnauthorized intrusion into a computer or networkRegularly changing this can help maintain securityAn unexpected or malicious email that appears legitimateMalicious software that replicates itself and spreads to other devicesA technique used to separate a network into smaller parts to enhance security

Cyber Security Quiz 2023-02-03

Cyber Security Quiz crossword puzzle
Across
  1. I'm a button on the keyboard, but sometimes astronauts visit me
  2. Machine used for processing information
Down
  1. The computer is sick
  2. Needed by the computer to protect valuable data, just as the bank needs it to protect its money.
  3. I am not the alphabet but I am filled with letters
  4. I'm a rat on the computer, and I like to play with the cursor.

6 Clues: The computer is sickMachine used for processing informationI am not the alphabet but I am filled with lettersI'm a rat on the computer, and I like to play with the cursor.I'm a button on the keyboard, but sometimes astronauts visit meNeeded by the computer to protect valuable data, just as the bank needs it to protect its money.

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

SeatWork #2 2025-09-06

SeatWork #2 crossword puzzle
Across
  1. The practice of protecting information, systems and assets from threats.
  2. A model where decision-making is spread across units.
  3. The detailed steps employees follow to apply a policy.
  4. Setting security objectives, identifying risks and allocating resources.
  5. The executive who leads and manages the organization’s security program.
  6. A model where one authority makes all security decisions.
  7. Making sure security strategies support business goals.
  8. Using third-party providers for services such as managed security.
  9. Directing and motivating teams to meet security objectives.
  10. A person who oversees IT systems and implements security measures.
Down
  1. Meeting mandatory laws, regulations and industry standards.
  2. A person who checks systems for compliance and weaknesses.
  3. Structuring people and resources to execute the security plan.
  4. The chance that a threat could harm systems, data or reputation.
  5. A high-level rule that states how an organization protects its information.
  6. A professional who monitors networks and investigates threats.
  7. The system of directing and controlling security decisions and accountability.
  8. A structured set of best practices and standards for managing security.
  9. A model combining centralized standards with local flexibility.
  10. Monitoring security performance and making improvements.

20 Clues: A model where decision-making is spread across units.The detailed steps employees follow to apply a policy.Making sure security strategies support business goals.Monitoring security performance and making improvements.A model where one authority makes all security decisions.A person who checks systems for compliance and weaknesses....

Cyber Bullying 2021-04-26

Cyber Bullying crossword puzzle
Across
  1. 1 in 5 _____ young people have reported being cyber bullied.
  2. (3words)A support line for kids, the phone number is: 1800 55 1800.
  3. True or false: You can go to the police if the cyber bullying is bad enough
  4. Cyberbullying is using ______ as a platform to bully and hurt people.
  5. bullying online is easier because then they can remain _____.
Down
  1. Cyber bullying can effect someone mentally, emotionally and ______.
  2. If you see a post that is harmful you can block or _____ the post in question
  3. Trisha Prabhu designed this app to prevent cyber bullying.
  4. This organisation defines cyber bullying as a form of bullying through digital technology.

9 Clues: Trisha Prabhu designed this app to prevent cyber bullying.1 in 5 _____ young people have reported being cyber bullied.bullying online is easier because then they can remain _____.Cyber bullying can effect someone mentally, emotionally and ______.(3words)A support line for kids, the phone number is: 1800 55 1800....

Cyber Crossword #1 2024-03-28

Cyber Crossword #1 crossword puzzle
Across
  1. Any device that connects to the corporate network. Types of devices include laptops, phones, servers, switches, printers, etc.
  2. Any potential danger to information or systems.
  3. A system for collecting, saving, processing, and presenting data by means of a computer. This term is generally used when referring to a component of software that can be executed.
  4. Weakness in system security procedures, design, implementation, internal controls, etc., that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
Down
  1. An Identity and Access Management technology solution which ensures the security of information assets and continued identity governance and regulatory compliance for applications running on-premise or from the cloud.
  2. ​The practice of identifying and protecting assets in cyberspace: detecting, responding to and recovering from cyber risk events.
  3. The potential loss to an area due to the occurrence of an adverse event.
  4. Hostile or malicious software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other malicious programs. It can be in the form of executable code, scripts, active content and other software.
  5. The potential that events, expected or unanticipated, may have an adverse effect on a financial institution's earnings, capital, or reputation
  6. ​​A passwordless, Multi-Factor Authentication (MFA) solution that provides the security of a token with the convenience of a smartphone. With this new solution, you’ll no longer need to memorize a password, allowing you to log in to your computer much faster and more securely.
  7. The physical components of an information system.
  8. A record of events occurring within an entity's systems and networks.

