cyber security Crossword Puzzles
Cybersecurity Practices 2024-10-07
Across
- | A security measure that requires more than one form of verification.
- | An attempt to steal personal information by pretending to be a trustworthy entity.
- | A software update that fixes security vulnerabilities.
- | Software designed to detect and remove malware.
- | A vulnerability that is exploited before it is publicly known or patched.
- | A network of infected devices used in cyber attacks.
- | A type of malware that records keystrokes to steal sensitive information.
- Breach | The unauthorized release of confidential information.
- | The process of converting data into a code to prevent unauthorized access.
- Engineering | Manipulating people into giving up confidential information.
- | A type of malware that demands payment to restore data.
- | A security system that monitors and controls incoming and outgoing network traffic.
- | Software that is harmful to a computer system.
Down
- | An attack that overwhelms a system by sending an excessive amount of requests.
- | A weakness in a system that can be exploited by a cyber attacker.
- | An attempt to damage or disrupt a computer system or network.
- | The process of verifying the identity of a user or device.
- | A decoy system set up to attract cyber attackers and study their behavior.
- | Malware disguised as legitimate software.
- | Software that gathers user information without their knowledge.
20 Clues: | Malware disguised as legitimate software. • | Software that is harmful to a computer system. • | Software designed to detect and remove malware. • | A network of infected devices used in cyber attacks. • | A software update that fixes security vulnerabilities. • | A type of malware that demands payment to restore data. • ...
Cyber Security 2023-06-14
Across
- A secret word or phrase used for authentication.
- The practice of hiding the true identity of network communications.
- A program that identifies and blocks unauthorized access.
- A unique identifier assigned to a network device.
- A technique used to deceive individuals into revealing sensitive information.
- The process of converting information into a secret code.
- A method of verifying the identity of a user.
Down
- Unwanted, unsolicited email.
- A malicious software that can encrypt files and demand ransom.
- Online behavior that aims to harm, intimidate, or harass others.
- The protection of sensitive information from unauthorized access.
- Software designed to detect, prevent, and remove malicious programs.
- A digital signature used to verify the authenticity of a message or document.
- A technique used to exploit vulnerabilities in software or systems.
- The act of gaining unauthorized access to computer systems.
15 Clues: Unwanted, unsolicited email. • A method of verifying the identity of a user. • A secret word or phrase used for authentication. • A unique identifier assigned to a network device. • A program that identifies and blocks unauthorized access. • The process of converting information into a secret code. • The act of gaining unauthorized access to computer systems. • ...
Cyber Security 2025-01-27
Across
- - A cryptographic tool used to validate the authenticity of digital messages or documents
- - The primary legislation in India dealing with cybercrime and electronic commerce (abbreviation)
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- - The use of the internet to conduct violent acts that threaten or harm individuals or governments
- - Section of the IT Act that deals with computer-related offenses
- - The process of collecting and analyzing data from computer systems for legal evidence
- - The fraudulent use of someone else's personal information
- - A special police unit in India dedicated to investigating cybercrimes
Down
- - The use of IT to deliver government services and information to citizens
- - Safeguarding important information from corruption, compromise, or loss
- - The process of converting information into a code to prevent unauthorized access
- - Unauthorized access to computer systems or networks
- - Sending unsolicited messages, often in bulk, via electronic means
- - An entity that issues digital certificates for secure online transactions
- - The practice of protecting systems, networks, and programs from digital attacks
15 Clues: - Unauthorized access to computer systems or networks • - The fraudulent use of someone else's personal information • - Section of the IT Act that deals with computer-related offenses • - Sending unsolicited messages, often in bulk, via electronic means • - A special police unit in India dedicated to investigating cybercrimes • ...
Cyber security 2022-12-26
Across
- Hardware or software designed to prevent unauthorized access to or from a private network
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- When someone sends an email with a link to a bogus website, it is called.....
- Software ..... is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation of software products or unauthorized versions of software products
- Software programs that protect your computer from internet virus and malicious code
- Threating behavior facilitated through electrical means such as texting
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information
Down
- ..... force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- Malicious program that uses a computer network to replicate
- Fraudulent phone calls
- Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction
- You should not just check identity, you should also confirm.....
- The process of taking plain text and scrambling it into an unreadable format
- Malicious computer code that reproduce itself
- This can slow down your computer and watch everywhere you go
15 Clues: Fraudulent phone calls • Malicious computer code that reproduce itself • Malicious program that uses a computer network to replicate • This can slow down your computer and watch everywhere you go • You should not just check identity, you should also confirm..... • Threating behavior facilitated through electrical means such as texting • ...
Cyber security 2025-09-02
Across
- – Information stored or used by a computer.
- – To keep something safe from danger or damage.
- – A part of a system or machine.
- – To make software newer or better.
- – The right to keep your personal information secret.
- – A group of connected computers that can share information.
- – To give or show something to other people.
Down
- – Something that can cause harm to a system or data.
- – A person who uses computers to get into systems or steal information.
- – A machine used for work, games, or internet access.
- – Online space to store and access your files.
- – Bad software that can damage or steal your data.
- – A device with keys used to type on a computer.
- – A secret word or number to log in to your account.
- – A trick to get your personal information by pretending to be a real website or email.
15 Clues: – A part of a system or machine. • – To make software newer or better. • – Information stored or used by a computer. • – To give or show something to other people. • – Online space to store and access your files. • – To keep something safe from danger or damage. • – A device with keys used to type on a computer. • – Bad software that can damage or steal your data. • ...
Cyber Security 2025-12-02
Across
- Employees using unauthorized apps/services that create security gaps.
- Corrupting the training data of an AI system so it learns harmful or incorrect behaviour.
- Attacks exploiting vulnerabilities that the software creator doesn't know about yet.
- Networks of compromised devices used for spam, DDoS attacks, etc.
- Employees or contractors misusing access intentionally or accidentally.
- Slightly modified inputs (images, text, audio) designed to fool AI models into misclassifying things.
- Forcing an AI system to ignore instructions and output harmful or unintended content.
- Using leaked passwords from one website to log into another (because people reuse passwords).
- Using manipulated audio/video to impersonate someone and deceive victims.
- Hiding malicious data (scripts, payloads, commands) inside images, audio files, or other media so it passes undetected.
Down
- Intercepting communication between two parties to steal or modify data.
- Attacking a vendor or service that a company trusts, and spreading malware through legitimate updates.
- Attempts to bypass safety filters in AI systems using carefully designed prompts or exploits.
- Fake emails or messages designed to steal credentials or install malware.
- Trying to clone a machine learning model by repeatedly querying it and recreating it elsewhere.
15 Clues: Networks of compromised devices used for spam, DDoS attacks, etc. • Employees using unauthorized apps/services that create security gaps. • Intercepting communication between two parties to steal or modify data. • Employees or contractors misusing access intentionally or accidentally. • Fake emails or messages designed to steal credentials or install malware. • ...
Cyber security 2022-10-19
Across
- _______ is a program that secretly records what a user does so that cybercriminals can make use of this information. For example, spyware could capture credit card details.
- _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- _______ Malware locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.
- ________is actually considered the first computer virus?
- _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- In order to ensure the security of the data/ information, we need to ____________ the data:
Down
- _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- In Wi-Fi Security, which protocol is more used?
- _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
- __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Advertising software can be used to spread malware.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
15 Clues: In Wi-Fi Security, which protocol is more used? • Advertising software can be used to spread malware. • ________is actually considered the first computer virus? • In order to ensure the security of the data/ information, we need to ____________ the data: • _______ is a type of software designed to help the user's computer detect viruses and avoid them. • ...
cyber security 2025-07-07
Across
- A test to tell if a user is human or a bot
- A security system that blocks unauthorized access to or from a network
- To verify a person’s identity before allowing access
- A necessary software fix that can patch security holes
- A scam where fake messages trick people into giving personal info
- A secret string used to access a device or account securely
Down
- A list of sites, emails, or IPs that are denied access for safety
- General term for harmful software like viruses and worms
- A tool or person that translates encrypted messages back into readable form
- A saved copy of important data in case something is lost
- To turn readable data into code so only authorized users can read it
- When private data is accessed without permission
- A program that finds and removes malicious software
- To follow and identify the source of an online threat or attack
- A type of software that secretly gathers information from your device
15 Clues: A test to tell if a user is human or a bot • When private data is accessed without permission • A program that finds and removes malicious software • To verify a person’s identity before allowing access • A necessary software fix that can patch security holes • General term for harmful software like viruses and worms • ...
Cyber Security 2023-04-13
Across
- A memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity.
- The loss of confidentiality, integrity, or availability of information, data, or information (or control) systems
- A way of translating data from plaintext (unencrypted) to ciphertext (encrypted).
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- A patch, upgrade, or other modification to code that corrects security and/or functionality problems in software.
- Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- A security feature offered by many websites, applications and devices that dramatically improves account security.
- Ensuring timely and reliable access to and use of information.
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- An ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.
- Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- Types of software products which attempt to detect, quarantine and/or block malware from running on devices.
- Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
- A weakness in an IT system that can be exploited by an attacker to deliver a successful attack.
15 Clues: Ensuring timely and reliable access to and use of information. • A way of translating data from plaintext (unencrypted) to ciphertext (encrypted). • A weakness in an IT system that can be exploited by an attacker to deliver a successful attack. • Assurance that the confidentiality of, and access to, certain information about an entity is protected. • ...
Cyber Security 2023-08-17
Across
- a quick access website based directory
- Entering into someone or something else’s data stream either by means of hacking or password changing.
- Being in favor of, or creating aspects towards a decision that will skew an argument at the expense of reputation.
- Company, known as a open network browser
- the world wide web is also known as
- The remnant that is left after browsing. Could be seen by researching through search history and clicking confirmation tickets.
Down
- Known as an asset in the stock market, these are an investment type
- False hyperlinks made in order to create data infiltration, used as a tactic, primary objective of account takeover.
- Trademarking an intellectual property in order to avoid copying an idea, commonly used in business material.
- an accessible tech support
- Protective strategy tailored towards the internet, an ever evolving shield against data infiltration.
- Company, known for computer backup and storage networking
- The street credit as well as infamy an idea creates.
- Company, known for cybersecurity basics software, recently deceased creator
- often used as a financial tolerance policy, this is used to measure the amount of danger one can obtain without failure.
15 Clues: an accessible tech support • the world wide web is also known as • a quick access website based directory • Company, known as a open network browser • The street credit as well as infamy an idea creates. • Company, known for computer backup and storage networking • Known as an asset in the stock market, these are an investment type • ...
cyber security 2025-11-13
Across
- someone takes your files and you have to pay a ransom to get it back
- detects and removes viruses and malware
- tests if you are human or a computer
- making up a story pretending to be someone else and trying to convince someone to do something (e.g. send the money)
- unauthorized access to a computer system
- a type of malware that disguises itself
- a person who's job is to find faults in a system and help fix them
Down
- a piece of code which will do a certain command under the right conditions
- viruses which duplicate and spread quickly
- means no more annoying manual updates
- many computers/computer programs overflowing a website and often shutting it down at least temporarially
- something many people theorize will steal all jobs
- a type of malware that is always watching, looking, listening.....
