cyber security Crossword Puzzles

Hierarchy of Needs 2024-02-05

Hierarchy of Needs crossword puzzle
Across
  1. satisfied that you have achieved what you wanted
  2. Protect oneself and one's property from threats such as theft, violence, or cyber-attacks. (ex, locking doors & windows to prevent break-ins)
  3. a relationship of mutual affection between people.
  4. A state of reduced mental and physical activity.
  5. is when two or more people interact, and each person feels valued, seen, and heard.
  6. An invisible mixture of gases that surrounds Earth.
  7. an occupation by which a person earns a living; work; business
  8. When someone acknowledges the value or skill of your work.
  9. the quality or state of being physically strong.
  10. A liquid that makes life on Earth possible.
Down
  1. The power or right to act, speak, or think as one wants without hindrance or restraint.
  2. the innate ability of every person to live and perform in alignment with their highest self
  3. the belief that some behavior is right and acceptable and that other behavior is wrong.
  4. the state of being free from illness or injury.
  5. a feeling of being close and emotionally connected and supported.

15 Clues: A liquid that makes life on Earth possible.the state of being free from illness or injury.satisfied that you have achieved what you wantedA state of reduced mental and physical activity.the quality or state of being physically strong.a relationship of mutual affection between people.An invisible mixture of gases that surrounds Earth....

PSB ACADEMY CROSSWORDS 2020-06-24

PSB ACADEMY CROSSWORDS crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. Keep it lit!
  3. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. IES, IET, IPRS.
  6. CSC, SAC, SC, Dance Club, Music Club, Photography Club.
  7. CSA, GSC, MAPIA, KSC, MSC, SASA.
Down
  1. SC initiated, 3 times per year event with the support of all PSB Student Clubs and Student Affairs & Industry Engagement.
  2. Second part of Student Affairs & Industry Engagement's tagline.
  3. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres. Our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. First part of Student Affairs & Industry Engagement's tagline.
  5. Second part of SC’s mission - participate or become involved in.
  6. PSB Academy’s campus for training students in life sciences, sport science, engineering and cyber security.

13 Clues: Keep it lit!IES, IET, IPRS.CSA, GSC, MAPIA, KSC, MSC, SASA.CSC, SAC, SC, Dance Club, Music Club, Photography Club.First part of Student Affairs & Industry Engagement's tagline.Second part of Student Affairs & Industry Engagement's tagline.Second part of SC’s mission - participate or become involved in....

CyberSecurity 2025-06-19

CyberSecurity crossword puzzle
Across
  1. The use of physical characteristics, such as fingerprints, to verify identity.
  2. A copy of data stored separately to protect against data loss.
  3. Software that secretly monitors and collects information about users.
  4. A service that encrypts your internet connection and hides your IP address.
  5. A type of malware that threatens to publish or block access to data unless a ransom is paid.
  6. A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
  1. The process of verifying the identity of a user or device.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. Software designed to detect and destroy computer viruses.
  5. A secret word or phrase used to gain access to a system.
  6. A network security device that monitors and filters incoming and outgoing network traffic.
  7. The process of converting information or data into a code to prevent unauthorized access.
  8. Unwanted or unsolicited email messages.
  9. An individual who uses technical skills to gain unauthorized access to systems.

15 Clues: Unwanted or unsolicited email messages.A secret word or phrase used to gain access to a system.Software designed to detect and destroy computer viruses.The process of verifying the identity of a user or device.A copy of data stored separately to protect against data loss.Software that secretly monitors and collects information about users....

A&A Engagement 2025 2025-12-25

A&A Engagement 2025 crossword puzzle
Across
  1. Cleaning tool known to be absorbent headed by Ananya's undergraduate college
  2. Primary spoken language in Hong Kong
Down
  1. In his job as a cyber-security engineer, Akash builds this digital barrier to keep bad actors out!
  2. Reptilian programming language Akash uses on a daily basis
  3. Ananya's former specialty; it's a deep-dive into the books to make sure everything adds up.

5 Clues: Primary spoken language in Hong KongReptilian programming language Akash uses on a daily basisCleaning tool known to be absorbent headed by Ananya's undergraduate collegeAnanya's former specialty; it's a deep-dive into the books to make sure everything adds up....

Spelling bee! 2022-06-25

Spelling bee! crossword puzzle
Across
  1. bekommen mit"r"
  2. Seil
  3. enttäuscht
  4. retten
Down
  1. Gegenteil
  2. Cyber-Mobbing
  3. bevorzugen
  4. Gefangene/r
  5. Schaufel
  6. Rhythmus
  7. fliehen
  8. Axt

12 Clues: AxtSeilrettenfliehenSchaufelRhythmusGegenteilbevorzugenenttäuschtGefangene/rCyber-Mobbingbekommen mit"r"

Technology 2021-12-20

Technology crossword puzzle
Across
  1. A software that allows you to surf the web.
  2. A local computer network for communication between computers.
  3. Part of an application that performs an essential task not apparent to the user.
  4. Unsolicited email messages sent for marketing purposes.
  5. A barrier that acts as a security system.
Down
  1. A piece of programming code inserted into other programming to cause damage.
  2. Physical parts of a computer.
  3. A device that enables a computer to transfer data over telephone or cable lines.
  4. A problem that causes a program to crash or produce an invalid output.
  5. A cyber-attack where the perpetrator uses several, thousands of unique IP adressess.
  6. A number that is expressed by using only 1 and 0.
  7. A challenge-response test in the form of an image of distorted text the user must enter that to determine whether the user is human or a bot.
  8. String of characters you type into a browser to access a particular website.

13 Clues: Physical parts of a computer.A barrier that acts as a security system.A software that allows you to surf the web.A number that is expressed by using only 1 and 0.Unsolicited email messages sent for marketing purposes.A local computer network for communication between computers.A problem that causes a program to crash or produce an invalid output....

PSB CCF CROSSWORD PUZZLE 2020-06-30

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. SC initiated, 3 times per year event with the support of all PSBA Student Clubs and Student Affairs & Industry Engagement.
  2. Keep it lit!
  3. CSA, GSC, MAPIA, KSC, MSC, SASA.
  4. Second part of Student Affairs & Industry Engagement's tagline.
  5. PSB Academy’s campus for training students in life sciences, sport science, engineering and cyber security.
  6. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  7. Second part of SC’s mission - participate or become involved in.
Down
  1. CSC, SAC, SC, Dance Club, Music Club, Photography Club.
  2. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres. Our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  3. First part of Student Affairs & Industry Engagement's tagline.
  4. third part of SC’s mission - give (someone) the power or drive to do something.
  5. IES, IET, IPRS.
  6. First part of SC’s mission - provide (someone or something) the means to do something.

13 Clues: Keep it lit!IES, IET, IPRS.CSA, GSC, MAPIA, KSC, MSC, SASA.CSC, SAC, SC, Dance Club, Music Club, Photography Club.First part of Student Affairs & Industry Engagement's tagline.Second part of Student Affairs & Industry Engagement's tagline.Second part of SC’s mission - participate or become involved in....

Security 2023-03-27

Security crossword puzzle
Across
  1. Take no _____
  2. Try to remain _____
  3. Ensure a ___ index card is in place at each phone and teller station.
  4. Pay attention to the responses and any _________ sounds
  5. "This is ____, what time do I come to work today?"
  6. Do not touch or disturb __________ or abandoned packages, briefcases, or any other items.
Down
  1. Call your Regional _____ Officer at (801)-844-5000
  2. From a safe position, try to ____ the direction the robber(s)fled.
  3. Access all Robbery forms through the _____ icon and review them during required training sessions
  4. Keep excess cash out of _____ in a lower drawer, compartment, or vault and comply with allowable cash limits.
  5. remember that the lives and ________ of people are the critical factors.
  6. If a note is used, avoid unnecessary ____.

12 Clues: Take no _____Try to remain _____If a note is used, avoid unnecessary ____.Call your Regional _____ Officer at (801)-844-5000"This is ____, what time do I come to work today?"Pay attention to the responses and any _________ soundsFrom a safe position, try to ____ the direction the robber(s)fled....

SOC Terminology 2026-02-25

SOC Terminology crossword puzzle
Across
  1. A weakness in a system that can be exploited by hackers
  2. A network of infected computers secretly controlled by a central attacker
  3. Physical characteristics like fingerprints or facial recognition used for identification
  4. A recently discovered software flaw that the vendor has not yet fixed
  5. The science of secure communication and writing in secret codes
  6. Malicious software designed to hide the existence of certain processes or programs
  7. Falsifying data to disguise malicious communication as coming from a trusted source
  8. A physical device like a laptop or phone that connects to a corporate network
  9. Software that secretly records every letter typed on a keyboard
Down
  1. The process of verifying the identity of a user or system
  2. The process of converting unreadable scrambled data back into plain text
  3. A cyber attack that redirects a user's website traffic to a fake site
  4. A hidden method used to bypass normal security and access a system
  5. Malware that demands payment to restore access to your data
  6. An attack that completely overwhelms a system with a massive flood of internet traffic

15 Clues: A weakness in a system that can be exploited by hackersThe process of verifying the identity of a user or systemMalware that demands payment to restore access to your dataThe science of secure communication and writing in secret codesSoftware that secretly records every letter typed on a keyboard...

A&A Engagement 2025 2025-12-25

A&A Engagement 2025 crossword puzzle
Across
  1. Cleaning tool known to be absorbent headed by Ananya's undergraduate college
  2. Primary spoken language in Hong Kong
Down
  1. In his job as a cyber-security engineer, Akash builds this digital barrier to keep bad actors out!
  2. Reptilian programming language Akash uses on a daily basis
  3. Ananya's former specialty; it's a deep-dive into the books to make sure everything adds up.

5 Clues: Primary spoken language in Hong KongReptilian programming language Akash uses on a daily basisCleaning tool known to be absorbent headed by Ananya's undergraduate collegeAnanya's former specialty; it's a deep-dive into the books to make sure everything adds up....

Cyber Bullying 2024-04-05

Cyber Bullying crossword puzzle
Across
  1. Someone who intervenes in a helpful way
  2. Unfair treatment based on prejudice
  3. Online harassment or intimidation
  4. Results or outcomes of actions
  5. False information spread for deceptive purposes
  6. Remain composed in difficult situations
  7. Relationship of mutual affection and trust
  8. Causing emotional or physical pain
  9. Limits that define acceptable behavior
  10. Ability to influence or control others
  11. Opposite of go also a call for cessation
Down
  1. Showing admiration and consideration for others
  2. Persistent annoyance or aggression towards someone
  3. Seek assistance or help from others
  4. Inform authorities or appropriate individuals about an issue
  5. Intimidating or aggressive behavior towards others
  6. Actions or conduct of individuals
  7. Showing compassion and empathy towards others

18 Clues: Results or outcomes of actionsOnline harassment or intimidationActions or conduct of individualsCausing emotional or physical painUnfair treatment based on prejudiceSeek assistance or help from othersLimits that define acceptable behaviorAbility to influence or control othersSomeone who intervenes in a helpful way...

cyber ethics 2025-06-13

cyber ethics crossword puzzle
Across
  1. Online harassment or abuse using digital platforms
  2. Authentication method that adds a second layer of security
  3. The trail of data a person leaves online
  4. Fraudulent attempt to obtain sensitive information
  5. Software that secretly gathers user information
  6. Malicious software designed to harm systems or data
  7. Software or hardware that blocks unauthorized access
  8. Pretending to be someone else online
Down
  1. Unauthorized access to computer systems
  2. Method of converting data into unreadable code for security
  3. Criminal activities carried out using computers or internet
  4. A person who posts offensive or disruptive comments online
  5. Protecting personal information online
  6. A dishonest scheme meant to trick people online
  7. Principles that guide responsible online behavior
  8. A secret code used to access digital accounts
  9. Legal right that protects creative online content
  10. Software that protects against viruses and malware

18 Clues: Pretending to be someone else onlineProtecting personal information onlineUnauthorized access to computer systemsThe trail of data a person leaves onlineA secret code used to access digital accountsSoftware that secretly gathers user informationA dishonest scheme meant to trick people onlinePrinciples that guide responsible online behavior...

CYBER SOCIETY 2025-09-04

CYBER SOCIETY crossword puzzle
Across
  1. A PERSON WHO GAINS ATTENTION ONLINE, SHARES OPINION AND TRENDS VIA SOCIAL MEDIA
  2. a SHORT MESSAGE POSTED ON THE PLATFORM X (TWITTER)
  3. THE ACT OF SHARING SOMEONE ELSE POST
  4. GLOBAL NETWORK THAT CAN CONNECT COMPUTERS AND PHONES ETC TO EACH OTHER
  5. A SOCIAL MEDIA PLATFORM TO SHARE STATUSES,REELS, PHOTOS, LINKS; CAN HAVE A BUSINESS OR PROFESSIONAL PAGE
  6. A SYSTEM FOR CONNECTING COMPUTER OR PHONE TO THE INTERNET WIRELESSLY
  7. FOOTPRINT ALL OF YOUR ONLINE ACTIVITY LEAVES THIS BEHIND
  8. KEYWORD OR PHRASE USED TO GROUP POSTS ONLINE
Down
  1. CREATOR PERSON WHO MAKES OR SHARES VIDEOS AND OTHER CONTENT ONLINE
  2. YOUR PAGE ON SOCIAL MEDIA
  3. A PIECE OF MALICIOUS SOFTWARE DESIGNED TO DISRUPT OR DAMAGE THE COMPUTER OR PHONE
  4. USING THE INTERNET TO HARM OR HARASS OTHERS
  5. ILLEGAL DOWNLOAD OF MOVIES, BOOKS, MUSIC ETC
  6. A SMALL GRAPHIC IMAGE USED TO EXPRESS AN EMOTION OR IDEA
  7. A FAKE ONLINE IDENTITY CREATED TO DECEIVE OR MANIPULATE OTHERS
  8. SOCIAL MEDIA PLATFORM TO SHARE SHORT VIDEOS
  9. WEBSITE OR APP USED TO POST OR CREATE CONTENT
  10. A SOCIAL MEDIA PLATFORM TO SHARE PHOTOS, STORIES, NOTES; PEOPLE SOMETIMES BUY FOLLOWERS

18 Clues: YOUR PAGE ON SOCIAL MEDIATHE ACT OF SHARING SOMEONE ELSE POSTUSING THE INTERNET TO HARM OR HARASS OTHERSSOCIAL MEDIA PLATFORM TO SHARE SHORT VIDEOSILLEGAL DOWNLOAD OF MOVIES, BOOKS, MUSIC ETCKEYWORD OR PHRASE USED TO GROUP POSTS ONLINEWEBSITE OR APP USED TO POST OR CREATE CONTENTa SHORT MESSAGE POSTED ON THE PLATFORM X (TWITTER)...

Impact of 9/11 on Commercial Aviation 2023-12-10

Impact of 9/11 on Commercial Aviation crossword puzzle
Across
  1. Passengers and crew who thwarted attacks.
  2. Increased awareness and watchfulness.
  3. List for individuals barred from flying.
  4. Advanced identification technology.
  5. Act addressing security post-9/11.
  6. The region controlled by a country's aviation authorities.
  7. Temporarily halted U.S. airspace operations.
Down
  1. Action taken to enhance security control.
  2. Security-focused federal department.
  3. Elevated levels of perceived danger.
  4. Strengthening security measure
  5. Area with enhanced security post-9/11.
  6. Airport security organization.
  7. North American defense organization.
  8. Coordinated reaction to a crisis.

15 Clues: Strengthening security measureAirport security organization.Coordinated reaction to a crisis.Act addressing security post-9/11.Advanced identification technology.Security-focused federal department.Elevated levels of perceived danger.North American defense organization.Increased awareness and watchfulness.Area with enhanced security post-9/11....

CyberFun 2022-09-01

CyberFun crossword puzzle
Across
  1. An attack that prevents or impairs the authorized use of information system resources or services.
  2. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
  3. The process of transforming plaintext into ciphertext.
  4. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
  5. The property of being accessible and usable upon demand.
  6. A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.
  7. A collection of computers compromised by malicious code and controlled across a network.
  8. The process of verifying the identity or other attributes of an entity (user, process, or device).
Down
  1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group
  3. A technique to breach the security of a network or information system in violation of security policy.
  4. An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
  5. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
  6. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

14 Clues: The process of transforming plaintext into ciphertext.The property of being accessible and usable upon demand.A collection of computers compromised by malicious code and controlled across a network.An attack that prevents or impairs the authorized use of information system resources or services....