12 Clues: Any potential danger to information or systems.The physical components of an information system.A record of events occurring within an entity's systems and networks.The potential loss to an area due to the occurrence of an adverse event....

Redalert ICS CTF 2019-07-23

Redalert ICS CTF crossword puzzle
Across
  1. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  2. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  3. May sometime be known as Industroyer
  4. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
  1. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  2. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  3. The world’s most murderous malware
  4. A network security measure employed on one or more computers to physically isolated from another network.
  5. This malware was reported to be involved with the 2015 cyber attacks in Ukraine
  6. A RAT targeting the ICS industry by the hacking group Dragonfly
  7. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

Digital Crossword 4 2022-12-12

Digital Crossword 4 crossword puzzle
Across
  1. this security company is ranked top 10 in cyber security
  2. this is the meaning for HP computers
  3. the acronym means Uniform Resource Locators
  4. This program is through Google and replaces Microsoft PowerPoint
  5. The distance between each line
  6. an integrated circuit (IC) intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers)
Down
  1. It is described as the size and also style of this writing
  2. it is the format used in Williams's class to set up essays
  3. a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
  4. this tab will move your text from left, middle, and right
  5. this is the capital of big technology companies in the United States
  6. Universal Serial Bus
  7. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  8. this is used instead of Microsoft Word because it saves in real time
  9. (High Definition Multimedia Interface) is a specification that combines video and audio into a single digital interface for use with digital versatile disc (DVD) players, digital television (DTV) players, set-top boxes, and other audiovisual devices

15 Clues: Universal Serial BusThe distance between each linethis is the meaning for HP computersthe acronym means Uniform Resource Locatorsthis security company is ranked top 10 in cyber securitythis tab will move your text from left, middle, and rightIt is described as the size and also style of this writing...

unit 26-28 Fekete Konor 2024-11-26

unit 26-28 Fekete Konor crossword puzzle
Across
  1. Devices that generate unique identifiers to ensure access to sensitive information.
  2. Software that enables financial transactions on a website, such as purchases.
  3. A type of cyber attack where an attacker sends fake emails or messages that appear to be from a legitimate source, in an attempt to steal sensitive information.
  4. Individuals who try to obtain or steal software or game licenses through illegal means.
  5. A business model that combines traditional retail sales and online sales.
  6. The unauthorized use or distribution of copyrighted materials, such as music, movies, or software.
Down
  1. software that enables users to store and manage their payment information, such as credit card numbers and expiration dates.
  2. A network security system that monitors and controls incoming and outgoing network traffic.
  3. A type of self-replicating software that can spread across a network without human intervention.
  4. A type of bad software that can cause harm to a computer or a network. Examples include viruses, trojans, and rootkits.
  5. The act of harassing or threatening someone online, often through social media or email.
  6. A unique number used by banks to identify transactions.
  7. A personal identification number used for bank cards or other security systems.
  8. A protocol that enables secure communication between websites and users.
  9. Software that monitors a computer's data transmission and collects sensitive information.

