cyber security Crossword Puzzles

Priya's NWEG Crossword Puzzle 2023-08-29

Priya's NWEG Crossword Puzzle crossword puzzle
Across
  1. Converting data into a secure code to prevent unauthorized access during transmission.
  2. Devices that direct data packets between networks, determining optimal paths for transmission.
  3. Verifying the identity of users, devices, or systems accessing the network.
  4. The ability of a network to handle increased traffic and growth without performance degradation.
  5. The flow of data packets through a network, varying in volume and type.
  6. The speed, efficiency, and effectiveness of network operations and data transmission.
  7. The ability of devices to establish and maintain connections within a network.
Down
  1. The time delay between sending and receiving data across a network, affecting response time.
  2. Establishes secure connections over public networks, ensuring privacy.
  3. The underlying framework and components that support network operations.
  4. Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
  5. The consistency and stability of network operations and services.
  6. Converting data into a secure code to prevent unauthorized access during transmission.
  7. Duplication of critical network components to ensure availability in case of failures.
  8. The capacity of a network to transmit data quickly, often measured in bits per second.
  9. Security devices that control incoming and outgoing network traffic based on predefined rules.
  10. Devices that connect devices within a local network and facilitate data exchange.
  11. Measures to protect network data from unauthorized access, breaches, and cyber threats.
  12. Continuous observation of network activities and performance for troubleshooting and optimization.
  13. The amount of data that can be transmitted successfully over a network in a given time.

20 Clues: The consistency and stability of network operations and services.Establishes secure connections over public networks, ensuring privacy.The flow of data packets through a network, varying in volume and type.The underlying framework and components that support network operations....

Cyber Ready Team 2021-09-16

Cyber Ready Team crossword puzzle
Across
  1. How many kiddos does Ben have?
  2. What word makes the Cyber Design Thinking process unique from National Program's Design Thinking process
  3. Who took the longest to get a Questacon email?
  4. What is the name of Cherie's clever doggo?
  5. What did Jin do on his balcony while in quarantine?
  6. The founding group of Cyber Ready was affectionately known as "R & ___"
  7. What is Jordan's most prolific hobby?
Down
  1. Who is most likely to play ukelele during a meeting?
  2. Hiding things in plain sight
  3. The nickname of Michaela's cat
  4. Cyber Ready's favourite little microprocessor
  5. Who is most likely to do a zoom-ba class?
  6. What snack did Ana find that made the whole team happy?

13 Clues: Hiding things in plain sightThe nickname of Michaela's catHow many kiddos does Ben have?What is Jordan's most prolific hobby?Who is most likely to do a zoom-ba class?What is the name of Cherie's clever doggo?Cyber Ready's favourite little microprocessorWho took the longest to get a Questacon email?What did Jin do on his balcony while in quarantine?...

Cyber 2023-12-13

Cyber crossword puzzle
Across
  1. an attempt to trick someone into giving information over the internet or by email
  2. bad and harmful software
  3. double-..... = double-check
  4. to ..... a password = to break or gain access to an unknown password
  5. = to keep,
  6. to receive data or a file from the Internet on your computer.
  7. = unsafe
Down
  1. a global computer network providing a variety of information
  2. to send data or a file from your computer to somewhere on the Internet
  3. to catch (data, information)
  4. to go around, avoid (for example, restrictions)
  5. social ..... is manipulating individuals into providing confidential or personal information that may be used for criminal purposes
  6. a dishonest, criminal scheme aimed at tracking people
  7. "доступ"

14 Clues: "доступ"= unsafe= to keep,bad and harmful softwaredouble-..... = double-checkto catch (data, information)to go around, avoid (for example, restrictions)a dishonest, criminal scheme aimed at tracking peoplea global computer network providing a variety of informationto receive data or a file from the Internet on your computer....

NEMR Cross word 2024-07-10

NEMR Cross word crossword puzzle
Across
  1. Go to www._____.net for your internet needs!
  2. A source is probably not reputable if it has _____ words or grammar mistakes.
  3. Check to see if your information is coming from a reputable _____.
  4. Cyber criminal.
  5. Fake news sources often have low numbers of _____.
  6. Don't visit _____ you don't recognize.
  7. Trust your _____! If something feels suspicious it probably is.
  8. Never click on misspelled or suspicious looking _____.
Down
  1. Software that protects against viruses.
  2. Don't accept _____ from people you don't know.
  3. Fake news posts often have a low number of _____.
  4. Check with 3rd party _____ checkers like PolitiFact or SNOPES if you aren't sure.
  5. Fraudulent messages that appear to come from a reputable source, usually through email, with the goal of stealing sensitive data or installing malware on a device.
  6. Security system that blocks malicious internet traffic.
  7. Social media accounts automated in mass to spread fake information and news.

15 Clues: Cyber criminal.Don't visit _____ you don't recognize.Software that protects against viruses.Go to www._____.net for your internet needs!Don't accept _____ from people you don't know.Fake news posts often have a low number of _____.Fake news sources often have low numbers of _____.Never click on misspelled or suspicious looking _____....

CROSSWORD 2025-11-12

CROSSWORD crossword puzzle
Across
  1. Technology Backbone Of Digital World
  2. Place Where Students Learn
Down
  1. Intelligence Technology Simulating Human intelligence
  2. Security Digital Defense System

4 Clues: Place Where Students LearnSecurity Digital Defense SystemTechnology Backbone Of Digital WorldIntelligence Technology Simulating Human intelligence

Harry Hardware of the Internet 2023-03-06

Harry Hardware of the Internet crossword puzzle
Across
  1. the Company who supplies your broadband connection
  2. converts URLs into IP addresses
  3. a network of computers all contained within one location
  4. a category of malicious cyber-attacks that hackers or hackers use in order to make an online service unavailable
  5. a computer program or device that provides a service to another computer program and its user
Down
  1. the fastest part of the internet which connects very powerful servers together using high-speed, high-bandwidth connections.
  2. an electronic device for storing and processing data
  3. a network security device that monitors and filters incoming and outgoing network traffica network security device that monitors and filters incoming and outgoing network traffic
  4. the number of instructions per second the computer executes
  5. a mode of computer data storage in which digital data is stored on servers in off-site locations
  6. a unit of data storage capacity that is roughly equivalent to 1 billion bytes
  7. the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device

12 Clues: converts URLs into IP addressesthe Company who supplies your broadband connectionan electronic device for storing and processing dataa network of computers all contained within one locationthe number of instructions per second the computer executesa unit of data storage capacity that is roughly equivalent to 1 billion bytes...

Cybersecurity Awareness Month - Acronym Edition 2022-10-07

Cybersecurity Awareness Month - Acronym Edition crossword puzzle
Across
  1. An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
  2. A system turns domain names into IP addresses
  3. A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
  4. Also called a "black cloud"
Down
  1. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
  2. A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
  3. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
  4. Provide outsourced monitoring and management of security devices and systems

8 Clues: Also called a "black cloud"A system turns domain names into IP addressesProvide outsourced monitoring and management of security devices and systemsA secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online...

Functionality and Performance of an Network System 2024-08-08

Functionality and Performance of an Network System crossword puzzle
Across
  1. Measures and protocols are implemented to protect a network from unauthorised access and cyber threats.
  2. The system that translates user-friendly domain names into IP addresses that computers use to identify each other.
  3. The maximum data transfer rate of a network connection, determining how much data can flow through at once.
  4. The system of assigning unique numerical labels to devices on a network for identification and communication.
  5. The ability of a network to grow and handle increased demand without performance degradation.
  6. The time delay between sending and receiving data across a network.
  7. The actual rate at which data is successfully transmitted over a network.
  8. The percentage of time a network is operational and accessible to users.
  9. A secure connection over the internet that encrypts data.
  10. A small unit of data transmitted over a network, containing both the data itself and control information like destination address.
Down
  1. The likelihood of a network performing its functions without failure over time.
  2. A network protocol that automatically assigns IP addresses to devices on a network.
  3. Establish rules or standards determining how data is transmitted over a network.
  4. A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  5. The inclusion of backup elements in a network to maintain service if a component fails.

15 Clues: A secure connection over the internet that encrypts data.The time delay between sending and receiving data across a network.The percentage of time a network is operational and accessible to users.The actual rate at which data is successfully transmitted over a network.The likelihood of a network performing its functions without failure over time....

Final activity #1 2024-11-21

Final activity #1 crossword puzzle
Across
  1. is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
  2. An action or event that has the potential to compromise and/or violate
  3. The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  4. is a state of well-being of information and infrastructures.
  5. An individual who breaks into computer systems to steal, change, or destroy information.
  6. may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
  7. ensuring that the information/data can be accessed only by those authorized
  8. ensuring that the information is accessible to authorized persons when required without delay
  9. It is the Characteristics of the culture of computers, information, technology and virtual reality
  10. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
  1. the identification and assurance of the origin of information.
  2. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  3. is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
  4. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
  5. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  6. Any action derived from intelligent threats to violate the security of the
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  8. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
  9. ensuring that the information is accurate, complete, reliable, and is in its original form.
  10. A defined method of breaching the security of an IT system through vulnerability.

20 Clues: is a state of well-being of information and infrastructures.the identification and assurance of the origin of information.An action or event that has the potential to compromise and/or violateAny action derived from intelligent threats to violate the security of theensuring that the information/data can be accessed only by those authorized...

Cyber Bullying 2021-04-26

Cyber Bullying crossword puzzle
Across
  1. 1 in 5 _____ young people have reported being cyber bullied.
  2. (3words)A support line for kids, the phone number is: 1800 55 1800.
  3. True or false: You can go to the police if the cyber bullying is bad enough
  4. Cyberbullying is using ______ as a platform to bully and hurt people.
  5. bullying online is easier because then they can remain _____.
Down
  1. Cyber bullying can effect someone mentally, emotionally and ______.
  2. If you see a post that is harmful you can block or _____ the post in question
  3. Trisha Prabhu designed this app to prevent cyber bullying.
  4. This organisation defines cyber bullying as a form of bullying through digital technology.

9 Clues: Trisha Prabhu designed this app to prevent cyber bullying.1 in 5 _____ young people have reported being cyber bullied.bullying online is easier because then they can remain _____.Cyber bullying can effect someone mentally, emotionally and ______.(3words)A support line for kids, the phone number is: 1800 55 1800....

Security 2013-06-27

Security crossword puzzle
Across
  1. What is the name of the contractor company for security?
  2. Stick to what path when in the freight yard?
  3. Who must you radio to have the vehicle booth gates opened/closed?
  4. Who has the final say when allowing freight to enter the yard?
  5. What lights must be on when in the freight yard?
  6. What is Angela’s title other than Manager?
  7. What colour should drivers follow in the freight yard on the way in?
Down
  1. What must a non MSIC holder have whilst in the LRZ?
  2. What need must you have to request an MSIC?
  3. Your MSIC must be above what?
  4. What must you display in the LRZ?
  5. What does the T stand for in OTS?
  6. What type of industry are we in?
  7. Who takes passengers on/off via the buggy?
  8. A non MSIC holder must also have what for access into the LRZ?
  9. What is your base channel when receiving radio calls?

16 Clues: Your MSIC must be above what?What type of industry are we in?What must you display in the LRZ?What does the T stand for in OTS?Who takes passengers on/off via the buggy?What is Angela’s title other than Manager?What need must you have to request an MSIC?Stick to what path when in the freight yard?What lights must be on when in the freight yard?...

Security 2015-07-17

Security crossword puzzle
Across
  1. Relationship of the sights, trajectory, and the impact of a bullet.
  2. An authorized Safeguards User responsible for the Generation, Storage, and Destruction of SGI.
  3. safely and efficiently generating _____ for the long term.
  4. Equipment to protect yourself
  5. Independent Spent Fuel Storage Installation
  6. Protected Area Security Expansion
  7. Concrete block barriers.
  8. multiple integrated laser engagement system
Down
  1. Nuclear ________
  2. A barrier earthen or otherwise
  3. An area encompassed by physical barriers to which access is controlled per 10 CFR 73.55.
  4. An oversight or review/verification of activities conducted by a second individual.
  5. Firearms, explosives, incendiary devices, etc.
  6. The NRC comes has a _______ inspection of our NSD.
  7. Badge allows short-term, escorted access to the Protected/Vital areas
  8. Sallyport requires __ Members of the Security Force.

16 Clues: Nuclear ________Concrete block barriers.Equipment to protect yourselfA barrier earthen or otherwiseProtected Area Security ExpansionIndependent Spent Fuel Storage Installationmultiple integrated laser engagement systemFirearms, explosives, incendiary devices, etc.The NRC comes has a _______ inspection of our NSD....

Cyber-Security Awareness 2024-05-22

Cyber-Security Awareness crossword puzzle
Across
  1. Regularly changing this can help maintain security
  2. Malicious software that replicates itself and spreads to other devices
  3. A technique used to separate a network into smaller parts to enhance security
Down
  1. Software designed to protect against viruses
  2. Unauthorized intrusion into a computer or network
  3. An unexpected or malicious email that appears legitimate

6 Clues: Software designed to protect against virusesUnauthorized intrusion into a computer or networkRegularly changing this can help maintain securityAn unexpected or malicious email that appears legitimateMalicious software that replicates itself and spreads to other devicesA technique used to separate a network into smaller parts to enhance security

Cyber Security Quiz 2023-02-03

Cyber Security Quiz crossword puzzle
Across
  1. I'm a button on the keyboard, but sometimes astronauts visit me
  2. Machine used for processing information
Down
  1. The computer is sick
  2. Needed by the computer to protect valuable data, just as the bank needs it to protect its money.
  3. I am not the alphabet but I am filled with letters
  4. I'm a rat on the computer, and I like to play with the cursor.