Cyber Bullying Cyber Grooming 2014-04-08

Cyber Bullying Cyber Grooming crossword puzzle
Across
  1. The person who is threatened, harassed, or harmed
  2. A website where a group can gather and communicate through chat or message posting
  3. Someone who has seen what the bully has done to a victim; If you hear someone talking about how they were bullied, encourage them to a have them report it or report what you have heard to an adult.
  4. A person who tries to get others to do things for them that are not normal, or of a sexual nature
  5. Lack of confidence
  6. To bother repeatedly
Down
  1. A bully who threatens, harms or harasses others through the internet or other electronic means
  2. The name that someone uses online
  3. Rude or hurtful
  4. Someone who does not reveal his or her name
  5. A person who is in charge of a website
  6. Messages people write on a website message board
  7. A person who harasses, threatens or causes harm to others
  8. When a predator or bully befriends or establishes an emotional connection to lower their natural guard so that the child is easier to exploit or take advantage of (to become friendly with someone so you can take advantage of them)

14 Clues: Rude or hurtfulLack of confidenceTo bother repeatedlyThe name that someone uses onlineA person who is in charge of a websiteSomeone who does not reveal his or her nameMessages people write on a website message boardThe person who is threatened, harassed, or harmedA person who harasses, threatens or causes harm to others...

CRHNet Crossword Puzzle 2020-09-30

CRHNet Crossword Puzzle crossword puzzle
Across
  1. Advisory that hazard is approaching but is less imminent
  2. processes which increase the susceptibility of an individual
  3. assessing the effectiveness of an emergency management program
  4. is the deliberate release of viruses, bacteria, or other germs used to cause illness or death
  5. infrastructure to describe assets that are essential for the functioning of a society and economy
  6. action plan (IAP) It may include the identification of operational resources and assignments
  7. to take timely action to reduce their risks in advance of hazardous events
  8. of control usually expressed as the ratio of supervisors to individuals
  9. an assistance program designed to help municipalities, individuals
  10. transfer
  11. the financial consequences of particular risks from one party to another
  12. post-event activities and considerations
  13. may be natural, anthropogenic or socionatural in origin
  14. Process of restoring a stricken community to a pre-disaster level of function
  15. It may include the identification of operational resources and assignments
Down
  1. reducing vulnerability and exposure in such contexts where as a result the risk of disaster is removed
  2. human assets located in hazard-prone areas
  3. proactive activities or projects that eliminate or lessen the impact
  4. and Control exercise of authority and direction by a properly designated commander
  5. Continuity ensure that the necessary steps are taken to identify the impact of potential losses
  6. Standardized approach to the command, control, and coordination of emergency response
  7. capacity using available skills and resources, to manage adverse conditions
  8. Security Known as information technology security
  9. Emergency Response Team
  10. of organizations and systems to exchange information
  11. emergency control group
  12. assessment methodology to determine the nature and extent of risk by analyzing potential hazards
  13. has the potential to cause harm or damage
  14. They are smaller than the “mainshock” and can occur over a period of weeks
  15. area geographic area within which a disaster has occurred
  16. Community Based Disaster Risk Management
  17. a branch within the Ministry of Community Safety and Correctional Services
  18. recover from the effects of a hazard in a timely and efficient manner

33 Clues: transferEmergency Response Teamemergency control grouppost-event activities and considerationsCommunity Based Disaster Risk Managementhas the potential to cause harm or damagehuman assets located in hazard-prone areasSecurity Known as information technology securityof organizations and systems to exchange information...

Cyber Terms 2023-03-06

Cyber Terms crossword puzzle
Across
  1. malware that encrypts your files until you pay a fee
  2. Sending fake emails to get you to click on a link
  3. Changing your IP or Mac address to appear from a different machine
  4. (2wds) A misleading computer program that allows a hacker into your system
  5. A means of attack on a computer system
  6. a wide variety of bad software used to infect and/or damage a system
  7. Coding used to protect your information from hackers
  8. a group of applications that instruct a computer to carry out a task
  9. Tricked into clicking on wrong object on a web page
  10. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
Down
  1. Process of identifying a user's identity
  2. Software or Hardware used to keep intruders out
  3. computers and peripherals connected as on entity
  4. Malware that snoops on you
  5. Malware which changes, corrupts, or destroys information, and then spreads to other systems
  6. An audio or video that has been changed to make it seem authentic
  7. network of infected computers working together
  8. Multiple computers connected together to share resources

18 Clues: Malware that snoops on youA means of attack on a computer systemProcess of identifying a user's identitynetwork of infected computers working togetherSoftware or Hardware used to keep intruders outcomputers and peripherals connected as on entitySending fake emails to get you to click on a linkTricked into clicking on wrong object on a web page...

cross word security 2025-10-27

cross word security crossword puzzle
Across
  1. -A systematic, close observation of people, objects, or premises, often done with cameras, to gather information and maintain security.
  2. A violation of a law, an agreement, or a security barrier, resulting in unauthorized entry or disclosure.
  3. process of verifying a job applicant's past history and credentials for security clearance.
  4. weakness in a system, procedure, or facility that could be exploited by a threat.
  5. A plan detailing how an organization will resume critical functions after a major security incident or disaster.
  6. potential for loss or damage to an asset, measured by the probability of a threat occurring and its impact.
  7. deliberate and malicious act of destruction or disruption of an industrial facility's operations.
  8. An electronic device that signals danger or unauthorized entry, often by a loud noise or flashing light.
  9. GUARD- A person employed to protect property, assets, or personnel from harm, theft, or criminal activity.
  10. complete set of rules and principles that guides an organization's long-term security decisions and actions.
Down
  1. first layer of security; the outer boundary of a secured area or facility.
  2. Petty theft of articles of small value, typically committed by employees within the workplace.
  3. A system or method designed to ensure that only authorized individuals can enter a specific area.
  4. (10 Clues)
  5. for Closed-Circuit Television; a private video system used for monitoring and security.
  6. valuable resource that requires protection, including physical property, information, and personnel.
  7. emergency procedure put in place to restrict movement and secure an area against an external threat.
  8. person, action, or event that has the potential to cause harm to an asset.
  9. A type of security barrier, often made of wire or metal, used to clearly define and protect the property line.
  10. physical or legal violation of a boundary, leading to unauthorized entry.
  11. formal inquiry or systematic examination to discover the facts and circumstances of a security incident.
  12. (10 Clues)

22 Clues: (10 Clues)(10 Clues)physical or legal violation of a boundary, leading to unauthorized entry.first layer of security; the outer boundary of a secured area or facility.person, action, or event that has the potential to cause harm to an asset.weakness in a system, procedure, or facility that could be exploited by a threat....

DORA 2024-12-15

DORA crossword puzzle
Across
  1. Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
  2. What must be promptly renewed to ensure ongoing security?
  3. Who is responsible for implementing the ICT risk management framework in financial entities?
  4. How frequently should vulnerability scanning be performed on critical ICT assets?
  5. What is the main subject matter of DORA?
  6. What must cryptographic keys be protected against throughout their lifecycle?
  7. The **** plan with a third party must be based on realistic scenarios and assumptions.
Down
  1. What technique can be used in network design to limit contagion during cyber attacks?
  2. What must financial entities use for advanced testing of ICT tools?
  3. What should financial entities have to ensure data restoration?
  4. What must financial entities report to relevant authorities?
  5. How often per year should a review of access rights for ICT systems that support critical or important functions be performed
  6. What percentage of affected clients using a service meets the materiality threshold for major incidents?
  7. What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
  8. What must ICT security policies ensure regarding data?

15 Clues: What is the main subject matter of DORA?What must ICT security policies ensure regarding data?What must be promptly renewed to ensure ongoing security?What must financial entities report to relevant authorities?What should financial entities have to ensure data restoration?What must financial entities use for advanced testing of ICT tools?...

REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16

REV Cybersecurity Awareness Crossword Puzzle #2 crossword puzzle
Across
  1. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  2. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  3. horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  4. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  5. code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  6. a standalone malware computer program that replicates itself in order to spread to other computers.
  7. any software program in which advertising banners are displayed while the program is running.
  8. door a method, often secret, of bypassing normal authentication in a product.
  9. threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
  1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. someone who seeks and exploits weaknesses in a computer system or computer network.
  3. global system of interconnected computer networks that use the Internet protocol suite.
  4. designed to detect and destroy computer viruses.
  5. security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  6. are small files that Web sites put on your computer hard disk drive when you first visit.
  7. an attempt by hackers to damage or destroy a computer network or system.
  8. a local or restricted communications network, especially a private network created using World Wide Web software.
  9. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  10. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.

19 Clues: designed to detect and destroy computer viruses.an attempt by hackers to damage or destroy a computer network or system.door a method, often secret, of bypassing normal authentication in a product.someone who seeks and exploits weaknesses in a computer system or computer network....

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático, Machine learning
  13. If else
  14. neuronales, nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales, nueral networksautomático, Machine learning

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático Machine learning
  13. If else
  14. neuronales nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales nueral networksautomático Machine learning

Lesson 5 French 2024-05-29

Lesson 5 French crossword puzzle
Across
  1. download
  2. charger
  3. battery
  4. mouse
  5. hood
  6. password
  7. network
  8. freeway
  9. to load
  10. road
  11. channel
  12. trunk
  13. garage
  14. suitcase
Down
  1. fast
  2. search engine
  3. application
  4. street
  5. delete
  6. cyber cafe
  7. printer
  8. oil
  9. workshop
  10. at
  11. turn off
  12. car
  13. keyboard
  14. music stereo
  15. screen
  16. windshield
  17. tire

31 Clues: atoilcarfasthoodroadtiremousetrunkstreetdeletescreengaragechargerbatteryprinternetworkfreewayto loadchanneldownloadworkshopturn offkeyboardpasswordsuitcasecyber cafewindshieldapplicationmusic stereosearch engine

Lesson 5 BLOOM 2024-05-29

Lesson 5 BLOOM crossword puzzle
Across
  1. charger
  2. street
  3. trunk
  4. delete
  5. channel
  6. road
  7. keyboard
  8. aplication
  9. cyber cafe
  10. Discharge
  11. car
  12. stereo
  13. battery
  14. suitcase
  15. garage
Down
  1. printer
  2. seek
  3. highway
  4. workshop
  5. tire
  6. chest
  7. windshield
  8. screen
  9. mouse
  10. grid
  11. carry
  12. to turn off
  13. password
  14. fast
  15. oil
  16. at sign

31 Clues: caroilseektiregridroadfastchesttrunkmousecarrystreetscreendeletestereogarageprinterchargerhighwaychannelbatteryat signworkshopkeyboardpasswordsuitcaseDischargewindshieldaplicationcyber cafeto turn off

9 2024-08-18

9 crossword puzzle
Across
  1. Bright swirls
  2. Throwback fashion
  3. Flowing robes
  4. Powdered wigs
  5. Dark lace
  6. Bold graphics
  7. Pin-up glamour
  8. Unkempt style
  9. Oversized blazers
  10. Rationed fabrics
  11. Electric colors
  12. Jazz-inspired
Down
  1. Tailored cuts
  2. Platform shoes
  3. High collars
  4. Neon futurism
  5. Peasant blouses
  6. Flowing fabrics
  7. Beaded gowns
  8. Sequins
  9. Draped toga
  10. Tech-inspired
  11. Feather headbands
  12. Go-go boots
  13. Pastel florals

25 Clues: SequinsDark laceDraped togaGo-go bootsHigh collarsBeaded gownsTailored cutsBright swirlsNeon futurismFlowing robesPowdered wigsTech-inspiredBold graphicsUnkempt styleJazz-inspiredPlatform shoesPin-up glamourPastel floralsPeasant blousesFlowing fabricsElectric colorsRationed fabricsThrowback fashionFeather headbandsOversized blazers

Safety Week Crossword Puzzle 2023-05-04

Safety Week Crossword Puzzle crossword puzzle
Across
  1. All Employees covered under the scope of the Hearing “______” Program are required to get an annual hearing test. The test determines whether you’ve had a shift/hearing loss of 10 decibels (dB) or more from your baseline or from your previous test.
  2. After a beltloader is positioned up to the aircraft and chocked, the handrail must be in the “______” position.
  3. This group regulates denied boarding compensation amounts. Failing to follow regulations may result in possible fines to Southwest.
  4. Slips and Trips can both cause this.
  5. Safety Objective #1: We will protect our People by reducing Employee “______”.
  6. This happens when you lose your balance because your foot, leg, or body hits a fixed object
  7. Once you’ve identified a Safety hazard, “______” what you’re doing to assess the situation.
  8. this is the only type of animals Southwest Airlines accepts for travel between the U.S. Mainland and Hawaii.
  9. The Mission Statement of the Safety and Security Department is to (3/4) …”and “______” deals with these issues before they become…”
  10. Safety “______” is the component of our SMS (Safety Management System) that evaluates the continued effectiveness of risk controls and supports the identification of new hazards.
  11. OSHA statistics indicate that “______” injuries account for one in every five injuries or illnesses in the workplace
  12. According to recent data, this type of attack occurs once every 39 seconds.
  13. Safety “______” is the component of our SMS (Safety Management System) that includes training, communication, and other actions that create a positive safety culture within all levels of the Company.
  14. Safety Assurance data shows the number of reported aircraft engine “______” fires has increased year-over-year since 2018.
  15. Safety “______” is the component of our SMS (Safety Management System) that establishes our commitment to continually improve safety and defines the methods, processes, and organizational structure needed to meet our Company’s safety goals.
  16. Safety Objective #2: We will reduce aircraft “______” in our operation.
  17. At the top of our Operational Philosophy sits “______”, and rightly so, as it’s our top priority at Southwest Airlines.
  18. Safety Objective #3: We will reduce operational Safety “______”.
  19. Safety can never be sacrificed to achieve our other “______” pillars.
  20. The STORM Manual stands for Safe Transportation of “______” Materials.
Down
  1. When we leave behind cargo with available weight, we may violate our U.S. Mail contract that could result in fines and non-payment. More importantly, failing to load critical lifesaving shipments could cost someone their “______”.
  2. In 2022, Southwest invested 16,684 Hours of Training on this Safety and Security Topic (One Report: Page 30)
  3. The Mission Statement of the Safety and Security Department is to (4/4) “…injuries, accidents or “______”.”
  4. Once completed by Station Leadership, Ground Ops Irregularity Reports are forwarded to the Operational Reporting Team via the “______” reporting tool.
  5. We are safe by complying with our policies, procedures, and regulations in order to manage risk at an “______” level.
  6. Recently, Southwest Airlines has received a Safety Hazard Letter from the FAA stating Agents are failing to question Customers or make announcements prohibiting “______” batteries in checked baggage.
  7. This tool is a confidential, non-punitive reporting tool for all Employees and Contractors to submit non-emergency Safety or Security-related questions, concerns, or suggestions.
  8. The Mission Statement of the Safety and Security Department is to (2/4) “that “______” risks to the operation and workplace……”
  9. All Southwest Airlines Employees are responsible for complying with all Company policies and procedures, including all “______” regulations and guidelines.
  10. What position at Southwest Airlines is the Accountable Executive in all matters of Safety and Security?
  11. Federal regulations prohibit Southwest Airlines from allowing Customers who appear “______” to board the aircraft.
  12. Safety Objective #4: We will reduce Security “______” Violations.
  13. Personal protective equipment, commonly referred to as “______”, is equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses.
  14. Take responsibility to say or do something to fix it. If it’s within your power, “______” the situation; and if you can’t, tell someone who can.
  15. All Southwest Employees are responsible for reading and being familiar with the Safety & Security Commitment and Safety “______”
  16. A condition that could cause or contribute to injury or death of persons and/or damage to or loss of equipment.
  17. For Ground Operations, the “______” Operational Reporting Team is responsible for processing and recording all Irregularity Reports and associated correspondences after they have been through the local Leadership level.
  18. Who does Southwest rely on to communicate Safety issues around the system?
  19. The Mission Statement of the Safety and Security Department (1/4) is to “_______”and support a Safety and Security Culture….”
  20. This policy is federally required to be announced at the Gate by both Customer Service and Operations Agents.
  21. Safety “______” Management is the component of our SMS (Safety Management System) that determines the need for and adequacy of new or revised risk controls based on the assessment of acceptable risk.
  22. This happens when you lose your footing and balance.

