cyber security Crossword Puzzles
Information Security 2021-07-12
Across
- a piece of software code created to perform malacious activities
- this creates unnecessary junk in receiver's email
- is a network security system designed to protect a trusted private netswork from unauthorised access
- is harassment and stalking through phones or the internet
- the short term used for malacious software
Down
- the main purpose of this to record the key pressed by user on the keyboard
- when user access certain website small files downloaded on to the computer
- It is a malware that do damaging activity on an infected computer
- secretly listening to a conversation
- it block the user to access his own data and give threats
- it is the practice of sending fraudulent communication that appear to come from reputable source
- BULLYING, when someone harass or frighten another person with the use of Internet
12 Clues: secretly listening to a conversation • the short term used for malacious software • this creates unnecessary junk in receiver's email • it block the user to access his own data and give threats • is harassment and stalking through phones or the internet • a piece of software code created to perform malacious activities • ...
Cyber World (Internet) 2023-06-12
Across
- Malicious software that replicates itself and infects computer systems.
- The process of encoding information to protect its confidentiality.
- The practice of protecting computers, servers, and networks from digital threats.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A network of infected computers, often controlled by a hacker, used for malicious activities.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A person who uses technical skills to gain unauthorized access to computer systems.
- A security measure that protects computer networks from unauthorized access.
10 Clues: The process of encoding information to protect its confidentiality. • Malicious software that replicates itself and infects computer systems. • A security measure that protects computer networks from unauthorized access. • The practice of protecting computers, servers, and networks from digital threats. • ...
Are you Cyber-Security Smart? 2020-10-20
Across
- fraudulent practice of sending emails from false sources to gather personal information from individuals
- something that protects our device from unauthorized access.
- the imparting or exchanging of information. by speaking, writing or any other medium.
- the feeling of bring safe from danger or threat.
- the process of encoding something.
- the program and other operating information used by computers.
Down
- the string of characters which allow access into a device.
- codes and software designed to cause damage to data and gain unauthorized access to a network.
- a person, responsible for the upkeep, configuration, and reliable operation of computer systems
- an electronic device for storing and processing data and connecting to the net.
10 Clues: the process of encoding something. • the feeling of bring safe from danger or threat. • the string of characters which allow access into a device. • something that protects our device from unauthorized access. • the program and other operating information used by computers. • an electronic device for storing and processing data and connecting to the net. • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- who uses others takes others scripts because they cant make their own
- Someone who hacks for a campaign
- Mr Scott
- Someone who hacks into government files to cause disruption or damage
- This act assures that your data is kept safe to the correct standards
- Crime that has been preplanned
Down
- someone who uses others takes others scripts because they cant make their own.
- A motivation that means the attacker is gaining money.
- Insures that the information is available to those who need to use it
- Damage that was purposefully acted out
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • who uses others takes others scripts because they cant make their own • Insures that the information is available to those who need to use it • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- This act assures that your data is kept safe to the correct standards
- Crime that has been preplanned
- Someone who hacks into government files to cause disruption or damage
- Insures that the information is available to those who need to use it
Down
- who uses others takes others scripts because they cant make their own
- Mr Scott
- A motivation that means the attacker is gaining money.
- Someone who hacks for a campaign
- Damage that was purposefully acted out
- someone who uses others takes others scripts because they cant make their own.
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • who uses others takes others scripts because they cant make their own • This act assures that your data is kept safe to the correct standards • ...
Unit 3 Cyber security crossword 2017-05-12
Across
- Someone who hacks into government files to cause disruption or damage
- A motivation that means the attacker is gaining money.
- Insures that the information is available to those who need to use it
- Damage that was purposefully acted out
- Someone who hacks for a campaign
Down
- Crime that has been preplanned
- This act assures that your data is kept safe to the correct standards
- Mr Scott
- who uses others takes others scripts because they cant make their own
- someone who uses others takes others scripts because they cant make their own.
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • This act assures that your data is kept safe to the correct standards • Someone who hacks into government files to cause disruption or damage • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- An area of data protection that concerns the proper handling of sensitive data
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Extortion software that can lock your computer and then demand a ransom for its release.
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
GT Cyber Security Fun Quiz 2025-09-23
Across
- ____________________ of duties principle means there should not be any employee who handle and entire process singly.
- Computers or devices authorised for remote access must be __________________ and installed with latest operating system security patches, antivirus / anti-malware software and signatures.
- ______________________ is a security practice that involves examining system logs to detect and respond to unauthorised activities.
- Access to information systems and endpoints must be controlled on the basis of business and security requirement based on the _______________ and least privilege principles with proper authorization.
- _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access.
- Use of _________________ data in development and test environments is strictly prohibited.
Down
- Employees must ensure that data classified as confidential and highly confidential are encrypted with strong _____________ or password protection when transmitted over external networks.
- Regular compliance check on system configurations must be conducted on periodic basis and in the event of revision of security ______________________.
- Passwords value entered must be masked by __________________.
- Group must implement strong governance to protect the confidentiality, integrity and ________________ and safety of Group data and information systems, and mitigate against the risk of information security threat.
10 Clues: Passwords value entered must be masked by __________________. • Use of _________________ data in development and test environments is strictly prohibited. • _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access. • ...
Computer Crime and Cyber Security 2024-02-20
Across
- Information that can be used to identify you
- An example of a malicious software that can disrupt a computer system
- The number of degrees your elbows should be at when working at a desk.
- A type of email scam to try and gather personal information for illegitimate reasons
- Malicious software
- Which Act makes accessing a device without permission, illegal?
Down
- An Act which means data collectors MUST keep the data secure.
- The number of CM a monitor should be from your face.
- A type of malware that prevents access to data until a SUM of money has been paid.
- Special category data that must be kept with extra security
10 Clues: Malicious software • Information that can be used to identify you • The number of CM a monitor should be from your face. • Special category data that must be kept with extra security • An Act which means data collectors MUST keep the data secure. • Which Act makes accessing a device without permission, illegal? • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- An area of data protection that concerns the proper handling of sensitive data
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Security terms puzzle 2025-02-13
Across
- Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
- A decoy system designed to lure and detect attackers.
- Protecting information from unauthorized access.
- Engineering Manipulating people to gain unauthorized access to information.
- Hacking phone systems to make free calls or manipulate networks.
- Security Protecting an individual computer or device from threats.
- through obscurity Hiding system details to reduce security risks.
Down
- Aggregation Combining data from multiple sources for analysis.
- Privilege Granting users the minimum access necessary for their tasks.
- Verifying the identity of a user or system.
- of duties Dividing responsibilities to prevent fraud and errors.
- A security system that monitors and controls network traffic.
- Digital documents that verify identities and enable secure communication.
- Preventing denial of actions, ensuring accountability.
- Security Protecting a network from threats and unauthorized access.
- Computing Delivering computing services over the internet.
- Gaining unauthorized access to systems or networks.
- Ensuring data is accurate and unaltered.
- Security Using multiple security measures to protect data and systems.
19 Clues: Ensuring data is accurate and unaltered. • Verifying the identity of a user or system. • Protecting information from unauthorized access. • Gaining unauthorized access to systems or networks. • A decoy system designed to lure and detect attackers. • Preventing denial of actions, ensuring accountability. • Computing Delivering computing services over the internet. • ...
Managing modern risks in a company 2025-01-02
Across
- Meeting current needs without compromising the ability to meet future needs.
- Type of security aimed at protecting data and systems from online threats.
Down
- A deceptive act or practice to gain an unfair advantage, often financial.
- A system or place where goods, services, or financial assets are traded.
- The possibility of loss or harm in any financial decision.
- A contract that provides financial protection against specific risks.
6 Clues: The possibility of loss or harm in any financial decision. • A contract that provides financial protection against specific risks. • A system or place where goods, services, or financial assets are traded. • A deceptive act or practice to gain an unfair advantage, often financial. • Type of security aimed at protecting data and systems from online threats. • ...
men 2025-07-16
17 Clues: eyes • punk • photo • small • metal • wires • dance • videos • indian • autistic • magic brick • also indian • asian worker • chicken jockey • recording gaming • glass flatscreen • talking on stream
Izabella Kulla- virus 2019-11-05
Across
- a computer program that replicates itself in order to spread to other computers
- a person or thing likely to cause damage
- short for Distributed Denial of Service
- the practice of defending computers from malicious attacks
- a type of malware that is often seemed as legitimate software until opened and given the virus
- a self-contained storage device containing a read-write mechanism
- a person who uses computers to gain unauthorized access to data
Down
- a collection of instructions that performs a specific task when executed by a computer
- the programs used by a computer
- an electronic way of messaging
- sending emails in order to reveal someone's personal information.
- a system of words, letters, figures, or other symbols.
- an software that is specifically designed to damage a computer system.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a piece of code which is capable of damaging software
15 Clues: an electronic way of messaging • the programs used by a computer • short for Distributed Denial of Service • a person or thing likely to cause damage • a piece of code which is capable of damaging software • a system of words, letters, figures, or other symbols. • the practice of defending computers from malicious attacks • ...
CIS 101 Participation 2023-12-02
Across
- Security flaw not yet discovered
- Protection that's against unauthorized access
- Security failure leading to compromise
- Secure Data with secret code
- Examination for compliance and security
- Breach of system or network
- String of letters for authentication
- Identification using unique biological features
- Regulatory adherence for date protection
Down
- Confirm identity for system access
- Software protecting against malicious code
- Blocks unauthorized access to network
- Breach or occurrence requiring investigation
- Security gap needing protection
- Deceptive attempt to acquire information
- Unwanted software causing system damage
- Code modification to improve security
- Device or node in network
- Application of scientific methods investigation
19 Clues: Device or node in network • Breach of system or network • Secure Data with secret code • Security gap needing protection • Security flaw not yet discovered • Confirm identity for system access • String of letters for authentication • Blocks unauthorized access to network • Code modification to improve security • Security failure leading to compromise • ...
Technical crossword 2025-05-26
Across
- Relating to the structure of a brain or AI
- AI-generated synthetic media
- Translates code into machine language
- Neural network-based machine learning technique
- Exists in digital rather than physical form
- Prefix meaning related to computers or networks
- Wired networking protocol for local networks
- Decentralized ledger used in cryptocurrencies
- Reduces the need for human intervention
- Security system that monitors traffic
- Converts data to hide meaning
- Opposite of natural; precedes “intelligence”
- Software designed to damage or infiltrate
Down
- Structured collection of information
- Data that describes other data
- The base-2 numeral system used by computers
- Data type with two possible values
- Core of an operating system
- Performs computation in electronic devices
- Repeating a process, often in loops
- Deceptive attempt to gain sensitive information
- Instruction to retrieve data from a database
- Low-level software tightly coupled with hardware
- Challenge to verify a human user
- Smallest unit of meaning in programming or crypto
- Set of rules that define structure in code
- Amount of data transmitted over a network
- Interface that lets software components communicate
- Phase when a program is actively executing
- A step-by-step procedure used in computation
30 Clues: Core of an operating system • AI-generated synthetic media • Converts data to hide meaning • Data that describes other data • Challenge to verify a human user • Data type with two possible values • Repeating a process, often in loops • Structured collection of information • Translates code into machine language • Security system that monitors traffic • ...
DIGITALIZATION TECHNOLOGY 2025-10-07
Across
- - device that combines phone and computer functions.
- - structured collection of digital information.
- - AI program that automatically answers user questions.
- - digital assistant like Alexa, Siri, or ChatGPT.
- - online journal or website where information is posted regularly.
- - secret code used to protect accounts.
- - global network that connects computers and devices.
- - ability to use technology effectively.
- CODE - barcode that links to websites or resources when scanned.
- - meeting held using video or audio technology.
- - method of securing digital information.
- - to send data or files to the internet.
- - small technological device or tool.
- SECURITY - protection of data and systems from online threats.
Down
- - using technology to perform tasks without human help.
- - classroom enhanced with digital tools and devices.
- - storing and processing data on remote servers.
- - combination of text, sound, and video for learning.
- CITIZENSHIP - responsible behavior when using technology.
- - online storage system for saving and accessing files anywhere.
- - to save files from the internet to your device.
- - screen used to display digital content.
- - digital slides created to explain a topic.
- - website used to find information online.
- - online place to download educational applications.
25 Clues: - small technological device or tool. • - secret code used to protect accounts. • - ability to use technology effectively. • - to send data or files to the internet. • - screen used to display digital content. • - method of securing digital information. • - website used to find information online. • - digital slides created to explain a topic. • ...
