cyber security Crossword Puzzles
Priya's NWEG Crossword Puzzle 2023-08-29
Across
- Converting data into a secure code to prevent unauthorized access during transmission.
- Devices that direct data packets between networks, determining optimal paths for transmission.
- Verifying the identity of users, devices, or systems accessing the network.
- The ability of a network to handle increased traffic and growth without performance degradation.
- The flow of data packets through a network, varying in volume and type.
- The speed, efficiency, and effectiveness of network operations and data transmission.
- The ability of devices to establish and maintain connections within a network.
Down
- The time delay between sending and receiving data across a network, affecting response time.
- Establishes secure connections over public networks, ensuring privacy.
- The underlying framework and components that support network operations.
- Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
- The consistency and stability of network operations and services.
- Converting data into a secure code to prevent unauthorized access during transmission.
- Duplication of critical network components to ensure availability in case of failures.
- The capacity of a network to transmit data quickly, often measured in bits per second.
- Security devices that control incoming and outgoing network traffic based on predefined rules.
- Devices that connect devices within a local network and facilitate data exchange.
- Measures to protect network data from unauthorized access, breaches, and cyber threats.
- Continuous observation of network activities and performance for troubleshooting and optimization.
- The amount of data that can be transmitted successfully over a network in a given time.
20 Clues: The consistency and stability of network operations and services. • Establishes secure connections over public networks, ensuring privacy. • The flow of data packets through a network, varying in volume and type. • The underlying framework and components that support network operations. • ...
Cyber Ready Team 2021-09-16
Across
- How many kiddos does Ben have?
- What word makes the Cyber Design Thinking process unique from National Program's Design Thinking process
- Who took the longest to get a Questacon email?
- What is the name of Cherie's clever doggo?
- What did Jin do on his balcony while in quarantine?
- The founding group of Cyber Ready was affectionately known as "R & ___"
- What is Jordan's most prolific hobby?
Down
- Who is most likely to play ukelele during a meeting?
- Hiding things in plain sight
- The nickname of Michaela's cat
- Cyber Ready's favourite little microprocessor
- Who is most likely to do a zoom-ba class?
- What snack did Ana find that made the whole team happy?
13 Clues: Hiding things in plain sight • The nickname of Michaela's cat • How many kiddos does Ben have? • What is Jordan's most prolific hobby? • Who is most likely to do a zoom-ba class? • What is the name of Cherie's clever doggo? • Cyber Ready's favourite little microprocessor • Who took the longest to get a Questacon email? • What did Jin do on his balcony while in quarantine? • ...
Cyber 2023-12-13
Across
- an attempt to trick someone into giving information over the internet or by email
- bad and harmful software
- double-..... = double-check
- to ..... a password = to break or gain access to an unknown password
- = to keep,
- to receive data or a file from the Internet on your computer.
- = unsafe
Down
- a global computer network providing a variety of information
- to send data or a file from your computer to somewhere on the Internet
- to catch (data, information)
- to go around, avoid (for example, restrictions)
- social ..... is manipulating individuals into providing confidential or personal information that may be used for criminal purposes
- a dishonest, criminal scheme aimed at tracking people
- "доступ"
14 Clues: "доступ" • = unsafe • = to keep, • bad and harmful software • double-..... = double-check • to catch (data, information) • to go around, avoid (for example, restrictions) • a dishonest, criminal scheme aimed at tracking people • a global computer network providing a variety of information • to receive data or a file from the Internet on your computer. • ...
NEMR Cross word 2024-07-10
Across
- Go to www._____.net for your internet needs!
- A source is probably not reputable if it has _____ words or grammar mistakes.
- Check to see if your information is coming from a reputable _____.
- Cyber criminal.
- Fake news sources often have low numbers of _____.
- Don't visit _____ you don't recognize.
- Trust your _____! If something feels suspicious it probably is.
- Never click on misspelled or suspicious looking _____.
Down
- Software that protects against viruses.
- Don't accept _____ from people you don't know.
- Fake news posts often have a low number of _____.
- Check with 3rd party _____ checkers like PolitiFact or SNOPES if you aren't sure.
- Fraudulent messages that appear to come from a reputable source, usually through email, with the goal of stealing sensitive data or installing malware on a device.
- Security system that blocks malicious internet traffic.
- Social media accounts automated in mass to spread fake information and news.
15 Clues: Cyber criminal. • Don't visit _____ you don't recognize. • Software that protects against viruses. • Go to www._____.net for your internet needs! • Don't accept _____ from people you don't know. • Fake news posts often have a low number of _____. • Fake news sources often have low numbers of _____. • Never click on misspelled or suspicious looking _____. • ...
CROSSWORD 2025-11-12
4 Clues: Place Where Students Learn • Security Digital Defense System • Technology Backbone Of Digital World • Intelligence Technology Simulating Human intelligence
Harry Hardware of the Internet 2023-03-06
Across
- the Company who supplies your broadband connection
- converts URLs into IP addresses
- a network of computers all contained within one location
- a category of malicious cyber-attacks that hackers or hackers use in order to make an online service unavailable
- a computer program or device that provides a service to another computer program and its user
Down
- the fastest part of the internet which connects very powerful servers together using high-speed, high-bandwidth connections.
- an electronic device for storing and processing data
- a network security device that monitors and filters incoming and outgoing network traffica network security device that monitors and filters incoming and outgoing network traffic
- the number of instructions per second the computer executes
- a mode of computer data storage in which digital data is stored on servers in off-site locations
- a unit of data storage capacity that is roughly equivalent to 1 billion bytes
- the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device
12 Clues: converts URLs into IP addresses • the Company who supplies your broadband connection • an electronic device for storing and processing data • a network of computers all contained within one location • the number of instructions per second the computer executes • a unit of data storage capacity that is roughly equivalent to 1 billion bytes • ...
Cybersecurity Awareness Month - Acronym Edition 2022-10-07
Across
- An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
- A system turns domain names into IP addresses
- A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
- Also called a "black cloud"
Down
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
- A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
- A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
- Provide outsourced monitoring and management of security devices and systems
8 Clues: Also called a "black cloud" • A system turns domain names into IP addresses • Provide outsourced monitoring and management of security devices and systems • A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online • ...
Functionality and Performance of an Network System 2024-08-08
Across
- Measures and protocols are implemented to protect a network from unauthorised access and cyber threats.
- The system that translates user-friendly domain names into IP addresses that computers use to identify each other.
- The maximum data transfer rate of a network connection, determining how much data can flow through at once.
- The system of assigning unique numerical labels to devices on a network for identification and communication.
- The ability of a network to grow and handle increased demand without performance degradation.
- The time delay between sending and receiving data across a network.
- The actual rate at which data is successfully transmitted over a network.
- The percentage of time a network is operational and accessible to users.
- A secure connection over the internet that encrypts data.
- A small unit of data transmitted over a network, containing both the data itself and control information like destination address.
Down
- The likelihood of a network performing its functions without failure over time.
- A network protocol that automatically assigns IP addresses to devices on a network.
- Establish rules or standards determining how data is transmitted over a network.
- A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- The inclusion of backup elements in a network to maintain service if a component fails.
15 Clues: A secure connection over the internet that encrypts data. • The time delay between sending and receiving data across a network. • The percentage of time a network is operational and accessible to users. • The actual rate at which data is successfully transmitted over a network. • The likelihood of a network performing its functions without failure over time. • ...
Final activity #1 2024-11-21
Across
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- An action or event that has the potential to compromise and/or violate
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- is a state of well-being of information and infrastructures.
- An individual who breaks into computer systems to steal, change, or destroy information.
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- ensuring that the information/data can be accessed only by those authorized
- ensuring that the information is accessible to authorized persons when required without delay
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
- the identification and assurance of the origin of information.
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- Any action derived from intelligent threats to violate the security of the
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- A defined method of breaching the security of an IT system through vulnerability.
20 Clues: is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • Any action derived from intelligent threats to violate the security of the • ensuring that the information/data can be accessed only by those authorized • ...
Cyber Bullying 2021-04-26
Across
- 1 in 5 _____ young people have reported being cyber bullied.
- (3words)A support line for kids, the phone number is: 1800 55 1800.
- True or false: You can go to the police if the cyber bullying is bad enough
- Cyberbullying is using ______ as a platform to bully and hurt people.
- bullying online is easier because then they can remain _____.
Down
- Cyber bullying can effect someone mentally, emotionally and ______.
- If you see a post that is harmful you can block or _____ the post in question
- Trisha Prabhu designed this app to prevent cyber bullying.
- This organisation defines cyber bullying as a form of bullying through digital technology.
9 Clues: Trisha Prabhu designed this app to prevent cyber bullying. • 1 in 5 _____ young people have reported being cyber bullied. • bullying online is easier because then they can remain _____. • Cyber bullying can effect someone mentally, emotionally and ______. • (3words)A support line for kids, the phone number is: 1800 55 1800. • ...
Security 2013-06-27
Across
- What is the name of the contractor company for security?
- Stick to what path when in the freight yard?
- Who must you radio to have the vehicle booth gates opened/closed?
- Who has the final say when allowing freight to enter the yard?
- What lights must be on when in the freight yard?
- What is Angela’s title other than Manager?
- What colour should drivers follow in the freight yard on the way in?
Down
- What must a non MSIC holder have whilst in the LRZ?
- What need must you have to request an MSIC?
- Your MSIC must be above what?
- What must you display in the LRZ?
- What does the T stand for in OTS?
- What type of industry are we in?
- Who takes passengers on/off via the buggy?
- A non MSIC holder must also have what for access into the LRZ?
- What is your base channel when receiving radio calls?
16 Clues: Your MSIC must be above what? • What type of industry are we in? • What must you display in the LRZ? • What does the T stand for in OTS? • Who takes passengers on/off via the buggy? • What is Angela’s title other than Manager? • What need must you have to request an MSIC? • Stick to what path when in the freight yard? • What lights must be on when in the freight yard? • ...
Security 2015-07-17
Across
- Relationship of the sights, trajectory, and the impact of a bullet.
- An authorized Safeguards User responsible for the Generation, Storage, and Destruction of SGI.
- safely and efficiently generating _____ for the long term.
- Equipment to protect yourself
- Independent Spent Fuel Storage Installation
- Protected Area Security Expansion
- Concrete block barriers.
- multiple integrated laser engagement system
Down
- Nuclear ________
- A barrier earthen or otherwise
- An area encompassed by physical barriers to which access is controlled per 10 CFR 73.55.
- An oversight or review/verification of activities conducted by a second individual.
- Firearms, explosives, incendiary devices, etc.
- The NRC comes has a _______ inspection of our NSD.
- Badge allows short-term, escorted access to the Protected/Vital areas
- Sallyport requires __ Members of the Security Force.
16 Clues: Nuclear ________ • Concrete block barriers. • Equipment to protect yourself • A barrier earthen or otherwise • Protected Area Security Expansion • Independent Spent Fuel Storage Installation • multiple integrated laser engagement system • Firearms, explosives, incendiary devices, etc. • The NRC comes has a _______ inspection of our NSD. • ...
