cyber security Crossword Puzzles

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

Food Security 2017-04-29

Food Security crossword puzzle
Across
  1. Acquire from foods, used to nourish a person’s physical condition.
  2. Far from average.
  3. A humid and hot climate.
  4. No water, climate problem.
  5. Have nothing.
  6. What makes a something unique.
  7. Physical injured by bacteria.
  8. Not enough nutrition to supply a person’s body.
  9. Financially challenged.
  10. Accept, permit.
  11. Fairness, unbiased.
  12. Supply, grant.
  13. An epidemic of infectious disease.
Down
  1. Something that’s used to solve an issue.
  2. Enough to fill one’s desire.
  3. Demand, use.
  4. Farming, planting.
  5. Misuse, devastation.
  6. Fighting, suffering.
  7. Units of energy.
  8. Make, manufactured.
  9. Accessibility.
  10. Around the world.
  11. Respect and basic human rights.
  12. Too much body weight.
  13. Separate an item with someone.
  14. Accept, back off.
  15. A kind of natural effect with a short duration of time.
  16. Used to purchase goods.
  17. No foods, or anything to fill one’s stomach.

30 Clues: Demand, use.Have nothing.Accessibility.Supply, grant.Accept, permit.Units of energy.Far from average.Around the world.Accept, back off.Farming, planting.Make, manufactured.Fairness, unbiased.Misuse, devastation.Fighting, suffering.Too much body weight.Used to purchase goods.Financially challenged.A humid and hot climate.No water, climate problem....

Security Awareness 2016-04-12

Security Awareness crossword puzzle
Across
  1. Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm
  2. Spam that uses graphical images of text in order to circumvent text-based filters
  3. An email client feature that allows the user to read an email message without actually opening it
  4. A set of security standards that all U>S> companies processing, storing , or transmitting credit card information must follow
  5. Cryptographic algorithms that use a single key to encrypt and decrypt a message
  6. An earlier email protocol for handling incoming mail
  7. Cryptography that uses two mathematically related keys
  8. A publicly released software security update intended to repair a vulnerability
  9. A global network that allows devices connected to it to exchange information
  10. A more recent and advanced email protocol
  11. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  12. The process of proving that a user performed an action
  13. The ability to remotely erase data stored on a mobile device
  14. A false warning intended to trick a user into performing an action that will compromise security
  15. An asymmetric encryption key that does not have to protected
  16. Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
Down
  1. An asymmetric encryption key that does have to be protected
  2. Malware that prevents a user's device from properly operating until a fee is paid
  3. A web browser addition that adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser that normally it could not play or display
  4. One of several types of tools for securing passwords, including password generators, online vaults, and password management application
  5. A language that allows web authors to combine text, graphic images, audio, and video into a single document
  6. Malware that can trigger arbitrary code execution from one computer to a second computer over a network or the internet
  7. Stealing another person's personal information, such as a social security number, and then using the information to impersonate the victim, generally for financial gain
  8. A situation that involves exposure to danger
  9. Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer
  10. A Microsoft Office function that automatically opens documents attached to emails in a read-only mode that disables editing functions
  11. The most recent version of html that standardizes sound and video formats
  12. A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
  13. The tasks of protecting the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
  14. A U.S. law designed to fight corporate corruption
  15. The most widely known and influential organization in the field of computer networking and wireless communications
  16. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
  17. Creating an invented scenario to persuade the victim to perform an action or provide confidential information
  18. Removing the built-in limitations and protections on Google Android devices
  19. Employees, contractors, and business partners who can be responsible for an attack
  20. The state or condition of being free from public attention to the degree that the user chooses

36 Clues: A more recent and advanced email protocolA situation that involves exposure to dangerA U.S. law designed to fight corporate corruptionAn earlier email protocol for handling incoming mailCryptography that uses two mathematically related keysThe process of proving that a user performed an action...

Operations Security 2019-10-08

Operations Security crossword puzzle
Across
  1. should only be work onsite (seatbelt on _______ off)
  2. What is the abbreviation of the list that shows the commands critical information
  3. What you should do to your anti-virus software
  4. ___________ of scientific an tecnical information (RSTI) approval is needed to obtain a distribution statement
  5. Making changes to reduce your vulnerability to adversaries
  6. Profiles on social media used to get your attention
  7. "Computer1234" is a bad example of this
  8. _________ information is what OPSEC protects
  9. What potential harm from bad OPSEC practices is called
  10. OPSEC is a __________ effort
  11. __________ tweets sink fleets
  12. Emails that contain PII, FOUO or critical informaation senders must do this
Down
  1. posting pictures of this could put your family at risk
  2. The number of steps in the OPSEC process
  3. What a weakness in our practices or defense is called
  4. This marks your photos with longitude and latitude information
  5. What you should not take with your smartphone or camera anywhere onsite
  6. An adversary is considered a ________
  7. The kind of email account you can't use to conduct government business
  8. These settings should be used on social media
  9. A threat must have intent and ________ to do harm to the United States to be considered a threat
  10. An option to protect your credit
  11. the most commonly used social media platform by adversaries to target government employees and contractors
  12. What should you remove when you walk away from your NMCI computer
  13. The Freedom of Information Act is for what type of information
  14. How to destroy all FOUO documents

26 Clues: OPSEC is a __________ effort__________ tweets sink fleetsAn option to protect your creditHow to destroy all FOUO documentsAn adversary is considered a ________"Computer1234" is a bad example of thisThe number of steps in the OPSEC process_________ information is what OPSEC protectsThese settings should be used on social media...

Network Security 2015-04-03

Network Security crossword puzzle
Across
  1. Use of cryptographic systems to provide message-by-message authentication and integrity
  2. Cyber-attacks by national governments
  3. The attacks and attackers that companies face
  4. Layers of defense such that all must be breached for an attacker to succeed
  5. Method for malware to move to a victim computer
  6. Tricking the victim into doing something against his or her interests
  7. Attackers who use scripts or other applications developed by more experienced attackers
  8. Worm that will automatically infect other computers without any user interaction
  9. A vulnerability-specific attack that occurs before a patch is available
  10. Some form of proof of identity
  11. Attempting to guess a password by using every possible combination of characters
  12. Mandatory directives that must be followed during implementation
  13. Entity trying to prove their identity by supplying some form of credentials
  14. Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
  15. Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
  16. Method of authentication that uses of a private key, pubic key and a trusted verifier
  17. Broad statements of what should be accomplished, not how to accomplish it
  18. Attempting to guess a password by trying all the words in a standard or custom dictionary
  19. Long passwords that contain a mix of lowercase letters, uppercase letters, numeral characters, and symbols
  20. Lying to get victims to persuade them to do something against their financial self-interest
  21. Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
  22. Full stand-alone malware programs that operates and or replicates by itself
  23. A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
  24. Instructions that are merely optional guidelines for implementation
  25. Process of balancing threats and protection costs for individual assets
  26. A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
  27. Attacking your own systems to discover their weaknesses
  28. Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
  29. Intentionally using a computer resource without authorization or in excess of authorization
Down
  1. The actions that a person given access to a resources is allowed to take
  2. A pair of algorithms used to encrypt and decrypt secure communications
  3. Methods and processes to ensure policies have been implemented properly
  4. deep inspection of application messages across multiple packets to identify malicious activity
  5. Procedures to capture and safeguard data as evidence for criminal court proceedings
  6. Formalized plan to reestablish IT operations within a firm
  7. Hardware or software that examines packets and determines if they are allowed to pass or not
  8. Use of authentic-looking e-mail or websites to entice the user to send his or her personal and/or confidential information
  9. Cyber attackers by terrorists
  10. Part of a piece of malware that performs malicious actions
  11. The practice and study of techniques for securing confidential communications
  12. Alternate way back into a system
  13. Process or program that takes advantage of a known vulnerability
  14. Successful attacks
  15. Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
  16. Pieces of executable code that attach themselves to other programs
  17. A malicious program that disguises itself as a legitimate system file
  18. Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
  19. Use of two authentication methods such as something you know, something you have, or something you are
  20. Closing off all avenues of attack
  21. DoS attack committed by a distributed number or simultaneous attackers
  22. Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
  23. Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
  24. Use of measurements of a person’s attributes for authentication purposes
  25. General term for any evil software that does harm to your system
  26. Trusted system or entity that will verify a supplicant’s identity
  27. Making a computer or entire network unavailable to legitimate users by various means
  28. Sample actions taken for policy oversight
  29. General purpose exploitation programs that can be remotely controlled after installation

58 Clues: Successful attacksCyber attackers by terroristsSome form of proof of identityAlternate way back into a systemClosing off all avenues of attackCyber-attacks by national governmentsSample actions taken for policy oversightThe attacks and attackers that companies faceMethod for malware to move to a victim computer...

IT Security 2014-04-07

IT Security crossword puzzle
Across
  1. providers: is another thraet for data
  2. engineering:A type of confidence trick for the purpose of information gathering, fraud, or system access
  3. raw facts
  4. Area Network : is a system whereby individual PCs are connected together within a company or organisation
  5. Identity theft and Fraud: is a way to protect personal data
  6. is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  7. Private Network :is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  8. that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. hacking:___________ can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  10. is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
Down
  1. data prosed in some way
  2. is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  3. is a software program designed to provide a user with administrator access to a computer without being detected.
  4. Area Network: as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  5. backdoor: is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  6. surfing: is using direct observation techniques, such as looking over someone's shoulder, to get information
  7. is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  8. individuals: more threat of data
  9. is a threat for data
  10. is To move an infected file, such as a virus, into an area where it cannot cause more harm
  11. is a technique of fraudulently obtaining private information
  12. is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  13. is a group of two or more computer systems linked together.
  14. theft: is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name

24 Clues: raw factsis a threat for datadata prosed in some wayindividuals: more threat of dataproviders: is another thraet for dataIdentity theft and Fraud: is a way to protect personal datais a group of two or more computer systems linked together.is a technique of fraudulently obtaining private information...

Security Acronyms 2016-06-04

Security Acronyms crossword puzzle
Across
  1. w
  2. 2nd largest trade show
  3. AKA IPS
  4. Curacao
  5. c
  6. simpky
  7. port 554
  8. may I exit please
  9. Patent
  10. DB, but not decibels
  11. I
  12. L
  13. worth a thousand words
Down
  1. Phonebook for computers
  2. 2.4 or 5.0
  3. Indirectly connected storage
  4. Leased IPs
  5. succeeded where PSIA failed
  6. simple
  7. Cameras POV
  8. time
  9. Duplicative set of cheap media
  10. Milestone, Exacq, Genetec
  11. tvi
  12. h
  13. their way or the highway

26 Clues: wchILtvitimesimplesimpkyPatentAKA IPSCuracaoport 5542.4 or 5.0Leased IPsCameras POVmay I exit pleaseDB, but not decibels2nd largest trade showworth a thousand wordsPhonebook for computerstheir way or the highwayMilestone, Exacq, Genetecsucceeded where PSIA failedIndirectly connected storageDuplicative set of cheap media

Security Crossword 2023-03-30

Security Crossword crossword puzzle
Across
  1. Type of patrol
  2. What the hall located on A1 where the game room is located
  3. The red button at the reception desk
  4. Integrity without (blank)
  5. If there is a building issue, you open a (blank)
  6. Security office room number
  7. The area in which the site is located
  8. Where you can search for and employees email or desk location
  9. GSOC phone number
  10. The emergency phones in the parking garage
  11. Where is Barry Pennett's Office Number?
  12. Supervisors phone number
  13. Conference room named after a flower on B2
  14. Tab in QuickBase where you log you D.A.R.
  15. When a door does not close, it is called a (blank)
  16. An outside contractor gets a badge labeled (black) at the bottom
  17. Tab in QuickBase where you log "lost and found" item
Down
  1. Room where air handlers are located
  2. Room were 3-6 employees can meet
  3. How many AEDs do we have onsite?
  4. Largest conference room in Building B
  5. Camera system we use
  6. Page 29 in the Post orders: Privacy and (blank)
  7. Reception desk phone number
  8. Monthly tasks/projects
  9. Largest conference room on A2
  10. Document that holds site specific policies and procedres
  11. Total number of patrols to be completed each shift
  12. Communication at the starts and end of each shift
  13. Page 37 in the Securitas Handbook

30 Clues: Type of patrolGSOC phone numberCamera system we useMonthly tasks/projectsSupervisors phone numberIntegrity without (blank)Reception desk phone numberSecurity office room numberLargest conference room on A2Room were 3-6 employees can meetHow many AEDs do we have onsite?Page 37 in the Securitas HandbookRoom where air handlers are located...

Security 2 2024-02-28

Security 2 crossword puzzle
Across
  1. - Used by all software applications on a network system to identify the software application or service; numbers range from Oto 65,535.
  2. - Written for the express purpose of modifying a computer's configuration or causing damage to a computer system.
  3. - False message spread about a real or unreal virus: not actually a virus.
  4. - Hardware device or software application that protects the computer from unauthorized access or malware delivered through a network or Internet connection.
  5. - Virus created using a macro programming language, and it is attached to documents that use the language.
  6. - Program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number.
  7. - Designed to track a user's habits such as their web browsing habits.
  8. - E-mail used to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source.
  9. - Refers to a collection of malware that is not regarded as very dangerous, but rather more of a nuisance.
  10. - Works with the Trusted Platform Module (TPM) to verify the successful launch of the operating system and store the information in the TPM.
  11. - Attacks the master boot record (MBR) of a hard drive and is considered extremely destructive.
  12. - Interception of a transmission over a network.
  13. - Collection of infected computers controlled by a source computer.
  14. - Small text file used to send information about a user to a server.
  15. - Consists of a collection of software programs that installs on a computer and allows an intruder to take administrative control.
  16. - Software application that performs specific network functions.
  17. - Destructive program that contaminates files on the infected computer and spreads to other computers without prompting from the user.
  18. - Combination of characteristics that include such things as its length, file name(s) used, mode of infection or replication, the areas of the system that are attacked, the type of software programs that are attacked, and the name or length of the file attachment.
  19. - Gathers information about a user's web-browsing habits.
Down
  1. - Program that changes the configuration of a browser.
  2. - Type of malware that seizes control of your computer and demands payment to unlock it.
  3. - Designed to support advertisements such as popups and may also gather information about the user.
  4. - Class of virus that appears as a desired download.
  5. - Occurs when a network server or web server is flooded with requests to the point that it cannot fulfill the request.
  6. - Hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer.
  7. - Designed to breach security and steal passwords.
  8. - Destructive program that is slipped into an application and remains dormant until some event takes place.
  9. - Deceptive practice based on poisoning a Domain Name Service (DNS) server with an incorrect IP address for a website.
  10. - Software that is typically written to duplicate itself and, in the process. cause problems and possible permanent damage to a computer.
  11. - Virus that changes as it evolves to resist detection.
  12. - Designed to go undetected and leave a hole in the security system of a computer or network.
  13. - Unsolicited junk e-mail or junk electronic newsletters.
  14. - Windows feature that checks the integrity of the operating system during the boot process and only allows digitally signed software to boot and run on the computer.

33 Clues: - Interception of a transmission over a network.- Designed to breach security and steal passwords.- Class of virus that appears as a desired download.- Program that changes the configuration of a browser.- Virus that changes as it evolves to resist detection.- Unsolicited junk e-mail or junk electronic newsletters....

Security Squares 2022-07-14

Security Squares crossword puzzle
Across
  1. A "tear" in the wall
  2. Hidden code that steals
  3. Alternative to the front
  4. Should be easy to remember
  5. Data inspection/what a blood hound is known for
  6. Pretending to be someone you're not
  7. A targeted attack
  8. "The Borg" under control
  9. A common cold
  10. Disguised as a legitimate program
Down
  1. Unauthorized domain registration
  2. Holding "Brent Spiner" hostage
  3. Need a key to open
  4. Unwanted online material
  5. Program that's intentionally harmful
  6. Hacker way to shutdown a network
  7. What you do with a hook, rod and reel
  8. Don't write this on a notepad
  9. Used by titans to catch fish
  10. A "secret" scrambled code

20 Clues: A common coldA targeted attackNeed a key to openA "tear" in the wallHidden code that stealsUnwanted online materialAlternative to the front"The Borg" under controlA "secret" scrambled codeShould be easy to rememberUsed by titans to catch fishDon't write this on a notepadHolding "Brent Spiner" hostageUnauthorized domain registration...

