cyber security Crossword Puzzles

CISO Crossword Quiz - 0824 2024-06-25

CISO Crossword Quiz - 0824 crossword puzzle
Across
  1. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  2. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
  3. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
  4. Unauthorised access to data by exploiting a weakness in the IT system
  5. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
Down
  1. Process of verifying a user identity before granting access
  2. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
  3. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  4. A software developed by hackers to steal data and damage or destroy computer systems
  5. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
  6. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
  7. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)

12 Clues: Process of verifying a user identity before granting accessUnauthorised access to data by exploiting a weakness in the IT systemPhishing Techniques used to target CEO,CFO etc. (Top executives of a company)A software developed by hackers to steal data and damage or destroy computer systems...

CTF-CW-20 2025-11-15

CTF-CW-20 crossword puzzle
Across
  1. When your security team comes with an external logo
  2. When hackers turn computers into their own remote-control zombie army!
  3. That missing shingle hackers march right through
  4. The “one key” for all your digital doors
  5. Fake data so realistic, even AI gets catfished.
  6. Digital “naughty” list
  7. “We’ll take our chances” - signed management
  8. Playing tag with your problems
  9. Gossipy details your files spill when you aren’t looking—take two!
  10. The cyber squirm that keeps on moving
Down
  1. The business progress postcard
  2. Not getting in unless you BOTH know and show
  3. Slice of time between project pit stops
  4. The chess moves hackers (and defenders) use to outsmart each other in cyberspace.
  5. All the coding action at Tekion stops here first!
  6. At Tekion, this keeps our audits painless and our paperwork stress-free—compliance on autopilot!
  7. No, your doctor can’t tweet your health check thanks to this law.
  8. Where digital detectives go to play connect-the-dots after an incident.
  9. Turning “password” into an uncrackable puzzle
  10. Only the bold try redhunt at Tekion—it’s like laser tag for devs!

20 Clues: Digital “naughty” listThe business progress postcardPlaying tag with your problemsThe cyber squirm that keeps on movingSlice of time between project pit stopsThe “one key” for all your digital doorsNot getting in unless you BOTH know and show“We’ll take our chances” - signed managementTurning “password” into an uncrackable puzzle...

cyber wellness crossword challenge 2013-06-04

cyber wellness crossword challenge crossword puzzle
Across
  1. Cyber bulling is using the_______ or phone to repeatedly say rude and hurtful things about a person.
  2. Do not scold others online, always be ________.
  3. When you get cyber bullied do not ______________ or reply.
  4. when we are cyber bullied, save the ___________ as we need it for further investigation.
  5. ____ is to flood other’s email with unimportant information.
  6. Do not use _______________ online because it may hurts others.
Down
  1. cyber ____________ is saying hurtful things online to a person.
  2. we need to be ______________ for your words and action online as we should take ownership of our behavior.
  3. Do not __________bad and hurtful things online.
  4. Always be ________ when you are using internet.

10 Clues: Do not scold others online, always be ________.Do not __________bad and hurtful things online.Always be ________ when you are using internet.When you get cyber bullied do not ______________ or reply.____ is to flood other’s email with unimportant information.Do not use _______________ online because it may hurts others....

FITAVocab.ss 2013-05-15

FITAVocab.ss crossword puzzle
Across
  1. blank work space
  2. ex: Angry Birds
  3. credit
  4. uses 1s and 0s to transmit info
  5. optical, mechanical, touch pad
  6. ex: Comcast
  7. internet
  8. behavior online
  9. accessible on any computer
  10. pamphlet
  11. a saying or group of words representing a business, store, etc.
  12. circuit board
  13. ex: Dogpile and Mamma
  14. a promise new presidents take
  15. an arrangement, how it looks
Down
  1. 1000 megabytes
  2. CPU, how fast it is
  3. flash drive plugin
  4. ex: Google and Bing
  5. the arrangement of data
  6. 1000 bytes
  7. similar to powerpoint
  8. gaming ports
  9. an image representing a business, store, etc.
  10. security/protection online
  11. to make sure no one takes/copies your work
  12. a character
  13. 1000 gigabytes
  14. ex: phone
  15. a formal introduction into office
  16. RAM
  17. safety online
  18. headphone plugin
  19. flash drive
  20. DSL, Cable
  21. who, what, why
  22. a port to plug in an internet cable
  23. ex: mouse and keyboard
  24. mobile storage
  25. 1000 kilobytes
  26. online
  27. 3G and 4G are options
  28. pre-made document to fill in
  29. ex: printer
  30. 8 bits

45 Clues: RAMcreditonline8 bitsinternetpamphletex: phone1000 bytesDSL, Cablea characterex: Comcastflash driveex: printergaming portssafety onlinecircuit board1000 megabytes1000 gigabyteswho, what, whymobile storage1000 kilobytesex: Angry Birdsbehavior onlineblank work spaceheadphone pluginflash drive pluginCPU, how fast it isex: Google and Bing...

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. seru Simbol yang digunakan untuk mencari frasa persis.
  2. Konten negatif yang menyebar kebencian antar golongan.
  3. Salah satu tanda konten tidak valid adalah tidak adanya __ terpercaya
  4. Media digital yang menyajikan data secara visual.
  5. Informasi palsu yang sering viral di internet.
  6. Gabungan antara ilmu data dan kecerdasan buatan.
  7. Lembaga resmi yang mengatur HAKI di Indonesia.
  8. Operator untuk membatasi pencarian hanya dalam satu situs.
  9. Lembaga pemerintah yang menangani regulasi internet di Indonesia.
  10. Simbol dagang milik perusahaan.
  11. Hak atas ciptaan seperti musik, buku, dan film.
  12. security Ahli dalam menjaga keamanan sistem digital.
  13. Orang yang membuat program komputer.
  14. Hak khusus yang dimiliki pencipta atas karya mereka
Down
  1. minus Operator untuk mengecualikan kata dalam pencarian.
  2. Profesi yang menganalisis data untuk mengambil keputusan.
  3. Proses memastikan keaslian dan kebenaran informasi.
  4. Bahasa, adat, dan pakaian tradisional adalah contoh dari __ budaya.
  5. Cerita rakyat yang bisa diangkat menjadi konten digital.
  6. Profesi yang merancang tampilan antarmuka aplikasi.
  7. Proses penyebaran konten ke berbagai platform.
  8. Mesin pencari paling populer di dunia.
  9. Kata logika untuk mencari dua kata sekaligus.
  10. Bentuk seni budaya berupa gerakan tubuh yang ritmis.
  11. Hak atas penemuan atau inovasi teknologi.

25 Clues: Simbol dagang milik perusahaan.Orang yang membuat program komputer.Mesin pencari paling populer di dunia.Hak atas penemuan atau inovasi teknologi.Kata logika untuk mencari dua kata sekaligus.Informasi palsu yang sering viral di internet.Proses penyebaran konten ke berbagai platform.Lembaga resmi yang mengatur HAKI di Indonesia....

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

EVOLUÇÃO INDUSTRIAL 2024-01-21

EVOLUÇÃO INDUSTRIAL crossword puzzle
Across
  1. Tipo de produção aplicada na montagem do Ford-T em 1870
  2. Compartilha de forma segura o espaço de trabalho entre operadores.
  3. Recria cópia tridimensional de peças e protótipos
  4. Identifica tendências e recomendações para otimização dos processos
  5. Custo na Industria 4.0
  6. Cloud Computing
  7. Tecnologia óptica
  8. Tecnologia que proporcionou um leve aumento de produção em 1784
  9. Energia que ocasionou a 2ª Revolução Industrial
  10. Tipo de demanda que ocasionou a 4ª Revolução Industrial
  11. Produtividade na Industria 4.0
Down
  1. Analisa os dados e planeja a manutenção para evitar paradas inesperadas
  2. Fábrica no ambiente digital para otimizar a concepção de uma estrutura de produção.
  3. Fornece informações adaptadas ao contexto mesclados ao seu campo de visão.
  4. Trabalhos realizados em 1784
  5. Possibilita obter informações sobre o ciclo de vida do produto desde a criação ao descarte
  6. Security Medidas físicas e lógicas de segurança usada para proteger a grandes estruturas de ameaças
  7. Controlador Lógico Programável
  8. Sistema que combina tecnologia cibernética, mecânica e eletrônica
  9. Tipo de manufatura na Industria 4.0
  10. Conectividade dos dispositivos no chão de fábrica diretamente na internet

21 Clues: Cloud ComputingTecnologia ópticaCusto na Industria 4.0Trabalhos realizados em 1784Controlador Lógico ProgramávelProdutividade na Industria 4.0Tipo de manufatura na Industria 4.0Energia que ocasionou a 2ª Revolução IndustrialRecria cópia tridimensional de peças e protótiposTipo de produção aplicada na montagem do Ford-T em 1870...

Tugas - Jaringan Komputer dan Internet 2024-01-11

Tugas - Jaringan Komputer dan Internet crossword puzzle
Across
  1. Jaringan yang mencakup wilayah kecil
  2. Nama lain yang memiliki arti Pertukaran Data Elektronik
  3. ... anchor kustom: Menyesuaikan Certificate Authority (CA) mana yang dipercaya untuk koneksi aman suatu aplikasi.
  4. Salah satu komponen jaringan komputer
  5. Pada jaringan komputer, berbagi sumber daya atau ... seharusnya dapat dilakukan tanpa terkendala jarak.
  6. Tata kelola secara historis telah digunakan untuk mengunci data dalam
Down
  1. Salah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna
  2. Guna menentukan bagaimana langkah sebuah perusahaan atau organisasi dalam merespons insiden dunia maya atau peristiwa lain yang menyebabkan hilangnya data atau terganggunya kegiatan operasional, digunakan salah satu jenis cyber security yakni?
  3. Lapisan pertama pada model OSI
  4. Topologi yang disebut topologi cincin

10 Clues: Lapisan pertama pada model OSIJaringan yang mencakup wilayah kecilTopologi yang disebut topologi cincinSalah satu komponen jaringan komputerNama lain yang memiliki arti Pertukaran Data ElektronikTata kelola secara historis telah digunakan untuk mengunci data dalamSalah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna...

Jaringan komputer dan internet 2024-01-12

Jaringan komputer dan internet crossword puzzle
Across
  1. metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya .
  2. perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumberdaya satusama lain.
  3. berkaitan dengan aspek yang menentukan kualitas dari sistem informasi
  4. berasal dari dua kata dalam bahasa Inggris yakni cyber yang artinya dunia maya (internet) dan security yang artinya keamanan
  5. transmisi data terstruktur antar organisasi secara elektronis.
Down
  1. metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis.
  2. ada 7 lapisan
  3. memungkinkan aplikasi menyesuaikan setelan keamanan jaringannya dalam file konfigurasi deklaratif yang aman tanpa memodifikasi kode aplikasi.
  4. Open Systems Interconnection
  5. salah satu Perangkat Koneksi

10 Clues: ada 7 lapisanOpen Systems Interconnectionsalah satu Perangkat Koneksitransmisi data terstruktur antar organisasi secara elektronis.berkaitan dengan aspek yang menentukan kualitas dari sistem informasimetode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya ....

CISO Crossword Quiz - 0824 2024-06-25

CISO Crossword Quiz - 0824 crossword puzzle
Across
  1. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
  2. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
  3. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
  4. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
  5. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  6. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
  7. Process of verifying a user identity before granting access
Down
  1. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  2. A software developed by hackers to steal data and damage or destroy computer systems
  3. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
  4. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
  5. Unauthorised access to data by exploiting a weakness in the IT system

12 Clues: Process of verifying a user identity before granting accessUnauthorised access to data by exploiting a weakness in the IT systemPhishing Techniques used to target CEO,CFO etc. (Top executives of a company)A software developed by hackers to steal data and damage or destroy computer systems...

CISO Crossword Quiz-0223 2023-02-10

CISO Crossword Quiz-0223 crossword puzzle
Across
  1. A client computer program that can retrieve and display information from servers on the World Wide Web.
  2. A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  3. A network of computers infected by malware that are controled by a single attacker.
  4. The encrypted text transformed from plaintext using an encryption algorithm.
  5. Cyber Attack in which hackers use the computing power of a compromised device to mine cryptocurrency.
  6. The process of decoding cipher text to plain text so that it is readable by humans.
Down
  1. A software which bombards users with endless malicious ads and pop-up windows or redirect to other website
  2. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites.
  3. A collection of malicious software tools that allow hackers to remotely access and control a computer or network.
  4. A controlled and safe environment set up as a decoy/trap to lure cyber attackers & study their hacking attempts
  5. A computer malware that can reproduce itself and spreads copies to other computers in the network.
  6. A piece of data from the website you visited, stored within the web browser that the website can retrieve at a later time.

12 Clues: The encrypted text transformed from plaintext using an encryption algorithm.A network of computers infected by malware that are controled by a single attacker.The process of decoding cipher text to plain text so that it is readable by humans.A computer malware that can reproduce itself and spreads copies to other computers in the network....

English for IT - Units 5 and 6 Vocabulary Revision 2023-08-07

English for IT - Units 5 and 6 Vocabulary Revision crossword puzzle
Across
  1. Business-to-business: companies exchange information and make transactions.
  2. Online shopping is really __________. You don’t need to go anywhere, you can shop from home.
  3. __________ networks have a limited range.
  4. After the customer puts the items in the __________ cart, he/she checks the order.
  5. Customers can use their credit cards, PayPal or electronic cheques to pay for __________.
Down
  1. A __________ modulates and demodulates the data into a signal.
  2. __________ is the maximum throughput of data in bits per second.
  3. The LAN allows you to share information __________ users.
  4. We are developing new website __________ features. We will have a VPN with a firewall which will help stop cyber attacks.
  5. Local area network

10 Clues: Local area network__________ networks have a limited range.The LAN allows you to share information __________ users.A __________ modulates and demodulates the data into a signal.__________ is the maximum throughput of data in bits per second.Business-to-business: companies exchange information and make transactions....