Cyber-Security Awareness 2024-05-22
Across
- Regularly changing this can help maintain security
- Malicious software that replicates itself and spreads to other devices
- A technique used to separate a network into smaller parts to enhance security
Down
- Software designed to protect against viruses
- Unauthorized intrusion into a computer or network
- An unexpected or malicious email that appears legitimate
6 Clues: Software designed to protect against viruses • Unauthorized intrusion into a computer or network • Regularly changing this can help maintain security • An unexpected or malicious email that appears legitimate • Malicious software that replicates itself and spreads to other devices • A technique used to separate a network into smaller parts to enhance security
Cyber Security Quiz 2023-02-03
Across
- I'm a button on the keyboard, but sometimes astronauts visit me
- Machine used for processing information
Down
- The computer is sick
- Needed by the computer to protect valuable data, just as the bank needs it to protect its money.
- I am not the alphabet but I am filled with letters
- I'm a rat on the computer, and I like to play with the cursor.
6 Clues: The computer is sick • Machine used for processing information • I am not the alphabet but I am filled with letters • I'm a rat on the computer, and I like to play with the cursor. • I'm a button on the keyboard, but sometimes astronauts visit me • Needed by the computer to protect valuable data, just as the bank needs it to protect its money.
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
Redalert ICS CTF 2019-07-23
Across
- This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
- This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
- May sometime be known as Industroyer
- Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
- This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
- A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
- This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
- The world’s most murderous malware
- A network security measure employed on one or more computers to physically isolated from another network.
- This malware was reported to be involved with the 2015 cyber attacks in Ukraine
- A RAT targeting the ICS industry by the hacking group Dragonfly
- This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
12 Clues: The world’s most murderous malware • May sometime be known as Industroyer • A RAT targeting the ICS industry by the hacking group Dragonfly • This malware was reported to be involved with the 2015 cyber attacks in Ukraine • This is an attack on bluetooth connections which allows for complete takeover of targeted devices. • ...
Digital Crossword 4 2022-12-12
Across
- this security company is ranked top 10 in cyber security
- this is the meaning for HP computers
- the acronym means Uniform Resource Locators
- This program is through Google and replaces Microsoft PowerPoint
- The distance between each line
- an integrated circuit (IC) intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers)
Down
- It is described as the size and also style of this writing
- it is the format used in Williams's class to set up essays
- a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
- this tab will move your text from left, middle, and right
- this is the capital of big technology companies in the United States
- Universal Serial Bus
- any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
- this is used instead of Microsoft Word because it saves in real time
- (High Definition Multimedia Interface) is a specification that combines video and audio into a single digital interface for use with digital versatile disc (DVD) players, digital television (DTV) players, set-top boxes, and other audiovisual devices
15 Clues: Universal Serial Bus • The distance between each line • this is the meaning for HP computers • the acronym means Uniform Resource Locators • this security company is ranked top 10 in cyber security • this tab will move your text from left, middle, and right • It is described as the size and also style of this writing • ...
unit 26-28 Fekete Konor 2024-11-26
Across
- Devices that generate unique identifiers to ensure access to sensitive information.
- Software that enables financial transactions on a website, such as purchases.
- A type of cyber attack where an attacker sends fake emails or messages that appear to be from a legitimate source, in an attempt to steal sensitive information.
- Individuals who try to obtain or steal software or game licenses through illegal means.
- A business model that combines traditional retail sales and online sales.
- The unauthorized use or distribution of copyrighted materials, such as music, movies, or software.
Down
- software that enables users to store and manage their payment information, such as credit card numbers and expiration dates.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A type of self-replicating software that can spread across a network without human intervention.
- A type of bad software that can cause harm to a computer or a network. Examples include viruses, trojans, and rootkits.
- The act of harassing or threatening someone online, often through social media or email.
- A unique number used by banks to identify transactions.
- A personal identification number used for bank cards or other security systems.
- A protocol that enables secure communication between websites and users.
- Software that monitors a computer's data transmission and collects sensitive information.
15 Clues: A unique number used by banks to identify transactions. • A protocol that enables secure communication between websites and users. • A business model that combines traditional retail sales and online sales. • Software that enables financial transactions on a website, such as purchases. • ...
Cyber Crossword #1 2024-03-28
Across
- Any device that connects to the corporate network. Types of devices include laptops, phones, servers, switches, printers, etc.
- Any potential danger to information or systems.
- A system for collecting, saving, processing, and presenting data by means of a computer. This term is generally used when referring to a component of software that can be executed.
- Weakness in system security procedures, design, implementation, internal controls, etc., that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
Down
- An Identity and Access Management technology solution which ensures the security of information assets and continued identity governance and regulatory compliance for applications running on-premise or from the cloud.
- The practice of identifying and protecting assets in cyberspace: detecting, responding to and recovering from cyber risk events.
- The potential loss to an area due to the occurrence of an adverse event.
- Hostile or malicious software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other malicious programs. It can be in the form of executable code, scripts, active content and other software.
- The potential that events, expected or unanticipated, may have an adverse effect on a financial institution's earnings, capital, or reputation
- A passwordless, Multi-Factor Authentication (MFA) solution that provides the security of a token with the convenience of a smartphone. With this new solution, you’ll no longer need to memorize a password, allowing you to log in to your computer much faster and more securely.
- The physical components of an information system.
- A record of events occurring within an entity's systems and networks.
12 Clues: Any potential danger to information or systems. • The physical components of an information system. • A record of events occurring within an entity's systems and networks. • The potential loss to an area due to the occurrence of an adverse event. • ...
Cyber Ethics 2025-06-15
Across
- holds individuals accountable for their actions in cyberspace and promotes ethical decision-making.
- Areas of Cyber Ethics:
- Property:
- helps protect individuals and organizations from cyber threats like data breaches and identity theft.
- copyright laws, avoiding plagiarism, and not using or distributing copyrighted material without permission.
- Use of Technology:
- and Abuse:
- fosters a culture of respect and consideration for others in the online world.
- cyberbullying, harassment, stalking, and any form of online abuse.
Down
- measures to protect systems and data from unauthorized access, viruses, and cyber threats.
- ethics, also known as internet or digital ethics, refers to the moral principles that guide behavior in the online world. It encompasses a set of guidelines for responsible online conduct, promoting a safe and ethical cyberspace. Key aspects include respecting intellectual property, avoiding plagiarism, maintaining privacy, and refraining from harmful actions like cyberbullying or spreading viruses.
- ethics promotes a safer online environment by discouraging harmful behavior and encouraging responsible use of technology.
- technology in a way that is ethical, respectful, and considerate of others.
- personal information, avoiding unauthorized access to data, and respecting the privacy of others.
- is Cyber Ethics Important?
15 Clues: Property: • and Abuse: • Use of Technology: • Areas of Cyber Ethics: • is Cyber Ethics Important? • cyberbullying, harassment, stalking, and any form of online abuse. • technology in a way that is ethical, respectful, and considerate of others. • fosters a culture of respect and consideration for others in the online world. • ...
SeatWork #2 2025-09-06
Across
- The practice of protecting information, systems and assets from threats.
- A model where decision-making is spread across units.
- The detailed steps employees follow to apply a policy.
- Setting security objectives, identifying risks and allocating resources.
- The executive who leads and manages the organization’s security program.
- A model where one authority makes all security decisions.
- Making sure security strategies support business goals.
- Using third-party providers for services such as managed security.
- Directing and motivating teams to meet security objectives.
- A person who oversees IT systems and implements security measures.
Down
- Meeting mandatory laws, regulations and industry standards.
- A person who checks systems for compliance and weaknesses.
- Structuring people and resources to execute the security plan.
- The chance that a threat could harm systems, data or reputation.
- A high-level rule that states how an organization protects its information.
- A professional who monitors networks and investigates threats.
- The system of directing and controlling security decisions and accountability.
- A structured set of best practices and standards for managing security.
- A model combining centralized standards with local flexibility.
- Monitoring security performance and making improvements.
20 Clues: A model where decision-making is spread across units. • The detailed steps employees follow to apply a policy. • Making sure security strategies support business goals. • Monitoring security performance and making improvements. • A model where one authority makes all security decisions. • A person who checks systems for compliance and weaknesses. • ...
DTIN - Digital Security 2024-07-04
Across
- - Software that automatically displays or downloads advertising material when a user is online.
- - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
- - A standalone malware computer program that replicates itself to spread to other computers.
- - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
- - A method of trying to gather personal information using deceptive e-mails and websites.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The act of disguising a communication from an unknown source as being from a known, trusted source.
- - A person who uses computers to gain unauthorized access to data.
- - Malware that locks or encrypts data until a ransom is paid.
- - A network of private computers infected with malicious software and controlled as a group.
- - A type of surveillance technology used to record keystrokes.
- - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- - Statistical analysis of people's unique physical and behavioral characteristics.
- - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
- - Software that enables a user to obtain covert information about another's computer activities.
- - Data sent from a website and stored on a user's computer by the user's web browser.
- - A security process by which a list of permitted entities is created and defined as acceptable.
- - Criminal activities carried out by means of computers or the internet.
- - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A type of malware that is often disguised as legitimate software.
- - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- - Software designed to detect and destroy computer viruses.
- - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.
25 Clues: - Software designed to detect and destroy computer viruses. • - Malware that locks or encrypts data until a ransom is paid. • - A type of surveillance technology used to record keystrokes. • - A person who uses computers to gain unauthorized access to data. • - A type of malware that is often disguised as legitimate software. • ...
uli311 a 2018-11-15
20 Clues: oy • af • ceza • işlev • bütçe • bölge • rapor • siber • endişe • başkan • oydaşma • hoşgörü • kamusal • öncelik • başkent • müttefik • reddetmek • hukuk, yasa • kabul etmek • müzakere etmek
Cyber Security Awareness 2024-09-16
Across
- A type of malicious software
- A sequence of characters used to verify the identity of a user
- The process of converting information into a secure format
- Unauthorized access to a network or system
- A secure, encrypted connection over the internet
Down
- The process of converting information into a secure format
- Fraudulent emails attempting to obtain sensitive information
7 Clues: A type of malicious software • Unauthorized access to a network or system • A secure, encrypted connection over the internet • The process of converting information into a secure format • The process of converting information into a secure format • Fraudulent emails attempting to obtain sensitive information • ...
Cyber Security Vocabulary 2025-02-13
Across
- A set of rules that ensure secure communication and data exchange over a network.
- Measures taken to safeguard passwords from unauthorized access.
- Unauthorized access to confidential information.
Down
- The method of converting information into a secure format to prevent unauthorized access.
- The process of verifying the identity of a user or system.
- A security system that monitors and controls incoming and outgoing network traffic.
6 Clues: Unauthorized access to confidential information. • The process of verifying the identity of a user or system. • Measures taken to safeguard passwords from unauthorized access. • A set of rules that ensure secure communication and data exchange over a network. • A security system that monitors and controls incoming and outgoing network traffic. • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
ST10050768's NWEG5122 Crossword 2023-08-30
Across
- Topology where all computing devices are connected with a single cable
- converting information into secret code to hide information
- network device that is used to segment the networks into different subnetworks called subnets or LAN segments
- Measuring by quality rather than quantity
- component that allows network device to move data to the system's memory reducing CPU usage
- Device that forwards data packets from one network to another
- protecting computer networks from cyber threats is called network ...
- Amount of data that moves across a network during any given time
- Delay in time taken for data to reach its destination
- rate of message delivery over a communication channel
- data can be stored in ...
Down
- Topology where all computing devices are connected to a central node
- capacity at which a network can transmit data
- Another word for Network Adapter(Abbreviation)
- Information translated into a form efficient for processing
- Measuring by quantity rather than quality
- Data divided into small segments
- Global network
- Time delay over a network connection
- Established set of rules that determines how data is sent
20 Clues: Global network • data can be stored in ... • Data divided into small segments • Time delay over a network connection • Measuring by quantity rather than quality • Measuring by quality rather than quantity • capacity at which a network can transmit data • Another word for Network Adapter(Abbreviation) • Delay in time taken for data to reach its destination • ...