6 Clues: The computer is sickMachine used for processing informationI am not the alphabet but I am filled with lettersI'm a rat on the computer, and I like to play with the cursor.I'm a button on the keyboard, but sometimes astronauts visit meNeeded by the computer to protect valuable data, just as the bank needs it to protect its money.

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Redalert ICS CTF 2019-07-23

Redalert ICS CTF crossword puzzle
Across
  1. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  2. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  3. May sometime be known as Industroyer
  4. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
  1. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  2. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  3. The world’s most murderous malware
  4. A network security measure employed on one or more computers to physically isolated from another network.
  5. This malware was reported to be involved with the 2015 cyber attacks in Ukraine
  6. A RAT targeting the ICS industry by the hacking group Dragonfly
  7. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

Digital Crossword 4 2022-12-12

Digital Crossword 4 crossword puzzle
Across
  1. this security company is ranked top 10 in cyber security
  2. this is the meaning for HP computers
  3. the acronym means Uniform Resource Locators
  4. This program is through Google and replaces Microsoft PowerPoint
  5. The distance between each line
  6. an integrated circuit (IC) intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers)
Down
  1. It is described as the size and also style of this writing
  2. it is the format used in Williams's class to set up essays
  3. a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
  4. this tab will move your text from left, middle, and right
  5. this is the capital of big technology companies in the United States
  6. Universal Serial Bus
  7. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  8. this is used instead of Microsoft Word because it saves in real time
  9. (High Definition Multimedia Interface) is a specification that combines video and audio into a single digital interface for use with digital versatile disc (DVD) players, digital television (DTV) players, set-top boxes, and other audiovisual devices

15 Clues: Universal Serial BusThe distance between each linethis is the meaning for HP computersthe acronym means Uniform Resource Locatorsthis security company is ranked top 10 in cyber securitythis tab will move your text from left, middle, and rightIt is described as the size and also style of this writing...

unit 26-28 Fekete Konor 2024-11-26

unit 26-28 Fekete Konor crossword puzzle
Across
  1. Devices that generate unique identifiers to ensure access to sensitive information.
  2. Software that enables financial transactions on a website, such as purchases.
  3. A type of cyber attack where an attacker sends fake emails or messages that appear to be from a legitimate source, in an attempt to steal sensitive information.
  4. Individuals who try to obtain or steal software or game licenses through illegal means.
  5. A business model that combines traditional retail sales and online sales.
  6. The unauthorized use or distribution of copyrighted materials, such as music, movies, or software.
Down
  1. software that enables users to store and manage their payment information, such as credit card numbers and expiration dates.
  2. A network security system that monitors and controls incoming and outgoing network traffic.
  3. A type of self-replicating software that can spread across a network without human intervention.
  4. A type of bad software that can cause harm to a computer or a network. Examples include viruses, trojans, and rootkits.
  5. The act of harassing or threatening someone online, often through social media or email.
  6. A unique number used by banks to identify transactions.
  7. A personal identification number used for bank cards or other security systems.
  8. A protocol that enables secure communication between websites and users.
  9. Software that monitors a computer's data transmission and collects sensitive information.

15 Clues: A unique number used by banks to identify transactions.A protocol that enables secure communication between websites and users.A business model that combines traditional retail sales and online sales.Software that enables financial transactions on a website, such as purchases....

Cyber Crossword #1 2024-03-28

Cyber Crossword #1 crossword puzzle
Across
  1. Any device that connects to the corporate network. Types of devices include laptops, phones, servers, switches, printers, etc.
  2. Any potential danger to information or systems.
  3. A system for collecting, saving, processing, and presenting data by means of a computer. This term is generally used when referring to a component of software that can be executed.
  4. Weakness in system security procedures, design, implementation, internal controls, etc., that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
Down
  1. An Identity and Access Management technology solution which ensures the security of information assets and continued identity governance and regulatory compliance for applications running on-premise or from the cloud.
  2. ​The practice of identifying and protecting assets in cyberspace: detecting, responding to and recovering from cyber risk events.
  3. The potential loss to an area due to the occurrence of an adverse event.
  4. Hostile or malicious software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other malicious programs. It can be in the form of executable code, scripts, active content and other software.
  5. The potential that events, expected or unanticipated, may have an adverse effect on a financial institution's earnings, capital, or reputation
  6. ​​A passwordless, Multi-Factor Authentication (MFA) solution that provides the security of a token with the convenience of a smartphone. With this new solution, you’ll no longer need to memorize a password, allowing you to log in to your computer much faster and more securely.
  7. The physical components of an information system.
  8. A record of events occurring within an entity's systems and networks.

12 Clues: Any potential danger to information or systems.The physical components of an information system.A record of events occurring within an entity's systems and networks.The potential loss to an area due to the occurrence of an adverse event....

Cyber Ethics 2025-06-15

Cyber Ethics crossword puzzle
Across
  1. holds individuals accountable for their actions in cyberspace and promotes ethical decision-making.
  2. Areas of Cyber Ethics:
  3. Property:
  4. helps protect individuals and organizations from cyber threats like data breaches and identity theft.
  5. copyright laws, avoiding plagiarism, and not using or distributing copyrighted material without permission.
  6. Use of Technology:
  7. and Abuse:
  8. fosters a culture of respect and consideration for others in the online world.
  9. cyberbullying, harassment, stalking, and any form of online abuse.
Down
  1. measures to protect systems and data from unauthorized access, viruses, and cyber threats.
  2. ethics, also known as internet or digital ethics, refers to the moral principles that guide behavior in the online world. It encompasses a set of guidelines for responsible online conduct, promoting a safe and ethical cyberspace. Key aspects include respecting intellectual property, avoiding plagiarism, maintaining privacy, and refraining from harmful actions like cyberbullying or spreading viruses.
  3. ethics promotes a safer online environment by discouraging harmful behavior and encouraging responsible use of technology.
  4. technology in a way that is ethical, respectful, and considerate of others.
  5. personal information, avoiding unauthorized access to data, and respecting the privacy of others.
  6. is Cyber Ethics Important?

15 Clues: Property:and Abuse:Use of Technology:Areas of Cyber Ethics:is Cyber Ethics Important?cyberbullying, harassment, stalking, and any form of online abuse.technology in a way that is ethical, respectful, and considerate of others.fosters a culture of respect and consideration for others in the online world....

SeatWork #2 2025-09-06

SeatWork #2 crossword puzzle
Across
  1. The practice of protecting information, systems and assets from threats.
  2. A model where decision-making is spread across units.
  3. The detailed steps employees follow to apply a policy.
  4. Setting security objectives, identifying risks and allocating resources.
  5. The executive who leads and manages the organization’s security program.
  6. A model where one authority makes all security decisions.
  7. Making sure security strategies support business goals.
  8. Using third-party providers for services such as managed security.
  9. Directing and motivating teams to meet security objectives.
  10. A person who oversees IT systems and implements security measures.
Down
  1. Meeting mandatory laws, regulations and industry standards.
  2. A person who checks systems for compliance and weaknesses.
  3. Structuring people and resources to execute the security plan.
  4. The chance that a threat could harm systems, data or reputation.
  5. A high-level rule that states how an organization protects its information.
  6. A professional who monitors networks and investigates threats.
  7. The system of directing and controlling security decisions and accountability.
  8. A structured set of best practices and standards for managing security.
  9. A model combining centralized standards with local flexibility.
  10. Monitoring security performance and making improvements.

20 Clues: A model where decision-making is spread across units.The detailed steps employees follow to apply a policy.Making sure security strategies support business goals.Monitoring security performance and making improvements.A model where one authority makes all security decisions.A person who checks systems for compliance and weaknesses....

DTIN - Digital Security 2024-07-04

DTIN - Digital Security crossword puzzle
Across
  1. - Software that automatically displays or downloads advertising material when a user is online.
  2. - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
  3. - A standalone malware computer program that replicates itself to spread to other computers.
  4. - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
  5. - A method of trying to gather personal information using deceptive e-mails and websites.
  6. - The process of converting information or data into a code to prevent unauthorized access.
  7. - The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. - A person who uses computers to gain unauthorized access to data.
  9. - Malware that locks or encrypts data until a ransom is paid.
  10. - A network of private computers infected with malicious software and controlled as a group.
  11. - A type of surveillance technology used to record keystrokes.
  12. - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. - Statistical analysis of people's unique physical and behavioral characteristics.
  2. - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
  3. - Software that enables a user to obtain covert information about another's computer activities.
  4. - Data sent from a website and stored on a user's computer by the user's web browser.
  5. - A security process by which a list of permitted entities is created and defined as acceptable.
  6. - Criminal activities carried out by means of computers or the internet.
  7. - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  8. - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
  9. - A network security system that monitors and controls incoming and outgoing network traffic.
  10. - A type of malware that is often disguised as legitimate software.
  11. - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  12. - Software designed to detect and destroy computer viruses.
  13. - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.

25 Clues: - Software designed to detect and destroy computer viruses.- Malware that locks or encrypts data until a ransom is paid.- A type of surveillance technology used to record keystrokes.- A person who uses computers to gain unauthorized access to data.- A type of malware that is often disguised as legitimate software....

uli311 a 2018-11-15

uli311 a crossword puzzle
Across
  1. oy
  2. hukuk, yasa
  3. hoşgörü
  4. endişe
  5. kamusal
  6. başkan
  7. reddetmek
  8. rapor
  9. başkent
  10. siber
Down
  1. işlev
  2. oydaşma
  3. af
  4. ceza
  5. bütçe
  6. müttefik
  7. kabul etmek
  8. müzakere etmek
  9. bölge
  10. öncelik

20 Clues: oyafcezaişlevbütçebölgeraporsiberendişebaşkanoydaşmahoşgörükamusalöncelikbaşkentmüttefikreddetmekhukuk, yasakabul etmekmüzakere etmek

Cyber Security Awareness 2024-09-16

Cyber Security Awareness crossword puzzle
Across
  1. A type of malicious software
  2. A sequence of characters used to verify the identity of a user
  3. The process of converting information into a secure format
  4. Unauthorized access to a network or system
  5. A secure, encrypted connection over the internet
Down
  1. The process of converting information into a secure format
  2. Fraudulent emails attempting to obtain sensitive information

7 Clues: A type of malicious softwareUnauthorized access to a network or systemA secure, encrypted connection over the internetThe process of converting information into a secure formatThe process of converting information into a secure formatFraudulent emails attempting to obtain sensitive information...

Cyber Security Vocabulary 2025-02-13

Cyber Security Vocabulary crossword puzzle
Across
  1. A set of rules that ensure secure communication and data exchange over a network.
  2. Measures taken to safeguard passwords from unauthorized access.
  3. Unauthorized access to confidential information.
Down
  1. The method of converting information into a secure format to prevent unauthorized access.
  2. The process of verifying the identity of a user or system.
  3. A security system that monitors and controls incoming and outgoing network traffic.

6 Clues: Unauthorized access to confidential information.The process of verifying the identity of a user or system.Measures taken to safeguard passwords from unauthorized access.A set of rules that ensure secure communication and data exchange over a network.A security system that monitors and controls incoming and outgoing network traffic....

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

ST10050768's NWEG5122 Crossword 2023-08-30

ST10050768's NWEG5122 Crossword crossword puzzle
Across
  1. Topology where all computing devices are connected with a single cable
  2. converting information into secret code to hide information
  3. network device that is used to segment the networks into different subnetworks called subnets or LAN segments
  4. Measuring by quality rather than quantity
  5. component that allows network device to move data to the system's memory reducing CPU usage
  6. Device that forwards data packets from one network to another
  7. protecting computer networks from cyber threats is called network ...
  8. Amount of data that moves across a network during any given time
  9. Delay in time taken for data to reach its destination
  10. rate of message delivery over a communication channel
  11. data can be stored in ...
Down
  1. Topology where all computing devices are connected to a central node
  2. capacity at which a network can transmit data
  3. Another word for Network Adapter(Abbreviation)
  4. Information translated into a form efficient for processing
  5. Measuring by quantity rather than quality
  6. Data divided into small segments
  7. Global network
  8. Time delay over a network connection
  9. Established set of rules that determines how data is sent

20 Clues: Global networkdata can be stored in ...Data divided into small segmentsTime delay over a network connectionMeasuring by quantity rather than qualityMeasuring by quality rather than quantitycapacity at which a network can transmit dataAnother word for Network Adapter(Abbreviation)Delay in time taken for data to reach its destination...