Security Training 2023-05-05

Security Training crossword puzzle
Across
  1. the basics of reading, writing and verbalizing is called this
  2. they're like the ADT Service for Amazon - call them for all emergencies
  3. this program is used to look up badge tracing
  4. program used to monitor alarms
  5. this website houses all your security programs
  6. often hired to perform functions that others can't; often carries a 'yellow badge'
  7. primary internal messaging system
  8. the last name of the founder of Amazon
  9. this shouldn't be present at the desk
  10. area to report to when flagged for screening
Down
  1. there are a variety of these that should be completed by each shift
  2. these are the folks that work in the Yard
  3. used to support a decision, enforce something or help reflect upon when unsure
  4. this is the only TIER 1 alarm; it's the brain of IT/Amazon
  5. bathroom checks would reveal this type of 'artwork'
  6. we shouldn't be using this at the desk
  7. these are conducted when something is reported to you
  8. this acronym is what you are measured upon when reacting to something
  9. This program enters visitors
  10. this company was founded in a garage in 1994
  11. training tool that records your trainings and ensures you're up to date with training needs
  12. this is the name of the camera system we use

22 Clues: This program enters visitorsprogram used to monitor alarmsprimary internal messaging systemthis shouldn't be present at the deskwe shouldn't be using this at the deskthe last name of the founder of Amazonthese are the folks that work in the Yardthis company was founded in a garage in 1994this is the name of the camera system we use...

Security puzzle 2023-09-21

Security puzzle crossword puzzle
Across
  1. A security technique that adds an extra step and requires users to enter more information than just a password (abbreviation)
  2. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
  3. The process of taking plain text and scrambling it into a code that is in an unreadable format
  4. Sending unwanted bulk messages to a large number of recipients, often commercial in nature without consent of the recipients
  5. A software designed to detect and destroy computer viruses
  6. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  7. Email sent trying to get user to click on a malicious link
  8. Following someone through physical security without using your own badge
  9. Harmful computer programs such as viruses, worm, and trojans used by hackers to gain access to your computer and cause destructions
  10. Fraudulent text messages that try and get information (or youtube gift cards) from you
  11. Malicious software that intends to block access to a computer or server until an amount of money is paid
Down
  1. Copies of critical data should be maintained in the event of catastrophic system failure
  2. A flaw or weakness in a computer system that can be exploited
  3. Should be constructed of a long string of upper and lower case letters, numbers, and special characters, and not used more than one place
  4. Social ______ is the name of the cybersecurity threat where nefarious actors trick others into revealing sensitive information.
  5. Where to find our policies
  6. The address of a webpage. Check that it is valid before clicking on it (abbreviation)
  7. Information (typically electronic) that can identify a particularly individual, such as name, email, address (abbreviation)
  8. Security tool that creates a secure, encrypted connection between you and the internet (abbreviation)
  9. The process of verifying the identity of a user
  10. An individual who uses technology to try and gain unauthorized access to systems/networks to commit crimes

21 Clues: Where to find our policiesThe process of verifying the identity of a userA software designed to detect and destroy computer virusesEmail sent trying to get user to click on a malicious linkA flaw or weakness in a computer system that can be exploitedFollowing someone through physical security without using your own badge...

Food security 2024-11-05

Food security crossword puzzle
Across
  1. Environmental impact on food
  2. Animals raised for food
  3. Long-term environmental health
  4. Essential for irrigation
  5. Availability of resources
  6. Plants grown for food
  7. Lack of essential nutrients
  8. Crop production per area
  9. Amount of food produced
  10. Farming and crop production
Down
  1. Variety in ecosystems
  2. Foundation of agriculture
  3. Support for the food-insecure
  4. Extreme food shortage
  5. Shortage of resources
  6. Ability to withstand crises
  7. Government rules and regulations
  8. Diet quality focus
  9. Fair food distribution
  10. Food scarcity issue

20 Clues: Diet quality focusFood scarcity issueVariety in ecosystemsExtreme food shortageShortage of resourcesPlants grown for foodFair food distributionAnimals raised for foodAmount of food producedEssential for irrigationCrop production per areaFoundation of agricultureAvailability of resourcesAbility to withstand crisesLack of essential nutrients...

Security Crossword 2025-01-23

Security Crossword crossword puzzle
Across
  1. The process of managing updates for software applications and technologies.
  2. Intermediary server for network requests.
  3. Unauthorized data access incident.
  4. A firewall that monitors and filters traffic between a web application and the internet.
  5. Attempt to obtain sensitive information.
  6. Testing a system for vulnerabilities by simulating attacks.
  7. Algorithm for performing encryption or decryption.
  8. A collection of tools used by an attacker to maintain access to a system while hiding their presence.
  9. Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
  1. Measures taken to protect the integrity and usability of networks.
  2. Running programs in a controlled environment to prevent them from affecting the host system.
  3. A formal document outlining how security measures are implemented within an organization.
  4. Protection measures applied to end-user devices like computers and mobile devices.
  5. A framework for managing digital certificates and public-key encryption.
  6. A systematic evaluation of the security of a company’s information system.
  7. An entity that issues digital certificates for secure communications.
  8. Protocol for establishing an encrypted link between a server and a client.
  9. Permissions granted to users regarding what they can do with resources on a system.
  10. A type of malware that replicates itself to spread to other computers without user intervention.
  11. Software that secretly collects user information.

20 Clues: Unauthorized data access incident.Attempt to obtain sensitive information.Intermediary server for network requests.Software that secretly collects user information.Algorithm for performing encryption or decryption.Testing a system for vulnerabilities by simulating attacks.Measures taken to protect the integrity and usability of networks....

Industrial security 2025-10-23

Industrial security crossword puzzle
Across
  1. – A weakness in security systems that can be exploited by threats or unauthorized individuals.
  2. – A signaling device used to alert personnel to security breaches or emergencies.
  3. – Continuous observation of activities to detect and prevent security breaches.
  4. – Training and education programs that inform personnel about proper security practices.
  5. – A defined step-by-step process for completing security-related tasks properly and safely.
  6. – Any indication or potential cause that can harm or disrupt security and safety.
  7. – The act of stealing small quantities of goods or materials over time, often by employees.
  8. – Unauthorized entry into a protected area or system.
  9. – Ensuring that sensitive information is only accessible to authorized individuals.
  10. – A formal statement of principles and rules to guide security practices within an organization.
Down
  1. – Protection of buildings, people, and assets.
  2. – A systematic process of identifying, evaluating, and prioritizing potential hazards or threats.
  3. – A designated safe route used during fire or other emergencies.
  4. – Safeguarding an organization’s physical and intangible resources against theft or loss.
  5. – A trained personnel responsible for protecting property, assets, and people from harm or theft.
  6. – Process of preparing personnel to handle threats and emergencies.
  7. – A detailed set of procedures to ensure safety and business continuity during emergencies.
  8. – A centralized area where monitoring, communication, and response systems are managed.
  9. – A system or method used to regulate who can enter or exit specific areas within a facility.
  10. – Closed-Circuit Television system used for surveillance and monitoring of premises.

20 Clues: – Protection of buildings, people, and assets.– Unauthorized entry into a protected area or system.– A designated safe route used during fire or other emergencies.– Process of preparing personnel to handle threats and emergencies.– Continuous observation of activities to detect and prevent security breaches....

Network Security 2025-11-13

Network Security crossword puzzle
Across
  1. High level permissions that allow a user to install software or change system settings
  2. Malware that locks your files and demands money to unlock them like holding your data hostage
  3. A separate saved copy of important files so you can restore them if data is lost
  4. Rules that decide what different users can see or do on a computer system
  5. Software that scans for malicious files and removes them before they cause damage
  6. A login method that requires your password and a code sent to your phone making accounts harder to hack
  7. A password like 123456 or password that is very easy for attackers to guess
  8. A fake message pretending to be someone trustworthy asking for your password or personal data
  9. When a hacker keeps trying many passwords until one finally works
Down
  1. When a hacker tricks someone into giving away information instead of hacking the system
  2. A secret word or phrase used to prove who you are and log into your account
  3. A harmful program that spreads from file to file and computer to computer
  4. Software that secretly installs itself and causes damage like deleting files or slowing your computer
  5. The process of verifying your identity like entering a password or using fingerprint unlock
  6. A program that looks safe but secretly hides harmful code like a fake game that installs malware
  7. Turns information into unreadable code so intercepted messages cannot be understood
  8. Ethical hacking used to find weaknesses in a system before criminals do
  9. Software that secretly watches what you type or the websites you visit and sends it to someone else
  10. Someone who uses computer skills to access systems sometimes legally and sometimes illegally
  11. An attack that floods a server with too much traffic so real users cannot access it
  12. A security barrier that checks data coming in and out of a network like a bouncer letting only safe traffic through

21 Clues: When a hacker keeps trying many passwords until one finally worksEthical hacking used to find weaknesses in a system before criminals doA harmful program that spreads from file to file and computer to computerRules that decide what different users can see or do on a computer system...

IDK 2025-11-10

IDK crossword puzzle
Across
  1. A potential for violation of security
  2. A collection of host computers together that can communicate with each other
  3. A term to describe connecting multiple separate networks together.
  4. identity usurpation to get access to some personal data
Down
  1. any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  2. A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
  3. Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.
  4. A network point that acts as an entrance to another network.
  5. something that's protecting you frome virus
  6. a tool that monitors network traffic as it received in a network interface.
  7. a service who allow you to access to some foreign content

11 Clues: A potential for violation of securitysomething that's protecting you frome virusidentity usurpation to get access to some personal dataa service who allow you to access to some foreign contentA network point that acts as an entrance to another network.A term to describe connecting multiple separate networks together....

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points....

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points....

Fundamental security 2013-02-06

Fundamental security crossword puzzle
Across
  1. data send between to hosts
  2. what is a common DoS attack
  3. what is another name code updates
  4. What wed security controls interactivity between a app and computer
  5. allows or Denys traffic on a computer
  6. A person that pretends to be a employee to get info on the company
  7. How often should you check your security
  8. a way to safely access resources
  9. file contents that hold known characteristics of someone
  10. permanently deleting something
Down
  1. What type of threat is stealing, damage, destroy equipment
  2. What is another name for unsolicited email
  3. What type of virus is the most damaging
  4. what is another name for an infected computer
  5. What reads info and operates without your computer knowing
  6. what do anti-virus look for in software
  7. who is responsible for security
  8. software that pretends to be a trusted computer
  9. what type of attack sniffs out user names and passwords in a network
  10. What is a Trojan

20 Clues: What is a Trojandata send between to hostswhat is a common DoS attackpermanently deleting somethingwho is responsible for securitya way to safely access resourceswhat is another name code updatesallows or Denys traffic on a computerWhat type of virus is the most damagingwhat do anti-virus look for in softwareHow often should you check your security...

IT Security 2015-04-21

IT Security crossword puzzle
Across
  1. Programme, die Tastatureingaben mitprotokollieren
  2. Dateien, die am Computer abgespeichert werden /z.B. Anmeldeinformationen)
  3. "Hintertür" für Dritte über einen Computer Spams zu verteilen
  4. Diebstahl von Daten, die unachtsam einfach weggeworfen wurden
  5. chatten - Abkürzung
  6. Viren, die als Programm in ein Dokument eingebettet sind
  7. gezieltes Ansprechen von Minderjährigen im Internet mit dem Ziel der Anbahnung sexueller Kontakte
  8. Virus, der sich direkt über Netze (Internet) verbreitet
  9. Begriff setzt sich aus Advertisment und Software zusammen - forscht das Nutzerverhalten aus
  10. "Datendiebstahl" durch falsche E-Mails
Down
  1. Mobbing mit Hilfe von elektronischen Medien
  2. Programm, das Viren im Betriebssystem versteckt
  3. Beobachtung bei der Eingabe von Daten (Bankomat,...)
  4. "Datendiebstahl" durch zwischenmenschliche Beeinflussung
  5. unerwünschte Werbemails
  6. versteckt in einem scheinbar nützlichen Programm
  7. Daten eines Dritten (unter Vorgabe einer fremden Identität) besorgen
  8. Überbegriff für unerwünschte, schädliche Software
  9. Datensicherung
  10. Betrugsmethode, bei der der User auf gefälschte Webseiten umgeleitet wird
  11. forschen das Nutzerverhalten aus und senden die Daten an Hersteller

21 Clues: Datensicherungchatten - Abkürzungunerwünschte Werbemails"Datendiebstahl" durch falsche E-MailsMobbing mit Hilfe von elektronischen MedienProgramm, das Viren im Betriebssystem verstecktversteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenÜberbegriff für unerwünschte, schädliche Software...

HIPAA Security 2016-04-06

HIPAA Security crossword puzzle
Across
  1. After reading, the act of removing electronic information
  2. Keep safe
  3. To use to gain admission
  4. To inform of security incident
  5. HIPAA Security Officer
  6. Restricted information
  7. Punishment for breaking the law
  8. Example of PHI
  9. Reveal or share information with permission
  10. Who implements and maintains HIPAA laws
  11. Dispose of paper documents
Down
  1. Monetary penalty
  2. Protected *blank* information
  3. Part of trilogy
  4. Software designed to harm computer
  5. Act of stating presence before entering a room
  6. Educating others of HIPAA laws
  7. Organization responsible for HIPAA compliance (2 words)
  8. Rule establishes a level of protection for electronic PHI (2 words)
  9. Person receiving treatments
  10. Safety officer
  11. Compliance and privacy officer
  12. HIPAA, Omnibus, HITECH are part of a
  13. Cellphone, laptop, iPad are examples of
  14. To be on guard

25 Clues: Keep safeSafety officerExample of PHITo be on guardPart of trilogyMonetary penaltyHIPAA Security OfficerRestricted informationTo use to gain admissionDispose of paper documentsPerson receiving treatmentsProtected *blank* informationEducating others of HIPAA lawsTo inform of security incidentCompliance and privacy officer...

information security 2021-01-15

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of software better and able to do more things
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneya machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etcsomeone who is in a position of authority in an organization...

information security 2020-12-18

information security crossword puzzle
Across
  1. to keep someone or something safe from harm, damage, or illness
  2. the state of being able to be alone, and not seen or heard by other people
  3. the sets of programs that tell a computer how to do a particular job
  4. to calculate a result, answer, sum etc
  5. what you earn by working and can use to buy things
  6. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  7. the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
  8. a small plastic card that you use to buy goods or services and pay for them later
  9. connect people
  10. someone who steals things from another person or place
  11. someone who secretly uses or changes the information in other people’s computer systems
Down
  1. someone who is in a position of authority in an organization
  2. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  3. facts or details that tell you something about a situation, person
  4. the act of deliberately making someone believe something that is not true
  5. the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
  6. very convenience
  7. a group of related parts that work together as a whole for a particular purpose
  8. seeming bad or dishonest
  9. relating to crime
  10. to damage something so badly that it no longer exists or cannot be used or repaired

21 Clues: connect peoplevery conveniencerelating to crimeseeming bad or dishonestto calculate a result, answer, sum etcwhat you earn by working and can use to buy thingssomeone who steals things from another person or placesomeone who is in a position of authority in an organizationto keep someone or something safe from harm, damage, or illness...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneyto make a computer, machine, or piece ofa machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. to damage something so badly that it no longer exists or cannot be used or repaired
  3. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  4. a machine or tool that does a special job
  5. to make a short hard sound, or make something produce this sound
  6. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  7. the act of deliberately making someone believe something that is not true
  8. better and able to do more things upgrade
  9. informal someone who secretly uses or changes the information in other people’s computer systems
  10. to take something that belongs to someone else
Down
  1. relating to computers, especially to messages and information on the Internet
  2. the sets of programs that tell a computer how to do a particular job
  3. a group of related parts that work together as a whole for a particular purpose
  4. to keep someone or something safe from harm, damage, or illness
  5. someone who is in a position of authority in an organization
  6. when something bad is stopped from happening
  7. relating to crime
  8. the place where you pay or are served in a shop, bank, restaurant etc
  9. a clever but dishonest way to get money
  10. the crime of stealing
  11. a written or spoken description that says what happens in an event or process

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneya machine or tool that does a special jobbetter and able to do more things upgradewhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

information security 2020-12-18

information security crossword puzzle
Across
  1. very convenience
  2. the state of being able to be alone, and not seen or heard by other people
  3. to keep someone or something safe from harm, damage, or illness
  4. a small plastic card that you use to buy goods or services and pay for them later
  5. someone who is in a position of authority in an organization
  6. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  7. someone who secretly uses or changes the information in other people’s computer systems
  8. the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
  9. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  10. relating to crime
  11. a group of related parts that work together as a whole for a particular purpose
  12. the act of deliberately making someone believe something that is not true
Down
  1. to damage something so badly that it no longer exists or cannot be used or repaired
  2. facts or details that tell you something about a situation, person
  3. to calculate a result, answer, sum etc
  4. seeming bad or dishonest
  5. the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
  6. the sets of programs that tell a computer how to do a particular job
  7. connect people
  8. someone who steals things from another person or place
  9. what you earn by working and can use to buy things
  10. a piece of computer software that does a particular job

22 Clues: connect peoplevery conveniencerelating to crimeseeming bad or dishonestto calculate a result, answer, sum etcwhat you earn by working and can use to buy thingssomeone who steals things from another person or placea piece of computer software that does a particular jobsomeone who is in a position of authority in an organization...