- your computer's barrier between malware and itself
- tricks often used online to manipulate humans
15 Clues: tests if you are human or a computer • means no more annoying manual updates • detects and removes viruses and malware • a type of malware that disguises itself • unauthorized access to a computer system • viruses which duplicate and spread quickly • tricks often used online to manipulate humans • something many people theorize will steal all jobs • ...
cyber security 2025-07-07
Across
- A test websites use to make sure you're not a robot
- A program that secretly watches what you do online
- A personal space on a website or app that needs a login
- Software that shows you unwanted ads while you're online
- Something used to block bad content or messages online
- A virus hidden inside something that looks safe
- A trick used to steal your personal information through fake messages
- A tool that blocks dangerous traffic on a network
Down
- A computer program that runs tasks automatically, sometimes used for attacks
- Any harmful software designed to damage your computer
- A word or code that keeps your account safe from others
- Using lies or tricks online to steal something from someone
- A fake or exaggerated headline meant to make you click
- A small window that suddenly appears on a website
- A small file that stores information about you when you visit a site
- A secret key you use to access your accounts
16 Clues: A secret key you use to access your accounts • A virus hidden inside something that looks safe • A small window that suddenly appears on a website • A tool that blocks dangerous traffic on a network • A program that secretly watches what you do online • A test websites use to make sure you're not a robot • Any harmful software designed to damage your computer • ...
cyber security 2025-07-07
Across
- Information collected, stored, or shared digitally
- An online crime where someone tricks you to steal money or identity
- A wireless way to connect to the internet
- A small file websites store to remember user activity and preferences
- The original location or author of online information
- A flaw or error in a program that causes it to behave unexpectedly
- A small window that suddenly appears, often used in ads or warnings
- To turn a computer off and then on to fix issues
Down
- Software that automatically displays unwanted advertisements
- A phone, tablet, or computer used to go online
- A clickable part of text or image that leads to another webpage
- What you should always do when done using an online account
- Where your incoming email messages arrive
- Temporary storage used to help websites load faster
- Device that sends data between your home network and the internet
15 Clues: A wireless way to connect to the internet • Where your incoming email messages arrive • A phone, tablet, or computer used to go online • To turn a computer off and then on to fix issues • Information collected, stored, or shared digitally • Temporary storage used to help websites load faster • The original location or author of online information • ...
cyber security 2025-07-07
Across
- A test to tell if a user is human or a bot
- A tool or person that translates encrypted messages back into readable form
- To verify a person’s identity before allowing access
- A list of sites, emails, or IPs that are denied access for safety
- A scam where fake messages trick people into giving personal info
- General term for harmful software like viruses and worms
Down
- A type of software that secretly gathers information from your device
- A secret string used to access a device or account securely
- When private data is accessed without permission
- To follow and identify the source of an online threat or attack
- A necessary software fix that can patch security holes
- A saved copy of important data in case something is lost
- To turn readable data into code so only authorized users can read it
- A program that finds and removes malicious software
- A security system that blocks unauthorized access to or from a network
15 Clues: A test to tell if a user is human or a bot • When private data is accessed without permission • A program that finds and removes malicious software • To verify a person’s identity before allowing access • A necessary software fix that can patch security holes • A saved copy of important data in case something is lost • ...
cyber security 2025-07-07
Across
- A test to tell if a user is human or a bot
- A tool or person that translates encrypted messages back into readable form
- To verify a person’s identity before allowing access
- A list of sites, emails, or IPs that are denied access for safety
- A scam where fake messages trick people into giving personal info
- General term for harmful software like viruses and worms
Down
- A type of software that secretly gathers information from your device
- A secret string used to access a device or account securely
- When private data is accessed without permission
- To follow and identify the source of an online threat or attack
- A necessary software fix that can patch security holes
- A saved copy of important data in case something is lost
- To turn readable data into code so only authorized users can read it
- A program that finds and removes malicious software
- A security system that blocks unauthorized access to or from a network
15 Clues: A test to tell if a user is human or a bot • When private data is accessed without permission • A program that finds and removes malicious software • To verify a person’s identity before allowing access • A necessary software fix that can patch security holes • A saved copy of important data in case something is lost • ...
Cyber Security 2021-07-20
Across
- Gaining unauthorised access to or control of a computer system.
- A self replicating malware that modifies code and programs.
- A group or person who is interested in creating disruptions or embarrassment through hacking.
- An attack where the perpetrator invents a story to convince the victim into providing money or data.
- ________ is created when data is processed and meaningful.
- Malware that infects a computer and spams the user with adds.
- Automated programs that perform tasks repeatedly.
- Multiple computers send packets or data to a system in an attempt to overload the network.
- ____ is raw fact and figures.
Down
- An attack where the victim receives and email disguised to resemble an official email.
- An attack where the attacker is watching the victim while they provide sensitive information.
- a form of virus that encrypts users data and requests payments to decrypt the data.
- A large collection of malware infected devices called zombies.
- A self replicating malware that spreads through the networks and uses system resources.
- A piece of malware that disguises itself to appear as a useful program.
15 Clues: ____ is raw fact and figures. • Automated programs that perform tasks repeatedly. • ________ is created when data is processed and meaningful. • A self replicating malware that modifies code and programs. • Malware that infects a computer and spams the user with adds. • A large collection of malware infected devices called zombies. • ...
CYBER SECURITY 2023-12-27
Across
- Software update designed to fix security vulnerabilities.
- Interconnected computers facilitating communication and data exchange.
- Measures to protect computer systems from attacks.
- Hint: Verifying the identity of a user through passwords or biometrics.
- Secret code for user access.
- Deceptive emails or websites aiming to steal data.
- breach Unauthorized access leading to the exposure of sensitive information.
Down
- Software designed to harm or exploit computer systems.
- Software designed to detect and remove malicious programs.
- Converts sensitive information into a secret code.
- Unauthorized access or breach into a system.
- Deliberate exploitation of computer systems for malicious purposes.
- Acts as a digital barrier to unauthorized access.
- Requires two forms of identification for access.
- Hint: Weakness in a system that could be exploited by attackers.
15 Clues: Secret code for user access. • Unauthorized access or breach into a system. • Requires two forms of identification for access. • Acts as a digital barrier to unauthorized access. • Converts sensitive information into a secret code. • Measures to protect computer systems from attacks. • Deceptive emails or websites aiming to steal data. • ...
cyber security 2025-07-07
Across
- A test websites use to make sure you're not a robot
- A program that secretly watches what you do online
- A personal space on a website or app that needs a login
- Software that shows you unwanted ads while you're online
- Something used to block bad content or messages online
- A virus hidden inside something that looks safe
- A trick used to steal your personal information through fake messages
- A tool that blocks dangerous traffic on a network
Down
- A computer program that runs tasks automatically, sometimes used for attacks
- Any harmful software designed to damage your computer
- A word or code that keeps your account safe from others
- Using lies or tricks online to steal something from someone
- A fake or exaggerated headline meant to make you click
- A small window that suddenly appears on a website
- A small file that stores information about you when you visit a site
- A secret key you use to access your accounts
16 Clues: A secret key you use to access your accounts • A virus hidden inside something that looks safe • A small window that suddenly appears on a website • A tool that blocks dangerous traffic on a network • A program that secretly watches what you do online • A test websites use to make sure you're not a robot • Any harmful software designed to damage your computer • ...
cyber security 2025-07-07
Across
- A test to tell if a user is human or a bot
- A tool or person that translates encrypted messages back into readable form
- To verify a person’s identity before allowing access
- A list of sites, emails, or IPs that are denied access for safety
- A scam where fake messages trick people into giving personal info
- General term for harmful software like viruses and worms
Down
- A type of software that secretly gathers information from your device
- A secret string used to access a device or account securely
- When private data is accessed without permission
- To follow and identify the source of an online threat or attack
- A necessary software fix that can patch security holes
- A saved copy of important data in case something is lost
- To turn readable data into code so only authorized users can read it
- A program that finds and removes malicious software
- A security system that blocks unauthorized access to or from a network
15 Clues: A test to tell if a user is human or a bot • When private data is accessed without permission • A program that finds and removes malicious software • To verify a person’s identity before allowing access • A necessary software fix that can patch security holes • A saved copy of important data in case something is lost • ...
Final Week, Final Challenge: The Cyber Crossword Returns 2025-10-17
Across
- Records of all system entries (4)
- Quick online talk (4)
- Fake email scam (5)
- Internal test to find security flaws (7)
- Breaking the law (5)
- App or system for viewing websites (7)
- Bug that spreads and infects computer (5)
- Software that records every keystroke (6)
- Three-digit login code (3)
- Fixes issues with software programs (5)
- Long version of a password (10)
Down
- Information kept hidden from others (6)
- Secret or hidden door to access system (8)
- Scam phone call (7)
- New improved version of software (6)
- Internal threat or danger from an employee (13)
- Cyber security boss at work (abbr.) (4)
- Extra copy of files in case originals are lost (6)
- Scam text message (5)
- National Cyber Safety Awareness Month (7)
20 Clues: Scam phone call (7) • Fake email scam (5) • Breaking the law (5) • Quick online talk (4) • Scam text message (5) • Three-digit login code (3) • Long version of a password (10) • Records of all system entries (4) • New improved version of software (6) • App or system for viewing websites (7) • Information kept hidden from others (6) • Cyber security boss at work (abbr.) (4) • ...
DTX 2022-10-10
15 Clues: a rvaerv • frfa eav • aerav vrg • v earvaerv • varearfwrgeg • vearve fref • erverv ev ae • ea rv erva vea • security dienst • wat sturen we uit • waar we goed in zijn • hoe laten we data zien • een cyber security test • waar we bestanden opslaan • wat slaan we op in de cloud
Cyber Ethics and Networking concept 2025-06-20
Across
- Data is transferred vey fast
- Networking Component
- Geomatrical shaps of wires
- Ethicals practices of interner
- ethics rules we should follow while using internet
- type of security system
- type of networking system
- Networking Component
- Wires ranges less than 10 meters
Down
- opposite of encryption
- crime done using internet
- Kind of cyber security
- Cyberbullying harassing a person using network
- Illegal intrusion into computer
14 Clues: Networking Component • Networking Component • opposite of encryption • Kind of cyber security • type of security system • crime done using internet • type of networking system • Geomatrical shaps of wires • Data is transferred vey fast • Ethicals practices of interner • Illegal intrusion into computer • Wires ranges less than 10 meters • Cyberbullying harassing a person using network • ...
Introduction to Cybersecurity 2023-09-09
Across
- Its job is to put a digital signature on outgoing mail so servers could actually verify that it is you sending that email.
- Unwanted messages are usually referred to as spam.
- It's the third tool for email authentication. DMARC verifies that this address matches the “from” address you see.
- when a victim is bullied and harassed through electronics.
- Policy Framework (SPF)- an email authentication method that helps to identify the mail servers that are allowed to send email for a given domain.
- This is a part of a computer system that is utilized to block unauthorized data.
- protection against unauthorized access
- It is the process of converting data into a different type of form or code.
- Its an email authentication policy that protects against bad people who use fake email addresses.
- It is an area where computer systems and networks are utilized.
- program is referred to as clientless if it can operate wholly over the network without needing to install any software.
Down
- an email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.
- this is when you pass an organization’s existing security systems.
- spoof logos and make up fake email addresses. Scammers use familiar company names or pretend to be someone you know.
- attempt to gain unauthorized access to a computer
- a software used as an intent to destroy or disrupt unauthorized access.
- Wifi protected access is a security standard for computing devices.
- insurance- Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack.
- This is when users can send and receive data using a virtual private network.
- authentication This technology allows a receiving server to verify an email from your company and block emails from an imposter.
20 Clues: protection against unauthorized access • attempt to gain unauthorized access to a computer • Unwanted messages are usually referred to as spam. • when a victim is bullied and harassed through electronics. • It is an area where computer systems and networks are utilized. • this is when you pass an organization’s existing security systems. • ...
Cyber Security 2023-11-07
Across
- Logs and Event Management provided in JICA Project
- Set of rules, policies and operations that a company uses to achieve its business goals
- Compliance is act of following rules, laws and regulations
- Network Monitoring system short form
- Term that Deals with Organization secret data
- Operates continuously and Data visible 24*7
- Next Generation Firewall brand provided in JICA Project
Down
- Term used to define Weakness
- Keeping Information and Communication Private
- Terms used for Logging all the user activity
- Keeping Organizational information accurate and free of errors
- Authorizing a Person to perform certain activity
- cybersecurity standards for OT technology
- Role Based Access Control
14 Clues: Role Based Access Control • Term used to define Weakness • Network Monitoring system short form • cybersecurity standards for OT technology • Operates continuously and Data visible 24*7 • Terms used for Logging all the user activity • Keeping Information and Communication Private • Term that Deals with Organization secret data • ...
Cyber Security 2025-11-12
Across
- A weakness in software, hardware, or processes that can be exploited by an attacker to gain unauthorized access or cause harm.
- A previously unknown vulnerability for which no patch or fix exists yet; attackers can exploit it before vendors can respond.
- A social‑engineering attack that uses deceptive messages (often email or text) to trick people into revealing sensitive information or clicking malicious links.
- Software designed to harm, exploit, or otherwise compromise computers or networks; includes viruses, worms, trojans, ransomware, and spyware.
- that manipulate people into breaking normal security procedures or revealing confidential information (includes phishing, pretexting, baiting).
- A type of malware that encrypts a user’s files or system and demands payment (a ransom) for the decryption key.
- system A tool or service that monitors network or system activity for malicious behavior or policy violations and alerts administrators when suspicious events occur.
- A security system (software or hardware) that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- The process of verifying the identity of a person, device, or system before granting access
- Any device (computer, phone, tablet, IoT device) that connects to a network and can be a target or entry point for attacks.
- Security that requires two or more independent credentials (something you know, have, or are) to verify identity (e.g., password + text code).
- The process of transforming data so that only someone with the correct key can read it; used to protect information in transit and at rest.