CrossBits Prelims 2024-09-17

CrossBits Prelims crossword puzzle
Across
  1. , Jack Ma is one of it's Founders
  2. , What is the term for a type of cyber- attack that uses fake emails?
  3. , The Open-Source Revolution
  4. , The Cloud Storage Solution for Businesses
  5. , The Power of Artificial Intelligence
  6. , Transforming the World Through Technology
  7. , This platform allows people to share and upload videos
  8. , "Don't be evil"
  9. , This platform was originally known as 'Picaboo' before rebranding
  10. , What is the term for a network security system that monitors traffic?
  11. , The AI Platform for Businesses
  12. , Buy it. Sell it. Love it.
Down
  1. , "Inspiring Innovation"
  2. , This Payment company was spun off from eBay in 2015
  3. , The Company that created the populor social media platform "TikTok"
  4. , This tech company's name references the highest frequency in the electromagnetic spectrum
  5. , the world's ideas are shared in under 18 minutes
  6. , The Ultimate Productivity Tool
  7. , do the smart thing
  8. , Jerry and David's Giude to the World Wide Web
  9. , Originally started as an online DVD rental service before shifting to streaming
  10. , A PC sales unit founded by Liu Chuanzhi

22 Clues: , "Don't be evil", do the smart thing, "Inspiring Innovation", Buy it. Sell it. Love it., The Open-Source Revolution, The Ultimate Productivity Tool, The AI Platform for Businesses, Jack Ma is one of it's Founders, The Power of Artificial Intelligence, A PC sales unit founded by Liu Chuanzhi, The Cloud Storage Solution for Businesses...

RU ITEC411: Professional Ethics and Responsibilities 2022-11-23

RU ITEC411: Professional Ethics and Responsibilities crossword puzzle
Across
  1. a set of principles that help guide professionals
  2. an advertisement that is given to a specific group or person
  3. cameras used to broadcast live data over the internet
  4. activities that help apply an individuals knowledge with an industry
  5. programs and data used by a computer source
  6. an institute with the goal of advancing technology for society
  7. the quality of being honest
  8. a rule or a restriction
  9. helps to protect any original work
Down
  1. a demand viewed by workers to perform their work within a certain time
  2. the process of dealing with a group of people or things
  3. the act of reporting any wrong doing as an employee
  4. process of protecting any systems and networks from cyber attacks
  5. a phase of software testing where the audience tries out a product
  6. principles that help guide a persons behavior
  7. an individual with an interest or concern with a topic
  8. human data that is processed by machines
  9. process of evaluating a product or an application
  10. the act of describing a precise requirement
  11. general rules or principles

20 Clues: a rule or a restrictiongeneral rules or principlesthe quality of being honesthelps to protect any original workhuman data that is processed by machinesprograms and data used by a computer sourcethe act of describing a precise requirementprinciples that help guide a persons behaviora set of principles that help guide professionals...

Edasiõppimine ja karjäär 2020-09-28

Edasiõppimine ja karjäär crossword puzzle
Across
  1. Alussüsteem, mis aitab erinevaid rakendusi käivitada
  2. ...tee- annab võimaluse ennast proovile panna valdkonna eksperdina ja juhina. Ametid ja kandideerimist saab uurida erinevats töövahetusportaalides nagu CV Online, CV Keskus ja teised.
  3. Cyber Security Network (CyberSN) asutaja(perekonnanimi)
  4. Austraalia internetiaktivist ja ajakirjanik, WikiLeaksi asutaja ja peatoimetaja
  5. Tegeleb süsteemide ja teenuste administreerimise ja parendamisega
  6. Tegeleb koodianalüüsi ja skriptide automatiseerimisega. Oskab turvaliselt programmeerida
  7. Maailma esimese arvutiviiruse looja(perekonnanimi)
  8. Kaks korda aastas toimuv küberkaitse võistlus Eestis
  9. Tegeleb šifrite loomise ja lahendamisega erineval tasemetel
  10. Küberpähkel toimub kahes kuus-oktoober ja ...
  11. Programm, äpp teisiti
Down
  1. Need, kes saadavad korda head
  2. Küberturbes oluline faktor
  3. Küberturbes oluline faktor
  4. Need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil ehk kui näiteks turvavea avastamisel on võimalik selle eest saada ka kasu, siis kindlasti nad selle ka välja võtavad.
  5. ...juht - Peab olema kursis riskidega, mis ohustavad ettevõtte edukalt toimimist ja kasu toomist

16 Clues: Programm, äpp teisitiKüberturbes oluline faktorKüberturbes oluline faktorNeed, kes saadavad korda headKüberpähkel toimub kahes kuus-oktoober ja ...Maailma esimese arvutiviiruse looja(perekonnanimi)Alussüsteem, mis aitab erinevaid rakendusi käivitadaKaks korda aastas toimuv küberkaitse võistlus Eestis...

Ethical Hacking CrossWord Puzzle by Megaa M 2025-10-30

Ethical Hacking CrossWord Puzzle by Megaa M crossword puzzle
Across
  1. Character string, often protected by hashing, required for system entry​
  2. Malicious actor breaching security for personal gain or disruption​
  3. Simulating covert and authorized intrusions to assess system fortitude​
  4. Multi-layered process confirming user legitimacy within a secure environment​
  5. Systematic flaw that adversaries actively seek to compromise​
Down
  1. Distributed technique that overwhelms network resources, halting normal activity​
  2. Psychological manipulation of individuals to divulge confidential details​
  3. Deceptive social engineering tactic exploiting user trust to harvest credentials​
  4. Hidden digital threat capable of data exfiltration or destruction upon execution​
  5. Tool for scanning networks and discovering open ports
  6. Professional hacker conducting authorized assessments to bolster cyber defenses​
  7. powerful framework used for developing,testing and exploits
  8. Malicious software masquerading as useful program to infiltrate the system​
  9. Acts as a barricade, filtering suspicious packets from entering trusted zones​
  10. Uses complex algorithms to render sensitive data unreadable to unauthorized eyes​

15 Clues: Tool for scanning networks and discovering open portspowerful framework used for developing,testing and exploitsSystematic flaw that adversaries actively seek to compromise​Malicious actor breaching security for personal gain or disruption​Simulating covert and authorized intrusions to assess system fortitude​...

Cyber Security Month 2023-09-29

Cyber Security Month crossword puzzle
Across
  1. Malicious software that demands a ransom
  2. Protection against unauthorized access
Down
  1. set of rules governing the exchange or transmission of data in a computer network
  2. Verifying the identity of a user or system
  3. Trickery to obtain sensitive information
  4. technique that involves deciphering a code or encryption system

6 Clues: Protection against unauthorized accessMalicious software that demands a ransomTrickery to obtain sensitive informationVerifying the identity of a user or systemtechnique that involves deciphering a code or encryption systemset of rules governing the exchange or transmission of data in a computer network

ASW - Passion 2022-08-15

ASW - Passion crossword puzzle
Across
  1. Passion fuels your...
  2. At ASW, we are also passionated about sustainability and committed to give back to our global community. Our sustainability approach is marked by 4 pillars: our community, our people, our customers and our
  3. We are passionated about our jobs at A.S. Watson. We put our heart and soul in our jobs. We hope to radiate this passion to future talent and we see the passion with current colleagues. We have a colleague within GIT Europe, who works at our department since 28-02-1977! Who is it?
Down
  1. Working hard on something we don’t care about is Stress but working on something we truly LOVE is...
  2. We want to be a better company every day. Our passion lies in acceleration. ASW is determined to stay winning and to continue to lead in innovating customer experience. To stay ahead, we need to continuesly keep learning and improving ourselves. Therefore, we offer you short and snappy trainings within our Be More platform, hosted by colleagues from within the teams. How do we call these short trainings?
  3. Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company?
  4. Do you know why this year is marked as the Year of Passion? Passion is one of the 5 DNAs of ASW, and it’s always listed as the first one. The other DNAs are: commitment, teamwork, science, and?
  5. We are also passionately protecting our technology! The Cyber Security team has got assistance from their new Cyber Hero. This Hero on four legs will help all our colleagues to become aware about Cyber Security. What’s the dog’s name?

8 Clues: Passion fuels your...Working hard on something we don’t care about is Stress but working on something we truly LOVE is...Someone who is also very passionate about our company is Group Managing Director Dominic Lai. For how many years has he been working for the company?...

security 2015-10-27

security crossword puzzle
Across
  1. a situation when a plane or other vehicle is illegally taken under control
  2. small balls of ice that fall like rain from the sky.
  3. there is a danger that something unpleasant might be done
  4. a level of quality or achievement, especially a level that is thought to be acceptable.
  5. how far or how clearly you can see in particular weather conditions.
  6. help which gets someone out of a dangerous or unpleasant situation.
  7. An unexpected and difficult or dangerous situation
  8. Something that could be dangerous to you, your health or safety
  9. bad weather, with heavy rain, strong winds, and often thunder and lightning.
  10. the state of being safe from harm or danger.
Down
  1. It occurs when a moving object crashes into something.
  2. A change of a course or a destination.
  3. Something that turns your attention away from something
  4. something unpleasant happens causing injury or death.
  5. An inclined track for loading and unloading
  6. measures are taken to protect a place, or to restrict entering without permission

16 Clues: A change of a course or a destination.An inclined track for loading and unloadingthe state of being safe from harm or danger.An unexpected and difficult or dangerous situationsmall balls of ice that fall like rain from the sky.something unpleasant happens causing injury or death.It occurs when a moving object crashes into something....

Technology Some would say that improving technology has made our lives easier. 2022-05-12

Technology Some would say that improving technology has made our lives easier. crossword puzzle
Across
  1. the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
  2. Cyber bullying
  3. are market, government; cost and competition
  4. a person or situation which poses a possible threat to the security of something.
  5. High birth rate countries
  6. Some would say this would make our lives easier.
Down
  1. Greater population
  2. More job opportunities
  3. composition is changing at every level of society.
  4. the industrialization of society meant that there was no longer a need for large families to produce enough manual labor to run a farm.

10 Clues: Cyber bullyingGreater populationMore job opportunitiesHigh birth rate countriesare market, government; cost and competitionSome would say this would make our lives easier.composition is changing at every level of society.a person or situation which poses a possible threat to the security of something....

cybersecurity 2025-03-06

cybersecurity crossword puzzle
Across
  1. A cyber attack that tricks people into revealing personal information via fake emails or websites.
  2. Malicious software that secretly gathers user information.
  3. Software designed to harm or exploit computer systems.
  4. A type of malware that disguises itself as legitimate software.
  5. A secret combination of characters used to access a system.
  6. A type of malware that locks files and demands payment for decryption.
Down
  1. A security system that monitors and controls incoming and outgoing network traffic.
  2. The process of converting data into a secure code to prevent unauthorized access.
  3. Software that detects and removes malicious programs.
  4. A person who gains unauthorized access to computer systems.

10 Clues: Software that detects and removes malicious programs.Software designed to harm or exploit computer systems.Malicious software that secretly gathers user information.A person who gains unauthorized access to computer systems.A secret combination of characters used to access a system.A type of malware that disguises itself as legitimate software....

OT InfoSec 2024 2024-09-30

OT InfoSec 2024 crossword puzzle
Across
  1. MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
  2. A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
  3. A ROUTINE FIX FOR A COMPUTER PROGRAM.
  4. THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
  5. FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
  6. A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
  7. YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
  8. THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
  9. A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
  10. THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
  11. THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
  12. I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
  13. A SELF-REPLICATING MALICIOUS PROGRAM.
  14. AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
  15. A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
  16. ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
  17. I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
  1. THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
  2. UNAUTHORIZED USER WITH MALICIOUS INTENT.
  3. WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
  4. THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
  5. A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
  6. CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
  7. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  8. WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
  9. THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
  10. A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
  11. I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
  12. CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
  13. ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
  14. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  15. ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
  16. A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).

33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM.A SELF-REPLICATING MALICIOUS PROGRAM.UNAUTHORIZED USER WITH MALICIOUS INTENT.YUBIKEY IS AN EXAMPLE OF A HARDWARE _______THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).THE POTENTIAL FOR LOSING VALUABLE INFORMATION.MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE....

Cybersecurity by Hazel 2025-05-07

Cybersecurity by Hazel crossword puzzle
Across
  1. the process of identifying and fixing vulnerabilities on a system.
  2. The smallest unit of information storage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
  5. A list of entities that are considered trustworthy and are granted access or privileges.
  6. Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  7. A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
  8. Whom someone or what something is.
  9. the process of protecting electrical devices and networks from attacks.
Down
  1. A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
  2. A term to describe connecting multiple separate networks together.
  3. The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
  4. An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
  5. A list of entities that are blocked or denied privileges.
  6. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
  7. A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
  8. A cryptographic algorithm for encryption and decryption.
  9. A connection between two devices.
  10. A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.

19 Clues: A connection between two devices.Whom someone or what something is.The smallest unit of information storage.A cryptographic algorithm for encryption and decryption.A list of entities that are blocked or denied privileges.the process of identifying and fixing vulnerabilities on a system....

Edasiõppimine ja kärjäär 2023-01-31

Edasiõppimine ja kärjäär crossword puzzle
Across
  1. on endine vene häkker, kes pettis välja passi ja pankade võltsingutega.
  2. on tegelased, kellel on pigem kurjad motiivid ja neid kardetakse, sest nende eesmärgiks on ainult omakasu ja pahanduste tegemine teistele.
  3. arvutite omavahel võrgustikuks (nt Internet)
  4. infoturbe juht Xeroxis
  5. on USA küberturbe uurija.
  6. ja ennast veebipettuste, ohtude ning küberkiusamise eest.
  7. õpilane rakendab ohutus- ja turvameetmeid, et vältida füüsilisi ning virtuaalseid riske
Down
  1. Cyber Security Network (CyberSN) asjutaja.
  2. õpilane arvestab digitegevustes teiste inimeste privaatsust ja ühiseid kasutustingimusi ning kaitseb oma
  3. erinevad programmid, äpid, millega kasutaja otseselt kokku puutub.
  4. on need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil
  5. õpilane väldib digitehnoloogia ja digitaalse teabe kasutamisest tulenevaid terviseriske
  6. tundtud nime all kui DynamicWebPaige
  7. on need, kes saadavad korda head. Nende eesmärgiks on leida süsteemist turvavigu ja nendest teada anda või neid parandada.
  8. kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale

15 Clues: infoturbe juht Xeroxison USA küberturbe uurija.tundtud nime all kui DynamicWebPaigeCyber Security Network (CyberSN) asjutaja.arvutite omavahel võrgustikuks (nt Internet)ja ennast veebipettuste, ohtude ning küberkiusamise eest.kaitsmine õpilane teadvustab digitehnoloogia mõju keskkonnale...