Food Security 2020-10-08

Food Security crossword puzzle
Across
  1. – inhabitants of a particular place
  2. – shower from the clouds
  3. – access to something
  4. - the management of financial matters for a community, business or family.
  5. – the state of not having reliable access to affordable, nutritious food.
  6. - the state of having reliable access to affordable, nutritious food.
Down
  1. – state of insufficient financial wealth
  2. – manufacture from raw materials
  3. – relating to the government
  4. – a change in global or regional climate patterns
  5. - a fuel derived immediately from living matter.
  6. – insufficient amount of something
  7. – relating to a built-up area
  8. – relating to health and cleanliness
  9. – short supply of
  10. – a natural fuel such as gas
  11. – person who manages a farm
  12. – full of nutrients
  13. – nutritious substance that animals and humans eat
  14. – plants grown commercially

20 Clues: – short supply of– full of nutrients– access to something– shower from the clouds– person who manages a farm– plants grown commercially– relating to the government– a natural fuel such as gas– relating to a built-up area– manufacture from raw materials– insufficient amount of something– inhabitants of a particular place...

Information Security 2023-11-19

Information Security crossword puzzle
Across
  1. A TCS process for releasing application on Internet / Intranet.
  2. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  3. Jenkins is the commonly used tool for performing this activity in the application development.
  4. A TCS portal with a framwork for Software security.
  5. A username, passowrd, and app-generated code on a phone.
  6. A protocol operate on UDP ports 67 and 68
  7. An application in TCS for Business Continuity Planning.
  8. Application security testing examines source code.
  9. It is Clould Service like TCS uses Google Workspaces
  10. Plan It is a plan devised for an outcome other than usual plan.
  11. It is achieved by using Hashing.
  12. Allows you to login once and access many services and systems.
Down
  1. A type of malicious software designed to block access to a computer system until a sum of money is paid
  2. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
  3. An application tool recommended to use in TCS for storing and manage multiple credentials.
  4. A TCS application used for managing physical access and logical resources access management.
  5. You should not just identity, you should also confirm ________________________
  6. An ability to shift workloads between cloud venders as needs change.
  7. A software development methodology is most closely linked to DevSecOps approach.
  8. DAY It is the day a new vulnerability is known and no patch is available yet.

20 Clues: It is achieved by using Hashing.A protocol operate on UDP ports 67 and 68Application security testing examines source code.A TCS portal with a framwork for Software security.It is Clould Service like TCS uses Google WorkspacesAn application in TCS for Business Continuity Planning.A username, passowrd, and app-generated code on a phone....

Security concepts 2024-07-24

Security concepts crossword puzzle
Across
  1. personal code to log into your devices
  2. Secure network tunnel
  3. Verifying identity
  4. Dual-layer authentication
  5. Holds data hostage
  6. Fakes digital identity
  7. Engineering Manipulates human behavior
  8. Data scrambling for privacy
  9. Network security barrier
  10. Detects and removes malware
  11. Redirects to fake sites
Down
  1. Malicious digital intrusion
  2. Software with malicious intent
  3. Device in a network
  4. Weakness in security
  5. Software update for security
  6. Records keystrokes
  7. Authentication via body traits
  8. Malicious program's function
  9. Deceptive email tactic
  10. Unauthorized access point

21 Clues: Verifying identityRecords keystrokesHolds data hostageDevice in a networkWeakness in securitySecure network tunnelFakes digital identityDeceptive email tacticRedirects to fake sitesNetwork security barrierDual-layer authenticationUnauthorized access pointMalicious digital intrusionData scrambling for privacyDetects and removes malware...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. Organization that works to end world hunger
  2. State of not having enough food to eat
  3. Nutrient essential for growth, found in pulses and meat
  4. When crops are harvested
  5. Fruit rich in potassium, often called "kela" in Hindi
  6. Common grain used in many Indian dishes, like biryani
  7. Kitchen garden grown at home or school for fresh produce
  8. The first 1000 ____ of a child's life are crucial for nutrition
  9. Measure of body fat based on height and weight
  10. Cereal grain that's a staple food in many parts of India
  11. Fortified salt that helps prevent iodine deficiency
  12. Nutrient found in milk and dairy products, important for strong bones
Down
  1. Nutrient-dense food often given to malnourished children
  2. Found in citrus fruits, helps boost immunity
  3. The right to adequate food is recognized as a human ____
  4. Ability to access enough safe and nutritious food
  5. Legume high in protein, often used in dal
  6. Green vegetable rich in iron and calcium, also known as drumstick
  7. Feeding only breast milk to infants for the first six months
  8. Government system providing subsidized food grains to the poor
  9. Colorful fruit rich in Vitamin A, often eaten as a dessert
  10. Government program providing midday meals to school children
  11. Type of malnutrition where a child is too short for their age
  12. Vegetable rich in iron, often called "palak" in Hindi
  13. Government program providing food grains to pregnant women and young children

25 Clues: When crops are harvestedState of not having enough food to eatLegume high in protein, often used in dalOrganization that works to end world hungerFound in citrus fruits, helps boost immunityMeasure of body fat based on height and weightAbility to access enough safe and nutritious foodFortified salt that helps prevent iodine deficiency...

Data security 2025-03-27

Data security crossword puzzle
Across
  1. protection program Software that stops viruses
  2. A group of connected computers
  3. A saved copy of your data or files
  4. A bad program that can hurt your computer
  5. Software that is free to try before you buy
  6. container A box that protects things from fire
  7. A check to make sure everything is correct
  8. security Using your face, finger, or eye to enter a system
  9. backup A copy of only the new or changed files
  10. Happening from time to time (like every week or month)
  11. To change people or jobs regularly
  12. A program that blocks bad things from coming into a network
  13. Programs or apps that run on a computer
  14. lock and key Something stored in a locked place
Down
  1. Permission to use something or go into a system
  2. security system Equipment that protects a place (like cameras or locks)
  3. When a system is broken into or damaged
  4. A secret word you use to log in
  5. A company or person who sells something
  6. (a password) To break into a password or find it without permission
  7. To watch or check something regularly
  8. backup A copy of all your files
  9. The physical parts of a computer (like keyboard, screen)
  10. When you can go into a computer or a system
  11. To change data into a secret code
  12. system A system that calls you back to check who you are

26 Clues: A group of connected computersA secret word you use to log inbackup A copy of all your filesTo change data into a secret codeA saved copy of your data or filesTo change people or jobs regularlyTo watch or check something regularlyWhen a system is broken into or damagedA company or person who sells somethingPrograms or apps that run on a computer...

Physical Security 2021-05-27

Physical Security crossword puzzle
Across
  1. Digital Center location
  2. They monitor fire and alarm signals
  3. Designated "Captains"
  4. The top shortage department, as a Company
  5. Bart's Middle Name
  6. In 2021, Kohl's moved from Microsoft office programs entirely to this platform
  7. The building that screams innovation by name
  8. Newest Men's clothing brand launch
  9. Got a Human Resource question?
  10. Used to be granted access
  11. He is a Star Wars buff and was a drummer in a band
  12. The "S" in EAS
  13. Kohl's VMS CCTV Platform
  14. It is 1 of 2 buildings, service happens here
  15. We like to recognize people for this
  16. Milpitas is a Santa Clara County, located in this Valley
  17. We are a top 50 company for
  18. Not from the West or the Midwest, LP TLPM leader
  19. The program that "Pays" when you are honest
  20. This site is located on Broadway
  21. Where to go on MyKohls to achieve your ideal level of wellbeing
  22. Abbr for Closed Circuit Television
  23. To get paid, enter hours here
  24. 200 this year, 800 by the end of 2023
  25. hash (#) tag it!
Down
  1. In 2019, we partnered with this powerhouse to drive traffic in our stores through returns
  2. During these, the correct response is to run, hide or fight
  3. Hospitatlity isn't just a thought, it is a?
  4. The "Z" in PTZ
  5. Loss Preventions "eyes in the sky" to assist with the boots on the ground
  6. The site to be kept "in the know"
  7. Each June we celebrate this for the month
  8. As an associate you get 15% off, also known as this
  9. Check this to understand the "point" of the alarm
  10. He won't have the key, but he can pin you the core
  11. We provide, through volunteering
  12. Kohl's Corporate office is 16 miles from this Baseball teams stadium
  13. This Kohl's building is designated to "strike a pose"
  14. Abbr for the groups committed to driving business through our people
  15. Onguard, also known as
  16. Panic type alarm, also recently installed in exec offices
  17. Technology that prevents the same access badge from being used consecutively
  18. Played in a movie as a pitcher
  19. This caused store closures in 2020
  20. Service needs are entered in here
  21. Another name for Kohl's rewards, it's a program
  22. Automated external difibrillator, abbr
  23. The San Antonio Credit Center shares it's home with this famous battle
  24. This discontinued item caused the largest customer calls to the corporate office
  25. Loss Preventions purpose, to reduce

50 Clues: The "Z" in PTZThe "S" in EAShash (#) tag it!Bart's Middle NameDesignated "Captains"Onguard, also known asDigital Center locationKohl's VMS CCTV PlatformUsed to be granted accessWe are a top 50 company forTo get paid, enter hours hereGot a Human Resource question?Played in a movie as a pitcherWe provide, through volunteering...

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

information security 2022-01-15

information security crossword puzzle
Across
  1. If someone is agreed to do something, they are allowed to do it.
  2. Seeming dishonest or false.
  3. To make something more modern or suitable for use now by adding new information or changing its design
  4. A typical quality or an important part of something.
  5. A particular form of something.
  6. Pressing a button on the mouse or keyboard.
  7. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  8. Agreement that something is true or legal.
  9. Relating to a position of responsibility.
  10. To react to something with an opposing opinion or action.
  11. A particular way of doing something.
Down
  1. Used or download data.
  2. Happening or existing before something or someone else.
  3. To copy or move programs or information into a computer's memory.
  4. A piece of work to be done with difficulty.
  5. The development or improvement of something.
  6. An illegal plan for making money, especially one that involves tricking people.
  7. In a far place.
  8. Physical or mental activity needed to achieve something.
  9. To put furniture, a machine, or a piece of equipment into position and make it ready to use.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.A piece of work to be done with difficulty.Pressing a button on the mouse or keyboard.The development or improvement of something....

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

Network Security 2022-04-27

Network Security crossword puzzle
Across
  1. any program or code designed to do something on a system or network that you don’t want to have happen.
  2. software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
  3. A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
  4. Can sustain network operations for only a limited time in the event of an outage.
  5. Redundant ___ eliminates a single point of power failure.
  6. a program that has two jobs: to replicate and to activate.
  7. functions similar to a virus. It replicates exclusively through networks.
  8. Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
  9. (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
  1. occurs when a user identifies himself to the system, and the identity is verified against an authentication database
  2. Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
  3. (AUP) states what users are allowed and not allowed to do on the company’s network
  4. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
  5. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
  6. uses duplication of critical components/devices, increasing the reliability of the system.
  7. software that detects, prevents, and removes viruses, worms, and other malware from a computer
  8. diving- when a person goes through the trash in order to find personal information
  9. - using another person's wireless network without permission.
  10. the 2nd most common firewall tool ensuring port security through port filtering
  11. a function of any program that sends information about your system or your actions over the Internet.

20 Clues: Redundant ___ eliminates a single point of power failure.a program that has two jobs: to replicate and to activate.- using another person's wireless network without permission.functions similar to a virus. It replicates exclusively through networks.Provides incremental trunk speeds by combining multiple Fast Ethernet links....

Security crossword 2025-06-11

Security crossword crossword puzzle
Across
  1. - Work laptops, iPads, phones, and documents being more susceptible to theft or loss when working ___
  2. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  3. Change of ___
  4. A marking used to show a document is originator controlled
  5. Must be strong and never shared
  6. What you should do when you step away from your laptop
  7. – Reporting these allow MFAT to identify and manage security risks
  8. – report all lost devices to the ___
  9. – access to official information is governed by your ___
  10. A secure way to connect remotely to our network
Down
  1. Encourages putting sensitive information away at the end of the day
  2. ___ your laptop securely when it is not under your direct control
  3. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  4. Do not disclose online that you hold a ___ ___ clearance
  5. Do not use ___ accessories such as headsets and keyboards
  6. Pre-travel notification is required when travelling through a ___ country
  7. Fake emails to get you to click
  8. – A way to categorise information to protect it
  9. – Online sites that can put your personal information at risk
  10. Suspicious, ongoing, unusual or ___
  11. Bag used to transport material RESTRICTED and above
  12. Key to entering secure areas

22 Clues: Change of ___Key to entering secure areasFake emails to get you to clickMust be strong and never sharedSuspicious, ongoing, unusual or ___– report all lost devices to the ___– A way to categorise information to protect itA secure way to connect remotely to our networkBag used to transport material RESTRICTED and above...

INDUSTRIAL SECURITY 2025-10-28

INDUSTRIAL SECURITY crossword puzzle
Across
  1. sound and good judgement to arrive at wise and timely desisions.
  2. a form of physical security that is concerned with the physical measures designed to safeguard personnel and prevent unauthorized access to equipment , facilities , materials and protect the from espionage
  3. is a freedom from accidents , hazards or harm.
  4. a chance of being injured or harmed.
  5. include mountains, rivers, seas, desserts to traverse.
  6. removing the risk totally from the business
  7. ability to deal with others successfully without offensing
  8. An indication of impending danger or harm.
  9. a system of barriers placed between the potential intruder and the objects / matter to be protected.
  10. is the potential that a chosen action or activity will lead to a loss probability of an event to happen .
Down
  1. minimizing the probability of the potential loss
  2. obtained through clearly unethical or illegal means.
  3. those that will deter man from committing such act of fea of being caught , charge in the court or get dismissed.
  4. being watchful in spotting violator , a person , a vehicle or an incident.
  5. inability to withstand the effects of a hostile environment - measure of how open an establishment to intrusion, attack or injury.
  6. involves the installation of physical barriers , security lighting , use of vaults , locks and others.
  7. the affect of impacting result in terms of life , existence finances security condition and other assets or on things intended by security measures to protect.
  8. is the protection resulting from the application of various measures which safeguards , cash and assets which are in storage , in transit and during transaction.
  9. a hollow device made of metal that makes a ringing sound.
  10. a kind of state where people , institution , authority or groups feel fully secured of feeling.

