cyber security Crossword Puzzles
PRBENLC 1 2024-04-29
Across
- possess critical thinking skills in understanding all societal issues
- refers to criminal activities that are conducted using computers, networks, or digital technologies as tools, targets, or mediums.
- means having a good understanding of cybersecurity practices, online etiquette, digital privacy, and the ability to use technology responsibly.
- refers to the status of a user being actively connected and available for interaction on a specific social media platform.
- entails taking responsibility for one's role in cyberspace
- develop an understanding of online security, identity and data management in our own literacy practices
- refers to the understanding, knowledge, and consciousness individuals have about the risks, challenges, and opportunities present in the digital environment
- a term that refers to a new form of literacy that goes beyond traditional literacy skills such as reading and writing
- refers to the digital persona or representation of an individual in the online world.
- global network of interconnected computer networks
- are used to track user activity, store preferences, remember login information, and personalize the browsing experience
- refers to the digital trail or record of one’s online activities, interactions, and presence across digital platforms and networks.
- refers to the practice of protecting computer systems, networks, devices, and data from cyber threats
- a Complex and multifaceted
- develop an understanding of the processes, procedures and systems that lie behind digital technologies rather than the specific elements of software/hardware involved.
- type of cyber attack in which cybercriminals use deceptive tactics to trick individuals into providing sensitive information, such as passwords, usernames, credit card details, or personal data
- is a software program designed to detect, prevent, and remove malicious software
- describe the ability to effectively manage and navigate the vast amount of information available in the digital age
- developing a cultural component of digital literacy
- also known as “Redditors,” can vote on submissions, comment on posts, and engage in discussions on a wide range of topics, interests, and communities.
- short for malicious software
- various forms of communication channels and platforms used to deliver information
Down
- develop the Constructive element It is the need to understand and demonstrate how to take existing resources and content to create something new that benefits our learning.
- refers to a fraudulent scheme or deceptive practice conducted online
- refers to the right of individuals to control their personal information and data in the digital realm.
- refers to a type of malicious software (malware) that is designed to replicate itself and infect computer systems, networks, and devices
- the need to assess and review on our own competence with digital technologies
- deliberate and malicious attempt to compromise, disrupt
- develop the cognitive element by engaging with a wide range of operating systems, platforms, devices and software and looking for developmental and training opportunities that expose to digital or cyber tools.
- Short for web browser
- a popular digital music streaming service that provides users with access to a vast library of music, podcasts, and other audio content.
- refers to any physical hardware component or electronic gadget that is used to perform specific functions, tasks, or operations.
- The one who identify the several of the digital tools that can be used for educational purpose
- pertains to the practices, measures, and awareness individuals need to ensure their security and well-being in the online environment.
- develop an awareness of how digital environment can help people self-organize and foster links with local, national and global organizations.
- individual who possess a range of digital skills
- process of encoding information in such a way that only authorized parties can access and read it
- refers to the virtual environment created by interconnected computer systems and digital networks
- refers to data that has been processed, organized, and presented in a meaningful context for a specific purpose.
- an individual with advanced technical skills and knowledge of computer systems, networks, and software who uses their expertise to gain unauthorized access to digital systems
- type of cybercrime in which an individual’s personal information is stolen and used by someone else without their permission
- collection of web pages that are typically related and interconnected by hyperlinks
- in the digital world is defined as the qualities that a person is expected to have
- cyber literacy also known as
- digital information that is generated, processed, stored, and transmitted within computer systems, networks, and digital platforms.
- this includes understanding the many different ways we can communicate with different devices, including mobile and other digital devices.
- serve as a form of security measure to protect sensitive information
- a popular online video-sharing platform that allows users to watch, upload, share, and comment on videos.
- is used to describe technologies, systems, and processes that operate using digital data and electronic signals
49 Clues: Short for web browser • a Complex and multifaceted • cyber literacy also known as • short for malicious software • individual who possess a range of digital skills • global network of interconnected computer networks • developing a cultural component of digital literacy • deliberate and malicious attempt to compromise, disrupt • ...
Cyberattacks 2020-07-26
Across
- disguises and intercepts
- Voice over IP attacks
- automating all combinations of possible password
- one who acquires Bitcoin by solving math
Down
- damaging software without user’s consent
- unmonitored logging of pressed keys
- a malware that encrypts file in exchange for ransom
- cellular users attack
- replicates when infects a host computer
- targeted cyber-attack (first word only)
- a standalone malware
- large-scale cyber-impersonation
12 Clues: a standalone malware • cellular users attack • Voice over IP attacks • disguises and intercepts • large-scale cyber-impersonation • unmonitored logging of pressed keys • replicates when infects a host computer • targeted cyber-attack (first word only) • damaging software without user’s consent • one who acquires Bitcoin by solving math • ...
Cyber monday 2024-11-28
9 Clues: CUSTOMER OPINION • IDENTIFIES ITEMS • LINE FOR CHECKOUT • CYBER MONDAY IS ONE • USED TO RATE PRODUCTS • WHEN SALES BEGIN SOONER • DAY BEFORE CYBER MONDAY • WHEN SALES EXTEND LONGER • A FAVORITE SHOPPING COLOR
Chapter 1B Crossword 2016-06-29
Across
- An ancient sheriff.
- Reports in 1985 and 1990 that examined the nature and extent of the private security industry in the US
- Acronyn for the agency that administers NISP.
- In-house security
- Organziationally imposed policies and procedures that provide sanctions for violations of rules.
- First national study of private security in the United States
- Person that had the first burglar alarm patent.
- Security services to individuals and organizations for a fee
Down
- Combined contract and proprietary security services
- Agency created by the Homeland Security Act of 2002.
- The protection of persons or individuals
- Acronym. Agency responsible for administering police-related federal grant programs
- Created in 1952 to address issues related to national security
- The third leg of the security management triad
- Acronym. Certification program offered by the American Society for Industrial Security
- Tangible objects that protect persons and property
- Acronym related to information security
17 Clues: In-house security • An ancient sheriff. • Acronym related to information security • The protection of persons or individuals • Acronyn for the agency that administers NISP. • The third leg of the security management triad • Person that had the first burglar alarm patent. • Tangible objects that protect persons and property • ...
Technology 2024-12-05
Security 2024-09-20
Across
- they kick in doors to rescue hostages
- sometimes called a meat wagon
- the first thing a officer is worried about on a scene
- this lawyer works for the state
- this lawyer helps the poor
- you can't eat because it burns your eyes
Down
- they can work undercover
- it holds your handcuffs and other things
- best medical in an emergency
- it is shocking
- what grade are you in
- in an emergency room they are the first to treat
- they are the best federal agency
- who uses k-9
14 Clues: who uses k-9 • it is shocking • what grade are you in • they can work undercover • this lawyer helps the poor • best medical in an emergency • sometimes called a meat wagon • this lawyer works for the state • they are the best federal agency • they kick in doors to rescue hostages • it holds your handcuffs and other things • you can't eat because it burns your eyes • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
Information Security Crossword 2018-12-31
Across
- _____ authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is.
- A software program that is designed to prevent viruses.
- Always _____ your computer when you leave your desk.
- A program that records which keys a user presses.
- a type of malicious software designed to extort money from their victims, by blocking access to the computer or encrypting the data stored on it.
- a software tool designed to take advantage of a flaw in a computer system, typically for malicious purposes such as installing malware.
- Generates and securely stores complex passwords in one place.
- A part of a computer system or network that forms a barrier between a computer and the outside world to prevent intrusion.
- a network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.
- In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system.
- Email scam or attempt to trick you into giving your password or personal information.
- Passwords should be at least this many characters long.
Down
- Illegal activity that involves a computer and a network.
- A bunch of private computers infected with malicious software and remotely controlled as a group without the owners' knowledge.
- _____ were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store).
- _____ authentication can help to lower the likelihood of identity theft, as well as phishing scams, because criminals cannot compromise log-ins with usernames and password details alone.
- Software that launches unprompted ads on computers or redirects web pages to promotional websites.
- Many IoT devices come with _____ usernames and passwords.
- a weakness that can be exploited by a Threat Actor.
- Similar to a password in usage, but is generally longer for added security.
- Short for malicious software.
- An attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- Encodes data in such a way that it is unintelligible without a key.
- Voice Phishing
- This organization provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks.
- Malware that replicates itself to spread to other computers on the network.
26 Clues: Voice Phishing • Short for malicious software. • A program that records which keys a user presses. • a weakness that can be exploited by a Threat Actor. • Always _____ your computer when you leave your desk. • A software program that is designed to prevent viruses. • Passwords should be at least this many characters long. • ...
Final activity #1 2024-11-21
Across
- is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- ensuring that the information/data can be accessed only by those authorized
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- An individual who breaks into computer systems to steal, change, or destroy information.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- Any action derived from intelligent threats to violate the security of the
- An action or event that has the potential to compromise and/or violate
- is a state of well-being of information and infrastructures.
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- the identification and assurance of the origin of information.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- A defined method of breaching the security of an IT system through vulnerability.
- ensuring that the information is accessible to authorized persons when required without delay
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
21 Clues: is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • Any action derived from intelligent threats to violate the security of the • ensuring that the information/data can be accessed only by those authorized • ...
Final activity #1 2024-11-21
Across
- ensuring that the information/data can be accessed only by those authorized
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- A defined method of breaching the security of an IT system through vulnerability.
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- the identification and assurance of the origin of information.
- An action or event that has the potential to compromise and/or violate
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
- ensuring that the information is accessible to authorized persons when required without delay
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- An individual who breaks into computer systems to steal, change, or destroy information.
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
Down
- is a state of well-being of information and infrastructures.
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- Any action derived from intelligent threats to violate the security of the system.
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- is a state of well-being of information and infrastructures.
22 Clues: is a state of well-being of information and infrastructures. • is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • ensuring that the information/data can be accessed only by those authorized • ...
Cyberattacks 2020-07-26
Across
- users attack
- standalone malware
- cyber-impersonation
- malware that encrypts file in exchange for ransom
- who acquires Bitcoin by solving math
- cyber-attack (first word only)
Down
- logging of pressed keys
- and intercepts
- software without user’s consent
- all combinations of possible password
- over IP attacks
- when infects a host computer
12 Clues: users attack • and intercepts • over IP attacks • standalone malware • cyber-impersonation • logging of pressed keys • when infects a host computer • cyber-attack (first word only) • software without user’s consent • who acquires Bitcoin by solving math • all combinations of possible password • malware that encrypts file in exchange for ransom
Common Cybersecurity Roles 2025-02-05
Across
- Investigates and mitigates cyber incidents, such as data breaches or malware attacks.
- Simulates cyberattacks to find vulnerabilities in systems.
Down
- Monitors and analyzes security threats to protect an organization.
- Designs, implements, and maintains secure network infrastructure.
- A high-level executive responsible for overseeing an organization's entire cybersecurity strategy.
5 Clues: Simulates cyberattacks to find vulnerabilities in systems. • Designs, implements, and maintains secure network infrastructure. • Monitors and analyzes security threats to protect an organization. • Investigates and mitigates cyber incidents, such as data breaches or malware attacks. • ...