CPL 6 2023-01-03

CPL 6 crossword puzzle
Across
  1. Default value of the position property(CSS)
  2. superglobal variable holds information about headers, paths, and script locations(PHP)
  3. operator is used to select values within a given range(SQL)
  4. plugin is used to cycle through elements, like a slideshow(Boostrap)
  5. keyword is used to import a package from the Java API library(Java)
  6. AWS Migration Strategy(AWS Cloud)
Down
  1. Input type defines a slider control(HTML)
  2. statement used to select one of many code blocks to be executed(C)
  3. What tool does React use to compile JSX(React)
  4. statement is used to stop a loop(Python)
  5. Falsifying data, making something appear different than they really are (Cyber Security)
  6. 'special' class that represents a group of constants(C#)
  7. Event occurs when the user clicks on an HTML element(Javascript)
  8. transaction used to import SAP-provided support packages into your system(SAP)
  9. API that allows navigation through objects(XML)

15 Clues: AWS Migration Strategy(AWS Cloud)statement is used to stop a loop(Python)Input type defines a slider control(HTML)Default value of the position property(CSS)What tool does React use to compile JSX(React)API that allows navigation through objects(XML)'special' class that represents a group of constants(C#)...

Mesleki İngilizce I Final 2019-01-10

Mesleki İngilizce I Final crossword puzzle
Across
  1. kamusal
  2. bütçe
  3. endişe
  4. af
  5. reddetmek
  6. ceza
  7. başkan
  8. bölge
  9. başkent
  10. oy
Down
  1. oydaşma
  2. müzakere etmek
  3. rapor
  4. hoşgörü
  5. müttefik
  6. işlev
  7. siber
  8. öncelik
  9. kabul etmek
  10. hukuk, yasa

20 Clues: afoycezaraporbütçeişlevsiberbölgeendişebaşkankamusaloydaşmahoşgörüöncelikbaşkentmüttefikreddetmekkabul etmekhukuk, yasamüzakere etmek

cyber wellness crossword challenge 2013-06-04

cyber wellness crossword challenge crossword puzzle
Across
  1. Cyber bulling is using the_______ or phone to repeatedly say rude and hurtful things about a person.
  2. Do not scold others online, always be ________.
  3. When you get cyber bullied do not ______________ or reply.
  4. when we are cyber bullied, save the ___________ as we need it for further investigation.
  5. ____ is to flood other’s email with unimportant information.
  6. Do not use _______________ online because it may hurts others.
Down
  1. cyber ____________ is saying hurtful things online to a person.
  2. we need to be ______________ for your words and action online as we should take ownership of our behavior.
  3. Do not __________bad and hurtful things online.
  4. Always be ________ when you are using internet.

10 Clues: Do not scold others online, always be ________.Do not __________bad and hurtful things online.Always be ________ when you are using internet.When you get cyber bullied do not ______________ or reply.____ is to flood other’s email with unimportant information.Do not use _______________ online because it may hurts others....

CTF-CW-20 2025-11-15

CTF-CW-20 crossword puzzle
Across
  1. When your security team comes with an external logo
  2. When hackers turn computers into their own remote-control zombie army!
  3. That missing shingle hackers march right through
  4. The “one key” for all your digital doors
  5. Fake data so realistic, even AI gets catfished.
  6. Digital “naughty” list
  7. “We’ll take our chances” - signed management
  8. Playing tag with your problems
  9. Gossipy details your files spill when you aren’t looking—take two!
  10. The cyber squirm that keeps on moving
Down
  1. The business progress postcard
  2. Not getting in unless you BOTH know and show
  3. Slice of time between project pit stops
  4. The chess moves hackers (and defenders) use to outsmart each other in cyberspace.
  5. All the coding action at Tekion stops here first!
  6. At Tekion, this keeps our audits painless and our paperwork stress-free—compliance on autopilot!
  7. No, your doctor can’t tweet your health check thanks to this law.
  8. Where digital detectives go to play connect-the-dots after an incident.
  9. Turning “password” into an uncrackable puzzle
  10. Only the bold try redhunt at Tekion—it’s like laser tag for devs!

20 Clues: Digital “naughty” listThe business progress postcardPlaying tag with your problemsThe cyber squirm that keeps on movingSlice of time between project pit stopsThe “one key” for all your digital doorsNot getting in unless you BOTH know and show“We’ll take our chances” - signed managementTurning “password” into an uncrackable puzzle...

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

CISO Crossword Quiz - 0824 2024-06-25

CISO Crossword Quiz - 0824 crossword puzzle
Across
  1. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  2. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
  3. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
  4. Unauthorised access to data by exploiting a weakness in the IT system
  5. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
Down
  1. Process of verifying a user identity before granting access
  2. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
  3. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  4. A software developed by hackers to steal data and damage or destroy computer systems
  5. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
  6. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
  7. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)

12 Clues: Process of verifying a user identity before granting accessUnauthorised access to data by exploiting a weakness in the IT systemPhishing Techniques used to target CEO,CFO etc. (Top executives of a company)A software developed by hackers to steal data and damage or destroy computer systems...

Operations Security 2025-04-16

Operations Security crossword puzzle
Across
  1. OPSEC is a systematic _____________.
  2. Who is responsible for OPSEC?
  3. Friendly detectable actions that can derive sensitive information.
  4. Condition that exists when we are susceptible, and adversaries can collect our critical information.
  5. Replaced the SSN on ID Cards to protect personal information.
  6. Third number of the Army's Operations Security Regulation.
  7. Last name of USAG FCCO OPSEC manager (alternate).
Down
  1. Last name of USAG FCCO OPSEC manager (primary).
  2. Month originally designated for Operations Security awareness.
  3. Number of steps identified in the Operations Security cycle.
  4. Designated color usually associated with Operations Security.
  5. Has overall ownership of USAG FCCO Operations Security Program.
  6. First number of the Army's Operations Security Regulation.
  7. Official mascot for Operations Security.
  8. This term is used in Operations Security instead of enemy.
  9. Commander's list of unclassified sensitive information to protect.
  10. Directive that established OPSEC as a national security program.
  11. Second number of the Army's Operations Security Regulation.
  12. Acronym for Operations Security.
  13. New official designated month for National Operations Security awareness.

20 Clues: Who is responsible for OPSEC?Acronym for Operations Security.OPSEC is a systematic _____________.Official mascot for Operations Security.Last name of USAG FCCO OPSEC manager (primary).Last name of USAG FCCO OPSEC manager (alternate).First number of the Army's Operations Security Regulation.This term is used in Operations Security instead of enemy....

Cyber Threats & Security 2026-01-19

Cyber Threats & Security crossword puzzle
Across
  1. ILLEGAL ENTRY INTO A COMPUTER SYSTEM
  2. A COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINAL
  3. THIS IS A PROCESS OF MONITORING AND CAPTURING ALL DATA PACKETS PASSING THROUGH GIVEN NETWORK
Down
  1. THIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES
  2. THE RECEIVER IS TRICKED BY MAKING HIM/HER BELIEVE THAT THE MESSAGES RECIEVED FROM A TRUSTED SOURCE
  3. TYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEM

6 Clues: ILLEGAL ENTRY INTO A COMPUTER SYSTEMA COMPUTER COMPROMISED BY MALWARE COULD BE USED BY CYBER CRIMINALTYPE OF CYBER CRIME ATTACK THAT CYBER CRIMINALS USED TO BRING DOWN A SYSTEMTHIS USE MALWARE TO REROUTE UNSUSPECTING INTERNET SURFERS TO FAKE VERSION OF WEBSITES...

FITAVocab.ss 2013-05-15

FITAVocab.ss crossword puzzle
Across
  1. blank work space
  2. ex: Angry Birds
  3. credit
  4. uses 1s and 0s to transmit info
  5. optical, mechanical, touch pad
  6. ex: Comcast
  7. internet
  8. behavior online
  9. accessible on any computer
  10. pamphlet
  11. a saying or group of words representing a business, store, etc.
  12. circuit board
  13. ex: Dogpile and Mamma
  14. a promise new presidents take
  15. an arrangement, how it looks
Down
  1. 1000 megabytes
  2. CPU, how fast it is
  3. flash drive plugin
  4. ex: Google and Bing
  5. the arrangement of data
  6. 1000 bytes
  7. similar to powerpoint
  8. gaming ports
  9. an image representing a business, store, etc.
  10. security/protection online
  11. to make sure no one takes/copies your work
  12. a character
  13. 1000 gigabytes
  14. ex: phone
  15. a formal introduction into office
  16. RAM
  17. safety online
  18. headphone plugin
  19. flash drive
  20. DSL, Cable
  21. who, what, why
  22. a port to plug in an internet cable
  23. ex: mouse and keyboard
  24. mobile storage
  25. 1000 kilobytes
  26. online
  27. 3G and 4G are options
  28. pre-made document to fill in
  29. ex: printer
  30. 8 bits

45 Clues: RAMcreditonline8 bitsinternetpamphletex: phone1000 bytesDSL, Cablea characterex: Comcastflash driveex: printergaming portssafety onlinecircuit board1000 megabytes1000 gigabyteswho, what, whymobile storage1000 kilobytesex: Angry Birdsbehavior onlineblank work spaceheadphone pluginflash drive pluginCPU, how fast it isex: Google and Bing...

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. seru Simbol yang digunakan untuk mencari frasa persis.
  2. Konten negatif yang menyebar kebencian antar golongan.
  3. Salah satu tanda konten tidak valid adalah tidak adanya __ terpercaya
  4. Media digital yang menyajikan data secara visual.
  5. Informasi palsu yang sering viral di internet.
  6. Gabungan antara ilmu data dan kecerdasan buatan.
  7. Lembaga resmi yang mengatur HAKI di Indonesia.
  8. Operator untuk membatasi pencarian hanya dalam satu situs.
  9. Lembaga pemerintah yang menangani regulasi internet di Indonesia.
  10. Simbol dagang milik perusahaan.
  11. Hak atas ciptaan seperti musik, buku, dan film.
  12. security Ahli dalam menjaga keamanan sistem digital.
  13. Orang yang membuat program komputer.
  14. Hak khusus yang dimiliki pencipta atas karya mereka
Down
  1. minus Operator untuk mengecualikan kata dalam pencarian.
  2. Profesi yang menganalisis data untuk mengambil keputusan.
  3. Proses memastikan keaslian dan kebenaran informasi.
  4. Bahasa, adat, dan pakaian tradisional adalah contoh dari __ budaya.
  5. Cerita rakyat yang bisa diangkat menjadi konten digital.
  6. Profesi yang merancang tampilan antarmuka aplikasi.
  7. Proses penyebaran konten ke berbagai platform.
  8. Mesin pencari paling populer di dunia.
  9. Kata logika untuk mencari dua kata sekaligus.
  10. Bentuk seni budaya berupa gerakan tubuh yang ritmis.
  11. Hak atas penemuan atau inovasi teknologi.

25 Clues: Simbol dagang milik perusahaan.Orang yang membuat program komputer.Mesin pencari paling populer di dunia.Hak atas penemuan atau inovasi teknologi.Kata logika untuk mencari dua kata sekaligus.Informasi palsu yang sering viral di internet.Proses penyebaran konten ke berbagai platform.Lembaga resmi yang mengatur HAKI di Indonesia....

EVOLUÇÃO INDUSTRIAL 2024-01-21

EVOLUÇÃO INDUSTRIAL crossword puzzle
Across
  1. Tipo de produção aplicada na montagem do Ford-T em 1870
  2. Compartilha de forma segura o espaço de trabalho entre operadores.
  3. Recria cópia tridimensional de peças e protótipos
  4. Identifica tendências e recomendações para otimização dos processos
  5. Custo na Industria 4.0
  6. Cloud Computing
  7. Tecnologia óptica
  8. Tecnologia que proporcionou um leve aumento de produção em 1784
  9. Energia que ocasionou a 2ª Revolução Industrial
  10. Tipo de demanda que ocasionou a 4ª Revolução Industrial
  11. Produtividade na Industria 4.0
Down
  1. Analisa os dados e planeja a manutenção para evitar paradas inesperadas
  2. Fábrica no ambiente digital para otimizar a concepção de uma estrutura de produção.
  3. Fornece informações adaptadas ao contexto mesclados ao seu campo de visão.
  4. Trabalhos realizados em 1784
  5. Possibilita obter informações sobre o ciclo de vida do produto desde a criação ao descarte
  6. Security Medidas físicas e lógicas de segurança usada para proteger a grandes estruturas de ameaças
  7. Controlador Lógico Programável
  8. Sistema que combina tecnologia cibernética, mecânica e eletrônica
  9. Tipo de manufatura na Industria 4.0
  10. Conectividade dos dispositivos no chão de fábrica diretamente na internet

21 Clues: Cloud ComputingTecnologia ópticaCusto na Industria 4.0Trabalhos realizados em 1784Controlador Lógico ProgramávelProdutividade na Industria 4.0Tipo de manufatura na Industria 4.0Energia que ocasionou a 2ª Revolução IndustrialRecria cópia tridimensional de peças e protótiposTipo de produção aplicada na montagem do Ford-T em 1870...