LMS&NM 2023 2023-12-06

LMS&NM 2023 crossword puzzle
Across
  1. What does the ‘T’ stand for in DT&A
  2. Who joined the Insights team in November? (HINT 2 words ed8)
  3. It is ? Indigenous Australian cultural awareness training must be completed by 31 December
  4. What book did Deborah Robinson enjoy reading? (HINT 2 words ed5)
Down
  1. Which month does Commissioner Jordan AO retire?
  2. The GPFS team undertook detailed analysis of what patterns (HINT ed8)
  3. What game has been developed to demonstrate unscrupulous infiltration? (HINT 2 words)
  4. What month was Cyber Security Awareness?
  5. What does Kym Myall drive as a hobby (HINT ed2)
  6. The New Measures team added what well attended program to their portfolio (HINT ed8)

10 Clues: What does the ‘T’ stand for in DT&AWhat month was Cyber Security Awareness?Which month does Commissioner Jordan AO retire?What does Kym Myall drive as a hobby (HINT ed2)Who joined the Insights team in November? (HINT 2 words ed8)What book did Deborah Robinson enjoy reading? (HINT 2 words ed5)...

Unifi EHSS Summer Security 2023-07-17

Unifi EHSS Summer Security crossword puzzle
Across
  1. Something that holds you to the rules
  2. Follow closely behind someone through a door
  3. Do this when badge not displayed/displayed properly
  4. Report to those who need to know
  5. Deliberately misrepresenting something
  6. Airport Operations Area
  7. TSA Aircraft Operators Standard Security Program
  8. Access granted
Down
  1. Protected against unauthorized access
  2. Make sure accurate name and photo of pax
  3. Transportation Security Administration
  4. Keep Safe From
  5. Used to keep your login secure
  6. Ground Security Coordinator
  7. Security Identification Area
  8. Completed before first departure of the day
  9. Security technique to regulate resources
  10. Sensitive Security Information
  11. Intended to deceive others
  12. Imposed from breaking security protocol

20 Clues: Keep Safe FromAccess grantedAirport Operations AreaIntended to deceive othersGround Security CoordinatorSecurity Identification AreaUsed to keep your login secureSensitive Security InformationReport to those who need to knowProtected against unauthorized accessSomething that holds you to the rulesTransportation Security Administration...

Belmont Banner crossword 2016-06-22

Belmont Banner crossword crossword puzzle
Across
  1. What company supported the landbuggy project?
  2. What sort of light display is used for the microbit?
  3. University What university did the cyber security event take place in?
  4. did Mr Watson sign up to get housepoints?
  5. Where did the Wider Acheivement year award?
  6. What English teacher is retiring this year?
  7. What is the name of the Knex challenge?
  8. Reid What maths teacher is retiring this year?
  9. What did the new first year's say that they are looking forward to in Belmont?
  10. long did the sports day cycle last for?
  11. lunch day is windband?
  12. Who won the Scottish Schools young Writer of the year award?
Down
  1. did the domestic abuse talk in the assembly?
  2. What Pupil Support Teacher is retiring this year?
  3. are STEM emphasising this year?
  4. What are the senior stem pupils working on?
  5. lunch day is windband?
  6. What is the name of the main male lead character in the Little Shop Of Horror School show?

18 Clues: lunch day is windband?lunch day is windband?are STEM emphasising this year?What is the name of the Knex challenge?long did the sports day cycle last for?did Mr Watson sign up to get housepoints?What are the senior stem pupils working on?Where did the Wider Acheivement year award?What English teacher is retiring this year?...

BTEC DIT C3B - Cyber Security 2025-03-07

BTEC DIT C3B - Cyber Security crossword puzzle
Across
  1. A method of authentication that uses parts of the body for identification
  2. Malware that encrypts a computer system until a fee is paid
  3. A reason for attacking a system purely to cause downtime
  4. When a user is directed to a phoney/spoof website where their personal details will be collected
  5. The act of tricking a person to voluntarily giving personal details / money
Down
  1. When a security system has been attacked/compromised
  2. Prevents unwanted internet traffic from entering a digital system or network
  3. Spying on other companies
  4. Device ______________ : a range of measures to make a system less vulnerable to attack
  5. A threat coming from outside an organisation
  6. A threat coming from inside an organisation

11 Clues: Spying on other companiesA threat coming from inside an organisationA threat coming from outside an organisationWhen a security system has been attacked/compromisedA reason for attacking a system purely to cause downtimeMalware that encrypts a computer system until a fee is paid...

Digital Crossword Awesome Privacy Week '25 2025-01-27

Digital Crossword Awesome Privacy Week '25 crossword puzzle
Across
  1. A key document that explains how an individual's data is stored, used, and shared.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. An extra layer of security that requires more than just a password.
  4. A cyber attack where attackers trick individuals into revealing sensitive information.
  5. The process of removing personal identifiers from datasets.
  6. The act of removing or disguising personal identifiers from datasets.
  7. A tool used to record every keystroke typed on a keyboard.
  8. The practice of protecting systems, networks, and programs from digital attacks.
  9. Data that describes and gives information about other data.
  10. Theft Fraudulent use of someone's personal data to commit crimes.
  11. A browser feature that prevents storing history, cookies, and site data.
  12. Malicious software that locks users out of their data until a ransom is paid.
Down
  1. AI-generated media that mimics real people and can be used for deception.
  2. Unauthorized access or damage to computer systems and networks.
  3. Small files stored on a user’s browser to track online activities.
  4. Malicious software designed to harm or exploit computers and networks.
  5. The process of encoding information to prevent unauthorized access.
  6. Malicious software that secretly gathers user information.
  7. A U.S. law that gives California residents rights over their personal data.
  8. Publishing private or identifying information about someone online without consent.
  9. A tool that encrypts internet connections to enhance privacy.
  10. A European Union law that regulates data protection and privacy.
  11. Software vulnerability unknown to developers and exploited by hackers.

23 Clues: A tool used to record every keystroke typed on a keyboard.Malicious software that secretly gathers user information.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

Social media / cyber security / digital literacy 2025-07-09

Social media / cyber security / digital literacy crossword puzzle
Across
  1. Information about yourself online; often found on your account
  2. Symbol used to group topics on social media
  3. Connection to the internet without wires
  4. What you do to stop someone from contacting you online
  5. A strong word or phrase used to keep your accounts secure
  6. A person who tries to cheat others online
  7. Protection system that blocks unauthorized access
  8. A form of online abuse or harassment
Down
  1. Settings that control who sees your content online
  2. Misleading or untrue content shared to deceive people
  3. A criminal who tries to steal or break into digital systems
  4. Unwanted messages often sent to your inbox
  5. A name or handle you use to log into digital accounts
  6. A short word or icon that shows emotion in messages
  7. A person who posts hurtful or misleading comments online

15 Clues: A form of online abuse or harassmentConnection to the internet without wiresA person who tries to cheat others onlineUnwanted messages often sent to your inboxSymbol used to group topics on social mediaProtection system that blocks unauthorized accessSettings that control who sees your content online...

2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06

2019 – NCSAM Cyber Security Crossword Puzzle Challenge crossword puzzle
Across
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  2. Something you should never share with another person.
  3. The month in which National Cyber Security Awareness Month occurs.
  4. When someone follows a person into a secured area without proper credentials.
  5. Links with catchy titles that lure users into opening them.
  6. Malware that replicates itself, so it can spread to infiltrate other computers.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. Don’t download these unless you know and have confirmed the sender.
  9. Kids and parents should be aware of these online bullies.
  10. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Down
  1. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  2. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  3. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  4. A type of malware that locks your computer until you pay to have it unlocked.
  5. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door.”
  6. Stop. ____. Connect.
  7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  8. A technique used by hackers to obtain sensitive information.
  9. You should check these regularly.
  10. The acronym for the month of cybersecurity awareness events.
  11. Acronym for Protected Health Information.
  12. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  13. A personal identification number commonly associated with an ATM.
  14. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.

24 Clues: Stop. ____. Connect.You should check these regularly.Acronym for Protected Health Information.Something you should never share with another person.Kids and parents should be aware of these online bullies.Links with catchy titles that lure users into opening them.A technique used by hackers to obtain sensitive information....

Malware 2023-04-18

Malware crossword puzzle
Across
  1. Makes changes to files that are native to the OS
  2. Infects mobile devices.
  3. Monitors users' keystrokes
  4. a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit
  5. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  6. Disable victim's access to data until ransom is paid
  7. serves unwanted advertisements
  8. an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders
  9. Spreads through a network by replicating itself.
  10. Disguises itself as desirable code
Down
  1. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. Gives hackers remote control of a victim's device.
  3. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
  4. Collects user activity data without their knowledge
  5. Erases user data beyond recoverability.
  6. an online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online currency known as cryptocurrencies
  7. a Trojan that is designed to gather information from a system
  8. software designed to interfere with a computer's normal functioning,
  9. a robust cyber security solution that adds an extra layer of security to your computer to protect against cyberattacks.
  10. an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

20 Clues: Infects mobile devices.Monitors users' keystrokesserves unwanted advertisementsDisguises itself as desirable codeErases user data beyond recoverability.Makes changes to files that are native to the OSSpreads through a network by replicating itself.Gives hackers remote control of a victim's device.Collects user activity data without their knowledge...

Digital Crossword Awesome Privacy Week '25 2025-01-27

Digital Crossword Awesome Privacy Week '25 crossword puzzle
Across
  1. A key document that explains how an individual's data is stored, used, and shared.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. An extra layer of security that requires more than just a password.
  4. A cyber attack where attackers trick individuals into revealing sensitive information.
  5. The process of removing personal identifiers from datasets.
  6. The act of removing or disguising personal identifiers from datasets.
  7. A tool used to record every keystroke typed on a keyboard.
  8. The practice of protecting systems, networks, and programs from digital attacks.
  9. Data that describes and gives information about other data.
  10. Theft Fraudulent use of someone's personal data to commit crimes.
  11. A browser feature that prevents storing history, cookies, and site data.
  12. Malicious software that locks users out of their data until a ransom is paid.
Down
  1. AI-generated media that mimics real people and can be used for deception.
  2. Unauthorized access or damage to computer systems and networks.
  3. Small files stored on a user’s browser to track online activities.
  4. Malicious software designed to harm or exploit computers and networks.
  5. The process of encoding information to prevent unauthorized access.
  6. Malicious software that secretly gathers user information.
  7. A U.S. law that gives California residents rights over their personal data.
  8. Publishing private or identifying information about someone online without consent.
  9. A tool that encrypts internet connections to enhance privacy.
  10. A European Union law that regulates data protection and privacy.
  11. Software vulnerability unknown to developers and exploited by hackers.

23 Clues: A tool used to record every keystroke typed on a keyboard.Malicious software that secretly gathers user information.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

U8 Technical Areas 2025-04-07

U8 Technical Areas crossword puzzle
Across
  1. The app is only compatible with the latest ---- system.
  2. Please check the product ---- before shipping it to the customer.
  3. A ---- message appeared to warn about low storage space.
  4. The app has a user-friendly ---- that is easy to navigate.
  5. Our team uses an online ---- to manage customer orders.
  6. The factory increased its production ---- to meet higher demand.
  7. Please enter the ---- number to activate your software.
  8. Customers love the ---- features on our website, such as live chat and product demos.
  9. Click the email ---- on your screen to open your inbox.
  10. The office uses a ---- printer that connects to all computers.
  11. New employees must ---- themselves with the company’s software system.
Down
  1. You need to ---- the software to fix security bugs.
  2. Please check the ---- to see the status of the delivery system.
  3. During the meeting, everyone used their ---- to take notes and share documents.
  4. Please read the instruction ---- before installing the new device.
  5. It's time to ---- our office equipment to keep up with the latest technology.
  6. The ---- industry has grown rapidly due to the increase in online shopping.
  7. We use ---- equipment to ensure the best quality.
  8. The company hired a ---- security expert to protect customer data.
  9. The product was tested in the company’s research ---- before launch.
  10. We are now using the latest ---- of the accounting software.
  11. The ---- received funding from several investors to develop its new app.
  12. The ---- fixed the printer within 30 minutes.
  13. A stable internet ---- is required for video meetings.

24 Clues: The ---- fixed the printer within 30 minutes.We use ---- equipment to ensure the best quality.You need to ---- the software to fix security bugs.A stable internet ---- is required for video meetings.The app is only compatible with the latest ---- system.Our team uses an online ---- to manage customer orders....

Awesome Privacy Week '25 2025-01-27

Awesome Privacy Week '25 crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic.
  2. An extra layer of security that requires more than just a password.
  3. Malicious software designed to harm or exploit computers and networks.
  4. A European Union law that regulates data protection and privacy.
  5. A tool that encrypts internet connections to enhance privacy.
  6. A U.S. law that gives California residents rights over their personal data.
  7. The practice of protecting systems, networks, and programs from digital attacks.
  8. Publishing private or identifying information about someone online without consent.
  9. AI-generated media that mimics real people and can be used for deception.
  10. Small files stored on a user’s browser to track online activities.
  11. A tool used to record every keystroke typed on a keyboard.
  12. A browser feature that prevents storing history, cookies, and site data.
  13. The act of removing or disguising personal identifiers from datasets.
  14. A key document that explains how an individual's data is stored, used, and shared.
Down
  1. The process of removing personal identifiers from datasets.
  2. The process of encoding information to prevent unauthorized access.
  3. Malicious software that secretly gathers user information.
  4. Software vulnerability unknown to developers and exploited by hackers.
  5. A cyber attack where attackers trick individuals into revealing sensitive information.
  6. Theft Fraudulent use of someone's personal data to commit crimes.
  7. Unauthorized access or damage to computer systems and networks.
  8. Data that describes and gives information about other data.
  9. Malicious software that locks users out of their data until a ransom is paid.

23 Clues: Malicious software that secretly gathers user information.A tool used to record every keystroke typed on a keyboard.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

Cyber Congress Slangs Crossword 2021-06-09

Cyber Congress Slangs Crossword crossword puzzle
Across
  1. I miss our canteen’s bullet rolls. No CAP.
  2. DAE feel like everyday’s the same?
  3. TIL a lot of internet slangs.
  4. I don’t usually talk to my IRL friends.
  5. Anyone who shares NSFW content will be removed from the group chat.
  6. WIP dude, we’re still promoting the cyber congress.
  7. Please don’t disturb me. I’m going AFK.
Down
  1. IIRC you mentioned that you’re busy this weekend
  2. The ship is sending out an SOS signal!
  3. INB4 Mumbai Indians wins this year’s IPL.
  4. Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime’ refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer. Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime. TLDR:- cyber crime exists in varied forms.
  5. I don’t understand how thermodynamics work. Can you ELI5?
  6. Hi! I’m your human search engine. You can ask me AMA.