Stop Bullying Now - Crossword Puzzle 2013-11-04
Across
- HARMS SOMEONE ON PURPOSE
- WHO TO TELL IF YOU SEE BULLYING
- WE WEAR THIS COLOR TO STAND UP TO BULLYING
- SEES BUT DOES NOTHING TO STOP A BULLY
- BULLYING MUST HAPPEN MORE THAN ____
- HURTING SOMEONE'S BODY OR PROPERTY
- A BULLY MIGHT SEND MEAN EMAILS OR MESSAGES ____
Down
- ON COMPUTER OR A PHONE
- ____ OR SPREADING RUMORS ABOUT SOMEONE IS VERBAL BULLYING
- HURTING SOMEONE'S FEELINGS
- CYBER BULLYING. DON'T BE MEAN BEHIND THE ____!
- BULLYING IS EXCLUDING SOMEONE FROM A _____
- A BULLY MIGHT SEND A MEAN ____ MESSAGE
- PERSON BEING BULLIED
14 Clues: PERSON BEING BULLIED • ON COMPUTER OR A PHONE • HARMS SOMEONE ON PURPOSE • HURTING SOMEONE'S FEELINGS • WHO TO TELL IF YOU SEE BULLYING • HURTING SOMEONE'S BODY OR PROPERTY • BULLYING MUST HAPPEN MORE THAN ____ • SEES BUT DOES NOTHING TO STOP A BULLY • A BULLY MIGHT SEND A MEAN ____ MESSAGE • WE WEAR THIS COLOR TO STAND UP TO BULLYING • ...
digital technology 2021-07-20
Across
- a mobile phone that performs many of the functions of a computer
- communication over a distance by cable, telegraph, telephone, or broadcasting
- the amount of carbon dioxide released into the atmosphere as a result of the activities of a particular individual
- its a crime that involves a computer and a network
- the action or activity of buying goods or services over the internet
Down
- not harmful to the environment
- search for information about someone or something on the internet using a search engine
- the organized provision of medical care to individuals or a community
- the state of being free from danger or threat
- the action of linking one thing with another
- machinery and equipment developed from the application of scientific knowledge
- activity requiring physical effort, carried out to sustain or improve health and fitness
- relating to the present or recent times as opposed to the remote past
- time spent in face-to-face contact with someone
- a global computer network providing a variety of information and communication facilities
15 Clues: not harmful to the environment • the action of linking one thing with another • the state of being free from danger or threat • time spent in face-to-face contact with someone • its a crime that involves a computer and a network • a mobile phone that performs many of the functions of a computer • the action or activity of buying goods or services over the internet • ...
Cyber security LO1 & LO2 Crossword 2022-10-16
Across
- email claiming to be from an authority/bank and demand for personal information
- type of vulnerability that can be exploited by hackers attacking individuals.
- type of vulnerability caused by natural disasters
- Availability is when Information is ……………………when required
- cybersecurity security threat type which is planned set of actions designed to cause threat/damage
Down
- users directed to fake websites
- Accidentally disclosing personal information of customers in an organisation could lead to this
- Availability is when Information is only accessible to ………………… viewers
- pretending to be from bank/software company
- cybersecurity security threat type which is unintended consequence of an action
10 Clues: users directed to fake websites • pretending to be from bank/software company • type of vulnerability caused by natural disasters • Availability is when Information is ……………………when required • Availability is when Information is only accessible to ………………… viewers • type of vulnerability that can be exploited by hackers attacking individuals. • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Unsolicited messages sent in bulk by email
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Unsolicited messages sent in bulk by email
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Industrial Sec 2015-08-14
Across
- Agreement between the contractor and installation (abbr)
- Block 13, ______Guidance is used to annotate comments for yes answers on the form.
- Document that tells prospective bidder what needs to be done for a contract (abbr)
- Security managers use JPAS to in-process contractors on classified contracts as ______
- _______ Office requests facility clearances for companies
- Develops 254 for subcontractor, _____ Contractor
- Signatory in Block 16 on the DD form 254
- A DD ____ 254 is used to convey security classification to prospective bidders
- National _______ Security Program outlines procedures for companies protecting government information
- Determination a company is eligible for access to classified (abbr)
- ___ management list identifies company persons responsible for security issues
Down
- Commercial and government entity code
- Agency Develops DD 254 and PWS
- another name for PWS
- ________ commander authorizes contractor access
- Name of publication for contractors to use for protecting classified information (abbr)
- Office with security oversight of on-base operations (abbr)
- Responsible for submitting security clearances for contractors performing on classified contracts
- maximum length of time a visit request is valid, ____ months
- List of contractor employees performing on a classified contract (abbr)
- Office with security oversight of contractor facilities (abbr)
- Any _______ security discipline must coordinate on DD Form 254
22 Clues: another name for PWS • Agency Develops DD 254 and PWS • Commercial and government entity code • Signatory in Block 16 on the DD form 254 • ________ commander authorizes contractor access • Develops 254 for subcontractor, _____ Contractor • Agreement between the contractor and installation (abbr) • _______ Office requests facility clearances for companies • ...
Security 2023-06-22
Across
- Event Precautions taken to keep people safe at large gatherings like concerts or festivals, including crowd control and first aid.
- Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals.
- Protecting your computer and online accounts from people who want to steal your information or cause harm.
- Protecting networks, computers, and information from digital attacks, like viruses or hacking.
- Systems at airports that check people and their belongings to prevent dangerous items or actions on airplanes.
- Actions you take to stay safe, like not sharing personal information with strangers or walking home with a buddy.
- Measures to protect cars, bikes, or other vehicles from theft or damage, like alarms, locks, or tracking devices.
- Protecting your money and personal information from theft or fraud when using banks or making purchases.
Down
- Ensuring the safety of items we buy and use daily, including toys and electronics, by following safety standards and regulations.
- Measures to protect your living space from intruders, like locks on doors and windows, or alarms.
- Measures employers take to keep employees safe while they work, including training, rules, and safety equipment.
- Measures to keep students and teachers safe at school, like monitoring visitors and having rules for behavior.
- Protecting your personal information, like your name, address, and identification numbers, from being stolen and used without your permission.
- Measures taken by hotels, transportation services, and tourist destinations to keep travelers safe during their trips.
14 Clues: Protecting networks, computers, and information from digital attacks, like viruses or hacking. • Measures to protect your living space from intruders, like locks on doors and windows, or alarms. • Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals. • ...
Security 2024-02-23
Across
- Type of security that consists of the security features that are built into a building
- the process of closely observing what is going on in an area, is a critical part of the security officer’s job
- Security that give no indication that the wearer is a member of the security staff.
- Means responsibility, especially responsibility to pay for damage or loss.
- the security staff are also responsible for handling problems and
- Kind of insurance that pays the loss or damage of property owned by the businesses. Usually covers losses due to fires, tornados, hail, accidents, burglary, and arson.
- can give legal advice and suggestions when the possibility of a lawsuit arises
Down
- Is a person who robs and steals property from people and places
- Is a person who has committed a crime.
- Is a person who sets fires.
- A person who is present on property where he or she has no business.
- is critical for all hospitality businesses, which are attractive targets for criminals
- Type of insurance that pays for losses due to crimes such as theft, arson, forgery, and embezzlement.
- The emphasis of security is
14 Clues: Is a person who sets fires. • The emphasis of security is • Is a person who has committed a crime. • Is a person who robs and steals property from people and places • the security staff are also responsible for handling problems and • A person who is present on property where he or she has no business. • ...
DIGITALIZATION TECHNOLOGY 2025-10-07
Across
- - device that combines phone and computer functions.
- - structured collection of digital information.
- - AI program that automatically answers user questions.
- - digital assistant like Alexa, Siri, or ChatGPT.
- - online journal or website where information is posted regularly.
- - secret code used to protect accounts.
- - global network that connects computers and devices.
- - ability to use technology effectively.
- CODE - barcode that links to websites or resources when scanned.
- - meeting held using video or audio technology.
- - method of securing digital information.
- - to send data or files to the internet.
- - small technological device or tool.
- SECURITY - protection of data and systems from online threats.
Down
- - using technology to perform tasks without human help.
- - classroom enhanced with digital tools and devices.
- - storing and processing data on remote servers.
- - combination of text, sound, and video for learning.
- CITIZENSHIP - responsible behavior when using technology.
- - online storage system for saving and accessing files anywhere.
- - to save files from the internet to your device.
- - screen used to display digital content.
- - digital slides created to explain a topic.
- - website used to find information online.
- - online place to download educational applications.
25 Clues: - small technological device or tool. • - secret code used to protect accounts. • - ability to use technology effectively. • - to send data or files to the internet. • - screen used to display digital content. • - method of securing digital information. • - website used to find information online. • - digital slides created to explain a topic. • ...
Final activity #1 2024-11-21
Across
- ensuring that the information/data can be accessed only by those authorized
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- A defined method of breaching the security of an IT system through vulnerability.
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- the identification and assurance of the origin of information.
- An action or event that has the potential to compromise and/or violate
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
- ensuring that the information is accessible to authorized persons when required without delay
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- An individual who breaks into computer systems to steal, change, or destroy information.
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
Down
- is a state of well-being of information and infrastructures.
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- Any action derived from intelligent threats to violate the security of the system.
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- is a state of well-being of information and infrastructures.
22 Clues: is a state of well-being of information and infrastructures. • is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • ensuring that the information/data can be accessed only by those authorized • ...
Information Security 2021-07-12
Across
- a piece of software code created to perform malacious activities
- this creates unnecessary junk in receiver's email
- is a network security system designed to protect a trusted private netswork from unauthorised access
- is harassment and stalking through phones or the internet
- the short term used for malacious software
Down
- the main purpose of this to record the key pressed by user on the keyboard
- when user access certain website small files downloaded on to the computer
- It is a malware that do damaging activity on an infected computer
- secretly listening to a conversation
- it block the user to access his own data and give threats
- it is the practice of sending fraudulent communication that appear to come from reputable source
- BULLYING, when someone harass or frighten another person with the use of Internet
12 Clues: secretly listening to a conversation • the short term used for malacious software • this creates unnecessary junk in receiver's email • it block the user to access his own data and give threats • is harassment and stalking through phones or the internet • a piece of software code created to perform malacious activities • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
Security terms puzzle 2025-02-13
Across
- Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
- A decoy system designed to lure and detect attackers.
- Protecting information from unauthorized access.
- Engineering Manipulating people to gain unauthorized access to information.
- Hacking phone systems to make free calls or manipulate networks.
- Security Protecting an individual computer or device from threats.
- through obscurity Hiding system details to reduce security risks.
Down
- Aggregation Combining data from multiple sources for analysis.
- Privilege Granting users the minimum access necessary for their tasks.
- Verifying the identity of a user or system.
- of duties Dividing responsibilities to prevent fraud and errors.
- A security system that monitors and controls network traffic.
- Digital documents that verify identities and enable secure communication.
- Preventing denial of actions, ensuring accountability.
- Security Protecting a network from threats and unauthorized access.
- Computing Delivering computing services over the internet.