- An update to software or firmware that fixes bugs or security vulnerabilities; applying patches reduces risk of exploits
- A method, tool, or piece of code that takes advantage of a vulnerability to carry out an attack.
14 Clues: The process of verifying the identity of a person, device, or system before granting access • A method, tool, or piece of code that takes advantage of a vulnerability to carry out an attack. • A type of malware that encrypts a user’s files or system and demands payment (a ransom) for the decryption key. • ...
Cyber Security 2025-12-10
Across
- A safe copy of data in case it's lost.
- A file that can harm your computer.
- A long, strong password phrase.
- A harmful computer program that spreads.
- A fake messages sent to steal information.
- Keeping information safe and private.
Down
- Protects your network from unauthorized access.
- A unwanted or junk email.
- A method of verifying your identity.
- A criminal who breaks into computer systems.
- Scrambles data so only authorized people can read it.
- A secret word used to log in.
- Secret questions used to recover accounts.
- A program that protects computers from viruses.
- A wireless network.
15 Clues: A wireless network. • A unwanted or junk email. • A secret word used to log in. • A long, strong password phrase. • A file that can harm your computer. • A method of verifying your identity. • Keeping information safe and private. • A safe copy of data in case it's lost. • A harmful computer program that spreads. • Secret questions used to recover accounts. • ...
Cyber Security 2021-10-07
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- Any software program in which advertising banners are displayed while the program is running.
- designed to detect and destroy computer viruses.
- Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
Down
- Are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the internet.
- A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Are small files that websites put on your computer hard disk drive when you first visit.
- Refers to the process of making copies of data or data files to use in the event the original data files are lost or destroyed.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
- A standalone malware computer program that replicates itself in order to spread to other computers.
14 Clues: designed to detect and destroy computer viruses. • An attempt by hackers to damage or destroy a computer network or system. • Someone who seeks and exploits weaknesses in a computer system or computer network. • Are small files that websites put on your computer hard disk drive when you first visit. • ...
Cyber Security 2022-11-23
Across
- A large collection of malware infected, or “zombie” computers or other devices.
- Gaining unauthorised access to or control of a computer or website.
- A form of malware that monitors a person and their device usage.
- A piece of malware that is willingly downloaded by a user because it seems to perform a useful function, like a game, but actually has malicious purposes.
- A self-replicating form of malware that spread through a network and slow it down by using up its bandwidth.
- A form of spyware that monitors every keystroke made by a keyboard user.
- Software that is designed to gain access to a computer or device for malicious purposes.
Down
- When a scammer invents a scenario in a call or email in order to convince them to give them money or information.
- ????? hat hacker: a hacker employed by a company or organisation to try and hack their security to check its strength.
- When a scammer tries to trick a computer user into giving up valuable information or money by sending them an email designed to look sincere, usually with a link to click on.
- A form of malware that infects a computer and forces it to download malicious pop-ups.
- A form of malware that is a special type of virus that locks a computer, encrypts it’s files and demands money to decrypt them.
- A self-replicating form of malware that is unwittingly downloaded by a user and then maliciously modifies programs on the computer.
- ?????? engineering: a set of methods used by scammers to trick people into giving them valuable information or money.
14 Clues: A form of malware that monitors a person and their device usage. • Gaining unauthorised access to or control of a computer or website. • A form of spyware that monitors every keystroke made by a keyboard user. • A large collection of malware infected, or “zombie” computers or other devices. • ...
Cyber Security 2025-12-10
Across
- A safe copy of data in case it's lost.
- A file that can harm your computer.
- A long, strong password phrase.
- A harmful computer program that spreads.
- A fake messages sent to steal information.
- Keeping information safe and private.
Down
- Protects your network from unauthorized access.
- A unwanted or junk email.
- A method of verifying your identity.
- A criminal who breaks into computer systems.
- Scrambles data so only authorized people can read it.
- A secret word used to log in.
- QUESTIONS Secret questions used to recover accounts.
- A program that protects computers from viruses.
- A wireless network.
15 Clues: A wireless network. • A unwanted or junk email. • A secret word used to log in. • A long, strong password phrase. • A file that can harm your computer. • A method of verifying your identity. • Keeping information safe and private. • A safe copy of data in case it's lost. • A harmful computer program that spreads. • A fake messages sent to steal information. • ...
Cyber security 2022-10-21
Across
- Kind of like fishing but not
- A back door
- A word to describe a type of virus
- A type of virus
- A type of virus
- When someone asks for money while blackmailing your files
- Vi---
Down
- MITI-----
- B--
- A barn animal
- A way to protect yourself from a vi---
- Spy tool to see what you're doing
- What the romans did to their enemy
- Ads that pop up
- W----
15 Clues: B-- • W---- • Vi--- • MITI----- • A back door • A barn animal • A type of virus • A type of virus • Ads that pop up • Kind of like fishing but not • Spy tool to see what you're doing • What the romans did to their enemy • A word to describe a type of virus • A way to protect yourself from a vi--- • When someone asks for money while blackmailing your files
Cybersecurity Fundamental Chapter 1 2022-11-03
Across
- attacks that originate from within an organization.
- the honeynet project.
- unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
- breaks into network or computer systems to discover weakness in order to improve the security of these systems.
- infragard is an example of widespread sharing of cyber intelligent.
- groups of criminals break into computers or networks to gain access for various reason.
- who rally and protest against different political and social ideas
- external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
- somewhere between white and black hat attackers.
- grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
- hobbyists mostly limited to pranks and vandalism, have little or no skills.
- nation common vulnerabilities and exposures (CVE) database.
- black hat hackers who are either self-employed or working for large cybercrime organizations.
- the standard provides a framework for implementing cybersecurity measures within an organization.
14 Clues: the honeynet project. • somewhere between white and black hat attackers. • attacks that originate from within an organization. • nation common vulnerabilities and exposures (CVE) database. • who rally and protest against different political and social ideas • infragard is an example of widespread sharing of cyber intelligent. • ...
CROSSWORD LABS ...... 2025-05-27
Across
- private network-VPN
- tools-browser extention
- protection-firewall
- avoidance-phising
- danger-cyber threats
- login-password
- results-safe search
- level language- alphabets
Down
- protection-antivirus
- threats-malware scan
- data protection-privacy
- language-0,1
- network-network security
- language-menonics
- storage-password manager
15 Clues: language-0,1 • login-password • language-menonics • avoidance-phising • private network-VPN • protection-firewall • results-safe search • protection-antivirus • threats-malware scan • danger-cyber threats • data protection-privacy • tools-browser extention • network-network security • storage-password manager • level language- alphabets
Keamanan siber 2025-01-21
Across
- Sesuatu yang berhubungan dengan sistem komputer dan informasi
- nama lain ruang siber
- tujuan network security untuk melindungi...dari berbagai ancaman cyber
- Sebutan lain siber
- dalam suatu perusahaan mempunyai cyber security untuk mengamankan ... Penggunaan
- mengamankan data pengguna internet adalah ... Keamanan siber
Down
- salah satu contoh keamanan siber
- salah satu tugas keamanan siber
- juga merupakan salah satu contoh keamanan siber
- siber Praktik melindungi komputer jaringan dan perangkat serta data
10 Clues: Sebutan lain siber • nama lain ruang siber • salah satu tugas keamanan siber • salah satu contoh keamanan siber • juga merupakan salah satu contoh keamanan siber • mengamankan data pengguna internet adalah ... Keamanan siber • Sesuatu yang berhubungan dengan sistem komputer dan informasi • siber Praktik melindungi komputer jaringan dan perangkat serta data • ...
Cyber Security cross word puzzle 2023-09-08
Across
- Scammers that try to take your personal information through call, messages, or pop-ups
- A group of private comupters that are used to infect malicious software
- A form of malware that uses advertisements
- An attack that tries to gain access to your computer or device
- A scam someone impersonates you or you impersonate them
- A virus that may harm your device from illegal website ads and etc
- A strict form of security that enhances your accounts security
- An option that can can help protect your business against a loss from a cyber attack
- Best encryption to use for protecting information
- A secure system that blocks unwanted data
- Set of instructions used to operate computers
Down
- Puts control on a database and limits access
- A form of manipulation that is used to get control over a computer
- Helps protect customers privacy
- A scammer that makes a fake email address that looks like the one from your company
- A place or area where a group of networks are used
- A safe way to help secure your account so people can't hack you or use your account
- Bypassing a existing security system of a company
- Keeps all your personal information safe and network
- A form of malware that requires you to pay a ransom
20 Clues: Helps protect customers privacy • A secure system that blocks unwanted data • A form of malware that uses advertisements • Puts control on a database and limits access • Set of instructions used to operate computers • Bypassing a existing security system of a company • Best encryption to use for protecting information • ...
Cyber security challenge 2021-07-14
Across
- type of email attack
- update and ... your computer's software
- network protection device
- unwanted email
- Australian Cyber ... Centre
- pretending to be someone? (email)
- A Microsoft Word document *extension* that may contain malicious code
- encryption attack
Down
- potential harm
- harmful 'replicating' software
- malicious software
- secret phrase for authentication
- another name for cyber criminal
- secret digits to protect your account
- secure network connection
- Microsoft Excel ... can contain malware
- encrypt and protect your USB using Microsoft ...
- strong account protection
18 Clues: potential harm • unwanted email • encryption attack • malicious software • type of email attack • network protection device • secure network connection • strong account protection • Australian Cyber ... Centre • harmful 'replicating' software • another name for cyber criminal • secret phrase for authentication • pretending to be someone? (email) • secret digits to protect your account • ...
Cyber Attack plan 2025-10-14
Across
- A category 1 event is a national cyber-_________
- UK retailer mentioned as a victim of a significant incident (two words)
- Attacks that cause major national disruption are called _______ significant
- Term for the ability of systems to anticipate, absorb, recover, and adapt (two words)
- The government urges firms to treat cyber-security like health and _______
- Country region where many cyber-crime gangs are based (two words)
- Number of teenagers arrested for cyber-attacks this year
- Recommended way to keep copies of emergency plans (two words)
- Many hacks are financially _______
Down
- Term for plans that help firms keep running during an attack (two words)
- A type of software used by criminals to demand ransom
- body giving new cyber-attack advice (abbrev.)
- The digital currency often demanded in cyber-attacks
- Backup plans should be stored _______ (not online)
14 Clues: Many hacks are financially _______ • body giving new cyber-attack advice (abbrev.) • A category 1 event is a national cyber-_________ • Backup plans should be stored _______ (not online) • The digital currency often demanded in cyber-attacks • A type of software used by criminals to demand ransom • Number of teenagers arrested for cyber-attacks this year • ...
Tech Words 2024-04-16
30 Clues: re • Key • The • Rat • Net • Lap • box • key • home • soft • Desk • fire • down • cafe • Opps • covid • phone • photo • light • Multi • Micro • Class • smart • Cable • dessert • Superior • Remember • Security • Information • What do airplanes not have?
Cyber Security 2019-06-21
Across
- The process or techniques used to analyse large sets of existing information to discover previously unrevealed patterns or correlations. (2)
- It is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
- A record showing who has accessed an IT system and what operations the user has performed during a given period. It is a chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security relevant transaction from inception.(2)
- A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems. (2)
- A measurable, physical characteristic or personal behavioral trait by a human being that is used to recognize the identity, or verify the claimed identity, for authentication purposes. Example: Facial images
- E-mail that is not requested. Also known as “unsolicited commercial e-mail” (UCE), “unsolicited bulk e-mail” (UBE), “gray mail” and just plain “junk mail”.
- A _______ is a network security system designed to prevent unauthorized access to or from a private network. It is a gateway that limits access between networks in accordance with local security policy.
Down
- Tricking individuals into disclosing sensitive personal information through deceptive computer-based means, such as through specially crafted emails. It is the use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website.
- These are messages that web servers pass to your web browser when you visit internet sites. Your browser stores each message in a small file and when you request another page from the server, your browser sends the cookie back to the server.
- A __________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications. (2)
- A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers, storage) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (2)
- It a software that disrupts normal computer functions or sends a user’s personal data without the user’s authorization.
- They are programs that claim to perform one function but do another, typically malicious. They can take the form of attachments, downloads, and fake videos/programs.
13 Clues: It a software that disrupts normal computer functions or sends a user’s personal data without the user’s authorization. • The process or techniques used to analyse large sets of existing information to discover previously unrevealed patterns or correlations. (2) • ...
Cyber Security 2023-06-07
Across
- it with a flood of traffic from a team of computers.
- often by using emails or fake websites that look like they are from trusted organizations.
- until it is decrypted using a secret key.
- The amount of data that can pass through a network or part of a network per second.