Cyber bullying 2024-12-03
Across
- why do people cyber bully
- sending, posting,or sharing negative, harmful, false,or mean content about someone
- How to solve cyber bullying
- should you ignore a bully
Down
- how can bullying be stopped
- how many types of bullying are there
- who are most likely to be affected by cyber bullying
- what do you do when your kid is being bullied
- do bullies feel better about themselves when they bully someone
- How does cyber bullying start
10 Clues: why do people cyber bully • should you ignore a bully • how can bullying be stopped • How to solve cyber bullying • How does cyber bullying start • how many types of bullying are there • what do you do when your kid is being bullied • who are most likely to be affected by cyber bullying • do bullies feel better about themselves when they bully someone • ...
Preventive Technology 2023-06-02
Across
- Secret combination of characters used to authenticate a user's identity.
- Process of converting data into a code to prevent unauthorized access.
- Self-replicating program that infects computer systems and can cause harm.
- Malicious software designed to damage or gain unauthorized access to a computer system.
- Deliberate and malicious attempt to compromise a computer system or network.
- Software update designed to fix vulnerabilities or bugs in a program.
- Security system that monitors and controls incoming and outgoing network traffic.
- Process of verifying the identity of a user or device accessing a system.
Down
- Cyber attack where individuals are tricked into revealing sensitive information through deceptive emails or websites.
- Weakness or flaw in a system that can be exploited by attackers.
- breach: Unauthorized access or exposure of sensitive or confidential information.
- Unauthorized access or breach of a computer system or network.
12 Clues: Unauthorized access or breach of a computer system or network. • Weakness or flaw in a system that can be exploited by attackers. • Software update designed to fix vulnerabilities or bugs in a program. • Process of converting data into a code to prevent unauthorized access. • Secret combination of characters used to authenticate a user's identity. • ...
Crossword Jan 2024 2024-01-24
Across
- GTRI's suggested approach for controlled testing of crypto-related products and services
- Crucial strategy to be extended to products for combatting cyber threats
- What is scrutinized to identify potential Deepfakes?
- The technology that is foundational to the creation of Deepfakes
- A key focus for authentication in the fintech and banking sectors
Down
- The percentage of UPI transactions that gets stuck at the pending status, according to Razorpay POS
- What is the internal innovation program at Cognizant that the Innovation Assistant augments?
- AI Trust, Risk, and Security Management stands for
- Which technology is anticipated to gain traction for secure and convenient authentication?
- Google Pay and ___ signed an MoU to expand UPI to countries beyond India
- Regulatory directive set to be enacted in the European Union by the end of 2024
- The new feature Razorpay POS has introduced for failed UPI transactions
12 Clues: AI Trust, Risk, and Security Management stands for • What is scrutinized to identify potential Deepfakes? • The technology that is foundational to the creation of Deepfakes • A key focus for authentication in the fintech and banking sectors • The new feature Razorpay POS has introduced for failed UPI transactions • ...
Digital citizenship 2018-01-30
Across
- OHMYGOD I CAN'T WAIT FOR CYBER MONDAY, BECAUSE I'M GOING SHOPPING!!!! YAAASSS!!!
- What is electronic responsibility for actions and deeds?
- an attempt to trick someone, usually with the intention of stealing money or private information
- electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself
- This practice helps keep you safe in the digital world.
- What is being able to use technology appropriately, responsibly, and abundantly?
- The number of Elements to be an effective Digital Citizen
- Posting too many things on social media
Down
- Literally: Facebook
- Looking out for those who do not have this is the first responsibility of a Digital Citizen
- communication including television, radio, and newspapers, that often
- a type of crime in which your private information is stolen and used for criminal activity
- Mind your Digital Table manners
- "With great power comes great _________________."
- someone who sees cyberbullying but does nothing to help
15 Clues: Literally: Facebook • Mind your Digital Table manners • Posting too many things on social media • "With great power comes great _________________." • someone who sees cyberbullying but does nothing to help • This practice helps keep you safe in the digital world. • What is electronic responsibility for actions and deeds? • ...
LMS&NM 2023 Crossword 2023-12-06
Across
- Well attended program added to the New Measures portfolio (HINT ed8)
- Kym Myall drives one as a hobby (HINT ed2)
- What does the ‘T’ stand for in DT&A
- Which month does Commissioner Jordan AO retire?
- The GPFS team undertook detailed analysis of what patterns (HINT ed8)
- Word meaning the legal right of using and enjoying the fruits or profits of something belonging to another
Down
- Who joined the Insights team in November? (HINT 2 words ed8)
- Game developed to demonstrate unscrupulous infiltration? (HINT 2 words)
- It is ? Indigenous Australian cultural awareness training is completed by 31 December
- Book Deborah Robinson enjoyed reading? (HINT 2 words ed5)
- 4 letter term that you would use to describe a LMS and NM staff member as having? [Hint – Oxford University Dictionary word of the year for 2023].
- 5 letter term for a volumetric pixel?
- Cyber Security Awareness awareness month was?
13 Clues: What does the ‘T’ stand for in DT&A • 5 letter term for a volumetric pixel? • Kym Myall drives one as a hobby (HINT ed2) • Cyber Security Awareness awareness month was? • Which month does Commissioner Jordan AO retire? • Book Deborah Robinson enjoyed reading? (HINT 2 words ed5) • Who joined the Insights team in November? (HINT 2 words ed8) • ...
i 2025-06-07
Across
- an act of sending an email to a user misleading him to belive that it is a trusted source and asking money online
- the person who do cybercrime
- any criminal activty intended to harm a computer using internet
- a program desinged to prevent and romve viruses
- a person who do hacking
- a program that disrupts the normal functioning of a computer
- a software that helps in unauthorised access to our computer
Down
- footprint is an impression you create when you engage in various online activites
- an illegal entry into a compute system or network
- grooming process of befriending a child on social media to facilatate onle or physical sexual abuse
- security a collection of technologies, processes , and practices designed to protect networks ,computer , program and data from attacks
- theft an act of stealing and misusing someone's personal information
- bulling an act of harming anyone online
- terrorism is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
- frauds illegal method to get money of a bank by using technology
15 Clues: a person who do hacking • the person who do cybercrime • bulling an act of harming anyone online • a program desinged to prevent and romve viruses • an illegal entry into a compute system or network • a program that disrupts the normal functioning of a computer • a software that helps in unauthorised access to our computer • ...
coding 2021-08-29
Across
- - the information of a particular person that exists on the internet. _______ _________
- numbers- system, a method of mathematical expression that uses only two symbols: typically "0" and "1". ______ _______
- technologies are electronic tools, systems, devices and resources that generate, store or process data. _______ ___________
- the process of converting information or
- is an interpreted, object-oriented, high-level programming language with dynamic semantics. ______
- a pocket-sized computer that introduces you to how software and hardware work together. ________
- tools, machinery, and other durable equipment. ________
- into a code __________
- communication system is a system which describes the information exchange between two points. _____________ ______
Down
- is a building dedicated to space within the building. ____ _______
- is a unit of information ____
- a process of set rules to be followed by calculations _________
- is a web-based environment for learning to code with physical computing devices ________
- is a method used that is similar to an algorithm _________
- is instructions that tell a computer what to do ________
- a global computer network providing a variety of information and communication facilities ________
- security is the application of technologies, processes and controls to protect systems _____ ________
17 Clues: into a code __________ • is a unit of information ____ • the process of converting information or • tools, machinery, and other durable equipment. ________ • is instructions that tell a computer what to do ________ • is a method used that is similar to an algorithm _________ • a process of set rules to be followed by calculations _________ • ...
Unsecured accounts 2025-11-12
Online Safety 2023-10-11
Cyber Security by Candela Azpiri 2020-08-20
Across
- tipo de dispositivo electrónico
- informacion que no debe ser publica
- sistema para evitar entrar usuarios a redes privadas
- archivos de sitios web que guardan tus datos
Down
- programas informáticos que arruinan tu dispositivo
- manera de comunicarte con personas
- forma de usar redes, apps y el dispositivo electronico.
- persona que arruina paginas web y roba datos
- software que consigue informacion discretamente sin permiso del usuario
- publicidades o anuncios de productos no deseados
10 Clues: tipo de dispositivo electrónico • manera de comunicarte con personas • informacion que no debe ser publica • persona que arruina paginas web y roba datos • archivos de sitios web que guardan tus datos • publicidades o anuncios de productos no deseados • programas informáticos que arruinan tu dispositivo • sistema para evitar entrar usuarios a redes privadas • ...
NL Government Cyber Security Crossword 2017-07-25
Across
- This type of "wall" protects your computer from damaging viruses
- A powerful machine for storing and processing data
- If you _ _ _ _ _ _ _ _ files from untrusted sources it could be unsafe
- You should be aware of what you're doing online when at work and at _ _ _ _
Down
- When creating new accounts you should use a very strong _ _ _ _ _ _ _ _
- Visiting unsafe websites could result in giving your computer a _ _ _ _ _
- A useful way to electronically send mail
- Fake emails that are meant to entice people to reveal important information
- The _ _ _ _ _ _ _ _ is a vast but dangerous database where you must always be protected
- Software that is intended to damage or disable computers or computer systems
10 Clues: A useful way to electronically send mail • A powerful machine for storing and processing data • This type of "wall" protects your computer from damaging viruses • If you _ _ _ _ _ _ _ _ files from untrusted sources it could be unsafe • When creating new accounts you should use a very strong _ _ _ _ _ _ _ _ • ...
Merry Christmas 2016 2016-12-12
Across
- Esther's school grade.
- What Dan will be called next year.
- First bugle call heard daily.
- Who sang a solo as a cow.
- Promotion Brent received in 2016.
- What we live in on post.
- Andrea's favorite name.
- New Revelations College Ministries.
- State we live in now.
- Retreat lowers this.
- One working on a Bachelor's at Liberty U.
- Trespassers on Fort Polk.
- ___ has people for that.
- Fort where we live.
- Andrea's work at Western Seminary.
- Where we lived until June 2016.
Down
- We eat lots of them this time of year.
- Hopeful number of grandchildren for Ted and Andrea next year.
- One studying cyber security at George Washington School of Business.
- For a year of good health and ministy.
- Busy most of the time.
- Naomi's current condition.
- Course Danielle will study next year.
- Esther's name for Ted.
- Fires mornings and evenings.
- What God has in store.
- One who is moving to Baton Rouge.
- Where the heart is.
- Gwen's School grade.
- Peppermint is her nick name (Peanuts).
- Activity for trail around golf course.
31 Clues: Where the heart is. • Fort where we live. • Retreat lowers this. • Gwen's School grade. • State we live in now. • Esther's school grade. • Busy most of the time. • Esther's name for Ted. • What God has in store. • Andrea's favorite name. • What we live in on post. • ___ has people for that. • Who sang a solo as a cow. • Trespassers on Fort Polk. • Naomi's current condition. • ...
NATO’s Defense Policy on Modern Threats 2024-04-24
Across
- A cooperative relationship between countries for mutual defense.
- The state of being free from danger or threat.
- A set of principles or guidelines governing decision-making.
- Violent acts aimed at creating fear for political or ideological goals.
- The capacity to adjust or change in response to new circumstances.
- An international military alliance formed in 1949.
- A source of danger or harm.
- Measures taken to protect against attack or danger.
- Actions taken to prevent or respond to terrorist activities.
- The ability or capacity to perform a particular task or function.
- The introduction of new methods, ideas, or products.
Down
- The quality of being firm, steadfast, or unchanging.
- Pertaining to activities carried out in the digital domain.
- The ability to recover quickly from difficulties.
- A plan or approach devised to achieve specific goals in defense.
- Information gathered and analyzed to inform decision-making.
- The action of discouraging an adversary from aggression through the threat of retaliation.
- The application of scientific knowledge for practical purposes in defense.
- A defensive system designed to intercept and destroy incoming missiles.
- Working together towards a common goal, especially in defense.
20 Clues: A source of danger or harm. • The state of being free from danger or threat. • The ability to recover quickly from difficulties. • An international military alliance formed in 1949. • Measures taken to protect against attack or danger. • The quality of being firm, steadfast, or unchanging. • The introduction of new methods, ideas, or products. • ...
Synergic Puzzle 2022-05-15
Across
- A cyber worm attacked Iranian nuclear facilities
- Reducing the amount of carbon compounds in British English
- An abbreviation for LNG storage and supply ship
- The country which has the largest nuclear power plant in the world
- An emission trading scheme that allows emitting greenhouse gases via an exchange (hint: 3 words)
- An organization that is at the heart of global dialogue on energy
- A gas warms the climate 25 times more than an equivalent amount of CO2
- Recently become synonymous with energy security
- A fundamental element of battery resource for electric vehicles and energy storage.