15 Clues: A unique number used by banks to identify transactions.A protocol that enables secure communication between websites and users.A business model that combines traditional retail sales and online sales.Software that enables financial transactions on a website, such as purchases....

uli311 a 2018-11-15

uli311 a crossword puzzle
Across
  1. oy
  2. hukuk, yasa
  3. hoşgörü
  4. endişe
  5. kamusal
  6. başkan
  7. reddetmek
  8. rapor
  9. başkent
  10. siber
Down
  1. işlev
  2. oydaşma
  3. af
  4. ceza
  5. bütçe
  6. müttefik
  7. kabul etmek
  8. müzakere etmek
  9. bölge
  10. öncelik

20 Clues: oyafcezaişlevbütçebölgeraporsiberendişebaşkanoydaşmahoşgörükamusalöncelikbaşkentmüttefikreddetmekhukuk, yasakabul etmekmüzakere etmek

DTIN - Digital Security 2024-07-04

DTIN - Digital Security crossword puzzle
Across
  1. - Software that automatically displays or downloads advertising material when a user is online.
  2. - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
  3. - A standalone malware computer program that replicates itself to spread to other computers.
  4. - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
  5. - A method of trying to gather personal information using deceptive e-mails and websites.
  6. - The process of converting information or data into a code to prevent unauthorized access.
  7. - The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. - A person who uses computers to gain unauthorized access to data.
  9. - Malware that locks or encrypts data until a ransom is paid.
  10. - A network of private computers infected with malicious software and controlled as a group.
  11. - A type of surveillance technology used to record keystrokes.
  12. - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. - Statistical analysis of people's unique physical and behavioral characteristics.
  2. - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
  3. - Software that enables a user to obtain covert information about another's computer activities.
  4. - Data sent from a website and stored on a user's computer by the user's web browser.
  5. - A security process by which a list of permitted entities is created and defined as acceptable.
  6. - Criminal activities carried out by means of computers or the internet.
  7. - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  8. - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
  9. - A network security system that monitors and controls incoming and outgoing network traffic.
  10. - A type of malware that is often disguised as legitimate software.
  11. - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  12. - Software designed to detect and destroy computer viruses.
  13. - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.

25 Clues: - Software designed to detect and destroy computer viruses.- Malware that locks or encrypts data until a ransom is paid.- A type of surveillance technology used to record keystrokes.- A person who uses computers to gain unauthorized access to data.- A type of malware that is often disguised as legitimate software....

ST10050768's NWEG5122 Crossword 2023-08-30

ST10050768's NWEG5122 Crossword crossword puzzle
Across
  1. Topology where all computing devices are connected with a single cable
  2. converting information into secret code to hide information
  3. network device that is used to segment the networks into different subnetworks called subnets or LAN segments
  4. Measuring by quality rather than quantity
  5. component that allows network device to move data to the system's memory reducing CPU usage
  6. Device that forwards data packets from one network to another
  7. protecting computer networks from cyber threats is called network ...
  8. Amount of data that moves across a network during any given time
  9. Delay in time taken for data to reach its destination
  10. rate of message delivery over a communication channel
  11. data can be stored in ...
Down
  1. Topology where all computing devices are connected to a central node
  2. capacity at which a network can transmit data
  3. Another word for Network Adapter(Abbreviation)
  4. Information translated into a form efficient for processing
  5. Measuring by quantity rather than quality
  6. Data divided into small segments
  7. Global network
  8. Time delay over a network connection
  9. Established set of rules that determines how data is sent

20 Clues: Global networkdata can be stored in ...Data divided into small segmentsTime delay over a network connectionMeasuring by quantity rather than qualityMeasuring by quality rather than quantitycapacity at which a network can transmit dataAnother word for Network Adapter(Abbreviation)Delay in time taken for data to reach its destination...

CrossBits Prelims 2024-09-17

CrossBits Prelims crossword puzzle
Across
  1. , Jack Ma is one of it's Founders
  2. , What is the term for a type of cyber- attack that uses fake emails?
  3. , The Open-Source Revolution
  4. , The Cloud Storage Solution for Businesses
  5. , The Power of Artificial Intelligence
  6. , Transforming the World Through Technology
  7. , This platform allows people to share and upload videos
  8. , "Don't be evil"
  9. , This platform was originally known as 'Picaboo' before rebranding
  10. , What is the term for a network security system that monitors traffic?
  11. , The AI Platform for Businesses
  12. , Buy it. Sell it. Love it.
Down
  1. , "Inspiring Innovation"
  2. , This Payment company was spun off from eBay in 2015
  3. , The Company that created the populor social media platform "TikTok"
  4. , This tech company's name references the highest frequency in the electromagnetic spectrum
  5. , the world's ideas are shared in under 18 minutes
  6. , The Ultimate Productivity Tool
  7. , do the smart thing
  8. , Jerry and David's Giude to the World Wide Web
  9. , Originally started as an online DVD rental service before shifting to streaming
  10. , A PC sales unit founded by Liu Chuanzhi