13 Clues: TIL a lot of internet slangs.DAE feel like everyday’s the same?The ship is sending out an SOS signal!I don’t usually talk to my IRL friends.Please don’t disturb me. I’m going AFK.INB4 Mumbai Indians wins this year’s IPL.I miss our canteen’s bullet rolls. No CAP.IIRC you mentioned that you’re busy this weekend...

Belmont Banner Crossword 2016-06-22

Belmont Banner Crossword crossword puzzle
Across
  1. What is the name of the Knex challenge?
  2. What lunch day is windband?
  3. Who did the domestic abuse talk in the assembly?
  4. What English teacher is retiring this year?
  5. What company supported the landbuggy project?
  6. How long did the sports day cycle last for?
  7. What sort of light display is used for the microbit?
  8. What are the senior stem pupils working on?
  9. Who won the Scottish Schools young Writer of the year award?
  10. Where did the Wider Acheivement year award?
Down
  1. What are STEM emphasising this year?
  2. What did Mr Watson sign up to get housepoints?
  3. What university did the cyber security event take place in?
  4. What is the name of the main male lead character in the Little Shop Of Horror School show?
  5. What lunch day is windband?
  6. What did the new first year's say that they are looking forward to in Belmont?
  7. Reid What maths teacher is retiring this year?
  8. What Pupil Support Teacher is retiring this year?

18 Clues: What lunch day is windband?What lunch day is windband?What are STEM emphasising this year?What is the name of the Knex challenge?What English teacher is retiring this year?How long did the sports day cycle last for?What are the senior stem pupils working on?Where did the Wider Acheivement year award?What company supported the landbuggy project?...

Identity Theft Statistics 2014-07-22

Identity Theft Statistics crossword puzzle
Across
  1. The most common form of cyber identity theft.
  2. The average loss per identity theft incident (in thousands) per consumer.
  3. This race of people have their identities stolen the most by cyber thieves.
  4. This age group is victimized the most when it comes to cyber identity theft.
  5. Accounts Cyber thieves use card skimmers to steal pin numbers to access these.
Down
  1. This is the average number of identity theft victims in the U.S. annually.
  2. Dakota This state, home to Mt. Rushmore has the lowest identity theft complaint rate.
  3. This state has the second highest identity theft complaint rate.
  4. This U.S. Southwestern state has the highest identity theft complaint rate.
  5. The percentage of U.S. households that report some type of identity theft.
  6. Total financial loss (in billions) attributed to identity theft.

11 Clues: The most common form of cyber identity theft.This state has the second highest identity theft complaint rate.Total financial loss (in billions) attributed to identity theft.The average loss per identity theft incident (in thousands) per consumer.This is the average number of identity theft victims in the U.S. annually....

CyberBullying 2017-06-19

CyberBullying crossword puzzle
Across
  1. A person that makes you feel unsafe?
  2. Cyber bullying is
  3. Cyber bullying can happen
  4. Cyberbullying can lead to what?
  5. Where does cyber bullying take place?
Down
  1. Bullies name call because they are
  2. What should you do when a bully message you?
  3. When bullying happens at home who do you tell?
  4. When bullying happens at school who do you tell?
  5. You should always make sure your online presence is?

10 Clues: Cyber bullying isCyber bullying can happenCyberbullying can lead to what?Bullies name call because they areA person that makes you feel unsafe?Where does cyber bullying take place?What should you do when a bully message you?When bullying happens at home who do you tell?When bullying happens at school who do you tell?...

40. 2021-03-19

40. crossword puzzle
Across
  1. Police force heading west, and east, take great risks
  2. Cellphone info collected by the NSA, per the Snowden documents
  3. PALACE Nickname for the National Security Agency
  4. Security office array
  5. Bear from Orient taken out of Lake Ontario (5)
  6. Stud poker poets play out with the Northern Iraqi (4)
  7. Refugees from the East taken by 50 states (7)
  8. Old Northern Iraqi in Middle East taken in backing National Security Agency (8)
  9. Commander in NSA outfit taking time off in Asian city (8)
  10. Rifles National Security Agency kept in shelves (8)
  11. National security concern
Down
  1. Swindler from East taken in by gossip (5)
  2. The headquarters of the US National Security Agency is located in Maryland's Fort ...
  3. Security agency trainee holds up no mere ritual act (10)
  4. NSA invasions
  5. Assault prompting inapt reaction in old northern street
  6. The FSB is this country's main security agency (6)
  7. Arizona, then some old Northern Isles, leaving North Dakota to climb height in Italy
  8. National Security Agency
  9. Security agency of the Soviet Union from 1954-91 (3)

20 Clues: NSA invasionsSecurity office arrayNational Security AgencyNational security concernSwindler from East taken in by gossip (5)Refugees from the East taken by 50 states (7)Bear from Orient taken out of Lake Ontario (5)PALACE Nickname for the National Security AgencyThe FSB is this country's main security agency (6)...

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Find hidden messages or attacks within innocent-looking files.
  2. Malware that collects information about you
  3. A wall or partition designed to inhibit or prevent the spread of fire.
  4. Manifestation signifying hostile intention, the plan to cause harm.
  5. The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
  1. Malware that blocks access and demands ransom
  2. A cyber security professional who deal with testing vulnerabilities to help owners of application or website
  3. A type of malware that is often masked as genuine software
  4. Improve or correct by inserting a patch. It's a synonym of update

9 Clues: Malware that collects information about youMalware that blocks access and demands ransomA type of malware that is often masked as genuine softwareFind hidden messages or attacks within innocent-looking files.Improve or correct by inserting a patch. It's a synonym of updateManifestation signifying hostile intention, the plan to cause harm....

tecnologia y ciencia #1 2023-02-08

tecnologia y ciencia #1 crossword puzzle
Across
  1. losmediossociales
  2. bullying elciberacoso
  3. program elprogramadecomputacion
  4. elenlace
  5. elcorrectorortografico
  6. lainteligenciaartificial
  7. lared
  8. losauriculares
  9. lacontrasena
  10. arroba
Down
  1. lacamara digital
  2. elciberespacio
  3. elnombredeusuario
  4. elaltavozinteligente
  5. address ladireccionelectronica
  6. laherramienta
  7. elmensaje
  8. elmensajedetexto
  9. lacomputadoraportatil
  10. science lainformatica

20 Clues: laredarrobaelenlaceelmensajelacontrasenalaherramientaelciberespaciolosauriculareslacamara digitalelmensajedetextolosmediossocialeselnombredeusuarioelaltavozinteligentebullying elciberacosolacomputadoraportatilscience lainformaticaelcorrectorortograficolainteligenciaartificialaddress ladireccionelectronicaprogram elprogramadecomputacion

CSE167 Terminology 2022-04-27

CSE167 Terminology crossword puzzle
Across
  1. 2 Words A technique used to manipulate and deceive people in the real world to gain sensitive and private information.
  2. 2 Words. an act that sought to curb unsolicited commercial emails
  3. a cyber attack used to obtain information like passwords and bank info.
  4. 2 Words. An attack that is done over an online format.
  5. Any weakness in an asset or security protection which would allow for a threat to cause harm.
  6. things that can protect your defense points (methods)
  7. 2 Words. attacker tries to crack the password by submitting various combinations until the correct one is found
  8. A form of cyber attack that floods a service with malicious traffic or data to shut it down
  9. A form of malware that monitors user activities and reports them to an external party.
  10. From the CIA triad: Information kept private and secure
  11. 2 Words. key points which should be identified to protect
  12. A collection of computers with malware that allows a hacker to run software used for illegal purposes.
  13. A copy of the system or networks data for file restoration or archival purposes
  14. Study of secure communication technics in the presence of third parties
Down
  1. a set of programs that tell a computer to perform a task
  2. A malicious application or script that can be used to take advantage of a vulnerability
  3. From the CIA triad: Data not modified (deleted or added)
  4. Possibility of suffering loss. Areas include financial, legal, strategic, and security.
  5. 4 Words A type of attack where an attacker secretly intercepts and possibly alters the communications between two parties.
  6. 3 Words. A game in which keys are intentionally hidden within vulnerable programs or websites.
  7. a tool that allows users to remain anonymous on the internet
  8. 2 Words. A program that helps users and businesses securely store and manage their login credentials.
  9. 2 Words. Attackers try to gain authentication by cracking the password hash. And they do it by using a list of pre-computed hashes of possible password combinations.
  10. the attacker systematically enters every word in the dictionary to crack the password
  11. Decentralized naming system used to associate domain names with other forms of information.
  12. A form of malware that focuses on replication and distribution.
  13. 2 Words. your public key can be used to send encrypted messages which other people can decrypt with the key
  14. From the CIA triad: Record the identities and activities

28 Clues: things that can protect your defense points (methods)2 Words. An attack that is done over an online format.From the CIA triad: Information kept private and securea set of programs that tell a computer to perform a taskFrom the CIA triad: Data not modified (deleted or added)From the CIA triad: Record the identities and activities...

DEFINITIONS of Cyber ​​Security 2020-08-20

DEFINITIONS of Cyber ​​Security crossword puzzle
Across
  1. It's a trick that they do to decipher people's bank account passwords, etc.
  2. it's a program that removes viruses, etc, before they enter a device.
  3. it's information that web pages save to your computer, like your username,etc, but it doesn't reach a person with an unknown identity.
  4. It's malicious software that infiltrates your device without your knowing.
Down
  1. It's a software that colect information of the computers and gives it to an to an unknown identity without the owner of the computer noticing.
  2. is a system that prevents unauthorized access to a private network
  3. they are computer programs that want to alter your computer.
  4. it's an email not requested that people receive, usually it's advertising.

8 Clues: they are computer programs that want to alter your computer.is a system that prevents unauthorized access to a private networkit's a program that removes viruses, etc, before they enter a device.it's an email not requested that people receive, usually it's advertising.It's malicious software that infiltrates your device without your knowing....

Lions Clubs Projects Match 2023-01-16

Lions Clubs Projects Match crossword puzzle
Across
  1. Admin sports team fundraiser
  2. San Mateo Lions Club
  3. Bay Area Global Outreach Lions Club, Burlingame LC
  4. Millbrae, San Bruno, Foster City LC
  5. SSF Golden Gate Lions Club
  6. Half Moon Bay LC
  7. Foster City Lions Club, Redwood Sunrise LC
  8. SF Geneva-Excelsior Lions Club
  9. Peninsula Veterans, Bay Area Global Outreach LC
Down
  1. SF Premier, SF Host, Peninsula Special Interest LC
  2. Silicon Vally Cyber Lions Club
  3. Foster City Bair Island Cyber Lions Club
  4. Burlingame and Millbrae Lions Clubs
  5. SF Nikkei Lions Club
  6. San Bruno LC
  7. San Carlos LC
  8. Bay Area Special Olympics Lions Club
  9. SF Unified Lions Club or San Bruno Lions Club

18 Clues: San Bruno LCSan Carlos LCHalf Moon Bay LCSan Mateo Lions ClubSF Nikkei Lions ClubSSF Golden Gate Lions ClubAdmin sports team fundraiserSilicon Vally Cyber Lions ClubSF Geneva-Excelsior Lions ClubBurlingame and Millbrae Lions ClubsMillbrae, San Bruno, Foster City LCBay Area Special Olympics Lions ClubFoster City Bair Island Cyber Lions Club...

Cyber Bullying 2017-12-11

Cyber Bullying crossword puzzle
Across
  1. our teacher
  2. online bully
  3. serious cases of cyber bullying is
Down
  1. when you blackmail someone online
  2. the person getting cyber bullied
  3. authority that can help
  4. cyber bullying is
  5. gucci gang...

8 Clues: our teacheronline bullygucci gang...cyber bullying isauthority that can helpthe person getting cyber bulliedwhen you blackmail someone onlineserious cases of cyber bullying is

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. Protocol that is meant for uploading and downloading files.
  2. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
  3. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  4. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  5. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. A computer program that keeps a log of your keystrokes on your keyboard.
  8. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
Down
  1. a cyber attack intended to redirect a website's traffic to another, fake site.
  2. A bundle of programs that is designed to bombard users with advertisements.
  3. The process by which two information systems establish a communication channel.
  4. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  5. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  6. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.

14 Clues: Protocol that is meant for uploading and downloading files.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements.a cyber attack intended to redirect a website's traffic to another, fake site....

Security 2017-02-13

Security crossword puzzle
Across
  1. To reduce potential loss, ____should be secure and kept to a minimum amount.
  2. Use this in the event of a cardiac medical emergency.
  3. This checklist should be next to every phone.
  4. All confidential information is locked up or placed in this bin.
  5. In thousands, this is the daily cash limit in a MSR top drawer.
  6. You should always ___ your computer when walking away.
  7. Before you enter the building, look for the ______signal.
  8. How many evacuation routes should you plan at each branch?
Down
  1. Branch Closed signs have other CWCU locations and the nearest _________.
  2. Masks and _____can be found in the emergency supply kit
  3. Acronym of how to use a fire extinguisher
  4. Form to fill out when you notice a Red Flag
  5. In an active shooter situation, this action is the last resort.
  6. This employee is the support Security Officer.
  7. In any emergency, ____is always the first priority.

15 Clues: Acronym of how to use a fire extinguisherForm to fill out when you notice a Red FlagThis checklist should be next to every phone.This employee is the support Security Officer.In any emergency, ____is always the first priority.Use this in the event of a cardiac medical emergency.You should always ___ your computer when walking away....

2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06

2019 – NCSAM Cyber Security Crossword Puzzle Challenge crossword puzzle
Across
  1. to a computer through a “back door.”
  2. Acronym for Protected Health Information.
  3. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  4. Stop. ____. Connect.
  5. You should check these regularly.
  6. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
  7. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  8. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  9. A piece of malware that often allows a hacker to gain remote
  10. A technique used by hackers to obtain sensitive information.
  11. The acronym for the month of cybersecurity awareness events.
  12. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  13. Something you should never share with another person.
  14. The month in which National Cyber Security Awareness Month occurs.
Down
  1. Links with catchy titles that lure users into opening them.
  2. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
  3. Kids and parents should be aware of these online bullies.
  4. When someone follows a person into a secured area without proper credentials.
  5. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  6. Don’t download these unless you know and have confirmed the sender.
  7. A personal identification number commonly associated with an ATM.
  8. Malware that replicates itself, so it can spread to infiltrate other computers.
  9. A type of malware that locks your computer until you pay to have it unlocked.
  10. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  11. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network

25 Clues: Stop. ____. Connect.You should check these regularly.to a computer through a “back door.”Acronym for Protected Health Information.Something you should never share with another person.Kids and parents should be aware of these online bullies.Links with catchy titles that lure users into opening them....