- programs.
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by
Down
- Software designed to block malware from entering protected networks.
- Consists of code written in a programming language that instructs computers to perform specific tasks.
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- effort to draw attention to political or social issues.
- Attempting to trick people into revealing sensitive information, such as passwords and credit card
- Someone who uses computers and computer networks to disrupt services or share secret information in
13 Clues: programs. • until it is decrypted using a secret key. • it with a flood of traffic from a team of computers. • effort to draw attention to political or social issues. • Software designed to block malware from entering protected networks. • The amount of data that can pass through a network or part of a network per second. • ...
Tech Words 2024-04-16
30 Clues: re • Key • The • Rat • Net • Lap • box • key • home • soft • Desk • fire • down • cafe • Opps • covid • phone • photo • light • Multi • Micro • Class • smart • Cable • dessert • Superior • Remember • Security • Information • What do airplanes not have?
Cyber security 2022-10-21
14 Clues: B-- • Vi--- • W---- • MITI----- • A back door • A barn animal • A type of virus • A type of virus • Ads that pop up • Spy tool to see what you're doing • A word to describe a type of virus • What the romans did to their enemy • A way to protect yourself from a vi--- • When someone asks for money while blackmailing your files
Cyber-Security 2022-11-28
Across
- Software to help prevent unauthorised
- software that monitors and gathers
- Someone trying to hack a website for fun
- Email from 'reputable source' with link to
- Safety online
Down
- computer
- a computer system
- on a person and how they use
- to network
- resources
- spread through the network and use the
- Gaining unauthorised access to or control
- Malicious software that self-replicates
13 Clues: computer • resources • to network • Safety online • a computer system • on a person and how they use • software that monitors and gathers • Software to help prevent unauthorised • spread through the network and use the • Malicious software that self-replicates • Someone trying to hack a website for fun • Gaining unauthorised access to or control • ...
Cyber security 2025-12-14
Across
- Digital information stored or shared on computers
- A security system that blocks unwanted network access
- A tool that secures internet connections and hides online activity
- Protecting computers and networks from digital attacks
- Tricking users into giving away personal information online
Down
- Malware that locks data and demands payment
- A type of malware that spreads by infecting files
- Harmful software designed to damage or spy on devices
- A person who breaks into or tests computer systems
- Security using fingerprints, face scans, or voice patterns
- Scrambling data so only authorized users can read it
- A network of infected devices controlled by attackers
- A secret word or code used to access an account
13 Clues: Malware that locks data and demands payment • A secret word or code used to access an account • Digital information stored or shared on computers • A type of malware that spreads by infecting files • A person who breaks into or tests computer systems • Scrambling data so only authorized users can read it • Harmful software designed to damage or spy on devices • ...
New Horizon's CTE 2023-08-31
Across
- Core skill for criminal justice: __________ solving.
- Key skill for EMTs: Basic __________.
- Hard skill for cyber security: Network __________.
- Core skill for cyber security experts: Threat __________.
- Key skill for auto collision repair: Body __________.
- The process of creating appealing dishes and presentation.
- Skill for nursing aides: Patient __________.
Down
- An essential skill for electricians, often involving complex diagrams.
- Core skill for mechatronics: Robotic __________.
- A construction skill involving joining metal pieces together.
- The medical professional responsible for dispensing medications.
- Core skill for fire science: Fire __________.
- Essential skill for fire science professionals: Emergency __________.
- A core skill for cosmetologists.
- A core skill for dental hygienists: __________ assessment.
15 Clues: A core skill for cosmetologists. • Key skill for EMTs: Basic __________. • Skill for nursing aides: Patient __________. • Core skill for fire science: Fire __________. • Core skill for mechatronics: Robotic __________. • Hard skill for cyber security: Network __________. • Core skill for criminal justice: __________ solving. • ...
Cyber security 2024-01-18
Across
- An example is a key logger
- Type of test where someone tries to hack into a network
- Physical features used to authenticate users
- Finding login details by watching someone enter them
Down
- Using a scenario to persuade a victim to divulge information
- Hidden inside legitimate looking software
- Using fake emails to gain information
- A physical attribute used to authenticate a user
- Any kind of malicious program
- A form of challenge-response test to check that a user is human
- Redirection to a fake website
- Used when logging into a computer or network
- Requires user action to spread
13 Clues: An example is a key logger • Any kind of malicious program • Redirection to a fake website • Requires user action to spread • Using fake emails to gain information • Hidden inside legitimate looking software • Used when logging into a computer or network • Physical features used to authenticate users • A physical attribute used to authenticate a user • ...
Cyber Security 2024-10-10
Across
- – A system designed to block unauthorized access (8)
- – Testing method to evaluate security defenses (11)
- – Software designed to disrupt or damage systems (7)
- – Digital document proving ownership of a public key (11)
- – Distributed attack that overwhelms a system with traffic (4)
- – Fraudulent attempt to obtain sensitive information (8)
- – Malware that demands payment to restore access (10)
Down
- – Software that secretly monitors user activity (7)
- – Process of converting data into a code (10)
- – A weakness in a system that can be exploited (13)
- force – Attack method involving trial and error (10)
- – Process of converting data into a fixed-size value (7)
- – A type of malware disguised as legitimate software (6)
13 Clues: – Process of converting data into a code (10) • – Software that secretly monitors user activity (7) • – A weakness in a system that can be exploited (13) • – Testing method to evaluate security defenses (11) • force – Attack method involving trial and error (10) • – A system designed to block unauthorized access (8) • ...
Cyber Awareness 2023-10-31
Cyber Crossword 2023-12-07
Across
- Software designed to harm or exploit computer systems.
- Deceptive attempts to acquire sensitive information via email.
- (4,3)Exploits unknown vulnerabilities, posing a high risk.
- (6,11)Manipulating individuals to divulge confidential information.
- (5,3) Ethical hackers who use their skills to help organisations improve security.
- The boundary or border of a network, often protected by firewalls.
- Unauthorised access or breach into system.
- Protects data by converting it into a secret code.
- (3,6)Enhanced security requiring authentication through two distinct methods.
Down
- Weaknesses in a system that can be exploited.
- (8,8) A structured approach to address and manage the aftermath of a cyber incident.
- Updating software to fix vulnerabilities and improve security.
- The point at which a device connects to a network, vulnerable to cyber threats.
- Malicious software that encrypts files and demands payment for their release.
- Verifying the identity of a user.
- A secret word or code needed to gain access.
- Acts as a barrier to prevent unauthorised access.
- Authentication based on unique physical or behavioural characteristics.
18 Clues: Verifying the identity of a user. • Unauthorised access or breach into system. • A secret word or code needed to gain access. • Weaknesses in a system that can be exploited. • Acts as a barrier to prevent unauthorised access. • Protects data by converting it into a secret code. • Software designed to harm or exploit computer systems. • ...
Cyberbully Crossword 2022-05-16
Across
- An important piece of online security
- Potentially fake news
- Something a bully does to the victim
- A random, unknown person
- Something that should be done to cyberbullying
- The act of bullying online
Down
- A form of cyber bullying
- To be safe online
- Someone who could get involved in serious cases
- media Where cyber bulling takes place
- What all social media accounts should be set on
- A person who constantly harasses and picks on someone else
12 Clues: To be safe online • Potentially fake news • A form of cyber bullying • A random, unknown person • The act of bullying online • Something a bully does to the victim • An important piece of online security • media Where cyber bulling takes place • Something that should be done to cyberbullying • Someone who could get involved in serious cases • ...
VCRA July 2024 Puzzle 2024-07-12
Across
- Data recovery solution
- Target-specific phishing
- Unauthorized data exposure
- Secure code conversion process
- Malicious computer network
- Security for web connections
- Relating to computer security
- Monitors and controls network traffic
- Traffic disrupting attack
Down
- Following legal standards
- Fixes software vulnerabilities
- Unauthorized computer access
- Review of cybersecurity practices
- Potential negative impact
- Data-locking extortion malware
- Software meant to damage systems
- Sensitive info stealing method
- Potential for IT loss
18 Clues: Potential for IT loss • Data recovery solution • Target-specific phishing • Following legal standards • Potential negative impact • Traffic disrupting attack • Unauthorized data exposure • Malicious computer network • Unauthorized computer access • Security for web connections • Relating to computer security • Fixes software vulnerabilities • Data-locking extortion malware • ...
Cyber security 2022-11-28
Across
- infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
- when human users of a system are tricked into providing confidential information
- software that automatically checks for available updates
- software that scans any file that is able to execute code
- large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system
- unwanted software that monitors and gathers information
Down
- Trojans, spyware, adware, and worms are all examples of this
- these replicate themselves but do not attach themselves to files as a virus does
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data
- malicious form of self-replicating software
- checks incoming and outgoing network traffic
- piece of software that appears to perform a useful function
- automated programs that perform tasks repeatedly
13 Clues: malicious form of self-replicating software • checks incoming and outgoing network traffic • automated programs that perform tasks repeatedly • unwanted software that monitors and gathers information • software that automatically checks for available updates • software that scans any file that is able to execute code • ...
Cyber security 2022-10-21
14 Clues: B-- • Vi--- • W---- • MITI----- • A back door • A barn animal • A type of virus • A type of virus • Ads that pop up • Spy tool to see what you're doing • A word to describe a type of virus • What the romans did to their enemy • A way to protect yourself from a vi--- • When someone asks for money while blackmailing your files
Cyber Security 2025-06-20
Cyber Crossword 2023-12-07
Across
- Authentication based on unique physical or behavioural characteristics.
- The point at which a device connects to a network, vulnerable to cyber threats.
- Weaknesses in a system that can be exploited.
- Software designed to harm or exploit computer systems.
- Malicious software that encrypts files and demands payment for their release.
- Updating software to fix vulnerabilities and improve security.
- (8,8) A structured approach to address and manage the aftermath of a cyber incident.
- Protects data by converting it into a secret code.
- Acts as a barrier to prevent unauthorised access.
- A secret word or code needed to gain access.
Down
- (6,11)Manipulating individuals to divulge confidential information.
- Exploits unknown vulnerabilities, posing a high risk.
- Deceptive attempts to acquire sensitive information via email.
- Verifying the identity of a user.
- Enhanced security requiring authentication through two distinct methods.
- The boundary or border of a network, often protected by firewalls.
- (5,3) Ethical hackers who use their skills to help organisations improve security.
- Unauthorised access or breach into system.
18 Clues: Verifying the identity of a user. • Unauthorised access or breach into system. • A secret word or code needed to gain access. • Weaknesses in a system that can be exploited. • Acts as a barrier to prevent unauthorised access. • Protects data by converting it into a secret code. • Exploits unknown vulnerabilities, posing a high risk. • ...
Learning Aim B: Cyber security 2025-02-05
Across
- A security risk that comes from within an organisation, such as an employee.
- A security risk from outside an organisation, like a hacker or malware attack.
- Manipulating people into revealing confidential information.
- Malware that locks or encrypts a user’s files, demanding payment for access.
- The process of verifying a user’s identity before granting access.
- A person who illegally accesses or manipulates computer systems.
- Software designed to detect and remove malicious programs.
Down
- Software that secretly gathers user information without permission.
- A controlled cyber attack to identify security weaknesses.
- Malicious software designed to harm or exploit systems
- A type of malware that disguises itself as legitimate software.
- A cyber attack using fake emails to trick users into giving personal information.
- The process of converting data into a code to prevent unauthorized access.
- A security system that controls incoming and outgoing network traffic.
14 Clues: Malicious software designed to harm or exploit systems • A controlled cyber attack to identify security weaknesses. • Software designed to detect and remove malicious programs. • Manipulating people into revealing confidential information. • A type of malware that disguises itself as legitimate software. • ...
Cyber Security 2021-10-07
Across
- ethics being authorized to attempt to gain unauthorized access to a computer,
- scramble,
- the practice of encoding information so only authorized people can read it,
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
- the practice of protecting systems networks, and programs from digital attacks,
- footprint a data trail you unintentionally leave online,
- hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
- the practice of solving and writing encryptions,
- a type of malicious software designed to block access to a computer system until a sum of money is paid,
- hacking to promote a political agenda or social change,
- a form of protection for intellectual property usually applying to artistic works,
- the use of electronic communication to bully a person,
- literacy having the ability to find information evaluate information credibility and use information effectively,
13 Clues: scramble, • the practice of solving and writing encryptions, • the use of electronic communication to bully a person, • hacking to promote a political agenda or social change, • footprint a data trail you unintentionally leave online, • the practice of encoding information so only authorized people can read it, • ...
cyber security 2025-10-09
Across
- when somebody creates a wifi that is unsecure
- a email to get you to put in your personal details
- a cheaper version of wiring networks
- an early version of the internet
- created by Tim beeriness lee
- another way to name a website
Down
- a way to protect you personal information
- diferent to a search engine
- network of networks
- a new way where data is sent via light
- conect to the internet using this
- mobile______
- part of a message
13 Clues: mobile______ • part of a message • network of networks • diferent to a search engine • created by Tim beeriness lee • another way to name a website • an early version of the internet • conect to the internet using this • a cheaper version of wiring networks • a new way where data is sent via light • a way to protect you personal information • ...