20 Clues: a chance of being injured or harmed.An indication of impending danger or harm.removing the risk totally from the businessis a freedom from accidents , hazards or harm.minimizing the probability of the potential lossobtained through clearly unethical or illegal means.include mountains, rivers, seas, desserts to traverse....

Law and order 2024-10-23

Law and order crossword puzzle
Across
  1. scene rikospaikka
  2. punishment kuolemanrangaistus
  3. battery pahoinpitely
  4. bail takuu
  5. perpetrator rikoksentekijä, rikollinen
  6. service yhdyskuntapalvelu
  7. attorney puolustuksen asianajaja
  8. offence rikos
  9. record rikosrekisteri
Down
  1. haastehakemus, kanne
  2. rikostoveri
  3. of law tuomioistuin
  4. syytetty, vastaaja
  5. terrorist kyberterroristi
  6. syyllinen

15 Clues: syyllinenbail takuurikostoverioffence rikosscene rikospaikkasyytetty, vastaajaof law tuomioistuinhaastehakemus, kannebattery pahoinpitelyrecord rikosrekisteriservice yhdyskuntapalveluterrorist kyberterroristipunishment kuolemanrangaistusattorney puolustuksen asianajajaperpetrator rikoksentekijä, rikollinen

Passwords To Power Chords 2025-05-07

Passwords To Power Chords crossword puzzle
Across
  1. - Rock band behind “Rock You Like a Hurricane.”
  2. - What every plant manager wants to avoid.
  3. - Digital defense against cyber threats.
  4. - Crucial step before a system update.
  5. - TV character who can fix anything with duct tape or his Swiss Army knife..
  6. - Elevator company often seen in manufacturing plants.
  7. - Greater metropolitan area including Chicago and suburbs.
  8. - Chicago baseball team hoping for a better season.
  9. - Feel-good soccer coach everyone loves.
Down
  1. - “The Boss” of classic rock anthems.
  2. - Tech buzzword that’s either a game-changer or a headache.
  3. - Classic rock band known for “Stairway to Heaven.”
  4. - Popular salad dressing and Midwestern staple.
  5. - Cyber scam pretending to be a trusted source.
  6. - Skilled worker who knows the ins and outs of a CNC machine.

15 Clues: - “The Boss” of classic rock anthems.- Crucial step before a system update.- Digital defense against cyber threats.- Feel-good soccer coach everyone loves.- What every plant manager wants to avoid.- Rock band behind “Rock You Like a Hurricane.”- Popular salad dressing and Midwestern staple.- Cyber scam pretending to be a trusted source....

AnaVation Security Crossword Puzzle 2022-06-28

AnaVation Security Crossword Puzzle crossword puzzle
Across
  1. An employee or consultant with access to classified or sensitive information who purposely or accidentally causes harm to national security.
  2. There are this many members on AnaVation's security team.
  3. AnaVation's Security Standard Practice Procedures (SPP) is located in here.
  4. This rule implements security policy, assigns responsibility, establishes requirements, and provides procedures consistent with the National Industrial Security Program.
  5. This program was created as part of the security clearance reform efforts to identify relevant security information from clearance holders between periodic reinvestigations.
  6. Failure to comply with national security policy and procedure, that could reasonably result in loss or compromise of classified information.
  7. The proper term for the "secure space" at AnaVation's facility.
  8. This is the federal security agency that is responsible for ensuring industry complies with national security policy.
  9. Before being granted a final clearance eligibility determination, you may be granted an _______ clearance.
  10. How many days in advance do you need to report foreign travel?
Down
  1. This kind of classification means incorporating paraphrased classified information onto newly developed material.
  2. All classified material at the Secret level or above that is mailed to another approved location must include this.
  3. An employee who on occasion will courier classified material to another approved location.
  4. Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers.
  5. The lowest level of classified information.
  6. The person in this role is authorized to determine if information is to be classified in the first instance.
  7. If you have a Top Secret clearance, you will need to go through reinvestigation every _____ years.
  8. The current system of record for personnel clearance information.

18 Clues: The lowest level of classified information.There are this many members on AnaVation's security team.How many days in advance do you need to report foreign travel?The proper term for the "secure space" at AnaVation's facility.The current system of record for personnel clearance information....

cyberbully 2012-02-10

cyberbully crossword puzzle
Across
  1. About 21% of kids have received ___ or threatening e-mails.
  2. About 75% have visited a Web site _____ another student.
  3. Four out of ten middle school students have had their password(s)_____ and changed by a bully who then locked them out of their own account or sent communications posing as them.
  4. Among this percentage, being ____and disrespected were the most common forms of cyber bullying.
  5. Nine out of ten ____ school students have had their feelings hurt online.
  6. bullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators
Down
  1. About 58% of kids ___someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once.
  2. Nearly 42% of kids have been_____ online and almost one in four have had it happen more than once.
  3. cyber The _____ ___bullying location where victimizing occurs, at 56%, is in chat rooms.
  4. are about twice as likely as boys to be victims and perpetrators of cyber bullying.

10 Clues: About 75% have visited a Web site _____ another student.About 21% of kids have received ___ or threatening e-mails.Nine out of ten ____ school students have had their feelings hurt online.are about twice as likely as boys to be victims and perpetrators of cyber bullying....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle                  21CSE492T CYBER CRIMES AND CYBER SECURITY                    Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 crossword puzzle
Across
  1. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
  2. Gateways that provide services to inside users while protecting hosts from outside users.
  3. Malware analysis that involves running the program in a controlled environment.
  4. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
  5. Formal and systematic security assessment and assurance process for a computer system.
  6. Attackers use username and password pairs from old breaches to access new accounts.
  7. Network security appliances that act as a barrier between trusted and untrusted networks.
  8. Security analysis technique that looks for statistical deviations from a security baseline
  9. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
  10. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
  1. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
  2. Machine learning model used in threat hunting to find correlations in data.
  3. Tools that protect systems by detecting and eliminating a wide range of malicious software.
  4. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
  5. Extortion-based threat where malicious code denies access to data until a sum is paid.
  6. Social engineering technique that offers something enticing like free software containing malware.
  7. Malicious digital communication causing emotional harm.
  8. Forensic data layer containing file timestamps, size, author, and geolocation details.
  9. Formal process of technical evaluation for a system's or individual's security effectiveness.
  10. Free software framework for scanning and managing known security vulnerabilities.

20 Clues: Malicious digital communication causing emotional harm.Machine learning model used in threat hunting to find correlations in data.Malware analysis that involves running the program in a controlled environment.Free software framework for scanning and managing known security vulnerabilities....

Network Security 2018-08-24

Network Security crossword puzzle
Across
  1. puts up a barrier in between internal network and outside networks
  2. Determining the privileges to resources, objects, or data
  3. stop people from uploading or forwarding important information in an not safe way
  4. determining the privileges of a user
  5. cryptographic hash functions published by NIST
  6. Confidentiality, Integrity, Availability
  7. encrypts the connection from an endpoint to a network
  8. combines multiple layers of defenses at the edge and in the network
  9. blocks incoming attacks and controls outbound messages to prevent the loss of data
  10. countermeasures to avoid or fight against security risks
Down
  1. collections of equal and non-equal encryption algorithms
  2. determines physical location
  3. protects a wireless network
  4. hiding information in blocks or within images
  5. control web use, block threats, and deny access to malicious websites
  6. automatically sees activities that are not normal
  7. commonly used hash function that makes 128-bit hash value
  8. protection of information or information resources
  9. the only protection for the data when the defense fails
  10. Access, Authentication, Authorization

20 Clues: protects a wireless networkdetermines physical locationdetermining the privileges of a userAccess, Authentication, AuthorizationConfidentiality, Integrity, Availabilityhiding information in blocks or within imagescryptographic hash functions published by NISTautomatically sees activities that are not normal...

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

IT Security 2014-04-07

IT Security crossword puzzle
Across
  1. Area Network : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  2. surfing : is using direct observation techniques, such as looking over someone's shoulder, to get information
  3. hacking :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  4. backdoor : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  5. engineering : A type of confidence trick for the purpose of information gathering, fraud, or system access
  6. individuals : more threat of data
  7. : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  8. : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  9. : is data prosed in some way
  10. : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
  11. providers : is another thraet for data
  12. : is To move an infected file, such as a virus, into an area where it cannot cause more harm
  13. theft : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
Down
  1. : is a group of two or more computer systems linked together.
  2. Private Network : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  3. : is a software program designed to provide a user with administrator access to a computer without being detected.
  4. : is a technique of fraudulently obtaining private information
  5. :is raw facts
  6. : is a threat for data
  7. : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  8. : information that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  10. Area Network : is a system whereby individual PCs are connected together within a company or organisation
  11. Identity theft and Fraud : is a way to protect personal data

24 Clues: :is raw facts: is a threat for data: is data prosed in some wayindividuals : more threat of dataproviders : is another thraet for dataIdentity theft and Fraud : is a way to protect personal data: is a group of two or more computer systems linked together.: is a technique of fraudulently obtaining private information...

IT Security 2014-04-07

IT Security crossword puzzle
Across
  1. : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  2. : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  3. : is another thraet for data
  4. : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  5. : is a group of two or more computer systems linked together.
  6. : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  7. : is a threat for data
  8. : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  9. : is using direct observation techniques, such as looking over someone's shoulder, to get information
  10. : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  11. : is a system whereby individual PCs are connected together within a company or organisation
  12. :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  13. : is To move an infected file, such as a virus, into an area where it cannot cause more harm
  14. :is raw facts
Down
  1. : is data prosed in some way
  2. : more threat of data
  3. : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  4. : A type of confidence trick for the purpose of information gathering, fraud, or system access
  5. : is a way to protect personal data
  6. : is a technique of fraudulently obtaining private information
  7. : is a software program designed to provide a user with administrator access to a computer without being detected.
  8. : information that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  10. : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page

24 Clues: :is raw facts: more threat of data: is a threat for data: is data prosed in some way: is another thraet for data: is a way to protect personal data: is a group of two or more computer systems linked together.: is a technique of fraudulently obtaining private information...

Fundamental Security 2013-02-06

Fundamental Security crossword puzzle
Across
  1. What reads info and operates without your computer knowing
  2. what do anti-virus look for in software
  3. What wed security controls interactivity between a app and computer
  4. file contents that hold known characteristics of someone
  5. What is a Trojan
  6. What type of virus is the most damaging
  7. a way to safely access resources
  8. what is another name for an infected computer
  9. who is responsible for security
  10. What type of threat is stealing, damage, destroy equipment
  11. what type of attack sniffs out user names and passwords in a network
Down
  1. A person that pretends to be a employee to get info on the company
  2. How often should you check your security
  3. What is another name for unsolicited email
  4. permanently deleting something
  5. what is a common DoS attack
  6. allows or Denys traffic on a computer
  7. data send between to hosts
  8. what is another name code updates
  9. software that pretends to be a trusted computer

20 Clues: What is a Trojandata send between to hostswhat is a common DoS attackpermanently deleting somethingwho is responsible for securitya way to safely access resourceswhat is another name code updatesallows or Denys traffic on a computerwhat do anti-virus look for in softwareWhat type of virus is the most damagingHow often should you check your security...

GENERAL SECURITY 2015-01-25

GENERAL SECURITY crossword puzzle
Across
  1. A minor criminal offence
  2. A Security guard can make an arrest when he finds someone committing a _______ offence
  3. Evidence of prior bad acts by the accused is called_______ evidence
  4. Police officers are __________ officers
  5. ____________can arrest on a " Found Committing " indictable offence
  6. Anything seized as a result of a Charter Violation is called _________ evidence
  7. A Fingerprint is ____________evidence
  8. __________________ Laws are also called By-laws
  9. When a person does not leave, after directed to do so, the person would considered to be __________
  10. Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
  11. A gun is considered __________ evidence
  12. What does 10-4 mean?
  13. A trial within a trial
  14. Without colour of right if you convert something to your own use it is considered ______?
  15. The criminal code is a _____________ Act
  16. Security guards keep make entries during a shift in a
  17. A witness giving testimony is giving _________ evidence
Down
  1. Real evidence is_________ evidence.
  2. Under the trespass to property act a security can only
  3. Evidence that relates to a series of facts other than the particular fact sought to be proved is called ______ evidence
  4. An NSF cheque is ________ evidence
  5. Is a Security guard a peace officer?
  6. Class C fires involve _______________ equipment
  7. The lowest criminal court is called ________ court
  8. A serious criminal offence
  9. only the police can _______________
  10. A Security guard who uses excessive force is committing
  11. A person who lies on the stand is committing
  12. Surveillance from a place hidden from view is what type of Surveillance?
  13. An offence which has the option of being summary or indictable
  14. An expert witness can give ________ evidence

31 Clues: What does 10-4 mean?A trial within a trialA minor criminal offenceA serious criminal offenceAn NSF cheque is ________ evidenceReal evidence is_________ evidence.only the police can _______________Is a Security guard a peace officer?A Fingerprint is ____________evidencePolice officers are __________ officersA gun is considered __________ evidence...

Information Security 2023-03-16

Information Security crossword puzzle
Across
  1. Сombining several means of presenting information in one system.
  2. Preventing unauthorized access; safety.
  3. List of objects that are under suspicion regarding security.
  4. Bait net; trap network.
  5. Technical devices.
  6. Data interception.
  7. Unauthorized entry into the system bypassing its protection.
  8. Security of information.
  9. Computer program.
  10. The user's secret password to unlock the phone/smartphone.
  11. The process of rewriting or deletion information.
  12. Identification of intruders or threats.
  13. Type of malware.
  14. Avoiding bad events.
  15. Disclosure of information.
Down
  1. Proof.
  2. Encoding of information.
  3. A set of tools that allows the user to interact with the program.
  4. Computer attacker.
  5. Security of information.
  6. The weakest link in computer security.
  7. A crime involving a computer or computer network.
  8. The amount of potential damage.
  9. Bad event.
  10. Masking an intruder or malware.
  11. Secret character set.
  12. System user.
  13. User, trying to gain unauthorized access to a computer system.
  14. Effort to penetration into the system.
  15. Organized collection of structured information.

30 Clues: Proof.Bad event.System user.Type of malware.Computer program.Technical devices.Computer attacker.Data interception.Avoiding bad events.Secret character set.Bait net; trap network.Encoding of information.Security of information.Security of information.Disclosure of information.The amount of potential damage.Masking an intruder or malware....

Network Security 2023-02-09

Network Security crossword puzzle
Across
  1. a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad
  2. Monitors the type of websites visited to generate targeted advertisements
  3. Occurs when a user identifies himself to the system, and the identity is verified against an authentication database.
  4. The process of using or manipulating people inside the network environment to gain access to that network from the outside
  5. Low-level operating trojan horse
  6. A person goes through garbage to find personal information
  7. A virus is a program that has two jobs: to replicate and to activate
  8. Software utility that detects, prevents, and removes viruses, worms, and other malware from a computer
Down
  1. A rogue access point is an unauthorized Wireless Access Point (WAP) installed on the network
  2. after the user is authenticated, he is then granted access to resources or services on the network.
  3. A rogue access point that looks like a legitimate access point
  4. Program or code that does something on a system or network you don’t want happening
  5. Sends information about your system or your actions over the internet
  6. Protects networks from potential attacks from outside your network by filtering packets using a number of methods
  7. An attacker poses as some sort of trusted site
  8. It is a firewall tool that prevents the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator.
  9. Using another person’s wireless network without permission
  10. When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people.
  11. Embedded on a program file. Once opened, the virus runs automatically wreaking havoc
  12. Similar to a virus, but doesn’t need activation to replicate

20 Clues: Low-level operating trojan horseAn attacker poses as some sort of trusted siteUsing another person’s wireless network without permissionA person goes through garbage to find personal informationSimilar to a virus, but doesn’t need activation to replicateA rogue access point that looks like a legitimate access point...