CISO Crossword Quiz - 0824 2024-06-25

CISO Crossword Quiz - 0824 crossword puzzle
Across
  1. Phishing Techniques used to target CEO,CFO etc. (Top executives of a company)
  2. A sequence of words or other texts used to control access to a computer system, program or data which is usually longer than a password
  3. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
  4. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
  5. An unethical practice of redirecting a link to a middle-man or aggregator site rather than the original site it was directed to
  6. The process of transforming a given string of characters into another value for the purpose of security which is very difficult to decode
  7. Process of verifying a user identity before granting access
Down
  1. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  2. A software developed by hackers to steal data and damage or destroy computer systems
  3. An attack technique that tricks a user into clicking a invisible webpage element & redirecting to a malware-containing websites
  4. Cyber fraudsters use fake QR codes to redirect victims to malicious websites or prompt them to download harmful content
  5. Unauthorised access to data by exploiting a weakness in the IT system

12 Clues: Process of verifying a user identity before granting accessUnauthorised access to data by exploiting a weakness in the IT systemPhishing Techniques used to target CEO,CFO etc. (Top executives of a company)A software developed by hackers to steal data and damage or destroy computer systems...

CISO Crossword Quiz-0223 2023-02-10

CISO Crossword Quiz-0223 crossword puzzle
Across
  1. A client computer program that can retrieve and display information from servers on the World Wide Web.
  2. A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  3. A network of computers infected by malware that are controled by a single attacker.
  4. The encrypted text transformed from plaintext using an encryption algorithm.
  5. Cyber Attack in which hackers use the computing power of a compromised device to mine cryptocurrency.
  6. The process of decoding cipher text to plain text so that it is readable by humans.
Down
  1. A software which bombards users with endless malicious ads and pop-up windows or redirect to other website
  2. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites.
  3. A collection of malicious software tools that allow hackers to remotely access and control a computer or network.
  4. A controlled and safe environment set up as a decoy/trap to lure cyber attackers & study their hacking attempts
  5. A computer malware that can reproduce itself and spreads copies to other computers in the network.
  6. A piece of data from the website you visited, stored within the web browser that the website can retrieve at a later time.

12 Clues: The encrypted text transformed from plaintext using an encryption algorithm.A network of computers infected by malware that are controled by a single attacker.The process of decoding cipher text to plain text so that it is readable by humans.A computer malware that can reproduce itself and spreads copies to other computers in the network....

Tugas - Jaringan Komputer dan Internet 2024-01-11

Tugas - Jaringan Komputer dan Internet crossword puzzle
Across
  1. Jaringan yang mencakup wilayah kecil
  2. Nama lain yang memiliki arti Pertukaran Data Elektronik
  3. ... anchor kustom: Menyesuaikan Certificate Authority (CA) mana yang dipercaya untuk koneksi aman suatu aplikasi.
  4. Salah satu komponen jaringan komputer
  5. Pada jaringan komputer, berbagi sumber daya atau ... seharusnya dapat dilakukan tanpa terkendala jarak.
  6. Tata kelola secara historis telah digunakan untuk mengunci data dalam
Down
  1. Salah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna
  2. Guna menentukan bagaimana langkah sebuah perusahaan atau organisasi dalam merespons insiden dunia maya atau peristiwa lain yang menyebabkan hilangnya data atau terganggunya kegiatan operasional, digunakan salah satu jenis cyber security yakni?
  3. Lapisan pertama pada model OSI
  4. Topologi yang disebut topologi cincin

10 Clues: Lapisan pertama pada model OSIJaringan yang mencakup wilayah kecilTopologi yang disebut topologi cincinSalah satu komponen jaringan komputerNama lain yang memiliki arti Pertukaran Data ElektronikTata kelola secara historis telah digunakan untuk mengunci data dalamSalah satu manfaat jaringan komputer adalah meningkatkan...antar pengguna...

Jaringan komputer dan internet 2024-01-12

Jaringan komputer dan internet crossword puzzle
Across
  1. metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya .
  2. perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumberdaya satusama lain.
  3. berkaitan dengan aspek yang menentukan kualitas dari sistem informasi
  4. berasal dari dua kata dalam bahasa Inggris yakni cyber yang artinya dunia maya (internet) dan security yang artinya keamanan
  5. transmisi data terstruktur antar organisasi secara elektronis.
Down
  1. metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis.
  2. ada 7 lapisan
  3. memungkinkan aplikasi menyesuaikan setelan keamanan jaringannya dalam file konfigurasi deklaratif yang aman tanpa memodifikasi kode aplikasi.
  4. Open Systems Interconnection
  5. salah satu Perangkat Koneksi

10 Clues: ada 7 lapisanOpen Systems Interconnectionsalah satu Perangkat Koneksitransmisi data terstruktur antar organisasi secara elektronis.berkaitan dengan aspek yang menentukan kualitas dari sistem informasimetode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya ....

English for IT - Units 5 and 6 Vocabulary Revision 2023-08-07

English for IT - Units 5 and 6 Vocabulary Revision crossword puzzle
Across
  1. Business-to-business: companies exchange information and make transactions.
  2. Online shopping is really __________. You don’t need to go anywhere, you can shop from home.
  3. __________ networks have a limited range.
  4. After the customer puts the items in the __________ cart, he/she checks the order.
  5. Customers can use their credit cards, PayPal or electronic cheques to pay for __________.
Down
  1. A __________ modulates and demodulates the data into a signal.
  2. __________ is the maximum throughput of data in bits per second.
  3. The LAN allows you to share information __________ users.
  4. We are developing new website __________ features. We will have a VPN with a firewall which will help stop cyber attacks.
  5. Local area network

10 Clues: Local area network__________ networks have a limited range.The LAN allows you to share information __________ users.A __________ modulates and demodulates the data into a signal.__________ is the maximum throughput of data in bits per second.Business-to-business: companies exchange information and make transactions....

LMS&NM 2023 2023-12-06

LMS&NM 2023 crossword puzzle
Across
  1. What does the ‘T’ stand for in DT&A
  2. Who joined the Insights team in November? (HINT 2 words ed8)
  3. It is ? Indigenous Australian cultural awareness training must be completed by 31 December
  4. What book did Deborah Robinson enjoy reading? (HINT 2 words ed5)
Down
  1. Which month does Commissioner Jordan AO retire?
  2. The GPFS team undertook detailed analysis of what patterns (HINT ed8)
  3. What game has been developed to demonstrate unscrupulous infiltration? (HINT 2 words)
  4. What month was Cyber Security Awareness?
  5. What does Kym Myall drive as a hobby (HINT ed2)
  6. The New Measures team added what well attended program to their portfolio (HINT ed8)

10 Clues: What does the ‘T’ stand for in DT&AWhat month was Cyber Security Awareness?Which month does Commissioner Jordan AO retire?What does Kym Myall drive as a hobby (HINT ed2)Who joined the Insights team in November? (HINT 2 words ed8)What book did Deborah Robinson enjoy reading? (HINT 2 words ed5)...

Belmont Banner crossword 2016-06-22

Belmont Banner crossword crossword puzzle
Across
  1. What company supported the landbuggy project?
  2. What sort of light display is used for the microbit?
  3. University What university did the cyber security event take place in?
  4. did Mr Watson sign up to get housepoints?
  5. Where did the Wider Acheivement year award?
  6. What English teacher is retiring this year?
  7. What is the name of the Knex challenge?
  8. Reid What maths teacher is retiring this year?
  9. What did the new first year's say that they are looking forward to in Belmont?
  10. long did the sports day cycle last for?
  11. lunch day is windband?
  12. Who won the Scottish Schools young Writer of the year award?
Down
  1. did the domestic abuse talk in the assembly?
  2. What Pupil Support Teacher is retiring this year?
  3. are STEM emphasising this year?
  4. What are the senior stem pupils working on?
  5. lunch day is windband?
  6. What is the name of the main male lead character in the Little Shop Of Horror School show?

18 Clues: lunch day is windband?lunch day is windband?are STEM emphasising this year?What is the name of the Knex challenge?long did the sports day cycle last for?did Mr Watson sign up to get housepoints?What are the senior stem pupils working on?Where did the Wider Acheivement year award?What English teacher is retiring this year?...

Digital Crossword Awesome Privacy Week '25 2025-01-27

Digital Crossword Awesome Privacy Week '25 crossword puzzle
Across
  1. A key document that explains how an individual's data is stored, used, and shared.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. An extra layer of security that requires more than just a password.
  4. A cyber attack where attackers trick individuals into revealing sensitive information.
  5. The process of removing personal identifiers from datasets.
  6. The act of removing or disguising personal identifiers from datasets.
  7. A tool used to record every keystroke typed on a keyboard.
  8. The practice of protecting systems, networks, and programs from digital attacks.
  9. Data that describes and gives information about other data.
  10. Theft Fraudulent use of someone's personal data to commit crimes.
  11. A browser feature that prevents storing history, cookies, and site data.
  12. Malicious software that locks users out of their data until a ransom is paid.
Down
  1. AI-generated media that mimics real people and can be used for deception.
  2. Unauthorized access or damage to computer systems and networks.
  3. Small files stored on a user’s browser to track online activities.
  4. Malicious software designed to harm or exploit computers and networks.
  5. The process of encoding information to prevent unauthorized access.
  6. Malicious software that secretly gathers user information.
  7. A U.S. law that gives California residents rights over their personal data.
  8. Publishing private or identifying information about someone online without consent.
  9. A tool that encrypts internet connections to enhance privacy.
  10. A European Union law that regulates data protection and privacy.
  11. Software vulnerability unknown to developers and exploited by hackers.

23 Clues: A tool used to record every keystroke typed on a keyboard.Malicious software that secretly gathers user information.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

Social media / cyber security / digital literacy 2025-07-09

Social media / cyber security / digital literacy crossword puzzle
Across
  1. Information about yourself online; often found on your account
  2. Symbol used to group topics on social media
  3. Connection to the internet without wires
  4. What you do to stop someone from contacting you online
  5. A strong word or phrase used to keep your accounts secure
  6. A person who tries to cheat others online
  7. Protection system that blocks unauthorized access
  8. A form of online abuse or harassment
Down
  1. Settings that control who sees your content online
  2. Misleading or untrue content shared to deceive people
  3. A criminal who tries to steal or break into digital systems
  4. Unwanted messages often sent to your inbox
  5. A name or handle you use to log into digital accounts
  6. A short word or icon that shows emotion in messages
  7. A person who posts hurtful or misleading comments online

15 Clues: A form of online abuse or harassmentConnection to the internet without wiresA person who tries to cheat others onlineUnwanted messages often sent to your inboxSymbol used to group topics on social mediaProtection system that blocks unauthorized accessSettings that control who sees your content online...

BTEC DIT C3B - Cyber Security 2025-03-07

BTEC DIT C3B - Cyber Security crossword puzzle
Across
  1. A method of authentication that uses parts of the body for identification
  2. Malware that encrypts a computer system until a fee is paid
  3. A reason for attacking a system purely to cause downtime
  4. When a user is directed to a phoney/spoof website where their personal details will be collected
  5. The act of tricking a person to voluntarily giving personal details / money
Down
  1. When a security system has been attacked/compromised
  2. Prevents unwanted internet traffic from entering a digital system or network
  3. Spying on other companies
  4. Device ______________ : a range of measures to make a system less vulnerable to attack
  5. A threat coming from outside an organisation
  6. A threat coming from inside an organisation

11 Clues: Spying on other companiesA threat coming from inside an organisationA threat coming from outside an organisationWhen a security system has been attacked/compromisedA reason for attacking a system purely to cause downtimeMalware that encrypts a computer system until a fee is paid...

Unifi EHSS Summer Security 2023-07-17

Unifi EHSS Summer Security crossword puzzle
Across
  1. Something that holds you to the rules
  2. Follow closely behind someone through a door
  3. Do this when badge not displayed/displayed properly
  4. Report to those who need to know
  5. Deliberately misrepresenting something
  6. Airport Operations Area
  7. TSA Aircraft Operators Standard Security Program
  8. Access granted
Down
  1. Protected against unauthorized access
  2. Make sure accurate name and photo of pax
  3. Transportation Security Administration
  4. Keep Safe From
  5. Used to keep your login secure
  6. Ground Security Coordinator
  7. Security Identification Area
  8. Completed before first departure of the day
  9. Security technique to regulate resources
  10. Sensitive Security Information
  11. Intended to deceive others
  12. Imposed from breaking security protocol

20 Clues: Keep Safe FromAccess grantedAirport Operations AreaIntended to deceive othersGround Security CoordinatorSecurity Identification AreaUsed to keep your login secureSensitive Security InformationReport to those who need to knowProtected against unauthorized accessSomething that holds you to the rulesTransportation Security Administration...