22 Clues: , "Don't be evil", do the smart thing, "Inspiring Innovation", Buy it. Sell it. Love it., The Open-Source Revolution, The Ultimate Productivity Tool, The AI Platform for Businesses, Jack Ma is one of it's Founders, The Power of Artificial Intelligence, A PC sales unit founded by Liu Chuanzhi, The Cloud Storage Solution for Businesses...

RU ITEC411: Professional Ethics and Responsibilities 2022-11-23

RU ITEC411: Professional Ethics and Responsibilities crossword puzzle
Across
  1. a set of principles that help guide professionals
  2. an advertisement that is given to a specific group or person
  3. cameras used to broadcast live data over the internet
  4. activities that help apply an individuals knowledge with an industry
  5. programs and data used by a computer source
  6. an institute with the goal of advancing technology for society
  7. the quality of being honest
  8. a rule or a restriction
  9. helps to protect any original work
Down
  1. a demand viewed by workers to perform their work within a certain time
  2. the process of dealing with a group of people or things
  3. the act of reporting any wrong doing as an employee
  4. process of protecting any systems and networks from cyber attacks
  5. a phase of software testing where the audience tries out a product
  6. principles that help guide a persons behavior
  7. an individual with an interest or concern with a topic
  8. human data that is processed by machines
  9. process of evaluating a product or an application
  10. the act of describing a precise requirement
  11. general rules or principles

20 Clues: a rule or a restrictiongeneral rules or principlesthe quality of being honesthelps to protect any original workhuman data that is processed by machinesprograms and data used by a computer sourcethe act of describing a precise requirementprinciples that help guide a persons behaviora set of principles that help guide professionals...

Cyber Ethics 2025-06-15

Cyber Ethics crossword puzzle
Across
  1. holds individuals accountable for their actions in cyberspace and promotes ethical decision-making.
  2. Areas of Cyber Ethics:
  3. Property:
  4. helps protect individuals and organizations from cyber threats like data breaches and identity theft.
  5. copyright laws, avoiding plagiarism, and not using or distributing copyrighted material without permission.
  6. Use of Technology:
  7. and Abuse:
  8. fosters a culture of respect and consideration for others in the online world.
  9. cyberbullying, harassment, stalking, and any form of online abuse.
Down
  1. measures to protect systems and data from unauthorized access, viruses, and cyber threats.
  2. ethics, also known as internet or digital ethics, refers to the moral principles that guide behavior in the online world. It encompasses a set of guidelines for responsible online conduct, promoting a safe and ethical cyberspace. Key aspects include respecting intellectual property, avoiding plagiarism, maintaining privacy, and refraining from harmful actions like cyberbullying or spreading viruses.
  3. ethics promotes a safer online environment by discouraging harmful behavior and encouraging responsible use of technology.
  4. technology in a way that is ethical, respectful, and considerate of others.
  5. personal information, avoiding unauthorized access to data, and respecting the privacy of others.
  6. is Cyber Ethics Important?

15 Clues: Property:and Abuse:Use of Technology:Areas of Cyber Ethics:is Cyber Ethics Important?cyberbullying, harassment, stalking, and any form of online abuse.technology in a way that is ethical, respectful, and considerate of others.fosters a culture of respect and consideration for others in the online world....

security 2015-10-27

security crossword puzzle
Across
  1. a situation when a plane or other vehicle is illegally taken under control
  2. small balls of ice that fall like rain from the sky.
  3. there is a danger that something unpleasant might be done
  4. a level of quality or achievement, especially a level that is thought to be acceptable.
  5. how far or how clearly you can see in particular weather conditions.
  6. help which gets someone out of a dangerous or unpleasant situation.
  7. An unexpected and difficult or dangerous situation
  8. Something that could be dangerous to you, your health or safety
  9. bad weather, with heavy rain, strong winds, and often thunder and lightning.
  10. the state of being safe from harm or danger.
Down
  1. It occurs when a moving object crashes into something.
  2. A change of a course or a destination.
  3. Something that turns your attention away from something
  4. something unpleasant happens causing injury or death.
  5. An inclined track for loading and unloading
  6. measures are taken to protect a place, or to restrict entering without permission