Down
- Nearly every state uses that facility to produce electricity
- The first solar-powered spacecraft
- The European country approved rules to cap natural gas prices
- Avoiding and eliminating energy waste
- A term which is changed from "phaseout coal" by India's demand
- A unit of crude oil volume
- Tanker name at risk of spilling oil into the Red Sea
- The company which rules the Yamal pipeline
- The period in which generating unit and transmission line are inactive.
- Fuel that produces the most amount of CO2
- One of the most important parts of natural gas transmission
20 Clues: A unit of crude oil volume • The first solar-powered spacecraft • Avoiding and eliminating energy waste • Fuel that produces the most amount of CO2 • The company which rules the Yamal pipeline • An abbreviation for LNG storage and supply ship • Recently become synonymous with energy security • A cyber worm attacked Iranian nuclear facilities • ...
On Line Safety 2014-11-19
Across
- only be facebook friends with people you ....
- the settings you need to use to protect your facebook account
- when you write on your facebook page
- if parents agree to something then they give you this
- what you can do to people you don't want to be friends with on facebook
- people you know well
- a word or number to protect your information
- facebook is an example of social .....
- you should be very ....... on line
- people need to make sure they are .... online
- to take something off facebook you can do this
- if you receive something inappropriate you should .... an adult
Down
- the minimum age you need to be to have a facebook account
- the type of bullying that is done online
- the letters used for the world wide web
- how much facebook costs to join
- eg. drawing or photo
- type of information that could include your name or address
- when you send a private post to a friend you can do it through these
- these are cute little faces you can use on facebook
- when you post anything to facebook it stays there .......
- grown up person
22 Clues: grown up person • eg. drawing or photo • people you know well • how much facebook costs to join • you should be very ....... on line • when you write on your facebook page • facebook is an example of social ..... • the letters used for the world wide web • the type of bullying that is done online • a word or number to protect your information • ...
Geopolitics and International Relations 2025-03-15
Across
- – Protection from threats to ensure stability and safety.
- – Agreements between states or groups for mutual benefit and support.
- – The management of international relations through negotiation and dialogue.
- – A global order where multiple states or entities share significant power.
- – The ability to influence or control people, events, or resources.
- – Purchasing goods or services from foreign markets.
- – Selling goods or services to foreign markets.
- – Allocating resources to generate future returns.
- – Potential losses or negative outcomes in decision-making.
Down
- – Expanding investments or operations to reduce risk.
- – Legally recognized business entities separate from their owners.
- Warfare – The use of digital attacks to disrupt or damage a nation's systems or infrastructure.
- – Moving business operations to another country for cost efficiency.
- – Mutual reliance between entities, often in economic or political contexts.
- – The process of coming into existence or prominence.
- – A political approach emphasizing the concerns of ordinary people against elites.
- – Established organizations or systems governing political, social, or economic activities.
- – A business model where a company grants rights to operate under its brand.
- – The use of violence or threats to create fear for political or ideological aims.
- – The exchange of goods and services between parties or nations.
20 Clues: – Selling goods or services to foreign markets. • – Allocating resources to generate future returns. • – Purchasing goods or services from foreign markets. • – Expanding investments or operations to reduce risk. • – The process of coming into existence or prominence. • – Protection from threats to ensure stability and safety. • ...
Cyber 2024-10-19
Across
- This term refers to the technology that limits where an app can function by tracking the mobile device's location.
- The process of integrating secure development best practices and methodologies into application software development and deployment using the agile model.
- A suite of software designed to protect against multiple types of malware.
- Software that examines a computer for file-based virus infections and monitors activity like scanning new documents for viruses.
- A system that supports the creation, editing, and modification of digital content by multiple employees
Down
- A part of the internet where security professionals look for signs that critical information is being sought or sold.
- This system is used to manage industrial control systems (ICSs).
- The process of identifying the geographical location of a mobile device.
- A "container" where an application can run without affecting the underlying operating system.
- The process of bypassing installation limitations on smartphones to download apps from unofficial sources.
- A technology that uses servers to deliver applications, data, and entire operating systems to mobile devices via an app or web browser.
- is a group or class of software to management interface for mobile devices as well as computer devices
12 Clues: This system is used to manage industrial control systems (ICSs). • The process of identifying the geographical location of a mobile device. • A suite of software designed to protect against multiple types of malware. • A "container" where an application can run without affecting the underlying operating system. • ...
cyber safety 2016-06-01
9 Clues: not open • not good • , blocks viruses • can block a virus • Makes devices sick • safety ,cyber smart • bullying,someone besmean • ups, something you should not press • informashon,you shouldnot show people
Unit 3 Cyber security crossword 2017-05-12
Across
- who uses others takes others scripts because they cant make their own
- Mr Scott
- This act assures that your data is kept safe to the correct standards
Down
- Someone who hacks into government files to cause disruption or damage
- Damage that was purposefully acted out
- A motivation that means the attacker is gaining money.
- Crime that has been preplanned
- someone who uses others takes others scripts because they cant make their own.
- Someone who hacks for a campaign
- Insures that the information is available to those who need to use it
10 Clues: Mr Scott • Crime that has been preplanned • Someone who hacks for a campaign • Damage that was purposefully acted out • A motivation that means the attacker is gaining money. • Someone who hacks into government files to cause disruption or damage • who uses others takes others scripts because they cant make their own • ...
"Hero Training" Crossword 2026-03-09
Across
- What you do to a mean player so they can't talk to you.
- The two numbers you multiply together to get a product.
- One of the T.H.I.N.K. rules for being helpful and nice.
- The smallest dot of color on a hero's computer screen.
- What you do to a number when you have groups of the same size.
- A tool or piece of equipment a hero uses for a mission.
- A hero uses this to protect their secret identity.
- The answer to a multiplication problem.
Down
- Every time you post online, you leave a digital one of these.
- The hand-held screen you use to play games or do schoolwork.
- A fake message that tries to "hook" you into giving a password.
- You should keep your address and phone number this.
- 3-Letter Villain who sent the "Trojan Gift" in Day 10.
- This word comes before safety and security.
- To protect or keep something from being hurt.
15 Clues: The answer to a multiplication problem. • This word comes before safety and security. • To protect or keep something from being hurt. • A hero uses this to protect their secret identity. • You should keep your address and phone number this. • The smallest dot of color on a hero's computer screen. • 3-Letter Villain who sent the "Trojan Gift" in Day 10. • ...
What am I? AUI edition 2025-07-12
18 Clues: Lift • Cyber • Luigi • Chess • Ghandi • Square • stairs • MAWAZINE • épicerie • broadway • Mr propre • The Earth • Near proxy • Lost&Found • Money talks • Walter White • Grey's Anatomy • Les cours du soir
test 2022-09-16
Cyber monday 2024-11-28
9 Clues: CUSTOMER OPINION • IDENTIFIES ITEMS • LINE FOR CHECKOUT • CYBER MONDAY IS ONE • USED TO RATE PRODUCTS • WHEN SALES BEGIN SOONER • DAY BEFORE CYBER MONDAY • WHEN SALES EXTEND LONGER • A FAVORITE SHOPPING COLOR
Cyber 2025-11-05
Across
- – A notification that warns a user or system of a security issue or important event.
- – A temporary storage of data in memory or a browser to speed up access.
- – Refers to something on the device itself or within a local network.
- – A malicious program that infects devices, replicates itself, and can damage data.
- – A security code used to verify identity or grant access to a system.
- – The process of accessing an account or system using a username and password.
Down
- – An update or fix for software to close security vulnerabilities or repair issues.
- – The smallest unit of a digital image or screen, representing a single point of color.
- – The act of forwarding data or messages from one point to another in a network.
- – An action recorded in the system, such as a login, setting change, or network activity.
- – A system administrator with full control over devices, users, or networks.
- – A command-line interface in an operating system used to execute commands and programs.
12 Clues: – Refers to something on the device itself or within a local network. • – A security code used to verify identity or grant access to a system. • – A temporary storage of data in memory or a browser to speed up access. • – A system administrator with full control over devices, users, or networks. • ...
Merry Christmas 2016 2016-12-12
Across
- Busy most of the time.
- What Dan will be called next year.
- One working on a Bachelor's at Liberty U.
- First bugle call heard daily.
- Course Danielle will study next year.
- Where the heart is.
- State we live in now.
- Promotion Brent received in 2016.
- Retreat lowers this.
- What we live in on post.
- Trespassers on Fort Polk.
- Hopeful number of grandchildren for Ted and Andrea next year.
- Peppermint is her nick name (Peanuts).
- Activity for trail around golf course.
- One studying cyber security at George Washington School of Business.
- Andrea's favorite name.
Down
- Fires mornings and evenings.
- Where we lived until June 2016.
- What God has in store.
- Who sang a solo as a cow.
- Naomi's current condition.
- We eat lots of them this time of year.
- One who is moving to Baton Rouge.
- For a year of good health and ministy.
- Gwen's School grade.
- Andrea's work at Western Seminary.
- Esther's name for Ted.
- ___ has people for that.
- Fort where we live.
- Esther's school grade.
- New Revelations College Ministries.
31 Clues: Where the heart is. • Fort where we live. • Gwen's School grade. • Retreat lowers this. • State we live in now. • Busy most of the time. • What God has in store. • Esther's name for Ted. • Esther's school grade. • Andrea's favorite name. • What we live in on post. • ___ has people for that. • Who sang a solo as a cow. • Trespassers on Fort Polk. • Naomi's current condition. • ...
SAs Are Better 2023-12-12
Across
- Loves Azzip
- Involved in intervarsity
- Has a fruit in their last name
- Is the only OE SA
- Played football in high school
- Plays the guitar
- Is addicted to AMONGUS
- Has a British accent
- Likes board games
- Drives a Bronco
- Lives in the same hall as his brother
- Loves to bowl
- Has been in a class with a Blum SA for the last two quarters
- Is involved with cyber security club
- Huge Dodgers fan
- Has lived on the same floor his entire Rose Career
- Tore his ACL
- Has a farm
Down
- On the swim team
- On the ultimate frisbee club team
- Class president for '26
- Really into DND
- Originally from Oregon
- Originally from Taiwan
- Loves one-piece
- He is in EWB
- Is in APO
- Spent the whole summer doing marching band
- Does pole-vaulting for track
- Huge Chiefs fan
- Is in love with sharks
- Is the service chair for RHA
- She lived in Percopo freshman year
- Gives haircuts on campus
- Is the pickiest eater in residence life
- Originally from Minnesota
36 Clues: Is in APO • Has a farm • Loves Azzip • He is in EWB • Tore his ACL • Loves to bowl • Really into DND • Loves one-piece • Drives a Bronco • Huge Chiefs fan • On the swim team • Plays the guitar • Huge Dodgers fan • Is the only OE SA • Likes board games • Has a British accent • Originally from Oregon • Is addicted to AMONGUS • Originally from Taiwan • Is in love with sharks • Class president for '26 • ...
CyberSecurity Words 2023-09-07
Across
- tells other servers which servers are allowed to send emails using your business’s domain name
- protection from data theft
- a data copy of files
- an text encryption used to protect data
- email authentication technology to help prevent phishing emails
- getting email that asks that they have your data
- a way of stealing data usually by emails or phone calls
- the service you choose should include TLS, which will help to protect your customers’ privacy.
- puts a digital signature on outgoing mail
- Accessing that another device safely
- People who help you with technological issues.
Down
- Something which can be exploited by hackers
- that automatically download malicious software onto your computer.
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
- Someone else using your identity
- a file or code that infects or steal data
- a new version of data of the system
- Usually comes from malware in the system
- the process or action of verifying the identity of a user or process.
- Information that was stolen
20 Clues: a data copy of files • protection from data theft • Information that was stolen • Someone else using your identity • a new version of data of the system • Accessing that another device safely • an text encryption used to protect data • Usually comes from malware in the system • a file or code that infects or steal data • puts a digital signature on outgoing mail • ...
Tech Trails: The Ultimate IT Crossword 2025-07-30
Across
- A control structure used for repeating a block of code.
- The smallest unit of data in computing.
- An open-source operating system kernel.
- A small, fast memory located close to the CPU.
- Software designed to disrupt or damage a computer system.
- A cyber-attack that tricks users into giving up sensitive information.
- Address A unique string identifying each device on a network.
- The standard markup language for creating web pages.
- A device that forwards data packets between networks.
- A language used to communicate with and manage databases.
- Storing and accessing data over the internet instead of a local drive.
Down
- A program that converts source code into executable code.
- A widely-used, class-based, object-oriented programming language.
- A network security system that monitors and controls incoming and outgoing traffic.
- An error in a program that prevents it from running correctly.
- The blinking indicator showing where the next character will appear on the screen.
- A type of computer memory that is volatile and temporary.