42 Clues: Slips and Trips can both cause this.This happens when you lose your footing and balance.Safety Objective #3: We will reduce operational Safety “______”.Safety Objective #4: We will reduce Security “______” Violations.Safety can never be sacrificed to achieve our other “______” pillars....

electronics information 2016-02-03

electronics information crossword puzzle
Across
  1. bullying using electronic to bully someone
  2. theft taking or stealing one's identity to make you look better often stolen for financial gain
  3. safe from any danger or threats
  4. A code or secret word created to protect something from others
  5. stealing someone's information due to not giving them credit through a citation
  6. tools or can be games but often are created to help do specific tasks
  7. a social media where you can post crafts and interest to others
  8. a website that you post interest and update things about the interest constantly
  9. is a social media where you can talk to your friends and send pictures
  10. identity An identity that is created by you online
  11. a social media where you can send photos to your friends
Down
  1. also considered a social media where you can watch and stream videos online
  2. quotes that are created from information to give credits to the author of the information researched
  3. a social media where you can post photos of you and your friends
  4. loading information from a software to another computer
  5. setting A setting on most social medias to keep your information private
  6. etiquette following the rules and having the respect while being online

17 Clues: safe from any danger or threatsbullying using electronic to bully someoneidentity An identity that is created by you onlineloading information from a software to another computera social media where you can send photos to your friendsA code or secret word created to protect something from others...

i think theres someone hanging there 2025-07-23

i think theres someone hanging there crossword puzzle
Across
  1. Computing,
  2. Intelligence (AI),
  3. Immune System (DIS),
  4. Reality (XR),
  5. Screening,
  6. Liability Insurance,
  7. Detection
  8. cloud,
Down
  1. technology,
  2. (EDR)
  3. Mesh,
  4. Automation, Multi-Factor Authentication (MFA),
  5. Intelligence (BI),

13 Clues: (EDR)Mesh,cloud,DetectionComputing,Screening,technology,Reality (XR),Intelligence (AI),Intelligence (BI),Immune System (DIS),Liability Insurance,Automation, Multi-Factor Authentication (MFA),

Security Threats 2025-03-04

Security Threats crossword puzzle
Across
  1. A security risk where an attacker gains control over someone’s account
  2. A cyber threat where a system is overwhelmed with traffic to disrupt services
Down
  1. When a cloud misconfiguration leads to vulnerabilities
  2. The unauthorized release of sensitive data

4 Clues: The unauthorized release of sensitive dataWhen a cloud misconfiguration leads to vulnerabilitiesA security risk where an attacker gains control over someone’s accountA cyber threat where a system is overwhelmed with traffic to disrupt services

Cybersecurity 2024-05-09

Cybersecurity crossword puzzle
Across
  1. Malicious software designed to harm or exploit any programmable device, service, or network.
  2. A standalone malware computer program that replicates itself in order to spread to other computers.
  3. A security incident in which information is accessed without authorization.
  4. A weakness in a system or its design that can be exploited by a threat actor to perform unauthorized actions within a computer system.
  5. The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
  6. A cybersecurity strategy under which a user can only take actions on their computer or network that an administrator has explicitly allowed.
  7. A small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
  8. A software update comprised code inserted (or patched) into the code of an existing software program to fix security vulnerabilities, improve functionality, or to update the software.
  9. The act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or classified), for personal, economic, political, or military advantage using illicit means.
  10. A mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.
  11. A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an attacker might.
  12. Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets.
  13. A control mechanism that allows through all elements (email, users, passwords, URLs, etc.), except for those explicitly mentioned.
  14. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  15. Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  16. Attack An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  17. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  18. A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  19. A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
  20. A device or software application that monitors a network or systems for malicious activity or policy violations.
Down
  1. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  2. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. The application of scientific knowledge to investigate crimes on digital devices, such as computers, smartphones, or networks.
  4. The act of disguising a communication from an unknown source as being from a known, trusted source.
  5. A type of surveillance technology used to record keystrokes made by a user, often without their knowledge.
  6. Software that automatically displays or downloads advertising material when a user is online.
  7. Software designed to detect, prevent, and remove malicious software like viruses, worms, and trojans.
  8. The process of identifying, analyzing, and evaluating risk.
  9. A service that encrypts your internet traffic and protects your online identity by hiding your IP address.
  10. The process of converting information or data into a code, especially to prevent unauthorized access.
  11. An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
  12. Someone who uses computers to gain unauthorized access to data.
  13. Horse A type of malware that is often disguised as legitimate software.
  14. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  15. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  16. Attack An attack that exploits a previously unknown vulnerability in a computer application or operating system.
  17. The practice of protecting systems, networks, and programs from digital attacks.
  18. A cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need.
  19. Authentication A security process in which users provide two different authentication factors to verify themselves.
  20. A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software or hardware.

40 Clues: The process of identifying, analyzing, and evaluating risk.Someone who uses computers to gain unauthorized access to data.Horse A type of malware that is often disguised as legitimate software.A security incident in which information is accessed without authorization.The practice of protecting systems, networks, and programs from digital attacks....

when there's a space use underscore 2025-03-13

when there's a space use underscore crossword puzzle
Across
  1. cyber bullying
  2. to download
  3. to add
  4. log in
  5. to chat
  6. to text
  7. to share
  8. online
Down
  1. to tag
  2. An update
  3. to download
  4. followers
  5. Avatar: profile picture
  6. dashboard
  7. to search

15 Clues: to tagto addlog inonlineto chatto textto shareAn updatefollowersdashboardto searchto downloadto downloadcyber bullyingAvatar: profile picture

Security, Risks and Safeguards 2022-04-16

Security, Risks and Safeguards crossword puzzle
Across
  1. Social engineering attacks fool users to give up usernames and __________
  2. A network ________ is a weakness or flaw in software, hardware, or organizational process, which when compromised by a threat can result in a security breach
  3. malware disguised as legitimate software
  4. assurance that someone cannot deny the validity of something
  5. Attempting to target high-profile business executive or manager with emails and web pages that appear to be official
  6. designed to lock users out of their system or deny access to data until ransom is paid
  7. Cyber-attack that uses SMS text messages
  8. CIA for maintaining consistency, accuracy and trustworthiness of data over its entire lifecycle
Down
  1. CIA for data readily accessible for authorized parties
  2. ______ network vulnerabilities involve protecting asset such as locking a server in a rack closet or securing an entry point with a turnstile
  3. short of roBOT NETwork
  4. monitors a user's keystrokes
  5. name for Trojan horses, viruses and worms
  6. CIA for safeguarding data
  7. Short for demilitarized zone it is firewalls that are often deployed as a buffer between the internet and your internal network
  8. email scam that appears to be from a legitimate user or business
  9. most common type of malware attack

17 Clues: short of roBOT NETworkCIA for safeguarding datamonitors a user's keystrokesmost common type of malware attackmalware disguised as legitimate softwareCyber-attack that uses SMS text messagesname for Trojan horses, viruses and wormsCIA for data readily accessible for authorized partiesassurance that someone cannot deny the validity of something...

REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16

REV Cybersecurity Awareness Trivia Crossword Puzzle crossword puzzle
Across
  1. security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  2. an attempt by hackers to damage or destroy a computer network or system.
  3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  4. designed to detect and destroy computer viruses.
  5. global system of interconnected computer networks that use the Internet protocol suite.
  6. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  7. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
  8. code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  9. are small files that Web sites put on your computer hard disk drive when you first visit.
  10. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
  1. someone who seeks and exploits weaknesses in a computer system or computer network.
  2. any software program in which advertising banners are displayed while the program is running.
  3. horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  4. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  5. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  6. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  8. door a method, often secret, of bypassing normal authentication in a product.
  9. a standalone malware computer program that replicates itself in order to spread to other computers.

19 Clues: designed to detect and destroy computer viruses.an attempt by hackers to damage or destroy a computer network or system.door a method, often secret, of bypassing normal authentication in a product.someone who seeks and exploits weaknesses in a computer system or computer network....

2.02 Security Solutions 2025-03-17

2.02 Security Solutions crossword puzzle
Across
  1. Regulates transportation safety across air, land, and sea.
  2. Responds to and extinguishes fires.
  3. master key: key that provides access to all doors on one specific floor.
  4. a key used by guestroom attendants that is coded to open only a selection of rooms in a specific section.
  5. allows the door lock to be overridden to open electronically engaged deadbolt.
  6. document that details the emergency procedures designed to maintain safety of guests, employees, and the property.
  7. a key that allows access into all of the door locks of the hotel.
  8. Protects the nation from terrorism, cyber threats, and natural disasters.
  9. Oversees public health initiatives and disease control. Also Administers social services, including Medicaid, Medicare, and welfare programs.
Down
  1. the close observation of a situation to provide information for investigations regarding guests, employees, and asset protection.
  2. prevention: actions and procedures that ensure the safety and security of the property and its guests and preventing problems from occurring.
  3. a specifically encoded key, typically used by the bell attendant to handle a luggage pull; provides one-time entry into a selection of rooms.
  4. a legal term that means an operation has done everything (within reason) to ensure that a safe operation and product was delivered.
  5. a form of preventive maintenance that is done on a daily, weekly, monthly, quarterly, semi-annual, or annual basis to prevent breakdowns of equipment.
  6. maintenance: maintenance done under immediate circumstances.
  7. Enforces laws and maintains public order.
  8. control: procedures that control access to property keys to increase guest security and privacy and to reduce the possibility of theft.
  9. communication standard (HCS): requires that all employees notify employees about all chemical hazards present on the job and train them to use the materials safely.
  10. maintenance that is done to prevent future breakdowns of equipment and systems.
  11. the process of ensuring that managers and employees follow the laws, regulations, standards, and ethical practices that apply to a particular industry.
  12. Occupational Safety and Health Administration

21 Clues: Responds to and extinguishes fires.Enforces laws and maintains public order.Occupational Safety and Health AdministrationRegulates transportation safety across air, land, and sea.maintenance: maintenance done under immediate circumstances.a key that allows access into all of the door locks of the hotel....

Electric & CIP Compliance 2026-03-29

Electric & CIP Compliance crossword puzzle
Across
  1. What unit measures electrical resistance?
  2. What state is JEA RC location?
  3. What provides electrical energy from chemicals?
  4. Regional entity responsible for grid reliability and security across 16 southeastern and central U.S. states, including Florida
  5. Protocols for issuing clear, actionable operating instructions.
  6. Maintaining the real-time equilibrium between load and generation.
  7. What is the flow of electrons called?
  8. What materials block the flow of electricity?
  9. The requirement for grid entities to adhere to established rules.
  10. JEA Policies and Procedures can be found where?
  11. What type of current flows in only one direction?
  12. What type of current reverses direction periodically?
  13. What is a closed path for electricity called?
  14. Who is assigned on Page 31 of the JEA Cyber Security Policy for Bulk Electric System
  15. How many CIP Generation Facilities does JEA operate?
Down
  1. Backup and Recovery Plan must as least be tested _______?
  2. Real-time management and control of the bulk power system.
  3. What term describes a sudden unplanned change in the electrical system?
  4. Procedures for handling critical grid disturbances or equipment failure.
  5. What is the standard unit of electrical power?
  6. NERC defines annual as how many calendar months?
  7. North American __________ Reliability Corporation
  8. What safety device breaks a circuit if it overloads?
  9. Which limit, if exceeded, could lead to instability or cascading outages? IROL (_____________ Reliability Operating Limit)
  10. What materials allow electricity to flow easily?
  11. Where is NERC based out of?
  12. SERC ______ offers several free learning courses on reliability, compliance and controls
  13. What system controls physical access to a PSP
  14. How many CIP Standards are there?
  15. What is the process of restarting the grid without external power?
  16. What device is used to measure voltage?
  17. What force pushes electrons through a circuit?
  18. Who delegated authority to NERC to create and enforce compliance with Reliability Standards?

33 Clues: Where is NERC based out of?What state is JEA RC location?How many CIP Standards are there?What is the flow of electrons called?What device is used to measure voltage?What unit measures electrical resistance?What system controls physical access to a PSPWhat materials block the flow of electricity?What is a closed path for electricity called?...

CROSS CODE PUZZLE 3 2017-12-24

CROSS CODE PUZZLE 3 crossword puzzle
Across
  1. Latest engine used by FIFA 17 this year
  2. American TV series aired on HBO that focuses on struggles of six programmers who are trying to make a mark in the big, bad world of programming
  3. He hosted the Grammys this year
Down
  1. Best animated feature film this year at Oscars
  2. He hosted The Oscars this year
  3. American TV series aired on USA network whose main protagonist works as a cyber security engineer by day, and hacks felons at night

6 Clues: He hosted The Oscars this yearHe hosted the Grammys this yearLatest engine used by FIFA 17 this yearBest animated feature film this year at OscarsAmerican TV series aired on USA network whose main protagonist works as a cyber security engineer by day, and hacks felons at night...

RU ITEC411 Chapter 5 Crime and Security 2024-11-16

RU ITEC411 Chapter 5 Crime and Security crossword puzzle
Across
  1. Early packet switching network, seen as the predecessor for modern internet.
  2. Software intentionally designed to cause disruption.
  3. Use of cyber-attacks against a state, causing comparable harm to warfare.
  4. A destructive computer worm that spread rapidly through email attachments.
  5. Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
  6. Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
  7. Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
  8. A short-range wireless technology that allows electronic devices to communicate.
  9. Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
  1. Ethical hacking of a computer system to evaluate security weaknesses and address them.
  2. A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
  3. Use of computer hacking to promote political agenda or social change.
  4. A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
  5. An open-source library that provides secure communication between computer networks.
  6. A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
  7. A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
  8. Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
  9. Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
  10. Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
  11. Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
  12. Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.

21 Clues: Software intentionally designed to cause disruption.Use of computer hacking to promote political agenda or social change.Use of cyber-attacks against a state, causing comparable harm to warfare.A destructive computer worm that spread rapidly through email attachments.Early packet switching network, seen as the predecessor for modern internet....

MARVEL Cloud Computing and Cyber Security Domain 2022-02-24

MARVEL Cloud Computing and Cyber Security Domain crossword puzzle
Across
  1. Hash me D8578edf8458ce06fbc5bb76a58c5ca4
  2. a method, often secret, of bypassing normal authentication in a product
  3. I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
  4. network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  5. The Cloud Platform that CNA Hardy have chosen
  6. a Deployment Model which is a combination of a Private and a Public Cloud
  7. unique name by performing a wide variety of automated tasks on behalf of their master
  8. is the computer's main circuit board.
  9. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  2. malicious computer program which is used to hack into a computer by misleading users of its true intent
  3. Encrypt the word alphabet using a Caesar cipher with a shift of 3
  4. what does the P stand for in PaaS
  5. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
  6. A group of networked computers that share a common address (.edu, .com).

15 Clues: what does the P stand for in PaaSis the computer's main circuit board.Hash me D8578edf8458ce06fbc5bb76a58c5ca4The Cloud Platform that CNA Hardy have chosenEncrypt the word alphabet using a Caesar cipher with a shift of 3a method, often secret, of bypassing normal authentication in a product...

Who Am I? 2014-08-28

Who Am I? crossword puzzle
Across
  1. The Bishop's School's behavior policy
  2. Suicides that happen in one place
  3. More are developed to fight disease in joyous people
  4. Part of the Fundamental Standard
  5. A group that decides to commit suicide together
  6. Part of the Fundamental Standard
  7. A chemical _____ in the brain causes depression
  8. The Bishop's School's standard of conduct
  9. Responsible _____ is part of the Fundamental Standard
  10. Attempt suicide most often
  11. These males are more prone to suicide
  12. Disciplinary _____ prevents a visit to the DC
  13. A step to helping someone potentially suicidal
Down
  1. The fundamental ____ is a code of conduct
  2. Part of the Fundamental Standard
  3. The media's way of turning women into objects
  4. despair and hopelessness
  5. A serious type of depression
  6. Good stress
  7. Bullying online
  8. if you are being cyber bullied _____ someone
  9. If you have one you are more prone to suicide
  10. A step to helping someone potentially suicidal
  11. One of the causes of clinical depression
  12. Complete suicide most often
  13. our emotional response to too much pressure
  14. Can be the end result of severe depression
  15. Suicide is usually the result of _____ events

28 Clues: Good stressBullying onlinedespair and hopelessnessAttempt suicide most oftenComplete suicide most oftenA serious type of depressionPart of the Fundamental StandardPart of the Fundamental StandardPart of the Fundamental StandardSuicides that happen in one placeThe Bishop's School's behavior policyThese males are more prone to suicide...