Day 4 Cyber Security 2 Chapter 4 2025-10-13

Day 4 Cyber Security 2 Chapter 4 crossword puzzle
Across
  1. The unauthorized transfer of data from a computer system.
  2. A weakness in a system that can be exploited by a threat.
  3. A hardware device or software program that stops network traffic based on a set of rules.
  4. A computer that is part of a botnet, controlled by an attacker.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  6. The practice of sending fraudulent emails that resemble emails from reputable sources to induce individuals to reveal personal information.
  7. The process of verifying the identity of a user.
  8. A unique identifier for a device on a network (abbreviation).
  9. A set of rules governing the exchange or transmission of data between devices.
  10. A secret word or phrase that must be used to gain admission to something.
  11. A program that appears to do one thing but actually does another, often malicious, thing. (2 words)
  12. Software that is intended to damage or disable computers and computer systems.
  13. A system that detects and prevents malicious activities on a network (abbreviation).
Down
  1. The 'A' in the CIA Triad, ensuring that systems and data are available to authorized users when needed.
  2. The act of deceiving someone into revealing sensitive information. (2 words)
  3. The process of making data unreadable to unauthorized users.
  4. The process of granting or denying approval to use specific resources.
  5. A type of attack that overwhelms a system with traffic, making it unavailable to users (abbreviation).
  6. A network security device that monitors and filters incoming and outgoing network traffic.
  7. A person who uses computers to gain unauthorized access to data.
  8. A type of malware that holds a victim's data for ransom.
  9. A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
  10. Any circumstance or event with the potential to adversely impact organizational operations.
  11. Unsolicited bulk messages, especially advertising.
  12. A small piece of data sent from a website and stored on the user's computer by the web browser.
  13. The 'C' in the CIA Triad, ensuring data is not disclosed to unauthorized individuals.
  14. An attack that uses a massive number of computers to overwhelm a target system. (abbreviation)

27 Clues: The process of verifying the identity of a user.Unsolicited bulk messages, especially advertising.A type of malware that holds a victim's data for ransom.The unauthorized transfer of data from a computer system.A weakness in a system that can be exploited by a threat.The process of making data unreadable to unauthorized users....

Cyber-bullying 2012-02-07

Cyber-bullying crossword puzzle
Across
  1. Delete cyberbullying. Don’t write it. Don’t ______it.
  2. Although cyberbullies may think they are ________, they can be found.
  3. 81% of young people said that they cyber-bully because they think it’s ______.
  4. When an adult is involved, it may meet the definition of _______.
  5. You can also help prevent cyberbullying by _______ awareness of the cyberbullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents.
  6. Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of ________ in teens.
Down
  1. If you wouldn’t say it in _______, don’t say it online.
  2. Being a victim of cyberbullying can be a common and ________ experience.
  3. Sharing NCPC’s anti-cyberbullying ______ with friends.
  4. people By definition, cyber-bullying occurs among ______.
  5. Technologies that allows for delayed and permanent posting of communication social networking sites, i.e. (Facebook, Myspace)
  6. is the use of technology to harass, threaten, embarrass, or target another person
  7. Some teens feel ________ because they may not know who is cyberbullying them.
  8. You can also help prevent cyberbullying by speaking with other students, as well as teachers and school administrators, to develop _____ against cyberbullying.
  9. Considered “LIVE” bullying or technology that allows for real time such as chat rooms, instant messaging, and online gaming.
  10. Don’t forget that even though you can’t see a cyberbully or the bully’s victim, cyberbullying causes real _______.

16 Clues: Delete cyberbullying. Don’t write it. Don’t ______it.Sharing NCPC’s anti-cyberbullying ______ with friends.If you wouldn’t say it in _______, don’t say it online.people By definition, cyber-bullying occurs among ______.When an adult is involved, it may meet the definition of _______....

USAG FCCO OPSEC Crossword Puzzle 2025-05-29

USAG FCCO OPSEC Crossword Puzzle crossword puzzle
Across
  1. Acronym for encryption on your Common Access Card (CAC).
  2. Directive that established OPSEC as a national security program.
  3. Acronym for Operations Security.
  4. Condition that exists when we are susceptible, and adversaries can collect our critical information.
  5. Official mascot for Operations Security.
  6. This term is used in Operations Security instead of enemy.
  7. Third number of the Army's Operations Security Regulation.
  8. Commander's list of unclassified sensitive information to protect.
  9. Number of steps identified in the Operations Security cycle.
  10. Month originally designated for Operations Security awareness.
  11. Second number of the Army's Operations Security Regulation.
Down
  1. Number Replaced the SSN on ID cars to protect personal information.
  2. Friendly detectable actions that can derive sensitive information.
  3. Designated color usually associated with Operations Security.
  4. Has overall ownership of USAG FCCO Operations Security Program.
  5. First number of the Army's Operations Security Regulation.
  6. OPSEC is a systematic _____________.
  7. Who is responsible for OPSEC?
  8. New official designated month for National Operations Security awareness.

19 Clues: Who is responsible for OPSEC?Acronym for Operations Security.OPSEC is a systematic _____________.Official mascot for Operations Security.Acronym for encryption on your Common Access Card (CAC).First number of the Army's Operations Security Regulation.This term is used in Operations Security instead of enemy....

Cyber Ethics 2025-05-31

Cyber Ethics crossword puzzle
Across
  1. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. The practice of taking someone else's work or ideas and passing them off as one's own.
  3. The act of installing a legal copy of software in contravention of its license agreement
  4. The process of converting encrypted data back into its original, readable form
Down
  1. Any criminal activity that involves a computer, network or networked device
  2. ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
  3. A type of malicious software (malware) that replicates itself and can cause damage to computer systems
  4. A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
  5. An illegal intrusion into a computer system
  6. A type of cyberattack where attackers deceive individuals into revealing sensitive information
  7. The etiquette or rules of polite and respectful online communication
  8. A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
  9. Unwanted bulk emails that come from unknown sources
  10. The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access

14 Clues: An illegal intrusion into a computer systemUnwanted bulk emails that come from unknown sourcesThe etiquette or rules of polite and respectful online communicationAny criminal activity that involves a computer, network or networked deviceThe process of converting encrypted data back into its original, readable form...

Cyber Security Month 2021 2021-09-16

Cyber Security Month 2021 crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access
  2. After a network attack your data may be ____________
  3. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
  1. What you maintain when you don't disclose information to unauthorized parties
  2. The practice of being diligent about your online activities
  3. A secret word or phrase that be used to gain access

8 Clues: A secret word or phrase that be used to gain accessAfter a network attack your data may be ____________The practice of being diligent about your online activitiesWhat you maintain when you don't disclose information to unauthorized partiesType of software that helps protect your computer against malware and cybercriminals...

Cyber Security Month 2021 2021-09-16

Cyber Security Month 2021 crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access
  2. After a network attack your data may be ____________
  3. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
  1. What you maintain when you don't disclose information to unauthorized parties
  2. Attacks that use email or malicious websites to infect your device
  3. A secret word or phrase that be used to gain access

8 Clues: A secret word or phrase that be used to gain accessAfter a network attack your data may be ____________Attacks that use email or malicious websites to infect your deviceWhat you maintain when you don't disclose information to unauthorized partiesType of software that helps protect your computer against malware and cybercriminals...

Teka Teki Cyber Security 2023-10-22

Teka Teki Cyber Security crossword puzzle
Across
  1. Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
  2. Jenis ancaman cyber yang paling sering ditemui yaitu
  3. Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
  1. Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
  2. Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
  3. Selalu update _______________ untuk mengatasi ancaman cyber.
  4. Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
  5. Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____

8 Clues: Jenis ancaman cyber yang paling sering ditemui yaituSelalu update _______________ untuk mengatasi ancaman cyber.Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaituPenggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle....

CYBER SECURITY CROSSWORD PUZZLE 2025-02-27

CYBER SECURITY CROSSWORD PUZZLE crossword puzzle
Across
  1. program that secretly records information from a user’s device (7 letters).
  2. process of confirming someone’s identity (13 letters).
  3. data to keep it secret from unauthorized access (10 letters).
Down
  1. type of attack that lures victims into revealing personal information (8 letters).
  2. that demands payment to restore access to data (10 letters).
  3. Horse^A malicious program disguised as legitimate (11 letters).
  4. isolated testing environment for untrusted code (8 letters).
  5. protective barrier between a network and potential threats (8 letters).

8 Clues: process of confirming someone’s identity (13 letters).that demands payment to restore access to data (10 letters).isolated testing environment for untrusted code (8 letters).data to keep it secret from unauthorized access (10 letters).Horse^A malicious program disguised as legitimate (11 letters)....

Cyber security and mass surveillance 2020-09-16

Cyber security and mass surveillance crossword puzzle
Across
  1. you should not just check identity, you should also confirm
  2. unauthorized use of computing resources to mine cryptocurrencies
  3. information security is not just a ___ issue
  4. information security officer
  5. what is the purpose behind mass surveillance?
Down
  1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
  2. someone who deplores cracking
  3. someone who breaks into another computer system
  4. when someone sends an e-mail with a link to a bogus website
  5. a malicious program that modifies itself when it replicates
  6. what is widely used for mass surveillance?

11 Clues: information security officersomeone who deplores crackingwhat is widely used for mass surveillance?information security is not just a ___ issuewhat is the purpose behind mass surveillance?someone who breaks into another computer systemyou should not just check identity, you should also confirm...

Unit 3 Cyber Security 2017-05-12

Unit 3 Cyber Security crossword puzzle
Across
  1. someone who doesn't have the technical expertise to create their own software so they use software or scripts created by someone else
  2. gaining access to computer systems,networks,data and programmes without permission
  3. data is available to those who need it, when they need it
  4. loss or theft of equipment
Down
  1. data is entered,amended,stored and deleted by those with authorisation
  2. intercepting data packets and identify suspicious traffic
  3. someone who uses a computer as either a tool and/or a target to commit a crime
  4. network or system attack by someone who has authorised access

8 Clues: loss or theft of equipmentintercepting data packets and identify suspicious trafficdata is available to those who need it, when they need itnetwork or system attack by someone who has authorised accessdata is entered,amended,stored and deleted by those with authorisationsomeone who uses a computer as either a tool and/or a target to commit a crime...

Cyber Security Crossword 1 2025-09-22

Cyber Security Crossword 1 crossword puzzle
Across
  1. Part of the Internet hidden behind passwords
  2. Area of computer science concerned with keeping data safe
  3. A dishonest scheme designed to cheat someone out of money, property, or other valuable things
  4. Gaining access to data without permission
Down
  1. Type of fraud where someone pretends to be someone else.
  2. Part of the Internet where illegal activity occurs
  3. Part of the Internet accessible via search engines
  4. Tricking someone into giving up personal information, often via email.

8 Clues: Gaining access to data without permissionPart of the Internet hidden behind passwordsPart of the Internet where illegal activity occursPart of the Internet accessible via search enginesType of fraud where someone pretends to be someone else.Area of computer science concerned with keeping data safe...

Security 2013-06-26

Security crossword puzzle
Across
  1. A non MSIC holder must have a what for access into the LRZ?
  2. What is the L in LRZ?
  3. What does the T stand for in OTS?
  4. Stick to what path when in the freight yard?
  5. What colour should drivers follow in the freight yard on the way in?
  6. Who must you radio to have the gates opened/closed?
  7. What is the code number for a Firearm?
  8. What must you display in the LRZ?
Down
  1. Who takes passengers on/off via the buggy?
  2. What channel do you call for Security?
  3. What does the I stand for in MSIC?
  4. What lights must be on when in the freight yard?
  5. What must a non MSIC holder have whilst in the LRZ?
  6. What is Angela’s title other than Manager?
  7. What industry are we in?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What channel do you call for Security?What is the code number for a Firearm?Who takes passengers on/off via the buggy?What is Angela’s title other than Manager?Stick to what path when in the freight yard?...

Security 2013-06-26

Security crossword puzzle
Across
  1. What lights must be on when in the freight yard?
  2. Stick to what path when in the freight yard?
  3. Who must you radio to have the gates opened/closed?
  4. What industry are we in?
  5. Who takes passengers on/off via the buggy?
  6. What does the I stand for in MSIC?
  7. What channel do you call for Security?
  8. What colour should drivers follow in the freight yard on the way in?
Down
  1. A non MSIC holder must have a what for access into the LRZ?
  2. What is Angela’s title other than Manager?
  3. What does the T stand for in OTS?
  4. What must you display in the LRZ?
  5. What is the L in LRZ?
  6. What is the code number for a Firearm?
  7. What must a non MSIC holder have whilst in the LRZ?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?What is Angela’s title other than Manager?Who takes passengers on/off via the buggy?Stick to what path when in the freight yard?...

Security 2023-01-04

Security crossword puzzle
Across
  1. any real or personal property
  2. A system where by territoriality reinforcement is established via barriers, access control, and surveillance
  3. Boundaries and property lines are marked
  4. observing areas
  5. considered the last line of defense to protect with financial compensation after a loss event
  6. maintaining boundaries by restricting access to an area
Down
  1. Offenses punishable by fines and/or confinement in the local jail for up to 1 year
  2. Identification of a threat at the earliest opportunity
  3. Prompt repair and cleaning of damage of graffiti
  4. Can destroy almost anything
  5. practice of discouraging an attempted attack to an asset
  6. Offenses punishable by confinement from 1 year to life or death
  7. Established by legislative statutes
  8. A written manual of an organization
  9. An incident likely to occur at a site due to a history of events or circumstances

15 Clues: observing areasCan destroy almost anythingany real or personal propertyEstablished by legislative statutesA written manual of an organizationBoundaries and property lines are markedPrompt repair and cleaning of damage of graffitiIdentification of a threat at the earliest opportunitymaintaining boundaries by restricting access to an area...

CJ220 Quiz 1 2013-04-04

CJ220 Quiz 1 crossword puzzle
Across
  1. One thing the security environment depends on is the organization's
  2. Security company that tried to break union labor
  3. Another role of security
  4. Primary protective service in the U.S.
  5. Combining security with another department in an organization
  6. Part of crime triangle
Down
  1. Responsible for protection of property in early societies (one of 3)
  2. If an organization has a security problem, it also has a
  3. Another thing the security environment depends on
  4. Security jobs have outpaced those for
  5. One of goals of security
  6. Language of security
  7. Organization that set aside funds for police training but not security training
  8. Reason why security employment has increased over decades
  9. Combining contract and proprietary services
  10. One role of security

16 Clues: Language of securityOne role of securityPart of crime triangleOne of goals of securityAnother role of securitySecurity jobs have outpaced those forPrimary protective service in the U.S.Combining contract and proprietary servicesSecurity company that tried to break union laborAnother thing the security environment depends on...