- Gaining unauthorized access to systems or networks.
- Ensuring data is accurate and unaltered.
- Security Using multiple security measures to protect data and systems.
19 Clues: Ensuring data is accurate and unaltered. • Verifying the identity of a user or system. • Protecting information from unauthorized access. • Gaining unauthorized access to systems or networks. • A decoy system designed to lure and detect attackers. • Preventing denial of actions, ensuring accountability. • Computing Delivering computing services over the internet. • ...
Managing modern risks in a company 2025-01-02
Across
- Meeting current needs without compromising the ability to meet future needs.
- Type of security aimed at protecting data and systems from online threats.
Down
- A deceptive act or practice to gain an unfair advantage, often financial.
- A system or place where goods, services, or financial assets are traded.
- The possibility of loss or harm in any financial decision.
- A contract that provides financial protection against specific risks.
6 Clues: The possibility of loss or harm in any financial decision. • A contract that provides financial protection against specific risks. • A system or place where goods, services, or financial assets are traded. • A deceptive act or practice to gain an unfair advantage, often financial. • Type of security aimed at protecting data and systems from online threats. • ...
Cyber World (Internet) 2023-06-12
Across
- Malicious software that replicates itself and infects computer systems.
- The process of encoding information to protect its confidentiality.
- The practice of protecting computers, servers, and networks from digital threats.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A network of infected computers, often controlled by a hacker, used for malicious activities.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A person who uses technical skills to gain unauthorized access to computer systems.
- A security measure that protects computer networks from unauthorized access.
10 Clues: The process of encoding information to protect its confidentiality. • Malicious software that replicates itself and infects computer systems. • A security measure that protects computer networks from unauthorized access. • The practice of protecting computers, servers, and networks from digital threats. • ...
Computer Crime and Cyber Security 2024-02-20
Across
- Information that can be used to identify you
- An example of a malicious software that can disrupt a computer system
- The number of degrees your elbows should be at when working at a desk.
- A type of email scam to try and gather personal information for illegitimate reasons
- Malicious software
- Which Act makes accessing a device without permission, illegal?
Down
- An Act which means data collectors MUST keep the data secure.
- The number of CM a monitor should be from your face.
- A type of malware that prevents access to data until a SUM of money has been paid.
- Special category data that must be kept with extra security
10 Clues: Malicious software • Information that can be used to identify you • The number of CM a monitor should be from your face. • Special category data that must be kept with extra security • An Act which means data collectors MUST keep the data secure. • Which Act makes accessing a device without permission, illegal? • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- An area of data protection that concerns the proper handling of sensitive data
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
CIS 101 Participation 2023-12-02
Across
- Security flaw not yet discovered
- Protection that's against unauthorized access
- Security failure leading to compromise
- Secure Data with secret code
- Examination for compliance and security
- Breach of system or network
- String of letters for authentication
- Identification using unique biological features
- Regulatory adherence for date protection
Down
- Confirm identity for system access
- Software protecting against malicious code
- Blocks unauthorized access to network
- Breach or occurrence requiring investigation
- Security gap needing protection
- Deceptive attempt to acquire information
- Unwanted software causing system damage
- Code modification to improve security
- Device or node in network
- Application of scientific methods investigation
19 Clues: Device or node in network • Breach of system or network • Secure Data with secret code • Security gap needing protection • Security flaw not yet discovered • Confirm identity for system access • String of letters for authentication • Blocks unauthorized access to network • Code modification to improve security • Security failure leading to compromise • ...
Are you Cyber-Security Smart? 2020-10-20
Across
- fraudulent practice of sending emails from false sources to gather personal information from individuals
- something that protects our device from unauthorized access.
- the imparting or exchanging of information. by speaking, writing or any other medium.
- the feeling of bring safe from danger or threat.
- the process of encoding something.
- the program and other operating information used by computers.
Down
- the string of characters which allow access into a device.
- codes and software designed to cause damage to data and gain unauthorized access to a network.
- a person, responsible for the upkeep, configuration, and reliable operation of computer systems
- an electronic device for storing and processing data and connecting to the net.
10 Clues: the process of encoding something. • the feeling of bring safe from danger or threat. • the string of characters which allow access into a device. • something that protects our device from unauthorized access. • the program and other operating information used by computers. • an electronic device for storing and processing data and connecting to the net. • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- who uses others takes others scripts because they cant make their own
- Someone who hacks for a campaign
- Mr Scott
- Someone who hacks into government files to cause disruption or damage
- This act assures that your data is kept safe to the correct standards
- Crime that has been preplanned
Down
- someone who uses others takes others scripts because they cant make their own.
- A motivation that means the attacker is gaining money.
- Insures that the information is available to those who need to use it
- Damage that was purposefully acted out
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • who uses others takes others scripts because they cant make their own • Insures that the information is available to those who need to use it • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- This act assures that your data is kept safe to the correct standards
- Crime that has been preplanned
- Someone who hacks into government files to cause disruption or damage
- Insures that the information is available to those who need to use it
Down
- who uses others takes others scripts because they cant make their own
- Mr Scott
- A motivation that means the attacker is gaining money.
- Someone who hacks for a campaign
- Damage that was purposefully acted out
- someone who uses others takes others scripts because they cant make their own.
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • who uses others takes others scripts because they cant make their own • This act assures that your data is kept safe to the correct standards • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- Someone who hacks into government files to cause disruption or damage
- A motivation that means the attacker is gaining money.
- Insures that the information is available to those who need to use it
- Damage that was purposefully acted out
- Someone who hacks for a campaign
Down
- Crime that has been preplanned
- This act assures that your data is kept safe to the correct standards
- Mr Scott
- who uses others takes others scripts because they cant make their own
- someone who uses others takes others scripts because they cant make their own.
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • This act assures that your data is kept safe to the correct standards • Someone who hacks into government files to cause disruption or damage • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- An area of data protection that concerns the proper handling of sensitive data
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Extortion software that can lock your computer and then demand a ransom for its release.
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
GT Cyber Security Fun Quiz 2025-09-23
Across
- ____________________ of duties principle means there should not be any employee who handle and entire process singly.
- Computers or devices authorised for remote access must be __________________ and installed with latest operating system security patches, antivirus / anti-malware software and signatures.
- ______________________ is a security practice that involves examining system logs to detect and respond to unauthorised activities.
- Access to information systems and endpoints must be controlled on the basis of business and security requirement based on the _______________ and least privilege principles with proper authorization.
- _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access.
- Use of _________________ data in development and test environments is strictly prohibited.
Down
- Employees must ensure that data classified as confidential and highly confidential are encrypted with strong _____________ or password protection when transmitted over external networks.
- Regular compliance check on system configurations must be conducted on periodic basis and in the event of revision of security ______________________.
- Passwords value entered must be masked by __________________.
- Group must implement strong governance to protect the confidentiality, integrity and ________________ and safety of Group data and information systems, and mitigate against the risk of information security threat.
10 Clues: Passwords value entered must be masked by __________________. • Use of _________________ data in development and test environments is strictly prohibited. • _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access. • ...
cyber safety 2016-06-01
9 Clues: not open • not good • , blocks viruses • can block a virus • Makes devices sick • safety ,cyber smart • bullying,someone besmean • ups, something you should not press • informashon,you shouldnot show people
Cyber bullying 2024-12-03
Across
- why do people cyber bully
- sending, posting,or sharing negative, harmful, false,or mean content about someone
- How to solve cyber bullying
- should you ignore a bully
Down
- how can bullying be stopped
- how many types of bullying are there
- who are most likely to be affected by cyber bullying
- what do you do when your kid is being bullied
- do bullies feel better about themselves when they bully someone
- How does cyber bullying start
10 Clues: why do people cyber bully • should you ignore a bully • how can bullying be stopped • How to solve cyber bullying • How does cyber bullying start • how many types of bullying are there • what do you do when your kid is being bullied • who are most likely to be affected by cyber bullying • do bullies feel better about themselves when they bully someone • ...
test 2022-09-16
men 2025-07-16
17 Clues: eyes • punk • photo • small • metal • wires • dance • videos • indian • autistic • magic brick • also indian • asian worker • chicken jockey • recording gaming • glass flatscreen • talking on stream
Online Safety 2023-10-11
Izabella Kulla- virus 2019-11-05
Across
- a computer program that replicates itself in order to spread to other computers
- a person or thing likely to cause damage
- short for Distributed Denial of Service
- the practice of defending computers from malicious attacks
- a type of malware that is often seemed as legitimate software until opened and given the virus
- a self-contained storage device containing a read-write mechanism
- a person who uses computers to gain unauthorized access to data
Down
- a collection of instructions that performs a specific task when executed by a computer
- the programs used by a computer
- an electronic way of messaging
- sending emails in order to reveal someone's personal information.
- a system of words, letters, figures, or other symbols.
- an software that is specifically designed to damage a computer system.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a piece of code which is capable of damaging software
15 Clues: an electronic way of messaging • the programs used by a computer • short for Distributed Denial of Service • a person or thing likely to cause damage • a piece of code which is capable of damaging software • a system of words, letters, figures, or other symbols. • the practice of defending computers from malicious attacks • ...
Unsecured accounts 2025-11-12
LMS&NM 2023 Crossword 2023-12-06
Across
- Well attended program added to the New Measures portfolio (HINT ed8)
- Kym Myall drives one as a hobby (HINT ed2)
- What does the ‘T’ stand for in DT&A
- Which month does Commissioner Jordan AO retire?
- The GPFS team undertook detailed analysis of what patterns (HINT ed8)
- Word meaning the legal right of using and enjoying the fruits or profits of something belonging to another
Down
- Who joined the Insights team in November? (HINT 2 words ed8)
- Game developed to demonstrate unscrupulous infiltration? (HINT 2 words)
- It is ? Indigenous Australian cultural awareness training is completed by 31 December
- Book Deborah Robinson enjoyed reading? (HINT 2 words ed5)
- 4 letter term that you would use to describe a LMS and NM staff member as having? [Hint – Oxford University Dictionary word of the year for 2023].
- 5 letter term for a volumetric pixel?
- Cyber Security Awareness awareness month was?
13 Clues: What does the ‘T’ stand for in DT&A • 5 letter term for a volumetric pixel? • Kym Myall drives one as a hobby (HINT ed2) • Cyber Security Awareness awareness month was? • Which month does Commissioner Jordan AO retire? • Book Deborah Robinson enjoyed reading? (HINT 2 words ed5) • Who joined the Insights team in November? (HINT 2 words ed8) • ...
i 2025-06-07
Across
- an act of sending an email to a user misleading him to belive that it is a trusted source and asking money online
- the person who do cybercrime
- any criminal activty intended to harm a computer using internet
- a program desinged to prevent and romve viruses
- a person who do hacking
- a program that disrupts the normal functioning of a computer
- a software that helps in unauthorised access to our computer
Down
- footprint is an impression you create when you engage in various online activites
- an illegal entry into a compute system or network
- grooming process of befriending a child on social media to facilatate onle or physical sexual abuse
- security a collection of technologies, processes , and practices designed to protect networks ,computer , program and data from attacks
- theft an act of stealing and misusing someone's personal information
- bulling an act of harming anyone online
- terrorism is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
- frauds illegal method to get money of a bank by using technology
15 Clues: a person who do hacking • the person who do cybercrime • bulling an act of harming anyone online • a program desinged to prevent and romve viruses • an illegal entry into a compute system or network • a program that disrupts the normal functioning of a computer • a software that helps in unauthorised access to our computer • ...