- The smallest unit of a digital image or display.
- A high-level programming language known for its simplicity.
- A version control system used for tracking changes in source code.
20 Clues: The smallest unit of data in computing. • An open-source operating system kernel. • A small, fast memory located close to the CPU. • The smallest unit of a digital image or display. • The standard markup language for creating web pages. • A device that forwards data packets between networks. • A control structure used for repeating a block of code. • ...
DIGITALIZATION TECHNOLOGY 2025-10-07
Across
- - device that combines phone and computer functions.
- - structured collection of digital information.
- - AI program that automatically answers user questions.
- - digital assistant like Alexa, Siri, or ChatGPT.
- - online journal or website where information is posted regularly.
- - secret code used to protect accounts.
- - global network that connects computers and devices.
- - ability to use technology effectively.
- CODE - barcode that links to websites or resources when scanned.
- - meeting held using video or audio technology.
- - method of securing digital information.
- - to send data or files to the internet.
- - small technological device or tool.
- SECURITY - protection of data and systems from online threats.
Down
- - using technology to perform tasks without human help.
- - classroom enhanced with digital tools and devices.
- - storing and processing data on remote servers.
- - combination of text, sound, and video for learning.
- CITIZENSHIP - responsible behavior when using technology.
- - online storage system for saving and accessing files anywhere.
- - to save files from the internet to your device.
- - screen used to display digital content.
- - digital slides created to explain a topic.
- - website used to find information online.
- - online place to download educational applications.
25 Clues: - small technological device or tool. • - secret code used to protect accounts. • - ability to use technology effectively. • - to send data or files to the internet. • - screen used to display digital content. • - method of securing digital information. • - website used to find information online. • - digital slides created to explain a topic. • ...
Sophomore Year! 2023-08-13
Across
- What is your classification this year?
- You need to set the above and have high (blank)
- You will have to really pay attention in these.
- At least you won't be this on campus because it isn't your first year
Down
- This year you will get to take more of these that will get you ahead for college
- You will hopefully get this this year in April
- We can't believe you will turn this age this year
- This year you will need to schedule your PRE (blank)
- Don't worry. Some things will stay the same. You will still cheer on this team on Sundays
- What school are you thinking of studying cyber security?
- This year you will get behind the wheel of your very own
- School Which campus will you be on this year?
12 Clues: What is your classification this year? • You will hopefully get this this year in April • School Which campus will you be on this year? • You need to set the above and have high (blank) • You will have to really pay attention in these. • We can't believe you will turn this age this year • This year you will need to schedule your PRE (blank) • ...
GX Duel Links Characters 2023-04-04
Across
- Summons Elemental HERO Flame Wingman & Elemental HERO Neos
- Summons Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
- Summons Ancient Gear Golem
- Summons Armed Dragon LV7 & Ojama King
- Summons Destiny HERO - Plasma
- Summons Cyber Blader
- Summons Rainbow Dragon
- Summons Super Vehicroid Jumbo Drill
- Summons Fossil Warrior Skull King
- Summons Ultimate Tyranno
Down
- Summons Evil HERO Malicious Fiend
- Summons Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
- Summons Volcanic Doomfire
- Summons Water Dragon
- 1st Year Slifer Red with a crush on Jaden
- Summons Cyber End Dragon
- Summons Arcana Force EX - The Light Ruler
17 Clues: Summons Water Dragon • Summons Cyber Blader • Summons Rainbow Dragon • Summons Cyber End Dragon • Summons Ultimate Tyranno • Summons Volcanic Doomfire • Summons Ancient Gear Golem • Summons Destiny HERO - Plasma • Summons Evil HERO Malicious Fiend • Summons Fossil Warrior Skull King • Summons Super Vehicroid Jumbo Drill • Summons Armed Dragon LV7 & Ojama King • ...
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
Cyber-bullying 2013-09-25
Across
- / ______ your emotions
- ________-based coping strategies are generally more effective in dealing with cyber-bullying
- When someone pretends to be someone else and sends or posts material to make you look bad or place you in danger
- / Alter your __________
Down
- / When being cyber-bullied, you can always ______ the bully to trusted adults, friends and family.
- To bully online by sending or posting mean messages, usually anonymously
- / When someone repeatedly sends offensive messages to you
- / One of the detrimental impacts cyber-bullying has is _______________
8 Clues: / ______ your emotions • / Alter your __________ • / When someone repeatedly sends offensive messages to you • / One of the detrimental impacts cyber-bullying has is _______________ • To bully online by sending or posting mean messages, usually anonymously • ________-based coping strategies are generally more effective in dealing with cyber-bullying • ...
ICT Safety and security 2022-06-23
Across
- A computer expert who does the act of hacking
- Computer system that prevents unauthorized access to a network
- Never save your password on a
- Method by which information is converted into secret code that hides the information's true meaning
Down
- Protection of computer systems from unauthorised access, theft or harm
5 Clues: Never save your password on a • A computer expert who does the act of hacking • Computer system that prevents unauthorized access to a network • Protection of computer systems from unauthorised access, theft or harm • Method by which information is converted into secret code that hides the information's true meaning
RL4 U4 Station2 2023-03-11
15 Clues: seit • Konto • teilen • Anfrage • Neuheit • modisch • veraltet • abonnieren • Bildschirm • away sofort • trendsetzend • beeinflussen • Cyber-Mobbing • sich vorstellen • sich verständigen
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- Protocol that is meant for uploading and downloading files.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- The process by which two information systems establish a communication channel.
- A bundle of programs that is designed to bombard users with advertisements.
- A firewall setting that separates LAN of an organization from the external network.
- A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A computer program that keeps a log of your keystrokes on your keyboard.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- a cyber attack intended to redirect a website's traffic to another, fake site.
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- A bridge between two networks that connects using different protocols.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
2022 Stay Aware Event 2022-03-02
Across
- This practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- __________ and access management is a framework of policies and technologies used to ensure that the right users have the appropriate access to technology resources.
- Memorized secret consisting of a sequence of words or other text that a person uses to authenticate their identity and would be difficult for someone else to guess.
- Type of social engineering where scammers send text messages pretending to be from reputable companies to entice individuals to reveal personal information, such as passwords or credit card numbers.
- A virtual _______ _______ is an encrypted connection over the Internet from a device to a network.
- A term for additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
- A term for hackers that break into the network to steal information that would be used to harm the owner or the users without their consent and is completely illegal.
- An acronym for a centralized function/team at Lowe’s allowing people, processes, and technology to continuously monitor and improve the security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
- Shoulder ________ is a criminal practice using direct observation techniques, such as looking over someone's shoulder, to try to steal someone’s personal information.
- The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.
Down
- ____ ______ authentication is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are such as something they have (e.g., bank card), something they know (e.g., PIN number) and/or something they are (e.g., biometrics).
- A security violation where sensitive, protected, or confidential data is copied, viewed, stolen, or used by an unauthorized individual, and can cause great financial loss and other repercussions.
- Software that is secretly installed into an information system without the knowledge of the system user or owner.
- This aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A type of malicious code or software that looks legitimate but can take control of your computer and is designed to damage, disrupt, steal, or (in general) inflict some other harmful action on your data or network.
- __________ __________ baselines are standards for all systems in the network and enable Lowe’s to implement systems in an efficient and standardized manner.
- An unauthorized user who attempts to or gains access to an information system.
- Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.
- Refrain from inserting unknown or unidentifiable ___________ ______ into your Lowe’s devices unless you are an approved user.
20 Clues: An unauthorized user who attempts to or gains access to an information system. • Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email. • A malicious application or script that can be used to take advantage of a computer’s vulnerability. • ...
Security Analysts 2024-06-06
Across
- What do you get a bachelor's in to become a security analyst?
- What is the dress code like?
- who do security analysts work for?
- What does a security analyst do?
- What skills are needed?
- Should you give me a B in this class?
- How many years of prior experience do you need?
- How many new job openings are open every year?
Down
- What is the work environment like?
- What education level is required?
- Do security analysts plan and carry out security measures to protect a computer network?
- Should you give me a A in this class?
- What do security analysts mainly use to work?
- What is a hassle for a security analysts to obtain?
- Will I be extremely sad if you give me a B?
- Is this job important to protect a companies network?
- What do security analysts work in?
- What is the pay for a security analysts
- What rate is the security analysts job employment growing at?
19 Clues: What skills are needed? • What is the dress code like? • What does a security analyst do? • What education level is required? • What is the work environment like? • who do security analysts work for? • What do security analysts work in? • Should you give me a A in this class? • Should you give me a B in this class? • What is the pay for a security analysts • ...
Cyber monday 2024-11-28
9 Clues: CUSTOMER OPINION • IDENTIFIES ITEMS • LINE FOR CHECKOUT • CYBER MONDAY IS ONE • USED TO RATE PRODUCTS • WHEN SALES BEGIN SOONER • DAY BEFORE CYBER MONDAY • WHEN SALES EXTEND LONGER • A FAVORITE SHOPPING COLOR
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Fake news 2024-10-02
Across
- kind of hygiene that individuals and organizations use to maintain security resilience of systems, devices, networks, and data.
- kind of war conducted in order to gain informational advantage over the opponent
- the process of establishing the truth,accuracy of information.
Down
- a kind of thinking in which you question,analyse, interpret, evaluate and make a judgementnabout what you read, hear, say, or write.
- A thing that is not genuine, not true, made-up;
- the process of verifying facts
- Information about current event
7 Clues: the process of verifying facts • Information about current event • A thing that is not genuine, not true, made-up; • the process of establishing the truth,accuracy of information. • kind of war conducted in order to gain informational advantage over the opponent • ...
DAMPAK SOSIAL INFORMATIKA 2025-05-15
Across
- Perangkat keras (Hardware) yang berfungsi sebagai otak komputer disebut
- Media untuk menyampaikan informasi dalam bentuk suara atau bunyi disebut
- Jenis media sosial yang kontennya dapat diakses dan di edit dalam bentuk suara atau bunyi disebut
- Pengguna dapat berbagi informasi dalam bentuk teks, gambar, video, atau suara
- Jenis media sosial yang digunakan untuk penipuan atau mencuri identitas disebut
- Pengguna dapat menyampaikan pendapat dan saling berdiskusi secara padat dan jelas
- Berbasis internet yang memfasilitasi interaksi sosial dan memungkinkan penggunanya berinteraksi
- Pencuri informasi kartu kredit secara online disebut
Down
- Pencuri data dengan cara mengirimkan malware ke perangkat atau situs web disebut
- ITE Kejahatan cyber/cyber crime termasuk dalam perbuatan kriminal dan melanggar hukum
- Kejahatan apa yang merugikan setiap orang di dunia maya melalui komputer dan jaringan
- Adanya cyberbullying dan ujaran kebencian (hate speech) antarpengguna media sosial
- Contoh media audio visual yang merupakan gabungan dari media audio dan media visual
- Keamanan yang penggunaannya memerlukan kode unik untuk bisa masuk ke sebuah auun disebut
- Media sosial yang memudahan komunikasi antar penggunanya secara cepat adalah dampak?
- Perangkat lunak yang berfungsi dalam mengamankan data dan informasi disebut
- Media yang melibatkan indra penglihatan untuk menerima informasi disebut
17 Clues: Pencuri informasi kartu kredit secara online disebut • Perangkat keras (Hardware) yang berfungsi sebagai otak komputer disebut • Media untuk menyampaikan informasi dalam bentuk suara atau bunyi disebut • Media yang melibatkan indra penglihatan untuk menerima informasi disebut • Perangkat lunak yang berfungsi dalam mengamankan data dan informasi disebut • ...
Tech Terms 2024-11-14
Across
- A printed circuit board containing the components of a computer or other device,with connectore into witch other boards can be slotted.
- what is one input device
- Aunit of information equal
- A computer or system that provides resources, data, seriousness, or programs to together computers, know as clients, over a network.
- Hypertext markup Language
- The shortcut for copy and paste.
- The smallest part of a computer
- Portable document file
- a set of programs that helps a communications service provider monitor, control, analyze and manage a telephone or computer network.
- A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- Protects sensitive data from prying eyes by scrambling ordinary text into a form that is impossible to read without the proper decryption key
- Centeral Prosessing unit
- Any intrusive software developed by cyber-criminals to steal data and damage or destroy computers
- A collection of web sites and pages that people can acess through the internet.
- any information connected to a specific individual that can be used to ucover that individuals identity, such as their social security number.
- A system for connecting a number of computer systems to form a local area network.
- the phone book of the internet
- a cyber security solution that protects your computer or network from unwanted traffic.
- start or restart
- Example of search engine
Down
- The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a helmet with a screen inside or gloves fitted with sensors.