Network Security 2020-04-16

Network Security crossword puzzle
Across
  1. permits or denies based on physical burnt in address
  2. logical seperation of your network
  3. access _________ list, allow or deny traffic on routers interfaces
  4. protocol used for reading and writing directories over network
  5. code runs, destroys database server after employee fired
  6. group of computers luring bad guys
  7. process where data formatted in a way that only the receiver can "break" the code
  8. attack restricts your data until you pay
  9. terminal access remote, not secure
  10. okay, you signed in? what access do you have
  11. inside, outside, _______ zone
  12. fingerprint, iris, voice authentication
  13. pretend to be someone that you are not
Down
  1. traffic redirected to unintentional intermediary
  2. signin once, authenticated anywhere
  3. who are you?
  4. social ____ , phishing is an example
  5. AAA protocol, needs server
  6. something you are, and something you know
  7. WPA uses it to check key integrity
  8. traffic redirected to intentional intermediary
  9. restricts or allows features in a particular area
  10. using common words as passwords to force your way in
  11. force a service to fail, distributed

24 Clues: who are you?AAA protocol, needs serverinside, outside, _______ zonelogical seperation of your networkgroup of computers luring bad guysWPA uses it to check key integrityterminal access remote, not securesignin once, authenticated anywheresocial ____ , phishing is an exampleforce a service to fail, distributedpretend to be someone that you are not...

information security 2020-12-18

information security crossword puzzle
Across
  1. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  2. the act of deliberately making someone believe something that is not true
  3. when something bad is stopped from happening
  4. the sets of programs that tell a computer how to do a particular job
  5. the place where you pay or are served in a shop, bank, restaurant etc
  6. informal someone who secretly uses or changes the information in other people’s computer systems
  7. to take something that belongs to someone else
  8. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  9. to make a short hard sound, or make something produce this sound
  10. a clever but dishonest way to get money
  11. a group of related parts that work together as a whole for a particular purpose
Down
  1. to keep someone or something safe from harm, damage, or illness
  2. relating to computers, especially to messages and information on the Internet
  3. the crime of stealing
  4. a machine or tool that does a special job
  5. someone who is in a position of authority in an organization
  6. the right to enter a place, use something, see someone etc
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. relating to crime
  9. a written or spoken description that says what happens in an event or process

20 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneya machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etcsomeone who is in a position of authority in an organization...

Security Terms 2022-11-17

Security Terms crossword puzzle
Across
  1. Copy of files from computer hard drive saved on other digital media that is stored in a secure location
  2. Set of software tools used by attackers to hide the presence of other malicious softwares
  3. Logical computer network of zombies under control of an attacker
  4. Attacker who controls a botnet
  5. Database of viruses used to identify infected files
  6. Computer code that is dormant until it is triggered by a specific logical event
  7. General term used to describe software that spies on users by gathering information without consent
Down
  1. Program or feature incorporated in a browser that stops popup advertisements from appearing
  2. Enhancements to software to provide expanded functionality, but do not address vulnerabilities
  3. Software that is a cumulative package of all patches and feature updates
  4. Malware preventing devices from properly operating until a fee is paid
  5. Software that helps prevent computers from becoming infected by spyware
  6. Infected computer under remote control of an attacker
  7. Malicious computer code that reproduces itself on a computer
  8. Software of hardware device that captures each keystroke that is typed on the computer's keyboard
  9. Hardware or software designed to limit spread of malware
  10. Software code that gives access to a program that circumvents normal security protections
  11. Publicly released software security update to repair a vulnerability
  12. Malicious program designed to enter a computer via a network to take advantage of vulnerabilities
  13. Security program that delivers advertising content in a way that is unexpected and unwanted

20 Clues: Attacker who controls a botnetDatabase of viruses used to identify infected filesInfected computer under remote control of an attackerHardware or software designed to limit spread of malwareMalicious computer code that reproduces itself on a computerLogical computer network of zombies under control of an attacker...

Public Security 2016-10-01

Public Security crossword puzzle
Across
  1. Detective
  2. Delincuente
  3. Forense
  4. Motín
  5. Seguridad
  6. Robo
  7. Culpable
  8. Secuestro
  9. Orden
  10. Lealtad
  11. Prueba
  12. Delito
  13. Asalto
  14. Ley
  15. Inocente
  16. Pistola
  17. Cárcel
  18. Corporación
  19. Esposas
  20. Investigación
  21. Chaleco antibalas
  22. Cadáver
  23. Fiscal
  24. Juez
  25. Ciencia
Down
  1. Abogado
  2. Marina
  3. Disciplina
  4. Código
  5. Uniforme
  6. Ejercito
  7. Patrulla
  8. Ladrón
  9. Protección
  10. Recompensa
  11. Violencia
  12. Tecnología
  13. University
  14. Ministerio público
  15. Huella digital
  16. Educación
  17. Inteligencia
  18. Rango
  19. Gas lacrimógeno
  20. Cuchillo
  21. Autopsia
  22. Sospechoso
  23. Entrenamiento
  24. Evidencia
  25. Policía
  26. Victima
  27. Arma

52 Clues: LeyRoboArmaJuezMotínOrdenRangoMarinaCódigoLadrónPruebaDelitoAsaltoCárcelFiscalAbogadoForenseLealtadPistolaEsposasPolicíaCadáverVictimaCienciaUniformeEjercitoPatrullaCulpableInocenteCuchilloAutopsiaDetectiveSeguridadSecuestroViolenciaEducaciónEvidenciaDisciplinaProtecciónRecompensaTecnologíaUniversitySospechosoDelincuenteCorporaciónInteligencia...

Security Markets 2018-01-22

Security Markets crossword puzzle
Across
  1. trading: computer triggers are established in which large-volume trades can be initiated by institutional investors
  2. sheets: electronic quotation service that gathers and publishes bid and ask quotation prices
  3. market: occurs when prices respond to new information, when each successive trade is made at a price close to the preceding price
  4. dot: allows NYSE member firms to electronically transmit all market and limit orders directly to the specialist at the trading post or the member trading booth
  5. banker: serves as the middleman in the process of raising funds
  6. guarantee the investment banking firm gives the selling firm to purchase its securities at a fixed price
  7. stock market: first electronic stock market listing over 5000 companies
  8. option: gives the owner the right to buy 100 shares of the underlying common stock at a set price for a certain period
  9. brokers and independent brokers: two types of floor brokers
  10. trading: rely on mathematical algorithms to trigger the trades without any human interaction
  11. markets: markets for existing assets that can be traded between investors i.e. NYSE
  12. public offering: bring private companies public for the first time
  13. brokers and specialists: the two types of members at the NYSE
  14. efforts: basis where the issuing firm assumes the risk and simply takes back an securities not sold after a fixed period
Down
  1. a way of exchanging assets
  2. markets: distinguished by the flow of funds between the market participants
  3. Advisor Act of 1940: set up to protect the public from unethical investment advisors
  4. exchange: formed in 2005 as an ECN and was granted exchange status by the SEC
  5. book: a database that keeps track of limit orders and market orders for the specialist
  6. Investor Protection Corporation: established to oversee liquidation of brokerage firms and to insure investors accounts to a maximum value of $500,000
  7. Exchange: founded to create a 24 hour electronic market for energy contracts
  8. directly: where the company sells its stock to the public without the help of an investment bank
  9. the counter bulletin board: electronic trading service provided by the NASD that offers traders and investors up-to-the-minute quotes, last-price sales, and volume information for equity securities traded over the counter
  10. traded funds: closed-end funds and structured products i.e. Standard and Poors 500 index and the DJIA
  11. York Stock Exchange: a stock exchange in New York that began as a physical location
  12. breakers: will shut down the markets or a stock in the event that it takes a pre-defined drop
  13. crash: rapid, deep, and volatile fall in security prices occurring within an extremely short time period

27 Clues: a way of exchanging assetsbrokers and independent brokers: two types of floor brokersbrokers and specialists: the two types of members at the NYSEbanker: serves as the middleman in the process of raising fundspublic offering: bring private companies public for the first timestock market: first electronic stock market listing over 5000 companies...

Network Security 2018-03-03

Network Security crossword puzzle
Across
  1. stacked one on top of the other
  2. has permission to proceed
  3. belong to an entity only
  4. able to reach a destination
  5. able to enter into
  6. action taken to destroy or manipulate
  7. perception of a person or company
  8. act of using 1 and 0 to communicate
  9. maintaining the accuracy and consistency
  10. outer area
Down
  1. bad intention is not good
  2. interconnected system
  3. policies and procedures established to protect the network from harm or misuse
  4. can not enter
  5. prevent damage or harm
  6. stored and transmitted by electrical signals
  7. ability to use a system with ease
  8. take advantage of a weakness
  9. anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset
  10. protect against

20 Clues: can not enterinterconnected systemprotect againstouter areabelong to an entity onlyable to enter intoprevent damage or harmhas permission to proceedbad intention is not goodperception of a person or companyable to reach a destinationtake advantage of a weakness...

Security Crossword 2023-05-26

Security Crossword crossword puzzle
Across
  1. these are generally audible in nature
  2. this side of the building or TEAM is known for receiving product
  3. this acronym identifies merchandise that is highly sought or expensive
  4. this program is used to clear alarms as well as monitor alarms
  5. this part of the building houses hazardous labeled products...some you would use in your HAIR!
  6. written, typed or vocalized are forms of this
  7. this website should be used to track weather conditions
  8. this side of the building is responsible for removal/shipping out product from the FC
  9. full height access controlled device
  10. these aisles are known as this because they are extremely close together
  11. only done in emergency situations deemed appropriate by the Safety, GM or LP advisement
Down
  1. this number is specific to amazon product/items and is used to identify product
  2. this program is used to provide access to visitors and keep track of them as well
  3. office used to treat the sick and injured
  4. this program helps us account for everyone during an emergency situation
  5. this should be collected from witnesses or victims
  6. this should not be present at the Security Desk
  7. should be detailed and descriptive
  8. validating a persons badge and their access levels; can do badge trace as well
  9. this is the new CMS method you should be using

20 Clues: should be detailed and descriptivefull height access controlled devicethese are generally audible in natureoffice used to treat the sick and injuredwritten, typed or vocalized are forms of thisthis is the new CMS method you should be usingthis should not be present at the Security Deskthis should be collected from witnesses or victims...

Security Safety 2023-07-19

Security Safety crossword puzzle
Across
  1. Biological user authentication methods
  2. Software used to prevent cyberattacks
  3. Malicious web browser advertisements
  4. Publishing private user information
  5. Blocks fraudulent network traffic
  6. Maliciously placed computer system infection
  7. Attacker changes DNS server information
  8. Intimidating and threatening electronic communication
  9. Words used for account access
Down
  1. Tracks user's keystrokes
  2. Practice of protecting computer systems
  3. Computer networks used for cyberattacks
  4. Forceful hacker password guessing technique
  5. Fraudulent solicitation through an email
  6. More than two authentication techniques
  7. Requires users to confirm identity
  8. Tracks user's online behavior
  9. Plans and implements security measures
  10. Malicious click tricks
  11. Use of fake website addresses

20 Clues: Malicious click tricksTracks user's keystrokesTracks user's online behaviorUse of fake website addressesWords used for account accessBlocks fraudulent network trafficRequires users to confirm identityPublishing private user informationMalicious web browser advertisementsSoftware used to prevent cyberattacksBiological user authentication methods...

Security - Training 2023-12-25

Security - Training crossword puzzle
Across
  1. SS.
  2. weekends.
  3. PPE.
  4. what are we.
  5. reset.
  6. coordinator.
  7. you can find me in any floors.
  8. paper print.
Down
  1. H7.
  2. in coming chat request.
  3. keys.
  4. ABBAS.
  5. 1800hrs.
  6. C227
  7. building related.
  8. CALL SIGN.
  9. evacuate.
  10. disinfect.
  11. WORK INJURY.
  12. we write in.
  13. woof woof.
  14. I'm red.

22 Clues: H7.SS.PPE.C227keys.ABBAS.reset.1800hrs.I'm red.weekends.evacuate.CALL SIGN.disinfect.woof woof.what are we.WORK INJURY.coordinator.we write in.paper print.building related.in coming chat request.you can find me in any floors.

Security Crossword 2024-04-09

Security Crossword crossword puzzle
Across
  1. a physical device assigned to a user that can generate a unique code
  2. security principle that ensures information is only modified in an authorized manner
  3. security principle that ensures information is accessible by authorized users whenever required
  4. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  5. security principle that ensures information is only disclosed or made available to authorized users
  6. notification sent by an authentication server to a mobile device associated with a user
  7. a case of unauthorized computer access
  8. extra information that describes data, like location information or author information
  9. the act of verifying or proving a user's claim to an identity
  10. aspect of a computer that can be used to breach security
  11. special codes used to decode data
  12. the act of granting a user access to a system resource
  13. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  14. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  15. a type of malware disguised as legitimate software such as a game or a utility application
  16. measurements of the unique characteristics of an individual
Down
  1. control which users, groups, or services can perform an action on a file
  2. A standardized set of rules for formatting and processing data
  3. is the act of a user claiming an identity
  4. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  5. any software developed to compromise the confidentiality, integrity, or availability of data
  6. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  7. a phishing attack aimed at a high-value individual like a CEO
  8. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  9. intelligence derived from publicly available information on an individual or organization
  10. the process of adding geographical identification to a device
  11. the most common form of a breach
  12. an authentication method that uses only one authentication factor to verify a claimed identity
  13. a protected environment where suspicious files can be run
  14. software that provides protection against computer viruses and many other forms of malware

30 Clues: the most common form of a breachspecial codes used to decode dataa case of unauthorized computer accessis the act of a user claiming an identitythe act of granting a user access to a system resourceaspect of a computer that can be used to breach securitya protected environment where suspicious files can be run...

Household Security 2024-09-19

Household Security crossword puzzle
Across
  1. What do you open to enter a fenced area?
  2. What turns on automatically when someone approaches the house?
  3. Wakes you up or alerts you to danger.
  4. Makes a sound when someone is at the door.
  5. Detects motion or changes in the environment.
  6. Watches over an area with cameras.
  7. Where do you enter numbers to unlock a door?
  8. A secret number you enter to unlock something.
  9. What keeps the door securely closed?
Down
  1. A simple way to keep a door or window closed without a key.
  2. What takes pictures or records videos for security?
  3. A person who protects a place.
  4. What stores valuable items securely?
  5. Metal rods that protect windows or doors.
  6. A metal bar that locks a door from the inside.
  7. Makes a loud noise to alert people to danger.
  8. A barrier that surrounds your yard.
  9. What you wear on your wrist to check the time?
  10. Protects you from harm.
  11. What do you need to unlock a door?

20 Clues: Protects you from harm.A person who protects a place.Watches over an area with cameras.What do you need to unlock a door?A barrier that surrounds your yard.What stores valuable items securely?What keeps the door securely closed?Wakes you up or alerts you to danger.What do you open to enter a fenced area?Metal rods that protect windows or doors....

Security Crossword 2025-01-20

Security Crossword crossword puzzle
Across
  1. - Software that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
  2. - A vulnerability in software that is unknown to the vendor and can be exploited by hackers.
  3. - A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. - The process of converting an input (or 'message') into a fixed-length string of characters, which is typically a hash code.
  5. - The process of verifying the identity of a user or process.
  6. - A network of private computers infected with malicious software and controlled as a group.
  7. - A method of trying to gather personal information using deceptive e-mails and websites.
  8. - A type of malware that is often disguised as legitimate software.
Down
  1. - A method of bypassing normal authentication to secure unauthorized remote access to a computer.
  2. - A network security system that monitors and controls incoming and outgoing network traffic.
  3. - A type of surveillance software that has the capability to record every keystroke you make.
  4. - The process of converting information or data into a code to prevent unauthorized access.
  5. - A collection of software tools that enable unauthorized access to a computer or network.
  6. - Software that enables a user to obtain covert information about another's computer activities.
  7. - Virtual Private Network, a service that encrypts your internet traffic and protects your online identity.
  8. - A security mechanism for separating running programs to reduce system failures or software vulnerabilities.
  9. - Distributed Denial of Service, an attack meant to shut down a machine or network, making it inaccessible.
  10. - A piece of software designed to update or fix problems with a computer program or its supporting data.
  11. - Software designed to detect and destroy computer viruses.
  12. - Unauthorized access to a computer system or network.