Women in Forensics 2021-01-17
Across
- US Navy’s chief cryptanalyst who served during World War I and World War II.
- a women led startup providing security solutions for strong 2FA using U2F, OTP, PIV,etc.
- largest initiative to increase women’s participation in the cyber field in Europe.
- the first woman to speak at DEFCON, the world’s greatest hacker conference.
- India’s first woman cybercrime investigator
- a DSCI led initiative to enhance cyber security education for girls in India
Down
- a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology
- a security Camp supported by the NSA being largest girls-only residential camp in the country.
- a non profit organization which launched a program "100 Women in 100 Days" to uplift girls in cyber security
- a process in data cloning that spreads the data across the available drives in chunks.
- percentage of women in cybersecurity according to report by Frost and Sullivan in 2013.
11 Clues: India’s first woman cybercrime investigator • the first woman to speak at DEFCON, the world’s greatest hacker conference. • US Navy’s chief cryptanalyst who served during World War I and World War II. • a DSCI led initiative to enhance cyber security education for girls in India • ...
Cyber-security edexcel 2022-03-07
Across
- a _____ attack is where a hacker attempts to steal user information, usually in the format of a fake login screen.
- malware that spies on the user discreetly
- an electronic attack on a computer system
- updates are sometimes referred to as ______
- often, the weakest link in a computer system is the ______
- A backup that only backs up what changed is called an ________ backup
- companies will often a strict backup ______
- the preferred currency of hackers as it is decentralized
- software that attempts to remove potential malware from your computer
- is what anti-malware does to identify malware by its behaviour
- a type of software that logs all keys to a file
- ____ pro quo is latin for "this for that" and in CS is where the victim is offered a benefit for using the software
Down
- ________ encryption is where something is encrypted and decrypted with the same key
- _______ software is software that is not up to date and could be vulnerable to attacks
- The type of malware that holds the user's files ransom (encrypted) until they pay
- any type of software that is designed to harm the computer it is installed on.
- a malicious piece of software that will self replicate
- anti malware software recognises malware based on the definitions or _______
- a malicious piece of software that acts as another piece of software to get the user to install it.
- encrypted plain text is referred to as ____ text
- social ________ is where the hacker will convince someone to give them access to the computer system
21 Clues: malware that spies on the user discreetly • an electronic attack on a computer system • updates are sometimes referred to as ______ • companies will often a strict backup ______ • a type of software that logs all keys to a file • encrypted plain text is referred to as ____ text • a malicious piece of software that will self replicate • ...
cyber security vocabulary 2023-09-07
Across
- information on a computer
- sofware that creates representations of servers, storage and networks
- connects a computer to internet
- an extra layer of security
- an attack via email or text in an attempt at information
- a collection of documents
- false information used to obtain information
- handles cpu and high speed ram
- created on the internet to serve a purpose
Down
- software that prevents attacks
- handles peripherals
- not connected to the internet
- an increased use in cpu
- an illegitimate source, not mainstream
- connection between computers
- information withheld in exchange for money
- an account created to send information
- preserves the condition of a computer
- letter numbers and symbols combined to prevent unauthorized entry
- physical parts of a computer
20 Clues: handles peripherals • an increased use in cpu • information on a computer • a collection of documents • an extra layer of security • connection between computers • physical parts of a computer • not connected to the internet • software that prevents attacks • handles cpu and high speed ram • connects a computer to internet • preserves the condition of a computer • ...
Cyber Security Awareness 2023-10-19
Across
- Ethical hacker.
- Network of compromised devices
- Software to detect and remove threats.
- Redirecting website traffic
- Software that tracks user behavior.
- Digital crime investigation.
- Self-replicating malicious software.
- Software that records keystrokes
- Security barrier for online threats.
- Deceptive emails to steal information.
- Hostile takeover of online activity.
Down
- Proving your identity online.
- Holding data hostage for money.
- Unauthorized data access.
- Unauthorized entry into a system.
- Security event or occurrence.
- Weakness that can be exploited.
- Faking an identity online.
- Method to make data unreadable without a key.
- Harmful software.
20 Clues: Ethical hacker. • Harmful software. • Unauthorized data access. • Faking an identity online. • Redirecting website traffic • Digital crime investigation. • Proving your identity online. • Security event or occurrence. • Network of compromised devices • Holding data hostage for money. • Weakness that can be exploited. • Software that records keystrokes • ...
Cyber Security Revision 2024-06-03
Across
- Gaining access to data or systems, often illegally.
- This is the part of the web that can be searched by a search engine, such as Google.
- A very basic type of encryption used by the Romans where the alphabet is rotated.
- Using stolen data to pretend to be someone else, often for financial gain.
- A method of security where a code is emailed or sent to a mobile device.
- This is a part of the web that is not monitored. People often use the dark web for illegal activities, including drugs and hacking.
- A basic way of protecting data.
- Whose responsibility is it to keep your data secure?
- A way of scrambling data using a key so it can't be understood without the key.
Down
- A type of hacker who hacks legally, often to test systems.
- Using the Internet to send horrible messages or to threaten people.
- This is part of the web that is hidden behind passwords, such as bank accounts.
- Software used to restrict access to a computer network.
- A type of hacker who hacks illegally, often for financial gain.
- Tricking a user into giving out personal information, such as bank details or passwords. Often done through email.
- Type of software used to hack or gain access to people's data.
- Type of email that is unwanted or not asked for. Often used in scams.
- A piece of software used to detect and remove viruses.
- Using sophisticated methods to convince people to trust you in order to gain access to their data or systems illegally.
- A type of data attack where data is encrypted and the owner is asked to pay a fee before the data is released.
20 Clues: A basic way of protecting data. • Gaining access to data or systems, often illegally. • Whose responsibility is it to keep your data secure? • A piece of software used to detect and remove viruses. • Software used to restrict access to a computer network. • A type of hacker who hacks legally, often to test systems. • ...
cyber security terms 2025-03-13
Across
- unlocks data for a price
- text phishing
- prolonged cyber attack
- used for large scale attacks
- self replicating malware
- ai generated images/video
- cybercriminal hacker
- prevents unauthorized access
- tricks user into clicking something
Down
- floods target with traffic
- never trust, always verify
- man in middle
- malware disguised as real program
- pretending to be legitimate
- phone or voice to trick individuals
- privacy network
- secretly monitors activity
- controls traffic entering/leaving
- software designed to harm
- unauthorized access of personal data
20 Clues: man in middle • text phishing • privacy network • cybercriminal hacker • prolonged cyber attack • unlocks data for a price • self replicating malware • software designed to harm • ai generated images/video • floods target with traffic • never trust, always verify • secretly monitors activity • pretending to be legitimate • used for large scale attacks • prevents unauthorized access • ...
Cyber Security Awareness 2025-04-07
Across
- The act of attempting to crack passwords or keys through exhaustive attempts
- Indian cybersecurity nodal agency
- A person who gains unauthorized access to data
- An Act to provide for the processing of digital personal data
- Phishing attack that uses QR codes to deceive victims and steal sensitive information
- Malicious tool that records keystrokes
- Cyberattack where a cybercriminal pretends to be a trusted entity or individual to gain unauthorised access to sensitive systems, data
- Cyber cell governed by MHA
- Ministry responsible for cybersecurity in India
- An Attack technique used by cybercriminals to steal sensitive financial information from individuals and businesses without their knowledge
- Cybercriminals pose as law enforcement officers or government officials and contact individuals
- Fix released to remove software vulnerabilities
Down
- A type of software designed to damage or disrupt systems
- A fake site mimicking a legitimate one
- Data encrypted to prevent unauthorized access
- Telecom Regulatory Authority of India (TRAI) portal, which helps users report fraudulent phone numbers
- Attack where users are tricked into giving up confidential info
- Type of attack exploiting human psychology
- Unwanted software designed to throw ads
- Powerful technology merging "deep learning" and "fake“, can be used to create incredibly realistic manipulated media
- Telecom Regulatory Authority of India (TRAI) portal, which helps users to report suspicious incoming international calls
- India's initiative for citizen cyber hygiene and digital cleanliness
- Type of software that tracks user activity without consent
- Cyber Crisis Management Plan
- Multi-Factor Authentication
- Unwanted or unsolicited emails, often used for phishing
- Organization responsible for critical infra protection in India
- Indian law governing IT offences
28 Clues: Cyber cell governed by MHA • Multi-Factor Authentication • Cyber Crisis Management Plan • Indian law governing IT offences • Indian cybersecurity nodal agency • A fake site mimicking a legitimate one • Malicious tool that records keystrokes • Unwanted software designed to throw ads • Type of attack exploiting human psychology • Data encrypted to prevent unauthorized access • ...
CYBER SECURITY TERMS 2022-12-06
Across
- mandatory control enforcement used to prevent malware
- making copies of important files
- a software that pretends to be another software
- a network of private computers infected with malware
- a software which controls network traffic to and from a computer
- used to hold your device at ransome
- a file with a signature
- a network device that monitors traffic
- used by hackers to execute commands
- a method by which authorized and unauthorized users are able to get around normal security measures
Down
- blocks popups
- prevents spyware
- a software that records everything you type
- a software used to spy on a device
- malware that self replicates
- a software to prevent viruses
- used by hackers to damage computers,
- a malicious software bundle
- an unwanted software that puts ads on your screen
- someone who controls a bot net
- an update that fixes a vulnerability
21 Clues: blocks popups • prevents spyware • a file with a signature • a malicious software bundle • malware that self replicates • a software to prevent viruses • someone who controls a bot net • making copies of important files • a software used to spy on a device • used to hold your device at ransome • used by hackers to execute commands • used by hackers to damage computers, • ...
CYBER SECURITY // WENDY 2024-12-05
Across
- fingerprint, retina scan, or voice pattern
- testers who are paid to probe networks
- barrier between a computer OS and the network
- common tool used by many Linux administrators
- barrier between two entities
- series of letters, numbers, and special characters
- what users can do after they are logged on
- rules
- supply two or more types of authentication (abr.)
- create an exact image
Down
- barrier between networks
- username/password
- security enhancement for servers
- control who has access to the network
- specially allocated disk area that holds information
- users identify themselves to gain access to network
- changes since last full back up
- attackers who do not report problems, but instead disseminate
- smart card or key
- framework/other protocol provide encryption(abr.)
20 Clues: rules • username/password • smart card or key • create an exact image • barrier between networks • barrier between two entities • changes since last full back up • security enhancement for servers • control who has access to the network • testers who are paid to probe networks • fingerprint, retina scan, or voice pattern • what users can do after they are logged on • ...
PSD 2020-08-31
Across
- Deputy Heads must __________ the online end-to-end availability of services and their ease of use to complement all service delivery channels.
- The CIO of Canada will approve an annual, forward-looking three-year __________-wide plan that establishes strategic direction for the integrated management of service, information, data, IT, and cyber security.
- government portal, Deputy Heads are responsible for maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada _______ _________ _____.
- decision, Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.
- by design, Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________
- service experience, The objective of the PSD is that ______ ______ ________ and government operations are improved through digital transformation approaches
Down
- Deputy Heads are responsible for establishing __________ governance to ensure the integrated management of service, information, data, IT, and cyber security within their department.
- In alignment with a 2016 Direction, the PSD includes requirements for the CIO of Canada and Deputy Heads to support innovation and _____________.
- Act, Deputy Heads are responsible for ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the _________ _____ and any other relevant legislation, policy or agreement.
- data, The CIO of Canada is responsible for prescribing enterprise-wide __________ and ____________ standards for quality, accessibility and data interoperability.
- capacity, Section 4.5 of the PSD includes requirements for the CIO of Canada and Deputy Heads on supporting __________ __________ and capability.
- Government, The PSD supports the mandate of the Minster for _______ _____________
- Standards, The management of the functions under the PSD is guided by principles and best practice of the Government of Canada ______________ _______________
- on Service and Digital, Articulates how Government of Canada organizations manage service delivery, information and data, information technology, and cyber security in the digital era
- Information Officer, The _____________ ___________________ _____________ of Canada provides advice to the President and the Secretary of the Treasury Board of Canada about governing and managing enterprise-wide information, data, IT, cyber security, and service design and delivery.