16 Clues: A change of a course or a destination.An inclined track for loading and unloadingthe state of being safe from harm or danger.An unexpected and difficult or dangerous situationsmall balls of ice that fall like rain from the sky.something unpleasant happens causing injury or death.It occurs when a moving object crashes into something....

Technology Some would say that improving technology has made our lives easier. 2022-05-12

Technology Some would say that improving technology has made our lives easier. crossword puzzle
Across
  1. the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
  2. Cyber bullying
  3. are market, government; cost and competition
  4. a person or situation which poses a possible threat to the security of something.
  5. High birth rate countries
  6. Some would say this would make our lives easier.
Down
  1. Greater population
  2. More job opportunities
  3. composition is changing at every level of society.
  4. the industrialization of society meant that there was no longer a need for large families to produce enough manual labor to run a farm.

10 Clues: Cyber bullyingGreater populationMore job opportunitiesHigh birth rate countriesare market, government; cost and competitionSome would say this would make our lives easier.composition is changing at every level of society.a person or situation which poses a possible threat to the security of something....

cybersecurity 2025-03-06

cybersecurity crossword puzzle
Across
  1. A cyber attack that tricks people into revealing personal information via fake emails or websites.
  2. Malicious software that secretly gathers user information.
  3. Software designed to harm or exploit computer systems.
  4. A type of malware that disguises itself as legitimate software.
  5. A secret combination of characters used to access a system.
  6. A type of malware that locks files and demands payment for decryption.
Down
  1. A security system that monitors and controls incoming and outgoing network traffic.
  2. The process of converting data into a secure code to prevent unauthorized access.
  3. Software that detects and removes malicious programs.
  4. A person who gains unauthorized access to computer systems.

10 Clues: Software that detects and removes malicious programs.Software designed to harm or exploit computer systems.Malicious software that secretly gathers user information.A person who gains unauthorized access to computer systems.A secret combination of characters used to access a system.A type of malware that disguises itself as legitimate software....

Edasiõppimine ja karjäär 2020-09-28

Edasiõppimine ja karjäär crossword puzzle
Across
  1. Alussüsteem, mis aitab erinevaid rakendusi käivitada
  2. ...tee- annab võimaluse ennast proovile panna valdkonna eksperdina ja juhina. Ametid ja kandideerimist saab uurida erinevats töövahetusportaalides nagu CV Online, CV Keskus ja teised.
  3. Cyber Security Network (CyberSN) asutaja(perekonnanimi)
  4. Austraalia internetiaktivist ja ajakirjanik, WikiLeaksi asutaja ja peatoimetaja
  5. Tegeleb süsteemide ja teenuste administreerimise ja parendamisega
  6. Tegeleb koodianalüüsi ja skriptide automatiseerimisega. Oskab turvaliselt programmeerida
  7. Maailma esimese arvutiviiruse looja(perekonnanimi)
  8. Kaks korda aastas toimuv küberkaitse võistlus Eestis
  9. Tegeleb šifrite loomise ja lahendamisega erineval tasemetel
  10. Küberpähkel toimub kahes kuus-oktoober ja ...
  11. Programm, äpp teisiti
Down
  1. Need, kes saadavad korda head
  2. Küberturbes oluline faktor
  3. Küberturbes oluline faktor
  4. Need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil ehk kui näiteks turvavea avastamisel on võimalik selle eest saada ka kasu, siis kindlasti nad selle ka välja võtavad.
  5. ...juht - Peab olema kursis riskidega, mis ohustavad ettevõtte edukalt toimimist ja kasu toomist

16 Clues: Programm, äpp teisitiKüberturbes oluline faktorKüberturbes oluline faktorNeed, kes saadavad korda headKüberpähkel toimub kahes kuus-oktoober ja ...Maailma esimese arvutiviiruse looja(perekonnanimi)Alussüsteem, mis aitab erinevaid rakendusi käivitadaKaks korda aastas toimuv küberkaitse võistlus Eestis...