Technical crossword 2025-05-26
Across
- Relating to the structure of a brain or AI
- AI-generated synthetic media
- Translates code into machine language
- Neural network-based machine learning technique
- Exists in digital rather than physical form
- Prefix meaning related to computers or networks
- Wired networking protocol for local networks
- Decentralized ledger used in cryptocurrencies
- Reduces the need for human intervention
- Security system that monitors traffic
- Converts data to hide meaning
- Opposite of natural; precedes “intelligence”
- Software designed to damage or infiltrate
Down
- Structured collection of information
- Data that describes other data
- The base-2 numeral system used by computers
- Data type with two possible values
- Core of an operating system
- Performs computation in electronic devices
- Repeating a process, often in loops
- Deceptive attempt to gain sensitive information
- Instruction to retrieve data from a database
- Low-level software tightly coupled with hardware
- Challenge to verify a human user
- Smallest unit of meaning in programming or crypto
- Set of rules that define structure in code
- Amount of data transmitted over a network
- Interface that lets software components communicate
- Phase when a program is actively executing
- A step-by-step procedure used in computation
30 Clues: Core of an operating system • AI-generated synthetic media • Converts data to hide meaning • Data that describes other data • Challenge to verify a human user • Data type with two possible values • Repeating a process, often in loops • Structured collection of information • Translates code into machine language • Security system that monitors traffic • ...
DIGITALIZATION TECHNOLOGY 2025-10-07
Across
- - device that combines phone and computer functions.
- - structured collection of digital information.
- - AI program that automatically answers user questions.
- - digital assistant like Alexa, Siri, or ChatGPT.
- - online journal or website where information is posted regularly.
- - secret code used to protect accounts.
- - global network that connects computers and devices.
- - ability to use technology effectively.
- CODE - barcode that links to websites or resources when scanned.
- - meeting held using video or audio technology.
- - method of securing digital information.
- - to send data or files to the internet.
- - small technological device or tool.
- SECURITY - protection of data and systems from online threats.
Down
- - using technology to perform tasks without human help.
- - classroom enhanced with digital tools and devices.
- - storing and processing data on remote servers.
- - combination of text, sound, and video for learning.
- CITIZENSHIP - responsible behavior when using technology.
- - online storage system for saving and accessing files anywhere.
- - to save files from the internet to your device.
- - screen used to display digital content.
- - digital slides created to explain a topic.
- - website used to find information online.
- - online place to download educational applications.
25 Clues: - small technological device or tool. • - secret code used to protect accounts. • - ability to use technology effectively. • - to send data or files to the internet. • - screen used to display digital content. • - method of securing digital information. • - website used to find information online. • - digital slides created to explain a topic. • ...
Digital citizenship 2018-01-30
Across
- OHMYGOD I CAN'T WAIT FOR CYBER MONDAY, BECAUSE I'M GOING SHOPPING!!!! YAAASSS!!!
- What is electronic responsibility for actions and deeds?
- an attempt to trick someone, usually with the intention of stealing money or private information
- electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself
- This practice helps keep you safe in the digital world.
- What is being able to use technology appropriately, responsibly, and abundantly?
- The number of Elements to be an effective Digital Citizen
- Posting too many things on social media
Down
- Literally: Facebook
- Looking out for those who do not have this is the first responsibility of a Digital Citizen
- communication including television, radio, and newspapers, that often
- a type of crime in which your private information is stolen and used for criminal activity
- Mind your Digital Table manners
- "With great power comes great _________________."
- someone who sees cyberbullying but does nothing to help
15 Clues: Literally: Facebook • Mind your Digital Table manners • Posting too many things on social media • "With great power comes great _________________." • someone who sees cyberbullying but does nothing to help • This practice helps keep you safe in the digital world. • What is electronic responsibility for actions and deeds? • ...
Cyber Security by Candela Azpiri 2020-08-20
Across
- tipo de dispositivo electrónico
- informacion que no debe ser publica
- sistema para evitar entrar usuarios a redes privadas
- archivos de sitios web que guardan tus datos
Down
- programas informáticos que arruinan tu dispositivo
- manera de comunicarte con personas
- forma de usar redes, apps y el dispositivo electronico.
- persona que arruina paginas web y roba datos
- software que consigue informacion discretamente sin permiso del usuario
- publicidades o anuncios de productos no deseados
10 Clues: tipo de dispositivo electrónico • manera de comunicarte con personas • informacion que no debe ser publica • persona que arruina paginas web y roba datos • archivos de sitios web que guardan tus datos • publicidades o anuncios de productos no deseados • programas informáticos que arruinan tu dispositivo • sistema para evitar entrar usuarios a redes privadas • ...
NL Government Cyber Security Crossword 2017-07-25
Across
- This type of "wall" protects your computer from damaging viruses
- A powerful machine for storing and processing data
- If you _ _ _ _ _ _ _ _ files from untrusted sources it could be unsafe
- You should be aware of what you're doing online when at work and at _ _ _ _
Down
- When creating new accounts you should use a very strong _ _ _ _ _ _ _ _
- Visiting unsafe websites could result in giving your computer a _ _ _ _ _
- A useful way to electronically send mail
- Fake emails that are meant to entice people to reveal important information
- The _ _ _ _ _ _ _ _ is a vast but dangerous database where you must always be protected
- Software that is intended to damage or disable computers or computer systems
10 Clues: A useful way to electronically send mail • A powerful machine for storing and processing data • This type of "wall" protects your computer from damaging viruses • If you _ _ _ _ _ _ _ _ files from untrusted sources it could be unsafe • When creating new accounts you should use a very strong _ _ _ _ _ _ _ _ • ...
Preventive Technology 2023-06-02
Across
- Secret combination of characters used to authenticate a user's identity.
- Process of converting data into a code to prevent unauthorized access.
- Self-replicating program that infects computer systems and can cause harm.
- Malicious software designed to damage or gain unauthorized access to a computer system.
- Deliberate and malicious attempt to compromise a computer system or network.
- Software update designed to fix vulnerabilities or bugs in a program.
- Security system that monitors and controls incoming and outgoing network traffic.
- Process of verifying the identity of a user or device accessing a system.
Down
- Cyber attack where individuals are tricked into revealing sensitive information through deceptive emails or websites.
- Weakness or flaw in a system that can be exploited by attackers.
- breach: Unauthorized access or exposure of sensitive or confidential information.
- Unauthorized access or breach of a computer system or network.
12 Clues: Unauthorized access or breach of a computer system or network. • Weakness or flaw in a system that can be exploited by attackers. • Software update designed to fix vulnerabilities or bugs in a program. • Process of converting data into a code to prevent unauthorized access. • Secret combination of characters used to authenticate a user's identity. • ...
Crossword Jan 2024 2024-01-24
Across
- GTRI's suggested approach for controlled testing of crypto-related products and services
- Crucial strategy to be extended to products for combatting cyber threats
- What is scrutinized to identify potential Deepfakes?
- The technology that is foundational to the creation of Deepfakes
- A key focus for authentication in the fintech and banking sectors
Down
- The percentage of UPI transactions that gets stuck at the pending status, according to Razorpay POS
- What is the internal innovation program at Cognizant that the Innovation Assistant augments?
- AI Trust, Risk, and Security Management stands for
- Which technology is anticipated to gain traction for secure and convenient authentication?
- Google Pay and ___ signed an MoU to expand UPI to countries beyond India
- Regulatory directive set to be enacted in the European Union by the end of 2024
- The new feature Razorpay POS has introduced for failed UPI transactions
12 Clues: AI Trust, Risk, and Security Management stands for • What is scrutinized to identify potential Deepfakes? • The technology that is foundational to the creation of Deepfakes • A key focus for authentication in the fintech and banking sectors • The new feature Razorpay POS has introduced for failed UPI transactions • ...
coding 2021-08-29
Across
- - the information of a particular person that exists on the internet. _______ _________
- numbers- system, a method of mathematical expression that uses only two symbols: typically "0" and "1". ______ _______
- technologies are electronic tools, systems, devices and resources that generate, store or process data. _______ ___________
- the process of converting information or
- is an interpreted, object-oriented, high-level programming language with dynamic semantics. ______
- a pocket-sized computer that introduces you to how software and hardware work together. ________
- tools, machinery, and other durable equipment. ________
- into a code __________
- communication system is a system which describes the information exchange between two points. _____________ ______
Down
- is a building dedicated to space within the building. ____ _______
- is a unit of information ____
- a process of set rules to be followed by calculations _________
- is a web-based environment for learning to code with physical computing devices ________
- is a method used that is similar to an algorithm _________
- is instructions that tell a computer what to do ________
- a global computer network providing a variety of information and communication facilities ________
- security is the application of technologies, processes and controls to protect systems _____ ________
17 Clues: into a code __________ • is a unit of information ____ • the process of converting information or • tools, machinery, and other durable equipment. ________ • is instructions that tell a computer what to do ________ • is a method used that is similar to an algorithm _________ • a process of set rules to be followed by calculations _________ • ...
Cyber 2025-11-05
Across
- – A notification that warns a user or system of a security issue or important event.
- – A temporary storage of data in memory or a browser to speed up access.
- – Refers to something on the device itself or within a local network.
- – A malicious program that infects devices, replicates itself, and can damage data.
- – A security code used to verify identity or grant access to a system.
- – The process of accessing an account or system using a username and password.
Down
- – An update or fix for software to close security vulnerabilities or repair issues.
- – The smallest unit of a digital image or screen, representing a single point of color.
- – The act of forwarding data or messages from one point to another in a network.
- – An action recorded in the system, such as a login, setting change, or network activity.
- – A system administrator with full control over devices, users, or networks.
- – A command-line interface in an operating system used to execute commands and programs.
12 Clues: – Refers to something on the device itself or within a local network. • – A security code used to verify identity or grant access to a system. • – A temporary storage of data in memory or a browser to speed up access. • – A system administrator with full control over devices, users, or networks. • ...
Merry Christmas 2016 2016-12-12
Across
- Esther's school grade.
- What Dan will be called next year.
- First bugle call heard daily.
- Who sang a solo as a cow.
- Promotion Brent received in 2016.
- What we live in on post.
- Andrea's favorite name.
- New Revelations College Ministries.
- State we live in now.
- Retreat lowers this.
- One working on a Bachelor's at Liberty U.
- Trespassers on Fort Polk.
- ___ has people for that.
- Fort where we live.
- Andrea's work at Western Seminary.
- Where we lived until June 2016.
Down
- We eat lots of them this time of year.
- Hopeful number of grandchildren for Ted and Andrea next year.
- One studying cyber security at George Washington School of Business.
- For a year of good health and ministy.
- Busy most of the time.
- Naomi's current condition.