CrossBits Prelims 2024-09-17
Across
- , Jack Ma is one of it's Founders
- , What is the term for a type of cyber- attack that uses fake emails?
- , The Open-Source Revolution
- , The Cloud Storage Solution for Businesses
- , The Power of Artificial Intelligence
- , Transforming the World Through Technology
- , This platform allows people to share and upload videos
- , "Don't be evil"
- , This platform was originally known as 'Picaboo' before rebranding
- , What is the term for a network security system that monitors traffic?
- , The AI Platform for Businesses
- , Buy it. Sell it. Love it.
Down
- , "Inspiring Innovation"
- , This Payment company was spun off from eBay in 2015
- , The Company that created the populor social media platform "TikTok"
- , This tech company's name references the highest frequency in the electromagnetic spectrum
- , the world's ideas are shared in under 18 minutes
- , The Ultimate Productivity Tool
- , do the smart thing
- , Jerry and David's Giude to the World Wide Web
- , Originally started as an online DVD rental service before shifting to streaming
- , A PC sales unit founded by Liu Chuanzhi
22 Clues: , "Don't be evil" • , do the smart thing • , "Inspiring Innovation" • , Buy it. Sell it. Love it. • , The Open-Source Revolution • , The Ultimate Productivity Tool • , The AI Platform for Businesses • , Jack Ma is one of it's Founders • , The Power of Artificial Intelligence • , A PC sales unit founded by Liu Chuanzhi • , The Cloud Storage Solution for Businesses • ...
RU ITEC411: Professional Ethics and Responsibilities 2022-11-23
Across
- a set of principles that help guide professionals
- an advertisement that is given to a specific group or person
- cameras used to broadcast live data over the internet
- activities that help apply an individuals knowledge with an industry
- programs and data used by a computer source
- an institute with the goal of advancing technology for society
- the quality of being honest
- a rule or a restriction
- helps to protect any original work
Down
- a demand viewed by workers to perform their work within a certain time
- the process of dealing with a group of people or things
- the act of reporting any wrong doing as an employee
- process of protecting any systems and networks from cyber attacks
- a phase of software testing where the audience tries out a product
- principles that help guide a persons behavior
- an individual with an interest or concern with a topic
- human data that is processed by machines
- process of evaluating a product or an application
- the act of describing a precise requirement
- general rules or principles
20 Clues: a rule or a restriction • general rules or principles • the quality of being honest • helps to protect any original work • human data that is processed by machines • programs and data used by a computer source • the act of describing a precise requirement • principles that help guide a persons behavior • a set of principles that help guide professionals • ...
Edasiõppimine ja karjäär 2020-09-28
Across
- Alussüsteem, mis aitab erinevaid rakendusi käivitada
- ...tee- annab võimaluse ennast proovile panna valdkonna eksperdina ja juhina. Ametid ja kandideerimist saab uurida erinevats töövahetusportaalides nagu CV Online, CV Keskus ja teised.
- Cyber Security Network (CyberSN) asutaja(perekonnanimi)
- Austraalia internetiaktivist ja ajakirjanik, WikiLeaksi asutaja ja peatoimetaja
- Tegeleb süsteemide ja teenuste administreerimise ja parendamisega
- Tegeleb koodianalüüsi ja skriptide automatiseerimisega. Oskab turvaliselt programmeerida
- Maailma esimese arvutiviiruse looja(perekonnanimi)
- Kaks korda aastas toimuv küberkaitse võistlus Eestis
- Tegeleb šifrite loomise ja lahendamisega erineval tasemetel
- Küberpähkel toimub kahes kuus-oktoober ja ...
- Programm, äpp teisiti
Down
- Need, kes saadavad korda head
- Küberturbes oluline faktor
- Küberturbes oluline faktor
- Need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil ehk kui näiteks turvavea avastamisel on võimalik selle eest saada ka kasu, siis kindlasti nad selle ka välja võtavad.
- ...juht - Peab olema kursis riskidega, mis ohustavad ettevõtte edukalt toimimist ja kasu toomist
16 Clues: Programm, äpp teisiti • Küberturbes oluline faktor • Küberturbes oluline faktor • Need, kes saadavad korda head • Küberpähkel toimub kahes kuus-oktoober ja ... • Maailma esimese arvutiviiruse looja(perekonnanimi) • Alussüsteem, mis aitab erinevaid rakendusi käivitada • Kaks korda aastas toimuv küberkaitse võistlus Eestis • ...
Ethical Hacking CrossWord Puzzle by Megaa M 2025-10-30
Across
- Character string, often protected by hashing, required for system entry
- Malicious actor breaching security for personal gain or disruption
- Simulating covert and authorized intrusions to assess system fortitude
- Multi-layered process confirming user legitimacy within a secure environment
- Systematic flaw that adversaries actively seek to compromise
Down
- Distributed technique that overwhelms network resources, halting normal activity
- Psychological manipulation of individuals to divulge confidential details
- Deceptive social engineering tactic exploiting user trust to harvest credentials
- Hidden digital threat capable of data exfiltration or destruction upon execution
- Tool for scanning networks and discovering open ports
- Professional hacker conducting authorized assessments to bolster cyber defenses
- powerful framework used for developing,testing and exploits
- Malicious software masquerading as useful program to infiltrate the system
- Acts as a barricade, filtering suspicious packets from entering trusted zones
- Uses complex algorithms to render sensitive data unreadable to unauthorized eyes
15 Clues: Tool for scanning networks and discovering open ports • powerful framework used for developing,testing and exploits • Systematic flaw that adversaries actively seek to compromise • Malicious actor breaching security for personal gain or disruption • Simulating covert and authorized intrusions to assess system fortitude • ...
Cyber Security Month 2023-09-29
Across
- Malicious software that demands a ransom
- Protection against unauthorized access
Down
- set of rules governing the exchange or transmission of data in a computer network
- Verifying the identity of a user or system
- Trickery to obtain sensitive information
- technique that involves deciphering a code or encryption system
6 Clues: Protection against unauthorized access • Malicious software that demands a ransom • Trickery to obtain sensitive information • Verifying the identity of a user or system • technique that involves deciphering a code or encryption system • set of rules governing the exchange or transmission of data in a computer network
ASW - Passion 2022-08-15
Across
- Passion fuels your...
- At ASW, we are also passionated about sustainability and committed to give back to our global community. Our sustainability approach is marked by 4 pillars: our community, our people, our customers and our
- We are passionated about our jobs at A.S. Watson. We put our heart and soul in our jobs. We hope to radiate this passion to future talent and we see the passion with current colleagues. We have a colleague within GIT Europe, who works at our department since 28-02-1977! Who is it?
Down
- Working hard on something we don’t care about is Stress but working on something we truly LOVE is...
- We want to be a better company every day. Our passion lies in acceleration. ASW is determined to stay winning and to continue to lead in innovating customer experience. To stay ahead, we need to continuesly keep learning and improving ourselves. Therefore, we offer you short and snappy trainings within our Be More platform, hosted by colleagues from within the teams. How do we call these short trainings?
- Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company?
- Do you know why this year is marked as the Year of Passion? Passion is one of the 5 DNAs of ASW, and it’s always listed as the first one. The other DNAs are: commitment, teamwork, science, and?
- We are also passionately protecting our technology! The Cyber Security team has got assistance from their new Cyber Hero. This Hero on four legs will help all our colleagues to become aware about Cyber Security. What’s the dog’s name?
8 Clues: Passion fuels your... • Working hard on something we don’t care about is Stress but working on something we truly LOVE is... • Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company? • ...
security 2015-10-27
Across
- a situation when a plane or other vehicle is illegally taken under control
- small balls of ice that fall like rain from the sky.
- there is a danger that something unpleasant might be done
- a level of quality or achievement, especially a level that is thought to be acceptable.
- how far or how clearly you can see in particular weather conditions.
- help which gets someone out of a dangerous or unpleasant situation.
- An unexpected and difficult or dangerous situation
- Something that could be dangerous to you, your health or safety
- bad weather, with heavy rain, strong winds, and often thunder and lightning.
- the state of being safe from harm or danger.
Down
- It occurs when a moving object crashes into something.
- A change of a course or a destination.
- Something that turns your attention away from something
- something unpleasant happens causing injury or death.
- An inclined track for loading and unloading
- measures are taken to protect a place, or to restrict entering without permission
16 Clues: A change of a course or a destination. • An inclined track for loading and unloading • the state of being safe from harm or danger. • An unexpected and difficult or dangerous situation • small balls of ice that fall like rain from the sky. • something unpleasant happens causing injury or death. • It occurs when a moving object crashes into something. • ...
Technology Some would say that improving technology has made our lives easier. 2022-05-12
Across
- the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- Cyber bullying
- are market, government; cost and competition
- a person or situation which poses a possible threat to the security of something.
- High birth rate countries
- Some would say this would make our lives easier.
Down
- Greater population
- More job opportunities
- composition is changing at every level of society.
- the industrialization of society meant that there was no longer a need for large families to produce enough manual labor to run a farm.
10 Clues: Cyber bullying • Greater population • More job opportunities • High birth rate countries • are market, government; cost and competition • Some would say this would make our lives easier. • composition is changing at every level of society. • a person or situation which poses a possible threat to the security of something. • ...
cybersecurity 2025-03-06
Across
- A cyber attack that tricks people into revealing personal information via fake emails or websites.
- Malicious software that secretly gathers user information.
- Software designed to harm or exploit computer systems.
- A type of malware that disguises itself as legitimate software.
- A secret combination of characters used to access a system.
- A type of malware that locks files and demands payment for decryption.
Down
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a secure code to prevent unauthorized access.
- Software that detects and removes malicious programs.
- A person who gains unauthorized access to computer systems.
10 Clues: Software that detects and removes malicious programs. • Software designed to harm or exploit computer systems. • Malicious software that secretly gathers user information. • A person who gains unauthorized access to computer systems. • A secret combination of characters used to access a system. • A type of malware that disguises itself as legitimate software. • ...
OT InfoSec 2024 2024-09-30
Across
- MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
- A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
- A ROUTINE FIX FOR A COMPUTER PROGRAM.
- THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
- FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
- A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
- YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
- THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
- A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
- THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
- THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
- I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
- A SELF-REPLICATING MALICIOUS PROGRAM.
- AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
- A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
- ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
- I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
- THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
- UNAUTHORIZED USER WITH MALICIOUS INTENT.
- WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
- THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
- A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
- CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
- THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
- A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
- I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
- CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
- ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
- A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).
33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM. • A SELF-REPLICATING MALICIOUS PROGRAM. • UNAUTHORIZED USER WITH MALICIOUS INTENT. • YUBIKEY IS AN EXAMPLE OF A HARDWARE _______ • THE VAST UNDERBELLY OF THE INTERNET (2 WORDS). • THE POTENTIAL FOR LOSING VALUABLE INFORMATION. • MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE. • ...
Cybersecurity by Hazel 2025-05-07
Across
- the process of identifying and fixing vulnerabilities on a system.
- The smallest unit of information storage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
- A list of entities that are considered trustworthy and are granted access or privileges.
- Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
- Whom someone or what something is.
- the process of protecting electrical devices and networks from attacks.