- security, The CIO of Canada is responsible for defining ______ ________ requirements to ensure that Government of Canada and departmental information and data, applications, systems and networks are secure, reliable and trusted.
16 Clues: Government, The PSD supports the mandate of the Minster for _______ _____________ • decision, Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems. • by design, Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________ • ...
Cyber Security 2023-09-12
Task 7 2025-08-07
Across
- A digital delivery service for software.
- A system which is used to detect threats from specific endpoints.
- Tool used for identifying and addressing vulnerabilities.
- Cloud computing that spreads data across multiple locations.
- Concept that everything can be automated.
- Technology that is made to not affect the environment.
- A system of several tools to enhance cyber security.
- Strategies, methods and technologies used to analyse business information.
- Insurance which is designed to cover legal costs and expenses from cyber attacks.
Down
- Computer program that learns and produces outputs.
- Multi step login process that uses something other than a login.
- A term refering to VR, AR
- Practice and technology to ensure security.
- A digital vr world made by Meta.
- An experience with one app from different points.
- A computer that uses quantum mechanics to work.
16 Clues: A term refering to VR, AR • A digital vr world made by Meta. • A digital delivery service for software. • Concept that everything can be automated. • Practice and technology to ensure security. • A computer that uses quantum mechanics to work. • An experience with one app from different points. • Computer program that learns and produces outputs. • ...
Introduction to Cybersecurity 2024-09-18
Across
- Protection of computer systems, networks, and data from digital attacks
- IoT devices increase our ____ to cyber attacks
- Assurance that systems and data are accessible by authorized users
- Ensuring information is protected from unauthorized or unintentional alterations
- Secure Systems with ____ and other security measures
- _______ contain a combination of numbers, letters, and symbols
- ______ store and send personal information
Down
- Protection of information from people who are not authorized to view it
- Security measure that should be guaranteed in every secured system
- ________ workers are needed to build more secure systems and respond to threats
- Cyber attacks threaten security,_______, and economic growth
- Another name for Internet of things
12 Clues: Another name for Internet of things • ______ store and send personal information • IoT devices increase our ____ to cyber attacks • Secure Systems with ____ and other security measures • Cyber attacks threaten security,_______, and economic growth • _______ contain a combination of numbers, letters, and symbols • ...
Cyber Security Crossword 2023-09-12
Across
- is the programs and other operating information used by a computer.
- make (something) more modern or up to date.
- is the state of being free from danger or threat.
- an account given of a particular matter, especially in the form of an official document, after thorough investigation or consideration by an appointed person or body.
- a secret word or phrase that must be used to gain admission to something.
- verifies the claimed identity of a user, device, or other entity in a computer system.
- is a set of related web pages located under a single domain name, typically produced by a single person or organization.
- a layered structure indicating what kind of programs can be built
Down
- an aggressive and violent action against a person or place.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- placed (a document) in a cabinet, box, or folder in a particular order for preservation and easy reference.
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- a computer or computer program which manages access to a centralized resource or service in a network.
- preserve or guarantee by means of formal or legal measures
- discover or identify the presence or existence of.
- an advertisement.
- a dishonest scheme; a fraud.
- facts and statistics were collected together for reference or analysis.
- is regarded as reliable or truthful.
- messages are distributed by electronic means from one computer user to one or more recipients via a network.
20 Clues: an advertisement. • a dishonest scheme; a fraud. • is regarded as reliable or truthful. • make (something) more modern or up to date. • is the state of being free from danger or threat. • discover or identify the presence or existence of. • preserve or guarantee by means of formal or legal measures • an aggressive and violent action against a person or place. • ...
Cyber Security Terms 2023-09-07
Across
- floods a server with traffic to prevent users from accessing internet services
- requires additional information when a user is logging in
- ensure that customers get to the real website when the URL is typed into the address bar
- encrypts the connections between your device and internet
- this should be complex, long, and unique
- allows devices to communicate over the internet
- gathers information about a person or thing without your permission
- this may seem harmless at first but it can control your computer and data
- information that is not written in plain text so that it cannot be read by other people
- an email or text that may lead users to reveal sensitive information
- this allows you to access you files through the internet at any time
Down
- a type of malware that can spread from one computer to another by replicating itself
- prevents you from accessing data on your device
- a process that verifies a user or device before providing them with access
- a malicious code that harms computers and systems
- happens when someone tries to steal your information by appearing to be a trusted person or source
- an email authentication tool that specifies servers that are allowed you to send emails to using your business domain name
- a software that detects and removes security threats from a computer
- records and monitors the keystrokes that an user created
- controls network traffic and blocks unauthorized access
20 Clues: this should be complex, long, and unique • prevents you from accessing data on your device • allows devices to communicate over the internet • a malicious code that harms computers and systems • controls network traffic and blocks unauthorized access • records and monitors the keystrokes that an user created • ...
cyber security terms 2023-03-16
Across
- Ensuring that someone is not an imposter
- software that deletes/corrupts files
- Malware that hides another program
- False email warning
- Device generates alarms when
- False email/web display trick
- employees who attack their own organizations
- launch attacks against other users
- secret combination of letters/numbers
- Unwanted email messages
Down
- Malicious programs using computer network
- bullying that takes place online
- attacks a nation's computer system
- Unwanted high-frequency energy
- The process of "scrambling" information
- short duration of voltage increase
- Malicious computer code that reproduces
- Drops in voltage last hours
- stalking someone on the internet
- prevents users from using their device without paying
20 Clues: False email warning • Unwanted email messages • Drops in voltage last hours • Device generates alarms when • False email/web display trick • Unwanted high-frequency energy • bullying that takes place online • stalking someone on the internet • attacks a nation's computer system • Malware that hides another program • short duration of voltage increase • ...
cyber security puzzle 2025-03-02
Across
- A type of malware that locks files and demands payment for access
- A network security system that monitors and controls incoming and outgoing traffic
- A manipulation technique used to deceive users into giving up confidential data
- The process of converting data into a coded format for security
- An update designed to fix security vulnerabilities in software
- An attack that tricks users into revealing sensitive information
- A hidden entry point in software that allows unauthorized access
- A cyber attack that overwhelms a network or service with traffic
- A tool used to create a secure, encrypted connection over the internet
- Malicious software that secretly gathers user information
Down
- An attack that tries multiple password combinations until the correct one is found
- Malicious software that can damage files or steal information
- A method of securing passwords by transforming them into fixed-length values
- A security vulnerability that is exploited before a fix is available
- Software embedded in hardware that controls device functionality
- A security practice of verifying user identity
- A secret key used for encrypting and decrypting messages
- A type of malware disguised as legitimate software
- A network of compromised computers controlled by an attacker
- A type of software that records keystrokes to steal passwords
20 Clues: A security practice of verifying user identity • A type of malware disguised as legitimate software • A secret key used for encrypting and decrypting messages • Malicious software that secretly gathers user information • A network of compromised computers controlled by an attacker • Malicious software that can damage files or steal information • ...
Cyber Security Puzzle 2023-10-05
Across
- Process of protecting data by secret code
- When a criminal uses text messages to trick you
- A sickness in your system
- The potential for losing valuable information
- A system that prevents unauthorized access
- A program that hides functions that are potentially malicious
- A software program that enters a computer system without the owner's knowledge or consent
- A routine fix for a computer program
- Device used to identify a human person entering data
- What you should do if you see any anomaly
- Unauthorized user with malicious intent
- A self-replicating malicious program
Down
- Your password is like a ___, use it regularly, change it often and do not share it with anyone else
- No reputable organization is going to ask you for private information via
- To pose or pretend to be another person in email
- Human characteristics used for identification
- A criminal tool used for extortion
- Vast underbelly of the internet
- A small computer defect
- Phishing for the big prize!
- Don't ___ any file you weren't expecting to receive
- If there is not a padlock icon in the search bar the website may be ___
22 Clues: A small computer defect • A sickness in your system • Phishing for the big prize! • Vast underbelly of the internet • A criminal tool used for extortion • A routine fix for a computer program • A self-replicating malicious program • Unauthorized user with malicious intent • Process of protecting data by secret code • What you should do if you see any anomaly • ...
Cyber Security Review 2021-09-08
Across
- Use IP Address to pass the data between networks
- Reduce collisions because split the
- is software/hardware based network security system that controls the in and out network traffic
- _____________ Control Protocol
- Downloads onto a computer disguised as a legitimate program
- software intentionally designed to harm a network, server, or computer
- Data arriving to a _____ port is repeated on all the other ports
- Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
- Intentionally disrupting, defacing or destroying a Web site
- Destroy data when certain conditions are met
- is an object, person, or other entity that represents a constant danger to an asset
- is a flexible filament of very clear glass capable of carrying information in the form of light
- This address is a 48 bits long binary number unique for every network card
- A type of software security
- These IPs do not change. Whether you
- translates the locally significant source address into a globally unique address
- Is a device that plugs into a motherboard and provides ports for the network cable connections
- Doesn’t needs user intervention to replicates
- These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
- Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
- is a series of LANs linked together to form a network in an extended area
- Type of network that consists of a series of computers linked together to form a network in a circumscribed location
- person who intends to gain unauthorized access to a computer systems
- It forward the information based on MAC address list and ports
- your machine or reboot your router it remains the
Down
- Topology in which all nodes indirectly connect to each other through one or more switches
- A group of computers and associated devices that are connected by communications facilities
- These losses refer to damages of the operating capability of an organisation
- Its purpose is to regenerate signals distorted by transmission loss due to attenuation
- is a network that is spread over a very small area
- domains
- These losses refer to damages to the wealth of an organisation
- Activated when infected program is loaded in memory and executed by its own or a user action
- between computers on a network plural)
- In this topology data travels in one direction using a control signal called a ‘token’
- Fraudulent email leading to a fraudulent website
- Network topology where all the nodes are joined to one cable
- The practice and study of techniques for secure communication
- A type of physical security
- cable type that is commonly used on Ethernet networks
- is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- to a computing device or node when it’s connected to a network
- is a temporary IP address that is
- Is a set of rules that governs the
- occurs when someone steals your personal information to commit crimes in your name
- the process of converting plaintext to ciphertext
46 Clues: domains • A type of physical security • A type of software security • _____________ Control Protocol • is a temporary IP address that is • Is a set of rules that governs the • Reduce collisions because split the • These IPs do not change. Whether you • between computers on a network plural) • Destroy data when certain conditions are met • ...
Cyber security - 1 2025-07-08
Across
- Granting access to resources based on identity and permissions.
- Tools that monitor end-user devices to detect and respond to threats.
- Blocking known harmful software or processes.
- A program where organizations reward individuals for finding vulnerabilities.
- An incident in which sensitive data is accessed without authorization.
- Strategies and tools to prevent unauthorized data transfer or access.
- Mechanisms that restrict access to systems and data.
- Encryption using a pair of keys – one public and one private.
- Becoming desensitized to frequent security alerts.
- A modern security approach that provides integrated security across distributed systems.
- A form of public key encryption based on elliptic curves.
- A method or code that takes advantage of a vulnerability.
Down
- A cryptographic technique for verifying the authenticity of digital messages.
- An attack that floods a system with traffic to make it unavailable.
- A network of infected computers controlled remotely.
- An entity that issues digital certificates.
- Trying many combinations to guess a password or encryption key.
- A framework for developing, implementing, and monitoring IT governance.
- Ensuring that information is accessible only to those authorized to have access.
- Software used to collect, preserve, and analyze digital evidence.
- The sum of all the points in a system that are exposed to an attacker.
- Ensuring that authorized users have access to information and systems when needed.
- Software that detects and removes malicious software.
- Verifying the identity of a user, device, or system.
- Routine practices for maintaining system health and improving security.
- Documentation of who handled evidence and when.
- Part of the internet not indexed by standard search engines and often used for illegal activity.
- A security measure where a device is physically isolated from unsecured networks.
- An attack that injects malicious scripts into content viewed by users.
- A prolonged and targeted cyberattack.
30 Clues: A prolonged and targeted cyberattack. • An entity that issues digital certificates. • Blocking known harmful software or processes. • Documentation of who handled evidence and when. • Becoming desensitized to frequent security alerts. • A network of infected computers controlled remotely. • Mechanisms that restrict access to systems and data. • ...
Cyber Security Brunei 2025-08-06
Across
- People who threaten you with something about you.
- People who get into other people account without permission.