Ethical Hacking CrossWord Puzzle by Megaa M 2025-10-30

Ethical Hacking CrossWord Puzzle by Megaa M crossword puzzle
Across
  1. Character string, often protected by hashing, required for system entry​
  2. Malicious actor breaching security for personal gain or disruption​
  3. Simulating covert and authorized intrusions to assess system fortitude​
  4. Multi-layered process confirming user legitimacy within a secure environment​
  5. Systematic flaw that adversaries actively seek to compromise​
Down
  1. Distributed technique that overwhelms network resources, halting normal activity​
  2. Psychological manipulation of individuals to divulge confidential details​
  3. Deceptive social engineering tactic exploiting user trust to harvest credentials​
  4. Hidden digital threat capable of data exfiltration or destruction upon execution​
  5. Tool for scanning networks and discovering open ports
  6. Professional hacker conducting authorized assessments to bolster cyber defenses​
  7. powerful framework used for developing,testing and exploits
  8. Malicious software masquerading as useful program to infiltrate the system​
  9. Acts as a barricade, filtering suspicious packets from entering trusted zones​
  10. Uses complex algorithms to render sensitive data unreadable to unauthorized eyes​

15 Clues: Tool for scanning networks and discovering open portspowerful framework used for developing,testing and exploitsSystematic flaw that adversaries actively seek to compromise​Malicious actor breaching security for personal gain or disruption​Simulating covert and authorized intrusions to assess system fortitude​...

Cyber Security Awareness 2024-09-16

Cyber Security Awareness crossword puzzle
Across
  1. A type of malicious software
  2. A sequence of characters used to verify the identity of a user
  3. The process of converting information into a secure format
  4. Unauthorized access to a network or system
  5. A secure, encrypted connection over the internet
Down
  1. The process of converting information into a secure format
  2. Fraudulent emails attempting to obtain sensitive information

7 Clues: A type of malicious softwareUnauthorized access to a network or systemA secure, encrypted connection over the internetThe process of converting information into a secure formatThe process of converting information into a secure formatFraudulent emails attempting to obtain sensitive information...

Cyber Security Vocabulary 2025-02-13

Cyber Security Vocabulary crossword puzzle
Across
  1. A set of rules that ensure secure communication and data exchange over a network.
  2. Measures taken to safeguard passwords from unauthorized access.
  3. Unauthorized access to confidential information.
Down
  1. The method of converting information into a secure format to prevent unauthorized access.
  2. The process of verifying the identity of a user or system.
  3. A security system that monitors and controls incoming and outgoing network traffic.

6 Clues: Unauthorized access to confidential information.The process of verifying the identity of a user or system.Measures taken to safeguard passwords from unauthorized access.A set of rules that ensure secure communication and data exchange over a network.A security system that monitors and controls incoming and outgoing network traffic....

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

OT InfoSec 2024 2024-09-30

OT InfoSec 2024 crossword puzzle
Across
  1. MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
  2. A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
  3. A ROUTINE FIX FOR A COMPUTER PROGRAM.
  4. THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
  5. FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
  6. A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
  7. YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
  8. THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
  9. A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
  10. THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
  11. THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
  12. I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
  13. A SELF-REPLICATING MALICIOUS PROGRAM.
  14. AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
  15. A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
  16. ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
  17. I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
  1. THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
  2. UNAUTHORIZED USER WITH MALICIOUS INTENT.
  3. WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
  4. THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
  5. A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
  6. CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
  7. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  8. WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
  9. THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
  10. A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
  11. I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
  12. CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
  13. ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
  14. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  15. ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
  16. A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).

33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM.A SELF-REPLICATING MALICIOUS PROGRAM.UNAUTHORIZED USER WITH MALICIOUS INTENT.YUBIKEY IS AN EXAMPLE OF A HARDWARE _______THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).THE POTENTIAL FOR LOSING VALUABLE INFORMATION.MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE....