- Course Danielle will study next year.
- Esther's name for Ted.
- Fires mornings and evenings.
- What God has in store.
- One who is moving to Baton Rouge.
- Where the heart is.
- Gwen's School grade.
- Peppermint is her nick name (Peanuts).
- Activity for trail around golf course.
31 Clues: Where the heart is. • Fort where we live. • Retreat lowers this. • Gwen's School grade. • State we live in now. • Esther's school grade. • Busy most of the time. • Esther's name for Ted. • What God has in store. • Andrea's favorite name. • What we live in on post. • ___ has people for that. • Who sang a solo as a cow. • Trespassers on Fort Polk. • Naomi's current condition. • ...
NATO’s Defense Policy on Modern Threats 2024-04-24
Across
- A cooperative relationship between countries for mutual defense.
- The state of being free from danger or threat.
- A set of principles or guidelines governing decision-making.
- Violent acts aimed at creating fear for political or ideological goals.
- The capacity to adjust or change in response to new circumstances.
- An international military alliance formed in 1949.
- A source of danger or harm.
- Measures taken to protect against attack or danger.
- Actions taken to prevent or respond to terrorist activities.
- The ability or capacity to perform a particular task or function.
- The introduction of new methods, ideas, or products.
Down
- The quality of being firm, steadfast, or unchanging.
- Pertaining to activities carried out in the digital domain.
- The ability to recover quickly from difficulties.
- A plan or approach devised to achieve specific goals in defense.
- Information gathered and analyzed to inform decision-making.
- The action of discouraging an adversary from aggression through the threat of retaliation.
- The application of scientific knowledge for practical purposes in defense.
- A defensive system designed to intercept and destroy incoming missiles.
- Working together towards a common goal, especially in defense.
20 Clues: A source of danger or harm. • The state of being free from danger or threat. • The ability to recover quickly from difficulties. • An international military alliance formed in 1949. • Measures taken to protect against attack or danger. • The quality of being firm, steadfast, or unchanging. • The introduction of new methods, ideas, or products. • ...
Synergic Puzzle 2022-05-15
Across
- A cyber worm attacked Iranian nuclear facilities
- Reducing the amount of carbon compounds in British English
- An abbreviation for LNG storage and supply ship
- The country which has the largest nuclear power plant in the world
- An emission trading scheme that allows emitting greenhouse gases via an exchange (hint: 3 words)
- An organization that is at the heart of global dialogue on energy
- A gas warms the climate 25 times more than an equivalent amount of CO2
- Recently become synonymous with energy security
- A fundamental element of battery resource for electric vehicles and energy storage.
Down
- Nearly every state uses that facility to produce electricity
- The first solar-powered spacecraft
- The European country approved rules to cap natural gas prices
- Avoiding and eliminating energy waste
- A term which is changed from "phaseout coal" by India's demand
- A unit of crude oil volume
- Tanker name at risk of spilling oil into the Red Sea
- The company which rules the Yamal pipeline
- The period in which generating unit and transmission line are inactive.
- Fuel that produces the most amount of CO2
- One of the most important parts of natural gas transmission
20 Clues: A unit of crude oil volume • The first solar-powered spacecraft • Avoiding and eliminating energy waste • Fuel that produces the most amount of CO2 • The company which rules the Yamal pipeline • An abbreviation for LNG storage and supply ship • Recently become synonymous with energy security • A cyber worm attacked Iranian nuclear facilities • ...
Cyber 2024-10-19
Across
- This term refers to the technology that limits where an app can function by tracking the mobile device's location.
- The process of integrating secure development best practices and methodologies into application software development and deployment using the agile model.
- A suite of software designed to protect against multiple types of malware.
- Software that examines a computer for file-based virus infections and monitors activity like scanning new documents for viruses.
- A system that supports the creation, editing, and modification of digital content by multiple employees
Down
- A part of the internet where security professionals look for signs that critical information is being sought or sold.
- This system is used to manage industrial control systems (ICSs).
- The process of identifying the geographical location of a mobile device.
- A "container" where an application can run without affecting the underlying operating system.
- The process of bypassing installation limitations on smartphones to download apps from unofficial sources.
- A technology that uses servers to deliver applications, data, and entire operating systems to mobile devices via an app or web browser.
- is a group or class of software to management interface for mobile devices as well as computer devices
12 Clues: This system is used to manage industrial control systems (ICSs). • The process of identifying the geographical location of a mobile device. • A suite of software designed to protect against multiple types of malware. • A "container" where an application can run without affecting the underlying operating system. • ...
What am I? AUI edition 2025-07-12
18 Clues: Lift • Cyber • Luigi • Chess • Ghandi • Square • stairs • MAWAZINE • épicerie • broadway • Mr propre • The Earth • Near proxy • Lost&Found • Money talks • Walter White • Grey's Anatomy • Les cours du soir
Cyber monday 2024-11-28
9 Clues: CUSTOMER OPINION • IDENTIFIES ITEMS • LINE FOR CHECKOUT • CYBER MONDAY IS ONE • USED TO RATE PRODUCTS • WHEN SALES BEGIN SOONER • DAY BEFORE CYBER MONDAY • WHEN SALES EXTEND LONGER • A FAVORITE SHOPPING COLOR
On Line Safety 2014-11-19
Across
- only be facebook friends with people you ....
- the settings you need to use to protect your facebook account
- when you write on your facebook page
- if parents agree to something then they give you this
- what you can do to people you don't want to be friends with on facebook
- people you know well
- a word or number to protect your information
- facebook is an example of social .....
- you should be very ....... on line
- people need to make sure they are .... online
- to take something off facebook you can do this
- if you receive something inappropriate you should .... an adult
Down
- the minimum age you need to be to have a facebook account
- the type of bullying that is done online
- the letters used for the world wide web
- how much facebook costs to join
- eg. drawing or photo
- type of information that could include your name or address
- when you send a private post to a friend you can do it through these
- these are cute little faces you can use on facebook
- when you post anything to facebook it stays there .......
- grown up person
22 Clues: grown up person • eg. drawing or photo • people you know well • how much facebook costs to join • you should be very ....... on line • when you write on your facebook page • facebook is an example of social ..... • the letters used for the world wide web • the type of bullying that is done online • a word or number to protect your information • ...
Geopolitics and International Relations 2025-03-15
Across
- – Protection from threats to ensure stability and safety.
- – Agreements between states or groups for mutual benefit and support.
- – The management of international relations through negotiation and dialogue.
- – A global order where multiple states or entities share significant power.
- – The ability to influence or control people, events, or resources.
- – Purchasing goods or services from foreign markets.
- – Selling goods or services to foreign markets.
- – Allocating resources to generate future returns.
- – Potential losses or negative outcomes in decision-making.
Down
- – Expanding investments or operations to reduce risk.
- – Legally recognized business entities separate from their owners.
- Warfare – The use of digital attacks to disrupt or damage a nation's systems or infrastructure.
- – Moving business operations to another country for cost efficiency.
- – Mutual reliance between entities, often in economic or political contexts.
- – The process of coming into existence or prominence.
- – A political approach emphasizing the concerns of ordinary people against elites.
- – Established organizations or systems governing political, social, or economic activities.
- – A business model where a company grants rights to operate under its brand.
- – The use of violence or threats to create fear for political or ideological aims.
- – The exchange of goods and services between parties or nations.
20 Clues: – Selling goods or services to foreign markets. • – Allocating resources to generate future returns. • – Purchasing goods or services from foreign markets. • – Expanding investments or operations to reduce risk. • – The process of coming into existence or prominence. • – Protection from threats to ensure stability and safety. • ...
Merry Christmas 2016 2016-12-12
Across
- Busy most of the time.
- What Dan will be called next year.
- One working on a Bachelor's at Liberty U.
- First bugle call heard daily.
- Course Danielle will study next year.
- Where the heart is.
- State we live in now.
- Promotion Brent received in 2016.
- Retreat lowers this.
- What we live in on post.
- Trespassers on Fort Polk.
- Hopeful number of grandchildren for Ted and Andrea next year.
- Peppermint is her nick name (Peanuts).
- Activity for trail around golf course.
- One studying cyber security at George Washington School of Business.
- Andrea's favorite name.
Down
- Fires mornings and evenings.
- Where we lived until June 2016.
- What God has in store.
- Who sang a solo as a cow.
- Naomi's current condition.
- We eat lots of them this time of year.
- One who is moving to Baton Rouge.
- For a year of good health and ministy.
- Gwen's School grade.
- Andrea's work at Western Seminary.
- Esther's name for Ted.
- ___ has people for that.
- Fort where we live.
- Esther's school grade.
- New Revelations College Ministries.
31 Clues: Where the heart is. • Fort where we live. • Gwen's School grade. • Retreat lowers this. • State we live in now. • Busy most of the time. • What God has in store. • Esther's name for Ted. • Esther's school grade. • Andrea's favorite name. • What we live in on post. • ___ has people for that. • Who sang a solo as a cow. • Trespassers on Fort Polk. • Naomi's current condition. • ...
SAs Are Better 2023-12-12
Across
- Loves Azzip
- Involved in intervarsity
- Has a fruit in their last name
- Is the only OE SA
- Played football in high school
- Plays the guitar
- Is addicted to AMONGUS
- Has a British accent
- Likes board games
- Drives a Bronco
- Lives in the same hall as his brother
- Loves to bowl
- Has been in a class with a Blum SA for the last two quarters
- Is involved with cyber security club
- Huge Dodgers fan
- Has lived on the same floor his entire Rose Career
- Tore his ACL
- Has a farm
Down
- On the swim team
- On the ultimate frisbee club team
- Class president for '26
- Really into DND
- Originally from Oregon
- Originally from Taiwan
- Loves one-piece
- He is in EWB
- Is in APO
- Spent the whole summer doing marching band
- Does pole-vaulting for track
- Huge Chiefs fan
- Is in love with sharks
- Is the service chair for RHA
- She lived in Percopo freshman year
- Gives haircuts on campus
- Is the pickiest eater in residence life
- Originally from Minnesota
36 Clues: Is in APO • Has a farm • Loves Azzip • He is in EWB • Tore his ACL • Loves to bowl • Really into DND • Loves one-piece • Drives a Bronco • Huge Chiefs fan • On the swim team • Plays the guitar • Huge Dodgers fan • Is the only OE SA • Likes board games • Has a British accent • Originally from Oregon • Is addicted to AMONGUS • Originally from Taiwan • Is in love with sharks • Class president for '26 • ...
CyberSecurity Words 2023-09-07
Across
- tells other servers which servers are allowed to send emails using your business’s domain name
- protection from data theft
- a data copy of files
- an text encryption used to protect data
- email authentication technology to help prevent phishing emails
- getting email that asks that they have your data
- a way of stealing data usually by emails or phone calls
- the service you choose should include TLS, which will help to protect your customers’ privacy.
- puts a digital signature on outgoing mail
- Accessing that another device safely
- People who help you with technological issues.
Down
- Something which can be exploited by hackers
- that automatically download malicious software onto your computer.