Down
- A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
- A term to describe connecting multiple separate networks together.
- The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
- An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
- A list of entities that are blocked or denied privileges.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
- A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
- A cryptographic algorithm for encryption and decryption.
- A connection between two devices.
- A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
19 Clues: A connection between two devices. • Whom someone or what something is. • The smallest unit of information storage. • A cryptographic algorithm for encryption and decryption. • A list of entities that are blocked or denied privileges. • the process of identifying and fixing vulnerabilities on a system. • ...
Edasiõppimine ja kärjäär 2023-01-31
Across
- on endine vene häkker, kes pettis välja passi ja pankade võltsingutega.
- on tegelased, kellel on pigem kurjad motiivid ja neid kardetakse, sest nende eesmärgiks on ainult omakasu ja pahanduste tegemine teistele.
- arvutite omavahel võrgustikuks (nt Internet)
- infoturbe juht Xeroxis
- on USA küberturbe uurija.
- ja ennast veebipettuste, ohtude ning küberkiusamise eest.
- õpilane rakendab ohutus- ja turvameetmeid, et vältida füüsilisi ning virtuaalseid riske
Down
- Cyber Security Network (CyberSN) asjutaja.
- õpilane arvestab digitegevustes teiste inimeste privaatsust ja ühiseid kasutustingimusi ning kaitseb oma
- erinevad programmid, äpid, millega kasutaja otseselt kokku puutub.
- on need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil
- õpilane väldib digitehnoloogia ja digitaalse teabe kasutamisest tulenevaid terviseriske
- tundtud nime all kui DynamicWebPaige
- on need, kes saadavad korda head. Nende eesmärgiks on leida süsteemist turvavigu ja nendest teada anda või neid parandada.
- kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale
15 Clues: infoturbe juht Xeroxis • on USA küberturbe uurija. • tundtud nime all kui DynamicWebPaige • Cyber Security Network (CyberSN) asjutaja. • arvutite omavahel võrgustikuks (nt Internet) • ja ennast veebipettuste, ohtude ning küberkiusamise eest. • kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale • ...
CPL 6 2023-01-03
Across
- Default value of the position property(CSS)
- superglobal variable holds information about headers, paths, and script locations(PHP)
- operator is used to select values within a given range(SQL)
- plugin is used to cycle through elements, like a slideshow(Boostrap)
- keyword is used to import a package from the Java API library(Java)
- AWS Migration Strategy(AWS Cloud)
Down
- Input type defines a slider control(HTML)
- statement used to select one of many code blocks to be executed(C)
- What tool does React use to compile JSX(React)
- statement is used to stop a loop(Python)
- Falsifying data, making something appear different than they really are (Cyber Security)
- 'special' class that represents a group of constants(C#)
- Event occurs when the user clicks on an HTML element(Javascript)
- transaction used to import SAP-provided support packages into your system(SAP)
- API that allows navigation through objects(XML)
15 Clues: AWS Migration Strategy(AWS Cloud) • statement is used to stop a loop(Python) • Input type defines a slider control(HTML) • Default value of the position property(CSS) • What tool does React use to compile JSX(React) • API that allows navigation through objects(XML) • 'special' class that represents a group of constants(C#) • ...
Mesleki İngilizce I Final 2019-01-10
20 Clues: af • oy • ceza • rapor • bütçe • işlev • siber • bölge • endişe • başkan • kamusal • oydaşma • hoşgörü • öncelik • başkent • müttefik • reddetmek • kabul etmek • hukuk, yasa • müzakere etmek
cyber wellness crossword challenge 2013-06-04
Across
- Cyber bulling is using the_______ or phone to repeatedly say rude and hurtful things about a person.
- Do not scold others online, always be ________.
- When you get cyber bullied do not ______________ or reply.
- when we are cyber bullied, save the ___________ as we need it for further investigation.
- ____ is to flood other’s email with unimportant information.
- Do not use _______________ online because it may hurts others.
Down
- cyber ____________ is saying hurtful things online to a person.
- we need to be ______________ for your words and action online as we should take ownership of our behavior.
- Do not __________bad and hurtful things online.
- Always be ________ when you are using internet.
10 Clues: Do not scold others online, always be ________. • Do not __________bad and hurtful things online. • Always be ________ when you are using internet. • When you get cyber bullied do not ______________ or reply. • ____ is to flood other’s email with unimportant information. • Do not use _______________ online because it may hurts others. • ...
CTF-CW-20 2025-11-15
Across
- When your security team comes with an external logo
- When hackers turn computers into their own remote-control zombie army!
- That missing shingle hackers march right through
- The “one key” for all your digital doors
- Fake data so realistic, even AI gets catfished.
- Digital “naughty” list
- “We’ll take our chances” - signed management
- Playing tag with your problems
- Gossipy details your files spill when you aren’t looking—take two!
- The cyber squirm that keeps on moving
Down
- The business progress postcard
- Not getting in unless you BOTH know and show
- Slice of time between project pit stops
- The chess moves hackers (and defenders) use to outsmart each other in cyberspace.
- All the coding action at Tekion stops here first!
- At Tekion, this keeps our audits painless and our paperwork stress-free—compliance on autopilot!
- No, your doctor can’t tweet your health check thanks to this law.
- Where digital detectives go to play connect-the-dots after an incident.
- Turning “password” into an uncrackable puzzle
- Only the bold try redhunt at Tekion—it’s like laser tag for devs!
20 Clues: Digital “naughty” list • The business progress postcard • Playing tag with your problems • The cyber squirm that keeps on moving • Slice of time between project pit stops • The “one key” for all your digital doors • Not getting in unless you BOTH know and show • “We’ll take our chances” - signed management • Turning “password” into an uncrackable puzzle • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
CISO Crossword Quiz - 0824 2024-06-25
Across
- Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
- A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
- A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
- Unauthorised access to data by exploiting a weakness in the IT system
- An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
Down
- Process of verifying a user identity before granting access
- The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
- An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
- A software developed by hackers to steal data and damage or destroy computer systems
- Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
- A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
- Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
12 Clues: Process of verifying a user identity before granting access • Unauthorised access to data by exploiting a weakness in the IT system • Phishing Techniques used to target CEO,CFO etc. (Top executives of a company) • A software developed by hackers to steal data and damage or destroy computer systems • ...
Operations Security 2025-04-16
Across
- OPSEC is a systematic _____________.
- Who is responsible for OPSEC?
- Friendly detectable actions that can derive sensitive information.
- Condition that exists when we are susceptible, and adversaries can collect our critical information.
- Replaced the SSN on ID Cards to protect personal information.
- Third number of the Army's Operations Security Regulation.
- Last name of USAG FCCO OPSEC manager (alternate).
Down
- Last name of USAG FCCO OPSEC manager (primary).
- Month originally designated for Operations Security awareness.
- Number of steps identified in the Operations Security cycle.
- Designated color usually associated with Operations Security.
- Has overall ownership of USAG FCCO Operations Security Program.
- First number of the Army's Operations Security Regulation.
- Official mascot for Operations Security.
- This term is used in Operations Security instead of enemy.
- Commander's list of unclassified sensitive information to protect.
- Directive that established OPSEC as a national security program.
- Second number of the Army's Operations Security Regulation.
- Acronym for Operations Security.
- New official designated month for National Operations Security awareness.
20 Clues: Who is responsible for OPSEC? • Acronym for Operations Security. • OPSEC is a systematic _____________. • Official mascot for Operations Security. • Last name of USAG FCCO OPSEC manager (primary). • Last name of USAG FCCO OPSEC manager (alternate). • First number of the Army's Operations Security Regulation. • This term is used in Operations Security instead of enemy. • ...
Cyber Threats & Security 2026-01-19
Across
- ILLEGAL ENTRY INTO A COMPUTER SYSTEM
- A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
- THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
- THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
- THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
- TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM
6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEM • A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL • TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM • THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES • ...
FITAVocab.ss 2013-05-15
Across
- blank work space
- ex: Angry Birds
- credit
- uses 1s and 0s to transmit info
- optical, mechanical, touch pad
- ex: Comcast
- internet
- behavior online
- accessible on any computer
- pamphlet
- a saying or group of words representing a business, store, etc.
- circuit board
- ex: Dogpile and Mamma
- a promise new presidents take
- an arrangement, how it looks
Down
- 1000 megabytes
- CPU, how fast it is
- flash drive plugin
- ex: Google and Bing
- the arrangement of data
- 1000 bytes
- similar to powerpoint
- gaming ports
- an image representing a business, store, etc.
- security/protection online
- to make sure no one takes/copies your work
- a character
- 1000 gigabytes
- ex: phone
- a formal introduction into office
- RAM
- safety online
- headphone plugin
- flash drive
- DSL, Cable
- who, what, why
- a port to plug in an internet cable
- ex: mouse and keyboard
- mobile storage
- 1000 kilobytes
- online
- 3G and 4G are options
- pre-made document to fill in
- ex: printer
- 8 bits
45 Clues: RAM • credit • online • 8 bits • internet • pamphlet • ex: phone • 1000 bytes • DSL, Cable • a character • ex: Comcast • flash drive • ex: printer • gaming ports • safety online • circuit board • 1000 megabytes • 1000 gigabytes • who, what, why • mobile storage • 1000 kilobytes • ex: Angry Birds • behavior online • blank work space • headphone plugin • flash drive plugin • CPU, how fast it is • ex: Google and Bing • ...
TTS INFORMATIKA 2025-04-10
Across
- seru Simbol yang digunakan untuk mencari frasa persis.
- Konten negatif yang menyebar kebencian antar golongan.
- Salah satu tanda konten tidak valid adalah tidak adanya __ terpercaya
- Media digital yang menyajikan data secara visual.
- Informasi palsu yang sering viral di internet.
- Gabungan antara ilmu data dan kecerdasan buatan.
- Lembaga resmi yang mengatur HAKI di Indonesia.
- Operator untuk membatasi pencarian hanya dalam satu situs.
- Lembaga pemerintah yang menangani regulasi internet di Indonesia.
- Simbol dagang milik perusahaan.
- Hak atas ciptaan seperti musik, buku, dan film.
- security Ahli dalam menjaga keamanan sistem digital.
- Orang yang membuat program komputer.
- Hak khusus yang dimiliki pencipta atas karya mereka
Down
- minus Operator untuk mengecualikan kata dalam pencarian.
- Profesi yang menganalisis data untuk mengambil keputusan.
- Proses memastikan keaslian dan kebenaran informasi.
- Bahasa, adat, dan pakaian tradisional adalah contoh dari __ budaya.
- Cerita rakyat yang bisa diangkat menjadi konten digital.
- Profesi yang merancang tampilan antarmuka aplikasi.
- Proses penyebaran konten ke berbagai platform.
- Mesin pencari paling populer di dunia.
- Kata logika untuk mencari dua kata sekaligus.
- Bentuk seni budaya berupa gerakan tubuh yang ritmis.
- Hak atas penemuan atau inovasi teknologi.
25 Clues: Simbol dagang milik perusahaan. • Orang yang membuat program komputer. • Mesin pencari paling populer di dunia. • Hak atas penemuan atau inovasi teknologi. • Kata logika untuk mencari dua kata sekaligus. • Informasi palsu yang sering viral di internet. • Proses penyebaran konten ke berbagai platform. • Lembaga resmi yang mengatur HAKI di Indonesia. • ...
EVOLUÇÃO INDUSTRIAL 2024-01-21
Across
- Tipo de produção aplicada na montagem do Ford-T em 1870
- Compartilha de forma segura o espaço de trabalho entre operadores.