Cyber Security Month 2023-09-29

Cyber Security Month crossword puzzle
Across
  1. Malicious software that demands a ransom
  2. Protection against unauthorized access
Down
  1. set of rules governing the exchange or transmission of data in a computer network
  2. Verifying the identity of a user or system
  3. Trickery to obtain sensitive information
  4. technique that involves deciphering a code or encryption system

6 Clues: Protection against unauthorized accessMalicious software that demands a ransomTrickery to obtain sensitive informationVerifying the identity of a user or systemtechnique that involves deciphering a code or encryption systemset of rules governing the exchange or transmission of data in a computer network

ASW - Passion 2022-08-15

ASW - Passion crossword puzzle
Across
  1. Passion fuels your...
  2. At ASW, we are also passionated about sustainability and committed to give back to our global community. Our sustainability approach is marked by 4 pillars: our community, our people, our customers and our
  3. We are passionated about our jobs at A.S. Watson. We put our heart and soul in our jobs. We hope to radiate this passion to future talent and we see the passion with current colleagues. We have a colleague within GIT Europe, who works at our department since 28-02-1977! Who is it?
Down
  1. Working hard on something we don’t care about is Stress but working on something we truly LOVE is...
  2. We want to be a better company every day. Our passion lies in acceleration. ASW is determined to stay winning and to continue to lead in innovating customer experience. To stay ahead, we need to continuesly keep learning and improving ourselves. Therefore, we offer you short and snappy trainings within our Be More platform, hosted by colleagues from within the teams. How do we call these short trainings?
  3. Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company?
  4. Do you know why this year is marked as the Year of Passion? Passion is one of the 5 DNAs of ASW, and it’s always listed as the first one. The other DNAs are: commitment, teamwork, science, and?
  5. We are also passionately protecting our technology! The Cyber Security team has got assistance from their new Cyber Hero. This Hero on four legs will help all our colleagues to become aware about Cyber Security. What’s the dog’s name?

8 Clues: Passion fuels your...Working hard on something we don’t care about is Stress but working on something we truly LOVE is...Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company?...

Cybersecurity by Hazel 2025-05-07

Cybersecurity by Hazel crossword puzzle
Across
  1. the process of identifying and fixing vulnerabilities on a system.
  2. The smallest unit of information storage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
  5. A list of entities that are considered trustworthy and are granted access or privileges.
  6. Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  7. A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
  8. Whom someone or what something is.
  9. the process of protecting electrical devices and networks from attacks.
Down
  1. A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
  2. A term to describe connecting multiple separate networks together.
  3. The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
  4. An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
  5. A list of entities that are blocked or denied privileges.
  6. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
  7. A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
  8. A cryptographic algorithm for encryption and decryption.
  9. A connection between two devices.
  10. A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.

19 Clues: A connection between two devices.Whom someone or what something is.The smallest unit of information storage.A cryptographic algorithm for encryption and decryption.A list of entities that are blocked or denied privileges.the process of identifying and fixing vulnerabilities on a system....

Edasiõppimine ja kärjäär 2023-01-31

Edasiõppimine ja kärjäär crossword puzzle
Across
  1. on endine vene häkker, kes pettis välja passi ja pankade võltsingutega.
  2. on tegelased, kellel on pigem kurjad motiivid ja neid kardetakse, sest nende eesmärgiks on ainult omakasu ja pahanduste tegemine teistele.
  3. arvutite omavahel võrgustikuks (nt Internet)
  4. infoturbe juht Xeroxis
  5. on USA küberturbe uurija.
  6. ja ennast veebipettuste, ohtude ning küberkiusamise eest.
  7. õpilane rakendab ohutus- ja turvameetmeid, et vältida füüsilisi ning virtuaalseid riske
Down
  1. Cyber Security Network (CyberSN) asjutaja.
  2. õpilane arvestab digitegevustes teiste inimeste privaatsust ja ühiseid kasutustingimusi ning kaitseb oma
  3. erinevad programmid, äpid, millega kasutaja otseselt kokku puutub.
  4. on need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil
  5. õpilane väldib digitehnoloogia ja digitaalse teabe kasutamisest tulenevaid terviseriske
  6. tundtud nime all kui DynamicWebPaige
  7. on need, kes saadavad korda head. Nende eesmärgiks on leida süsteemist turvavigu ja nendest teada anda või neid parandada.
  8. kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale

15 Clues: infoturbe juht Xeroxison USA küberturbe uurija.tundtud nime all kui DynamicWebPaigeCyber Security Network (CyberSN) asjutaja.arvutite omavahel võrgustikuks (nt Internet)ja ennast veebipettuste, ohtude ning küberkiusamise eest.kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale...