Lesson 5 vocab 2024-05-29

Lesson 5 vocab crossword puzzle
Across
  1. Windshield
  2. Mouse
  3. Rojo
  4. Channel
  5. To delete
  6. At
  7. Application
  8. To charge
  9. Street
  10. Cyber Safe
  11. Cart
  12. Stereo
  13. To turn off
  14. Oil
  15. Keyboard
  16. Printer
  17. garage
Down
  1. suitcase
  2. battery
  3. Trunk
  4. search engin
  5. discharge
  6. Screen
  7. workshop
  8. road
  9. Tire
  10. Password
  11. freeway
  12. Chest
  13. magazine

30 Clues: AtOilRojoroadCartTireTrunkMouseChestScreenStreetStereogaragebatteryChannelfreewayPrintersuitcaseworkshopPasswordKeyboardmagazinedischargeTo deleteTo chargeWindshieldCyber SafeApplicationTo turn offsearch engin

Cyber Arcade Game 2025-05-22

Cyber Arcade Game crossword puzzle
Across
  1. What is the team in PwC that looks after cyber security?
  2. What type of cyberattack where scammers trick individuals into scanning fake QR codes?
  3. What is the process of converting data into a code to protect it from unauthorized access?
  4. What is the name of the VPN PwC employees should use?
Down
  1. What is the attack type of scamming via text message called?
  2. What is the attack type directed at high-level executives where attackers pretend as legitimate, known and trusted entities, known as?
  3. What is the protective layer between a network and potential threats?
  4. What is the name of the review PwC employees should raise if they want to use a new tool or application?
  5. Which term describes software designed to damage or disrupt systems?

9 Clues: What is the name of the VPN PwC employees should use?What is the team in PwC that looks after cyber security?What is the attack type of scamming via text message called?Which term describes software designed to damage or disrupt systems?What is the protective layer between a network and potential threats?...

Cyber Ready 2022-09-15

Cyber Ready crossword puzzle
Across
  1. A person who uses technical skills and technology to gain unauthorized access to systems, networks, or data to commit crimes.
  2. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones
  3. The act of applying effective technical and practical security measures to meet the regulatory or contractual requirements of a third party.
  4. URLS that lead the user to download a virus or visit a harmful website
  5. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
  6. The probability of exposure or loss that can result from a cyberattack or data breach
  7. A self-replicating program that spreads across a network
  8. Malicious code that spreads through devices to damage them or steal the data within them.
Down
  1. A type of phishing based on previously gathered information about a target that's publicly available or gained from a data breach.
  2. . A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
  3. The possibility of an attack to gain unauthorized access to, damage, or steal information, intellectual property, or data.
  4. A type of phishing attack that tricks C-suite employees into falling for some sort of emergency where they click a link or attachment that installs malware or steals sensitive information
  5. Malicious code intended to monitor your activity without your permission.
  6. preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
  7. Settings on folders or files that control who is allowed to access them.
  8. Unauthorized entry to gain access to computer data, applications, networks, or devices.
  9. A security approach based on the concept that all users both inside and outside an organization's network must have security authentication, authorization, and validation before gaining access to applications or data
  10. An attack intended to make a machine or network inaccessible to its authorized users

18 Clues: A self-replicating program that spreads across a networkURLS that lead the user to download a virus or visit a harmful websiteSettings on folders or files that control who is allowed to access them.Malicious code intended to monitor your activity without your permission....

Week 2 Challenge - Cyber Security Awareness Month 2023-09-22

Week 2 Challenge - Cyber Security Awareness Month crossword puzzle
Across
  1. The acronym for a method of logon that requires you to present two or more pieces of evidence to prove your identity.
  2. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
  3. A form of phishing that targets high profile individuals
  4. A type of software designed to protect against malware and other threats
  5. Malicious software that can cause damage to systems or data
  6. A passwordless option for logging into devices
  7. Malicious emails that request sensitive information or opening of attachments
  8. Always _ _ _ _ your computer when you leave your desk.
Down
  1. a string of random words that are a more secure version of passwords.
  2. A form of malware in which files are locked until a payment is made to the attacker
  3. _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
  4. Method of converting plain text into a code that can only be read by authorised parties.
  5. Errors or vulnerabilities in software
  6. An update to software that fixes a vulnerability or bug.
  7. _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.

15 Clues: Errors or vulnerabilities in softwareA passwordless option for logging into devicesAlways _ _ _ _ your computer when you leave your desk.A form of phishing that targets high profile individualsAn update to software that fixes a vulnerability or bug.Malicious software that can cause damage to systems or data...

SPANISH I- UNIT 4 VOCABULARY 2022-02-06

SPANISH I- UNIT 4 VOCABULARY crossword puzzle
Across
  1. virus
  2. cyber criminals
  3. accessories
  4. reply
  5. photos
  6. antivirus
  7. abbreviations
  8. smile
  9. link
  10. text message
  11. bullying
  12. cell phone
  13. games
Down
  1. victims
  2. unknown
  3. to extort
  4. social media
  5. memes
  6. privacy
  7. survey
  8. get mad
  9. e-mail
  10. videos
  11. get happy
  12. send
  13. receive
  14. selfies
  15. emojis

28 Clues: linksendvirusmemesreplysmilegamessurveyphotose-mailvideosemojisvictimsunknownprivacyget madreceiveselfiesbullyingto extortantivirusget happycell phoneaccessoriessocial mediatext messageabbreviationscyber criminals

SPANISH I- UNIT 4 VOCABULARY 2022-02-06

SPANISH I- UNIT 4 VOCABULARY crossword puzzle
Across
  1. memes
  2. e-mail
  3. victims
  4. bullying
  5. cyber criminals
  6. text message
  7. survey
  8. photos
  9. to extort
  10. cell phone
  11. antivirus
  12. social media
  13. emojis
  14. selfies
Down
  1. games
  2. unknown
  3. smile
  4. receive
  5. virus
  6. privacy
  7. accessories
  8. videos
  9. get happy
  10. reply
  11. get mad
  12. abbreviations
  13. send
  14. link

28 Clues: sendlinkgamesmemessmilevirusreplye-mailvideossurveyphotosemojisunknownreceiveprivacyvictimsget madselfiesbullyingget happyto extortantiviruscell phoneaccessoriestext messagesocial mediaabbreviationscyber criminals

Fall 2024 2024-09-23

Fall 2024 crossword puzzle
Across
  1. Cyber Attack
  2. Picnic Location
  3. Six Million
  4. Governor
  5. Best Portrait Winner
  6. Intern Project
  7. Payroll Manager
  8. 1st Place Winner
  9. Mulch Colors
  10. Railway Flood
  11. Tool Cabinet
Down
  1. Blumenthal Presented
  2. Kyle's New Role
  3. GNEMA Honoree
  4. Red Sox's Home
  5. New VP
  6. Ten
  7. GM for NETM
  8. New Office
  9. North Branford SB Driver

20 Clues: TenNew VPGovernorNew OfficeSix MillionGM for NETMCyber AttackMulch ColorsTool CabinetGNEMA HonoreeRailway FloodRed Sox's HomeIntern ProjectKyle's New RolePicnic LocationPayroll Manager1st Place WinnerBlumenthal PresentedBest Portrait WinnerNorth Branford SB Driver

CISO Crossword Quiz - 1825 2025-03-29

CISO Crossword Quiz - 1825 crossword puzzle
Across
  1. All the data about a person generated while interacting with the internet, from browsing history and social media posts to online purchases and app usage called _______
  2. The process of sending indiscriminately unsolicited bulk messages/emails to a large number of internet users with the intention of scamming is called ______
  3. Cybercriminals creating sophisticated scams like advanced phishing, deepfakes etc. by using a technology that enable computers to simulate human-like intelligence is called ______
  4. ______ often called the weakest link in the cyber security chain because of fear, greed and lack of awareness
  5. ______ is a cyber scam in which fraudsters convince the victim to merge the WhatsApp registration OTP call to access the OTP & to take over the WhatsApp account of victim
Down
  1. The “C” in the C-I-A Triad stands for ______
  2. ______ is a type of malware that downloads onto a computer disguised as a legitimate program/software
  3. ______ is a technique where the first eight digits of your Aadhaar number are hidden and only the last four digits are displayed, enhancing privacy and reducing the risk of misuse of your Aadhaar data
  4. To pose or pretend to be another person in email by forging the sender address of an email to make it appear legitimate is called Email ______
  5. Passwords that contain easy-to-guess information like common words, personal information like names or dates, simple sequences, or easily guessed keyboard patterns called ______ password

10 Clues: The “C” in the C-I-A Triad stands for ____________ is a type of malware that downloads onto a computer disguised as a legitimate program/software______ often called the weakest link in the cyber security chain because of fear, greed and lack of awareness...

Phish Phonics 2026-01-30

Phish Phonics crossword puzzle
Across
  1. What color is the hook on the "Phish Alert" reporting tool in Outlook?
  2. SIGA's password keeping application.
  3. The prize for each member of the winning team of the 2026 SIGA Phishing Tournament.
  4. You can email ________@siga.com to reach our knowledgeable and supportive IT Department with any questions you might have about cyber security and SIGA technology.
  5. _____ phishing is a type of targeted cyberattack where customized fraudulent messages act as bait to trick specific roles or employees into granting access or information to scammers.
  6. Where you can check your team's weekly rankings in the tournament.
Down
  1. SIGA's 2-factor authentication application.
  2. Whose responsibility is cybersecurity at SIGA?
  3. What month did the Phishing Tournament start?
  4. _____ phishing is a cyberattack specifically targeted at executive leadership and those with elevated levels of access to information and funds.
  5. How many teams are participating in the 2026 SIGA Phishing Tournament?

11 Clues: SIGA's password keeping application.SIGA's 2-factor authentication application.What month did the Phishing Tournament start?Whose responsibility is cybersecurity at SIGA?Where you can check your team's weekly rankings in the tournament.What color is the hook on the "Phish Alert" reporting tool in Outlook?...

Internet & Security 2011-12-09

Internet & Security crossword puzzle
Across
  1. feature in internet explorer that lets you view websites without the browser storing data about your browsing session.
  2. to create a website that lloks exactly like another legitimate site on the web, but steals the information people enter.
  3. feature in the internet explorer that helps prevent websites or third-party developers from collecting information about the sites you visit.
  4. an illict activity used by hackers to trick computer users into revealing personal or financial through email massage or website.
  5. software that track a computer user's internet usage and sends this data back to the company or person that created it, usually without the computer user's permission or knowlegde.
  6. a feature in internet explorer 8 that hepls detect phishing websites.
  7. a descriptive word or phrase you enter to obtain a list of results that include that word or phrase.
  8. the steps a computer owner takes to prevent unauthorized use of or damage to the computer.
Down
  1. stores and organizes the link to the webpage that you want to revisit often.
  2. software that searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands.
  3. a software that lets you open and display website.
  4. window that opens on your screen as you visit websites, generally to advertise products you may or may not want.
  5. a string of at least eight characters of upper and lowercase letters and numbers.
  6. verifies the indentity of a person or indicates the security of a website.
  7. allows you to open more than one webpage at a time in a browser window.
  8. to break into a DNS server and redirect any attempts to access a particular website to a spoofed site.
  9. hardware or software that prevents other computers on the internet from accessing a computer or prevents a program on a computer from accessing the internet.
  10. a special website that searches the internet for websites based on words or phrases that you enter.
  11. a harmful program thyat intructs a computer to perform destructive activities, such as erasing a disk drive.
  12. a broad term that describes and program that is intended to cause harm or convey information to others withoutthe owner's permission.

20 Clues: a software that lets you open and display website.a feature in internet explorer 8 that hepls detect phishing websites.allows you to open more than one webpage at a time in a browser window.verifies the indentity of a person or indicates the security of a website.stores and organizes the link to the webpage that you want to revisit often....

Fundamental Security 2013-02-06

Fundamental Security crossword puzzle
Across
  1. What is a Trojan
  2. data send between to hosts
  3. What is another name for unsolicited email
  4. What type of threat is stealing, damage, destroy equipment
  5. allows or Denys traffic on a computer
  6. what do anti-virus look for in software
  7. permanently deleting something
  8. file contents that hold known characteristics of someone
  9. who is responsible for security
  10. What type of virus is the most damaging
Down
  1. what is another name for an infected computer
  2. what is another name code updates
  3. What reads info and operates without your computer knowing
  4. A person that pretends to be a employee to get info on the company
  5. What wed security controls interactivity between a app and computer
  6. what is a common DoS attack
  7. software that pretends to be a trusted computer
  8. a way to safely access resources
  9. what type of attack sniffs out user names and passwords in a network
  10. How often should you check your security

20 Clues: What is a Trojandata send between to hostswhat is a common DoS attackpermanently deleting somethingwho is responsible for securitya way to safely access resourceswhat is another name code updatesallows or Denys traffic on a computerwhat do anti-virus look for in softwareWhat type of virus is the most damagingHow often should you check your security...

Fundamental security 2013-02-06

Fundamental security crossword puzzle
Across
  1. data send between to hosts
  2. what is a common DoS attack
  3. what is another name code updates
  4. What wed security controls interactivity between a app and computer
  5. allows or Denys traffic on a computer
  6. A person that pretends to be a employee to get info on the company
  7. How often should you check your security
  8. a way to safely access resources
  9. file contents that hold known characteristics of someone
  10. permanently deleting something
Down
  1. What type of threat is stealing, damage, destroy equipment
  2. What is another name for unsolicited email
  3. What type of virus is the most damaging
  4. what is another name for an infected computer
  5. What reads info and operates without your computer knowing
  6. what do anti-virus look for in software
  7. who is responsible for security
  8. software that pretends to be a trusted computer
  9. what type of attack sniffs out user names and passwords in a network
  10. What is a Trojan

20 Clues: What is a Trojandata send between to hostswhat is a common DoS attackpermanently deleting somethingwho is responsible for securitya way to safely access resourceswhat is another name code updatesallows or Denys traffic on a computerWhat type of virus is the most damagingwhat do anti-virus look for in softwareHow often should you check your security...

IT-Security 2015-01-26

IT-Security crossword puzzle
Across
  1. Datendiebstahl durch falsche Mails
  2. Beobachten bei der Eingabe von Daten
  3. Virus der sich direkt über Netze verbreitet
  4. Datendiebstahl durch zwischenmenschliche Beeinflussung
  5. Spionageprogramme, die Verhalten des Users ausspionieren
  6. maschinenlesbare Zeichen
  7. Daten können nicht missbräuchlich verändert werden
  8. protokolliert Tastatureingabe mit
  9. verschafft sich unerlaubt Zugang zu Netzwerken (nicht immer böse)
  10. Datensicherung
  11. Hintertür für Dritte ins Internet
  12. unerwünschte, schädliche Software
Down
  1. Datendiebstahl durch weggeworfene Daten
  2. verschafft sich in böser Absicht Zugang zu Netzwerken
  3. Viren, die als Programm in ein Dokument eingebettet sind
  4. Daten eines Dritten, unter Vorgabe einer fremden Identität besorgen
  5. Einwahl über teure Nummern ins Internet
  6. Schadsoftware die in einem scheinbar nützlichem Programm versteckt ist
  7. Abschöpfen von Daten durch Dritter bei Datenaustausch
  8. Programm, das Viren im Betriebssystem versteckt
  9. viele Rechner die ferngesteuert Angriffe über das Internet starten
  10. User wird auf gefälschte Webseiten umgeleitet

22 Clues: Datensicherungmaschinenlesbare Zeichenprotokolliert Tastatureingabe mitHintertür für Dritte ins Internetunerwünschte, schädliche SoftwareDatendiebstahl durch falsche MailsBeobachten bei der Eingabe von DatenDatendiebstahl durch weggeworfene DatenEinwahl über teure Nummern ins InternetVirus der sich direkt über Netze verbreitet...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of software better and able to do more things
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneya machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etcsomeone who is in a position of authority in an organization...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. someone who is in a position of authority in an organization
  4. a clever but dishonest way to get money
  5. to make a computer, machine, or piece of
  6. relating to computers, especially to messages and information on the Internet
  7. a machine or tool that does a special job
  8. to keep someone or something safe from harm, damage, or illness
  9. when something bad is stopped from happening
  10. the crime of stealing
  11. informal someone who secretly uses or changes the information in other people’s computer systems
  12. a written or spoken description that says what happens in an event or process
  13. to take something that belongs to someone else
Down
  1. relating to crime
  2. a group of related parts that work together as a whole for a particular purpose
  3. the sets of programs that tell a computer how to do a particular job
  4. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  5. the act of deliberately making someone believe something that is not true
  6. to make a short hard sound, or make something produce this sound
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. the place where you pay or are served in a shop, bank, restaurant etc

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneyto make a computer, machine, or piece ofa machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

information security 2020-12-18

information security crossword puzzle
Across
  1. the right to enter a place, use something, see someone etc
  2. the sets of programs that tell a computer how to do a particular job
  3. when something bad is stopped from happening
  4. relating to computers, especially to messages and information on the Internet
  5. a machine or tool that does a special job
  6. a clever but dishonest way to get money
  7. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  8. the crime of stealing
  9. to make a short hard sound, or make something produce this sound
  10. to keep someone or something safe from harm, damage, or illness
  11. the place where you pay or are served in a shop, bank, restaurant etc
  12. a group of related parts that work together as a whole for a particular purpose
Down
  1. someone who is in a position of authority in an organization
  2. relating to crime
  3. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  4. to make a computer, machine, or piece of
  5. the act of deliberately making someone believe something that is not true
  6. a written or spoken description that says what happens in an event or process
  7. to damage something so badly that it no longer exists or cannot be used or repaired
  8. to take something that belongs to someone else
  9. informal someone who secretly uses or changes the information in other people’s computer systems

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneyto make a computer, machine, or piece ofa machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etc...