- A type of non-volatile memory used to store permanent data
- what is the difference between hardware and software.
- A physical Device made for storage
- Property A work or invention that is the result of creativity,such as a manuscription or a design.
- Data unit that is eight digits long.
- A language that the computer understands.
- The address of a web page.
- Small pieces of text sent to your browser by a website that you visit
- A transfer of a file from one computer to another
- the gulf between those who have ready acsess to computer and internet, and those who do not.
- A string of characters that identifies each computer.
- Random-access memory
- a unique string of characters that identifies each other
- A bunch of networks connected by many many switches and routers.
- Name something that a computer does
- what is a way to back up your work.
37 Clues: start or restart • Random-access memory • Portable document file • what is one input device • Centeral Prosessing unit • Example of search engine • Hypertext markup Language • Aunit of information equal • The address of a web page. • the phone book of the internet • The smallest part of a computer • The shortcut for copy and paste. • A physical Device made for storage • ...
Cybersafety Angela Awwad 2016-06-08
Across
- sending a message.
- to sign in to a device.
- on the Internet.
- opposite to in safe.
- Any Internet related illegal activity.
- safety being careful of what your doing on the Internet.
- unwanted emails.
- you don't know who your talking to until you press the button.
- like a cold for your device.
- someone looking at your personal details.
Down
- for cyber safety word search
- Internet service provider, company that gives you Internet.
- theft when someone pretends to be someone else.
- ask parent before doing something.
- software Software that parents use to keep an eye on the children's online activity.
- don't talk to strangers.
- a angry or negative message.
- someone who likes to cause trouble on online.
- when someone spying on you on the Internet.
- bullying someone's bullying you by sending you bad emails.
20 Clues: on the Internet. • unwanted emails. • sending a message. • opposite to in safe. • to sign in to a device. • don't talk to strangers. • for cyber safety word search • a angry or negative message. • like a cold for your device. • ask parent before doing something. • Any Internet related illegal activity. • someone looking at your personal details. • ...
Cybersecurity Principles Crossword Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
Advanced Cyber - Cyber Defense 2023-09-26
Across
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
- this is meant to shut down a machine or network, making it inaccessible to its intended users.
- An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
- an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
- a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.
- a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Down
- a newly established web site that encourages hacking in order to learn and protect against it.
- a large-scale cyber attack carried out by malware-infected devices which are controlled remotely.
- the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process or action of proving or showing something to be true, genuine, or valid.
- a person who uses computers to gain unauthorized access to data.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation
16 Clues: a person who uses computers to gain unauthorized access to data. • the process or action of proving or showing something to be true, genuine, or valid. • a newly established web site that encourages hacking in order to learn and protect against it. • this is meant to shut down a machine or network, making it inaccessible to its intended users. • ...
SFS 2 Vocal pt 2 2021-09-27
Across
- the year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
- any changes, erasures, or obliterations that may have occurred
- handwriting is difficult to disguise and forge
- similar to fingerprints, every person's handwriting is what it is
- agency that investigates forgery cases
- the examination and comparison of questioned documents with known material
- what was the first known case in which handwriting analysis played a role?
- when false documents or other items are copied for the purpose of deception
- a computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate
- the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation
- stores handwriting samples in databases
- also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
- writing over top to smear or make original writing unreadable
- directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
- any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute or uncertain
Down
- maximum prison term for forgery(federal felony)
- Dollar amount that is written in illegitimate checks every day
- chemically sensitive paper. large font size requires more ink and makes alterations more difficult. high resolution borders that are difficult to copy. multiple color patterns on paper. embed fibers that glow under different light. use chemical wash detection systems that change color when a check is altered
- any prewritten handwriting samples from a suspect(s)
- checks, employment records, legal agreements, licenses, wills
- portrait stands out and appears raised off the paper. contains clear red and blue fibers woven throughout the bill. has clear, distinct border edges. treasury seal is shown with clear, sharp saw-tooth points. watermark appears on the right side of the bill in the light. the security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it. there is minute printing on the security threads, as well as around the portrait. when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
- what are the overall height, width, and size of the letters?
- checks, certificates, wills, passports, licenses, money, letters, contracts, suicide notes, receipts, and even lottery tickets
- "learns" to recognize how a person signs; evaluates speed, pressure, and rhythm of the signatures; recognizes forgeries by the detection of even slight differences
- currency/paper money, traveler's checks, food vouchers/ WIC coupons, certain bonds, postage stamps
- good tool for including or excluding persons when determining a match
- forgery for material gain
- the making, altering, or falsifying of a persons signature or any other aspect of a document with the intent to deceive another
28 Clues: forgery for material gain • agency that investigates forgery cases • stores handwriting samples in databases • handwriting is difficult to disguise and forge • maximum prison term for forgery(federal felony) • any prewritten handwriting samples from a suspect(s) • what are the overall height, width, and size of the letters? • ...
CAT cross word 2024-10-09
Across
- Software that is available for use at no cost but may have restrictions on usage or distribution
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
- Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
- The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
- A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
- A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
- A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
- Processing Unit, the primary component of a computer that performs most of the processing tasks.
- A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
- (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
- A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
- A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
- Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
- Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Central Processing Unit, the primary component of a computer that performs most of the processing tasks
- Malicious software designed to harm or exploit any programmable device or network.
- Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
- Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
- Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
- A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
- A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
- Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
- Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.
26 Clues: Malicious software designed to harm or exploit any programmable device or network. • Software that is available for use at no cost but may have restrictions on usage or distribution • Processing Unit, the primary component of a computer that performs most of the processing tasks. • ...
Understanding the Value of Data 2025-09-26
Across
- Washington data classification for information that could cause significant harm if disclosed.
- Security method requiring more than one verification step.
- Network barrier that blocks unauthorized traffic.
- The right of individuals to control personal information about themselves.
- Manipulating people into revealing confidential information.
- Disguising communication to appear from a trusted source.
- The act of assigning a security category to information.
- Systematic review to ensure compliance with security rules.
- Washington data classification for information that could cause limited harm if disclosed.
- Common acronym for data such as Social Security numbers, addresses, and birth dates.
- Security principle ensuring data is accessible when needed.
- Data label meaning information should only be shared with authorized users.
- Software update that fixes bugs or security holes.
- A label for data requiring extra care to protect.
- Fraudulent attempt to obtain sensitive information, often by email.
Down
- Temporary digital code used for secure login.
- Process of converting information into a code to prevent unauthorized access.
- The person or office responsible for classifying and protecting information.
- A weakness that could be exploited in a system or process.
- A secret string of characters used for authentication.
- Security technique restricting who can view or use resources.
- Security principle ensuring information is only accessible to those with permission.
- Incident where unauthorized individuals gain access to protected data.
- Adhering to laws, regulations, and security policies.
- Security principle ensuring data is accurate and unaltered.
25 Clues: Temporary digital code used for secure login. • Network barrier that blocks unauthorized traffic. • A label for data requiring extra care to protect. • Software update that fixes bugs or security holes. • Adhering to laws, regulations, and security policies. • A secret string of characters used for authentication. • ...
Chapter 5 CEH Crossword Puzzle 2026-02-28
Across
- Tool driven vulnerability detection process
- Verification of user supplied data
- Cloud based vulnerability management platform
- Security testing from outside the network
- Observation without interacting with targets
- List of organizational systems and devices
- Process of determining threat impact level
- Network communication points exposed to access
- Assessment of database security risks
- System used to measure vulnerability severity
- Compromise occurring through external suppliers
- Software weakness exploitable by attackers
- Use of insecure cryptographic protection
- Standard identifier assigned to vulnerabilities
- Testing software for security weaknesses
- Timing issue caused by simultaneous operations
- Web server vulnerability scanning tool
- Device missing security updates
- Process of updating systems to fix vulnerabilities
- Factory settings that reduce system security
- Process of identifying and evaluating security weaknesses
- Automated search for known security flaws
- Scan performed using authorized access
- Examination focused on individual systems
- Approved configuration standard for systems
- Verification method confirming trusted software
- Arithmetic value exceeding storage limits
- Continuous observation for new threats
Down
- Memory overwrite caused by excessive input
- Consumption of system resources causing failure
- Detection of weaknesses in wireless networks
- Security testing within organizational network
- Human performed security testing
- Repository containing vulnerability information
- Execution of malicious library inside process
- Failure to release allocated system memory
- Classification system for software weaknesses
- Document describing discovered security risks
- Direct probing of systems to detect flaws
- Incorrect system or network settings creating risk
- Evaluation and prioritization of discovered weaknesses
- Open source vulnerability management scanner
- Confirmation that security fixes are effective
- Security exposure introduced by vendors
- Management of system error responses
- Actions taken to correct vulnerabilities
- Access attempt to invalid memory location
- Vulnerability scanning assessment tool
- Discovery of services ports and devices
49 Clues: Device missing security updates • Human performed security testing • Verification of user supplied data • Management of system error responses • Assessment of database security risks • Web server vulnerability scanning tool • Scan performed using authorized access • Vulnerability scanning assessment tool • Continuous observation for new threats • ...
Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
Espanol-Kieran 2023-03-02
15 Clues: never • i post • advice • photos • useful • change • consent • caution • Socials • comments • password • fake name • identity card • cyber bullying • make someone feel bad
Understanding the Value of Data 2025-09-26
Across
- Washington data classification for information that could cause significant harm if disclosed.
- Security method requiring more than one verification step.
- Network barrier that blocks unauthorized traffic.
- The right of individuals to control personal information about themselves.
- Manipulating people into revealing confidential information.
- Disguising communication to appear from a trusted source.
- The act of assigning a security category to information.
- Systematic review to ensure compliance with security rules.
- Washington data classification for information that could cause limited harm if disclosed.
- Common acronym for data such as Social Security numbers, addresses, and birth dates.
- Security principle ensuring data is accessible when needed.
- Data label meaning information should only be shared with authorized users.
- Software update that fixes bugs or security holes.
- A label for data requiring extra care to protect.
- Fraudulent attempt to obtain sensitive information, often by email.
Down
- Temporary digital code used for secure login.
- Process of converting information into a code to prevent unauthorized access.
- The person or office responsible for classifying and protecting information.
- A weakness that could be exploited in a system or process.
- A secret string of characters used for authentication.
- Security technique restricting who can view or use resources.
- Security principle ensuring information is only accessible to those with permission.
- Incident where unauthorized individuals gain access to protected data.
- Adhering to laws, regulations, and security policies.
- Security principle ensuring data is accurate and unaltered.
25 Clues: Temporary digital code used for secure login. • Network barrier that blocks unauthorized traffic. • A label for data requiring extra care to protect. • Software update that fixes bugs or security holes. • Adhering to laws, regulations, and security policies. • A secret string of characters used for authentication. • ...
Dm literacy 2021-11-03
20 Clues: bird • blue • like • ghost • Prank • device • upload • camera • Facebook • Subscribe • messaging • search up • send back • about you • short videos • Talking online • Show your company • What you look like • videos about ur life • bullying being mean online
Digital Privacy and Data Protection 2025-07-11
Across
- – shaxsiy
- – buzilish
- – saqlash
- – rozilik
- – akkaunt
- – platforma
- – onlayn
- – kirish (imkoniyat)
- – kuzatish
- – shaxsiyat
- – qonun
- – shifrlash
- – internet
Down
- – raqamli
- – himoya
- – xavfsizlik
- – parol
- – ma'lumot
- – texnologiya
- – nazorat
- – siyosat
- – maxfiylik
- – axborot
- – sezgir
- – nazorat
- – xavfsizlik
- – tartibga solish
- – foydalanuvchi
- – almashish
- – kiber
30 Clues: – parol • – kiber • – qonun • – himoya • – sezgir • – onlayn • – raqamli • – shaxsiy • – saqlash • – rozilik • – nazorat • – akkaunt • – siyosat • – axborot • – nazorat • – buzilish • – ma'lumot • – kuzatish • – internet • – platforma • – maxfiylik • – almashish • – shaxsiyat • – shifrlash • – xavfsizlik • – xavfsizlik • – texnologiya • – foydalanuvchi • – tartibga solish • – kirish (imkoniyat)
NEW WAYS OF WORKING AND COMMUNICATING 2026-03-30
20 Clues: nuage • réseau • accro à • logiciel • sans fil • piratage • appareil • améliorer • ingénieur • identifiant • fournisseur • les données • cyber citoyen • puce électronique • ordinateur portable • découverte capitale • interagir,collaborer • naviguer sur Internet • matériel informatique • technologie de l'information (informatique)
test for security awareness 2021-11-05
4 Clues: - This type of authentication • A way hackers try to get your login credentials • Using a strong ____ can help protect your account • Every October this event rusn to promote cyber security
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- a cyber attack intended to redirect a website's traffic to another, fake site.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
- A bundle of programs that is designed to bombard users with advertisements.