- where all your online information is kept
- Minecraft, Roblox, PUBG
- something to keep your account safe
- 'keselamatan' in English
- Google, Mozilla, Opera
- people who bully others online
- Tricking others online for important information.
- Off the internet.
- 'bahaya' in English
- Hanging out with friends, talking
- To keep things in secret, you do __________.
Down
- App to kill computer virus.
- Instagram, tiktok, Facebook
- Microsoft words, Paint, Powerpoint
- Bad software
- 'Pengesahan' in English
- things in the computer
- If you are in the internet, you are _______.
- App to keep safe
- People who use the internet
- 'Culik' in English
23 Clues: Bad software • App to keep safe • Off the internet. • 'Culik' in English • 'bahaya' in English • things in the computer • Google, Mozilla, Opera • Minecraft, Roblox, PUBG • 'Pengesahan' in English • 'keselamatan' in English • App to kill computer virus. • Instagram, tiktok, Facebook • People who use the internet • people who bully others online • Hanging out with friends, talking • ...
Cyber Security Terms 2025-10-01
Across
- Security device/software controlling inbound/outbound network traffic.
- Any malicious software (virus worm Trojan etc.).
- Distributed Denial of Service Attack that overwhelms a target with traffic from multiple sources.
- Malware that encrypts files and demands payment.
- Challenge-response test to distinguish humans from bots.
- Social engineering attack tricking users into revealing sensitive info.
- Malware designed to hide presence and maintain privileged access.
- Advanced Encryption Standard A widely used symmetric encryption algorithm for securing data.
- Common Vulnerabilities and Exposures Database of known security vulnerabilities.
- Virtual Private Network Encrypts internet traffic to secure communications.
- Internet of Things Connected smart devices that often lack strong security.
- Bring Your Own Device Policy allowing employees to use personal devices at work raising security challenges.
- Force Attack Method of guessing passwords or keys by trying all possibilities.
- Security model: Confidentiality Integrity Availability.
- Public Key Infrastructure Framework for managing digital certificates and encryption.
- Multi-Factor Authentication Using more than one method to verify identity.
- Man-in-the-Middle Attack where an adversary intercepts communications between two parties.
Down
- Overflow Exploit where extra data overflows into unintended memory space.
- Security Information and Event Management System collecting and analyzing security logs.
- Remote Access Trojan Malware allowing attackers to control systems remotely.
- Protecting cloud-based assets and services.
- Domain Name System Translates domain names into IP addresses.
- One-way transformation of data into fixed-length values (used for password storage).
- Address Resolution Protocol Protocol that maps IP addresses to MAC addresses; often abused in ARP spoofing attacks.
- Advanced Persistent Threat A prolonged targeted cyberattack where an intruder remains undetected for an extended time.
- Network of compromised devices controlled remotely for attacks.
- Decoy system designed to lure and study attackers.
- Malware that records keystrokes to steal credentials.
- Access Control List Rules that define which users or systems can access specific resources.
- Encoding data to make it unreadable without a key.
- Intrusion Detection System Monitors traffic for suspicious activity.
- Penetration Testing Authorized simulated attack to identify weaknesses.
- Intrusion Prevention System Detects and blocks attacks in real-time.
- Demilitarized Zone Network segment exposed to the internet but isolated from internal systems.
- Management Process of updating software to fix vulnerabilities.
35 Clues: Protecting cloud-based assets and services. • Any malicious software (virus worm Trojan etc.). • Malware that encrypts files and demands payment. • Decoy system designed to lure and study attackers. • Encoding data to make it unreadable without a key. • Malware that records keystrokes to steal credentials. • Security model: Confidentiality Integrity Availability. • ...
Cyber Security Puzzle 2020-04-10
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- Refers to a company security policy that allows for employees’ personal devices to be used in business.
- A defensive technology designed to keep the bad guys out.
- Evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- An acronym that stands for distributed denial of service – a form of cyber attack.
- An internet version of a home address for your computer, which is identified when it communicates over a network.
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
Down
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- A set of programs that tell a computer to perform a task.
- A technique used by hackers to obtain sensitive information.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
20 Clues: A set of programs that tell a computer to perform a task. • A defensive technology designed to keep the bad guys out. • A technique used by hackers to obtain sensitive information. • An acronym that stands for distributed denial of service – a form of cyber attack. • A group of computers, printers and devices that are interconnected and governed as a whole. • ...
Cyber Security Awareness 2021-10-13
Across
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
- Alerts used as a warning of danger.
- an attempt by hackers to damage or destroy a computer network or system.
- Something that shows up in a email
- An attack focusing on people rather than technology
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
- a dishonest scheme; a fraud.
- A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
- a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
Down
- Identity and Privacy Protection
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
- Someone attempting to create Identity fraud
- Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
- the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
- The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
- Hard to detect both by Users
22 Clues: a dishonest scheme; a fraud. • Hard to detect both by Users • Identity and Privacy Protection • Something that shows up in a email • Alerts used as a warning of danger. • Someone attempting to create Identity fraud • An attack focusing on people rather than technology • an attempt by hackers to damage or destroy a computer network or system. • ...
Cyber Security Awareness 2021-10-13
Across
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- Something that shows up in an email
- Threats Malware is defined as any device
- An attempt by hackers to damage or destroy a computer network or system.
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
- Identity and Privacy Protection
- Someone attempting to create Identity fraud
- The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
Down
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- Shield The ultimate call control center that gives customers full control of all T-Mobile's scam protection options
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
- a dishonest scheme; a fraud.
- A form of malware that monitors user activities and reports them to an external their party
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
- Hard to detect both by Users
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization
- An attack focusing on people rather than technology
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- Alerts used as a warning of danger.
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP
22 Clues: a dishonest scheme; a fraud. • Hard to detect both by Users • Identity and Privacy Protection • Something that shows up in an email • Alerts used as a warning of danger. • Threats Malware is defined as any device • Someone attempting to create Identity fraud • An attack focusing on people rather than technology • ...
Cyber Security Awareness 2021-10-13
Across
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- Something that shows up in an email.
- Threats Malware is defined as any device.
- An attempt by hackers to damage or destroy a computer network or system.
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
- Identity and Privacy Protection.
- Someone attempting to create Identity fraud.
- The act of falsifying the identity of the source of a communication or interaction.
Down
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- Shield The ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- a dishonest scheme; a fraud.
- A form of malware that monitors user activities and reports them to an external their party.
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
- Hard to detect both by Users.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
- An attack focusing on people rather than technology.
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- Alerts used as a warning of danger.
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
22 Clues: a dishonest scheme; a fraud. • Hard to detect both by Users. • Identity and Privacy Protection. • Alerts used as a warning of danger. • Something that shows up in an email. • Threats Malware is defined as any device. • Someone attempting to create Identity fraud. • An attack focusing on people rather than technology. • ...
Cyber Security Crossword 2022-09-21
Across
- An attack where an attacker/an unauthorized person simply follows an authorized person to enter the secured premises
- A network security device which blocks malicious traffic from entering the trusted network
- Term used to describe threats that prevents business from achieving its objective
- Malware that hides on the device and spies on the user
- Software used to detect and prevent computer viruses from spreading
- Secured encrypted connection used by a device to connect to a corporate network over the internet
- A type of authentication where verification is based on the physical characteristics of a person
- Person who tries to gain unauthorized access to a network or system
- Updated code for a system or application to fix a security flaw
- The Skyworks department that protects systems and networks from external attacks and leverages an defense in depth approach to ensure the confidentiality, integrity and availability of our systems, data, and information resources
Down
- Process of converting human-readable text to an unintelligible form using a key; process used to protect confidential data
- A flaw/weakness in a system that can be exploited by an attacker
- Process to verify the identity of the user when logging into a system
- The CIA Triad is an information security model that guides an organization’s efforts towards ensuring data security. What does the “I” stand for in the CIA triad?
- Social engineering tactic where attacker masquerades as a trusted entity and tricks people into clicking on a link or providing sensitive information
- Common malware which can easily spread from one computer to another
- Unwanted, unsolicited communication through emails or text messaging
- Secret word or passphrase used to authenticate into a system
- Term for malicious software
- Malware that acts as legitimate program; name of the USC mascot
- A type of malicious software where an attacker encrypts the contents of a victim's computer or block access to data until a ransom is paid
- Most secure way to dispose of paper documents
22 Clues: Term for malicious software • Most secure way to dispose of paper documents • Malware that hides on the device and spies on the user • Secret word or passphrase used to authenticate into a system • Malware that acts as legitimate program; name of the USC mascot • Updated code for a system or application to fix a security flaw • ...
Cyber Security Terms 2023-08-25
Across
- System to prevent access
- Fake emails
- Software to help with passwords
- String of numbers unique to your device
- secure Online service
- Program to collect private information
- Online harassment
- Denying service
Down
- Code that protect data
- Knowledge of cyber threats
- Appearing harmless
- Network of compromised computers
- When hackers get access to private information
- Harmful software
- Software to protect you
- Media manipulation to be someone you aren't
- Internet available to all
- Scrambling data
- Tricking users to click hidden elements
- Locking out system until money is paid
20 Clues: Fake emails • Scrambling data • Denying service • Harmful software • Online harassment • Appearing harmless • secure Online service • Code that protect data • Software to protect you • System to prevent access • Internet available to all • Knowledge of cyber threats • Software to help with passwords • Network of compromised computers • Program to collect private information • ...
Cyber Security Terms 2025-03-15
Across
- Software designed to harm systems.
- Permission to use a system.
- Copy of data for recovery.
- Device connected to a network.
- Software to detect and remove malware.
- Holds data hostage for payment.
- Malicious software disguised as useful.
- engineering, Manipulating people for information.
- Converts data into fixed-size output.
- Self-replicating malware that spreads.
Down
- Hiding data within other data.
- Period of active user interaction
- Verifying user identity.
- Software fix for vulnerabilities.
- Remote storage and computing service.
- Weakness in a system's security.
- Software that displays unwanted ads.
- Prevents unauthorized network access.
- Self-replicating code that harms systems.
- Deceptive emails to steal information.
- Web address used for navigation.
- Secret phrase for user authentication.
- Unauthorized access to data.
23 Clues: Verifying user identity. • Copy of data for recovery. • Permission to use a system. • Unauthorized access to data. • Hiding data within other data. • Device connected to a network. • Holds data hostage for payment. • Weakness in a system's security. • Web address used for navigation. • Period of active user interaction • Software fix for vulnerabilities. • ...
Cyber Security Crossword 2025-04-17
Across
- A person trying to break into systems
- A fix for a software bug
- Hides your location and protects online activity
- Unwanted or fake emails
- When something fake looks real
- The name used to log in
- Where you change privacy and security options
- A hack that targets people instead of code
- A misleading link that grabs attention
- Blocks harmful internet traffic
- Keeps apps and systems current and safe
- A wireless connection you should secure
- A message that warns you about danger
Down
- When data is stolen or leaked
- A secret code used to log in
- Small bits of data saved by websites
- A fake email that tricks you into giving info
- A second step for logging in
- A trick to steal money or data
- Scrambles data so only you can read it
- How your devices and accounts should be
- A copy of important files
- What you should do if something looks off
- Typing your username and password
24 Clues: Unwanted or fake emails • The name used to log in • A fix for a software bug • A copy of important files • A secret code used to log in • A second step for logging in • When data is stolen or leaked • A trick to steal money or data • When something fake looks real • Blocks harmful internet traffic • Typing your username and password • Small bits of data saved by websites • ...
Cyber Security Awareness 2023-10-10
Across
- - a malicious computer program that displays intrusive pop-up advertisements
- - malware designed to deny access to files by encrypting
- - A flaw or weakness in the computer
- - function used to map data of arbitrary size to fixed-size values
- - taking information and images from other people and uses them to create a new identity for themselves
- - deceiving, pressuring or manipulating people into sending information to wrong people
- - covert method of bypassing normal authentication or encryption in a computer
- - exploit of a vulnerability
- - personal data leak
- - unauthorized alteration of personal data
- - attackers pretend to be an authentic user
- - Hackers demand ransom in this currency
Down
- - install a backdoor in the infected computer
- - vulnerability in a computer system that was previously unknown to its developers or anyone capable of mitigating it
- - website made unavailable to legitimate user
- - group of computers which have been infected and under the control of a malicious actor
- - software tool designed to take advantage of a flaw in a computer system
- - data is complete, trustworthy
- - Malicious software which is installed in your system
- - updates that address security vulnerabilities within a program or product
- - India's first comprehensive data protection law
- - hiding or coding information so that only the person a message was intended for can read it
- - person who attempts to gain unauthorized access to a system
- - right to control how your information is viewed and used
- - Browser for the dark web
25 Clues: - personal data leak • - Browser for the dark web • - exploit of a vulnerability • - data is complete, trustworthy • - A flaw or weakness in the computer • - Hackers demand ransom in this currency • - unauthorized alteration of personal data • - attackers pretend to be an authentic user • - install a backdoor in the infected computer • ...