20 Clues: - Unauthorized access to a computer system or network.- Software designed to detect and destroy computer viruses.- The process of verifying the identity of a user or process.- A type of malware that is often disguised as legitimate software.- A method of trying to gather personal information using deceptive e-mails and websites....

Security & Cybercrimes 2024-11-20

Security & Cybercrimes crossword puzzle
Across
  1. an action that violates the security of the system
  2. a malware that demands payment to gain access to your computer or files again
  3. a weakness that can compromise the security of the system
  4. any sexual activity done with the aid of computer systems
  5. allows the user to use an application or perform an operation
  6. a state of well-being of information and infrastructures
  7. using or copying ideas of others without their consent
  8. it has to be protected and secured
  9. work on its own without attaching itself to files or programs
Down
  1. used by third parties to infiltrate your computer
  2. a crime involving computers
  3. an attempt to obtain sensitive information
  4. taken in advance to protect the system against potential threats
  5. degrades system performance and poses a security threat
  6. malicious software
  7. must be strong to protect accounts
  8. ensuring that the information is accurate, complete, reliable, and is in its original form
  9. another term for phishing
  10. exclusive legal right
  11. an individual who breaks into computer systems to steal, change, or destroy information

20 Clues: malicious softwareexclusive legal rightanother term for phishinga crime involving computersmust be strong to protect accountsit has to be protected and securedan attempt to obtain sensitive informationused by third parties to infiltrate your computeran action that violates the security of the system...

Physical security 2025-03-06

Physical security crossword puzzle
Across
  1. – This happens when devices are not properly ventilated, leading to fire risks.
  2. – These can catch fire if overloaded.
  3. – A general term for any potential danger.
  4. – A danger caused by touching live cables.
  5. – A method to reduce the risk of electrical shock.
  6. – These can fall and cause injury if not placed securely.
  7. – Needed to prevent equipment from overheating.
  8. – A safety tool to put out electrical fires.
  9. – The general term for measures to prevent hazards.
  10. – A cause of fire when too many devices are plugged into a socket.
Down
  1. – The effect of an electric current passing through a person.
  2. – Spilling these near electrical equipment can lead to electrocution.
  3. – A strategy to prevent tripping hazards.
  4. – The act of stopping accidents before they happen.
  5. – Need to be properly managed to prevent tripping and electrocution.
  6. – Educating staff on safety practices.
  7. – The way out during fire hazards.
  8. – Cables forming these can lead to tripping hazards.
  9. – Covering wires properly to prevent electrocution.
  10. – A system that alerts people in case of fire.

20 Clues: – The way out during fire hazards.– These can catch fire if overloaded.– Educating staff on safety practices.– A strategy to prevent tripping hazards.– A general term for any potential danger.– A danger caused by touching live cables.– A safety tool to put out electrical fires.– A system that alerts people in case of fire....

Physical security 2025-03-06

Physical security crossword puzzle
Across
  1. – A secret code to protect computers.
  2. – Used to keep computer rooms safe.
  3. – Can be caused by overheating computers.
  4. – Should be locked when not in use.
  5. – A label to identify important ICT items.
  6. – These must be handled safely to avoid damage.
  7. – A camera system used for security monitoring.
  8. – Guidelines that help keep ICT equipment safe.
  9. – A loud sound that warns of danger.
  10. – What we should do to computers when not in use.
  11. – The way to leave safely in an emergency.
Down
  1. – These must be managed properly to prevent tripping.
  2. – Should be locked to keep computers safe.
  3. – Used to watch and record security footage.
  4. – Used to unlock doors and cabinets.
  5. – A card used to enter secure places.
  6. – A motion used to unlock some security doors.
  7. – A person who protects a place.
  8. – The protection of computers and information.
  9. – What we should always be when using ICT equipment.

20 Clues: – A person who protects a place.– Used to keep computer rooms safe.– Should be locked when not in use.– Used to unlock doors and cabinets.– A loud sound that warns of danger.– A secret code to protect computers.– A card used to enter secure places.– Can be caused by overheating computers.– Should be locked to keep computers safe....

Computer Security 2025-03-14

Computer Security crossword puzzle
Across
  1. Anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen but has the potential to cause serious damage.
  2. Use of modern electronic means to manipulate an event or influence public perception toward a certain point of view.
  3. Misuse This refers to entering a computer system without permission (hacking).
  4. An attempt to make a machine or network resource unavailable to its intended users, such as temporarily or indefinitely interrupting or suspending services of a host connected to the internet.
  5. Software that installs itself onto devices and then steals personal information about the user, like passwords, email addresses and other important information.
  6. An action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS).
  7. Is the use of technology to harass, threaten, embarrass, or target another person.
  8. Pretends it will be a useful and safe program.
  9. When someone accesses information without permission.
  10. Theft Is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
  11. A security barrier designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside.
  12. Copying and distributing of recordings of a piece of music for which the rights owners (composer, recording artist, or copyright-holding record company) did not give consent.
  13. Sending the same message indiscriminately to a large number of internet users.
Down
  1. The act of intercepting communications between two points.
  2. A flaw or weakness in a system or network that could leave it open to attacks or allow an attacker to manipulate the system in some way.
  3. The protection of computing systems and the data that they store or access.
  4. An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission.
  5. The practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information online.
  6. A malicious program or code that attaches itself to another program or file and can replicate itself, thereby infecting other systems.
  7. Can spread from device to device, but unlike a virus they don’t need to attach themselves to other programs.
  8. Gaining unauthorized access to data in a system or computer.
  9. A network of private computers infected with malicious software and controlled as a group without the owner's knowledge, often used to send spam.
  10. The act of illegally using, copying or distributing software without ownership or legal rights.
  11. Any illegal activity that uses a computer as its primary means of commission.
  12. Covert activities, such as the theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
  13. The practice of using another person's name and personal information to obtain credit, loans, etc.

26 Clues: Pretends it will be a useful and safe program.When someone accesses information without permission.The act of intercepting communications between two points.Gaining unauthorized access to data in a system or computer.The protection of computing systems and the data that they store or access....

Information Security 2025-09-23

Information Security crossword puzzle
Across
  1. Digital proof of identity used in secure communications (9 letters)
  2. A program that pretends to be legitimate but is malicious (5 letters)
  3. An attack that overwhelms a system with traffic (3 letters)
  4. Opposite of encryption (11 letters)
  5. The process of converting data into unreadable form (10 letters)
  6. Software that spreads copies of itself across networks (5 letters)
  7. Ensuring data is not altered during storage or transfer (7 letters)
  8. Harmful software designed to damage systems (6 letters)
  9. Short form of "Personally Identifiable Information" (3 letters)
  10. Unauthorized access to a computer system (5 letters)
Down
  1. The process of verifying user identity (14 letters)
  2. Practice of disguising data to protect privacy (7 letters)
  3. Malicious software that locks files and demands payment (10 letters)
  4. Secret word or phrase used for authentication (8 letters)
  5. Unintended weakness in software that can be exploited (12 letters)
  6. A person who breaks into systems legally to find vulnerabilities (9 letters)
  7. Stronger form of DoS using multiple computers (4 letters)
  8. Attempt to trick users into revealing sensitive information via fake emails (7 letters)
  9. Security barrier between internal network and outside world (8 letters)
  10. Secret numeric code used in two-factor authentication (3 letters)

20 Clues: Opposite of encryption (11 letters)The process of verifying user identity (14 letters)Unauthorized access to a computer system (5 letters)Harmful software designed to damage systems (6 letters)Secret word or phrase used for authentication (8 letters)Stronger form of DoS using multiple computers (4 letters)...

Industrial security 2025-10-15

Industrial security crossword puzzle
Across
  1. – A prepared procedure to handle emergencies or disasters.
  2. – Security measure restricting movement due to threats.
  3. – A potential cause of unwanted incident or harm.
  4. – A person employed to protect property and personnel.
  5. – A badge used for identification and access within a facility.
  6. – A designated safe route used during an evacuation.
  7. – A set of rules and guidelines for security operations.
  8. – Continuous observation of people or areas for security purposes.
  9. – The routine inspection of areas to ensure safety and security.
  10. – The act of keeping people and assets safe from harm.
  11. – Unauthorized entry into a restricted area.
  12. – A system that uses video cameras to monitor and record activities.
  13. – A system that restricts entry to authorized personnel only.
Down
  1. – Written documentation of a security event or breach.
  2. – The process of identifying and evaluating potential hazards.
  3. – The deliberate destruction or disruption of industrial operations.
  4. – The act of stealing small quantities or low-value items from the workplace.
  5. – Protection of computer systems from digital attacks.
  6. – A weakness that can be exploited by threats.
  7. – Device that signals when unauthorized access occurs.

20 Clues: – Unauthorized entry into a restricted area.– A weakness that can be exploited by threats.– A potential cause of unwanted incident or harm.– A designated safe route used during an evacuation.– Written documentation of a security event or breach.– A person employed to protect property and personnel....

Cyber Corner 2023-03-27

Cyber Corner crossword puzzle
Across
  1. Technique used to impersonate another user or system in order to gain access or hide identity
  2. attack that floods a target with traffic to make it unavailable to users
  3. Type of social engineering attack that uses emails or fake websites to steal personal information
  4. Software designed to harm a computer system or network
  5. Ethical hacker who uses their skills to help identify and fix security vulnerabilities
  6. a method for breaking into a system by trying every possible password combination.
  7. Type of malware designed to hide its presence and maintain privileged access to a computer system
  8. Hidden method of accessing a computer system that bypasses normal authentication procedures
  9. Malware disguised as legitimate software that can give an attacker access to a computer system
Down
  1. a type of malicious software that can encrypt files and demand payment for that release.
  2. a technique used to exploit vulnerabilities in a web application’s database.
  3. Malicious hacker who uses their skills to exploit security vulnerabilities for personal gain or harm
  4. Abbrev. of the attack in which an attacker intercepts communication between two parties and can eavesdrop, modify or inject malicious code into the communication.
  5. Software or device used to intercept and read network traffic
  6. Network of infected computers that are controlled remotely by an attacker
  7. Vulnerability in a computer system or software that is not yet known to the vendor or public
  8. Software or technique that takes advantage of a vulnerability in a computer system or application

17 Clues: Software designed to harm a computer system or networkSoftware or device used to intercept and read network trafficattack that floods a target with traffic to make it unavailable to usersNetwork of infected computers that are controlled remotely by an attackera technique used to exploit vulnerabilities in a web application’s database....

Cyber Literacy 2025-08-22

Cyber Literacy crossword puzzle
Across
  1. Emails that “fish” for users’ private information
  2. Malicious software used by hackers or cybercriminals
  3. and E-Commerce To convince people to buy something
  4. Words most relevant to our topic
  5. repeatedly sending mean messages
  6. revealing someone’s private thoughts
  7. Re-direct users to a phony website
Down
  1. Hackers that commit financial crimes
  2. insulting someone in an online discussion
  3. Questions Questions about a subject and what you want to learn
  4. People who “hack” or break into computer systems
  5. To learn about something
  6. threats Breaches of security causing harm to a computer
  7. stealing someone’s passwords and using for fraud
  8. Engines A tool to wade through the billions of websites
  9. Search Logical operators such as and, or, and not
  10. spreading lies and rumors

17 Clues: To learn about somethingspreading lies and rumorsWords most relevant to our topicrepeatedly sending mean messagesRe-direct users to a phony websiteHackers that commit financial crimesrevealing someone’s private thoughtsinsulting someone in an online discussionPeople who “hack” or break into computer systems...

test2 2023-07-11

test2 crossword puzzle
Across
  1. One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck
  2. One of the the Purpose (SMART)
  3. An initiative powered by Women in Tech; a platform for everyone to connect with prominent leaders on different topics from innovations to work-life balance
Down
  1. People System that reflects the whole spectrum of our HR development environment
  2. One of the Values
  3. Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing

6 Clues: One of the ValuesOne of the the Purpose (SMART)People System that reflects the whole spectrum of our HR development environmentCampaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing...

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY  IV Year / VII Sem FJ3 -17.10.25 SET B Duration :15 mins Marks:20 crossword puzzle
Across
  1. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
  2. Gateways that provide services to inside users while protecting hosts from outside users.
  3. Malware analysis that involves running the program in a controlled environment.
  4. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
  5. Formal and systematic security assessment and assurance process for a computer system.
  6. Attackers use username and password pairs from old breaches to access new accounts.
  7. Network security appliances that act as a barrier between trusted and untrusted networks.
  8. Security analysis technique that looks for statistical deviations from a security baseline
  9. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
  10. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
  1. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
  2. Machine learning model used in threat hunting to find correlations in data.
  3. Tools that protect systems by detecting and eliminating a wide range of malicious software.
  4. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
  5. Extortion-based threat where malicious code denies access to data until a sum is paid.
  6. Social engineering technique that offers something enticing like free software containing malware.
  7. Malicious digital communication causing emotional harm.
  8. Forensic data layer containing file timestamps, size, author, and geolocation details.
  9. Formal process of technical evaluation for a system's or individual's security effectiveness.
  10. Free software framework for scanning and managing known security vulnerabilities.

20 Clues: Malicious digital communication causing emotional harm.Machine learning model used in threat hunting to find correlations in data.Malware analysis that involves running the program in a controlled environment.Free software framework for scanning and managing known security vulnerabilities....

Win an iPad mini from SIX Financial Information! 2013-04-01

Win an iPad mini from SIX Financial Information! crossword puzzle
Across
  1. How many global security ID schemes cross-referenced by SIX
  2. When the sum of 1 plus 1 might equal 3?
  3. International security ID number
  4. Managing Director of SIX Financial Information USA
  5. Brand of bourbon or one of the AL state birds
  6. How many millions of securities in SIX Financial’s DB?
  7. Creator of 15022 and 20022 message standards
  8. Capital of Alabama
  9. How many decades SIX has been in business?
Down
  1. When an issuer buys back securities?
  2. Company recently acquired by SunGard
  3. Provider of corp. actions & cross reference data
  4. One type of distribution
  5. Provider of secure financial messaging services
  6. What some debtors declare?
  7. UK security identification scheme
  8. Largest city in Alabama
  9. No. times SIX named "Best Corp. Actions Data Provider"
  10. Type of data that describes a security or issuer
  11. Swiss national security ID number
  12. Brendan’s last name

21 Clues: Capital of AlabamaBrendan’s last nameLargest city in AlabamaOne type of distributionWhat some debtors declare?International security ID numberUK security identification schemeSwiss national security ID numberWhen an issuer buys back securities?Company recently acquired by SunGardWhen the sum of 1 plus 1 might equal 3?...

web safety 2023-08-22

web safety crossword puzzle
Across
  1. Monitoring web activity for ads.
  2. Dual-step login for added security.
  3. Unauthorized release of private info.
  4. Redirecting traffic to malicious sites.
  5. Stealing info for fraudulent purposes.
  6. Virtual private network for secure browsing.
  7. Harassment/intimidation behavior online.
  8. coding for utmost security.
  9. Cautious online behavior to avoid risks.
  10. Programs combating malware infections.
  11. Complex code to protect accounts.
  12. Manipulating to access sensitive data.
Down
  1. Restricting location data sharing.
  2. Regular maintenance of online security.
  3. Regularly saving data to prevent loss.
  4. Security barrier blocking unauthorized access.
  5. Deceptive emails/websites aiming to steal info.
  6. Protecting identifiable personal info.
  7. Harmful software harming devices/data.
  8. Fixes for software security vulnerabilities.
  9. Fraudulent schemes for financial gain.
  10. Controls limiting shared personal info.
  11. Coding data to prevent unauthorized reading.
  12. Securely locking devices to deter access.
  13. Online traces revealing user activities.

25 Clues: coding for utmost security.Monitoring web activity for ads.Complex code to protect accounts.Restricting location data sharing.Dual-step login for added security.Unauthorized release of private info.Regularly saving data to prevent loss.Stealing info for fraudulent purposes.Protecting identifiable personal info.Harmful software harming devices/data....