Down
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- The process by which two information systems establish a communication channel.
- A computer program that keeps a log of your keystrokes on your keyboard.
- Protocol that is meant for uploading and downloading files.
- A bridge between two networks that connects using different protocols.
- A firewall setting that separates LAN of an organization from the external network.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
CBS JAN-13-2025 2025-01-15
Across
- Who exploded a cyber truck
- What truck exploded
- What is people giving out for people in need
- What app is getting banned
- 44 people were found
- How many dozens of people are missing in california
- Whats happening in California
- What did the chinese man do to get the app banned
- Who was the person they wanted killed
- What police tried to arrest yuo
- What state has lots of snow
Down
- Who is trying to buy the app tik tok
- Who did the Korean Police try to arrest
- What is trump getting
- What is Crashing
- Whats burning in California
- What are people doing to help
- What is one of the states that if flying out planes full of water for California
- What is 85% of fires caused from
- What ends Facebook checking
20 Clues: What is Crashing • What truck exploded • 44 people were found • What is trump getting • Who exploded a cyber truck • What app is getting banned • Whats burning in California • What ends Facebook checking • What state has lots of snow • Whats happening in California • What are people doing to help • What police tried to arrest yuo • What is 85% of fires caused from • ...
The IT Christmas Crossword 2025-12-15
Across
- Where you might store the entire nice/naughty list.
- Where your data spends Christmas… not just snow.
- Removing errors… like sweeping up fallen pine needles from code.
- The hardworking machine delivering more than Christmas dinner.
- Unwanted messages—not the Christmas ham variety.
- Running many “elves” on one big machine.
- The digital chimney that lets applications talk to each other.
- Proving it’s really you and not the Grinch logging in.
- Step‑by‑step rules—like Santa’s process for checking his list twice.
Down
- The thing you wish you did before the holiday outage.
- A software fix you hope arrives more often than Christmas gifts.
- Turning it off and on again—the IT equivalent of festive magic.
- Digital mischief-makers worse than any Christmas prank.
- When cyber‑Grinches go fishing for your credentials.
- Scrambling data so only Santa with the right key can read it.
- A security barrier that keeps the naughty list out of your network.
- The reason video calls freeze during family catch‑ups.
- A small file websites store—less tasty than Santa’s prefered kind.
- The delay that feels like waiting for Christmas morning.
19 Clues: Running many “elves” on one big machine. • Where your data spends Christmas… not just snow. • Unwanted messages—not the Christmas ham variety. • Where you might store the entire nice/naughty list. • When cyber‑Grinches go fishing for your credentials. • The thing you wish you did before the holiday outage. • The reason video calls freeze during family catch‑ups. • ...
Cyber smart 2014-04-06
Across
- I know where you are
- steeeeeeaaaaaling stuff
- assistance
- stuff
- the group of people with the authority to govern a country or state
- people of a placeor country
- status that starts with R
- a very bad thing that is very bad
- something like a net that works
- digimon _________ monsters digimon
- a personal website with features to your preference
- a continent and country located on the southern hemisphere
Down
- on the line
- the first word in the title
- the interactions between humans and other living organisms
- the web
- your own stuff
- not legal
- a defense against something
- a unique character everyone has
- data, or content of something
- a very smart machine
- tools, techniques, machines used by humans and some animals
- prohibited content or _________
- texting with the naughty word at the start
- off the line
- problems and the stuff that blocks you in life
27 Clues: stuff • the web • not legal • assistance • on the line • off the line • your own stuff • I know where you are • a very smart machine • steeeeeeaaaaaling stuff • status that starts with R • the first word in the title • a defense against something • people of a placeor country • data, or content of something • a unique character everyone has • prohibited content or _________ • ...
Cyber quiz 2022-09-12
Across
- a cyber attacker who uses software and other methods to steal information
- An error, flaw, failure, or fault in a computer program.
- Programs that automatically execute tasks as ordered by the creator
- Cryptocurrency, a form of electronic cash
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Attaching a phone number or email address to an account for heightened security
- secret word or phrase that is used to access a computer system
- Confirmation of someone's identity using a password or fingerprint
- previously unknown, bug, flaw, or backdoor in software can lead to attacks and damage.
- allows you to create a secure connection to another network using the internet.
- programs and other operating systems used by a computer.
Down
- protecting computers, networks, programs, and data from unauthorized access
- taking advantage of human trust to gain access to private information
- An alternative way to access software typically unauthorized.
- The physical and tangible parts of a computer
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded they can piggybank onto programs to corrupt data or do other damage.
- Creating a fake identity on a social network account to target a specific victim
- Hacking that is meant to do minimal damage
- string of numbers used to identify each computer using the internet on a network.
- predate viruses and have infected systems since mainframes were the only computers in existence. capable of self-replication
20 Clues: Cryptocurrency, a form of electronic cash • Hacking that is meant to do minimal damage • The physical and tangible parts of a computer • An error, flaw, failure, or fault in a computer program. • programs and other operating systems used by a computer. • An alternative way to access software typically unauthorized. • ...
Cyber Definitions 2020-11-19
Across
- To crack one system and then use it as a “launching pad” for cracking other systems.
- An evaluation of events that can adversely affect operations and/or specific assets.
- A form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
- To convert (a message, information, etc.) into cipher.
- to confirm information or identity.
- The reduction of exposure to potential problems in business.
- The science of protecting information by transforming it into a secure format.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- Advertising supported software, is software that displays unwanted advertisements on your computer.
- (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection.
- Someone who creates a false online identity.
- Identity Verification means ensuring that identity data is associated with a particular individual, for example matching date of birth and address to an individual's name.
- A blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
- Intellectual property or source that is not provided to the public.
- A software for which the original source code is made freely available and may be redistributed and modified according to the requirement of the user.
- A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
- A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- A person who operates the command and control of botnets for remote process execution.
- Loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.
- Contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.
- Internet protocol address, it is an identifying number that is associated with a specific computer or computer network.
- Occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.
- Converts one value to another.
- Classified data is introduced to an unclassified computer system or a system authorized at a lower classification.
- An individual who controls and maintains a botnet by installing malicious software in many computers, placing these devices under his/her control.
- An individual or organization's cloud account is stolen or hijacked by an attacker.
- A group of hackers with varying backgrounds, that would test the assumption of an organization's digital presence and the blue team's threat response activity.
- A method or pathway used by a hacker to access or penetrate the target system.
- A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
- A type of malware that is designed so that they can remain hidden on your computer.
- Authenticates all users in a group at once.
- Someone who exploits computer systems or networks to identify security flaws and make improvement recommendations.
Down
- A manipulation technique that exploits human error to gain private information, access, or valuables.
- The process of safeguarding important information from corruption, compromise or loss.
- Criminals who break into computer networks with malicious intent.
- An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.
- A form of a security breach that occurs when an individual's or company's data is copied, transferred, or retrieved from a computer or server without authorization.
- A process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.
- A software application that runs automated tasks (scripts) over the Internet.
- A systematic examination of a task, job or process that you carry out at work for the purpose of; Identifying the significant hazards that are present.
- A cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
- A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- A sacrificial computer system that's intended to attract cyberattacks, like a decoy.
- Storing information over the internet instead of a computer’s hard drive.
- A type of malware that is often disguised as legitimate software.
- Is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
- all the ways you can be attacked
- A security device that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
- Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, steal credit card numbers, plant viruses, etc.).
- a set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- built for the act of keystroke logging, creating records of everything you type on a computer or mobile keyboard.
- A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
- A type of malicious code or software that looks legitimate but can take control of your computer.
- Conversion of data from a readable format into an encoded format that can only be read or processed after it's been decrypted.
- A cyber attack that uses disguised email as a weapon.
- A type of malware that spreads copies of itself from computer to computer.
- A collection of internet-connected devices infected by malware that allow hackers to control them.
- A process used to extract usable data from a larger set of any raw data.
- list of known unwanted companies or services that should be avoided.
- Sign that an attacker may be planning an attack.
- Cyberattack on a server, service, website, or network floods it with Internet traffic.
- A code that takes advantage of a software vulnerability or security flaw.
- saved to a hard drive in a different location, or spare of some sort.
64 Clues: Converts one value to another. • all the ways you can be attacked • to confirm information or identity. • Authenticates all users in a group at once. • Someone who creates a false online identity. • Sign that an attacker may be planning an attack. • A cyber attack that uses disguised email as a weapon. • To convert (a message, information, etc.) into cipher. • ...
Cyber Terms 2023-11-12
Across
- The software, or operating system, a device uses
- A program, such as Microsoft Edge, that is designed to display webpages
- Short for “application,” a computer program that performs specific tasks; also called a program
- An electronic device, operating under the control of instructions stored in its memory, that can accept data, process the data to produce information, and store the information for future use
- A holding area where your browser keeps a copy of each webpage you view. This temporary storage area helps speed up processing time
- The smallest unit of data a computer can process
- Business transactions that occur over an electronic network such as the Internet
- A pen-shaped digital tool for making selections and entering information on a touchscreen
- Raw facts, such as text or numbers
- An originator’s exclusive legal right to reproduce, publish, or sell intellectual property
- A freestanding booth usually placed in a public area that can contain a display device used to show information to the public or event attendees
- The moral principles that govern people’s behavior; many schools and other organizations post codes of conduct for computer use, which can help you make ethical decisions while using a computer
Down
- Data that has been processed to become meaningful
- The device itself and its components, such as wires, cases, switches, and electronic
- The programs and apps that instruct the computer to perform tasks. Software processes data into meaningful information
- A file created by a website that stores information on your computer, such as your website preferences
- A website that combines pages from many sources and provides access to those pages
- The science that combines engineering and technology to create and program robots. Robots are useful in situations where it is impractical, dangerous, or inconvenient to use a human
- A standardized procedure used by computers to exchange information
- A list of matched results from an Internet search
20 Clues: Raw facts, such as text or numbers • The software, or operating system, a device uses • The smallest unit of data a computer can process • Data that has been processed to become meaningful • A list of matched results from an Internet search • A standardized procedure used by computers to exchange information • ...
Cyber Ethics 2025-06-15
Across
- : Wireless internet connection.
- : Basic device that connects multiple computers.
- : Local Area Network.
- : Translates website names into IP addresses.
- : Amount of data transmitted in a given time.
- : A computer that provides data to other computers.
- : Unique ID for network devices.
- : A command to test connectivity.
- : Wide Area Network.
- : A set of rules for data communication.
- : The physical layout of a network.
Down
- : Wired networking technology.
- : Unique address for every device on a network.
- : Connects different networks.
- : Connects devices in a LAN.
- : Protects network from unauthorized access.
- : Device that forwards data packets between networks.
- : A computer that accesses data from a server.
- : A group of connected computers.
- : Connects your computer to the internet.
20 Clues: : Wide Area Network. • : Local Area Network. • : Connects devices in a LAN. • : Wired networking technology. • : Connects different networks. • : Wireless internet connection. • : Unique ID for network devices. • : A command to test connectivity. • : A group of connected computers. • : The physical layout of a network. • : A set of rules for data communication. • ...
Cyber ethics 2025-05-26
Across
- The right to keep your personal information safe online.
- Piracy: Using or distributing software illegally.
- Dossier: A collection of personal data stored about someone online.
- A unique identity used to log into digital accounts.
- Something that is not real or true online.
- Internet manners and polite behavior online.
- Legal right that protects original creations.
- Using digital platforms to harm or embarrass someone.
- A type of malware that spreads and damages systems.
- A trick to steal personal information through fake emails or messages.
- To prevent someone from contacting or viewing your content.
Down
- Copying someone’s work or ideas without giving credit.
- Unwanted and repeated messages or emails.
- A security barrier to block unauthorized access.
- A secret word used to gain access to a computer or account.
- Property: Creations of the mind protected by law, like inventions and art.
- Theft: Stealing someone’s personal data to act as them online.
- Harmful software like viruses, worms, or trojans.
- Accessing a computer system without permission.
- Rules that guide what is right or wrong.
20 Clues: Rules that guide what is right or wrong. • Unwanted and repeated messages or emails. • Something that is not real or true online. • Internet manners and polite behavior online. • Legal right that protects original creations. • Accessing a computer system without permission. • A security barrier to block unauthorized access. • ...