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
- Someone else using your identity
- a file or code that infects or steal data
- a new version of data of the system
- Usually comes from malware in the system
- the process or action of verifying the identity of a user or process.
- Information that was stolen
20 Clues: a data copy of files • protection from data theft • Information that was stolen • Someone else using your identity • a new version of data of the system • Accessing that another device safely • an text encryption used to protect data • Usually comes from malware in the system • a file or code that infects or steal data • puts a digital signature on outgoing mail • ...
Tech Trails: The Ultimate IT Crossword 2025-07-30
Across
- A control structure used for repeating a block of code.
- The smallest unit of data in computing.
- An open-source operating system kernel.
- A small, fast memory located close to the CPU.
- Software designed to disrupt or damage a computer system.
- A cyber-attack that tricks users into giving up sensitive information.
- Address A unique string identifying each device on a network.
- The standard markup language for creating web pages.
- A device that forwards data packets between networks.
- A language used to communicate with and manage databases.
- Storing and accessing data over the internet instead of a local drive.
Down
- A program that converts source code into executable code.
- A widely-used, class-based, object-oriented programming language.
- A network security system that monitors and controls incoming and outgoing traffic.
- An error in a program that prevents it from running correctly.
- The blinking indicator showing where the next character will appear on the screen.
- A type of computer memory that is volatile and temporary.
- The smallest unit of a digital image or display.
- A high-level programming language known for its simplicity.
- A version control system used for tracking changes in source code.
20 Clues: The smallest unit of data in computing. • An open-source operating system kernel. • A small, fast memory located close to the CPU. • The smallest unit of a digital image or display. • The standard markup language for creating web pages. • A device that forwards data packets between networks. • A control structure used for repeating a block of code. • ...
DIGITALIZATION TECHNOLOGY 2025-10-07
Across
- - device that combines phone and computer functions.
- - structured collection of digital information.
- - AI program that automatically answers user questions.
- - digital assistant like Alexa, Siri, or ChatGPT.
- - online journal or website where information is posted regularly.
- - secret code used to protect accounts.
- - global network that connects computers and devices.
- - ability to use technology effectively.
- CODE - barcode that links to websites or resources when scanned.
- - meeting held using video or audio technology.
- - method of securing digital information.
- - to send data or files to the internet.
- - small technological device or tool.
- SECURITY - protection of data and systems from online threats.
Down
- - using technology to perform tasks without human help.
- - classroom enhanced with digital tools and devices.
- - storing and processing data on remote servers.
- - combination of text, sound, and video for learning.
- CITIZENSHIP - responsible behavior when using technology.
- - online storage system for saving and accessing files anywhere.
- - to save files from the internet to your device.
- - screen used to display digital content.
- - digital slides created to explain a topic.
- - website used to find information online.
- - online place to download educational applications.
25 Clues: - small technological device or tool. • - secret code used to protect accounts. • - ability to use technology effectively. • - to send data or files to the internet. • - screen used to display digital content. • - method of securing digital information. • - website used to find information online. • - digital slides created to explain a topic. • ...
Sophomore Year! 2023-08-13
Across
- What is your classification this year?
- You need to set the above and have high (blank)
- You will have to really pay attention in these.
- At least you won't be this on campus because it isn't your first year
Down
- This year you will get to take more of these that will get you ahead for college
- You will hopefully get this this year in April
- We can't believe you will turn this age this year
- This year you will need to schedule your PRE (blank)
- Don't worry. Some things will stay the same. You will still cheer on this team on Sundays
- What school are you thinking of studying cyber security?
- This year you will get behind the wheel of your very own
- School Which campus will you be on this year?
12 Clues: What is your classification this year? • You will hopefully get this this year in April • School Which campus will you be on this year? • You need to set the above and have high (blank) • You will have to really pay attention in these. • We can't believe you will turn this age this year • This year you will need to schedule your PRE (blank) • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- who uses others takes others scripts because they cant make their own
- Mr Scott
- This act assures that your data is kept safe to the correct standards
Down
- Someone who hacks into government files to cause disruption or damage
- Damage that was purposefully acted out
- A motivation that means the attacker is gaining money.
- Crime that has been preplanned
- someone who uses others takes others scripts because they cant make their own.
- Someone who hacks for a campaign
- Insures that the information is available to those who need to use it
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • Someone who hacks into government files to cause disruption or damage • who uses others takes others scripts because they cant make their own • ...
Security Analysts 2024-06-06
Across
- What do you get a bachelor's in to become a security analyst?
- What is the dress code like?
- who do security analysts work for?
- What does a security analyst do?
- What skills are needed?
- Should you give me a B in this class?
- How many years of prior experience do you need?
- How many new job openings are open every year?
Down
- What is the work environment like?
- What education level is required?
- Do security analysts plan and carry out security measures to protect a computer network?
- Should you give me a A in this class?
- What do security analysts mainly use to work?
- What is a hassle for a security analysts to obtain?
- Will I be extremely sad if you give me a B?
- Is this job important to protect a companies network?
- What do security analysts work in?
- What is the pay for a security analysts
- What rate is the security analysts job employment growing at?
19 Clues: What skills are needed? • What is the dress code like? • What does a security analyst do? • What education level is required? • What is the work environment like? • who do security analysts work for? • What do security analysts work in? • Should you give me a A in this class? • Should you give me a B in this class? • What is the pay for a security analysts • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- Protocol that is meant for uploading and downloading files.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- The process by which two information systems establish a communication channel.
- A bundle of programs that is designed to bombard users with advertisements.
- A firewall setting that separates LAN of an organization from the external network.
- A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A computer program that keeps a log of your keystrokes on your keyboard.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- a cyber attack intended to redirect a website's traffic to another, fake site.
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- A bridge between two networks that connects using different protocols.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
Cyber-bullying 2013-09-25
Across
- / ______ your emotions
- ________-based coping strategies are generally more effective in dealing with cyber-bullying
- When someone pretends to be someone else and sends or posts material to make you look bad or place you in danger
- / Alter your __________
Down
- / When being cyber-bullied, you can always ______ the bully to trusted adults, friends and family.
- To bully online by sending or posting mean messages, usually anonymously
- / When someone repeatedly sends offensive messages to you
- / One of the detrimental impacts cyber-bullying has is _______________
8 Clues: / ______ your emotions • / Alter your __________ • / When someone repeatedly sends offensive messages to you • / One of the detrimental impacts cyber-bullying has is _______________ • To bully online by sending or posting mean messages, usually anonymously • ________-based coping strategies are generally more effective in dealing with cyber-bullying • ...
ICT Safety and security 2022-06-23
Across
- A computer expert who does the act of hacking
- Computer system that prevents unauthorized access to a network
- Never save your password on a
- Method by which information is converted into secret code that hides the information's true meaning
Down
- Protection of computer systems from unauthorised access, theft or harm
5 Clues: Never save your password on a • A computer expert who does the act of hacking • Computer system that prevents unauthorized access to a network • Protection of computer systems from unauthorised access, theft or harm • Method by which information is converted into secret code that hides the information's true meaning
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
GX Duel Links Characters 2023-04-04
Across
- Summons Elemental HERO Flame Wingman & Elemental HERO Neos
- Summons Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
- Summons Ancient Gear Golem
- Summons Armed Dragon LV7 & Ojama King
- Summons Destiny HERO - Plasma
- Summons Cyber Blader
- Summons Rainbow Dragon
- Summons Super Vehicroid Jumbo Drill
- Summons Fossil Warrior Skull King
- Summons Ultimate Tyranno
Down
- Summons Evil HERO Malicious Fiend
- Summons Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
- Summons Volcanic Doomfire
- Summons Water Dragon
- 1st Year Slifer Red with a crush on Jaden
- Summons Cyber End Dragon
- Summons Arcana Force EX - The Light Ruler
17 Clues: Summons Water Dragon • Summons Cyber Blader • Summons Rainbow Dragon • Summons Cyber End Dragon • Summons Ultimate Tyranno • Summons Volcanic Doomfire • Summons Ancient Gear Golem • Summons Destiny HERO - Plasma • Summons Evil HERO Malicious Fiend • Summons Fossil Warrior Skull King • Summons Super Vehicroid Jumbo Drill • Summons Armed Dragon LV7 & Ojama King • ...
RL4 U4 Station2 2023-03-11
15 Clues: seit • Konto • teilen • Anfrage • Neuheit • modisch • veraltet • abonnieren • Bildschirm • away sofort • trendsetzend • beeinflussen • Cyber-Mobbing • sich vorstellen • sich verständigen
2022 Stay Aware Event 2022-03-02
Across
- This practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- __________ and access management is a framework of policies and technologies used to ensure that the right users have the appropriate access to technology resources.
- Memorized secret consisting of a sequence of words or other text that a person uses to authenticate their identity and would be difficult for someone else to guess.
- Type of social engineering where scammers send text messages pretending to be from reputable companies to entice individuals to reveal personal information, such as passwords or credit card numbers.
- A virtual _______ _______ is an encrypted connection over the Internet from a device to a network.
- A term for additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
- A term for hackers that break into the network to steal information that would be used to harm the owner or the users without their consent and is completely illegal.
- An acronym for a centralized function/team at Lowe’s allowing people, processes, and technology to continuously monitor and improve the security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
- Shoulder ________ is a criminal practice using direct observation techniques, such as looking over someone's shoulder, to try to steal someone’s personal information.
- The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.
Down
- ____ ______ authentication is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are such as something they have (e.g., bank card), something they know (e.g., PIN number) and/or something they are (e.g., biometrics).
- A security violation where sensitive, protected, or confidential data is copied, viewed, stolen, or used by an unauthorized individual, and can cause great financial loss and other repercussions.
- Software that is secretly installed into an information system without the knowledge of the system user or owner.
- This aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A type of malicious code or software that looks legitimate but can take control of your computer and is designed to damage, disrupt, steal, or (in general) inflict some other harmful action on your data or network.
- __________ __________ baselines are standards for all systems in the network and enable Lowe’s to implement systems in an efficient and standardized manner.
- An unauthorized user who attempts to or gains access to an information system.
- Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.
- Refrain from inserting unknown or unidentifiable ___________ ______ into your Lowe’s devices unless you are an approved user.
20 Clues: An unauthorized user who attempts to or gains access to an information system. • Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email. • A malicious application or script that can be used to take advantage of a computer’s vulnerability. • ...
Cyber monday 2024-11-28
9 Clues: CUSTOMER OPINION • IDENTIFIES ITEMS • LINE FOR CHECKOUT • CYBER MONDAY IS ONE • USED TO RATE PRODUCTS • WHEN SALES BEGIN SOONER • DAY BEFORE CYBER MONDAY • WHEN SALES EXTEND LONGER • A FAVORITE SHOPPING COLOR
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Fake news 2024-10-02
Across
- kind of hygiene that individuals and organizations use to maintain security resilience of systems, devices, networks, and data.
- kind of war conducted in order to gain informational advantage over the opponent
- the process of establishing the truth,accuracy of information.
Down
- a kind of thinking in which you question,analyse, interpret, evaluate and make a judgementnabout what you read, hear, say, or write.