Secured Transactions 2024-06-23

Secured Transactions crossword puzzle
Across
  1. _a security interest to the collateral
  2. Under UCC Article 3 a holder of a promissory note who takes it in good faith for value and without _ of any claim or defenses is a holder in due course HDC
  3. a _ arise when the lender loans money to the borrower specifically for the buyer to purchase certain goods and thereunder takes a security interest in the goods. For example Lumber Mill owns a bunch of machines that saw wood.Bank 1 has a perfected security interest in all of LumberMills equipment due to a n existing loan. Lumber Mill needs a new machine. Bank 2 gives LM a loan to buy the new machine and takes a SI in it. Bank 2's SI is a _ and has priority over Bank 1's
  4. Perfected when the holder of the security interest files a financing statement at a central filing location in the state where the debris is located; in VA with the _ 3words
  5. Under UCC article 9 an HDC prevails over _ parties claiming an interest in promissory note
  6. _ security interests have priority over unperfected security interest
  7. a bank account 2words
  8. By perfecting a security interest the holder of the security interest puts the world on notice that the security interest exists. A perfected security interest will be_ to most interest others might've in the collateral
  9. between two perfected security interests the _ to have been filed or perfected has priority
Down
  1. A PMSI in non inventory collateral such as equipment will have property over other perfected security interests in the same collateral if the interest is perfected before or within _ days days the debtor receives possession of the collateral
  2. Attachment without security agreement: _ 3 words
  3. Security interests in things attached to _ usually must be perfected with filing statements that describe the land and re filed in the county where land is located
  4. _provides that a consumer purchaser who buys consumer goods from another consumer takes free of a perfected security interest he buys the goods without knowledge of the security interest and before a financing statement covering the goods has been filed 3words
  5. Normally a perfected security interest in collateral is good against _ buyers. An exception to this is the "garage sale rule"
  6. creating a valid security interest in collateral; commonly through a security agreement which is valid for 1) the security agreement describes the collateral, 2) the party offering the collateral has rights in it, 3) the party gaining the security interest gives value in exchange for the security interest
  7. goods used or brought for personal or household purposes 2words
  8. goods held for sale or lease and applies/materials quickly used up in business
  9. Purchase money security interest in consumer goods are _ perfected 1word
  10. any physical goods other than consumer goods inventory or farm products
  11. _a right to payment accounts receivable
  12. _ the security interest
  13. Under Art. 9 of the UCC a creditor must take two steps to gain full protection of secured transaction law: _ and _ 2words

22 Clues: a bank account 2words_ the security interest_a security interest to the collateral_a right to payment accounts receivableAttachment without security agreement: _ 3 wordsgoods used or brought for personal or household purposes 2words_ security interests have priority over unperfected security interest...

Cyber security and mass surveillance 2020-09-16

Cyber security and mass surveillance crossword puzzle
Across
  1. you should not just check identity, you should also confirm
  2. unauthorized use of computing resources to mine cryptocurrencies
  3. information security is not just a ___ issue
  4. information security officer
  5. what is the purpose behind mass surveillance?
Down
  1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
  2. someone who deplores cracking
  3. someone who breaks into another computer system
  4. when someone sends an e-mail with a link to a bogus website
  5. a malicious program that modifies itself when it replicates
  6. what is widely used for mass surveillance?

11 Clues: information security officersomeone who deplores crackingwhat is widely used for mass surveillance?information security is not just a ___ issuewhat is the purpose behind mass surveillance?someone who breaks into another computer systemyou should not just check identity, you should also confirm...

Makiyah Bundy- Bullying 2022-05-17

Makiyah Bundy- Bullying crossword puzzle
Across
  1. Pam pretends to be a girl named Jenny on Instagram what is this called?
  2. Chase gets bullied online. What type of bullying is this?
  3. What is it when your friend makes fun of you but you are laughing along with them?
  4. Nola gets bullied and Aiden sticks up for her. What is Aiden?
  5. Austin watches as Layla gets bullied. What does this make Austin?
  6. What type of cyber-bullying is it when you are getting left out of a call?
  7. What type of cyber-bullying is it when you are in a online argument using abusive/aggressive language?
Down
  1. What is the A in the ABCD's of Bullying?
  2. The C in the ABCD's of Bullying.
  3. What type of cyber-bullying is spreading gossip?
  4. Your friend and you have an argument, but you guys apologize and become friends again.What is this?
  5. A boy tells you he is going to beat you up after school. What kind of bullying is this?
  6. Pam pushes Ava down a flight of stairs. What type of bullying is this?
  7. Jenna is being really mean and hateful to Joseph. What does this make Jenna?

14 Clues: The C in the ABCD's of Bullying.What is the A in the ABCD's of Bullying?What type of cyber-bullying is spreading gossip?Chase gets bullied online. What type of bullying is this?Nola gets bullied and Aiden sticks up for her. What is Aiden?Austin watches as Layla gets bullied. What does this make Austin?...

Security 2013-06-26

Security crossword puzzle
Across
  1. What must a non MSIC holder have whilst in the LRZ?
  2. What is Angela’s title other than Manager?
  3. What is the code number for a Firearm?
  4. What industry are we in?
  5. What does the T stand for in OTS?
  6. What must you display in the LRZ?
  7. What lights must be on when in the freight yard?
  8. What is the L in LRZ?
  9. Stick to what path when in the freight yard?
  10. What channel do you call for Security?
Down
  1. Who must you radio to have the gates opened/closed?
  2. Who takes passengers on/off via the buggy?
  3. What does the I stand for in MSIC?
  4. A non MSIC holder must have a what for access into the LRZ?
  5. What colour should drivers follow in the freight yard on the way in?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?Who takes passengers on/off via the buggy?What is Angela’s title other than Manager?Stick to what path when in the freight yard?...

Security 2023-08-01

Security crossword puzzle
Across
  1. I am here to protect guest and assets
  2. my favorite manager
  3. what form is needed to give funds to the bank
  4. a person must present me to get an item from lost and found
  5. one item needed to clean up bio hazard (Blood)
  6. I am not an officer, dispatcher, nor a manager, I am in between
  7. what can cause dehydration
  8. certified class to save lives
Down
  1. who is responsible for the safety of the property
  2. I am hazard for guest and team members to slip in
  3. I really run the shift, telling everyone where and when to go
  4. security must have me with them to be at work
  5. eyes in the sky
  6. age to be on the gaming floor
  7. someone must looked older than ____ to avoid being ID'd on the gaming floor

15 Clues: eyes in the skymy favorite managerwhat can cause dehydrationage to be on the gaming floorcertified class to save livesI am here to protect guest and assetssecurity must have me with them to be at workwhat form is needed to give funds to the bankone item needed to clean up bio hazard (Blood)who is responsible for the safety of the property...

Phonetic crosswords 2022-06-20

Phonetic crosswords crossword puzzle
Across
  1. ˈfjʊərɪəs
  2. ˈrəʊzə pɑːks
  3. seɪf
  4. dɑːns
  5. ˈreɪsɪzm
  6. ɪnˈtɛlɪʤənt
  7. ˌsɛgrɪˈgeɪʃən
  8. ˈhɛlθi
  9. ˈsaɪbə
  10. sɪt daʊn
Down
  1. ˈpjuːpl
  2. ˈsəʊʃəbl
  3. ˈgeɪmə
  4. ˈklɛvə
  5. smɑːt
  6. ˈtiːʧə
  7. ʃəʊ
  8. ˈɪnstəˌgræm
  9. bɔɪ
  10. ʃuː
  11. ʤɒb
  12. klɑːs

22 Clues: ʃəʊbɔɪʃuːʤɒbseɪfsmɑːtdɑːnsklɑːsˈgeɪməˈklɛvəˈtiːʧəˈhɛlθiˈsaɪbəˈpjuːplˈsəʊʃəblˈreɪsɪzmsɪt daʊnˈfjʊərɪəsɪnˈtɛlɪʤəntˈɪnstəˌgræmˈrəʊzə pɑːksˌsɛgrɪˈgeɪʃən

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. Protocol that is meant for uploading and downloading files.
  2. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  3. A bundle of programs that is designed to bombard users with advertisements.
  4. A computer program that keeps a log of your keystrokes on your keyboard.
  5. a cyber attack intended to redirect a website's traffic to another, fake site.
  6. The process by which two information systems establish a communication channel.
Down
  1. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  2. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  3. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  4. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
  5. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  6. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  7. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  8. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.

14 Clues: Protocol that is meant for uploading and downloading files.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements.a cyber attack intended to redirect a website's traffic to another, fake site....

SECURITY 2023-03-10

SECURITY crossword puzzle
Across
  1. Policy owner is an LLC, what document is required to verify authorized callers and signers?
  2. When a new party is added to a call you must announce you're on a __________.
  3. A death claim has been filed, the policy has a high risk score, you're using the primary beneficiary as your additional security question. There are multiple beneficiaries on the policy does the caller need to verify ONE or ALL?
  4. List of domain names that do not require additional security
  5. An AWS risk score of ___________ or greater is considered high risk and an additional security question must be asked.
  6. Owner calls in authenticated, _________ has to be stated on the recorded line by caller or CSR
  7. Call comes in with no whisper tone, where can you reference in AWS(softphone) whether the call is authenticated or not
Down
  1. Policy has ORD code 555, but no SA or WA, how do we verify the Managing Partner
  2. PII and/or PHI - Email Classification required to send email
  3. High Risk Trustee calls in with no policy number, they provide you with the last 4 of the owner’s TIN and AOR. You still require another piece of information to clear security. You have the options of last transaction type (payment amt and date), current premium amt and mode, or ____________. If this was a Vitality policy, you can also use their username or email address – additional information.
  4. In the event of a death claim with proper documentation on file, the beneficiary calls in authenticated, he is inquiring about if there are any additional beneficiaries on the policy. You can advise of the name of additional beneficiaries, but you cannot divulge pay out amounts (if any) or ____________.
  5. Before moving forward with security or miscellaneous policy information we should always confirm __________ and relationship to policy.
  6. You have fully verified your caller, you hear a third party in the background who has questions and offering information, before you move forward with the conversation you must get permission from the authorized caller to speak with said person. In this process you must verify who the third party is by obtaining their full name and ___________.
  7. The TTEE is fully verified, they can now receive policy specifics, they advise you they have the insureds SSN but need their DOB to complete forms. You cannot supply full SS#, DOB, or bank account info, what are you allowed to do?
  8. Published Annual Report - Email Classification required to send email

15 Clues: PII and/or PHI - Email Classification required to send emailList of domain names that do not require additional securityPublished Annual Report - Email Classification required to send emailWhen a new party is added to a call you must announce you're on a __________.Policy has ORD code 555, but no SA or WA, how do we verify the Managing Partner...

Security 2021-04-26

Security crossword puzzle
Across
  1. Network security that monitors and controls incoming and outgoing networks
  2. Accessing transmission media and using a device to intercept signals
  3. Alters a computer without the user's permission. Self-replicating and self-executing
  4. Basic unit of execution within an operating system
  5. Denial-of-service, wiretapping, viruses, worms
  6. Verification of authorisation from user accessing the system
  7. Forces victim computer to perform a task repeatedly. preventing it from doing other tasks
Down
  1. Protects systems from malicious software attacks
  2. Replicates itself to spread to other computers
  3. Located between computer and network, to intercept and verify all requests from the network.
  4. OS
  5. Requires users to enter letters of a distorted image
  6. Realistic authentication as a form of identification
  7. Adding extra random bits to encrypted passwords
  8. A virus with appearance of something useful

15 Clues: OSA virus with appearance of something usefulReplicates itself to spread to other computersDenial-of-service, wiretapping, viruses, wormsAdding extra random bits to encrypted passwordsProtects systems from malicious software attacksBasic unit of execution within an operating systemRequires users to enter letters of a distorted image...

Types of threats 2019-01-09

Types of threats crossword puzzle
Across
  1. Any software that shows adverts, such as popups.
  2. Watching an authorized user enter a security code on a keypad.
  3. An error in a program that prevents the program from running as expected.
  4. Software that encrypts programs and data until a ransom is paid to remove it.
  5. Malware that allows a cyber-security attacker to take control of an infected computer.
  6. Criminals make a promise of goods in return for details, such as offering a free music download.
  7. Horse A program that appears desirable but actually contains something harmful.
Down
  1. A type of Malware that locates and saves data from users without them knowing about it.
  2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise
  3. A piece of code that is capable of copying itself and typically has a detrimental effect
  4. An attacker entering a secured building by following an authorized employee through a secure door
  5. When someone deceives by pretending to be someone else in order to get personal data.
  6. A destructive computer program that bores its way through a computer's files or through a computer's network.
  7. Program that hides in a computer and allows someone from a remote location to take full control
  8. Malware that allows a cyber-security attacker to take control of an infected computer.

15 Clues: Any software that shows adverts, such as popups.Watching an authorized user enter a security code on a keypad.An error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.Horse A program that appears desirable but actually contains something harmful....

Unité 2- Les Technologies du Futur 2022-09-26

Unité 2- Les Technologies du Futur crossword puzzle
Across
  1. DNA
  2. discovery
  3. to treat
  4. engineer
  5. cyberbullying
  6. the peak
  7. success
Down
  1. outcome
  2. revolutionary
  3. plugged in
  4. to land
  5. astrologist
  6. to heal
  7. comedown
  8. to abandon
  9. to protect
  10. specialized
  11. survival
  12. to prove
  13. IT

20 Clues: ITDNAoutcometo landto healsuccesscomedownto treatsurvivalto proveengineerthe peakdiscoveryplugged into abandonto protectastrologistspecializedrevolutionarycyberbullying

Cyber Security Month 2021 2021-09-16

Cyber Security Month 2021 crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access
  2. after a network attack your data may be ____________
  3. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
  1. what you maintain when you dont disclose information to unathorized parties
  2. The practice of being diligent about your online activities
  3. A secret word or phrase that be used to gain access

8 Clues: A secret word or phrase that be used to gain accessafter a network attack your data may be ____________The practice of being diligent about your online activitieswhat you maintain when you dont disclose information to unathorized partiesType of software that helps protect your computer against malware and cybercriminals...