Security Crossword 2022-03-14

Security Crossword crossword puzzle
Across
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
  2. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
  3. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
  4. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  6. Refers to a company security policy that allows for employees’ personal devices to be used in business. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network.
  7. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
  9. An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks).
  10. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  11. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
Down
  1. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  2. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  3. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  6. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  7. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  8. Another kind of malware that allows cybercriminals to remotely control your computer. Rootkits are especially damaging because they are hard to detect, making it likely that this type of malware could live on your computer for a long time.
  9. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.

20 Clues: The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.A malicious application or script that can be used to take advantage of a computer’s vulnerability.A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based....

Information Security 2022-09-29

Information Security crossword puzzle
Across
  1. A type of malware that records every single press of the keyboard that you make
  2. A key only used by one individual to decrypt
  3. A key that can be used by anyone to encrypt messages
  4. Gaining unauthorised access to or control of a computer system
  5. A trap for cybersecurity criminals
  6. Bullying that takes place online
  7. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
  8. Special viruses that move from computer to computer without human action
  9. Impersonation of email address or device to gain unauthorized access to information or systems
  10. Copy of data
  11. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
  12. A weaknesses in computers
  13. scrambled data
  14. Ethical hacking in order to find any cybersecurity weaknesses
  15. Raw data that is put into context and has meaning
Down
  1. core of an operating system
  2. General term for programs that gains access to your system for unethical reasons
  3. Email that contains a message with a suspicious link designed to steal personal information
  4. annoying malware that spams you with ads
  5. Software that protects computers from virus related harm
  6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
  7. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
  8. Malicious code typically disguised as a legitimate program
  9. To take advantage of a system's weakness
  10. I am not a robot
  11. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
  12. Secretly watches computer activity
  13. Collection of malware infested computers that form a network to attack
  14. Electronic messages sent through the internet
  15. Readable data
  16. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  17. An internal security team that defends against both real attackers and Red Teams

32 Clues: Copy of dataReadable datascrambled dataI am not a robotA weaknesses in computerscore of an operating systemBullying that takes place onlineA trap for cybersecurity criminalsSecretly watches computer activityannoying malware that spams you with adsTo take advantage of a system's weaknessA key only used by one individual to decrypt...

Security puzzle 2022-10-26

Security puzzle crossword puzzle
Across
  1. The government is watching our certification through compliance
  2. Mcdonald's _____ browns or the secure format to store passwords in a database
  3. Not the loch ness monster but a dynamic scanning tool
  4. Process for scanning federal VPCs before releases because the government says so
  5. Following someone through physical security without using your own badge
  6. Acronym for the three pillars of security, or an unrelated government agency
  7. Example: 12 characters, 1 uppercase, 1 lowercase, 1 symbol, 1 blood of unicorn, 1 rabbit foot
  8. Conference affectionately known as "hacker summer camp" held in Las Vegas every year
  9. Tool used for vendor reviews
  10. Representation of a system used to assess risk boundaries
  11. Using (vulnerability #) to conduct an attack
Down
  1. Something you have, something you know, something you are.. just a password is not enough
  2. Public or private? Symmetric or asymmetric? Also unlocks doors
  3. Use 1.2 or higher, formerly called SSL
  4. Example: Entering in name as "1=1; drop table USER;"
  5. Example: AJ sends you an urgent text message requesting youtube gift cards
  6. A weakness in our code or configuration (example: log4j)
  7. Process for evaluating security and privacy of medium/high risk features
  8. Secure physical space to store user data
  9. Example: <script>alert(1);</script>
  10. Our endpoint protection product
  11. How you sign in to get access to company resources
  12. Internal password management tool
  13. This organization publishes top ten vulnerabilities

24 Clues: Tool used for vendor reviewsOur endpoint protection productInternal password management toolExample: <script>alert(1);</script>Use 1.2 or higher, formerly called SSLSecure physical space to store user dataUsing (vulnerability #) to conduct an attackHow you sign in to get access to company resourcesThis organization publishes top ten vulnerabilities...

Industrial security 2023-11-29

Industrial security crossword puzzle
Across
  1. Measures to manage and regulate security
  2. Authorization for accessing classified information
  3. Security measures implemented within a facility
  4. Evaluation of security measures and vulnerabilities
  5. Adherence to laws, regulations, and standards
  6. Designated location for entering or exiting a secure area
  7. Regulation and management of systems or processes
  8. Practices to prevent and manage fires in industrial settings
  9. Coordinated actions in reaction to an emergency situation
  10. Education to enhance knowledge and skills related to safety or security
  11. Practice session simulating response to an emergency
  12. Examination to ensure equipment or processes meet standards
  13. Plan and actions taken after a security or safety incident
  14. Protected exchange of information between parties
  15. Hazardous Materials, substances harmful to health or the environment
  16. Physical obstacle preventing access or providing protection
  17. Measures to safeguard physical assets and spaces
  18. Isolated storage or processing system within an organization
  19. Set of rules and guidelines for ensuring security
  20. Regular upkeep of equipment and systems
  21. Supervisory Control and Data Acquisition, industrial control system
  22. Restriction and monitoring of user access to resources
  23. Practices to ensure safe handling of chemicals
  24. Devices used to secure doors, gates, or containers
  25. Integration of cybersecurity with physical security
  26. Measures to prevent accidents or harm to individuals
  27. Personnel responsible for monitoring and ensuring security
  28. Audible or visual signals indicating an emergency or problem
  29. Group responsible for managing and responding to incidents
  30. Evaluation of potential risks to determine their impact
  31. Unauthorized entry or interference with a system
  32. Established procedures to ensure safety in specific situations
  33. Established guidelines for ensuring safety in various contexts
  34. Unique physical or behavioral attributes for identification
  35. Accidental release of hazardous chemicals
  36. Tools or gear used to enhance safety in the workplace
  37. Examination for detecting prohibited items or threats
  38. Monitoring and regulation of industrial processes
  39. Controlled entry or exit point in a facility
Down
  1. Established steps to ensure safety in specific situations
  2. Preparation for potential emergency scenarios
  3. Programmable Logic Controller, used in industrial automation
  4. Evaluation of weaknesses in security defenses
  5. Essential systems and assets for societal functioning
  6. Designated exit for evacuating a facility in an emergency
  7. Surveillance devices capturing visual information
  8. Shared values and beliefs promoting safety within an organization
  9. Notification or warning of a potential threat or danger
  10. Personal Protective Equipment worn to minimize exposure to hazards
  11. Perimeter barrier for security or safety purposes
  12. Strategies to handle and overcome a crisis situation
  13. Swift departure from a facility in response to a threat
  14. Potential source of danger or harm in an industrial setting
  15. Prepared strategy for responding to emergencies
  16. Safeguarding valuable assets from loss or damage
  17. Measures to secure the outer boundaries of a facility
  18. Immediate cessation of operations in an emergency
  19. Use of control systems for operating industrial equipment
  20. Monitoring and observation of activities for security purposes
  21. Systematic examination of safety measures within an organization
  22. Recognition and assessment of potential hazards
  23. Implementation of security measures and regulation
  24. Protection against unauthorized access or harm
  25. Examination of potential risks or dangers to security
  26. Capacity to recover quickly from difficulties or disruptions
  27. Systematic examination of safety or security measures
  28. Measures to protect a network from unauthorized access
  29. Safety procedure to control hazardous energy during maintenance
  30. Individual responsible for evaluating safety practices
  31. Instruction to enhance knowledge and skills related to safety
  32. Use of technology to perform tasks without human intervention
  33. Devices detecting physical changes or conditions

72 Clues: Regular upkeep of equipment and systemsMeasures to manage and regulate securityAccidental release of hazardous chemicalsControlled entry or exit point in a facilityPreparation for potential emergency scenariosEvaluation of weaknesses in security defensesAdherence to laws, regulations, and standardsPractices to ensure safe handling of chemicals...

Mobile Security 2023-09-27

Mobile Security crossword puzzle
Across
  1. escalating privileges on a device, Bypasses operating system-imposed restrictions, Allows full control of the system
  2. the use of GPS to track a device
  3. Two devices linked together, A sender and a receiver, Unicast connection
  4. (USB) Physical connectivity to your mobile device,
  5. the ability to use device with another mobile carrier
  6. More than two devices linked together, Multiple receivers, Single link shared with multiple devices
  7. Radio Frequency Identifier; Examples: Hospital inventory tracking, Some passports, Building access cards, Hotel Keycards
  8. (NFC) two-way wireless communication, payment systems, short range with encryption support
  9. Mobile devices, “cellular” phones, Service area divided into “cells” Towers cover each cell, 3 towers serve each call, can triangulate phone’s location
  10. Ability to remotely remove data from mobile device
  11. remote capture, jam known frequencies, replay/replay attack, loss of device control
  12. Device can capture network data, Lost phone can carry sensitive data, Encrypt your data!, Man-in-the-middle, Mobile device could sniff network traffic, Denial of Service, Frequency interference with company wifi, “Hotspot” could be Rouge Access Point, Exfiltrate internal data via cellular,
  13. separating device functions, One container holds all the work-related data, One container holds all the personal data, Can have other containers
Down
  1. (GPS) sattelibe-based radio navigation, geolocation
  2. Controlling content, What content is available to applications
  3. Updating the firmware to stay up to date, Secures device, Fixing problems as reported or discovered
  4. (MDM)Policy can include: Encrypt data on each device, Auto-lock a device after certain amount of inactivity, Force use of strong passwords, Wipe device automatically if too many fail log-in attempts, Remotely lock device if lost/stolen, Remotely wipe device if lost/stolen
  5. Management Controlling apps hard because always being added and changing,company can whitelist certain apps
  6. ability to determine device’s location, Can only use a device inside (or outside) boundary, Can only allow certain actions inside (or outside) boundary
  7. installing apps not authorized by official app store
  8. Short-wave UHF radio waves, 2.402 GHz to 2.48GHz, Range is very limited, One to one connection

21 Clues: the use of GPS to track a device(USB) Physical connectivity to your mobile device,Ability to remotely remove data from mobile device(GPS) sattelibe-based radio navigation, geolocationinstalling apps not authorized by official app storethe ability to use device with another mobile carrierControlling content, What content is available to applications...

computer security 2020-03-10

computer security crossword puzzle
Across
  1. хранить
  2. программное обеспечение
  3. обрабатывать
  4. аппаратное обеспечение
  5. полезность
  6. защита
  7. телекоммуникации
  8. надежность
  9. достоверность
  10. предотвращать
  11. код
Down
  1. взломщик
  2. применение
  3. безопасность
  4. доступность
  5. идентифицируемость
  6. многогранный
  7. информация
  8. улучшение
  9. ноутбук

20 Clues: кодзащитахранитьноутбуквзломщикулучшениеприменениеполезностьинформациянадежностьдоступностьобрабатыватьбезопасностьмногогранныйдостоверностьпредотвращатьтелекоммуникацииидентифицируемостьаппаратное обеспечениепрограммное обеспечение

Food Security 2020-09-07

Food Security crossword puzzle
Across
  1. house and occupants; referred to as unit
  2. state of being firmly established
  3. means or opportunity to use something
  4. (nation) socially and economically advanced
  5. inhabitants of particular place
  6. able to be used or obtained
  7. relating to nation as a whole
  8. nutritious substance consumed to maintain life
  9. undergo natural development
  10. state of freedom from illness or injury
Down
  1. suffering from lacking proper nutrition
  2. human beings
  3. to expend carelessly with no purpose
  4. action of making effective use of something
  5. (nation) seeking social and economic advances
  6. efficient food for health
  7. justified in terms of profitability
  8. adequate amount; enough
  9. state of being free from danger or threat
  10. kinds of food habitually consumed

20 Clues: human beingsadequate amount; enoughefficient food for healthable to be used or obtainedundergo natural developmentrelating to nation as a wholeinhabitants of particular placestate of being firmly establishedkinds of food habitually consumedjustified in terms of profitabilityto expend carelessly with no purposemeans or opportunity to use something...

DTIN : Security 2024-05-21

DTIN : Security crossword puzzle
Across
  1. - A computer controlled by someone else without the owner's knowledge
  2. - Software designed to detect and destroy computer viruses
  3. - Malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
  4. - Uninterruptible Power Supply, a device that provides emergency power
  5. - Hidden access to a computer system that bypasses security mechanisms
  6. - Measures taken to guard against espionage or sabotage, crime, attack, or escape
  7. - Distributed Denial of Service attack
  8. - Process of encoding messages or information
  9. - Security system that controls the incoming and outgoing network traffic
  10. - Action of regaining possession or control of something stolen or lost
  11. - Malicious software that includes viruses and worms
  12. - A copy of a file or other item of data made in case the original is lost or damaged
Down
  1. - Pertaining to or using digits, particularly binary
  2. - Software that records the keys struck on a keyboard
  3. - Unwanted electrical signal causing disturbances in communication systems
  4. - Network of compromised computers controlled by malicious actors
  5. - Software that appears legitimate but can take control of your computer
  6. - Sudden powerful forward or upward movement, especially by a crowd or by a natural force such as the waves or tide
  7. - Moral principles that govern a person's behavior or conducting of an activity
  8. - Software that automatically displays or downloads advertising material
  9. - Software that enables a user to obtain covert information about another's computer activities
  10. - Online or Internet-based illegal act
  11. - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  12. - Malicious software that copies itself and consumes system resources
  13. - A potentially damaging computer program that replicates itself

25 Clues: - Distributed Denial of Service attack- Online or Internet-based illegal act- Process of encoding messages or information- Pertaining to or using digits, particularly binary- Malicious software that includes viruses and worms- Software that records the keys struck on a keyboard- Software designed to detect and destroy computer viruses...

Security Threats 2023-04-28

Security Threats crossword puzzle
Across
  1. means you can connect to the computer system
  2. means the data is protected from unauthorised changes
  3. you can look at the data on the system but you cannot make changes
  4. gaining unauthorised access to ICT systems
  5. means data is only seen or copied by people who have permission
  6. you can make changes to the data. You can also make changes to the system itself
  7. can cause a lot of damage and problems
  8. access do not have permission to see or alter a data
  9. you can look at the data and you can also make changes to the data
  10. patch an update that fixes a security problem
  11. an example of removable hard disk
Down
  1. computer viruses and other harmful software
  2. a password that is hard to guess
  3. stealing someone else's personal details, and pretending to be that person
  4. taking copy of music, games, movies, etc.
  5. means the data has been damaged or changed
  6. means the state of the system if you don't make any changes
  7. you cannot connect to the system at all
  8. means the data no longer exist in storage
  9. a password that are easier to guess

20 Clues: a password that is hard to guessan example of removable hard diska password that are easier to guesscan cause a lot of damage and problemsyou cannot connect to the system at alltaking copy of music, games, movies, etc.means the data no longer exist in storagegaining unauthorised access to ICT systemsmeans the data has been damaged or changed...