- Recria cópia tridimensional de peças e protótipos
- Identifica tendências e recomendações para otimização dos processos
- Custo na Industria 4.0
- Cloud Computing
- Tecnologia óptica
- Tecnologia que proporcionou um leve aumento de produção em 1784
- Energia que ocasionou a 2ª Revolução Industrial
- Tipo de demanda que ocasionou a 4ª Revolução Industrial
- Produtividade na Industria 4.0
Down
- Analisa os dados e planeja a manutenção para evitar paradas inesperadas
- Fábrica no ambiente digital para otimizar a concepção de uma estrutura de produção.
- Fornece informações adaptadas ao contexto mesclados ao seu campo de visão.
- Trabalhos realizados em 1784
- Possibilita obter informações sobre o ciclo de vida do produto desde a criação ao descarte
- Security Medidas físicas e lógicas de segurança usada para proteger a grandes estruturas de ameaças
- Controlador Lógico Programável
- Sistema que combina tecnologia cibernética, mecânica e eletrônica
- Tipo de manufatura na Industria 4.0
- Conectividade dos dispositivos no chão de fábrica diretamente na internet
21 Clues: Cloud Computing • Tecnologia óptica • Custo na Industria 4.0 • Trabalhos realizados em 1784 • Controlador Lógico Programável • Produtividade na Industria 4.0 • Tipo de manufatura na Industria 4.0 • Energia que ocasionou a 2ª Revolução Industrial • Recria cópia tridimensional de peças e protótipos • Tipo de produção aplicada na montagem do Ford-T em 1870 • ...
CISO Crossword Quiz - 0824 2024-06-25
Across
- Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
- A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
- A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
- A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
- An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
- The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
- Process of verifying a user identity before granting access
Down
- Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
- A software developed by hackers to steal data and damage or destroy computer systems
- An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
- Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
- Unauthorised access to data by exploiting a weakness in the IT system
12 Clues: Process of verifying a user identity before granting access • Unauthorised access to data by exploiting a weakness in the IT system • Phishing Techniques used to target CEO,CFO etc. (Top executives of a company) • A software developed by hackers to steal data and damage or destroy computer systems • ...
CISO Crossword Quiz-0223 2023-02-10
Across
- A client computer program that can retrieve and display information from servers on the World Wide Web.
- A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
- A network of computers infected by malware that are controled by a single attacker.
- The encrypted text transformed from plaintext using an encryption algorithm.
- Cyber Attack in which hackers use the computing power of a compromised device to mine cryptocurrency.
- The process of decoding cipher text to plain text so that it is readable by humans.
Down
- A software which bombards users with endless malicious ads and pop-up windows or redirect to other website
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites.
- A collection of malicious software tools that allow hackers to remotely access and control a computer or network.
- A controlled and safe environment set up as a decoy/trap to lure cyber attackers & study their hacking attempts
- A computer malware that can reproduce itself and spreads copies to other computers in the network.
- A piece of data from the website you visited, stored within the web browser that the website can retrieve at a later time.
12 Clues: The encrypted text transformed from plaintext using an encryption algorithm. • A network of computers infected by malware that are controled by a single attacker. • The process of decoding cipher text to plain text so that it is readable by humans. • A computer malware that can reproduce itself and spreads copies to other computers in the network. • ...
Tugas - Jaringan Komputer dan Internet 2024-01-11
Across
- Jaringan yang mencakup wilayah kecil
- Nama lain yang memiliki arti Pertukaran Data Elektronik
- ... anchor kustom: Menyesuaikan Certificate Authority (CA) mana yang dipercaya untuk koneksi aman suatu aplikasi.
- Salah satu komponen jaringan komputer
- Pada jaringan komputer, berbagi sumber daya atau ... seharusnya dapat dilakukan tanpa terkendala jarak.
- Tata kelola secara historis telah digunakan untuk mengunci data dalam
Down
- Salah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna
- Guna menentukan bagaimana langkah sebuah perusahaan atau organisasi dalam merespons insiden dunia maya atau peristiwa lain yang menyebabkan hilangnya data atau terganggunya kegiatan operasional, digunakan salah satu jenis cyber security yakni?
- Lapisan pertama pada model OSI
- Topologi yang disebut topologi cincin
10 Clues: Lapisan pertama pada model OSI • Jaringan yang mencakup wilayah kecil • Topologi yang disebut topologi cincin • Salah satu komponen jaringan komputer • Nama lain yang memiliki arti Pertukaran Data Elektronik • Tata kelola secara historis telah digunakan untuk mengunci data dalam • Salah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna • ...
Jaringan komputer dan internet 2024-01-12
Across
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya .
- perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumberdaya satusama lain.
- berkaitan dengan aspek yang menentukan kualitas dari sistem informasi
- berasal dari dua kata dalam bahasa Inggris yakni cyber yang artinya dunia maya (internet) dan security yang artinya keamanan
- transmisi data terstruktur antar organisasi secara elektronis.
Down
- metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis.
- ada 7 lapisan
- memungkinkan aplikasi menyesuaikan setelan keamanan jaringannya dalam file konfigurasi deklaratif yang aman tanpa memodifikasi kode aplikasi.
- Open Systems Interconnection
- salah satu Perangkat Koneksi
10 Clues: ada 7 lapisan • Open Systems Interconnection • salah satu Perangkat Koneksi • transmisi data terstruktur antar organisasi secara elektronis. • berkaitan dengan aspek yang menentukan kualitas dari sistem informasi • metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya . • ...
English for IT - Units 5 and 6 Vocabulary Revision 2023-08-07
Across
- Business-to-business: companies exchange information and make transactions.
- Online shopping is really __________. You don’t need to go anywhere, you can shop from home.
- __________ networks have a limited range.
- After the customer puts the items in the __________ cart, he/she checks the order.
- Customers can use their credit cards, PayPal or electronic cheques to pay for __________.
Down
- A __________ modulates and demodulates the data into a signal.
- __________ is the maximum throughput of data in bits per second.
- The LAN allows you to share information __________ users.
- We are developing new website __________ features. We will have a VPN with a firewall which will help stop cyber attacks.
- Local area network
10 Clues: Local area network • __________ networks have a limited range. • The LAN allows you to share information __________ users. • A __________ modulates and demodulates the data into a signal. • __________ is the maximum throughput of data in bits per second. • Business-to-business: companies exchange information and make transactions. • ...
LMS&NM 2023 2023-12-06
Across
- What does the ‘T’ stand for in DT&A
- Who joined the Insights team in November? (HINT 2 words ed8)
- It is ? Indigenous Australian cultural awareness training must be completed by 31 December
- What book did Deborah Robinson enjoy reading? (HINT 2 words ed5)
Down
- Which month does Commissioner Jordan AO retire?
- The GPFS team undertook detailed analysis of what patterns (HINT ed8)
- What game has been developed to demonstrate unscrupulous infiltration? (HINT 2 words)
- What month was Cyber Security Awareness?
- What does Kym Myall drive as a hobby (HINT ed2)
- The New Measures team added what well attended program to their portfolio (HINT ed8)
10 Clues: What does the ‘T’ stand for in DT&A • What month was Cyber Security Awareness? • Which month does Commissioner Jordan AO retire? • What does Kym Myall drive as a hobby (HINT ed2) • Who joined the Insights team in November? (HINT 2 words ed8) • What book did Deborah Robinson enjoy reading? (HINT 2 words ed5) • ...
Belmont Banner crossword 2016-06-22
Across
- What company supported the landbuggy project?
- What sort of light display is used for the microbit?
- University What university did the cyber security event take place in?
- did Mr Watson sign up to get housepoints?
- Where did the Wider Acheivement year award?
- What English teacher is retiring this year?
- What is the name of the Knex challenge?
- Reid What maths teacher is retiring this year?
- What did the new first year's say that they are looking forward to in Belmont?
- long did the sports day cycle last for?
- lunch day is windband?
- Who won the Scottish Schools young Writer of the year award?
Down
- did the domestic abuse talk in the assembly?
- What Pupil Support Teacher is retiring this year?
- are STEM emphasising this year?
- What are the senior stem pupils working on?
- lunch day is windband?
- What is the name of the main male lead character in the Little Shop Of Horror School show?
18 Clues: lunch day is windband? • lunch day is windband? • are STEM emphasising this year? • What is the name of the Knex challenge? • long did the sports day cycle last for? • did Mr Watson sign up to get housepoints? • What are the senior stem pupils working on? • Where did the Wider Acheivement year award? • What English teacher is retiring this year? • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Social media / cyber security / digital literacy 2025-07-09
Across
- Information about yourself online; often found on your account
- Symbol used to group topics on social media
- Connection to the internet without wires
- What you do to stop someone from contacting you online
- A strong word or phrase used to keep your accounts secure
- A person who tries to cheat others online
- Protection system that blocks unauthorized access
- A form of online abuse or harassment
Down
- Settings that control who sees your content online
- Misleading or untrue content shared to deceive people
- A criminal who tries to steal or break into digital systems
- Unwanted messages often sent to your inbox
- A name or handle you use to log into digital accounts
- A short word or icon that shows emotion in messages
- A person who posts hurtful or misleading comments online
15 Clues: A form of online abuse or harassment • Connection to the internet without wires • A person who tries to cheat others online • Unwanted messages often sent to your inbox • Symbol used to group topics on social media • Protection system that blocks unauthorized access • Settings that control who sees your content online • ...
BTEC DIT C3B - Cyber Security 2025-03-07
Across
- A method of authentication that uses parts of the body for identification
- Malware that encrypts a computer system until a fee is paid
- A reason for attacking a system purely to cause downtime
- When a user is directed to a phoney/spoof website where their personal details will be collected
- The act of tricking a person to voluntarily giving personal details / money
Down
- When a security system has been attacked/compromised
- Prevents unwanted internet traffic from entering a digital system or network
- Spying on other companies
- Device ______________ : a range of measures to make a system less vulnerable to attack
- A threat coming from outside an organisation
- A threat coming from inside an organisation
11 Clues: Spying on other companies • A threat coming from inside an organisation • A threat coming from outside an organisation • When a security system has been attacked/compromised • A reason for attacking a system purely to cause downtime • Malware that encrypts a computer system until a fee is paid • ...
Unifi EHSS Summer Security 2023-07-17
Across
- Something that holds you to the rules
- Follow closely behind someone through a door
- Do this when badge not displayed/displayed properly
- Report to those who need to know
- Deliberately misrepresenting something
- Airport Operations Area
- TSA Aircraft Operators Standard Security Program
- Access granted
Down
- Protected against unauthorized access
- Make sure accurate name and photo of pax
- Transportation Security Administration
- Keep Safe From
- Used to keep your login secure
- Ground Security Coordinator
- Security Identification Area
- Completed before first departure of the day
- Security technique to regulate resources
- Sensitive Security Information
- Intended to deceive others
- Imposed from breaking security protocol
20 Clues: Keep Safe From • Access granted • Airport Operations Area • Intended to deceive others • Ground Security Coordinator • Security Identification Area • Used to keep your login secure • Sensitive Security Information • Report to those who need to know • Protected against unauthorized access • Something that holds you to the rules • Transportation Security Administration • ...
Identity Theft Statistics 2014-07-22
Across
- The most common form of cyber identity theft.
- The average loss per identity theft incident (in thousands) per consumer.
- This race of people have their identities stolen the most by cyber thieves.