Security 101 2022-09-22

Security 101 crossword puzzle
Across
  1. You are required to ____ any suspicious behavior to Jovian Security.
  2. One of the penalties for failure to comply with export guidelines is ____ years in prison.
  3. The last name of your Security Manager/FSO/CSSO.
  4. When someone sends an email with a link to a bogus website that tricks you into giving up your password, it is called ____.
  5. Your ____ is your underwear; don't share it with your friends and change it often.
  6. This information is deemed sensitive by the USG and requires protection of confidentiality.
  7. If you ____ something, say something.
  8. Two types of terrorism are International and ____.
  9. Owning a security clearance does not mean you have the right to access all classified information; you must also have ____.
  10. ____ is a US regulatory regime to restrict and control the export of defense and military related technologies to safeguard the US national security and further US foreign policy objectives.
  11. An unsolicited request for detailed information about your job, security clearance, contract activities, etc. would be considered a ____ contact.
Down
  1. Your Top Secret clearance is referred to as your ____ clearance.
  2. This information, if disclosed, could reasonably be expected to cause exceptionally grave damage to National Security.
  3. Never click on these in an email that has been sent by an unknown or untrusted source.
  4. ____ information is any information about you or another cleared employee that suggests the ability to safeguard classified information may be impaired.
  5. An ____ is an employee with legitimate access who is hardest to detect and who can cause the most damage to a company.
  6. As a cleared employee of the federal government, you should neither confirm nor deny the validity of any classified information that appears in open-source publications, on television, or in movies. This is covered under Public ____.
  7. Safeguard protected information, report unauthorized disclosure, and prepublication are your three ____ obligations.
  8. A malicious code that can infect your system.
  9. Any data that could be used to potentially identify a person.

20 Clues: If you ____ something, say something.A malicious code that can infect your system.The last name of your Security Manager/FSO/CSSO.Two types of terrorism are International and ____.Any data that could be used to potentially identify a person.Your Top Secret clearance is referred to as your ____ clearance....

Food Security 2020-10-08

Food Security crossword puzzle
Across
  1. When the supply on household level remains constant during the year and in the long-term
  2. Unfortunately these disputes contribute drastically to food security
  3. One risk factor or reason for malnutrition
  4. When all people have access to sufficient food that meets the needs of an active life
  5. Distance food travels from production to consumption
  6. Where the government regulates the food industry so food is safe to eat and consumers can make informed choices about food.
  7. Not enough food to eat
  8. Children who do not get enough food are shorter, weigh less and be less able physically and _______________________.
  9. Something to do with the weather which affects food availability
  10. Where most of the world's undernourished people live
  11. Unable to access enough food to sustain health and well being
  12. A threat to food security, lack of access to enough safe water.
Down
  1. process in which a general population is supplied with food
  2. At home, food needs to be prepared in this way
  3. When there is a shortage of food, prices ………….
  4. When people don’t have access to sustainable and nutritious food
  5. Nutrients missing from diet.
  6. Ability to meet the needs of the current population whilst not compromising future generations
  7. When people have enough food of appropriate quality available on a consistent basis.
  8. Another crucial factor to help remove food insecurity

20 Clues: Not enough food to eatNutrients missing from diet.One risk factor or reason for malnutritionAt home, food needs to be prepared in this wayWhen there is a shortage of food, prices ………….Distance food travels from production to consumptionWhere most of the world's undernourished people liveAnother crucial factor to help remove food insecurity...

Security Crossword 2020-02-21

Security Crossword crossword puzzle
Across
  1. act or process of growth; to bring out the capabilities or possibilities of;
  2. on the integrity, strength, ability, surety, etc.
  3. to bear or hold up; serve as a foundation for
  4. a person or thing that leads
  5. act or process of acquiring knowledge or skill.
  6. careful watch for possible danger
  7. or coordinated effort on the part of a group of people
  8. relative worth, merit, or importance
  9. condition of being protected from injury or danger
  10. competence or skill expected of a professional
  11. written or clerical records or reports, forming a necessary but often a routine
  12. a person’s manner, disposition, feeling, position, etc.,
Down
  1. requirement or obligatory for getting, having to holding a post
  2. matter that engages a person's attention, interest, or care, or that affects a person's welfare or happiness
  3. inquiry or interrogation.
  4. inspire with courage, spirit, or confidence
  5. systematic series of actions directed to some end
  6. act or instance of leading; guidance; direction
  7. derived from one's own achievements
  8. a person, vehicle or group
  9. things, conditions, or influences; surroundings
  10. right of possession; proprietorship.
  11. account or statement describing in detail an event, situation
  12. inquiry for ascertaining facts; detailed or careful examination
  13. sound; signal for attention
  14. fact or condition of being responsible
  15. hold in esteem or honor
  16. person’s manner of behaving or acting
  17. set of concise instructions or a summary of events

29 Clues: hold in esteem or honorinquiry or interrogation.a person, vehicle or groupsound; signal for attentiona person or thing that leadscareful watch for possible dangerderived from one's own achievementsright of possession; proprietorship.relative worth, merit, or importanceperson’s manner of behaving or actingfact or condition of being responsible...

Security Crossword 2020-05-11

Security Crossword crossword puzzle
Across
  1. A system that binds public keys with identities
  2. CVP of ID PM at MS
  3. An avid skateboarder started this widely admired security company
  4. The TF in 17 Across was the architect for this technology
  5. Where you might specify a number used once
  6. First name, middle name, and surname, but for computers
  7. Sneaky character commonly found in discussions about Alice and Bob
  8. Used in silver ticket attacks: T??
  9. A security MVP with a popular AAD blog whom the author introduced to 17 across
  10. AAD researcher you might meet in Finland
  11. CVP of ID was once a Director of Development for this remote access protocol
  12. Controversial variable name discovered in Windows in 1999
  13. Mallory specializes in this kind of attack
  14. Before you login into Office365, you first interact with this popular service
  15. You might pass the hash to attack this
  16. XML oriented standard full of assertions
  17. I?? Acronym for IT dept most likely to manage AD
Down
  1. Preauthentication process involving X.509
  2. Your UPN could be considered to be a form of this
  3. Known for its utility with SSO
  4. A container of sorts in AD parlance
  5. Dir. PM of ID Sec. at MS
  6. Alan Turing built a bombe to crack this
  7. To issue X.509 certificates, you'd stand up one of these
  8. To understand the internals of an unknown protocol, one might do this to it
  9. The prefix in the flags ??_KEYEXCHANGE and ??_SIGNATURE used in MS CryptoAPI
  10. Architect behind Microsoft's two most widely used identity systems
  11. Keeper of secrets in Windows
  12. SYSKEY was introduced to help encrypt this
  13. The NTLM hash is sometimes referred to as this
  14. Container of claims in SAML
  15. Fill in the missing letters of this cipher known in the 90s for augmented security: 3??S
  16. One way or Two way
  17. Alliance determined to replace passwords with stronger alternatives
  18. One might use this to mitigate a rainbow table attack
  19. Tina Turner ex-husband that shares a name with IPSEC protocol
  20. Popular utility for 'handling' Windows credentials
  21. A salve for password fatigue

38 Clues: CVP of ID PM at MSOne way or Two wayDir. PM of ID Sec. at MSContainer of claims in SAMLKeeper of secrets in WindowsA salve for password fatigueKnown for its utility with SSOUsed in silver ticket attacks: T??A container of sorts in AD parlanceYou might pass the hash to attack thisAlan Turing built a bombe to crack this...

information security 2020-12-18

information security crossword puzzle
Across
  1. someone who is in a position of authority in an organization
  2. to keep someone or something safe from harm, damage, or illness
  3. what you earn by working and can use to buy things
  4. the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
  5. the sets of programs that tell a computer how to do a particular job
  6. the act of deliberately making someone believe something that is not true
  7. the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
  8. to damage something so badly that it no longer exists or cannot be used or repaired
  9. someone who steals things from another person or place
  10. facts or details that tell you something about a situation, person
Down
  1. very convenience
  2. someone who secretly uses or changes the information in other people’s computer systems
  3. relating to crime
  4. a small plastic card that you use to buy goods or services and pay for them later
  5. connect people
  6. a group of related parts that work together as a whole for a particular purpose
  7. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  8. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  9. seeming bad or dishonest
  10. to calculate a result, answer, sum etc
  11. message
  12. the state of being able to be alone, and not seen or heard by other people

22 Clues: messageconnect peoplevery conveniencerelating to crimeseeming bad or dishonestto calculate a result, answer, sum etcwhat you earn by working and can use to buy thingssomeone who steals things from another person or placesomeone who is in a position of authority in an organizationto keep someone or something safe from harm, damage, or illness...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneyto make a computer, machine, or piece ofa machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneyto make a computer, machine, or piece ofa machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

Security 101 2021-09-16

Security 101 crossword puzzle
Across
  1. distributed type of denial
  2. Public Key Infrastructure
  3. robot and network
  4. Invented WWW
  5. stuxnet virus type
  6. legitimate and bypasses security
  7. A meaning in CIA
  8. first commercially successful video game
  9. replacement for telnet
  10. injected or persistent script
  11. security flaw or weakness
  12. same key for encryption/decryption
Down
  1. popular hacking tool
  2. TOR dark web
  3. famous hacking convention in Las Vegas
  4. best password has
  5. Invented Email
  6. person who finds and exploits vulnerabilities
  7. first self-replicating virus
  8. First computer bug
  9. virtual information resource under siege
  10. Firstname Linux Creator
  11. process to extend length of password
  12. different keys for encryption/decryption
  13. tool to scan TCP ports

25 Clues: TOR dark webInvented WWWInvented EmailA meaning in CIArobot and networkbest password hasstuxnet virus typeFirst computer bugpopular hacking toolreplacement for telnettool to scan TCP portsFirstname Linux CreatorPublic Key Infrastructuresecurity flaw or weaknessdistributed type of denialfirst self-replicating virusinjected or persistent script...

IT Security 2021-03-01

IT Security crossword puzzle
Across
  1. An Internet _____ is a number designating a specific protocol or command
  2. _____ code execution provides for a hacker to make changes to a device wherever they are
  3. IP Address is a _______ label assigned to each device on a network
  4. Service _____ identifier
  5. _____ code, the exploitation of a computer bug by processing invalid data
  6. A _____ of concept allows for experimenting
  7. Common vulnerability _____ system
  8. Identifies, monitors, and analyzes security events.
  9. Encryption is converting _____ to an unrecognizable form
  10. A _____ authority digital certificates
  11. Network: A group of ____ or more computers or devices which are linked together
  12. An _____ attack is immediately recognizable
  13. Pre-booting is the time between turning on a computer and _____ the operating system
  14. A port _____ is an application designed to probe a server or host for open ports
Down
  1. _____ escalation is to gain unauthorized elevated access to information technology
  2. Acts as a filter between a trusted system and an outside connection
  3. A technology or network weakness
  4. To take advantage of an IT weakness
  5. A standard set of rules that allow electronic devices to communicate with each other
  6. A _____ audit is a review of an organization's adherence to regulatory guidelines
  7. Health information privacy (US)
  8. A _____ healing device can recover on its own
  9. European data privacy act
  10. Defense in _____, multiple layers to security
  11. Moving _____ is to exploit from a vulnerable device to other areas of a network

25 Clues: Service _____ identifierEuropean data privacy actHealth information privacy (US)A technology or network weaknessCommon vulnerability _____ systemTo take advantage of an IT weaknessA _____ authority digital certificatesA _____ of concept allows for experimentingAn _____ attack is immediately recognizableA _____ healing device can recover on its own...

Network Security 2023-03-28

Network Security crossword puzzle
Across
  1. varies in size and can sustain network operations for only a limited time in the event of an outage
  2. attacker poses as a trusted site
  3. analyzes data, identifies attacks, responds to intrusions
  4. after user is authenticated, he is granted access to resources or services n the network
  5. pretends to do one thing while doing something malicious
  6. a form of network equipment redundancy
  7. a rogue access point that looks like a legit access point
  8. manipulating people inside the network environment to gain access to the network from the outside
  9. uses your info to generate targeted ads
  10. used to check for weakness in a network
  11. consists of software safeguards
  12. programming a list of mac addresses that you accept and block all others
Down
  1. a program that has two jobs: to replicate and activate
  2. when a person goes through trash to find personal info
  3. a user identifies himself to the system and the identity is verified against authentication database
  4. duplication of digital components/devices
  5. hides itself from all but the most aggressive antimalware tools
  6. replicates exclusively through networks
  7. something on a system or network that you don't want to have to happen
  8. method used to prevent passage of any TCP or UDP segments or datagrams through any port other than ones assigned by system admin
  9. consists of hardware safeguards
  10. flooding the network w/so many requests that it stops functioning
  11. using another person's wireless network w/o permission
  12. software that helps prevent intrusions
  13. the tracking of a network and resource usage on the network

25 Clues: consists of hardware safeguardsconsists of software safeguardsattacker poses as a trusted sitea form of network equipment redundancysoftware that helps prevent intrusionsreplicates exclusively through networksuses your info to generate targeted adsused to check for weakness in a networkduplication of digital components/devices...

Internet Security 2013-10-03

Internet Security crossword puzzle
Across
  1. Software that sends information from your computer to a third party without your consent
  2. Programs that are designed to harm your computer
  3. A group of computers within a small area, such as a house, office or school, that are connected to each other
  4. Stealing information from mobile devices using a wireless connection Cookie – Information, usually in a file, about someone’s Internet activities, such as the date of the last visit to a Web site, preferences, etc.
  5. Driving around with a computer to find and access wireless networks
  6. A number used to identify a computer or other device on the Internet
  7. Trying to get into computer systems in order to steal, corrupt, or illegitimately view data
  8. Buying items online and conducting business over the Internet
  9. Phony email warning about a computer virus or other threat
  10. A device that monitors and controls the traffic coming into and out of your computer
  11. A self-replicating, self-spreading malicious program
Down
  1. Software that displays advertising banners or pop-up windows Bandwidth – How fast information can be moved from one computer to another
  2. Redirecting users from legitimate Web sites they are trying to visit to fraudulent Web sites
  3. A computer language that is used for creating World Wide Web pages
  4. A code of conduct followed on the Internet in order to be respectful and clearly understood (Internet + etiquette)
  5. A malicious program disguised as legitimate software
  6. A way of communicating online in code by changing the spellings of words
  7. Unwanted email used mainly for advertising
  8. When someone uses your personal information to commit fraud and the nation’s first research and education center devoted to information networking
  9. Using fake Web sites to trick you into giving away personal information
  10. Hanging out on Internet bulletin boards or chat rooms without posting
  11. Computer system that provides shared resources over a network
  12. In gaming, targeting players below your skill level; Also, a type of Denial of Service attack
  13. Posting messages that are deliberately hostile and insulting

24 Clues: Unwanted email used mainly for advertisingPrograms that are designed to harm your computerA malicious program disguised as legitimate softwareA self-replicating, self-spreading malicious programPhony email warning about a computer virus or other threatPosting messages that are deliberately hostile and insulting...

Information Security 2014-06-27

Information Security crossword puzzle
Across
  1. ___ [abbreviation] refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
  2. ______ is software that displays ads on your computer while you are using it, often in the form of popups. It is almost always installed without your authorization or hidden with another program you installed.
  3. ________ information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account number, credit card number, etc.
  4. Information Security Officer
  5. _________ is the commonly used term to mean the capacity of a communication channel to pass data through the channel in a given amount of time.
  6. The strongest password is: grrrrrrr8!, Go^sa!, John012109, Am3rica, This_P^zz1e!
  7. ______ engineering is an approach to gain access to information primarily through misrepresentation, relying on the trusting nature of individuals.
  8. Information Security is not just a _________ issue.
  9. Protect your laptop, cell phone or Blackberry, etc. by treating it like ____.
Down
  1. A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don’t permit.
  2. Never share your ________ with another person.
  3. A ____ Assessment is the process by which risks are identified and the impact of those risks determined.
  4. ____ is a term for spam messages sent to instant message addresses.
  5. Your password is like a _________; use it regularly, change it often, and do not share it with anyone else.
  6. ___ [abbreviation] is the place in the computer where the application programs and data in current use are kept so they can be quickly reached by the computer’s processor.
  7. An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
  8. When somebody sends an e-mail with a link to a bogus website it is called _________.
  9. A ________ download is a program that is involuntarily downloaded to your computer, without your permission or even your awareness. It can be downloaded by simply visiting a web site or viewing an HTML email message.
  10. Criminals sometimes use _______ - programs like viruses and spyware – to get into your computer. Once there, they can steal information, send spam, and commit fraud.
  11. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)

20 Clues: Information Security OfficerNever share your ________ with another person.Information Security is not just a _________ issue.____ is a term for spam messages sent to instant message addresses.Protect your laptop, cell phone or Blackberry, etc. by treating it like ____.The strongest password is: grrrrrrr8!, Go^sa!, John012109, Am3rica, This_P^zz1e!...