Security+Chap2 2023-01-22

Security+Chap2 crossword puzzle
Across
  1. attacks against cryptographic implementations or crypto algorithms
  2. group of compromised computers known as robots
  3. code that can run on a computer without any action from the user, self-replicating
  4. master computer that controls the botnet
  5. malware that occurs in memory of computer
  6. in the clear
  7. malware that restricts access to a system or encrypts files and demands payment
  8. malicious software downloaded unwittingly from a website or installed with some third-party software
  9. an attack on a hashing system that attempts to send two different messages for the same hash
  10. list of encrypted passwords located in a lookup table
  11. attacker captures credit card information from a cardholder
  12. attacker uses this to bypass normal authorization
  13. advanced form of ransomware that leverages advanced encryption techniques
  14. spyware that records your keystrokes
  15. software designed to gain administrator-level control over a computer system without being detected
  16. code added to software that will initiate when something specific happens
Down
  1. password attack where every possible password is attempted
  2. form of spyware that includes grayware, adware or jokes
  3. attack when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
  4. password attack uses a prearranged list of ordinary words
  5. malicious software
  6. software appears to perform a desired function but actually is performing malicious functions behind the scenes
  7. password attack where attacker uses simple passwords against targeted user accounts and moves on to other accounts before being detected
  8. type of attack where attackers target security weaknesses in the supply network
  9. attacker clones a credit card or SIM card
  10. computer used to distribute malware across the internet, also a zombie
  11. two different files end up using the same hash, MD5
  12. a trojan used to gain back-end access to a server

28 Clues: in the clearmalicious softwarespyware that records your keystrokesmaster computer that controls the botnetmalware that occurs in memory of computerattacker clones a credit card or SIM cardgroup of compromised computers known as robotsattacker uses this to bypass normal authorizationa trojan used to gain back-end access to a server...

Database security 2024-10-16

Database security crossword puzzle
Across
  1. The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
  2. What are the 3 Principles of Information Security? (third one)
  3. A data type that is simply a sequence of characters hash character for comments
  4. An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
  5. Malicious software that can corrupt or steal data stored in a database.
  6. Software used to protect against malicious software
  7. Logical Operator that evaluates to false If condition evaluates to true.
  8. The process of controlling who has access to specific data in a database.
  9. What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
  10. if its boolean expression is true, then executes a block of code
  11. The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
  12. A _______ statement allows us to execute a statement or group of statements multiple times
Down
  1. The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
  2. Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
  3. Merges the string representations of elements in sequence seq into a string, with separator string
  4. This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
  5. A type of cyberattack where malicious code is inserted into SQL queries to access data.
  6. A function that returns the smallest item in an iterable
  7. A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
  8. keeps executing as long as True
  9. What are the 3 Principles of Information Security? (second one)
  10. The primary language used to create web pages
  11. Malicious software designed to harm or exploit any programmable device
  12. Logical Operator that evaluates to true If both the operands are true then condition becomes true. Modulus Divides left hand operand by right hand operand and returns remainder
  13. How many times will the following while loop run? x = 5 while x > 0: x -= 1

25 Clues: keeps executing as long as TrueThe primary language used to create web pagesSoftware used to protect against malicious softwareA function that returns the smallest item in an iterableWhat are the 3 Principles of Information Security? (third one)What are the 3 Principles of Information Security? (second one)...

Security Policy 2024-12-08

Security Policy crossword puzzle
Across
  1. creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
  2. used to encrypt files and folders in windows OSs.
  3. requires a user to supply two or more types of authentication.
  4. a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
  5. a framework for other protocols that provide encryption and authentication.
  6. is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
  7. is a common tool used by many Linux administrators.
  8. prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
  9. is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
  10. An important part for maintaining a system.
  11. backs up the disk sector by sector to create an exact image of the disk's contents.
  12. used in a windows domain environment and provides mutual authentication.
Down
  1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
  2. a server role that makes it possible for administrators to take control of Microsoft product updates.
  3. the built-in firewall in most linux distributions.
  4. a Linux files tool that offers a trash can for deleting files permanently.
  5. backs up any files that changed since the last full or incremental backup.
  6. creates a barrier between two entities.
  7. only backs up files that have changed since the last full backup.
  8. the most widely method for encrypting data.

20 Clues: creates a barrier between two entities.the most widely method for encrypting data.An important part for maintaining a system.used to encrypt files and folders in windows OSs.the built-in firewall in most linux distributions.is a common tool used by many Linux administrators.requires a user to supply two or more types of authentication....

Industrial Security 2025-09-23

Industrial Security crossword puzzle
Across
  1. bell-a hollow device made of metal that makes a ringing sound
  2. being watchful in spotting violator , a person a vehicle or an incident
  3. security- a system of barriers placed between the potential intruder and the objects/matter to be protected.
  4. reduction- minimizing the probability of the potential loss
  5. a portable and detachable lock having a pivoted or sliding hasp
  6. avoidance-removing the risk totally from the business.
  7. to deal with others succesfully without offending
  8. Fence- Constructed in suvh away that visual access through the fence is denied.
  9. low- aim the nozzle or hose of extinguisher at the base of the fire.
Down
  1. to withstand the effects of a hostile environment -measure of how open an establishment to intrusion , attack or injury.
  2. a chance of being injured or harmed.
  3. the potential that a chosen action or activity will lead to a loss probability of an event to happen that will lead to losd.
  4. a kind of state or quality of being secured , freedom from fear or danger , assurance , certainty.
  5. sound and good judgement to arrive at wise and timely decisions
  6. Measures- these involve installation of physical barriers , security lighting , use of vaults, locks and others.
  7. - faith in oneself and his abilities
  8. zone-is an unobstructed area maintain on both sides ofbthe perimeter barrier
  9. System-an installation owned system which is direct extension of the local enforcement agency and /or fire department by special arrangement.
  10. a metallic container used for the safekeeping of document or small items in an office or installation.
  11. - an indication of impending danger or harm.

20 Clues: a chance of being injured or harmed.- faith in oneself and his abilities- an indication of impending danger or harm.to deal with others succesfully without offendingavoidance-removing the risk totally from the business.reduction- minimizing the probability of the potential lossbell-a hollow device made of metal that makes a ringing sound...

Industrial security 2025-10-15

Industrial security crossword puzzle
Across
  1. – A weakness that can be exploited by threats.
  2. – A prepared procedure to handle emergencies or disasters.
  3. – Device that signals when unauthorized access occurs.
  4. – Continuous observation of people or areas for security purposes.
  5. – Protection of computer systems from digital attacks.
  6. – The process of identifying and evaluating potential hazards.
  7. – A set of rules and guidelines for security operations.
  8. – The act of stealing small quantities or low-value items from the workplace.
  9. – A person employed to protect property and personnel.
  10. – The routine inspection of areas to ensure safety and security.
Down
  1. – Unauthorized entry into a restricted area.
  2. – A designated safe route used during an evacuation.
  3. – A badge used for identification and access within a facility.
  4. – A potential cause of unwanted incident or harm.
  5. – The act of keeping people and assets safe from harm.
  6. – Written documentation of a security event or breach.
  7. – Security measure restricting movement due to threats.
  8. – A system that uses video cameras to monitor and record activities.
  9. – A system that restricts entry to authorized personnel only.
  10. – The deliberate destruction or disruption of industrial operations.

20 Clues: – Unauthorized entry into a restricted area.– A weakness that can be exploited by threats.– A potential cause of unwanted incident or harm.– A designated safe route used during an evacuation.– The act of keeping people and assets safe from harm.– Written documentation of a security event or breach....

Linux Security 2026-03-25

Linux Security crossword puzzle
Across
  1. A distro of linux published by Canonical
  2. Secure remote access service running on port 22 by default
  3. A Linux utility designed to automate the rotation, compression, removal, and mailing of log files
  4. The recording of a person's actions on a system (What did you do?)
  5. Configuration file that defines sudo privileges for users
  6. A linux file in etc that stores information about user's passwords
  7. Displays active network connections and listening ports
  8. Permission bit that runs a file with the group's privileges
  9. Modifies user password expiration information
  10. Network scanner used to discover hosts and open ports
  11. Scheduler used to run commands or scripts at set intervals
Down
  1. A plain text file that defines the groups on the system and their members
  2. The verification of a person's permissions (What can you do?)
  3. A command used to run another command as the root user
  4. A default linux user with the ID of 0
  5. Command used to change file or directory ownership
  6. The verification of a person's identity (Who are you?)
  7. Cybersecurity strategy operating on the principle "never trust, always verify"
  8. A linux file in etc that stores information about users on the system
  9. Permission bit that runs a file with the owner's privileges
  10. A software suite and init system used on most modern Linux distros
  11. Command used to change file or directory permissions

22 Clues: A default linux user with the ID of 0A distro of linux published by CanonicalModifies user password expiration informationCommand used to change file or directory ownershipCommand used to change file or directory permissionsNetwork scanner used to discover hosts and open portsA command used to run another command as the root user...

Security Crossword 2026-04-02

Security Crossword crossword puzzle
Across
  1. - Security triad: Confidentiality, Integrity, Availability (abbr.)
  2. - Electromagnetic Interference causing line noise (abbr.)
  3. - Uninterruptible Power Supply for backup power (abbr.)
  4. - Turing test to distinguish humans from computers
  5. - Successor to SSL for secure communications (abbr.)
  6. - Secure Hash Algorithm family (abbr.)
  7. - Boot loader that can be password protected
  8. - Centralized logging daemon
  9. - MIT authentication system that uses tickets
  10. - Virtual Private Network (abbr.)
  11. - Malicious software that remains hidden in the system
  12. - Multi-layer security strategy (defense in depth)
  13. - Command to run programs with elevated privileges
  14. - Pretty Good Privacy encryption tool (abbr.)
Down
  1. - Radio Frequency Interference from radio waves and fluorescent lighting (abbr.)
  2. - Advanced Encryption Standard (abbr.)
  3. - File /etc/______ that stores user account information
  4. - Required for remote access with 2-factor authentication (abbr.)
  5. - Multi-_____ authentication (6 letters)
  6. - Command to change password aging information
  7. - Pseudo-device driver for generating random numbers
  8. - Secure remote login protocol on port 22 (abbr.)
  9. - Linux packet filtering firewall tool
  10. - Method of hiding data in another media type so the existence of data is concealed
  11. - Hash function vulnerable to collisions (abbr.)

25 Clues: - Centralized logging daemon- Virtual Private Network (abbr.)- Advanced Encryption Standard (abbr.)- Secure Hash Algorithm family (abbr.)- Linux packet filtering firewall tool- Multi-_____ authentication (6 letters)- Boot loader that can be password protected- MIT authentication system that uses tickets- Pretty Good Privacy encryption tool (abbr.)...

The trends and buzzwords associated with disruptive technology 2025-08-07

The trends and buzzwords associated with disruptive technology crossword puzzle
Across
  1. Mesh
  2. Intelligence (AI)
  3. technology
  4. (XaaS)
  5. cloud
  6. Detection and Response (EDR)
Down
  1. Liability Insurance
  2. Immune System (DIS)
  3. Automation
  4. Intelligence (BI)
  5. Screening
  6. Computing
  7. Reality (XR)
  8. Authentication (MFA)

14 Clues: Meshcloud(XaaS)ScreeningComputingAutomationtechnologyReality (XR)Intelligence (BI)Intelligence (AI)Liability InsuranceImmune System (DIS)Authentication (MFA)Detection and Response (EDR)

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network....

UNSC: Fun Facts! 2021-09-25

UNSC: Fun Facts! crossword puzzle
Across
  1. The sole country aside from the five permanent members to be included in the working process of the Iran Nuclear Deal.
  2. The member state which currently holds the presidency of the Security Council.
  3. The presidency of the Security Council is rotated every month among its member states based on _____ order.
  4. An operation that is established through the adoption of a Security Council resolution.
  5. The Security Council is empowered to impose _____ obligations on the 193 UN member states to maintain peace through its resolutions.
  6. The location of the UN Security Council’s headquarters.
Down
  1. The smallest country to secure a seat in the Security Council.
  2. The most frequent user of the veto, blocking more than one hundred resolutions since the founding of the Security Council.
  3. A procedure to determine the rest 10 non-permanent members to have a seat in the Security Council in two-year terms.
  4. One of the first two peacekeeping operations deployed by the UN.
  5. Regulated in Chapter VI of the UN Charter, the Security Council suggests member states to choose a ______ settlement of dispute method as the first action possible.
  6. The measure of punishing a certain regime to maintain or restore international peace and security that can be taken by the Security Council.
  7. The name of the city where the first meeting of the Security Council took place back in January 17, 1946.
  8. The power of the five permanent members to block a resolution in the Security Council from being passed.
  9. To be adopted, a Security Council resolution must have the affirmative vote of ____ members of the Council, including the concurring votes of the five permanent members.

15 Clues: The location of the UN Security Council’s headquarters.The smallest country to secure a seat in the Security Council.One of the first two peacekeeping operations deployed by the UN.The member state which currently holds the presidency of the Security Council.An operation that is established through the adoption of a Security Council resolution....

information security 2020-12-18

information security crossword puzzle
Across
  1. a written or spoken description that says what happens in an event or process
  2. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  3. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  4. the right to enter a place, use something, see someone etc
  5. to make a short hard sound, or make something produce this sound
  6. to take something that belongs to someone else
  7. when something bad is stopped from happening
  8. the crime of stealing
  9. relating to crime
  10. relating to computers, especially to messages and information on the Internet
  11. the act of deliberately making someone believe something that is not true
Down
  1. someone who is in a position of authority in an organization
  2. to make a computer, machine, or piece of software better and able to do more things
  3. informal someone who secretly uses or changes the information in other people’s computer systems
  4. a clever but dishonest way to get money
  5. a group of related parts that work together as a whole for a particular purpose
  6. the place where you pay or are served in a shop, bank, restaurant etc
  7. the sets of programs that tell a computer how to do a particular job
  8. a machine or tool that does a special job
  9. to keep someone or something safe from harm, damage, or illness
  10. to damage something so badly that it no longer exists or cannot be used or repaired

21 Clues: relating to crimethe crime of stealinga clever but dishonest way to get moneya machine or tool that does a special jobwhen something bad is stopped from happeningto take something that belongs to someone elsethe right to enter a place, use something, see someone etcsomeone who is in a position of authority in an organization...

information security 2020-12-18

information security crossword puzzle
Across
  1. to keep someone or something safe from harm, damage, or illness
  2. the state of being able to be alone, and not seen or heard by other people
  3. the sets of programs that tell a computer how to do a particular job
  4. to calculate a result, answer, sum etc
  5. what you earn by working and can use to buy things
  6. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  7. the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
  8. a small plastic card that you use to buy goods or services and pay for them later
  9. connect people
  10. someone who steals things from another person or place
  11. someone who secretly uses or changes the information in other people’s computer systems
Down
  1. someone who is in a position of authority in an organization
  2. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  3. facts or details that tell you something about a situation, person
  4. the act of deliberately making someone believe something that is not true
  5. the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
  6. very convenience
  7. a group of related parts that work together as a whole for a particular purpose
  8. seeming bad or dishonest
  9. relating to crime
  10. to damage something so badly that it no longer exists or cannot be used or repaired

21 Clues: connect peoplevery conveniencerelating to crimeseeming bad or dishonestto calculate a result, answer, sum etcwhat you earn by working and can use to buy thingssomeone who steals things from another person or placesomeone who is in a position of authority in an organizationto keep someone or something safe from harm, damage, or illness...

information security 2020-12-18

information security crossword puzzle
Across
  1. to keep someone or something safe from harm, damage, or illness
  2. the state of being able to be alone, and not seen or heard by other people
  3. the sets of programs that tell a computer how to do a particular job
  4. to calculate a result, answer, sum etc
  5. what you earn by working and can use to buy things
  6. a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
  7. the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
  8. a small plastic card that you use to buy goods or services and pay for them later
  9. connect people
  10. someone who steals things from another person or place
  11. someone who secretly uses or changes the information in other people’s computer systems
Down
  1. someone who is in a position of authority in an organization
  2. a secret group of letters or numbers that you must type into a computer before you can use a system or program
  3. facts or details that tell you something about a situation, person
  4. the act of deliberately making someone believe something that is not true
  5. the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
  6. very convenience
  7. a group of related parts that work together as a whole for a particular purpose
  8. seeming bad or dishonest
  9. relating to crime
  10. to damage something so badly that it no longer exists or cannot be used or repaired

21 Clues: connect peoplevery conveniencerelating to crimeseeming bad or dishonestto calculate a result, answer, sum etcwhat you earn by working and can use to buy thingssomeone who steals things from another person or placesomeone who is in a position of authority in an organizationto keep someone or something safe from harm, damage, or illness...