Identity Theft Statistics 2014-07-22

Identity Theft Statistics crossword puzzle
Across
  1. The most common form of cyber identity theft.
  2. The average loss per identity theft incident (in thousands) per consumer.
  3. This race of people have their identities stolen the most by cyber thieves.
  4. This age group is victimized the most when it comes to cyber identity theft.
  5. Accounts Cyber thieves use card skimmers to steal pin numbers to access these.
Down
  1. This is the average number of identity theft victims in the U.S. annually.
  2. Dakota This state, home to Mt. Rushmore has the lowest identity theft complaint rate.
  3. This state has the second highest identity theft complaint rate.
  4. This U.S. Southwestern state has the highest identity theft complaint rate.
  5. The percentage of U.S. households that report some type of identity theft.
  6. Total financial loss (in billions) attributed to identity theft.

11 Clues: The most common form of cyber identity theft.This state has the second highest identity theft complaint rate.Total financial loss (in billions) attributed to identity theft.The average loss per identity theft incident (in thousands) per consumer.This is the average number of identity theft victims in the U.S. annually....

Malware 2023-04-18

Malware crossword puzzle
Across
  1. Makes changes to files that are native to the OS
  2. Infects mobile devices.
  3. Monitors users' keystrokes
  4. a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit
  5. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  6. Disable victim's access to data until ransom is paid
  7. serves unwanted advertisements
  8. an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders
  9. Spreads through a network by replicating itself.
  10. Disguises itself as desirable code
Down
  1. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. Gives hackers remote control of a victim's device.
  3. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
  4. Collects user activity data without their knowledge
  5. Erases user data beyond recoverability.
  6. an online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online currency known as cryptocurrencies
  7. a Trojan that is designed to gather information from a system
  8. software designed to interfere with a computer's normal functioning,
  9. a robust cyber security solution that adds an extra layer of security to your computer to protect against cyberattacks.
  10. an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

20 Clues: Infects mobile devices.Monitors users' keystrokesserves unwanted advertisementsDisguises itself as desirable codeErases user data beyond recoverability.Makes changes to files that are native to the OSSpreads through a network by replicating itself.Gives hackers remote control of a victim's device.Collects user activity data without their knowledge...

Digital Crossword Awesome Privacy Week '25 2025-01-27

Digital Crossword Awesome Privacy Week '25 crossword puzzle
Across
  1. A key document that explains how an individual's data is stored, used, and shared.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. An extra layer of security that requires more than just a password.
  4. A cyber attack where attackers trick individuals into revealing sensitive information.
  5. The process of removing personal identifiers from datasets.
  6. The act of removing or disguising personal identifiers from datasets.
  7. A tool used to record every keystroke typed on a keyboard.
  8. The practice of protecting systems, networks, and programs from digital attacks.
  9. Data that describes and gives information about other data.
  10. Theft Fraudulent use of someone's personal data to commit crimes.
  11. A browser feature that prevents storing history, cookies, and site data.
  12. Malicious software that locks users out of their data until a ransom is paid.
Down
  1. AI-generated media that mimics real people and can be used for deception.
  2. Unauthorized access or damage to computer systems and networks.
  3. Small files stored on a user’s browser to track online activities.
  4. Malicious software designed to harm or exploit computers and networks.
  5. The process of encoding information to prevent unauthorized access.
  6. Malicious software that secretly gathers user information.
  7. A U.S. law that gives California residents rights over their personal data.
  8. Publishing private or identifying information about someone online without consent.
  9. A tool that encrypts internet connections to enhance privacy.
  10. A European Union law that regulates data protection and privacy.
  11. Software vulnerability unknown to developers and exploited by hackers.

23 Clues: A tool used to record every keystroke typed on a keyboard.Malicious software that secretly gathers user information.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

U8 Technical Areas 2025-04-07

U8 Technical Areas crossword puzzle
Across
  1. The app is only compatible with the latest ---- system.
  2. Please check the product ---- before shipping it to the customer.
  3. A ---- message appeared to warn about low storage space.
  4. The app has a user-friendly ---- that is easy to navigate.
  5. Our team uses an online ---- to manage customer orders.
  6. The factory increased its production ---- to meet higher demand.
  7. Please enter the ---- number to activate your software.
  8. Customers love the ---- features on our website, such as live chat and product demos.
  9. Click the email ---- on your screen to open your inbox.
  10. The office uses a ---- printer that connects to all computers.
  11. New employees must ---- themselves with the company’s software system.
Down
  1. You need to ---- the software to fix security bugs.
  2. Please check the ---- to see the status of the delivery system.
  3. During the meeting, everyone used their ---- to take notes and share documents.
  4. Please read the instruction ---- before installing the new device.
  5. It's time to ---- our office equipment to keep up with the latest technology.
  6. The ---- industry has grown rapidly due to the increase in online shopping.
  7. We use ---- equipment to ensure the best quality.
  8. The company hired a ---- security expert to protect customer data.
  9. The product was tested in the company’s research ---- before launch.
  10. We are now using the latest ---- of the accounting software.
  11. The ---- received funding from several investors to develop its new app.
  12. The ---- fixed the printer within 30 minutes.
  13. A stable internet ---- is required for video meetings.

24 Clues: The ---- fixed the printer within 30 minutes.We use ---- equipment to ensure the best quality.You need to ---- the software to fix security bugs.A stable internet ---- is required for video meetings.The app is only compatible with the latest ---- system.Our team uses an online ---- to manage customer orders....

Belmont Banner Crossword 2016-06-22

Belmont Banner Crossword crossword puzzle
Across
  1. What is the name of the Knex challenge?
  2. What lunch day is windband?
  3. Who did the domestic abuse talk in the assembly?
  4. What English teacher is retiring this year?
  5. What company supported the landbuggy project?
  6. How long did the sports day cycle last for?
  7. What sort of light display is used for the microbit?
  8. What are the senior stem pupils working on?
  9. Who won the Scottish Schools young Writer of the year award?
  10. Where did the Wider Acheivement year award?
Down
  1. What are STEM emphasising this year?
  2. What did Mr Watson sign up to get housepoints?
  3. What university did the cyber security event take place in?
  4. What is the name of the main male lead character in the Little Shop Of Horror School show?
  5. What lunch day is windband?
  6. What did the new first year's say that they are looking forward to in Belmont?
  7. Reid What maths teacher is retiring this year?
  8. What Pupil Support Teacher is retiring this year?

18 Clues: What lunch day is windband?What lunch day is windband?What are STEM emphasising this year?What is the name of the Knex challenge?What English teacher is retiring this year?How long did the sports day cycle last for?What are the senior stem pupils working on?Where did the Wider Acheivement year award?What company supported the landbuggy project?...

CyberBullying 2017-06-19

CyberBullying crossword puzzle
Across
  1. A person that makes you feel unsafe?
  2. Cyber bullying is
  3. Cyber bullying can happen
  4. Cyberbullying can lead to what?
  5. Where does cyber bullying take place?
Down
  1. Bullies name call because they are
  2. What should you do when a bully message you?
  3. When bullying happens at home who do you tell?
  4. When bullying happens at school who do you tell?
  5. You should always make sure your online presence is?

10 Clues: Cyber bullying isCyber bullying can happenCyberbullying can lead to what?Bullies name call because they areA person that makes you feel unsafe?Where does cyber bullying take place?What should you do when a bully message you?When bullying happens at home who do you tell?When bullying happens at school who do you tell?...

2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06

2019 – NCSAM Cyber Security Crossword Puzzle Challenge crossword puzzle
Across
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  2. Something you should never share with another person.
  3. The month in which National Cyber Security Awareness Month occurs.
  4. When someone follows a person into a secured area without proper credentials.
  5. Links with catchy titles that lure users into opening them.
  6. Malware that replicates itself, so it can spread to infiltrate other computers.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. Don’t download these unless you know and have confirmed the sender.
  9. Kids and parents should be aware of these online bullies.
  10. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Down
  1. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  2. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  3. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  4. A type of malware that locks your computer until you pay to have it unlocked.
  5. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door.”
  6. Stop. ____. Connect.
  7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  8. A technique used by hackers to obtain sensitive information.
  9. You should check these regularly.
  10. The acronym for the month of cybersecurity awareness events.
  11. Acronym for Protected Health Information.
  12. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  13. A personal identification number commonly associated with an ATM.
  14. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.

24 Clues: Stop. ____. Connect.You should check these regularly.Acronym for Protected Health Information.Something you should never share with another person.Kids and parents should be aware of these online bullies.Links with catchy titles that lure users into opening them.A technique used by hackers to obtain sensitive information....

Awesome Privacy Week '25 2025-01-27

Awesome Privacy Week '25 crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic.
  2. An extra layer of security that requires more than just a password.
  3. Malicious software designed to harm or exploit computers and networks.
  4. A European Union law that regulates data protection and privacy.
  5. A tool that encrypts internet connections to enhance privacy.
  6. A U.S. law that gives California residents rights over their personal data.
  7. The practice of protecting systems, networks, and programs from digital attacks.
  8. Publishing private or identifying information about someone online without consent.
  9. AI-generated media that mimics real people and can be used for deception.
  10. Small files stored on a user’s browser to track online activities.
  11. A tool used to record every keystroke typed on a keyboard.
  12. A browser feature that prevents storing history, cookies, and site data.
  13. The act of removing or disguising personal identifiers from datasets.
  14. A key document that explains how an individual's data is stored, used, and shared.
Down
  1. The process of removing personal identifiers from datasets.
  2. The process of encoding information to prevent unauthorized access.
  3. Malicious software that secretly gathers user information.
  4. Software vulnerability unknown to developers and exploited by hackers.
  5. A cyber attack where attackers trick individuals into revealing sensitive information.
  6. Theft Fraudulent use of someone's personal data to commit crimes.
  7. Unauthorized access or damage to computer systems and networks.
  8. Data that describes and gives information about other data.
  9. Malicious software that locks users out of their data until a ransom is paid.

23 Clues: Malicious software that secretly gathers user information.A tool used to record every keystroke typed on a keyboard.The process of removing personal identifiers from datasets.Data that describes and gives information about other data.A tool that encrypts internet connections to enhance privacy....

tecnologia y ciencia #1 2023-02-08

tecnologia y ciencia #1 crossword puzzle
Across
  1. losmediossociales
  2. bullying elciberacoso
  3. program elprogramadecomputacion
  4. elenlace
  5. elcorrectorortografico
  6. lainteligenciaartificial
  7. lared
  8. losauriculares
  9. lacontrasena
  10. arroba
Down
  1. lacamara digital
  2. elciberespacio
  3. elnombredeusuario
  4. elaltavozinteligente
  5. address ladireccionelectronica
  6. laherramienta
  7. elmensaje
  8. elmensajedetexto
  9. lacomputadoraportatil
  10. science lainformatica

20 Clues: laredarrobaelenlaceelmensajelacontrasenalaherramientaelciberespaciolosauriculareslacamara digitalelmensajedetextolosmediossocialeselnombredeusuarioelaltavozinteligentebullying elciberacosolacomputadoraportatilscience lainformaticaelcorrectorortograficolainteligenciaartificialaddress ladireccionelectronicaprogram elprogramadecomputacion

Cyber Congress Slangs Crossword 2021-06-09

Cyber Congress Slangs Crossword crossword puzzle
Across
  1. I miss our canteen’s bullet rolls. No CAP.
  2. DAE feel like everyday’s the same?
  3. TIL a lot of internet slangs.
  4. I don’t usually talk to my IRL friends.
  5. Anyone who shares NSFW content will be removed from the group chat.
  6. WIP dude, we’re still promoting the cyber congress.
  7. Please don’t disturb me. I’m going AFK.
Down
  1. IIRC you mentioned that you’re busy this weekend
  2. The ship is sending out an SOS signal!
  3. INB4 Mumbai Indians wins this year’s IPL.
  4. Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime’ refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer. Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime. TLDR:- cyber crime exists in varied forms.
  5. I don’t understand how thermodynamics work. Can you ELI5?
  6. Hi! I’m your human search engine. You can ask me AMA.

13 Clues: TIL a lot of internet slangs.DAE feel like everyday’s the same?The ship is sending out an SOS signal!I don’t usually talk to my IRL friends.Please don’t disturb me. I’m going AFK.INB4 Mumbai Indians wins this year’s IPL.I miss our canteen’s bullet rolls. No CAP.IIRC you mentioned that you’re busy this weekend...