Public Security 2016-10-01

Public Security crossword puzzle
Across
  1. Prueba
  2. Cárcel
  3. Fiscal
  4. Arma
  5. Sospechoso
  6. Cadáver
  7. Seguridad
  8. Delito
  9. Tecnología
  10. Robo
  11. Disciplina
  12. Secuestro
  13. Ejercito
  14. vest: Chaleco antibalas
  15. Educación
  16. Inocente
  17. Inteligencia
  18. Evidencia
  19. Autopsia
  20. Abogado
  21. Ciencia
  22. Entrenamiento
  23. Juez
  24. Patrulla
  25. Cuchillo
Down
  1. Forense
  2. Lealtad
  3. Pistola
  4. Violencia
  5. Detective
  6. Recompensa
  7. Asalto
  8. Marina
  9. Código
  10. Corporación
  11. Protección
  12. Motín
  13. Delincuente
  14. University
  15. Rango
  16. Investigación
  17. Huella digital
  18. Esposas
  19. gas: Gas lacrimógeno
  20. Orden
  21. Ley
  22. Victima
  23. Ladrón
  24. Uniforme
  25. Policía
  26. Culpable
  27. ministry: Ministerio público

52 Clues: LeyArmaRoboJuezMotínRangoOrdenPruebaCárcelFiscalAsaltoDelitoMarinaCódigoLadrónForenseLealtadPistolaCadáverEsposasVictimaAbogadoCienciaPolicíaEjercitoInocenteAutopsiaUniformeCulpablePatrullaCuchilloViolenciaDetectiveSeguridadSecuestroEducaciónEvidenciaRecompensaSospechosoTecnologíaDisciplinaProtecciónUniversityCorporaciónDelincuenteInteligencia...

Food Security 2016-04-28

Food Security crossword puzzle
Across
  1. Being inferior in quality, or insufficient in amount
  2. Access to safe and nutritious food and is produced in a way that is environmentally sustainable
  3. Lack of fairness/justice
  4. The degree of overall satisfaction one gets from life
  5. Discomfort, weakness, illness or pain from lack of food
  6. Sufficient food for all people at any given time
  7. Any nutritious substance that people/animals eat/drink to maintain life and growth
  8. Physical and economic access to food for everyone at all times
  9. Having insufficient food that does not provide the correct health benefits
  10. Foods containing large amounts of dietary nutrients
  11. Often a nation/country that is still developing
Down
  1. Efforts to address and end hunger
  2. President of South Africa from 1994-1999
  3. The lack of balance/similarity in status
  4. People having physical social and economic access to sufficient safe and nutritious food(s)
  5. Often more developed, capitalist, industrial nations/countries
  6. Providing food for the present without compromising future generation's supply
  7. Access to culturally acceptable food which is produced and obtained in ways that do not compromise one's dignity, human rights or self-respect
  8. *BONUS* Who has the most points (all-time) in the NHL
  9. The process of providing/obtaining the food necessary for growth and good health
  10. Justice, fairness and freedom to all; everyone is equal
  11. A campaign to collect food for a charitable organization

22 Clues: Lack of fairness/justiceEfforts to address and end hungerPresident of South Africa from 1994-1999The lack of balance/similarity in statusOften a nation/country that is still developingSufficient food for all people at any given timeFoods containing large amounts of dietary nutrientsBeing inferior in quality, or insufficient in amount...

Security Challenge 2016-01-30

Security Challenge crossword puzzle
Across
  1. Pelconian Parent
  2. Big Gamble / Big Booth
  3. Low light foe
  4. Ivy League Blogger
  5. Japanese company / Chinese walls
  6. First P of PPF
  7. S,G,Q for video
  8. Palindromic access control mfr
Down
  1. Metal oxide, complimentary
  2. Runner-up in race-to-bottom
  3. SOE
  4. Just over of the rainbow from UV
  5. Actually just 3840
  6. Milestone Partner of the Year
  7. Invented 4K CCTV camcorder
  8. Makes loonies
  9. Should rhyme with hoax but doesn't
  10. H264 done one better
  11. Hanwha DBA
  12. 802.3.af
  13. Digimergerer
  14. Illuminance

22 Clues: SOE802.3.afHanwha DBAIlluminanceDigimergererLow light foeMakes looniesFirst P of PPFS,G,Q for videoPelconian ParentActually just 3840Ivy League BloggerH264 done one betterBig Gamble / Big BoothMetal oxide, complimentaryInvented 4K CCTV camcorderRunner-up in race-to-bottomMilestone Partner of the YearPalindromic access control mfr...

Food Security 2017-04-29

Food Security crossword puzzle
Across
  1. Physical injured by bacteria.
  2. Around the world.
  3. Misuse, devastation.
  4. Enough to fill one’s desire.
  5. Financially challenged.
  6. Acquire from foods, used to nourish a person’s physical condition.
  7. Farming, planting.
  8. A humid and hot climate.
  9. No water, climate problem.
  10. An epidemic of infectious disease.
  11. Far from average.
  12. Not enough nutrition to supply a person’s body.
  13. No foods, or anything to fill one’s stomach.
  14. Fairness, unbiased.
  15. Separate an item with someone.
Down
  1. Demand, use.
  2. Units of energy.
  3. Too much body weight.
  4. Accept, back off.
  5. What makes a something unique.
  6. Something that’s used to solve an issue.
  7. Make, manufactured.
  8. Accept, permit.
  9. Fighting, suffering.
  10. Accessibility.
  11. Supply, grant.
  12. Have nothing.
  13. Used to purchase goods.
  14. Respect and basic human rights.
  15. A kind of natural effect with a short duration of time.

30 Clues: Demand, use.Have nothing.Accessibility.Supply, grant.Accept, permit.Units of energy.Around the world.Accept, back off.Far from average.Farming, planting.Make, manufactured.Fairness, unbiased.Misuse, devastation.Fighting, suffering.Too much body weight.Financially challenged.Used to purchase goods.A humid and hot climate.No water, climate problem....

Food Security 2017-04-29

Food Security crossword puzzle
Across
  1. A kind of natural effect with a short duration of time.
  2. Enough to fill one’s desire.
  3. A humid and hot climate.
  4. Fairness, unbiased.
  5. Supply, grant.
  6. Not enough nutrition to supply a person’s body.
  7. Units of energy.
  8. Accept, permit.
  9. Accept, back off.
  10. Around the world.
  11. Physical injured by bacteria.
  12. Too much body weight.
  13. Have nothing.
  14. Separate an item with someone.
Down
  1. Misuse, devastation.
  2. An epidemic of infectious disease.
  3. No water, climate problem.
  4. Farming, planting.
  5. Respect and basic human rights.
  6. Accessibility.
  7. What makes a something unique.
  8. Demand, use.
  9. Something that’s used to solve an issue.
  10. Fighting, suffering.
  11. Acquire from foods, used to nourish a person’s physical condition.
  12. Far from average.
  13. No foods, or anything to fill one’s stomach.
  14. Make, manufactured.
  15. Used to purchase goods.
  16. Financially challenged.

30 Clues: Demand, use.Have nothing.Accessibility.Supply, grant.Accept, permit.Units of energy.Far from average.Accept, back off.Around the world.Farming, planting.Fairness, unbiased.Make, manufactured.Misuse, devastation.Fighting, suffering.Too much body weight.Used to purchase goods.Financially challenged.A humid and hot climate.No water, climate problem....

Facebook Security 2017-09-19

Facebook Security crossword puzzle
Across
  1. Whose Diner Is It?
  2. Sans Logistics
  3. Inventor From Menlo Park
  4. No Touchy
  5. Paystub access
  6. Sierra
  7. Rays used to filter data center water.
  8. We all badge in to keep the uninvited out.
  9. Quebec
  10. Burtdawg
  11. 24DAV
  12. FC Mobile
  13. 3 minus 2 Chief Engineer
  14. We're building the future
  15. Online Courses
Down
  1. Internal Facebook employee application
  2. Meditate here.
  3. Lowest Mohs
  4. American Health and Safety Institute
  5. Mikitarians ATN Subordinate
  6. Contract worker
  7. ATN1.1F.08
  8. Prairie Meadows, Exile,...?
  9. He's got IT
  10. Baby Zuck
  11. FTE badge color
  12. Keep It To Yourself
  13. Found on every continent except Antarctica.
  14. PPE Noggin Aegis
  15. All employee and employee conversations will be...
  16. First aid suppliers
  17. George and Margaret's Daughter
  18. G4S General Manager who helped The Beach Boys?
  19. Elsa's creation
  20. Number of Others Like Ours

35 Clues: 24DAVSierraQuebecBurtdawgNo TouchyBaby ZuckFC MobileATN1.1F.08Lowest MohsHe's got ITMeditate here.Sans LogisticsPaystub accessOnline CoursesContract workerFTE badge colorElsa's creationPPE Noggin AegisWhose Diner Is It?Keep It To YourselfFirst aid suppliersInventor From Menlo Park3 minus 2 Chief EngineerWe're building the future...

information security 2018-05-17

information security crossword puzzle
Across
  1. An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
  2. A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
  3. An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
  4. A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
  5. All malicious software, including viruses, Trojan horses, and worms
  6. Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
  7. A weakness in some aspect of a computer system that can be used to compromise a system during an attack
  8. Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
  9. Property of being accessible and usable on demand by an authorized entity
  10. Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
  11. Property of accuracy and completeness
  12. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
  13. A string of characters that allows access to a computer, interface, or system.
Down
  1. The fear of being without a mobile device, or beyond mobile phone contact
  2. A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
  3. A software that detects and cleans comp
  4. Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  5. A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
  6. Potential cause of an unwanted incident, which can result in harm to a system or organization
  7. The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
  8. A humorous or malicious deception
  9. the ability to control information about oneself
  10. Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
  11. Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
  12. An autonomous and malicious software program propagating among computer networks
  13. The person that a software program or hardware device is designed for.
  14. Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
  15. Measure of the criticality of a situation--the likelihood of something being attacked

28 Clues: A humorous or malicious deceptionProperty of accuracy and completenessA software that detects and cleans compthe ability to control information about oneselfAll malicious software, including viruses, Trojan horses, and wormsThe person that a software program or hardware device is designed for....

information security 2018-05-17

information security crossword puzzle
Across
  1. A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
  2. An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
  3. A humorous or malicious deception
  4. Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
  5. Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
  6. Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
  7. An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
  8. The person that a software program or hardware device is designed for.
  9. Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
  10. Property of being accessible and usable on demand by an authorized entity
  11. Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  12. Potential cause of an unwanted incident, which can result in harm to a system or organization
  13. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
  14. An autonomous and malicious software program propagating among computer networks
Down
  1. Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
  2. Property of accuracy and completeness
  3. the ability to control information about oneself
  4. The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
  5. A weakness in some aspect of a computer system that can be used to compromise a system during an attack
  6. All malicious software, including viruses, Trojan horses, and worms
  7. A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
  8. The fear of being without a mobile device, or beyond mobile phone contact
  9. Measure of the criticality of a situation--the likelihood of something being attacked
  10. A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
  11. A software that detects and cleans comp
  12. A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
  13. Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
  14. A string of characters that allows access to a computer, interface, or system.

28 Clues: A humorous or malicious deceptionProperty of accuracy and completenessA software that detects and cleans compthe ability to control information about oneselfAll malicious software, including viruses, Trojan horses, and wormsThe person that a software program or hardware device is designed for....

Network Security 2018-08-24

Network Security crossword puzzle
Across
  1. determining the privileges of a user
  2. protection of information or information resources
  3. commonly used hash function that makes 128-bit hash value
  4. Access, Authentication, Authorization
  5. puts up a barrier in between internal network and outside networks
  6. collections of equal and non-equal encryption algorithms
  7. combines multiple layers of defenses at the edge and in the network
  8. determines physical location
Down
  1. stop people from uploading or forwarding important information in an not safe way
  2. automatically sees activities that are not normal
  3. cryptographic hash functions published by NIST
  4. control web use, block threats, and deny access to malicious websites
  5. the only protection for the data when the defense fails
  6. Confidentiality, Integrity, Availability
  7. protects a wireless network
  8. blocks incoming attacks and controls outbound messages to prevent the loss of data
  9. hiding information in blocks or within images
  10. Determining the privileges to resources, objects, or data
  11. countermeasures to avoid or fight against security risks
  12. encrypts the connection from an endpoint to a network

20 Clues: protects a wireless networkdetermines physical locationdetermining the privileges of a userAccess, Authentication, AuthorizationConfidentiality, Integrity, Availabilityhiding information in blocks or within imagescryptographic hash functions published by NISTautomatically sees activities that are not normal...

Network Security 2022-04-27

Network Security crossword puzzle
Across
  1. any program or code designed to do something on a system or network that you don’t want to have happen.
  2. software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
  3. A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
  4. Can sustain network operations for only a limited time in the event of an outage.
  5. Redundant ___ eliminates a single point of power failure.
  6. a program that has two jobs: to replicate and to activate.
  7. functions similar to a virus. It replicates exclusively through networks.
  8. Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
  9. (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
  1. occurs when a user identifies himself to the system, and the identity is verified against an authentication database
  2. Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
  3. (AUP) states what users are allowed and not allowed to do on the company’s network
  4. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
  5. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
  6. uses duplication of critical components/devices, increasing the reliability of the system.
  7. software that detects, prevents, and removes viruses, worms, and other malware from a computer
  8. diving- when a person goes through the trash in order to find personal information
  9. - using another person's wireless network without permission.
  10. the 2nd most common firewall tool ensuring port security through port filtering
  11. a function of any program that sends information about your system or your actions over the Internet.

20 Clues: Redundant ___ eliminates a single point of power failure.a program that has two jobs: to replicate and to activate.- using another person's wireless network without permission.functions similar to a virus. It replicates exclusively through networks.Provides incremental trunk speeds by combining multiple Fast Ethernet links....

Information Security 2023-11-19

Information Security crossword puzzle
Across
  1. It is Clould Service like TCS uses Google Workspaces
  2. An ability to shift workloads between cloud venders as needs change.
  3. Application security testing examines source code.
  4. An application in TCS for Business Continuity Planning.
  5. A protocol operate on UDP ports 67 and 68
  6. DAY It is the day a new vulnerability is known and no patch is available yet.
  7. A TCS process for releasing application on Internet / Intranet.
  8. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  9. A TCS portal with a framwork for Software security.
  10. Plan It is a plan devised for an outcome other than usual plan.
  11. It is achieved by using Hashing.
Down
  1. A username, passowrd, and app-generated code on a phone.
  2. You should not just identity, you should also confirm ________________________
  3. Allows you to login once and access many services and systems.
  4. A software development methodology is most closely linked to DevSecOps approach.
  5. An application tool recommended to use in TCS for storing and manage multiple credentials.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid
  7. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
  8. A TCS application used for managing physical access and logical resources access management.
  9. Jenkins is the commonly used tool for performing this activity in the application development.

20 Clues: It is achieved by using Hashing.A protocol operate on UDP ports 67 and 68Application security testing examines source code.A TCS portal with a framwork for Software security.It is Clould Service like TCS uses Google WorkspacesAn application in TCS for Business Continuity Planning.A username, passowrd, and app-generated code on a phone....