Physical Security 2021-05-27

Physical Security crossword puzzle
Across
  1. Digital Center location
  2. They monitor fire and alarm signals
  3. Designated "Captains"
  4. The top shortage department, as a Company
  5. Bart's Middle Name
  6. In 2021, Kohl's moved from Microsoft office programs entirely to this platform
  7. The building that screams innovation by name
  8. Newest Men's clothing brand launch
  9. Got a Human Resource question?
  10. Used to be granted access
  11. He is a Star Wars buff and was a drummer in a band
  12. The "S" in EAS
  13. Kohl's VMS CCTV Platform
  14. It is 1 of 2 buildings, service happens here
  15. We like to recognize people for this
  16. Milpitas is a Santa Clara County, located in this Valley
  17. We are a top 50 company for
  18. Not from the West or the Midwest, LP TLPM leader
  19. The program that "Pays" when you are honest
  20. This site is located on Broadway
  21. Where to go on MyKohls to achieve your ideal level of wellbeing
  22. Abbr for Closed Circuit Television
  23. To get paid, enter hours here
  24. 200 this year, 800 by the end of 2023
  25. hash (#) tag it!
Down
  1. In 2019, we partnered with this powerhouse to drive traffic in our stores through returns
  2. During these, the correct response is to run, hide or fight
  3. Hospitatlity isn't just a thought, it is a?
  4. The "Z" in PTZ
  5. Loss Preventions "eyes in the sky" to assist with the boots on the ground
  6. The site to be kept "in the know"
  7. Each June we celebrate this for the month
  8. As an associate you get 15% off, also known as this
  9. Check this to understand the "point" of the alarm
  10. He won't have the key, but he can pin you the core
  11. We provide, through volunteering
  12. Kohl's Corporate office is 16 miles from this Baseball teams stadium
  13. This Kohl's building is designated to "strike a pose"
  14. Abbr for the groups committed to driving business through our people
  15. Onguard, also known as
  16. Panic type alarm, also recently installed in exec offices
  17. Technology that prevents the same access badge from being used consecutively
  18. Played in a movie as a pitcher
  19. This caused store closures in 2020
  20. Service needs are entered in here
  21. Another name for Kohl's rewards, it's a program
  22. Automated external difibrillator, abbr
  23. The San Antonio Credit Center shares it's home with this famous battle
  24. This discontinued item caused the largest customer calls to the corporate office
  25. Loss Preventions purpose, to reduce

50 Clues: The "Z" in PTZThe "S" in EAShash (#) tag it!Bart's Middle NameDesignated "Captains"Onguard, also known asDigital Center locationKohl's VMS CCTV PlatformUsed to be granted accessWe are a top 50 company forTo get paid, enter hours hereGot a Human Resource question?Played in a movie as a pitcherWe provide, through volunteering...

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

information security 2022-01-15

information security crossword puzzle
Across
  1. Seeming dishonest or false.
  2. To put furniture, a machine, or a piece of equipment into position and make it ready to use.
  3. If someone is agreed to do something, they are allowed to do it.
  4. To make something more modern or suitable for use now by adding new information or changing its design
  5. A particular form of something.
  6. To react to something with an opposing opinion or action.
  7. In a far place.
  8. Relating to a position of responsibility.
  9. A piece of work to be done with difficulty.
  10. Happening or existing before something or someone else.
Down
  1. To copy or move programs or information into a computer's memory.
  2. A typical quality or an important part of something.
  3. An illegal plan for making money, especially one that involves tricking people.
  4. A particular way of doing something.
  5. to slide something, especially cloth,in order to remove dirt, food, or liquid.
  6. Agreement that something is true or legal.
  7. The development or improvement of something.
  8. Physical or mental activity needed to achieve something.
  9. Pressing a button on the mouse or keyboard.
  10. Used or download data.

20 Clues: In a far place.Used or download data.Seeming dishonest or false.A particular form of something.A particular way of doing something.Relating to a position of responsibility.Agreement that something is true or legal.Pressing a button on the mouse or keyboard.A piece of work to be done with difficulty.The development or improvement of something....

Food Security 2017-04-29

Food Security crossword puzzle
Across
  1. Acquire from foods, used to nourish a person’s physical condition.
  2. Far from average.
  3. A humid and hot climate.
  4. No water, climate problem.
  5. Have nothing.
  6. What makes a something unique.
  7. Physical injured by bacteria.
  8. Not enough nutrition to supply a person’s body.
  9. Financially challenged.
  10. Accept, permit.
  11. Fairness, unbiased.
  12. Supply, grant.
  13. An epidemic of infectious disease.
Down
  1. Something that’s used to solve an issue.
  2. Enough to fill one’s desire.
  3. Demand, use.
  4. Farming, planting.
  5. Misuse, devastation.
  6. Fighting, suffering.
  7. Units of energy.
  8. Make, manufactured.
  9. Accessibility.
  10. Around the world.
  11. Respect and basic human rights.
  12. Too much body weight.
  13. Separate an item with someone.
  14. Accept, back off.
  15. A kind of natural effect with a short duration of time.
  16. Used to purchase goods.
  17. No foods, or anything to fill one’s stomach.

30 Clues: Demand, use.Have nothing.Accessibility.Supply, grant.Accept, permit.Units of energy.Far from average.Around the world.Accept, back off.Farming, planting.Make, manufactured.Fairness, unbiased.Misuse, devastation.Fighting, suffering.Too much body weight.Used to purchase goods.Financially challenged.A humid and hot climate.No water, climate problem....

Security Awareness 2016-04-12

Security Awareness crossword puzzle
Across
  1. Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm
  2. Spam that uses graphical images of text in order to circumvent text-based filters
  3. An email client feature that allows the user to read an email message without actually opening it
  4. A set of security standards that all U>S> companies processing, storing , or transmitting credit card information must follow
  5. Cryptographic algorithms that use a single key to encrypt and decrypt a message
  6. An earlier email protocol for handling incoming mail
  7. Cryptography that uses two mathematically related keys
  8. A publicly released software security update intended to repair a vulnerability
  9. A global network that allows devices connected to it to exchange information
  10. A more recent and advanced email protocol
  11. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  12. The process of proving that a user performed an action
  13. The ability to remotely erase data stored on a mobile device
  14. A false warning intended to trick a user into performing an action that will compromise security
  15. An asymmetric encryption key that does not have to protected
  16. Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
Down
  1. An asymmetric encryption key that does have to be protected
  2. Malware that prevents a user's device from properly operating until a fee is paid
  3. A web browser addition that adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser that normally it could not play or display
  4. One of several types of tools for securing passwords, including password generators, online vaults, and password management application
  5. A language that allows web authors to combine text, graphic images, audio, and video into a single document
  6. Malware that can trigger arbitrary code execution from one computer to a second computer over a network or the internet
  7. Stealing another person's personal information, such as a social security number, and then using the information to impersonate the victim, generally for financial gain
  8. A situation that involves exposure to danger
  9. Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer
  10. A Microsoft Office function that automatically opens documents attached to emails in a read-only mode that disables editing functions
  11. The most recent version of html that standardizes sound and video formats
  12. A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
  13. The tasks of protecting the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
  14. A U.S. law designed to fight corporate corruption
  15. The most widely known and influential organization in the field of computer networking and wireless communications
  16. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
  17. Creating an invented scenario to persuade the victim to perform an action or provide confidential information
  18. Removing the built-in limitations and protections on Google Android devices
  19. Employees, contractors, and business partners who can be responsible for an attack
  20. The state or condition of being free from public attention to the degree that the user chooses

36 Clues: A more recent and advanced email protocolA situation that involves exposure to dangerA U.S. law designed to fight corporate corruptionAn earlier email protocol for handling incoming mailCryptography that uses two mathematically related keysThe process of proving that a user performed an action...

Operations Security 2019-10-08

Operations Security crossword puzzle
Across
  1. should only be work onsite (seatbelt on _______ off)
  2. What is the abbreviation of the list that shows the commands critical information
  3. What you should do to your anti-virus software
  4. ___________ of scientific an tecnical information (RSTI) approval is needed to obtain a distribution statement
  5. Making changes to reduce your vulnerability to adversaries
  6. Profiles on social media used to get your attention
  7. "Computer1234" is a bad example of this
  8. _________ information is what OPSEC protects
  9. What potential harm from bad OPSEC practices is called
  10. OPSEC is a __________ effort
  11. __________ tweets sink fleets
  12. Emails that contain PII, FOUO or critical informaation senders must do this
Down
  1. posting pictures of this could put your family at risk
  2. The number of steps in the OPSEC process
  3. What a weakness in our practices or defense is called
  4. This marks your photos with longitude and latitude information
  5. What you should not take with your smartphone or camera anywhere onsite
  6. An adversary is considered a ________
  7. The kind of email account you can't use to conduct government business
  8. These settings should be used on social media
  9. A threat must have intent and ________ to do harm to the United States to be considered a threat
  10. An option to protect your credit
  11. the most commonly used social media platform by adversaries to target government employees and contractors
  12. What should you remove when you walk away from your NMCI computer
  13. The Freedom of Information Act is for what type of information
  14. How to destroy all FOUO documents

26 Clues: OPSEC is a __________ effort__________ tweets sink fleetsAn option to protect your creditHow to destroy all FOUO documentsAn adversary is considered a ________"Computer1234" is a bad example of thisThe number of steps in the OPSEC process_________ information is what OPSEC protectsThese settings should be used on social media...

Network Security 2015-04-03

Network Security crossword puzzle
Across
  1. Use of cryptographic systems to provide message-by-message authentication and integrity
  2. Cyber-attacks by national governments
  3. The attacks and attackers that companies face
  4. Layers of defense such that all must be breached for an attacker to succeed
  5. Method for malware to move to a victim computer
  6. Tricking the victim into doing something against his or her interests
  7. Attackers who use scripts or other applications developed by more experienced attackers
  8. Worm that will automatically infect other computers without any user interaction
  9. A vulnerability-specific attack that occurs before a patch is available
  10. Some form of proof of identity
  11. Attempting to guess a password by using every possible combination of characters
  12. Mandatory directives that must be followed during implementation
  13. Entity trying to prove their identity by supplying some form of credentials
  14. Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
  15. Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
  16. Method of authentication that uses of a private key, pubic key and a trusted verifier
  17. Broad statements of what should be accomplished, not how to accomplish it
  18. Attempting to guess a password by trying all the words in a standard or custom dictionary
  19. Long passwords that contain a mix of lowercase letters, uppercase letters, numeral characters, and symbols
  20. Lying to get victims to persuade them to do something against their financial self-interest
  21. Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
  22. Full stand-alone malware programs that operates and or replicates by itself
  23. A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
  24. Instructions that are merely optional guidelines for implementation
  25. Process of balancing threats and protection costs for individual assets
  26. A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
  27. Attacking your own systems to discover their weaknesses
  28. Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
  29. Intentionally using a computer resource without authorization or in excess of authorization
Down
  1. The actions that a person given access to a resources is allowed to take
  2. A pair of algorithms used to encrypt and decrypt secure communications
  3. Methods and processes to ensure policies have been implemented properly
  4. deep inspection of application messages across multiple packets to identify malicious activity
  5. Procedures to capture and safeguard data as evidence for criminal court proceedings
  6. Formalized plan to reestablish IT operations within a firm
  7. Hardware or software that examines packets and determines if they are allowed to pass or not
  8. Use of authentic-looking e-mail or websites to entice the user to send his or her personal and/or confidential information
  9. Cyber attackers by terrorists
  10. Part of a piece of malware that performs malicious actions
  11. The practice and study of techniques for securing confidential communications
  12. Alternate way back into a system
  13. Process or program that takes advantage of a known vulnerability
  14. Successful attacks
  15. Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
  16. Pieces of executable code that attach themselves to other programs
  17. A malicious program that disguises itself as a legitimate system file
  18. Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
  19. Use of two authentication methods such as something you know, something you have, or something you are
  20. Closing off all avenues of attack
  21. DoS attack committed by a distributed number or simultaneous attackers
  22. Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
  23. Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
  24. Use of measurements of a person’s attributes for authentication purposes
  25. General term for any evil software that does harm to your system
  26. Trusted system or entity that will verify a supplicant’s identity
  27. Making a computer or entire network unavailable to legitimate users by various means
  28. Sample actions taken for policy oversight
  29. General purpose exploitation programs that can be remotely controlled after installation

58 Clues: Successful attacksCyber attackers by terroristsSome form of proof of identityAlternate way back into a systemClosing off all avenues of attackCyber-attacks by national governmentsSample actions taken for policy oversightThe attacks and attackers that companies faceMethod for malware to move to a victim computer...

IT Security 2014-04-07

IT Security crossword puzzle
Across
  1. providers: is another thraet for data
  2. engineering:A type of confidence trick for the purpose of information gathering, fraud, or system access
  3. raw facts
  4. Area Network : is a system whereby individual PCs are connected together within a company or organisation
  5. Identity theft and Fraud: is a way to protect personal data
  6. is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  7. Private Network :is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  8. that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. hacking:___________ can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  10. is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
Down
  1. data prosed in some way
  2. is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  3. is a software program designed to provide a user with administrator access to a computer without being detected.
  4. Area Network: as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  5. backdoor: is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  6. surfing: is using direct observation techniques, such as looking over someone's shoulder, to get information
  7. is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  8. individuals: more threat of data
  9. is a threat for data
  10. is To move an infected file, such as a virus, into an area where it cannot cause more harm
  11. is a technique of fraudulently obtaining private information
  12. is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  13. is a group of two or more computer systems linked together.
  14. theft: is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name

24 Clues: raw factsis a threat for datadata prosed in some wayindividuals: more threat of dataproviders: is another thraet for dataIdentity theft and Fraud: is a way to protect personal datais a group of two or more computer systems linked together.is a technique of fraudulently obtaining private information...

Security Acronyms 2016-06-04

Security Acronyms crossword puzzle
Across
  1. w
  2. 2nd largest trade show
  3. AKA IPS
  4. Curacao
  5. c
  6. simpky
  7. port 554
  8. may I exit please
  9. Patent
  10. DB, but not decibels
  11. I
  12. L
  13. worth a thousand words
Down
  1. Phonebook for computers
  2. 2.4 or 5.0
  3. Indirectly connected storage
  4. Leased IPs
  5. succeeded where PSIA failed
  6. simple
  7. Cameras POV
  8. time
  9. Duplicative set of cheap media
  10. Milestone, Exacq, Genetec
  11. tvi
  12. h
  13. their way or the highway

26 Clues: wchILtvitimesimplesimpkyPatentAKA IPSCuracaoport 5542.4 or 5.0Leased IPsCameras POVmay I exit pleaseDB, but not decibels2nd largest trade showworth a thousand wordsPhonebook for computerstheir way or the highwayMilestone, Exacq, Genetecsucceeded where PSIA failedIndirectly connected storageDuplicative set of cheap media

Security Crossword 2023-03-30

Security Crossword crossword puzzle
Across
  1. Type of patrol
  2. What the hall located on A1 where the game room is located
  3. The red button at the reception desk
  4. Integrity without (blank)
  5. If there is a building issue, you open a (blank)
  6. Security office room number
  7. The area in which the site is located
  8. Where you can search for and employees email or desk location
  9. GSOC phone number
  10. The emergency phones in the parking garage
  11. Where is Barry Pennett's Office Number?
  12. Supervisors phone number
  13. Conference room named after a flower on B2
  14. Tab in QuickBase where you log you D.A.R.
  15. When a door does not close, it is called a (blank)
  16. An outside contractor gets a badge labeled (black) at the bottom
  17. Tab in QuickBase where you log "lost and found" item
Down
  1. Room where air handlers are located
  2. Room were 3-6 employees can meet
  3. How many AEDs do we have onsite?
  4. Largest conference room in Building B
  5. Camera system we use
  6. Page 29 in the Post orders: Privacy and (blank)
  7. Reception desk phone number
  8. Monthly tasks/projects
  9. Largest conference room on A2
  10. Document that holds site specific policies and procedres
  11. Total number of patrols to be completed each shift
  12. Communication at the starts and end of each shift
  13. Page 37 in the Securitas Handbook

30 Clues: Type of patrolGSOC phone numberCamera system we useMonthly tasks/projectsSupervisors phone numberIntegrity without (blank)Reception desk phone numberSecurity office room numberLargest conference room on A2Room were 3-6 employees can meetHow many AEDs do we have onsite?Page 37 in the Securitas HandbookRoom where air handlers are located...