DIT 2022-12-19
Across
- the process of two or more people, entities or organizations working together to complete a task or achieve a goal
- an ethical security hacker that is employed to hack a system
- An insider threat is a malicious threat to an organization that comes from people within the organization
- a wireless network
- equal and open access to the web
- Cyber-attacks may be perpetrated on specific targets for stealing unique sensitive information from a rival business
Down
- a hacker that
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- somebody from the outside of a company who attempts to exploit system
- a device or program enabling a user to communicate with a computer
10 Clues: a hacker that • a wireless network • equal and open access to the web • an ethical security hacker that is employed to hack a system • a device or program enabling a user to communicate with a computer • somebody from the outside of a company who attempts to exploit system • ...
THE IMPACT OF AI 2025-10-10
Across
- The ongoing progress in building smarter AI, better software, and advanced digital tools.
- The digital fuel that AI systems learn from and make decisions with.
- The human skill that helps design innovative AI tools and solve new problems.
Down
- When humans and AI — or people around the world — work together through technology.
- The protection of computer systems and networks from hacking or cyber threats.
- Moral principles guiding how AI should be created and used responsibly.
- Finding fairness between technology’s benefits and the risks it brings.
- The right to keep users’ personal data safe from tracking or misuse by technology.
- A kind of thinking needed to question AI decisions and detect misinformation.
- Describes technology that processes information using computers or code.
10 Clues: The digital fuel that AI systems learn from and make decisions with. • Moral principles guiding how AI should be created and used responsibly. • Finding fairness between technology’s benefits and the risks it brings. • Describes technology that processes information using computers or code. • ...
Fraud 2026-01-26
Across
- A federal law that was signed into effect in October 2001 to strengthen national security.
- An investment fraud that works by paying existing investors with the funds that are collected from new investors.
- A fraud tactic where bad actors impersonate legitimate people/businesses via SMS/text message to trick unsuspecting victims into sharing personal information (passwords, PII, credit card numbers, etc.).
- Authentication methodology that requires users to provide multiple pieces of authentication evidence when logging into a system.
- Any unauthorized access or entry into a secured system or resource, whether intentional or unintentional, in which sensitive data is exposed or stolen.
- A fraud tactic where bad actors impersonate legitimate people/businesses via email to trick unsuspecting victims into sharing personal information (account number, phone number, password, credit card number, etc.).
- A fraudster steals another person's identity for personal gain.
- Malicious software that is used to infiltrate a computer system without the user's knowledge or permission.
- A cyber attack technique where an attacker impersonates another user or computer system in a network or a communications system.
- involves concealing the origin of funds acquired through illegal or criminal activity by attributing them to a seemingly legitimate source via layered transfers.
- A process that requires businesses to verify the identity of a customer before doing business with them.
- Illegally taking money entrusted to an individual or organization for personal use.
- A specialized team of investigators that investigate complex or sensitive matters.
- A form of fraud where people create false identities online, often with the intent to deceive others.
Down
- Any data which can be used to identify an individual. It includes sensitive information such as name, address, Social Security Number, driver’s license information, financial data, usernames and passwords, healthcare information and more.
- The practice of ensuring the safety of confidential information and assets, as well as the security of mobile devices and networks, when accessing the internet or connecting to networks through mobile devices.
- A fraudster impersonates a legitimate party and reaches out to a target through an everyday social interaction.
- a type of fraud that occurs when an attacker gains access to and takes control of an account that belongs to another person.
- Malicious software that is used by cyber criminals, usually to illegally gain access to a computer system or encode and hold important data hostage, in exchange for a ransom.
- Fraudulent investment programs that require participants to contribute money in order to join, with promised monetary rewards for recruiting additional participants.
- Individuals who intentionally commit fraud against financial institutions, businesses, or consumers.
- A financial institution responsible for safeguarding a customer’s assets.
- Malicious software that is used to secretly collect a user's data without their knowledge or consent.
- An authentication credential used to protect computer systems, applications, networks, and other confidential information.
- Malicious software that appears to be legitimate but performs a hidden malicious activity without the user's knowledge.
- The process of ensuring that organizations, individuals and other entities comply with laws, regulations, rules, codes of practice and industry standards.
- Videos or audio recordings that have been manipulated to make it appear as if someone is saying or doing something that they did not actually say or do.
27 Clues: A fraudster steals another person's identity for personal gain. • A financial institution responsible for safeguarding a customer’s assets. • A specialized team of investigators that investigate complex or sensitive matters. • Illegally taking money entrusted to an individual or organization for personal use. • ...
Test1209 2021-09-26
Across
- The program that controls Identity and Access across enteprise
- Adds extra security to your authentication
- Identity Governance team does this every quarter to verify if you still need your access
Down
- This happens to your LAN account if you dont login for 45 days
- the Cyber army guarding uur enterprise from threats
5 Clues: Adds extra security to your authentication • the Cyber army guarding uur enterprise from threats • This happens to your LAN account if you dont login for 45 days • The program that controls Identity and Access across enteprise • Identity Governance team does this every quarter to verify if you still need your access
Crossword Puzzle-2 2023-09-20
Across
- Staff must attend Cyber Security _______ Training at least once in a year
- We must _____ from all the applications before we close them
Down
- You should always protect sensitive file with a _______
- ______ is installed in systems to protect it against virus and malware
- You should ____ your computer when you step away from your desk
5 Clues: You should always protect sensitive file with a _______ • We must _____ from all the applications before we close them • You should ____ your computer when you step away from your desk • ______ is installed in systems to protect it against virus and malware • Staff must attend Cyber Security _______ Training at least once in a year
CYBERSECURITY 2025-01-03
Across
- A digital security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The act of intentionally accessing a system or network without authorization, often to steal data or damage the system.
- A secure connection that allows users to access the internet privately by routing their connection through a server, masking their IP address.
- A weakness or flaw in a system, software, or network that can be exploited by attackers to gain unauthorized access or cause harm.
- A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.
Down
- Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.
- The process of converting information into a code to prevent unauthorized access, ensuring data remains private.
- A type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
- A general term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Software that secretly monitors and collects a user's activities and personal information without their consent.
10 Clues: A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release. • Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system. • The process of converting information into a code to prevent unauthorized access, ensuring data remains private. • ...
CASP - GRC 2022-01-25
Across
- Principle that countries may impose requirements on data collected with their jurisdiction
- A type of virtualization applied to provision the execution for an app
- Total cost of a risk to an organization per annum
- Measures performance of a program against desired goals
- Retrieves all traffic and drops it
Down
- A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology
- Distributing components of a service across areas needing the content
- Personal information about a consumer provided to a financial institution that can include account number
- A library of programming utilities used to access functions
- Set of security standard developed by DoD to help fortify supply chains by forcing vendors to demonstrate their cyber capabilities
10 Clues: Retrieves all traffic and drops it • Total cost of a risk to an organization per annum • Measures performance of a program against desired goals • A library of programming utilities used to access functions • Distributing components of a service across areas needing the content • A type of virtualization applied to provision the execution for an app • ...
technology 2024-10-05
Across
- – What is the global network that connects billions of devices worldwide?
- – What do we call the physical components of a computer system?
- – What machine is capable of carrying out tasks automatically?
- – What adjective describes something that exists or occurs on computers or the internet rather than in the physical world?
Down
- – What term is used for programs and operating systems that run on computers?
- – What measures are taken to protect information and systems from cyber threats?
- – What system connects multiple computers or devices to share resources?
- – What device is essential for modern digital tasks, from browsing the internet to programming?
- – What technology mimics human intelligence in machines?
- – What is the term for information that is processed or stored by a computer?
10 Clues: – What technology mimics human intelligence in machines? • – What machine is capable of carrying out tasks automatically? • – What do we call the physical components of a computer system? • – What system connects multiple computers or devices to share resources? • – What is the global network that connects billions of devices worldwide? • ...
4.1 Types of Threats 2019-01-09
Across
- A type of malware that locates and saves data from users without them knowing about it
- Collection of captured bot computers
- An error in the program that prevents it from running as expected
- Software that encrypts programs and data until a ransom is paid to remove it
- Software that shows adverts such as popups
- A program that appears desirable but actually contains something harmful. they can copy themselves, steal information, or harm the host computer
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- An attack that sends an email or displays a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into sharing private information
Down
- Criminals make a promise of goods in return for details, such as offering a free music download
- Watching an authorized user enter a security code on a keypad
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A destructive computer program that bores its way through a computers files or through a computers network
- When someone deceives by pretending to be someone else in order to get personal data
- Malware that allows a cyber-security attacker to take control of an infected computer
- Unauthorized access, modification, or use of an electronic device or some element of a computer system
15 Clues: Collection of captured bot computers • Software that shows adverts such as popups • Watching an authorized user enter a security code on a keypad • An error in the program that prevents it from running as expected • Software that encrypts programs and data until a ransom is paid to remove it • ...
Cyber Glossary 2018-08-27
Across
- (File Transfer Protocol) - Software that will transfer entire files from one computer to another, for viewing or other purposes.
- - The unauthorized copying of software, movies, recorded music, CDs, DVDs, etc.
- - Tagging is used on social networking websites such as Facebook to enable users to identify the people that appear in photos they upload.
- - Cloud computing refers to the ability for people and organisations to access files, software, data and other services via the internet that are hosted remotely, typically by a third party organisation. An example would be an internet service which allows you to upload and store your files (e.g. audio, video and documents) online and access them later.
- - The worldwide, interconnected system of computer networks.
- - A section on some Web sites that displays messages posted by users.
- - Software that is secretly installed on a computer and monitors use of the computer in some way without the users' consent. Most spyware tries to get the user to view advertising and/or particular web pages. Some spyware also sends information about the user to another machine over the internet. Spyware is usually installed without a user's knowledge as part of the installation of other software, especially software such as music sharing software obtained via download.
- rooms - Internet service provided area where users can talk instantly with one another online by sending short messages. Different rooms may be "entered" to discuss specific topics.
- -help you to find a location or to let others know where you are located. This technology can be used to find people, or business locations like restaurants. Location-based services are also used by social networking services to help you provide located-based information (check-ins) to status updates or photos.
- - Is to listen into a chat room or online group without participating. Newcomers are encouraged to lurk for a while as they get the feel of a site and how it operates.
- - Is the use of either a hardware device installed on a keyboard or spyware software to record every keystroke (the sequence of keys pushed on your keyboard) on the computer. A keylogger records everything the user types in, including emails, log-in names, passwords, credit card numbers and/or bank account websites in order to steal the information.
- - A web of interconnected people who directly or indirectly interact with or influence the student and family. May include but is not limited to family, teachers and other school staff, friends, neighbors, community contacts, and professional support.
- - An identity theft scam in which criminals send out spam that imitates legitimate correspondence. The fake messages often link to websites which are made to look like the sites of respected companies. You are asked to enter personal information for authentication or confirmation purposes but in reality, you are giving personal information to criminals. Be aware that phishers also use the phone to hunt for information.
- - Software that allows users to create, edit, and link web pages easily. Wikis are often used to create collaborative websites and to power community websites and knowledge base. One of the best known wikis is Wikipedia.
- - Process/art of taking existing digital content (e.g. music, video) and editing and recombining it to produce new content. Remixing is the gray area between copyright and fair use.
- - Is the name for a person used specifically for the online world. It is sometimes referred to as a "handle." When you sign up for a service such as gmail or a chat room, you are required to create a unique identifier—a "username"— that helps to protect your identity.
- - Messages sent from one person to another via computer. Generally text, but can include attached files of documents, graphics, sounds, or videos.
- - A website address saved in your browser so you can access it easily later.
- (or P2P) - Networks used for sharing content such as music, video, data or anything in digital format.
- - Occurs when an adult takes deliberate actions to befriend and establish an emotional connection with a child in order to lower the child's inhibitions. It may include situations where adults pose as children in chat rooms or social networking sites and 'befriend' children in order to make arrangements to meet with them in person.
- - Usually the first page of a website.
- - An environment that controls the user's access to Web content and services. In effect, the walled garden directs the user's navigation within a website (blog), to allow access to a selection of material, or prevent access to other material.
- - Trolling is when a user intentionally causes distress, anger or argument in an online public forum for the purpose of disturbing other users. Individuals who partake in trolling seek an emotional response from others, whether with malicious or humorous intent.
- - Websites that allow users to consume information. The information flow is one way in that users cannot produce information on a Web 1.0 site.
- - Sequence of printable characters to convey an emotion, such as a smiley face :-).
- - A software program or script designed to destroy, modify, or cause other problems with a computer or software program. Viruses can arrive as e-mail attachments, with software installations or on discs. Installing and keeping current an anti-virus program can greatly reduce the risks to your computer.
Down
- - To copy a file from a website or e-mail attachment onto the computer you are using.
- - Insulting or nasty remarks directed at someone through e-mail or chat rooms. A "flame war" is when an online discussion degenerates into a series of personal attacks.