CrossWord 2024-11-15

CrossWord crossword puzzle
Across
  1. The art of disguising messages (11 letters)
  2. Testing a system’s defenses by simulating attacks (11 letters)
  3. A weakness that could allow an attacker to exploit a system (12 letters)
  4. Authentication method requiring two forms of verification (9 letters)
  5. Attack where attacker pretends to be a trusted entity (7 letters)
  6. Unauthorized entry into a system or network (7 letters)
  7. Unintentional or intentional access to sensitive data (7 letters)
  8. Malicious program that spreads across computers (5 letters)
  9. Software used to monitor and control network traffic (9 letters)
  10. Process of verifying identity (13 letters)
Down
  1. Hidden software used to maintain access on a system (8 letters)
  2. Converts plain text into an unreadable format (9 letters)
  3. A program designed to replicate itself and spread (5 letters)
  4. Type of cyber-attack where access is blocked until ransom is paid (9 letters)
  5. Technique to gain sensitive information through social interaction (10 letters)
  6. of attack where users are overwhelmed with traffic (7 letters)
  7. Protects against unauthorized access to data
  8. Unauthorized access or control over a system (4 letters)
  9. A harmful software disguised as legitimate

19 Clues: Process of verifying identity (13 letters)A harmful software disguised as legitimateThe art of disguising messages (11 letters)Protects against unauthorized access to dataUnauthorized entry into a system or network (7 letters)Unauthorized access or control over a system (4 letters)Converts plain text into an unreadable format (9 letters)...

Security 2013-06-26

Security crossword puzzle
Across
  1. What is Angela’s title other than Manager?
  2. Who takes passengers on/off via the buggy?
  3. What industry are we in?
  4. What channel do you call for Security?
  5. What is the L in LRZ?
  6. What does the T stand for in OTS?
  7. What must a non MSIC holder have whilst in the LRZ?
Down
  1. What lights must be on when in the freight yard?
  2. What does the I stand for in MSIC?
  3. Who must you radio to have the gates opened/closed?
  4. What colour should drivers follow in the freight yard on the way in?
  5. A non MSIC holder must have a what for access into the LRZ?
  6. What is the code number for a Firearm?
  7. Stick to what path when in the freight yard?
  8. What must you display in the LRZ?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What channel do you call for Security?What is the code number for a Firearm?What is Angela’s title other than Manager?Who takes passengers on/off via the buggy?Stick to what path when in the freight yard?...

Social media 2025-12-16

Social media crossword puzzle
Across
  1. bloquer
  2. un lien
  3. commenter
  4. journalier
  5. une tendance
  6. adolescent
  7. souscrire
  8. partager
  9. télécharger
  10. du contenu
  11. un compte
Down
  1. téléverser
  2. faux
  3. influenceur
  4. popularité
  5. gentilesse
  6. respect
  7. faire confiance
  8. cyber-harcèlement
  9. connecter

20 Clues: fauxbloquerun lienrespectpartagercommentersouscrireconnecterun comptetéléverserpopularitégentilessejournalieradolescentdu contenuinfluenceurtéléchargerune tendancefaire confiancecyber-harcèlement

Chapter 1 2016-06-29

Chapter 1 crossword puzzle
Across
  1. Acronym. Agency responsible for administering police-related federal grant programs
  2. Chicago's first detective and the "father" of security in the US
  3. Acronyn for the agency that administers NISP.
  4. The third leg of the security management triad
  5. Hypothesis that posits that areas of public life are now in the private domain
  6. The protection of persons or individuals
  7. Person who introduced the Metropolitan Police Act
  8. Tangible objects that protect persons and property
  9. Geographical area where able-bodied men were responsible for patrol
  10. Hypothesis that suggests that individuals engage in self-protection activities
  11. Security services to individuals and organizations for a fee
  12. Person that had the first burglar alarm patent.
  13. Created in 1952 to address issues related to national security
  14. Agency created by the Homeland Security Act of 2002.
Down
  1. Early detectives who worked for a fee
  2. Foundation of the first public police force
  3. First national study of private security in the United States
  4. Reports in 1985 and 1990 that examined the nature and extent of the private security industry in the US
  5. In-house security
  6. System where all able-bodied men were required to serve the crown
  7. An ancient sheriff.
  8. Organziationally imposed policies and procedures that provide sanctions for violations of rules.
  9. Established local responsibility for police & security-related activities
  10. Acronym related to information security
  11. Theory that explains human motivation and development
  12. Combined contract and proprietary security services
  13. Created in 1993 to oversee security in the defense industry
  14. Acronym. Certification program offered by the American Society for Industrial Security

28 Clues: In-house securityAn ancient sheriff.Early detectives who worked for a feeAcronym related to information securityThe protection of persons or individualsFoundation of the first public police forceAcronyn for the agency that administers NISP.The third leg of the security management triadPerson that had the first burglar alarm patent....

Cyber X Interior 2025-07-01

Cyber X Interior crossword puzzle
Across
  1. Malicious software that locks data and demands payment to restore access
  2. Confidentiality, Integrity, and Availability; the core principles of cyber security
  3. Having balanced proportions on opposite sides of a central line
  4. The design of spaces and products to improve comfort and efficiency
  5. An architectural and interior style characterized by pointed arches, ornate details and dramatic, dark decorative elements
  6. A drawing that shows a space as seen from above
Down
  1. The arrangement of furniture within a space or design
  2. The process of converting data into code to prevent unauthorized access
  3. A color scheme using variations of a single hue
  4. A unique alphanumeric value used to verify the integrity of digital files
  5. The practice of securing information by transforming it into unreadable formats

11 Clues: A color scheme using variations of a single hueA drawing that shows a space as seen from aboveThe arrangement of furniture within a space or designHaving balanced proportions on opposite sides of a central lineThe design of spaces and products to improve comfort and efficiencyThe process of converting data into code to prevent unauthorized access...

Cyber Wellness Crossword Challenge 2013-06-24

Cyber Wellness Crossword Challenge crossword puzzle
Across
  1. Save the ________ using screenshots when you were being cyber bullied.
  2. Cyber bullying is using the ________________or phone to repeatedly say rude and hurtful things about a person.
  3. Do not scold others online, always be ________.
  4. _________ is online manners.
  5. cyber bullying can ______ people’s feelings as they will feel sad
Down
  1. be _____for your words and actions online because you may hurt others.
  2. Do not __________bad and hurtful things online.
  3. Do not write in_____letters when texting to other because they may think that you are shouting.
  4. When you are being cyber bullied, ________ the incident.

9 Clues: _________ is online manners.Do not __________bad and hurtful things online.Do not scold others online, always be ________.When you are being cyber bullied, ________ the incident.cyber bullying can ______ people’s feelings as they will feel sadbe _____for your words and actions online because you may hurt others....

Cyber Bullying 2021-04-26

Cyber Bullying crossword puzzle
Across
  1. (3words)A support line for kids, the phone number is: 1800 55 1800.
  2. Trisha Prabhu designed this app to prevent cyber bullying.
  3. 1 in 5 _____ young people have reported being cyber bullied.
  4. bullying online is easier because then they can remain _____.
Down
  1. True or false: You can go to the police if the cyber bullying is bad enough
  2. Cyber bullying can effect someone mentally, emotionally and ______.
  3. Cyberbullying is using ______ as a platform to bully and hurt people.
  4. This organisation defines cyber bullying as a form of bullying through digital technology.

8 Clues: Trisha Prabhu designed this app to prevent cyber bullying.1 in 5 _____ young people have reported being cyber bullied.bullying online is easier because then they can remain _____.(3words)A support line for kids, the phone number is: 1800 55 1800.Cyber bullying can effect someone mentally, emotionally and ______....

ABC Team Crossword 2022-12-29

ABC Team Crossword crossword puzzle
Across
  1. What state did Marquis recently visit?
  2. How Many budgies does Ifaz have?
  3. What city did Cody catch up with his brother in?
  4. What essential oil is used for relaxation during the yoga sessions?
  5. What creature does Isaac use to indicate his mood?
  6. Who is Gini's favorite Guardian of the Galaxy?
  7. What is the surname of the man at HBR who Scott shared a clip this month talking about leadership?
  8. What Apple TV show does Scott quote from?
  9. What is the title name of the group that make the cyber security training videos?
Down
  1. What is the name of Jonathans newest family member?
  2. What is the name of Gini's dog?
  3. How many members are there in the ZABC Slack Channel?
  4. What animal is Quinn?
  5. What age did Pricilla's father-in-law celebrate this year?
  6. Who is learning Romanian?
  7. Who did Christopher dress up as for halloween?
  8. What state did Julia visit this autumn?
  9. Who in the team is Elvis' number one fan?
  10. What is Emma's cat called?

19 Clues: What animal is Quinn?Who is learning Romanian?What is Emma's cat called?What is the name of Gini's dog?How Many budgies does Ifaz have?What state did Marquis recently visit?What state did Julia visit this autumn?Who in the team is Elvis' number one fan?What Apple TV show does Scott quote from?Who did Christopher dress up as for halloween?...

E-Safety Year 7 2021-10-04

E-Safety Year 7 crossword puzzle
Across
  1. an image that you will see on a website to show that your site is secure
  2. Everyone that uses the Internet will have one of these types of print
  3. A ........ horse presents itself as a harmless program which contains hidden malicious code
  4. Software that gathers information about a person without their consent
  5. A software that replicates itself
  6. Is a cyber attack intended to redirect a website's traffic to another, fake site.
  7. This is another word for program
  8. ........... engineering is an attack that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Down
  1. A technique of fraudulently obtaining private information, often using email or SMS.
  2. The use of technology to harass someone
  3. Is an umbrella term that covers malicious software that will corrupt your computer
  4. What you should do if you come across offensive, uncomfortable or inappropriate content
  5. One of the 5 Ps
  6. Examines ingoing and outgoing traffic

14 Clues: One of the 5 PsThis is another word for programA software that replicates itselfExamines ingoing and outgoing trafficThe use of technology to harass someoneEveryone that uses the Internet will have one of these types of printSoftware that gathers information about a person without their consent...

TecNova Set-1 2021-09-17

TecNova Set-1 crossword puzzle
Across
  1. To Measure Voltage or Potential Difference
  2. Type of Security for Computers and Networks
Down
  1. This Engineer work at places like Google&Apple Like Company.
  2. A Human Colony on the moon would be planned by these types of Engineers
  3. Converts Electrical Energy into Sound Energy

5 Clues: To Measure Voltage or Potential DifferenceType of Security for Computers and NetworksConverts Electrical Energy into Sound EnergyThis Engineer work at places like Google&Apple Like Company.A Human Colony on the moon would be planned by these types of Engineers

Xantaro crossword 2025-05-08

Xantaro crossword crossword puzzle
Across
  1. Software designed to manage, monitor, and optimise telecommunications infrastructure.
  2. Protecting data and infrastructure from cyber threats and unauthorised access.
  3. Facility used to store and manage large volumes of digital data.
  4. Telecom equipment company, known for routers and switches, headquartered in California.
  5. The combining of two or more telecom networks into one unified system.
  6. Finnish company known for telecom equipment and mobile phone manufacturing.
  7. Fundamental communication protocol used for routing data across networks.
Down
  1. The part of a telecom network connecting the customer to the service provider.
  2. Refers to high-speed communication using light signals through fibre cables.
  3. Outdoor enclosure housing network equipment for telecom service delivery.
  4. Outsourced service for monitoring and defending network security in real time.
  5. Facility providing remote monitoring and management of network systems 24/7.

12 Clues: Facility used to store and manage large volumes of digital data.The combining of two or more telecom networks into one unified system.Outdoor enclosure housing network equipment for telecom service delivery.Fundamental communication protocol used for routing data across networks....

Xantaro crossword 2025-05-08

Xantaro crossword crossword puzzle
Across
  1. Facility providing remote monitoring and management of network systems 24/7.
  2. Outdoor enclosure housing network equipment for telecom service delivery.
  3. Protecting data and infrastructure from cyber threats and unauthorised access.
  4. The combining of two or more telecom networks into one unified system.
  5. Finnish company known for telecom equipment and mobile phone manufacturing.
Down
  1. Refers to high-speed communication using light signals through fibre cables.
  2. The part of a telecom network connecting the customer to the service provider.
  3. Facility used to store and manage large volumes of digital data.
  4. Software designed to manage, monitor, and optimise telecommunications infrastructure.
  5. Outsourced service for monitoring and defending network security in real time.
  6. Telecom equipment company, known for routers and switches, headquartered in California.
  7. Fundamental communication protocol used for routing data across networks.

12 Clues: Facility used to store and manage large volumes of digital data.The combining of two or more telecom networks into one unified system.Outdoor enclosure housing network equipment for telecom service delivery.Fundamental communication protocol used for routing data across networks....

FITEVocab.sr 2013-05-16

FITEVocab.sr crossword puzzle
Across
  1. Hardware box that contains all the hardware
  2. A server that allows a user to store and create files
  3. Online in general
  4. All the wires
  5. A file that you can type on
  6. A thing that businesses make to attract people
  7. Short term memory
  8. A cellular portable gizmo
  9. the arrangement of words
  10. The place where you plug in your earbuds or headphones
  11. A device that does not need a outlet
  12. A phrase to attract people
  13. When you give credit to the websites you got the info from
  14. 2nd smallest unit of data
  15. Protecting yourself from danger online
  16. 5th smallest unit of data
  17. 4th smallest unit of data
  18. Your long term memory
  19. National Cyber Security Alliance
  20. Where you insert your disc to get it in your computer
  21. A computer that gives data to other computers
  22. something a business does to get someone to buy their product
  23. A download that you use
  24. When something is upgraded to a higher position
  25. A item you put in your computer
Down
  1. A tool that helps you find websites
  2. host Allows people to make their own website
  3. Central Processing Unit/ speed of your computer
  4. A item that you take out of your computer
  5. The main part of your computer that runs the whole computer
  6. Liquid Crystal Display/Light Emitting Diode
  7. smallest unit of data
  8. A peripheral that moves the arrow on the screen computer screen
  9. A better than average search engine
  10. what the words look like
  11. 3rd smallest unit of data
  12. 6th smallest unit of data
  13. anything on the internet
  14. A visual sign to attract people
  15. the slots that you need to upgrade your computer
  16. Being free from danger online
  17. A item that you plug into your computer
  18. A program that you can save
  19. Your actions online
  20. To start to the point you stopped

45 Clues: All the wiresOnline in generalShort term memoryYour actions onlinesmallest unit of dataYour long term memoryA download that you usethe arrangement of wordswhat the words look likeanything on the internetA cellular portable gizmo3rd smallest unit of data6th smallest unit of data2nd smallest unit of data5th smallest unit of data...