CSE167 Terminology 2022-04-27

CSE167 Terminology crossword puzzle
Across
  1. 2 Words A technique used to manipulate and deceive people in the real world to gain sensitive and private information.
  2. 2 Words. an act that sought to curb unsolicited commercial emails
  3. a cyber attack used to obtain information like passwords and bank info.
  4. 2 Words. An attack that is done over an online format.
  5. Any weakness in an asset or security protection which would allow for a threat to cause harm.
  6. things that can protect your defense points (methods)
  7. 2 Words. attacker tries to crack the password by submitting various combinations until the correct one is found
  8. A form of cyber attack that floods a service with malicious traffic or data to shut it down
  9. A form of malware that monitors user activities and reports them to an external party.
  10. From the CIA triad: Information kept private and secure
  11. 2 Words. key points which should be identified to protect
  12. A collection of computers with malware that allows a hacker to run software used for illegal purposes.
  13. A copy of the system or networks data for file restoration or archival purposes
  14. Study of secure communication technics in the presence of third parties
Down
  1. a set of programs that tell a computer to perform a task
  2. A malicious application or script that can be used to take advantage of a vulnerability
  3. From the CIA triad: Data not modified (deleted or added)
  4. Possibility of suffering loss. Areas include financial, legal, strategic, and security.
  5. 4 Words A type of attack where an attacker secretly intercepts and possibly alters the communications between two parties.
  6. 3 Words. A game in which keys are intentionally hidden within vulnerable programs or websites.
  7. a tool that allows users to remain anonymous on the internet
  8. 2 Words. A program that helps users and businesses securely store and manage their login credentials.
  9. 2 Words. Attackers try to gain authentication by cracking the password hash. And they do it by using a list of pre-computed hashes of possible password combinations.
  10. the attacker systematically enters every word in the dictionary to crack the password
  11. Decentralized naming system used to associate domain names with other forms of information.
  12. A form of malware that focuses on replication and distribution.
  13. 2 Words. your public key can be used to send encrypted messages which other people can decrypt with the key
  14. From the CIA triad: Record the identities and activities

28 Clues: things that can protect your defense points (methods)2 Words. An attack that is done over an online format.From the CIA triad: Information kept private and securea set of programs that tell a computer to perform a taskFrom the CIA triad: Data not modified (deleted or added)From the CIA triad: Record the identities and activities...

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Find hidden messages or attacks within innocent-looking files.
  2. Malware that collects information about you
  3. A wall or partition designed to inhibit or prevent the spread of fire.
  4. Manifestation signifying hostile intention, the plan to cause harm.
  5. The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
  1. Malware that blocks access and demands ransom
  2. A cyber security professional who deal with testing vulnerabilities to help owners of application or website
  3. A type of malware that is often masked as genuine software
  4. Improve or correct by inserting a patch. It's a synonym of update

9 Clues: Malware that collects information about youMalware that blocks access and demands ransomA type of malware that is often masked as genuine softwareFind hidden messages or attacks within innocent-looking files.Improve or correct by inserting a patch. It's a synonym of updateManifestation signifying hostile intention, the plan to cause harm....

40. 2021-03-19

40. crossword puzzle
Across
  1. Police force heading west, and east, take great risks
  2. Cellphone info collected by the NSA, per the Snowden documents
  3. PALACE Nickname for the National Security Agency
  4. Security office array
  5. Bear from Orient taken out of Lake Ontario (5)
  6. Stud poker poets play out with the Northern Iraqi (4)
  7. Refugees from the East taken by 50 states (7)
  8. Old Northern Iraqi in Middle East taken in backing National Security Agency (8)
  9. Commander in NSA outfit taking time off in Asian city (8)
  10. Rifles National Security Agency kept in shelves (8)
  11. National security concern
Down
  1. Swindler from East taken in by gossip (5)
  2. The headquarters of the US National Security Agency is located in Maryland's Fort ...
  3. Security agency trainee holds up no mere ritual act (10)
  4. NSA invasions
  5. Assault prompting inapt reaction in old northern street
  6. The FSB is this country's main security agency (6)
  7. Arizona, then some old Northern Isles, leaving North Dakota to climb height in Italy
  8. National Security Agency
  9. Security agency of the Soviet Union from 1954-91 (3)

20 Clues: NSA invasionsSecurity office arrayNational Security AgencyNational security concernSwindler from East taken in by gossip (5)Refugees from the East taken by 50 states (7)Bear from Orient taken out of Lake Ontario (5)PALACE Nickname for the National Security AgencyThe FSB is this country's main security agency (6)...

Lions Clubs Projects Match 2023-01-16

Lions Clubs Projects Match crossword puzzle
Across
  1. Admin sports team fundraiser
  2. San Mateo Lions Club
  3. Bay Area Global Outreach Lions Club, Burlingame LC
  4. Millbrae, San Bruno, Foster City LC
  5. SSF Golden Gate Lions Club
  6. Half Moon Bay LC
  7. Foster City Lions Club, Redwood Sunrise LC
  8. SF Geneva-Excelsior Lions Club
  9. Peninsula Veterans, Bay Area Global Outreach LC
Down
  1. SF Premier, SF Host, Peninsula Special Interest LC
  2. Silicon Vally Cyber Lions Club
  3. Foster City Bair Island Cyber Lions Club
  4. Burlingame and Millbrae Lions Clubs
  5. SF Nikkei Lions Club
  6. San Bruno LC
  7. San Carlos LC
  8. Bay Area Special Olympics Lions Club
  9. SF Unified Lions Club or San Bruno Lions Club

18 Clues: San Bruno LCSan Carlos LCHalf Moon Bay LCSan Mateo Lions ClubSF Nikkei Lions ClubSSF Golden Gate Lions ClubAdmin sports team fundraiserSilicon Vally Cyber Lions ClubSF Geneva-Excelsior Lions ClubBurlingame and Millbrae Lions ClubsMillbrae, San Bruno, Foster City LCBay Area Special Olympics Lions ClubFoster City Bair Island Cyber Lions Club...

Cyber Bullying 2017-12-11

Cyber Bullying crossword puzzle
Across
  1. our teacher
  2. online bully
  3. serious cases of cyber bullying is
Down
  1. when you blackmail someone online
  2. the person getting cyber bullied
  3. authority that can help
  4. cyber bullying is
  5. gucci gang...

8 Clues: our teacheronline bullygucci gang...cyber bullying isauthority that can helpthe person getting cyber bulliedwhen you blackmail someone onlineserious cases of cyber bullying is

DEFINITIONS of Cyber ​​Security 2020-08-20

DEFINITIONS of Cyber ​​Security crossword puzzle
Across
  1. It's a trick that they do to decipher people's bank account passwords, etc.
  2. it's a program that removes viruses, etc, before they enter a device.
  3. it's information that web pages save to your computer, like your username,etc, but it doesn't reach a person with an unknown identity.
  4. It's malicious software that infiltrates your device without your knowing.
Down
  1. It's a software that colect information of the computers and gives it to an to an unknown identity without the owner of the computer noticing.
  2. is a system that prevents unauthorized access to a private network
  3. they are computer programs that want to alter your computer.
  4. it's an email not requested that people receive, usually it's advertising.

8 Clues: they are computer programs that want to alter your computer.is a system that prevents unauthorized access to a private networkit's a program that removes viruses, etc, before they enter a device.it's an email not requested that people receive, usually it's advertising.It's malicious software that infiltrates your device without your knowing....

2019 – NCSAM Cyber Security Crossword Puzzle Challenge 2019-08-06

2019 – NCSAM Cyber Security Crossword Puzzle Challenge crossword puzzle
Across
  1. to a computer through a “back door.”
  2. Acronym for Protected Health Information.
  3. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  4. Stop. ____. Connect.
  5. You should check these regularly.
  6. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
  7. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  8. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  9. A piece of malware that often allows a hacker to gain remote
  10. A technique used by hackers to obtain sensitive information.
  11. The acronym for the month of cybersecurity awareness events.
  12. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  13. Something you should never share with another person.
  14. The month in which National Cyber Security Awareness Month occurs.
Down
  1. Links with catchy titles that lure users into opening them.
  2. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
  3. Kids and parents should be aware of these online bullies.
  4. When someone follows a person into a secured area without proper credentials.
  5. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  6. Don’t download these unless you know and have confirmed the sender.
  7. A personal identification number commonly associated with an ATM.
  8. Malware that replicates itself, so it can spread to infiltrate other computers.
  9. A type of malware that locks your computer until you pay to have it unlocked.
  10. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  11. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network

25 Clues: Stop. ____. Connect.You should check these regularly.to a computer through a “back door.”Acronym for Protected Health Information.Something you should never share with another person.Kids and parents should be aware of these online bullies.Links with catchy titles that lure users into opening them....

Day 4 Cyber Security 2 Chapter 4 2025-10-13

Day 4 Cyber Security 2 Chapter 4 crossword puzzle
Across
  1. The unauthorized transfer of data from a computer system.
  2. A weakness in a system that can be exploited by a threat.
  3. A hardware device or software program that stops network traffic based on a set of rules.
  4. A computer that is part of a botnet, controlled by an attacker.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  6. The practice of sending fraudulent emails that resemble emails from reputable sources to induce individuals to reveal personal information.
  7. The process of verifying the identity of a user.
  8. A unique identifier for a device on a network (abbreviation).
  9. A set of rules governing the exchange or transmission of data between devices.
  10. A secret word or phrase that must be used to gain admission to something.
  11. A program that appears to do one thing but actually does another, often malicious, thing. (2 words)
  12. Software that is intended to damage or disable computers and computer systems.
  13. A system that detects and prevents malicious activities on a network (abbreviation).
Down
  1. The 'A' in the CIA Triad, ensuring that systems and data are available to authorized users when needed.
  2. The act of deceiving someone into revealing sensitive information. (2 words)
  3. The process of making data unreadable to unauthorized users.
  4. The process of granting or denying approval to use specific resources.
  5. A type of attack that overwhelms a system with traffic, making it unavailable to users (abbreviation).
  6. A network security device that monitors and filters incoming and outgoing network traffic.
  7. A person who uses computers to gain unauthorized access to data.
  8. A type of malware that holds a victim's data for ransom.
  9. A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
  10. Any circumstance or event with the potential to adversely impact organizational operations.
  11. Unsolicited bulk messages, especially advertising.
  12. A small piece of data sent from a website and stored on the user's computer by the web browser.
  13. The 'C' in the CIA Triad, ensuring data is not disclosed to unauthorized individuals.
  14. An attack that uses a massive number of computers to overwhelm a target system. (abbreviation)

27 Clues: The process of verifying the identity of a user.Unsolicited bulk messages, especially advertising.A type of malware that holds a victim's data for ransom.The unauthorized transfer of data from a computer system.A weakness in a system that can be exploited by a threat.The process of making data unreadable to unauthorized users....

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. Protocol that is meant for uploading and downloading files.
  2. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
  3. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  4. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  5. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. A computer program that keeps a log of your keystrokes on your keyboard.
  8. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
Down
  1. a cyber attack intended to redirect a website's traffic to another, fake site.
  2. A bundle of programs that is designed to bombard users with advertisements.
  3. The process by which two information systems establish a communication channel.
  4. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  5. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  6. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.

14 Clues: Protocol that is meant for uploading and downloading files.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements.a cyber attack intended to redirect a website's traffic to another, fake site....

Cyber-bullying 2012-02-07

Cyber-bullying crossword puzzle
Across
  1. Delete cyberbullying. Don’t write it. Don’t ______it.
  2. Although cyberbullies may think they are ________, they can be found.
  3. 81% of young people said that they cyber-bully because they think it’s ______.
  4. When an adult is involved, it may meet the definition of _______.
  5. You can also help prevent cyberbullying by _______ awareness of the cyberbullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents.
  6. Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of ________ in teens.
Down
  1. If you wouldn’t say it in _______, don’t say it online.
  2. Being a victim of cyberbullying can be a common and ________ experience.
  3. Sharing NCPC’s anti-cyberbullying ______ with friends.
  4. people By definition, cyber-bullying occurs among ______.
  5. Technologies that allows for delayed and permanent posting of communication social networking sites, i.e. (Facebook, Myspace)
  6. is the use of technology to harass, threaten, embarrass, or target another person
  7. Some teens feel ________ because they may not know who is cyberbullying them.
  8. You can also help prevent cyberbullying by speaking with other students, as well as teachers and school administrators, to develop _____ against cyberbullying.
  9. Considered “LIVE” bullying or technology that allows for real time such as chat rooms, instant messaging, and online gaming.
  10. Don’t forget that even though you can’t see a cyberbully or the bully’s victim, cyberbullying causes real _______.

16 Clues: Delete cyberbullying. Don’t write it. Don’t ______it.Sharing NCPC’s anti-cyberbullying ______ with friends.If you wouldn’t say it in _______, don’t say it online.people By definition, cyber-bullying occurs among ______.When an adult is involved, it may meet the definition of _______....

Security 2017-02-13

Security crossword puzzle
Across
  1. To reduce potential loss, ____should be secure and kept to a minimum amount.
  2. Use this in the event of a cardiac medical emergency.
  3. This checklist should be next to every phone.
  4. All confidential information is locked up or placed in this bin.
  5. In thousands, this is the daily cash limit in a MSR top drawer.
  6. You should always ___ your computer when walking away.
  7. Before you enter the building, look for the ______signal.
  8. How many evacuation routes should you plan at each branch?
Down
  1. Branch Closed signs have other CWCU locations and the nearest _________.
  2. Masks and _____can be found in the emergency supply kit
  3. Acronym of how to use a fire extinguisher
  4. Form to fill out when you notice a Red Flag
  5. In an active shooter situation, this action is the last resort.
  6. This employee is the support Security Officer.
  7. In any emergency, ____is always the first priority.

15 Clues: Acronym of how to use a fire extinguisherForm to fill out when you notice a Red FlagThis checklist should be next to every phone.This employee is the support Security Officer.In any emergency, ____is always the first priority.Use this in the event of a cardiac medical emergency.You should always ___ your computer when walking away....

Cyber Security Month 2021 2021-09-16

Cyber Security Month 2021 crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access
  2. After a network attack your data may be ____________
  3. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
  1. What you maintain when you don't disclose information to unauthorized parties
  2. The practice of being diligent about your online activities
  3. A secret word or phrase that be used to gain access

8 Clues: A secret word or phrase that be used to gain accessAfter a network attack your data may be ____________The practice of being diligent about your online activitiesWhat you maintain when you don't disclose information to unauthorized partiesType of software that helps protect your computer against malware and cybercriminals...