- - Unsolicited and/or inappropriate email.
- - URLThe unique address of an internet page.
- Browsers hold copies of recently visited websites and web files in disk memory. This disk memory space is called the cache.
- - A browser window that opens in addition to the main window. Frequently contains bothersome advertising and may be difficult to get rid of. Pop-ups may open automatically without input from the user, and closing one may open several more unwanted windows.
- (DoS) - DoS attacks involve cybercriminals using a variety of techniques to inundate an internet server with enormous amounts of 'junk' data in order to consume its resources. This can result in normal web users being unable to access a website or experiencing very slow access speeds.
- - ...stands for Really Simple Syndication, which is an internet based technology that allows the distribution of Web content through an RSS reader. Using RSS, news articles, press releases, and other content can be gathered together and distributed via news feeds on an RSS server connected to the internet.
- - A graphic/photo icon to represent a participant in chat and games.
- - In instant messaging (IM), or on cell phones with text display, a list of people a user wants to communicate with. The list can be used to see who is offline or online.
- - Pretending to be someone else.
- - The unique name that identifies an internet site. Domain names have 2 parts, separated by a dot. The part on the left is the most specific, and the part on the right is the most general.
- A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time.
- - Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the internet, interactive and digital technologies or mobile phones. Cyberbullying has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is cyber-harassment or cyberstalking.
- - A small file placed on your computer by a website you visit that stores information about you. Cookies can be useful because they can allow you to skip entering information on reputable sites every time you visit. While cookies will not act maliciously on your computer system, they can compromise your privacy.
- - Technology that notifies a user when a friend is online, allowing them to "converse" by exchanging text messages. IM or text messaging has become a term associated with messaging by cell phone as well.
- - The informal rules of online courtesy.
- - A system, such as Google, for searching for information on the internet.
- - Used to describe the entire range of internet resources available through service providers.
- - Software (Ex: Internet Explorer, Firefox, Chrome and Safari) used to look at various kinds of internet resources.
- - A simple video camera that sits near your computer and sends live or recorded video as well as still photos.
- - A private network inside a company or organization that is used to access internal documents and information.
- - A journal that is available online. The activity of "posting" to a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated frequently, with posts appearing in chronological order with the most recent at the top. Thanks to the availability of blogging software that requires little or no technical background, creating and maintaining a blog is very easy to do.
- - Posting or transmitting an audio file to be downloaded and viewed/heard by other internet users either on a computer or MP3 player. Note: You do not need an iPod to do podcasting.
- - Websites that allow users to produce as well as consume information (i.e., blogs and wikis).
- - A technically sophisticated computer user who enjoys exploring computer systems and programs. Activities can be benign or malicious.
- - Sexting refers to the sending of provocative photos, messages, or videos, generally using a mobile phone. It can also include posting this type of material online.
- - A company that provides customers with a connection to the internet and may provide e-mail services.
54 Clues: - Pretending to be someone else. • - Usually the first page of a website. • - The informal rules of online courtesy. • - Unsolicited and/or inappropriate email. • - URLThe unique address of an internet page. • - The worldwide, interconnected system of computer networks. • - A graphic/photo icon to represent a participant in chat and games. • ...
Cyber safety 2016-05-24
Across
- / stolen information
- one in a class
- someone who keeps you safe
- / to keep something safe
- keep something to yourself
- / a persons details
- steeling money from someone
- / find something you want to know about
- bullying / something mean cent to you
Down
- / internet
- method
- female or male
- / talk to some one
- / information site
- illegally getting into someone's account
- /something disgusting
- talk and put photos for every one to see
- / communicate
- unwanted mail in your email account
- Someone who keeps you safe
- a website containing a writers opinion
21 Clues: method • / internet • / communicate • female or male • one in a class • / talk to some one • / information site • / a persons details • / stolen information • /something disgusting • / to keep something safe • someone who keeps you safe • keep something to yourself • Someone who keeps you safe • steeling money from someone • unwanted mail in your email account • ...
Cyber-Savvy 2018-02-04
Across
- If you receive or witness cyberbullying, ignore it or tell a trusted adult. Do not ____________ as it will escalate the situation.
- Sending or posting cruel information to ruin someone's reputation is a form of cyberbullying called
- Online, cyberbullying can occur more frequently than in-person, because content can be easily ___________
- Following someone with the intent to physically harm them is called ________________
- Fake Profiles, Fraping, and __________ are forms of cyberbullying that involve impersonation
- revealing someone's secrets online is a form of cyberbullying called ________________
- The digital trail of data you leave behind when you use the Internet
- Using all caps to "shout" rude or hateful opinions is called _________
- Save the __________________, if you receive messages considered cyberbullying.
- Bullying is not just a one-time event or instance of drama, it is ___________.
Down
- Insulting someone in an online network to provoke a response if called ________________
- The type of cyberbullying that sends frequent, ongoing, threatening messages
- The name of the app prompting you to think before posting is called the ____________ app
- Be sure to sign out of your computer to avoid the possibility of which form of cyberbullying?
- The acronym you should use before you post online
- Intentionally leaving someone out is a form of cyberbullying called _______________
- Use this in online communications to prevent or lessen cyberbullying
- Cyberbullying involves a power _______________ between children
- If you witness someone being cyberbullied, choose to be an ______________.
- Gaining someone's trust with the intent of harming them later is a form of cyberbullying called
20 Clues: The acronym you should use before you post online • Cyberbullying involves a power _______________ between children • Use this in online communications to prevent or lessen cyberbullying • The digital trail of data you leave behind when you use the Internet • Using all caps to "shout" rude or hateful opinions is called _________ • ...
Cyber Terms 2023-03-06
Across
- Changing your Ip or Mac address to appear from a different machine
- (2wds) A misleading compyer program that allows a heacker into your system
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems
- computers and peripherals connected as on entity
- servers that are accessed over the Internet, and the software and databases that run on those servers
- (2wds) Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
- Process of Identifying a user's identity
- Coding used to protect your infroomation from hackers
- Malware that snoops on you
- Software or Hardware used to keep intruders out
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
Down
- An approach to security evaluation where manual exploitations and automated techniques are used by attack and security professionals.
- (2wds) techniques aimed at talking target into revealing information or performing an action for illegitimate reasons
- someone is tricked into clicking on one object on a web page when they want to click on another
- a gorup of instructions or applications that instruct a computer to carry out a task
- a wide variety of bad software used to infect and/or damage a system
- (2wds) A hacker who is invited to test out computer systems and servers, looking for vulnerabilities
- a collection of programs or software tools that allow hackers to remotely access and control a computer
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- (2Wds) Source of leaked information
- Sending fake emails to get you to click on a link
- network of infected computers working together to create security breaches
- A means of attack on a computer system
- malware that encrypts your files until you pay a fee
- Two or more computers connected together to share resources
- (2Wds) Any attempt to breach a electronic systems security boundary
26 Clues: Malware that snoops on you • (2Wds) Source of leaked information • A means of attack on a computer system • Process of Identifying a user's identity • Software or Hardware used to keep intruders out • computers and peripherals connected as on entity • Sending fake emails to get you to click on a link • malware that encrypts your files until you pay a fee • ...
Cyber Safety 2023-08-20
Across
- Viruses and spyware
- Stores information on your computer
- False warning
- free from public attention
- wireless data network
- Threat created through connections
- false content about another person
- unwanted electronic devices
- unauthorized moving of data
Down
- Garenteer of a none imposter
- Copying some elses work
- false claims of legitimacy
- Gap between opposites on a subject
- Modify and publish content on a webpage
- Threat actor
- Fake online profile
- harmful computer code
- Computer infection
- Unwanted email messages
- Period of refrain from the internet
20 Clues: Threat actor • False warning • Computer infection • Viruses and spyware • Fake online profile • wireless data network • harmful computer code • Copying some elses work • Unwanted email messages • free from public attention • false claims of legitimacy • unwanted electronic devices • unauthorized moving of data • Garenteer of a none imposter • Gap between opposites on a subject • ...
Cyber crossword 2024-10-10
Across
- Aggiornamento software progettato per correggere vulnerabilità o bug.
- Metodo di autenticazione che richiede due fasi per confermare l'identità.
- Sistema che rileva accessi non autorizzati a una rete o sistema.
- Persona esperta di informatica che può sfruttare vulnerabilità di un sistema.
- Software usato per rilevare e rimuovere malware.
- Tecnica che sfrutta l'inganno per ottenere informazioni confidenziali.
- Strumento che registra ogni tasto premuto su una tastiera.
- Punto debole di un sistema che può essere sfruttato da attacchi.
- Software o metodo utilizzato per sfruttare una vulnerabilità in un sistema.
- Tentativo di compromettere l'integrità, la disponibilità o la riservatezza di un sistema.
Down
- Tipo di malware che blocca l'accesso ai dati finché non viene pagato un riscatto.
- Esposizione non autorizzata di dati sensibili.
- Attacco simulato contro un sistema informatico per verificarne la sicurezza.
- Rete di computer infettati utilizzati per condurre attacchi su larga scala.
- Truffa online che mira a rubare dati personali attraverso email ingannevoli.
- Programma dannoso progettato per infiltrarsi in un sistema.
- Programma che sembra legittimo ma contiene codice dannoso. / Programma che prende il nome da un racconto di Omero
- Attacco che mira a sovraccaricare un server rendendolo inaccessibile.
- Strumento usato per nascondere la presenza di malware su un sistema.
- Accesso nascosto a un sistema che bypassa le normali procedure di sicurezza.
- Metodo di attacco che tenta tutte le combinazioni possibili di password.
- Vulnerabilità non ancora scoperta dagli sviluppatori ma nota agli hacker.
22 Clues: Esposizione non autorizzata di dati sensibili. • Software usato per rilevare e rimuovere malware. • Strumento che registra ogni tasto premuto su una tastiera. • Programma dannoso progettato per infiltrarsi in un sistema. • Sistema che rileva accessi non autorizzati a una rete o sistema. • Punto debole di un sistema che può essere sfruttato da attacchi. • ...
Cyber Awareness 2024-10-09
Across
- A method of trial and error used to guess passwords.
- Your first line of defense; make it strong and unique.
- An attack that overwhelms a server with too many requests, making it unavailable.
- A process that turns data into a fixed-length string of characters.
- Deception intended for personal gain, often involving financial data.
- Pretending to be someone or something else to gain trust.
- This barrier keeps unwanted network traffic out of your system.
- A sneaky tool that records every keystroke you make.
- It turns your data into a secret code to keep it safe.
- A software update that fixes security vulnerabilities.
Down
- Malicious software disguises itself as something harmless.
- A copy of your data that you keep safe in case of an emergency.
- Malicious software designed to harm or exploit a computer system.
- A vulnerability that is exploited before the developer can fix it.
- Malicious software that locks your files until you pay up.
- A type of cyberattack that tricks you into giving away personal information.
- Verifying your identity before granting access.
- A secure tunnel for your internet traffic, often used to protect privacy.
- Manipulating people into giving up confidential information.
- Malicious software that secretly gathers information about a user.
20 Clues: Verifying your identity before granting access. • A method of trial and error used to guess passwords. • A sneaky tool that records every keystroke you make. • Your first line of defense; make it strong and unique. • It turns your data into a secret code to keep it safe. • A software update that fixes security vulnerabilities. • ...
Cyber Crim 2024-11-08
Across
- These are Internet-based programs that are used to software or disrupt a network.
- Act by the criminal, who floods the bandwidth of the victim’s network.
- is a malicious program that appears to be friendly, they are not technically viruses
- Refers to all the activities done with criminal intent in cyberspace.
- In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
- This category of cybercrime involves one individual distributing malicious or illegal information online.
- these viruses take up residence in the computer’s memory, making them hard to detect.
- Occurs website, e-mail server, when a or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers.
- This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography
Down
- Theft of software through the illegal copying of genuine programs.
- This is similar to a real-life instance of a criminal illegally possessing an individual’s bank or credit card details.
- Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing, etc.)
- In simple terms means an illegal intrusion into a computer system and/or network.
- this type of virus make changes to a disk’s file
- The first recorded cybercrime took place in the year 1820.
- Damaging or destroying than stealing.
- a virus designed to infect a specific type of document file, such as Microsoft Word or Excel files
- This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
- In general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
- this type of virus hides the user’s disk and waits for a specific event to occur before running.
20 Clues: Damaging or destroying than stealing. • this type of virus make changes to a disk’s file • The first recorded cybercrime took place in the year 1820. • Theft of software through the illegal copying of genuine programs. • Refers to all the activities done with criminal intent in cyberspace. • Act by the criminal, who floods the bandwidth of the victim’s network. • ...