CyberCrime Crossword 2022-12-29

CyberCrime Crossword crossword puzzle
Across
  1. An agency that strengthens the existing anti-money laundering and counter-terrorism policies by the EU.
  2. A ransomware gang that the $50m ransom demand made against PC company Acer.
  3. One of 2021’s much impactful emergent ransom crews originated in September.
  4. A security Camp supported by the NSA being largest girls-only residential camp in the country.
  5. In this cybercrime, hackers pose as vendors, suppliers, or customers, they are able to hijack money exchanges and redirect those to their own accounts.
  6. A tool developed by Symantec comes with cloud-based analytics that automatically adapts to new attack tactics by delivering continuous attack detection, plus the ongoing addition of new attack analytics.
  7. A family of encrypting ransomware that infects the master boot record.
  8. Cyber-safety and cybersecurity awareness handle maintained by Ministry of Home Affairs, Government of India.
  9. The first person ever to be convicted for committing a cybercrime hacked which organization?
  10. A defense practice that aims to lure attackers by distributing a collection of traps and decoys across a network.
  11. Identify and track the origin of data, software, and/or hardware elements.
Down
  1. Born in 1847 and made use of scientific study to head criminal investigations.
  2. Space Layout Randomization) used in cybercrime investigation.
  3. a tool that supports KASLR (Kernel
  4. A cybercrime in which a person or entity intentionally misappropriates the assets entrusted to them.
  5. it is tool being developed to allow authorities visual access to hidden files on the Xbox hard drive.
  6. It is a technique used to consistently trick an adversary during a cyber-attack.
  7. The first computer virus was created for research purposes was named _____.
  8. An attacker that can give attackers remote access to a corporate environment, which leads to network search of intellectual properties or cryptolock systems.
  9. India’s first woman cybercrime investigator.
  10. A cybercrime in which another party's computing resources are hijacked to mine cryptocurrency.
  11. A compromised computer under the control of an attacker used to perform malicious attacks.
  12. info that can be of vital importance to the outcome of legal proceedings or investigations.

23 Clues: a tool that supports KASLR (KernelIndia’s first woman cybercrime investigator.Space Layout Randomization) used in cybercrime investigation.A family of encrypting ransomware that infects the master boot record.Identify and track the origin of data, software, and/or hardware elements....

ISMS 2024-10-07

ISMS crossword puzzle
Across
  1. The process of encoding information to protect its confidentiality and integrity
  2. Removal of existing security threats
  3. Physical components used to secure information and devices
  4. Information assets and data needing protection
  5. Measures to avoid potential security threats
  6. Protection of intellectual property rights
  7. Identification of threats as they arise
  8. Engineering-based security solutions for information protection
  9. The principle focused on protecting personal, organizational, or state-related secrets
  10. A digital tool used to verify the authenticity of a document's sender
Down
  1. Programs designed to secure information within computer systems
  2. The continuous practice of monitoring, updating, and enhancing security protocols
  3. The process of assessing vulnerabilities and threats to information systems
  4. A mechanism to confirm a user's identity in a computer system
  5. The trustworthiness and dependability of security measures
  6. Type of security protection involving physical barriers and equipment
  7. Returning systems to their state prior to a security breach
  8. Type of security measure involving compliance with laws
  9. Potential event or action that could compromise information security
  10. Assessment and processing of information to predict and prevent criminal actions
  11. Allowing authorized users to retrieve necessary information

21 Clues: Removal of existing security threatsIdentification of threats as they ariseProtection of intellectual property rightsMeasures to avoid potential security threatsInformation assets and data needing protectionType of security measure involving compliance with lawsPhysical components used to secure information and devices...

Module 3: Data Safety and Security 2020-01-28

Module 3: Data Safety and Security crossword puzzle
Across
  1. User who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
  2. Program that secretly collects information about the user and send the gathered information to the outside source while the user is online.
  3. A kind of malware that replicates itself causing a computer to shutdown
  4. Small text file that contains data about the user and his/her viewing preferences a web server stores on the computer.
  5. Computer enthusiast who accesses a computer or network illegally and claim the intent of his/her security breaches.
  6. Cyber __________ are perpetrators who demand payment to stop an attack on an organization’s technology infrastructure.
  7. a kind of malware that alters how computer works
  8. A program that performs repetitive task on a network.
Down
  1. Software ________ refers to unauthorized and illegal duplication of copyrighted software.
  2. is the process of converting data that is readable by humans into ciphertext to prevent unauthorized access.
  3. Cyber __________ an attack whose goal ranges from disabling a government’s computer network to crippling a country
  4. a technique that intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  5. An image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.
  6. A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
  7. a kind of malware that displays online advertisement in a form of a banner or pop-ups

15 Clues: a kind of malware that alters how computer worksA program that performs repetitive task on a network.A kind of malware that replicates itself causing a computer to shutdowna kind of malware that displays online advertisement in a form of a banner or pop-upsSoftware ________ refers to unauthorized and illegal duplication of copyrighted software....

Metaverse world 2022-01-03

Metaverse world crossword puzzle
Across
  1. investors who have a lot of money are very ........
  2. Roblox is a ......... for thousands of individual games connected to the larger ecosystem.
  3. VR stands for Virtual ..........
  4. all transaction data from Bitcoin are secured in the ........
  5. The programmer is trying to fix the ....... of his program.
Down
  1. People will have a 3D ......... representing themselves in the digital world
  2. The headsets produced by Facebook to enjoy many digital entertainments
  3. This program is made to be a ............ware that asks the victim some amount of money.
  4. ......... security has been very important because it deals with people's privacy.
  5. This device is so popular because of its .....-end specification.
  6. A lot of interested businessmen are willing to ........... their money on this future project

11 Clues: VR stands for Virtual ..........investors who have a lot of money are very ........The programmer is trying to fix the ....... of his program.all transaction data from Bitcoin are secured in the ........This device is so popular because of its .....-end specification.The headsets produced by Facebook to enjoy many digital entertainments...

Unité 2- Les Technologies du Futur 2022-09-26

Unité 2- Les Technologies du Futur crossword puzzle
Across
  1. DNA
  2. discovery
  3. to treat
  4. engineer
  5. cyberbullying
  6. the peak
  7. success
Down
  1. outcome
  2. revolutionary
  3. plugged in
  4. to land
  5. astrologist
  6. to heal
  7. comedown
  8. to abandon
  9. to protect
  10. specialized
  11. survival
  12. to prove
  13. IT

20 Clues: ITDNAoutcometo landto healsuccesscomedownto treatsurvivalto proveengineerthe peakdiscoveryplugged into abandonto protectastrologistspecializedrevolutionarycyberbullying

Information Security 2021-07-12

Information Security crossword puzzle
Across
  1. when user access certain website small files downloaded on to the computer
  2. is also a malware that does damaging activity on an infected computer
  3. secretly listening to a conversation
  4. a piece of software code created to perform malicious activities
  5. it is a network security system designed to protect a trusted private network from unauthorized access
  6. the main purpose of this is to record the key pressed by user on the keyboard
Down
  1. cyber crimes like harassment and stalking through mobile phones or the internet
  2. the short term used for malicious software
  3. it block the user to access his own data and give threats
  4. is the practice of sending fraudulent communication that appear to come from a reputable source
  5. this creates unnecessary junk in receiver's email

11 Clues: secretly listening to a conversationthe short term used for malicious softwarethis creates unnecessary junk in receiver's emailit block the user to access his own data and give threatsa piece of software code created to perform malicious activitiesis also a malware that does damaging activity on an infected computer...

FITAVocab.TW 2013-05-15

FITAVocab.TW crossword puzzle
Across
  1. a letter that gives information about you
  2. a sign or symbol a business makes for advertising
  3. wired internet
  4. a program that is one canvas that moves around
  5. second smallest piece of data
  6. a piece of paper that says basic points about your business
  7. ex:Iphone
  8. another term for monitor
  9. the part of a computer that makes it work
  10. a search engine that combines results from multiple search engines
  11. a way to save files over the web
  12. the programs on your computer used to make it run
  13. National Cyber Security Alliance
  14. ex:Windows 7, IOS 6
  15. a file format that gives an electronic image
  16. able to work together
  17. a type of clock that uses numbers to tell time
  18. being safe on the web
  19. the area that you make a prezi on
  20. the circuits and motherboard inside of the computer
  21. the way you act and behave online
Down
  1. universal serial bus
  2. sending information into a modem
  3. an extra for a computer
  4. central processing unit
  5. fourth smallest piece of data MB
  6. sending information out from a modem
  7. Who is asking Why are they asking What are they asking for?
  8. ex:Google
  9. a small speech given by someone before they become president
  10. internet service provider
  11. the amount of data a router can process at once
  12. fifth smallest piece of data GB
  13. a type of clock that uses hand to tell time
  14. rich text format
  15. another name for tower
  16. programs that do a task
  17. third smallest piece of data KB
  18. being secure on the web
  19. service set
  20. sixth smallest piece of data TB
  21. smallest piece of data
  22. wireless local area network
  23. a prefix that means "on the web"
  24. random access memory
  25. a phrase a business makes for advertising

46 Clues: ex:Googleex:Iphoneservice setwired internetrich text formatex:Windows 7, IOS 6universal serial busrandom access memoryable to work togetherbeing safe on the webanother name for towersmallest piece of dataan extra for a computercentral processing unitprograms that do a taskbeing secure on the webanother term for monitorinternet service provider...

Prep 2025-05-05

Prep crossword puzzle
Across
  1. A regulation to protect Personal Health Information.
  2. SIEM engine that gathers logs from security devices.
  3. Mimicking a switch to gain trunk link access (Two words, no space)
  4. Network strategy for high availability
  5. Password attack uses wordlist.
  6. An intrusive vulnerability scan used to find deep-level vulnerabilities on a host.
  7. They can store keyboard keystrokes.
  8. Streams of updated threat information (Two words, no space)
  9. Science of analyzing digital evidence (Two words, no space)
  10. A software designed to collect security logs
  11. Maximum acceptable data loss
  12. Intrusion Prevention System (Three letters)
  13. Security alerts, and announcements
  14. NAC component enforcing security requirements
  15. Evidence of malicious activity
  16. Site redudncnacy without active equipment
  17. A password hacking tool.
  18. Incident response strategy to isolate the damage.
  19. Incorrectly identifying harmless traffic as malicious (Two words, no space)
  20. Has the third priority in incident data capture volatility.
  21. Network isolation technique (Two words, no space)
  22. Used to prioritize the vulnerabilities.
  23. Controlling the network access mechanism on a router, MLS or firewall
  24. Physical security control with interlocking doors
  25. Data security technique focusing on hiding original values
  26. Stores configuration objects in an AD
  27. Science of analyzing digital evidence (Two words, no space)
  28. Web attack injecting malicious scripts
  29. Ensuring message origin cannot be denied
  30. Rapidly depleting IP addresses from a server (Two words, no space)
  31. Attack exploiting excessive data input in memory (Two words, no space)
  32. System logging protocol
  33. These log types are used to identify VOIP-related events.
  34. Secure storage for original payment account numbers
  35. Acceptable downtime after an incident
  36. A command used to crack a hashed password.
  37. Pretending to be the root to manipulate the spanning tree (Three words, no space)
  38. Detection system for a network
  39. Good backup solution if RTO is not the objective.
  40. Document defining the targets and objectives of pentesting.
  41. Plan for business continuity after a major disruption (Two words, no space)
  42. Contains a series of instructions that the machine performs to respond to incidents.
  43. Distrupting the network resources. Making them unavailable.
  44. Vulnerability scan that actively probes systems
  45. Contains routing and sender information of an email (metadata)
  46. Security control to fix vulnerabilities
  47. A tool or software used to prevent changes from being accidentally made to the storage device.
  48. Hypothetical scenario discussion and exercise in the IRP prep phase
Down
  1. Urgent software update
  2. Organized approach to handling security breaches (Two words, no space)
  3. Unauthorized act of transferring data from a system to another.
  4. Switch feature to validate ARP packets
  5. Correctly identifying malicious traffic (Two words, no space)
  6. Software on an endpoint that assists with compliance checks (Two words, no space)
  7. A password policy for strong user credentials
  8. Correctly identifying harmless traffic as harmless (Two words, no space)
  9. Wireshark is under this tool classification (Two words, no space)
  10. Collaborative sharing of cyber threat information (Two words, no space)
  11. Documenting evidence handling (Three words, no space)
  12. Exploiting VLAN misconfigurations for unauthorized access (Two words, no space)
  13. This file identifier is used for backups.
  14. These log types are used to identify incidents.
  15. Ethical Hacking test with no prior system knowledge (Two words, no space)
  16. Detection system designed for end devices
  17. This type of backup has the lowest RTO but higher storage usage
  18. Gathering information about a target
  19. Ethical Hacking test with complete system knowledge
  20. Attack simulation team in Pentesting
  21. NMAP scan that uses the (-sX) switch.
  22. Adding random data to password hashes
  23. Falsified messages link attacker's MAC and IP (Three words, no space)
  24. Security control to identify incidents
  25. This table contains a series of calculated hash values.
  26. Process of bringing non-compliant devices up to standard
  27. A disk redundancy technique.
  28. This account policy is an online brute-force saver.
  29. System to prevent sensitive data from leaving
  30. A security incident response tool.
  31. These logs contain all the OS related events.
  32. Security feature to prevent rogue DHCP servers (Two words, no space)
  33. Server that redirects malicious DNS requests, mainly used to pinpoint a compromised machine. (Two words, no space)
  34. Attack exploiting address resolution protocol (Two words, no space)
  35. Deceptive network to attract attackers
  36. A popular vulnerability scanner
  37. A temporary power backup solution.
  38. Recovering data from unallocated disk space (Two words, no space)
  39. Data subject to local laws (Two words, no space)
  40. Replacing sensitive payment data with unique identifiers (Two words, no space)
  41. Process of updating systems to fix flaws (Two words, no space)
  42. Failing to detect malicious traffic (Two words, no space)
  43. Identifying and evaluating potential threats (Two words, no space)
  44. This SIEM Component analyzes security logs
  45. The first storage area captured during forensics analysis.
  46. Requirement for protecting primary account numbers

94 Clues: Urgent software updateSystem logging protocolA password hacking tool.Maximum acceptable data lossA disk redundancy technique.Password attack uses wordlist.Evidence of malicious activityDetection system for a networkA popular vulnerability scannerSecurity alerts, and announcementsA security incident response tool.A temporary power backup solution....