Cyber Security Month 2021 2021-09-16

Cyber Security Month 2021 crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access
  2. After a network attack your data may be ____________
  3. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
  1. What you maintain when you don't disclose information to unauthorized parties
  2. Attacks that use email or malicious websites to infect your device
  3. A secret word or phrase that be used to gain access

8 Clues: A secret word or phrase that be used to gain accessAfter a network attack your data may be ____________Attacks that use email or malicious websites to infect your deviceWhat you maintain when you don't disclose information to unauthorized partiesType of software that helps protect your computer against malware and cybercriminals...

Teka Teki Cyber Security 2023-10-22

Teka Teki Cyber Security crossword puzzle
Across
  1. Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
  2. Jenis ancaman cyber yang paling sering ditemui yaitu
  3. Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
  1. Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
  2. Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
  3. Selalu update _______________ untuk mengatasi ancaman cyber.
  4. Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
  5. Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____

8 Clues: Jenis ancaman cyber yang paling sering ditemui yaituSelalu update _______________ untuk mengatasi ancaman cyber.Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaituPenggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle....

CYBER SECURITY CROSSWORD PUZZLE 2025-02-27

CYBER SECURITY CROSSWORD PUZZLE crossword puzzle
Across
  1. program that secretly records information from a user’s device (7 letters).
  2. process of confirming someone’s identity (13 letters).
  3. data to keep it secret from unauthorized access (10 letters).
Down
  1. type of attack that lures victims into revealing personal information (8 letters).
  2. that demands payment to restore access to data (10 letters).
  3. Horse^A malicious program disguised as legitimate (11 letters).
  4. isolated testing environment for untrusted code (8 letters).
  5. protective barrier between a network and potential threats (8 letters).

8 Clues: process of confirming someone’s identity (13 letters).that demands payment to restore access to data (10 letters).isolated testing environment for untrusted code (8 letters).data to keep it secret from unauthorized access (10 letters).Horse^A malicious program disguised as legitimate (11 letters)....

USAG FCCO OPSEC Crossword Puzzle 2025-05-29

USAG FCCO OPSEC Crossword Puzzle crossword puzzle
Across
  1. Acronym for encryption on your Common Access Card (CAC).
  2. Directive that established OPSEC as a national security program.
  3. Acronym for Operations Security.
  4. Condition that exists when we are susceptible, and adversaries can collect our critical information.
  5. Official mascot for Operations Security.
  6. This term is used in Operations Security instead of enemy.
  7. Third number of the Army's Operations Security Regulation.
  8. Commander's list of unclassified sensitive information to protect.
  9. Number of steps identified in the Operations Security cycle.
  10. Month originally designated for Operations Security awareness.
  11. Second number of the Army's Operations Security Regulation.
Down
  1. Number Replaced the SSN on ID cars to protect personal information.
  2. Friendly detectable actions that can derive sensitive information.
  3. Designated color usually associated with Operations Security.
  4. Has overall ownership of USAG FCCO Operations Security Program.
  5. First number of the Army's Operations Security Regulation.
  6. OPSEC is a systematic _____________.
  7. Who is responsible for OPSEC?
  8. New official designated month for National Operations Security awareness.

19 Clues: Who is responsible for OPSEC?Acronym for Operations Security.OPSEC is a systematic _____________.Official mascot for Operations Security.Acronym for encryption on your Common Access Card (CAC).First number of the Army's Operations Security Regulation.This term is used in Operations Security instead of enemy....

Unit 3 Cyber Security 2017-05-12

Unit 3 Cyber Security crossword puzzle
Across
  1. someone who doesn't have the technical expertise to create their own software so they use software or scripts created by someone else
  2. gaining access to computer systems,networks,data and programmes without permission
  3. data is available to those who need it, when they need it
  4. loss or theft of equipment
Down
  1. data is entered,amended,stored and deleted by those with authorisation
  2. intercepting data packets and identify suspicious traffic
  3. someone who uses a computer as either a tool and/or a target to commit a crime
  4. network or system attack by someone who has authorised access

8 Clues: loss or theft of equipmentintercepting data packets and identify suspicious trafficdata is available to those who need it, when they need itnetwork or system attack by someone who has authorised accessdata is entered,amended,stored and deleted by those with authorisationsomeone who uses a computer as either a tool and/or a target to commit a crime...

Cyber Security Crossword 1 2025-09-22

Cyber Security Crossword 1 crossword puzzle
Across
  1. Part of the Internet hidden behind passwords
  2. Area of computer science concerned with keeping data safe
  3. A dishonest scheme designed to cheat someone out of money, property, or other valuable things
  4. Gaining access to data without permission
Down
  1. Type of fraud where someone pretends to be someone else.
  2. Part of the Internet where illegal activity occurs
  3. Part of the Internet accessible via search engines
  4. Tricking someone into giving up personal information, often via email.

8 Clues: Gaining access to data without permissionPart of the Internet hidden behind passwordsPart of the Internet where illegal activity occursPart of the Internet accessible via search enginesType of fraud where someone pretends to be someone else.Area of computer science concerned with keeping data safe...

Security 2013-06-26

Security crossword puzzle
Across
  1. A non MSIC holder must have a what for access into the LRZ?
  2. What is the L in LRZ?
  3. What does the T stand for in OTS?
  4. Stick to what path when in the freight yard?
  5. What colour should drivers follow in the freight yard on the way in?
  6. Who must you radio to have the gates opened/closed?
  7. What is the code number for a Firearm?
  8. What must you display in the LRZ?
Down
  1. Who takes passengers on/off via the buggy?
  2. What channel do you call for Security?
  3. What does the I stand for in MSIC?
  4. What lights must be on when in the freight yard?
  5. What must a non MSIC holder have whilst in the LRZ?
  6. What is Angela’s title other than Manager?
  7. What industry are we in?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What channel do you call for Security?What is the code number for a Firearm?Who takes passengers on/off via the buggy?What is Angela’s title other than Manager?Stick to what path when in the freight yard?...

Security 2013-06-26

Security crossword puzzle
Across
  1. What lights must be on when in the freight yard?
  2. Stick to what path when in the freight yard?
  3. Who must you radio to have the gates opened/closed?
  4. What industry are we in?
  5. Who takes passengers on/off via the buggy?
  6. What does the I stand for in MSIC?
  7. What channel do you call for Security?
  8. What colour should drivers follow in the freight yard on the way in?
Down
  1. A non MSIC holder must have a what for access into the LRZ?
  2. What is Angela’s title other than Manager?
  3. What does the T stand for in OTS?
  4. What must you display in the LRZ?
  5. What is the L in LRZ?
  6. What is the code number for a Firearm?
  7. What must a non MSIC holder have whilst in the LRZ?

15 Clues: What is the L in LRZ?What industry are we in?What does the T stand for in OTS?What must you display in the LRZ?What does the I stand for in MSIC?What is the code number for a Firearm?What channel do you call for Security?What is Angela’s title other than Manager?Who takes passengers on/off via the buggy?Stick to what path when in the freight yard?...

Security 2023-01-04

Security crossword puzzle
Across
  1. any real or personal property
  2. A system where by territoriality reinforcement is established via barriers, access control, and surveillance
  3. Boundaries and property lines are marked
  4. observing areas
  5. considered the last line of defense to protect with financial compensation after a loss event
  6. maintaining boundaries by restricting access to an area
Down
  1. Offenses punishable by fines and/or confinement in the local jail for up to 1 year
  2. Identification of a threat at the earliest opportunity
  3. Prompt repair and cleaning of damage of graffiti
  4. Can destroy almost anything
  5. practice of discouraging an attempted attack to an asset
  6. Offenses punishable by confinement from 1 year to life or death
  7. Established by legislative statutes
  8. A written manual of an organization
  9. An incident likely to occur at a site due to a history of events or circumstances

15 Clues: observing areasCan destroy almost anythingany real or personal propertyEstablished by legislative statutesA written manual of an organizationBoundaries and property lines are markedPrompt repair and cleaning of damage of graffitiIdentification of a threat at the earliest opportunitymaintaining boundaries by restricting access to an area...

Cyber Ethics 2025-05-31

Cyber Ethics crossword puzzle
Across
  1. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. The practice of taking someone else's work or ideas and passing them off as one's own.
  3. The act of installing a legal copy of software in contravention of its license agreement
  4. The process of converting encrypted data back into its original, readable form
Down
  1. Any criminal activity that involves a computer, network or networked device
  2. ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
  3. A type of malicious software (malware) that replicates itself and can cause damage to computer systems
  4. A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
  5. An illegal intrusion into a computer system
  6. A type of cyberattack where attackers deceive individuals into revealing sensitive information
  7. The etiquette or rules of polite and respectful online communication
  8. A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
  9. Unwanted bulk emails that come from unknown sources
  10. The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access

14 Clues: An illegal intrusion into a computer systemUnwanted bulk emails that come from unknown sourcesThe etiquette or rules of polite and respectful online communicationAny criminal activity that involves a computer, network or networked deviceThe process of converting encrypted data back into its original, readable form...

Cyber security and mass surveillance 2020-09-16

Cyber security and mass surveillance crossword puzzle
Across
  1. you should not just check identity, you should also confirm
  2. unauthorized use of computing resources to mine cryptocurrencies
  3. information security is not just a ___ issue
  4. information security officer
  5. what is the purpose behind mass surveillance?
Down
  1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
  2. someone who deplores cracking
  3. someone who breaks into another computer system
  4. when someone sends an e-mail with a link to a bogus website
  5. a malicious program that modifies itself when it replicates
  6. what is widely used for mass surveillance?

11 Clues: information security officersomeone who deplores crackingwhat is widely used for mass surveillance?information security is not just a ___ issuewhat is the purpose behind mass surveillance?someone who breaks into another computer systemyou should not just check identity, you should also confirm...

Cyber security and mass surveillance 2020-09-16

Cyber security and mass surveillance crossword puzzle
Across
  1. you should not just check identity, you should also confirm
  2. unauthorized use of computing resources to mine cryptocurrencies
  3. information security is not just a ___ issue
  4. information security officer
  5. what is the purpose behind mass surveillance?
Down
  1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
  2. someone who deplores cracking
  3. someone who breaks into another computer system
  4. when someone sends an e-mail with a link to a bogus website
  5. a malicious program that modifies itself when it replicates
  6. what is widely used for mass surveillance?

11 Clues: information security officersomeone who deplores crackingwhat is widely used for mass surveillance?information security is not just a ___ issuewhat is the purpose behind mass surveillance?someone who breaks into another computer systemyou should not just check identity, you should also confirm...

Makiyah Bundy- Bullying 2022-05-17

Makiyah Bundy- Bullying crossword puzzle
Across
  1. Pam pretends to be a girl named Jenny on Instagram what is this called?
  2. Chase gets bullied online. What type of bullying is this?
  3. What is it when your friend makes fun of you but you are laughing along with them?
  4. Nola gets bullied and Aiden sticks up for her. What is Aiden?
  5. Austin watches as Layla gets bullied. What does this make Austin?
  6. What type of cyber-bullying is it when you are getting left out of a call?
  7. What type of cyber-bullying is it when you are in a online argument using abusive/aggressive language?
Down
  1. What is the A in the ABCD's of Bullying?
  2. The C in the ABCD's of Bullying.
  3. What type of cyber-bullying is spreading gossip?
  4. Your friend and you have an argument, but you guys apologize and become friends again.What is this?
  5. A boy tells you he is going to beat you up after school. What kind of bullying is this?
  6. Pam pushes Ava down a flight of stairs. What type of bullying is this?
  7. Jenna is being really mean and hateful to Joseph. What does this make Jenna?

14 Clues: The C in the ABCD's of Bullying.What is the A in the ABCD's of Bullying?What type of cyber-bullying is spreading gossip?Chase gets bullied online. What type of bullying is this?Nola gets bullied and Aiden sticks up for her. What is Aiden?Austin watches as Layla gets bullied. What does this make Austin?...

Phonetic crosswords 2022-06-20

Phonetic crosswords crossword puzzle
Across
  1. ˈfjʊərɪəs
  2. ˈrəʊzə pɑːks
  3. seɪf
  4. dɑːns
  5. ˈreɪsɪzm
  6. ɪnˈtɛlɪʤənt
  7. ˌsɛgrɪˈgeɪʃən
  8. ˈhɛlθi
  9. ˈsaɪbə
  10. sɪt daʊn
Down
  1. ˈpjuːpl
  2. ˈsəʊʃəbl
  3. ˈgeɪmə
  4. ˈklɛvə
  5. smɑːt
  6. ˈtiːʧə
  7. ʃəʊ
  8. ˈɪnstəˌgræm
  9. bɔɪ
  10. ʃuː
  11. ʤɒb
  12. klɑːs

22 Clues: ʃəʊbɔɪʃuːʤɒbseɪfsmɑːtdɑːnsklɑːsˈgeɪməˈklɛvəˈtiːʧəˈhɛlθiˈsaɪbəˈpjuːplˈsəʊʃəblˈreɪsɪzmsɪt daʊnˈfjʊərɪəsɪnˈtɛlɪʤəntˈɪnstəˌgræmˈrəʊzə pɑːksˌsɛgrɪˈgeɪʃən