- This age group is victimized the most when it comes to cyber identity theft.
- Accounts Cyber thieves use card skimmers to steal pin numbers to access these.
Down
- This is the average number of identity theft victims in the U.S. annually.
- Dakota This state, home to Mt. Rushmore has the lowest identity theft complaint rate.
- This state has the second highest identity theft complaint rate.
- This U.S. Southwestern state has the highest identity theft complaint rate.
- The percentage of U.S. households that report some type of identity theft.
- Total financial loss (in billions) attributed to identity theft.
11 Clues: The most common form of cyber identity theft. • This state has the second highest identity theft complaint rate. • Total financial loss (in billions) attributed to identity theft. • The average loss per identity theft incident (in thousands) per consumer. • This is the average number of identity theft victims in the U.S. annually. • ...
Malware 2023-04-18
Across
- Makes changes to files that are native to the OS
- Infects mobile devices.
- Monitors users' keystrokes
- a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- Disable victim's access to data until ransom is paid
- serves unwanted advertisements
- an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders
- Spreads through a network by replicating itself.
- Disguises itself as desirable code
Down
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- Gives hackers remote control of a victim's device.
- a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- Collects user activity data without their knowledge
- Erases user data beyond recoverability.
- an online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online currency known as cryptocurrencies
- a Trojan that is designed to gather information from a system
- software designed to interfere with a computer's normal functioning,
- a robust cyber security solution that adds an extra layer of security to your computer to protect against cyberattacks.
- an automated malware program that can infect a system, steal data, or commit other fraudulent activities.
20 Clues: Infects mobile devices. • Monitors users' keystrokes • serves unwanted advertisements • Disguises itself as desirable code • Erases user data beyond recoverability. • Makes changes to files that are native to the OS • Spreads through a network by replicating itself. • Gives hackers remote control of a victim's device. • Collects user activity data without their knowledge • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
U8 Technical Areas 2025-04-07
Across
- The app is only compatible with the latest ---- system.
- Please check the product ---- before shipping it to the customer.
- A ---- message appeared to warn about low storage space.
- The app has a user-friendly ---- that is easy to navigate.
- Our team uses an online ---- to manage customer orders.
- The factory increased its production ---- to meet higher demand.
- Please enter the ---- number to activate your software.
- Customers love the ---- features on our website, such as live chat and product demos.
- Click the email ---- on your screen to open your inbox.
- The office uses a ---- printer that connects to all computers.
- New employees must ---- themselves with the company’s software system.
Down
- You need to ---- the software to fix security bugs.
- Please check the ---- to see the status of the delivery system.
- During the meeting, everyone used their ---- to take notes and share documents.
- Please read the instruction ---- before installing the new device.
- It's time to ---- our office equipment to keep up with the latest technology.
- The ---- industry has grown rapidly due to the increase in online shopping.
- We use ---- equipment to ensure the best quality.
- The company hired a ---- security expert to protect customer data.
- The product was tested in the company’s research ---- before launch.
- We are now using the latest ---- of the accounting software.
- The ---- received funding from several investors to develop its new app.
- The ---- fixed the printer within 30 minutes.
- A stable internet ---- is required for video meetings.
24 Clues: The ---- fixed the printer within 30 minutes. • We use ---- equipment to ensure the best quality. • You need to ---- the software to fix security bugs. • A stable internet ---- is required for video meetings. • The app is only compatible with the latest ---- system. • Our team uses an online ---- to manage customer orders. • ...
Belmont Banner Crossword 2016-06-22
Across
- What is the name of the Knex challenge?
- What lunch day is windband?
- Who did the domestic abuse talk in the assembly?
- What English teacher is retiring this year?
- What company supported the landbuggy project?
- How long did the sports day cycle last for?
- What sort of light display is used for the microbit?
- What are the senior stem pupils working on?
- Who won the Scottish Schools young Writer of the year award?
- Where did the Wider Acheivement year award?
Down
- What are STEM emphasising this year?
- What did Mr Watson sign up to get housepoints?
- What university did the cyber security event take place in?
- What is the name of the main male lead character in the Little Shop Of Horror School show?
- What lunch day is windband?
- What did the new first year's say that they are looking forward to in Belmont?
- Reid What maths teacher is retiring this year?
- What Pupil Support Teacher is retiring this year?
18 Clues: What lunch day is windband? • What lunch day is windband? • What are STEM emphasising this year? • What is the name of the Knex challenge? • What English teacher is retiring this year? • How long did the sports day cycle last for? • What are the senior stem pupils working on? • Where did the Wider Acheivement year award? • What company supported the landbuggy project? • ...
CyberBullying 2017-06-19
Across
- A person that makes you feel unsafe?
- Cyber bullying is
- Cyber bullying can happen
- Cyberbullying can lead to what?
- Where does cyber bullying take place?
Down
- Bullies name call because they are
- What should you do when a bully message you?
- When bullying happens at home who do you tell?
- When bullying happens at school who do you tell?
- You should always make sure your online presence is?
10 Clues: Cyber bullying is • Cyber bullying can happen • Cyberbullying can lead to what? • Bullies name call because they are • A person that makes you feel unsafe? • Where does cyber bullying take place? • What should you do when a bully message you? • When bullying happens at home who do you tell? • When bullying happens at school who do you tell? • ...
2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06
Across
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- Something you should never share with another person.
- The month in which National Cyber Security Awareness Month occurs.
- When someone follows a person into a secured area without proper credentials.
- Links with catchy titles that lure users into opening them.
- Malware that replicates itself, so it can spread to infiltrate other computers.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- Don’t download these unless you know and have confirmed the sender.
- Kids and parents should be aware of these online bullies.
- Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Down
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
- Someone who violates computer security for malicious reasons, kudos, or personal gain.
- A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
- A type of malware that locks your computer until you pay to have it unlocked.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door.”
- Stop. ____. Connect.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A technique used by hackers to obtain sensitive information.
- You should check these regularly.
- The acronym for the month of cybersecurity awareness events.
- Acronym for Protected Health Information.
- When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A personal identification number commonly associated with an ATM.
- Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
24 Clues: Stop. ____. Connect. • You should check these regularly. • Acronym for Protected Health Information. • Something you should never share with another person. • Kids and parents should be aware of these online bullies. • Links with catchy titles that lure users into opening them. • A technique used by hackers to obtain sensitive information. • ...
Awesome Privacy Week '25 2025-01-27
Across
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- Malicious software designed to harm or exploit computers and networks.
- A European Union law that regulates data protection and privacy.
- A tool that encrypts internet connections to enhance privacy.
- A U.S. law that gives California residents rights over their personal data.
- The practice of protecting systems, networks, and programs from digital attacks.
- Publishing private or identifying information about someone online without consent.
- AI-generated media that mimics real people and can be used for deception.
- Small files stored on a user’s browser to track online activities.
- A tool used to record every keystroke typed on a keyboard.
- A browser feature that prevents storing history, cookies, and site data.
- The act of removing or disguising personal identifiers from datasets.
- A key document that explains how an individual's data is stored, used, and shared.
Down
- The process of removing personal identifiers from datasets.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- Software vulnerability unknown to developers and exploited by hackers.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- Theft Fraudulent use of someone's personal data to commit crimes.
- Unauthorized access or damage to computer systems and networks.
- Data that describes and gives information about other data.
- Malicious software that locks users out of their data until a ransom is paid.
23 Clues: Malicious software that secretly gathers user information. • A tool used to record every keystroke typed on a keyboard. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
tecnologia y ciencia #1 2023-02-08
Across
- losmediossociales
- bullying elciberacoso
- program elprogramadecomputacion
- elenlace
- elcorrectorortografico
- lainteligenciaartificial
- lared
- losauriculares
- lacontrasena
- arroba
Down
- lacamara digital
- elciberespacio
- elnombredeusuario
- elaltavozinteligente
- address ladireccionelectronica
- laherramienta
- elmensaje
- elmensajedetexto
- lacomputadoraportatil
- science lainformatica
20 Clues: lared • arroba • elenlace • elmensaje • lacontrasena • laherramienta • elciberespacio • losauriculares • lacamara digital • elmensajedetexto • losmediossociales • elnombredeusuario • elaltavozinteligente • bullying elciberacoso • lacomputadoraportatil • science lainformatica • elcorrectorortografico • lainteligenciaartificial • address ladireccionelectronica • program elprogramadecomputacion
Cyber Congress Slangs Crossword 2021-06-09
Across
- I miss our canteen’s bullet rolls. No CAP.
- DAE feel like everyday’s the same?
- TIL a lot of internet slangs.
- I don’t usually talk to my IRL friends.
- Anyone who shares NSFW content will be removed from the group chat.
- WIP dude, we’re still promoting the cyber congress.
- Please don’t disturb me. I’m going AFK.
Down
- IIRC you mentioned that you’re busy this weekend
- The ship is sending out an SOS signal!
- INB4 Mumbai Indians wins this year’s IPL.
- Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime’ refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer. Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime. TLDR:- cyber crime exists in varied forms.
- I don’t understand how thermodynamics work. Can you ELI5?
- Hi! I’m your human search engine. You can ask me AMA.
13 Clues: TIL a lot of internet slangs. • DAE feel like everyday’s the same? • The ship is sending out an SOS signal! • I don’t usually talk to my IRL friends. • Please don’t disturb me. I’m going AFK. • INB4 Mumbai Indians wins this year’s IPL. • I miss our canteen’s bullet rolls. No CAP. • IIRC you mentioned that you’re busy this weekend • ...
CSE167 Terminology 2022-04-27
Across
- 2 Words A technique used to manipulate and deceive people in the real world to gain sensitive and private information.
- 2 Words. an act that sought to curb unsolicited commercial emails
- a cyber attack used to obtain information like passwords and bank info.
- 2 Words. An attack that is done over an online format.
- Any weakness in an asset or security protection which would allow for a threat to cause harm.
- things that can protect your defense points (methods)
- 2 Words. attacker tries to crack the password by submitting various combinations until the correct one is found
- A form of cyber attack that floods a service with malicious traffic or data to shut it down
- A form of malware that monitors user activities and reports them to an external party.
- From the CIA triad: Information kept private and secure
- 2 Words. key points which should be identified to protect
- A collection of computers with malware that allows a hacker to run software used for illegal purposes.
- A copy of the system or networks data for file restoration or archival purposes
- Study of secure communication technics in the presence of third parties
Down
- a set of programs that tell a computer to perform a task
- A malicious application or script that can be used to take advantage of a vulnerability
- From the CIA triad: Data not modified (deleted or added)
- Possibility of suffering loss. Areas include financial, legal, strategic, and security.
- 4 Words A type of attack where an attacker secretly intercepts and possibly alters the communications between two parties.
- 3 Words. A game in which keys are intentionally hidden within vulnerable programs or websites.
- a tool that allows users to remain anonymous on the internet
- 2 Words. A program that helps users and businesses securely store and manage their login credentials.
- 2 Words. Attackers try to gain authentication by cracking the password hash. And they do it by using a list of pre-computed hashes of possible password combinations.
- the attacker systematically enters every word in the dictionary to crack the password
- Decentralized naming system used to associate domain names with other forms of information.
- A form of malware that focuses on replication and distribution.
- 2 Words. your public key can be used to send encrypted messages which other people can decrypt with the key
- From the CIA triad: Record the identities and activities
28 Clues: things that can protect your defense points (methods) • 2 Words. An attack that is done over an online format. • From the CIA triad: Information kept private and secure • a set of programs that tell a computer to perform a task • From the CIA triad: Data not modified (deleted or added) • From the CIA triad: Record the identities and activities • ...