Cyber Security 2022-11-23

Cyber Security crossword puzzle
Across
  1. it is software that scans any file that is able to execute code.
  2. is the term for when human users of a system are tricked into providing confidential information?
Down
  1. refers to software that automatically checks for available updates for the software you have on your computer.
  2. it scans the data to make sure it doesn’t contain anything malicious and that it follows the rules set by the network.

4 Clues: it is software that scans any file that is able to execute code.is the term for when human users of a system are tricked into providing confidential information?refers to software that automatically checks for available updates for the software you have on your computer....

Cyber Security 2026-01-03

Cyber Security crossword puzzle
Across
  1. Dalam konsep CIA Triad, aspek yang menjamin bahwa data hanya boleh diakses oleh orang yang memiliki izin disebut
  2. Seorang hacker berhasil masuk ke database sekolah dan mengubah nilai rapor siswa dari 70 menjadi 90. Aspek keamanan mana yang telah dilanggar?
Down
  1. Serangan siber yang bertujuan untuk menimbulkan ketakutan, kepanikan, atau teror kepada kelompok tertentu disebut
  2. Apa nama program berbahaya yang mengunci/menyandera data korban dan meminta uang tebusan untuk membukanya kembali

4 Clues: Dalam konsep CIA Triad, aspek yang menjamin bahwa data hanya boleh diakses oleh orang yang memiliki izin disebutSerangan siber yang bertujuan untuk menimbulkan ketakutan, kepanikan, atau teror kepada kelompok tertentu disebutApa nama program berbahaya yang mengunci/menyandera data korban dan meminta uang tebusan untuk membukanya kembali...

Cybersecurity Training Activity 2024-01-30

Cybersecurity Training Activity crossword puzzle
Across
  1. A software used to disable user access to their files until they pay the cybercriminal
  2. An extra layer of security on applications containing sensitive data
  3. A legislation that governs the handling of personal data(2 words and year)
  4. The field of encrypting information so only authorised people can access it
  5. When an individual or organisations private information is leaked(2 words)
  6. A framework outlining standards and best practices for cybersecurity
Down
  1. Where a cybercriminal gets access to your personal details and impersonates you to do malicious activities(2 words)
  2. A software used to harm computer systems or networks
  3. A regulatory body for cybersecurity
  4. A copy of sensitive data for redundancy to safeguard against cyber attacks
  5. Where cybercriminals trick you into giving them sensitive information.

11 Clues: A regulatory body for cybersecurityA software used to harm computer systems or networksAn extra layer of security on applications containing sensitive dataA framework outlining standards and best practices for cybersecurityWhere cybercriminals trick you into giving them sensitive information....

ETHICS IN NURSING - Ayanda , Mutsa and Emmaculate 2024-05-29

ETHICS IN NURSING - Ayanda , Mutsa and Emmaculate crossword puzzle
Across
  1. data - 3rd way cybersecurity can help in the nursing medical field?
  2. -3rd code of ethics in the medical profession found through cybersecurity
  3. - 1st way cybersecurity can help in the nursing medical field?
  4. care-2nd way cybersecurity can help in the nursing medical field?
  5. Ethical principles of doing good or acting in the best interest of patient
  6. what are ethical guidelines in cybersecurity in Poland?
Down
  1. Right of competent adults to take informed decisions about their own medical care
  2. - A set of moral values and norms guiding individuals,communities and organisations behaviours
  3. Security Accuracy-3 cyber ethics
  4. -1st code of ethics in the medical profession found through cybersecurity
  5. -2nd code of ethics in the medical profession found through cybersecurity

11 Clues: Security Accuracy-3 cyber ethicswhat are ethical guidelines in cybersecurity in Poland?- 1st way cybersecurity can help in the nursing medical field?care-2nd way cybersecurity can help in the nursing medical field?data - 3rd way cybersecurity can help in the nursing medical field?...

DATA PRIVACY 2025-01-23

DATA PRIVACY crossword puzzle
Across
  1. A security system designed to block unauthorized access to a network.
  2. Free from danger or threat, especially in the context of data.
  3. The right of individuals to control their personal information.
  4. The process of verifying the identity of a user.
  5. A small file stored on a user’s device by a website to track preferences.
Down
  1. A method of converting data into a coded form to prevent unauthorized access
  2. A type of cyber attack that tricks users into revealing sensitive information.
  3. A secret string of characters used to gain access to a system.
  4. Software designed to damage or disrupt a computer system.
  5. Someone who gains unauthorized access to data or systems.
  6. The state of being unknown or unidentifiable online.

11 Clues: The process of verifying the identity of a user.The state of being unknown or unidentifiable online.Software designed to damage or disrupt a computer system.Someone who gains unauthorized access to data or systems.Free from danger or threat, especially in the context of data.A secret string of characters used to gain access to a system....

Cyber Addiction 2023-04-12

Cyber Addiction crossword puzzle
Across
  1. He has a gaming o________
  2. Playing too much games can be harmful to your h_____
  3. Playing games in front of the c________ without resting for long hours
  4. We can search for anything on the I_______
  5. The c_________ is not a save place for young children
  6. Do not waste your youth g_____
Down
  1. Cyber A________ disorder is excessive computer use that interferes with daily life
  2. Whenever he needs information, he goes o_____ to surf the web for answers
  3. The e______ of cyber addiction is serious
  4. E_________ is a far better than going on the internet
  5. Cyber Addiction is h______ to you

11 Clues: He has a gaming o________Do not waste your youth g_____Cyber Addiction is h______ to youThe e______ of cyber addiction is seriousWe can search for anything on the I_______Playing too much games can be harmful to your h_____E_________ is a far better than going on the internetThe c_________ is not a save place for young children...

Cybersecurity Crossword 2024-10-30

Cybersecurity Crossword crossword puzzle
Across
  1. Hardware or software designed to prevent unauthorized access to or from a private network.
  2. National Cyber Security Awareness month is observed during _______ month
  3. Cross-layered detection and response that collects and correlates data across multiple security layers
Down
  1. Set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: National Cyber Security Awareness month is observed during _______ monthHardware or software designed to prevent unauthorized access to or from a private network.Malicious software designed to block access to a computer system until a sum of money is paid....

TECHNICAL QUIZ 2023-01-30

TECHNICAL QUIZ crossword puzzle
Across
  1. operator is used for concise conditional expressions in Python
  2. Code automatically executed in response to an event
  3. Process of organizing data into separate tables
  4. the main loop construct in Python
  5. software that is designed to harm computer systems and networks
  6. process of converting plain text into unreadable text to protect it
  7. a popular web framework for Python
Down
  1. main advantage of using a DBMS over traditional file-based systems
  2. A class that defines a set of methods to be implemented by other classes
  3. way to reuse code in multiple classes
  4. A way to perform the same action in different ways
  5. Discovering hidden patterns and relationships in data
  6. identifier for each record in a table
  7. Java program that runs on a server and generates dynamic web pages
  8. / Data structure used to speed up searching and sorting
  9. hardware device that prevents firewall/unauthorized access to a computer system in cyber security

16 Clues: the main loop construct in Pythona popular web framework for Pythonway to reuse code in multiple classesidentifier for each record in a tableProcess of organizing data into separate tablesA way to perform the same action in different waysCode automatically executed in response to an eventDiscovering hidden patterns and relationships in data...

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. Protocol that is meant for uploading and downloading files.
  2. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
  3. A computer program that keeps a log of your keystrokes on your keyboard.
  4. The process by which two information systems establish a communication channel.
  5. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  6. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  7. A bundle of programs that is designed to bombard users with advertisements.
Down
  1. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  2. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  3. a cyber attack intended to redirect a website's traffic to another, fake site.
  4. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  5. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  6. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  7. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  8. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

15 Clues: Protocol that is meant for uploading and downloading files.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements.a cyber attack intended to redirect a website's traffic to another, fake site....

PPKN 2023-01-25

PPKN crossword puzzle
Across
  1. 12
  2. 10
  3. 2
  4. 9
  5. 14
  6. 13
  7. 6
  8. 11
Down
  1. 8
  2. 5
  3. 3
  4. 4
  5. 7
  6. 1
  7. 15

15 Clues: 853249716121014151311

icebreaker 2026-01-31

icebreaker crossword puzzle
Across
  1. the right of people to act speak and live without oppression or unfair control.
  2. the condition where there is no war or violence between nations or people.
  3. a serious disagreement or struggle between groups or nations that can lead to violence if not resolved.
  4. the state in which a country or individuals are safe and protected from threats not only military threats but also economic cyber and social threats.
  5. confidence in the honesty reliability and intentions of other people or countries which is essential for diplomacy.
  6. the condition in which a country is politically economically and socially steady allowing people to live well.
  7. the actions taken to defend people borders and resources from harm or threats.
Down
  1. the act of countries working together to solve shared problems such as climate change pandemics and economic crises.
  2. the duty of governments or individuals to act in the interest of peace security and the common good.
  3. the ability of a country to influence decisions control resources or affect the actions of other countries.
  4. the state of being united as one country or group especially during problems or crises.
  5. the peaceful way countries communicate negotiate and maintain relationships to avoid war.

12 Clues: the condition where there is no war or violence between nations or people.the actions taken to defend people borders and resources from harm or threats.the right of people to act speak and live without oppression or unfair control.the state of being united as one country or group especially during problems or crises....

Newton Division Teams 2023-04-14

Newton Division Teams crossword puzzle
Across
  1. Wildcat Robotics
  2. Bobcat Robotics
  3. SAKURA Tempesta
  4. WorBots
  5. Arborbotics
  6. Automation Nation
  7. MARS/ WARS
  8. SPARC
  9. Future Martians
  10. Under Control
  11. 10 Factorial
  12. Superior Roboworks
  13. Milwaukee Cyber Cheese
  14. Lutheran Roboteers
  15. "The Green Machine"
  16. RoboBlazers
  17. Apophis
  18. RoboJackets
  19. AIM ⛟ Robotics
  20. Andromeda One
  21. Garrett Coalition (GaCo)
  22. The MilkenKnights
  23. Beşiktaş Rsports
  24. The Hi Fives
  25. MORT
  26. MecHack
  27. Newton²
  28. Panther Robotics
  29. Team SCREAM
  30. Children of the Swamp
  31. TRIGON
  32. Webb Robotics
  33. Blaze Robotics
  34. SWLA Tech Pirates
  35. Bionics
  36. TAN(X)
  37. Martians
  38. The Robobots
  39. The Dirty Mechanics
  40. Gators
  41. Lo-Ellen Robotics
Down
  1. Eco Robotics
  2. Silver Hawks
  3. CyberTooth
  4. Robo'Lyon
  5. NoktaParantez
  6. Black Unicorns
  7. Team THRUST
  8. Wolverines
  9. Pitt Pirates
  10. Prepa Tecmilenio PINK HAWKS
  11. O.G.R.E. (Opelika's Greatest Robotics Engineers)
  12. Hicksville J-Birds
  13. RoboLoCo
  14. Cyber Vipers
  15. The Cheetahs
  16. CV Robotics
  17. OTTO
  18. Wolverines
  19. Titans
  20. Wavelength
  21. CyberKnights
  22. Team Rewind
  23. The Holy Cows
  24. Gigawatts
  25. Tronic Titans
  26. Bedford Express
  27. The S.S. Prometheus
  28. PrepaTec - LamBot
  29. Octobots
  30. Cyber Tigers
  31. TORCH
  32. EagleBots
  33. The Falcons
  34. Critical Circuits
  35. Frog Force
  36. The Zebracorns

77 Clues: OTTOMORTSPARCTORCHTitansTRIGONTAN(X)GatorsWorBotsApophisMecHackNewton²BionicsRoboLoCoOctobotsMartiansRobo'LyonGigawattsEagleBotsCyberToothMARS/ WARSWolverinesWolverinesWavelengthFrog ForceArborboticsTeam THRUSTCV RoboticsRoboBlazersRoboJacketsTeam RewindTeam SCREAMThe FalconsEco RoboticsSilver HawksPitt Pirates10 FactorialCyber VipersThe Cheetahs...

Cyber Risk & Reg 2023-04-24

Cyber Risk & Reg crossword puzzle
Across
  1. Revenue $2.2B ​
  2. Number of Platforms
  3. CR&R Platform Leader
  4. prevent business disruptions & create strategic advantages
  5. Unlock the value of ____ in a secure and ethical manner
  6. CR&R aims to prevent business __________
Down
  1. Financial _____ Prevents & detects suspicious financial threats & activities​
  2. Cyber, Risk & _________
  3. _______& Forensics Responds confidently to regulatory and unplanned events​
  4. Financial Crimes Leader
  5. Defense & Engineering
  6. Trust Solutions Sectors

12 Clues: Revenue $2.2B ​Number of PlatformsCR&R Platform LeaderDefense & EngineeringCyber, Risk & _________Financial Crimes LeaderTrust Solutions SectorsCR&R aims to prevent business __________Unlock the value of ____ in a secure and ethical mannerprevent business disruptions & create strategic advantages...

FIRST ROUND 2025-09-16

FIRST ROUND crossword puzzle
Across
  1. Malicious software designed to harm or exploit computer systems
  2. Malware disguised as legitimate software, used to gain unauthorized access
  3. The process of converting data into a coded form to prevent unauthorized access
  4. A type of cyber attack where attackers trick users into revealing sensitive information
Down
  1. The process of verifying the identity of a user or device
  2. A network security system that monitors and controls incoming and outgoing traffic
  3. Copying data to prevent loss in case of system failure or attack
  4. A type of malware that can replicate itself and spread to other computers

8 Clues: The process of verifying the identity of a user or deviceMalicious software designed to harm or exploit computer systemsCopying data to prevent loss in case of system failure or attackA type of malware that can replicate itself and spread to other computersMalware disguised as legitimate software, used to gain unauthorized access...

Cyber Security 2020-06-07

Cyber Security crossword puzzle
Across
  1. action to stop a malware
Down
  1. i am not a mac
  2. i don't do handshakes
  3. Confidentiality! Integrity!

4 Clues: i am not a maci don't do handshakesaction to stop a malwareConfidentiality! Integrity!