- A thing that is not genuine, not true, made-up;
- the process of verifying facts
- Information about current event
7 Clues: the process of verifying facts • Information about current event • A thing that is not genuine, not true, made-up; • the process of establishing the truth,accuracy of information. • kind of war conducted in order to gain informational advantage over the opponent • ...
SFS 2 Vocal pt 2 2021-09-27
Across
- the year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
- any changes, erasures, or obliterations that may have occurred
- handwriting is difficult to disguise and forge
- similar to fingerprints, every person's handwriting is what it is
- agency that investigates forgery cases
- the examination and comparison of questioned documents with known material
- what was the first known case in which handwriting analysis played a role?
- when false documents or other items are copied for the purpose of deception
- a computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate
- the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation
- stores handwriting samples in databases
- also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
- writing over top to smear or make original writing unreadable
- directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
- any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute or uncertain
Down
- maximum prison term for forgery(federal felony)
- Dollar amount that is written in illegitimate checks every day
- chemically sensitive paper. large font size requires more ink and makes alterations more difficult. high resolution borders that are difficult to copy. multiple color patterns on paper. embed fibers that glow under different light. use chemical wash detection systems that change color when a check is altered
- any prewritten handwriting samples from a suspect(s)
- checks, employment records, legal agreements, licenses, wills
- portrait stands out and appears raised off the paper. contains clear red and blue fibers woven throughout the bill. has clear, distinct border edges. treasury seal is shown with clear, sharp saw-tooth points. watermark appears on the right side of the bill in the light. the security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it. there is minute printing on the security threads, as well as around the portrait. when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
- what are the overall height, width, and size of the letters?
- checks, certificates, wills, passports, licenses, money, letters, contracts, suicide notes, receipts, and even lottery tickets
- "learns" to recognize how a person signs; evaluates speed, pressure, and rhythm of the signatures; recognizes forgeries by the detection of even slight differences
- currency/paper money, traveler's checks, food vouchers/ WIC coupons, certain bonds, postage stamps
- good tool for including or excluding persons when determining a match
- forgery for material gain
- the making, altering, or falsifying of a persons signature or any other aspect of a document with the intent to deceive another
28 Clues: forgery for material gain • agency that investigates forgery cases • stores handwriting samples in databases • handwriting is difficult to disguise and forge • maximum prison term for forgery(federal felony) • any prewritten handwriting samples from a suspect(s) • what are the overall height, width, and size of the letters? • ...
CAT cross word 2024-10-09
Across
- Software that is available for use at no cost but may have restrictions on usage or distribution
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
- Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
- The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
- A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
- A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
- A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
- Processing Unit, the primary component of a computer that performs most of the processing tasks.
- A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
- (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
- A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
- A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
- Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
- Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Central Processing Unit, the primary component of a computer that performs most of the processing tasks
- Malicious software designed to harm or exploit any programmable device or network.
- Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
- Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
- Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
- A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
- A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
- Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
- Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.
26 Clues: Malicious software designed to harm or exploit any programmable device or network. • Software that is available for use at no cost but may have restrictions on usage or distribution • Processing Unit, the primary component of a computer that performs most of the processing tasks. • ...
Understanding the Value of Data 2025-09-26
Across
- Washington data classification for information that could cause significant harm if disclosed.
- Security method requiring more than one verification step.
- Network barrier that blocks unauthorized traffic.
- The right of individuals to control personal information about themselves.
- Manipulating people into revealing confidential information.
- Disguising communication to appear from a trusted source.
- The act of assigning a security category to information.
- Systematic review to ensure compliance with security rules.
- Washington data classification for information that could cause limited harm if disclosed.
- Common acronym for data such as Social Security numbers, addresses, and birth dates.
- Security principle ensuring data is accessible when needed.
- Data label meaning information should only be shared with authorized users.
- Software update that fixes bugs or security holes.
- A label for data requiring extra care to protect.
- Fraudulent attempt to obtain sensitive information, often by email.
Down
- Temporary digital code used for secure login.
- Process of converting information into a code to prevent unauthorized access.
- The person or office responsible for classifying and protecting information.
- A weakness that could be exploited in a system or process.
- A secret string of characters used for authentication.
- Security technique restricting who can view or use resources.
- Security principle ensuring information is only accessible to those with permission.
- Incident where unauthorized individuals gain access to protected data.
- Adhering to laws, regulations, and security policies.
- Security principle ensuring data is accurate and unaltered.
25 Clues: Temporary digital code used for secure login. • Network barrier that blocks unauthorized traffic. • A label for data requiring extra care to protect. • Software update that fixes bugs or security holes. • Adhering to laws, regulations, and security policies. • A secret string of characters used for authentication. • ...
Espanol-Kieran 2023-03-02
15 Clues: never • i post • advice • photos • useful • change • consent • caution • Socials • comments • password • fake name • identity card • cyber bullying • make someone feel bad
DAMPAK SOSIAL INFORMATIKA 2025-05-15
Across
- Perangkat keras (Hardware) yang berfungsi sebagai otak komputer disebut
- Media untuk menyampaikan informasi dalam bentuk suara atau bunyi disebut
- Jenis media sosial yang kontennya dapat diakses dan di edit dalam bentuk suara atau bunyi disebut
- Pengguna dapat berbagi informasi dalam bentuk teks, gambar, video, atau suara
- Jenis media sosial yang digunakan untuk penipuan atau mencuri identitas disebut
- Pengguna dapat menyampaikan pendapat dan saling berdiskusi secara padat dan jelas
- Berbasis internet yang memfasilitasi interaksi sosial dan memungkinkan penggunanya berinteraksi
- Pencuri informasi kartu kredit secara online disebut
Down
- Pencuri data dengan cara mengirimkan malware ke perangkat atau situs web disebut
- ITE Kejahatan cyber/cyber crime termasuk dalam perbuatan kriminal dan melanggar hukum
- Kejahatan apa yang merugikan setiap orang di dunia maya melalui komputer dan jaringan
- Adanya cyberbullying dan ujaran kebencian (hate speech) antarpengguna media sosial
- Contoh media audio visual yang merupakan gabungan dari media audio dan media visual
- Keamanan yang penggunaannya memerlukan kode unik untuk bisa masuk ke sebuah auun disebut
- Media sosial yang memudahan komunikasi antar penggunanya secara cepat adalah dampak?
- Perangkat lunak yang berfungsi dalam mengamankan data dan informasi disebut
- Media yang melibatkan indra penglihatan untuk menerima informasi disebut
17 Clues: Pencuri informasi kartu kredit secara online disebut • Perangkat keras (Hardware) yang berfungsi sebagai otak komputer disebut • Media untuk menyampaikan informasi dalam bentuk suara atau bunyi disebut • Media yang melibatkan indra penglihatan untuk menerima informasi disebut • Perangkat lunak yang berfungsi dalam mengamankan data dan informasi disebut • ...
Cybersafety Angela Awwad 2016-06-08
Across
- sending a message.
- to sign in to a device.
- on the Internet.
- opposite to in safe.
- Any Internet related illegal activity.
- safety being careful of what your doing on the Internet.
- unwanted emails.
- you don't know who your talking to until you press the button.
- like a cold for your device.
- someone looking at your personal details.
Down
- for cyber safety word search
- Internet service provider, company that gives you Internet.
- theft when someone pretends to be someone else.
- ask parent before doing something.
- software Software that parents use to keep an eye on the children's online activity.
- don't talk to strangers.
- a angry or negative message.
- someone who likes to cause trouble on online.
- when someone spying on you on the Internet.
- bullying someone's bullying you by sending you bad emails.
20 Clues: on the Internet. • unwanted emails. • sending a message. • opposite to in safe. • to sign in to a device. • don't talk to strangers. • for cyber safety word search • a angry or negative message. • like a cold for your device. • ask parent before doing something. • Any Internet related illegal activity. • someone looking at your personal details. • ...
Advanced Cyber - Cyber Defense 2023-09-26
Across
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
- this is meant to shut down a machine or network, making it inaccessible to its intended users.
- An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
- an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
- a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.
- a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Down
- a newly established web site that encourages hacking in order to learn and protect against it.
- a large-scale cyber attack carried out by malware-infected devices which are controlled remotely.
- the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process or action of proving or showing something to be true, genuine, or valid.
- a person who uses computers to gain unauthorized access to data.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation
16 Clues: a person who uses computers to gain unauthorized access to data. • the process or action of proving or showing something to be true, genuine, or valid. • a newly established web site that encourages hacking in order to learn and protect against it. • this is meant to shut down a machine or network, making it inaccessible to its intended users. • ...
Cybersecurity Principles Crossword Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
Dm literacy 2021-11-03
20 Clues: bird • blue • like • ghost • Prank • device • upload • camera • Facebook • Subscribe • messaging • search up • send back • about you • short videos • Talking online • Show your company • What you look like • videos about ur life • bullying being mean online
Digital Privacy and Data Protection 2025-07-11
Across
- – shaxsiy
- – buzilish
- – saqlash
- – rozilik
- – akkaunt
- – platforma
- – onlayn
- – kirish (imkoniyat)
- – kuzatish
- – shaxsiyat
- – qonun
- – shifrlash
- – internet
Down
- – raqamli
- – himoya
- – xavfsizlik
- – parol
- – ma'lumot
- – texnologiya
- – nazorat
- – siyosat
- – maxfiylik
- – axborot
- – sezgir
- – nazorat
- – xavfsizlik
- – tartibga solish
- – foydalanuvchi
- – almashish
- – kiber
30 Clues: – parol • – kiber • – qonun • – himoya • – sezgir • – onlayn • – raqamli • – shaxsiy • – saqlash • – rozilik • – nazorat • – akkaunt • – siyosat • – axborot • – nazorat • – buzilish • – ma'lumot • – kuzatish • – internet • – platforma • – maxfiylik • – almashish • – shaxsiyat • – shifrlash • – xavfsizlik • – xavfsizlik • – texnologiya • – foydalanuvchi • – tartibga solish • – kirish (imkoniyat)
Tech Terms 2024-11-14
Across
- A printed circuit board containing the components of a computer or other device,with connectore into witch other boards can be slotted.
- what is one input device
- Aunit of information equal
- A computer or system that provides resources, data, seriousness, or programs to together computers, know as clients, over a network.
- Hypertext markup Language
- The shortcut for copy and paste.
- The smallest part of a computer
- Portable document file
- a set of programs that helps a communications service provider monitor, control, analyze and manage a telephone or computer network.
- A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- Protects sensitive data from prying eyes by scrambling ordinary text into a form that is impossible to read without the proper decryption key
- Centeral Prosessing unit
- Any intrusive software developed by cyber-criminals to steal data and damage or destroy computers
- A collection of web sites and pages that people can acess through the internet.
- any information connected to a specific individual that can be used to ucover that individuals identity, such as their social security number.
- A system for connecting a number of computer systems to form a local area network.
- the phone book of the internet
- a cyber security solution that protects your computer or network from unwanted traffic.
- start or restart
- Example of search engine
Down
- The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a helmet with a screen inside or gloves fitted with sensors.
- A type of non-volatile memory used to store permanent data
- what is the difference between hardware and software.