Cybersecurity 2024-02-21
Across
- Find hidden messages or attacks within innocent-looking files.
- Malware that collects information about you
- A wall or partition designed to inhibit or prevent the spread of fire.
- Manifestation signifying hostile intention, the plan to cause harm.
- The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
- Malware that blocks access and demands ransom
- A cyber security professional who deal with testing vulnerabilities to help owners of application or website
- A type of malware that is often masked as genuine software
- Improve or correct by inserting a patch. It's a synonym of update
9 Clues: Malware that collects information about you • Malware that blocks access and demands ransom • A type of malware that is often masked as genuine software • Find hidden messages or attacks within innocent-looking files. • Improve or correct by inserting a patch. It's a synonym of update • Manifestation signifying hostile intention, the plan to cause harm. • ...
40. 2021-03-19
Across
- Police force heading west, and east, take great risks
- Cellphone info collected by the NSA, per the Snowden documents
- PALACE Nickname for the National Security Agency
- Security office array
- Bear from Orient taken out of Lake Ontario (5)
- Stud poker poets play out with the Northern Iraqi (4)
- Refugees from the East taken by 50 states (7)
- Old Northern Iraqi in Middle East taken in backing National Security Agency (8)
- Commander in NSA outfit taking time off in Asian city (8)
- Rifles National Security Agency kept in shelves (8)
- National security concern
Down
- Swindler from East taken in by gossip (5)
- The headquarters of the US National Security Agency is located in Maryland's Fort ...
- Security agency trainee holds up no mere ritual act (10)
- NSA invasions
- Assault prompting inapt reaction in old northern street
- The FSB is this country's main security agency (6)
- Arizona, then some old Northern Isles, leaving North Dakota to climb height in Italy
- National Security Agency
- Security agency of the Soviet Union from 1954-91 (3)
20 Clues: NSA invasions • Security office array • National Security Agency • National security concern • Swindler from East taken in by gossip (5) • Refugees from the East taken by 50 states (7) • Bear from Orient taken out of Lake Ontario (5) • PALACE Nickname for the National Security Agency • The FSB is this country's main security agency (6) • ...
Lions Clubs Projects Match 2023-01-16
Across
- Admin sports team fundraiser
- San Mateo Lions Club
- Bay Area Global Outreach Lions Club, Burlingame LC
- Millbrae, San Bruno, Foster City LC
- SSF Golden Gate Lions Club
- Half Moon Bay LC
- Foster City Lions Club, Redwood Sunrise LC
- SF Geneva-Excelsior Lions Club
- Peninsula Veterans, Bay Area Global Outreach LC
Down
- SF Premier, SF Host, Peninsula Special Interest LC
- Silicon Vally Cyber Lions Club
- Foster City Bair Island Cyber Lions Club
- Burlingame and Millbrae Lions Clubs
- SF Nikkei Lions Club
- San Bruno LC
- San Carlos LC
- Bay Area Special Olympics Lions Club
- SF Unified Lions Club or San Bruno Lions Club
18 Clues: San Bruno LC • San Carlos LC • Half Moon Bay LC • San Mateo Lions Club • SF Nikkei Lions Club • SSF Golden Gate Lions Club • Admin sports team fundraiser • Silicon Vally Cyber Lions Club • SF Geneva-Excelsior Lions Club • Burlingame and Millbrae Lions Clubs • Millbrae, San Bruno, Foster City LC • Bay Area Special Olympics Lions Club • Foster City Bair Island Cyber Lions Club • ...
Cyber Bullying 2017-12-11
8 Clues: our teacher • online bully • gucci gang... • cyber bullying is • authority that can help • the person getting cyber bullied • when you blackmail someone online • serious cases of cyber bullying is
DEFINITIONS of Cyber Security 2020-08-20
Across
- It's a trick that they do to decipher people's bank account passwords, etc.
- it's a program that removes viruses, etc, before they enter a device.
- it's information that web pages save to your computer, like your username,etc, but it doesn't reach a person with an unknown identity.
- It's malicious software that infiltrates your device without your knowing.
Down
- It's a software that colect information of the computers and gives it to an to an unknown identity without the owner of the computer noticing.
- is a system that prevents unauthorized access to a private network
- they are computer programs that want to alter your computer.
- it's an email not requested that people receive, usually it's advertising.
8 Clues: they are computer programs that want to alter your computer. • is a system that prevents unauthorized access to a private network • it's a program that removes viruses, etc, before they enter a device. • it's an email not requested that people receive, usually it's advertising. • It's malicious software that infiltrates your device without your knowing. • ...
2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06
Across
- to a computer through a “back door.”
- Acronym for Protected Health Information.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- Stop. ____. Connect.
- You should check these regularly.
- Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
- A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
- A piece of malware that often allows a hacker to gain remote
- A technique used by hackers to obtain sensitive information.
- The acronym for the month of cybersecurity awareness events.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- Something you should never share with another person.
- The month in which National Cyber Security Awareness Month occurs.
Down
- Links with catchy titles that lure users into opening them.
- Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
- Kids and parents should be aware of these online bullies.
- When someone follows a person into a secured area without proper credentials.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- Don’t download these unless you know and have confirmed the sender.
- A personal identification number commonly associated with an ATM.
- Malware that replicates itself, so it can spread to infiltrate other computers.
- A type of malware that locks your computer until you pay to have it unlocked.
- Someone who violates computer security for malicious reasons, kudos, or personal gain.
- When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
25 Clues: Stop. ____. Connect. • You should check these regularly. • to a computer through a “back door.” • Acronym for Protected Health Information. • Something you should never share with another person. • Kids and parents should be aware of these online bullies. • Links with catchy titles that lure users into opening them. • ...
Day 4 Cyber Security 2 Chapter 4 2025-10-13
Across
- The unauthorized transfer of data from a computer system.
- A weakness in a system that can be exploited by a threat.
- A hardware device or software program that stops network traffic based on a set of rules.
- A computer that is part of a botnet, controlled by an attacker.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- The practice of sending fraudulent emails that resemble emails from reputable sources to induce individuals to reveal personal information.
- The process of verifying the identity of a user.
- A unique identifier for a device on a network (abbreviation).
- A set of rules governing the exchange or transmission of data between devices.
- A secret word or phrase that must be used to gain admission to something.
- A program that appears to do one thing but actually does another, often malicious, thing. (2 words)
- Software that is intended to damage or disable computers and computer systems.
- A system that detects and prevents malicious activities on a network (abbreviation).
Down
- The 'A' in the CIA Triad, ensuring that systems and data are available to authorized users when needed.
- The act of deceiving someone into revealing sensitive information. (2 words)
- The process of making data unreadable to unauthorized users.
- The process of granting or denying approval to use specific resources.
- A type of attack that overwhelms a system with traffic, making it unavailable to users (abbreviation).
- A network security device that monitors and filters incoming and outgoing network traffic.
- A person who uses computers to gain unauthorized access to data.
- A type of malware that holds a victim's data for ransom.
- A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- Any circumstance or event with the potential to adversely impact organizational operations.
- Unsolicited bulk messages, especially advertising.
- A small piece of data sent from a website and stored on the user's computer by the web browser.
- The 'C' in the CIA Triad, ensuring data is not disclosed to unauthorized individuals.
- An attack that uses a massive number of computers to overwhelm a target system. (abbreviation)
27 Clues: The process of verifying the identity of a user. • Unsolicited bulk messages, especially advertising. • A type of malware that holds a victim's data for ransom. • The unauthorized transfer of data from a computer system. • A weakness in a system that can be exploited by a threat. • The process of making data unreadable to unauthorized users. • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- Protocol that is meant for uploading and downloading files.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- A computer program that keeps a log of your keystrokes on your keyboard.
- A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
Down
- a cyber attack intended to redirect a website's traffic to another, fake site.
- A bundle of programs that is designed to bombard users with advertisements.
- The process by which two information systems establish a communication channel.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
14 Clues: Protocol that is meant for uploading and downloading files. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • a cyber attack intended to redirect a website's traffic to another, fake site. • ...
Cyber-bullying 2012-02-07
Across
- Delete cyberbullying. Don’t write it. Don’t ______it.
- Although cyberbullies may think they are ________, they can be found.
- 81% of young people said that they cyber-bully because they think it’s ______.
- When an adult is involved, it may meet the definition of _______.
- You can also help prevent cyberbullying by _______ awareness of the cyberbullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents.
- Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of ________ in teens.
Down
- If you wouldn’t say it in _______, don’t say it online.
- Being a victim of cyberbullying can be a common and ________ experience.
- Sharing NCPC’s anti-cyberbullying ______ with friends.
- people By definition, cyber-bullying occurs among ______.
- Technologies that allows for delayed and permanent posting of communication social networking sites, i.e. (Facebook, Myspace)
- is the use of technology to harass, threaten, embarrass, or target another person
- Some teens feel ________ because they may not know who is cyberbullying them.
- You can also help prevent cyberbullying by speaking with other students, as well as teachers and school administrators, to develop _____ against cyberbullying.
- Considered “LIVE” bullying or technology that allows for real time such as chat rooms, instant messaging, and online gaming.
- Don’t forget that even though you can’t see a cyberbully or the bully’s victim, cyberbullying causes real _______.
16 Clues: Delete cyberbullying. Don’t write it. Don’t ______it. • Sharing NCPC’s anti-cyberbullying ______ with friends. • If you wouldn’t say it in _______, don’t say it online. • people By definition, cyber-bullying occurs among ______. • When an adult is involved, it may meet the definition of _______. • ...
Security 2017-02-13
Across
- To reduce potential loss, ____should be secure and kept to a minimum amount.
- Use this in the event of a cardiac medical emergency.
- This checklist should be next to every phone.
- All confidential information is locked up or placed in this bin.
- In thousands, this is the daily cash limit in a MSR top drawer.
- You should always ___ your computer when walking away.
- Before you enter the building, look for the ______signal.
- How many evacuation routes should you plan at each branch?
Down
- Branch Closed signs have other CWCU locations and the nearest _________.
- Masks and _____can be found in the emergency supply kit
- Acronym of how to use a fire extinguisher
- Form to fill out when you notice a Red Flag
- In an active shooter situation, this action is the last resort.
- This employee is the support Security Officer.
- In any emergency, ____is always the first priority.
15 Clues: Acronym of how to use a fire extinguisher • Form to fill out when you notice a Red Flag • This checklist should be next to every phone. • This employee is the support Security Officer. • In any emergency, ____is always the first priority. • Use this in the event of a cardiac medical emergency. • You should always ___ your computer when walking away. • ...
Cyber Security Month 2021 2021-09-16
Across
- The process of converting information or data into a code, especially to prevent unauthorized access
- After a network attack your data may be ____________
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Type of software that helps protect your computer against malware and cybercriminals
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
- What you maintain when you don't disclose information to unauthorized parties
- The practice of being diligent about your online activities
- A secret word or phrase that be used to gain access
8 Clues: A secret word or phrase that be used to gain access • After a network attack your data may be ____________ • The practice of being diligent about your online activities • What you maintain when you don't disclose information to unauthorized parties • Type of software that helps protect your computer against malware and cybercriminals • ...