CPL 6 2023-01-03

CPL 6 crossword puzzle
Across
  1. Default value of the position property(CSS)
  2. superglobal variable holds information about headers, paths, and script locations(PHP)
  3. operator is used to select values within a given range(SQL)
  4. plugin is used to cycle through elements, like a slideshow(Boostrap)
  5. keyword is used to import a package from the Java API library(Java)
  6. AWS Migration Strategy(AWS Cloud)
Down
  1. Input type defines a slider control(HTML)
  2. statement used to select one of many code blocks to be executed(C)
  3. What tool does React use to compile JSX(React)
  4. statement is used to stop a loop(Python)
  5. Falsifying data, making something appear different than they really are (Cyber Security)
  6. 'special' class that represents a group of constants(C#)
  7. Event occurs when the user clicks on an HTML element(Javascript)
  8. transaction used to import SAP-provided support packages into your system(SAP)
  9. API that allows navigation through objects(XML)

15 Clues: AWS Migration Strategy(AWS Cloud)statement is used to stop a loop(Python)Input type defines a slider control(HTML)Default value of the position property(CSS)What tool does React use to compile JSX(React)API that allows navigation through objects(XML)'special' class that represents a group of constants(C#)...

Mesleki İngilizce I Final 2019-01-10

Mesleki İngilizce I Final crossword puzzle
Across
  1. kamusal
  2. bütçe
  3. endişe
  4. af
  5. reddetmek
  6. ceza
  7. başkan
  8. bölge
  9. başkent
  10. oy
Down
  1. oydaşma
  2. müzakere etmek
  3. rapor
  4. hoşgörü
  5. müttefik
  6. işlev
  7. siber
  8. öncelik
  9. kabul etmek
  10. hukuk, yasa

20 Clues: afoycezaraporbütçeişlevsiberbölgeendişebaşkankamusaloydaşmahoşgörüöncelikbaşkentmüttefikreddetmekkabul etmekhukuk, yasamüzakere etmek

Operations Security 2025-04-16

Operations Security crossword puzzle
Across
  1. OPSEC is a systematic _____________.
  2. Who is responsible for OPSEC?
  3. Friendly detectable actions that can derive sensitive information.
  4. Condition that exists when we are susceptible, and adversaries can collect our critical information.
  5. Replaced the SSN on ID Cards to protect personal information.
  6. Third number of the Army's Operations Security Regulation.
  7. Last name of USAG FCCO OPSEC manager (alternate).
Down
  1. Last name of USAG FCCO OPSEC manager (primary).
  2. Month originally designated for Operations Security awareness.
  3. Number of steps identified in the Operations Security cycle.
  4. Designated color usually associated with Operations Security.
  5. Has overall ownership of USAG FCCO Operations Security Program.
  6. First number of the Army's Operations Security Regulation.
  7. Official mascot for Operations Security.
  8. This term is used in Operations Security instead of enemy.
  9. Commander's list of unclassified sensitive information to protect.
  10. Directive that established OPSEC as a national security program.
  11. Second number of the Army's Operations Security Regulation.
  12. Acronym for Operations Security.
  13. New official designated month for National Operations Security awareness.

20 Clues: Who is responsible for OPSEC?Acronym for Operations Security.OPSEC is a systematic _____________.Official mascot for Operations Security.Last name of USAG FCCO OPSEC manager (primary).Last name of USAG FCCO OPSEC manager (alternate).First number of the Army's Operations Security Regulation.This term is used in Operations Security instead of enemy....

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...