- A physical Device made for storage
- Property A work or invention that is the result of creativity,such as a manuscription or a design.
- Data unit that is eight digits long.
- A language that the computer understands.
- The address of a web page.
- Small pieces of text sent to your browser by a website that you visit
- A transfer of a file from one computer to another
- the gulf between those who have ready acsess to computer and internet, and those who do not.
- A string of characters that identifies each computer.
- Random-access memory
- a unique string of characters that identifies each other
- A bunch of networks connected by many many switches and routers.
- Name something that a computer does
- what is a way to back up your work.
37 Clues: start or restart • Random-access memory • Portable document file • what is one input device • Centeral Prosessing unit • Example of search engine • Hypertext markup Language • Aunit of information equal • The address of a web page. • the phone book of the internet • The smallest part of a computer • The shortcut for copy and paste. • A physical Device made for storage • ...
Understanding the Value of Data 2025-09-26
Across
- Washington data classification for information that could cause significant harm if disclosed.
- Security method requiring more than one verification step.
- Network barrier that blocks unauthorized traffic.
- The right of individuals to control personal information about themselves.
- Manipulating people into revealing confidential information.
- Disguising communication to appear from a trusted source.
- The act of assigning a security category to information.
- Systematic review to ensure compliance with security rules.
- Washington data classification for information that could cause limited harm if disclosed.
- Common acronym for data such as Social Security numbers, addresses, and birth dates.
- Security principle ensuring data is accessible when needed.
- Data label meaning information should only be shared with authorized users.
- Software update that fixes bugs or security holes.
- A label for data requiring extra care to protect.
- Fraudulent attempt to obtain sensitive information, often by email.
Down
- Temporary digital code used for secure login.
- Process of converting information into a code to prevent unauthorized access.
- The person or office responsible for classifying and protecting information.
- A weakness that could be exploited in a system or process.
- A secret string of characters used for authentication.
- Security technique restricting who can view or use resources.
- Security principle ensuring information is only accessible to those with permission.
- Incident where unauthorized individuals gain access to protected data.
- Adhering to laws, regulations, and security policies.
- Security principle ensuring data is accurate and unaltered.
25 Clues: Temporary digital code used for secure login. • Network barrier that blocks unauthorized traffic. • A label for data requiring extra care to protect. • Software update that fixes bugs or security holes. • Adhering to laws, regulations, and security policies. • A secret string of characters used for authentication. • ...
test for security awareness 2021-11-05
4 Clues: - This type of authentication • A way hackers try to get your login credentials • Using a strong ____ can help protect your account • Every October this event rusn to promote cyber security
Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- a cyber attack intended to redirect a website's traffic to another, fake site.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
- A bundle of programs that is designed to bombard users with advertisements.
Down
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- The process by which two information systems establish a communication channel.
- A computer program that keeps a log of your keystrokes on your keyboard.
- Protocol that is meant for uploading and downloading files.
- A bridge between two networks that connects using different protocols.
- A firewall setting that separates LAN of an organization from the external network.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
The IT Christmas Crossword 2025-12-15
Across
- Where you might store the entire nice/naughty list.
- Where your data spends Christmas… not just snow.
- Removing errors… like sweeping up fallen pine needles from code.
- The hardworking machine delivering more than Christmas dinner.
- Unwanted messages—not the Christmas ham variety.
- Running many “elves” on one big machine.
- The digital chimney that lets applications talk to each other.
- Proving it’s really you and not the Grinch logging in.
- Step‑by‑step rules—like Santa’s process for checking his list twice.
Down
- The thing you wish you did before the holiday outage.
- A software fix you hope arrives more often than Christmas gifts.
- Turning it off and on again—the IT equivalent of festive magic.
- Digital mischief-makers worse than any Christmas prank.
- When cyber‑Grinches go fishing for your credentials.
- Scrambling data so only Santa with the right key can read it.
- A security barrier that keeps the naughty list out of your network.
- The reason video calls freeze during family catch‑ups.
- A small file websites store—less tasty than Santa’s prefered kind.
- The delay that feels like waiting for Christmas morning.
19 Clues: Running many “elves” on one big machine. • Where your data spends Christmas… not just snow. • Unwanted messages—not the Christmas ham variety. • Where you might store the entire nice/naughty list. • When cyber‑Grinches go fishing for your credentials. • The thing you wish you did before the holiday outage. • The reason video calls freeze during family catch‑ups. • ...
CBS JAN-13-2025 2025-01-15
Across
- Who exploded a cyber truck
- What truck exploded
- What is people giving out for people in need
- What app is getting banned
- 44 people were found
- How many dozens of people are missing in california
- Whats happening in California
- What did the chinese man do to get the app banned
- Who was the person they wanted killed
- What police tried to arrest yuo
- What state has lots of snow
Down
- Who is trying to buy the app tik tok
- Who did the Korean Police try to arrest
- What is trump getting
- What is Crashing
- Whats burning in California
- What are people doing to help
- What is one of the states that if flying out planes full of water for California
- What is 85% of fires caused from
- What ends Facebook checking
20 Clues: What is Crashing • What truck exploded • 44 people were found • What is trump getting • Who exploded a cyber truck • What app is getting banned • Whats burning in California • What ends Facebook checking • What state has lots of snow • Whats happening in California • What are people doing to help • What police tried to arrest yuo • What is 85% of fires caused from • ...
Cyber smart 2014-04-06
Across
- I know where you are
- steeeeeeaaaaaling stuff
- assistance
- stuff
- the group of people with the authority to govern a country or state
- people of a placeor country
- status that starts with R
- a very bad thing that is very bad
- something like a net that works
- digimon _________ monsters digimon
- a personal website with features to your preference
- a continent and country located on the southern hemisphere
Down
- on the line
- the first word in the title
- the interactions between humans and other living organisms
- the web
- your own stuff
- not legal
- a defense against something
- a unique character everyone has
- data, or content of something
- a very smart machine
- tools, techniques, machines used by humans and some animals
- prohibited content or _________
- texting with the naughty word at the start
- off the line
- problems and the stuff that blocks you in life
27 Clues: stuff • the web • not legal • assistance • on the line • off the line • your own stuff • I know where you are • a very smart machine • steeeeeeaaaaaling stuff • status that starts with R • the first word in the title • a defense against something • people of a placeor country • data, or content of something • a unique character everyone has • prohibited content or _________ • ...
Cyber quiz 2022-09-12
Across
- a cyber attacker who uses software and other methods to steal information
- An error, flaw, failure, or fault in a computer program.
- Programs that automatically execute tasks as ordered by the creator
- Cryptocurrency, a form of electronic cash
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Attaching a phone number or email address to an account for heightened security
- secret word or phrase that is used to access a computer system
- Confirmation of someone's identity using a password or fingerprint
- previously unknown, bug, flaw, or backdoor in software can lead to attacks and damage.
- allows you to create a secure connection to another network using the internet.
- programs and other operating systems used by a computer.
Down
- protecting computers, networks, programs, and data from unauthorized access
- taking advantage of human trust to gain access to private information
- An alternative way to access software typically unauthorized.
- The physical and tangible parts of a computer
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded they can piggybank onto programs to corrupt data or do other damage.
- Creating a fake identity on a social network account to target a specific victim
- Hacking that is meant to do minimal damage
- string of numbers used to identify each computer using the internet on a network.
- predate viruses and have infected systems since mainframes were the only computers in existence. capable of self-replication
20 Clues: Cryptocurrency, a form of electronic cash • Hacking that is meant to do minimal damage • The physical and tangible parts of a computer • An error, flaw, failure, or fault in a computer program. • programs and other operating systems used by a computer. • An alternative way to access software typically unauthorized. • ...
Cyber Definitions 2020-11-19
Across
- To crack one system and then use it as a “launching pad” for cracking other systems.
- An evaluation of events that can adversely affect operations and/or specific assets.
- A form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
- To convert (a message, information, etc.) into cipher.
- to confirm information or identity.
- The reduction of exposure to potential problems in business.
- The science of protecting information by transforming it into a secure format.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- Advertising supported software, is software that displays unwanted advertisements on your computer.
- (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection.
- Someone who creates a false online identity.
- Identity Verification means ensuring that identity data is associated with a particular individual, for example matching date of birth and address to an individual's name.
- A blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
- Intellectual property or source that is not provided to the public.
- A software for which the original source code is made freely available and may be redistributed and modified according to the requirement of the user.
- A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
- A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- A person who operates the command and control of botnets for remote process execution.
- Loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.
- Contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.
- Internet protocol address, it is an identifying number that is associated with a specific computer or computer network.
- Occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.
- Converts one value to another.
- Classified data is introduced to an unclassified computer system or a system authorized at a lower classification.
- An individual who controls and maintains a botnet by installing malicious software in many computers, placing these devices under his/her control.
- An individual or organization's cloud account is stolen or hijacked by an attacker.
- A group of hackers with varying backgrounds, that would test the assumption of an organization's digital presence and the blue team's threat response activity.
- A method or pathway used by a hacker to access or penetrate the target system.
- A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
- A type of malware that is designed so that they can remain hidden on your computer.
- Authenticates all users in a group at once.
- Someone who exploits computer systems or networks to identify security flaws and make improvement recommendations.
Down
- A manipulation technique that exploits human error to gain private information, access, or valuables.
- The process of safeguarding important information from corruption, compromise or loss.
- Criminals who break into computer networks with malicious intent.
- An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.
- A form of a security breach that occurs when an individual's or company's data is copied, transferred, or retrieved from a computer or server without authorization.
- A process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.
- A software application that runs automated tasks (scripts) over the Internet.
- A systematic examination of a task, job or process that you carry out at work for the purpose of; Identifying the significant hazards that are present.
- A cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
- A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- A sacrificial computer system that's intended to attract cyberattacks, like a decoy.
- Storing information over the internet instead of a computer’s hard drive.
- A type of malware that is often disguised as legitimate software.
- Is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
- all the ways you can be attacked
- A security device that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
- Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, steal credit card numbers, plant viruses, etc.).
- a set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- built for the act of keystroke logging, creating records of everything you type on a computer or mobile keyboard.
- A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
- A type of malicious code or software that looks legitimate but can take control of your computer.
- Conversion of data from a readable format into an encoded format that can only be read or processed after it's been decrypted.
- A cyber attack that uses disguised email as a weapon.
- A type of malware that spreads copies of itself from computer to computer.
- A collection of internet-connected devices infected by malware that allow hackers to control them.
- A process used to extract usable data from a larger set of any raw data.
- list of known unwanted companies or services that should be avoided.
- Sign that an attacker may be planning an attack.
- Cyberattack on a server, service, website, or network floods it with Internet traffic.
- A code that takes advantage of a software vulnerability or security flaw.
- saved to a hard drive in a different location, or spare of some sort.
64 Clues: Converts one value to another. • all the ways you can be attacked • to confirm information or identity. • Authenticates all users in a group at once. • Someone who creates a false online identity. • Sign that an attacker may be planning an attack. • A cyber attack that uses disguised email as a weapon. • To convert (a message, information, etc.) into cipher. • ...