Cyber Security Crossword 2023-09-10
Across
- when cyber criminals deceive others by acting as someone or something else. usually through email or messages
- a security violation in which sensitive/confidential information has been accessed/stolen by an unauthorized person
- pretending to be someone else in order to get someones personal information
- sends signals to devices
- someone listening to a conversation to gain personal information
- intrusive software made by cyber criminals to damage/destroy computers and computer systems
- checking a users credentials to see if they are allowed to access the protected information
- any activity to protect the functionality and contents of information
- preventing and detecting threats to protect information being stolen/tampered with
- a device used to access the worldwide web
Down
- manipulating or influencing someone to gain access to their computer personal information
- monitors incoming and outgoing networking traffic
- the programs and other operating information used by a computer
- a type of malware that grows and spreads throughout the device inf
- a type of malware that threatens to release personal information if they don't pay a ransom
- securing networks by actively seeking out weaknesses in the defense
- attackers deceiving people into revealing personal info or download malware
- detects and destroys computer viruses
- a computer program that can copy itself and infect a computer without the users permission/knowledge
- a form of security in which information is converted into cypher-text
20 Clues: sends signals to devices • detects and destroys computer viruses • a device used to access the worldwide web • monitors incoming and outgoing networking traffic • the programs and other operating information used by a computer • someone listening to a conversation to gain personal information • a type of malware that grows and spreads throughout the device inf • ...
Cyber security Scruffle 2023-09-07
Across
- bait to receive money from the victim
- keeps your data from being breached/recognized
- an in-person device used to access your data on web
- a form of securing your accounts from other people
- verifies if you are "you"
- a type of attack that is initiated by a user interaction
Down
- a form of attack where someone listens to a conversation to gain personal access
- taking measures to make sure no unknown person has your online data
- protects from online attacks against a business
- no cable internet
- a cyber attack that spreads in a large quantity
- a group of devices which are sharing the same data
- an operating system for your device
- Drive a small plug in with saved files, photos, ect.
- a saved version of your files or general work in case it is lost
- a way of accessing personal information/account unauthorized
- emails, texts or messages from a bait to gain access to your information
- information on your device that is related to what you are doing
- device used to access the online web
- accessing your account through a password to authenticate it is the user.
20 Clues: no cable internet • verifies if you are "you" • an operating system for your device • device used to access the online web • bait to receive money from the victim • keeps your data from being breached/recognized • protects from online attacks against a business • a cyber attack that spreads in a large quantity • a group of devices which are sharing the same data • ...
cyber security vocabulary 2023-09-07
Across
- letter numbers and symbols combined to prevent unauthorized entry
- sofware that creates representations of servers, storage and networks
- a collection of documents
- an illegitimate source, not mainstream
- not connected to the internet
- software that prevents attacks
- handles cpu and high speed ram
- an extra layer of security
- information on a computer
- created on the internet to serve a purpose
- preserves the condition of a computer
- connection between computers
Down
- connects a computer to internet
- an attack via email or text in an attempt at information
- false information used to obtain information
- handles peripherals
- physical parts of a computer
- an account created to send information
- information withheld in exchange for money
- an increased use in cpu
20 Clues: handles peripherals • an increased use in cpu • a collection of documents • information on a computer • an extra layer of security • physical parts of a computer • connection between computers • not connected to the internet • software that prevents attacks • handles cpu and high speed ram • connects a computer to internet • preserves the condition of a computer • ...
Cyber Security Puzzle 2025-03-14
Across
- verifying a users identity
- Secret key to unlock phone
- conveying data onto a fixed value
- part internet used for illegal activities
- Self replicating malware
- Cyberattack that trick's people
- Program with hidden harmful intent
- Secure network connection
- Network devices protection
- unauthorized access exploit
- Securing data by converting to a code
Down
- software that is designed to harm
- the harmful portion of malware
- Unauthorized access to data
- A network of computers that have been infected
- malware that locks data until paid
- software that collects users data
- software that removes malware
- Taking advantage of a security vulnerability
- a software update that fixes bugs
20 Clues: Self replicating malware • Secure network connection • verifying a users identity • Secret key to unlock phone • Network devices protection • Unauthorized access to data • unauthorized access exploit • software that removes malware • the harmful portion of malware • Cyberattack that trick's people • software that is designed to harm • conveying data onto a fixed value • ...
Hackers, Scams, and Online Safety 2023-04-22
Across
- Online Harassment
- Security Protects against unauthorized access
- Media manipulation to change image
- Designs, Builds, and tests cybersecurity
- Cyber "kidnapping" for payment
- Tricks for getting private information
- Protects info from cyber attacks
- Harmful Software
- Collects private info without consent
- work that uses personal devices
Down
- Seemlessly harmful Malware until downloaded
- Detects, prevents, and removes malware
- Monitors networks for possible threats
- Software for securing cloud data
- Identifies device by internet connection
- Compromised computers used for cyberattacks
- Designer of data networks
- Paid testers of cybersecurity
- Scrambling date to restrict access
19 Clues: Harmful Software • Online Harassment • Designer of data networks • Paid testers of cybersecurity • Cyber "kidnapping" for payment • work that uses personal devices • Software for securing cloud data • Protects info from cyber attacks • Media manipulation to change image • Scrambling date to restrict access • Collects private info without consent • ...
Cyber Security Crossword 2022-09-15
Across
- A misspelt mythical three-headed dog
- Good for checking corruption less for tampering
- a gap in a wall, barrier, or defence
- The Agency
- the epitome of infosec professionals and ultimate champion of cyber month challenges
- Something you own
- When you convert Cipher Text
- System of global connections
- A wall of inferno
- A sweet biscuit having a soft, chewy texture
Down
- Means of access set in code
- Good guy hat
- A famous Ukrainian born worm
- A fictional bear's desire
- Founded by Paul and Bill
- A sad technical group
- High-Class Grizzly
- a Soong-type android
- Access Code
- A notification
- Gone ****, catch you later
21 Clues: The Agency • Access Code • Good guy hat • A notification • Something you own • A wall of inferno • High-Class Grizzly • a Soong-type android • A sad technical group • Founded by Paul and Bill • A fictional bear's desire • Gone ****, catch you later • Means of access set in code • A famous Ukrainian born worm • When you convert Cipher Text • System of global connections • ...
Cyber Security Crossword 2023-02-18
Across
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- The address of a webpage. Check the validity of it before clicking on it.
- Should be constructed of upper and lower case letters, numbers and special characters.\
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Fraudulent phone calls or voice messages purporting to be from reputable company in order to trick users to reveal their personal information.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Security tool that creates a secure, encrypted connection between you and the internet.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- A sequence of words or text used to control access to a computer; similar to a password.
- Facebook, Twitter, Instagram,etc.
- Threatening behavior facilitated through electronics means such as texting.
- Verifying identity.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
Down
- The process of taking plain text and scrambling it into an unreadable format.
- The "A" in the C-I-A Triad. It ensures authorized users have access.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- Unauthorized access to a network, information systems or application.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction.
- The "I" in the C-I-A Triad; protection from unauthorized changes.
20 Clues: Verifying identity. • Facebook, Twitter, Instagram,etc. • The "I" in the C-I-A Triad; protection from unauthorized changes. • The "A" in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Security Awareness 2021-10-13
Across
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- Alerts used as a warning of danger.
- An attempt by hackers to damage or destroy a computer network or system.
- Something that shows up in an email
- An attack focusing on people rather than technology
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
- A dishonest scheme; a fraud.
- A form of malware that monitors user activities and reports them to an external their party
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and
Down
- Identity and Privacy Protection
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP
- Someone attempting to create Identity fraud
- Malware is defined as any device
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
- The ultimate call control center that gives customers full control of all T-Mobile's scam protection options
- The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization
- Hard to detect both by Users
22 Clues: A dishonest scheme; a fraud. • Hard to detect both by Users • Identity and Privacy Protection • Malware is defined as any device • Alerts used as a warning of danger. • Something that shows up in an email • Someone attempting to create Identity fraud • An attack focusing on people rather than technology • ...
Cyber Security Puzzle 2021-10-13
Across
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- An acronym that stands for distributed denial of service – a form of cyber-attack.
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- Refers to a company security policy that allows for employees’ personal devices to be used in business.
- A defensive technology designed to keep the bad guys out. It can be hardware or software-based
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- Breaches the network to gain sensitive information with the owner’s consent – making it completely legal.
- A type of malware that functions by spying on user activity without their knowledge.
Down
- A technique used to manipulate and deceive people to gain sensitive and private information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
- A Technique by which hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- Another kind of malware that allows cybercriminals to remotely control your computer
- An internet version of a home address for your computer, which is identified when it communicates over a network.
- Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- An audio or video clip that has been edited and manipulated to seem real or believable
- A set of programs that tell a computer to perform a task.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: A set of programs that tell a computer to perform a task. • An acronym that stands for distributed denial of service – a form of cyber-attack. • Another kind of malware that allows cybercriminals to remotely control your computer • A type of malware that functions by spying on user activity without their knowledge. • ...
Cyber-security terms 2025-03-12
Across
- Detects computer viruses.
- Trial and error hacking method to crack passwords, encryption keys, and any sensitive information.
- Proving the identity of the user is correct.
- Virus that infects multiple computers simultaneously.
- Tricks such as fake emails, phone calls, and text messages used by attackers to get sensitive information.
- Hackers use to spy on your computer activities.
- Attackers that can evade security systems using a secret entryway.
- Locks's your files and demands for a payment to unlock it.
- Online computing vs physical hardware.
Down
- Learning algorithms that are made to complete a goal.
- Manages who's able to access data.
- Misleading link disguised as something else.
- Software designed to harms computer systems.
- Lost or stolen information from a system.
- A key that only authorized parties can access data to the original format.
- Chain of blocks that holds data, linked together by strong locks.
- Network security made to control, filter, and monitor network traffic.
- Labels assigned to devices that are connected to the internet.
- Unwanted installed ads or pop-ups on your computer.
- Server attack that causes extreme lag.
20 Clues: Detects computer viruses. • Manages who's able to access data. • Server attack that causes extreme lag. • Online computing vs physical hardware. • Lost or stolen information from a system. • Misleading link disguised as something else. • Software designed to harms computer systems. • Proving the identity of the user is correct. • ...
Cyber Security Crossword 2025-11-06
Across
- Secret phrase that shouldn't be "123456"
- Test to prove you're human, often involving traffic lights
- Fake email scheme that sounds like an aquatic activity
- Army of zombie computers controlled by cybercriminals
- Malicious program named after an ancient Greek trick
- Sneaky software that watches your every click
- Secret entrance that bypasses normal security
- When unauthorized users break through digital defenses
- Three letters for a tunnel that hides your internet traffic
- Scrambling data like eggs, but harder to unscramble
- Small file that remembers you, not made of chocolate chips
- Attack that floods a website like a thousand people calling at once
- Umbrella term for software with bad intentions
- Digital bouncer that decides who gets into the network party
- Alan who cracked codes and fathered computer science
Down
- Process of proving you are who you claim to be online
- Sweet trap designed to catch cyber attackers
- Digital lock-picker, sometimes wearing a white or black hat
- Software band-aid that fixes security holes
- Digital kidnapper that holds files hostage for money
- Spreads from computer to computer like its biological namesake
- Pretending to be someone else online, like digital dress-up
- Using your body parts as passwords
- Self-replicating pest that doesn't need a host file
- Silent recorder of every button you press
25 Clues: Using your body parts as passwords • Secret phrase that shouldn't be "123456" • Silent recorder of every button you press • Software band-aid that fixes security holes • Sweet trap designed to catch cyber attackers • Sneaky software that watches your every click • Secret entrance that bypasses normal security • Umbrella term for software with bad intentions • ...
Important words 2025-03-02
Across
- a promise that a business gives you
- something that solidifies a deal
- knowing something
- Entering somewhere without authentication
- online
- something you need for entry
Down
- Getting your money stolen
- buying goods from shops
- call
- Getting money back for a product
- security
- safe
- fast transport
- can restore lost data
14 Clues: call • safe • online • security • fast transport • knowing something • can restore lost data • buying goods from shops • Getting your money stolen • something you need for entry • Getting money back for a product • something that solidifies a deal • a promise that a business gives you • Entering somewhere without authentication