Security 2 2024-02-28

Security 2 crossword puzzle
Across
  1. - Used by all software applications on a network system to identify the software application or service; numbers range from Oto 65,535.
  2. - Written for the express purpose of modifying a computer's configuration or causing damage to a computer system.
  3. - False message spread about a real or unreal virus: not actually a virus.
  4. - Hardware device or software application that protects the computer from unauthorized access or malware delivered through a network or Internet connection.
  5. - Virus created using a macro programming language, and it is attached to documents that use the language.
  6. - Program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number.
  7. - Designed to track a user's habits such as their web browsing habits.
  8. - E-mail used to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source.
  9. - Refers to a collection of malware that is not regarded as very dangerous, but rather more of a nuisance.
  10. - Works with the Trusted Platform Module (TPM) to verify the successful launch of the operating system and store the information in the TPM.
  11. - Attacks the master boot record (MBR) of a hard drive and is considered extremely destructive.
  12. - Interception of a transmission over a network.
  13. - Collection of infected computers controlled by a source computer.
  14. - Small text file used to send information about a user to a server.
  15. - Consists of a collection of software programs that installs on a computer and allows an intruder to take administrative control.
  16. - Software application that performs specific network functions.
  17. - Destructive program that contaminates files on the infected computer and spreads to other computers without prompting from the user.
  18. - Combination of characteristics that include such things as its length, file name(s) used, mode of infection or replication, the areas of the system that are attacked, the type of software programs that are attacked, and the name or length of the file attachment.
  19. - Gathers information about a user's web-browsing habits.
Down
  1. - Program that changes the configuration of a browser.
  2. - Type of malware that seizes control of your computer and demands payment to unlock it.
  3. - Designed to support advertisements such as popups and may also gather information about the user.
  4. - Class of virus that appears as a desired download.
  5. - Occurs when a network server or web server is flooded with requests to the point that it cannot fulfill the request.
  6. - Hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer.
  7. - Designed to breach security and steal passwords.
  8. - Destructive program that is slipped into an application and remains dormant until some event takes place.
  9. - Deceptive practice based on poisoning a Domain Name Service (DNS) server with an incorrect IP address for a website.
  10. - Software that is typically written to duplicate itself and, in the process. cause problems and possible permanent damage to a computer.
  11. - Virus that changes as it evolves to resist detection.
  12. - Designed to go undetected and leave a hole in the security system of a computer or network.
  13. - Unsolicited junk e-mail or junk electronic newsletters.
  14. - Windows feature that checks the integrity of the operating system during the boot process and only allows digitally signed software to boot and run on the computer.

33 Clues: - Interception of a transmission over a network.- Designed to breach security and steal passwords.- Class of virus that appears as a desired download.- Program that changes the configuration of a browser.- Virus that changes as it evolves to resist detection.- Unsolicited junk e-mail or junk electronic newsletters....

Security Squares 2022-07-14

Security Squares crossword puzzle
Across
  1. A "tear" in the wall
  2. Hidden code that steals
  3. Alternative to the front
  4. Should be easy to remember
  5. Data inspection/what a blood hound is known for
  6. Pretending to be someone you're not
  7. A targeted attack
  8. "The Borg" under control
  9. A common cold
  10. Disguised as a legitimate program
Down
  1. Unauthorized domain registration
  2. Holding "Brent Spiner" hostage
  3. Need a key to open
  4. Unwanted online material
  5. Program that's intentionally harmful
  6. Hacker way to shutdown a network
  7. What you do with a hook, rod and reel
  8. Don't write this on a notepad
  9. Used by titans to catch fish
  10. A "secret" scrambled code

20 Clues: A common coldA targeted attackNeed a key to openA "tear" in the wallHidden code that stealsUnwanted online materialAlternative to the front"The Borg" under controlA "secret" scrambled codeShould be easy to rememberUsed by titans to catch fishDon't write this on a notepadHolding "Brent Spiner" hostageUnauthorized domain registration...

Security Training 2023-05-05

Security Training crossword puzzle
Across
  1. the basics of reading, writing and verbalizing is called this
  2. they're like the ADT Service for Amazon - call them for all emergencies
  3. this program is used to look up badge tracing
  4. program used to monitor alarms
  5. this website houses all your security programs
  6. often hired to perform functions that others can't; often carries a 'yellow badge'
  7. primary internal messaging system
  8. the last name of the founder of Amazon
  9. this shouldn't be present at the desk
  10. area to report to when flagged for screening
Down
  1. there are a variety of these that should be completed by each shift
  2. these are the folks that work in the Yard
  3. used to support a decision, enforce something or help reflect upon when unsure
  4. this is the only TIER 1 alarm; it's the brain of IT/Amazon
  5. bathroom checks would reveal this type of 'artwork'
  6. we shouldn't be using this at the desk
  7. these are conducted when something is reported to you
  8. this acronym is what you are measured upon when reacting to something
  9. This program enters visitors
  10. this company was founded in a garage in 1994
  11. training tool that records your trainings and ensures you're up to date with training needs
  12. this is the name of the camera system we use

22 Clues: This program enters visitorsprogram used to monitor alarmsprimary internal messaging systemthis shouldn't be present at the deskwe shouldn't be using this at the deskthe last name of the founder of Amazonthese are the folks that work in the Yardthis company was founded in a garage in 1994this is the name of the camera system we use...

Security puzzle 2023-09-21

Security puzzle crossword puzzle
Across
  1. A security technique that adds an extra step and requires users to enter more information than just a password (abbreviation)
  2. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
  3. The process of taking plain text and scrambling it into a code that is in an unreadable format
  4. Sending unwanted bulk messages to a large number of recipients, often commercial in nature without consent of the recipients
  5. A software designed to detect and destroy computer viruses
  6. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  7. Email sent trying to get user to click on a malicious link
  8. Following someone through physical security without using your own badge
  9. Harmful computer programs such as viruses, worm, and trojans used by hackers to gain access to your computer and cause destructions
  10. Fraudulent text messages that try and get information (or youtube gift cards) from you
  11. Malicious software that intends to block access to a computer or server until an amount of money is paid
Down
  1. Copies of critical data should be maintained in the event of catastrophic system failure
  2. A flaw or weakness in a computer system that can be exploited
  3. Should be constructed of a long string of upper and lower case letters, numbers, and special characters, and not used more than one place
  4. Social ______ is the name of the cybersecurity threat where nefarious actors trick others into revealing sensitive information.
  5. Where to find our policies
  6. The address of a webpage. Check that it is valid before clicking on it (abbreviation)
  7. Information (typically electronic) that can identify a particularly individual, such as name, email, address (abbreviation)
  8. Security tool that creates a secure, encrypted connection between you and the internet (abbreviation)
  9. The process of verifying the identity of a user
  10. An individual who uses technology to try and gain unauthorized access to systems/networks to commit crimes

21 Clues: Where to find our policiesThe process of verifying the identity of a userA software designed to detect and destroy computer virusesEmail sent trying to get user to click on a malicious linkA flaw or weakness in a computer system that can be exploitedFollowing someone through physical security without using your own badge...

Food security 2024-11-05

Food security crossword puzzle
Across
  1. Environmental impact on food
  2. Animals raised for food
  3. Long-term environmental health
  4. Essential for irrigation
  5. Availability of resources
  6. Plants grown for food
  7. Lack of essential nutrients
  8. Crop production per area
  9. Amount of food produced
  10. Farming and crop production
Down
  1. Variety in ecosystems
  2. Foundation of agriculture
  3. Support for the food-insecure
  4. Extreme food shortage
  5. Shortage of resources
  6. Ability to withstand crises
  7. Government rules and regulations
  8. Diet quality focus
  9. Fair food distribution
  10. Food scarcity issue

20 Clues: Diet quality focusFood scarcity issueVariety in ecosystemsExtreme food shortageShortage of resourcesPlants grown for foodFair food distributionAnimals raised for foodAmount of food producedEssential for irrigationCrop production per areaFoundation of agricultureAvailability of resourcesAbility to withstand crisesLack of essential nutrients...

Security Crossword 2025-01-23

Security Crossword crossword puzzle
Across
  1. The process of managing updates for software applications and technologies.
  2. Intermediary server for network requests.
  3. Unauthorized data access incident.
  4. A firewall that monitors and filters traffic between a web application and the internet.
  5. Attempt to obtain sensitive information.
  6. Testing a system for vulnerabilities by simulating attacks.
  7. Algorithm for performing encryption or decryption.
  8. A collection of tools used by an attacker to maintain access to a system while hiding their presence.
  9. Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
  1. Measures taken to protect the integrity and usability of networks.
  2. Running programs in a controlled environment to prevent them from affecting the host system.
  3. A formal document outlining how security measures are implemented within an organization.
  4. Protection measures applied to end-user devices like computers and mobile devices.
  5. A framework for managing digital certificates and public-key encryption.
  6. A systematic evaluation of the security of a company’s information system.
  7. An entity that issues digital certificates for secure communications.
  8. Protocol for establishing an encrypted link between a server and a client.
  9. Permissions granted to users regarding what they can do with resources on a system.
  10. A type of malware that replicates itself to spread to other computers without user intervention.
  11. Software that secretly collects user information.

20 Clues: Unauthorized data access incident.Attempt to obtain sensitive information.Intermediary server for network requests.Software that secretly collects user information.Algorithm for performing encryption or decryption.Testing a system for vulnerabilities by simulating attacks.Measures taken to protect the integrity and usability of networks....

Security Crossword 2026-03-24

Security Crossword crossword puzzle
Across
  1. - Security triad: Confidentiality, Integrity, Availability (abbr.)
  2. - Electromagnetic Interference causing line noise (abbr.)
  3. - Uninterruptible Power Supply for backup power (abbr.)
  4. - Turing test to distinguish humans from computers
  5. - Successor to SSL for secure communications (abbr.)
  6. - Secure Hash Algorithm family (abbr.)
  7. - Boot loader that can be password protected
  8. - Centralized logging daemon
  9. - MIT authentication system that uses tickets
  10. - Virtual Private Network (abbr.)
  11. - Malicious software that remains hidden in the system
  12. - Multi-layer security strategy (defense in depth)
  13. - Command to run programs with elevated privileges
  14. - Pretty Good Privacy encryption tool (abbr.)
Down
  1. - Radio Frequency Interference from radio waves and fluorescent lighting (abbr.)
  2. - Advanced Encryption Standard (abbr.)
  3. - File /etc/______ that stores user account information
  4. - Required for remote access with 2-factor authentication (abbr.)
  5. - Multi-_____ authentication (6 letters)
  6. - Command to change password aging information
  7. - Pseudo-device driver for generating random numbers
  8. - Secure remote login protocol on port 22 (abbr.)
  9. - Linux packet filtering firewall tool
  10. - Method of hiding data in another media type so the existence of data is concealed
  11. - Hash function vulnerable to collisions (abbr.)

25 Clues: - Centralized logging daemon- Virtual Private Network (abbr.)- Advanced Encryption Standard (abbr.)- Secure Hash Algorithm family (abbr.)- Linux packet filtering firewall tool- Multi-_____ authentication (6 letters)- Boot loader that can be password protected- MIT authentication system that uses tickets- Pretty Good Privacy encryption tool (abbr.)...

Linux Security 2026-03-26

Linux Security crossword puzzle
Across
  1. Following an authorized person through a secure door.
  2. File where changing a UID to 0 creates a backdoor.
  3. Packet filtering firewall on Linux.
  4. Ticket-based authentication system from MIT.
  5. Secure remote login protocol on port 22.
  6. Command used to age passwords.
  7. Hiding a secret message inside an image file.
  8. Weak hash algorithm that is vulnerable to collisions.
  9. Malware that hides by replacing commands like ls.
  10. Employee who is a security threat.
  11. Triad of Confidentiality, Integrity, and Accessibility.
  12. When two different inputs make the exact same hash value.
Down
  1. Default logging service in Linux.
  2. Famous 2010 malicious worm discussed in class.
  3. Phil Zimmerman's email security tool.
  4. Encryption using a public and private key pair.
  5. Pseudo-device driver used to generate random numbers.
  6. Group famous for penetration testing methods.
  7. Battery device that provides backup power.
  8. The modern successor to the SSL protocol.
  9. Test to tell computers and humans apart.
  10. Encryption using the same key for sender and receiver.
  11. Tool used to monitor file integrity.
  12. Attack that disrupts service using botnets.

24 Clues: Command used to age passwords.Default logging service in Linux.Employee who is a security threat.Packet filtering firewall on Linux.Tool used to monitor file integrity.Phil Zimmerman's email security tool.Test to tell computers and humans apart.Secure remote login protocol on port 22.The modern successor to the SSL protocol....

Industrial security 2025-10-23

Industrial security crossword puzzle
Across
  1. – A weakness in security systems that can be exploited by threats or unauthorized individuals.
  2. – A signaling device used to alert personnel to security breaches or emergencies.
  3. – Continuous observation of activities to detect and prevent security breaches.
  4. – Training and education programs that inform personnel about proper security practices.
  5. – A defined step-by-step process for completing security-related tasks properly and safely.
  6. – Any indication or potential cause that can harm or disrupt security and safety.
  7. – The act of stealing small quantities of goods or materials over time, often by employees.
  8. – Unauthorized entry into a protected area or system.
  9. – Ensuring that sensitive information is only accessible to authorized individuals.
  10. – A formal statement of principles and rules to guide security practices within an organization.
Down
  1. – Protection of buildings, people, and assets.
  2. – A systematic process of identifying, evaluating, and prioritizing potential hazards or threats.
  3. – A designated safe route used during fire or other emergencies.
  4. – Safeguarding an organization’s physical and intangible resources against theft or loss.
  5. – A trained personnel responsible for protecting property, assets, and people from harm or theft.
  6. – Process of preparing personnel to handle threats and emergencies.
  7. – A detailed set of procedures to ensure safety and business continuity during emergencies.
  8. – A centralized area where monitoring, communication, and response systems are managed.
  9. – A system or method used to regulate who can enter or exit specific areas within a facility.
  10. – Closed-Circuit Television system used for surveillance and monitoring of premises.

20 Clues: – Protection of buildings, people, and assets.– Unauthorized entry into a protected area or system.– A designated safe route used during fire or other emergencies.– Process of preparing personnel to handle threats and emergencies.– Continuous observation of activities to detect and prevent security breaches....

Network Security 2025-11-13

Network Security crossword puzzle
Across
  1. High level permissions that allow a user to install software or change system settings
  2. Malware that locks your files and demands money to unlock them like holding your data hostage
  3. A separate saved copy of important files so you can restore them if data is lost
  4. Rules that decide what different users can see or do on a computer system
  5. Software that scans for malicious files and removes them before they cause damage
  6. A login method that requires your password and a code sent to your phone making accounts harder to hack
  7. A password like 123456 or password that is very easy for attackers to guess
  8. A fake message pretending to be someone trustworthy asking for your password or personal data
  9. When a hacker keeps trying many passwords until one finally works
Down
  1. When a hacker tricks someone into giving away information instead of hacking the system
  2. A secret word or phrase used to prove who you are and log into your account
  3. A harmful program that spreads from file to file and computer to computer
  4. Software that secretly installs itself and causes damage like deleting files or slowing your computer
  5. The process of verifying your identity like entering a password or using fingerprint unlock
  6. A program that looks safe but secretly hides harmful code like a fake game that installs malware
  7. Turns information into unreadable code so intercepted messages cannot be understood
  8. Ethical hacking used to find weaknesses in a system before criminals do
  9. Software that secretly watches what you type or the websites you visit and sends it to someone else
  10. Someone who uses computer skills to access systems sometimes legally and sometimes illegally
  11. An attack that floods a server with too much traffic so real users cannot access it
  12. A security barrier that checks data coming in and out of a network like a bouncer letting only safe traffic through

21 Clues: When a hacker keeps trying many passwords until one finally worksEthical hacking used to find weaknesses in a system before criminals doA harmful program that spreads from file to file and computer to computerRules that decide what different users can see or do on a computer system...

CyberSecurity Trivia 2024-07-09

CyberSecurity Trivia crossword puzzle
Across
  1. Unsolicited emails
  2. Protection of physical assets
  3. Authentication method using two steps
  4. Copy of data for recovery
  5. Protection of personal information
  6. Harmful software
  7. Monitoring for unauthorized access
  8. Potential danger
  9. Software to detect and remove viruses
  10. Epiq's CISO
  11. Network security barrier
  12. Ethical hacking to find vulnerabilities
  13. Evaluation of potential threats
Down
  1. Data protection through coding
  2. Encrypted communication protocol
  3. Adherence to regulations
  4. Examination of security measures
  5. Network security barrier (again)
  6. Offensive action against computer systems
  7. Process of updating software vulnerabilities
  8. Permission to access resources
  9. Weakness in a system's security
  10. Software update to fix vulnerabilities
  11. Psychological manipulation for information
  12. Verification of who someone is
  13. Science of secure communication
  14. Protection against threats
  15. Breach of security
  16. Overwhelming a system to deny access
  17. Deceptive email or website to steal information

30 Clues: Epiq's CISOHarmful softwarePotential dangerUnsolicited emailsBreach of securityAdherence to regulationsNetwork security barrierCopy of data for recoveryProtection against threatsProtection of physical assetsData protection through codingPermission to access resourcesVerification of who someone isWeakness in a system's security...