Cyber Security Month 2021 2021-09-16
Across
- The process of converting information or data into a code, especially to prevent unauthorized access
- After a network attack your data may be ____________
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Type of software that helps protect your computer against malware and cybercriminals
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
- What you maintain when you don't disclose information to unauthorized parties
- Attacks that use email or malicious websites to infect your device
- A secret word or phrase that be used to gain access
8 Clues: A secret word or phrase that be used to gain access • After a network attack your data may be ____________ • Attacks that use email or malicious websites to infect your device • What you maintain when you don't disclose information to unauthorized parties • Type of software that helps protect your computer against malware and cybercriminals • ...
Teka Teki Cyber Security 2023-10-22
Across
- Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
- Jenis ancaman cyber yang paling sering ditemui yaitu
- Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
- Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
- Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
- Selalu update _______________ untuk mengatasi ancaman cyber.
- Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
- Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____
8 Clues: Jenis ancaman cyber yang paling sering ditemui yaitu • Selalu update _______________ untuk mengatasi ancaman cyber. • Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu • Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle. • ...
CYBER SECURITY CROSSWORD PUZZLE 2025-02-27
Across
- program that secretly records information from a user’s device (7 letters).
- process of confirming someone’s identity (13 letters).
- data to keep it secret from unauthorized access (10 letters).
Down
- type of attack that lures victims into revealing personal information (8 letters).
- that demands payment to restore access to data (10 letters).
- Horse^A malicious program disguised as legitimate (11 letters).
- isolated testing environment for untrusted code (8 letters).
- protective barrier between a network and potential threats (8 letters).
8 Clues: process of confirming someone’s identity (13 letters). • that demands payment to restore access to data (10 letters). • isolated testing environment for untrusted code (8 letters). • data to keep it secret from unauthorized access (10 letters). • Horse^A malicious program disguised as legitimate (11 letters). • ...
USAG FCCO OPSEC Crossword Puzzle 2025-05-29
Across
- Acronym for encryption on your Common Access Card (CAC).
- Directive that established OPSEC as a national security program.
- Acronym for Operations Security.
- Condition that exists when we are susceptible, and adversaries can collect our critical information.
- Official mascot for Operations Security.
- This term is used in Operations Security instead of enemy.
- Third number of the Army's Operations Security Regulation.
- Commander's list of unclassified sensitive information to protect.
- Number of steps identified in the Operations Security cycle.
- Month originally designated for Operations Security awareness.
- Second number of the Army's Operations Security Regulation.
Down
- Number Replaced the SSN on ID cars to protect personal information.
- Friendly detectable actions that can derive sensitive information.
- Designated color usually associated with Operations Security.
- Has overall ownership of USAG FCCO Operations Security Program.
- First number of the Army's Operations Security Regulation.
- OPSEC is a systematic _____________.
- Who is responsible for OPSEC?
- New official designated month for National Operations Security awareness.
19 Clues: Who is responsible for OPSEC? • Acronym for Operations Security. • OPSEC is a systematic _____________. • Official mascot for Operations Security. • Acronym for encryption on your Common Access Card (CAC). • First number of the Army's Operations Security Regulation. • This term is used in Operations Security instead of enemy. • ...
Unit 3 Cyber Security 2017-05-12
Across
- someone who doesn't have the technical expertise to create their own software so they use software or scripts created by someone else
- gaining access to computer systems,networks,data and programmes without permission
- data is available to those who need it, when they need it
- loss or theft of equipment
Down
- data is entered,amended,stored and deleted by those with authorisation
- intercepting data packets and identify suspicious traffic
- someone who uses a computer as either a tool and/or a target to commit a crime
- network or system attack by someone who has authorised access
8 Clues: loss or theft of equipment • intercepting data packets and identify suspicious traffic • data is available to those who need it, when they need it • network or system attack by someone who has authorised access • data is entered,amended,stored and deleted by those with authorisation • someone who uses a computer as either a tool and/or a target to commit a crime • ...
Cyber Security Crossword 1 2025-09-22
Across
- Part of the Internet hidden behind passwords
- Area of computer science concerned with keeping data safe
- A dishonest scheme designed to cheat someone out of money, property, or other valuable things
- Gaining access to data without permission
Down
- Type of fraud where someone pretends to be someone else.
- Part of the Internet where illegal activity occurs
- Part of the Internet accessible via search engines
- Tricking someone into giving up personal information, often via email.
8 Clues: Gaining access to data without permission • Part of the Internet hidden behind passwords • Part of the Internet where illegal activity occurs • Part of the Internet accessible via search engines • Type of fraud where someone pretends to be someone else. • Area of computer science concerned with keeping data safe • ...
Security 2013-06-26
Across
- A non MSIC holder must have a what for access into the LRZ?
- What is the L in LRZ?
- What does the T stand for in OTS?
- Stick to what path when in the freight yard?
- What colour should drivers follow in the freight yard on the way in?
- Who must you radio to have the gates opened/closed?
- What is the code number for a Firearm?
- What must you display in the LRZ?
Down
- Who takes passengers on/off via the buggy?
- What channel do you call for Security?
- What does the I stand for in MSIC?
- What lights must be on when in the freight yard?
- What must a non MSIC holder have whilst in the LRZ?
- What is Angela’s title other than Manager?
- What industry are we in?
15 Clues: What is the L in LRZ? • What industry are we in? • What does the T stand for in OTS? • What must you display in the LRZ? • What does the I stand for in MSIC? • What channel do you call for Security? • What is the code number for a Firearm? • Who takes passengers on/off via the buggy? • What is Angela’s title other than Manager? • Stick to what path when in the freight yard? • ...
Security 2013-06-26
Across
- What lights must be on when in the freight yard?
- Stick to what path when in the freight yard?
- Who must you radio to have the gates opened/closed?
- What industry are we in?
- Who takes passengers on/off via the buggy?
- What does the I stand for in MSIC?
- What channel do you call for Security?
- What colour should drivers follow in the freight yard on the way in?
Down
- A non MSIC holder must have a what for access into the LRZ?
- What is Angela’s title other than Manager?
- What does the T stand for in OTS?
- What must you display in the LRZ?
- What is the L in LRZ?
- What is the code number for a Firearm?
- What must a non MSIC holder have whilst in the LRZ?
15 Clues: What is the L in LRZ? • What industry are we in? • What does the T stand for in OTS? • What must you display in the LRZ? • What does the I stand for in MSIC? • What is the code number for a Firearm? • What channel do you call for Security? • What is Angela’s title other than Manager? • Who takes passengers on/off via the buggy? • Stick to what path when in the freight yard? • ...
Security 2023-01-04
Across
- any real or personal property
- A system where by territoriality reinforcement is established via barriers, access control, and surveillance
- Boundaries and property lines are marked
- observing areas
- considered the last line of defense to protect with financial compensation after a loss event
- maintaining boundaries by restricting access to an area
Down
- Offenses punishable by fines and/or confinement in the local jail for up to 1 year
- Identification of a threat at the earliest opportunity
- Prompt repair and cleaning of damage of graffiti
- Can destroy almost anything
- practice of discouraging an attempted attack to an asset
- Offenses punishable by confinement from 1 year to life or death
- Established by legislative statutes
- A written manual of an organization
- An incident likely to occur at a site due to a history of events or circumstances
15 Clues: observing areas • Can destroy almost anything • any real or personal property • Established by legislative statutes • A written manual of an organization • Boundaries and property lines are marked • Prompt repair and cleaning of damage of graffiti • Identification of a threat at the earliest opportunity • maintaining boundaries by restricting access to an area • ...
Cyber Ethics 2025-05-31
Across
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- The practice of taking someone else's work or ideas and passing them off as one's own.
- The act of installing a legal copy of software in contravention of its license agreement
- The process of converting encrypted data back into its original, readable form
Down
- Any criminal activity that involves a computer, network or networked device
- ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
- A type of malicious software (malware) that replicates itself and can cause damage to computer systems
- A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
- An illegal intrusion into a computer system
- A type of cyberattack where attackers deceive individuals into revealing sensitive information
- The etiquette or rules of polite and respectful online communication
- A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
- Unwanted bulk emails that come from unknown sources
- The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access
14 Clues: An illegal intrusion into a computer system • Unwanted bulk emails that come from unknown sources • The etiquette or rules of polite and respectful online communication • Any criminal activity that involves a computer, network or networked device • The process of converting encrypted data back into its original, readable form • ...
Cyber security and mass surveillance 2020-09-16
Across
- you should not just check identity, you should also confirm
- unauthorized use of computing resources to mine cryptocurrencies
- information security is not just a ___ issue
- information security officer
- what is the purpose behind mass surveillance?
Down
- this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
- someone who deplores cracking
- someone who breaks into another computer system
- when someone sends an e-mail with a link to a bogus website
- a malicious program that modifies itself when it replicates
- what is widely used for mass surveillance?
11 Clues: information security officer • someone who deplores cracking • what is widely used for mass surveillance? • information security is not just a ___ issue • what is the purpose behind mass surveillance? • someone who breaks into another computer system • you should not just check identity, you should also confirm • ...
Cyber security and mass surveillance 2020-09-16
Across
- you should not just check identity, you should also confirm
- unauthorized use of computing resources to mine cryptocurrencies
- information security is not just a ___ issue
- information security officer
- what is the purpose behind mass surveillance?
Down
- this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
- someone who deplores cracking
- someone who breaks into another computer system
- when someone sends an e-mail with a link to a bogus website
- a malicious program that modifies itself when it replicates
- what is widely used for mass surveillance?
11 Clues: information security officer • someone who deplores cracking • what is widely used for mass surveillance? • information security is not just a ___ issue • what is the purpose behind mass surveillance? • someone who breaks into another computer system • you should not just check identity, you should also confirm • ...
Makiyah Bundy- Bullying 2022-05-17
Across
- Pam pretends to be a girl named Jenny on Instagram what is this called?
- Chase gets bullied online. What type of bullying is this?
- What is it when your friend makes fun of you but you are laughing along with them?
- Nola gets bullied and Aiden sticks up for her. What is Aiden?
- Austin watches as Layla gets bullied. What does this make Austin?
- What type of cyber-bullying is it when you are getting left out of a call?
- What type of cyber-bullying is it when you are in a online argument using abusive/aggressive language?
Down
- What is the A in the ABCD's of Bullying?
- The C in the ABCD's of Bullying.
- What type of cyber-bullying is spreading gossip?
- Your friend and you have an argument, but you guys apologize and become friends again.What is this?
- A boy tells you he is going to beat you up after school. What kind of bullying is this?
- Pam pushes Ava down a flight of stairs. What type of bullying is this?
- Jenna is being really mean and hateful to Joseph. What does this make Jenna?
14 Clues: The C in the ABCD's of Bullying. • What is the A in the ABCD's of Bullying? • What type of cyber-bullying is spreading gossip? • Chase gets bullied online. What type of bullying is this? • Nola gets bullied and Aiden sticks up for her. What is Aiden? • Austin watches as Layla gets bullied. What does this make Austin? • ...
Phonetic crosswords 2022-06-20
22 Clues: ʃəʊ • bɔɪ • ʃuː • ʤɒb • seɪf • smɑːt • dɑːns • klɑːs • ˈgeɪmə • ˈklɛvə • ˈtiːʧə • ˈhɛlθi • ˈsaɪbə • ˈpjuːpl • ˈsəʊʃəbl • ˈreɪsɪzm • sɪt daʊn • ˈfjʊərɪəs • ɪnˈtɛlɪʤənt • ˈɪnstəˌgræm • ˈrəʊzə pɑːks • ˌsɛgrɪˈgeɪʃən
