cyber security Crossword Puzzles
key words Roza Resuli 2012-03-20
Across
- a grid that shows information in an easier way to understand
- whether you can trust something or not
- when you attach a document file to an email
- getting rid of unnecessary information in order to hold the relevant information
- is what social networking and phone companies use to protect children for cyber bullying
- a request for information from a database
- is formed by grouped contents of several fields together
- a website were people can discuss a common goal or success.
- sheet view viewing data on a sheet
- an online folder
- bullying when people get bullied on websites or through email.
- a set of questions you ask a large number of people to find out their opinion and behaviour
Down
- when you communicate to someone online by sending and receiving messages.
- information stored into a computer
- a summary of data put into a database e.g. invoice
- a series of questions you ask in order to gain information
- an online dictionary
- is a part of a database that stores discrete data
- important information
19 Clues: an online folder • an online dictionary • important information • information stored into a computer • sheet view viewing data on a sheet • whether you can trust something or not • a request for information from a database • when you attach a document file to an email • is a part of a database that stores discrete data • a summary of data put into a database e.g. invoice • ...
Aquascape's Cyber Security Awareness Month Crossword Challenge 2024-10-01
Across
- A program that spreads to other devices by attaching itself to files or programs.
- A digital barrier to keep unauthorized users out of a network or device.
- A unique string of characters used to verify identity.
- The practice of protecting data by converting it into unreadable code.
- Software used to detect and prevent malware on a system.
- A technique used to trick users into providing sensitive information.
- A technique where criminals trick users into revealing personal data by pretending to be a trustworthy entity.
Down
- An attack that floods a network or website, overwhelming its capacity.
- Weak points that hackers exploit in software or hardware.
- A method of verifying identity using two or more methods (e.g., password and token).
- A harmful program that appears legitimate but performs malicious functions.
- The act of gaining unauthorized access to a computer system.
- The unauthorized copying, use, or distribution of software.
13 Clues: A unique string of characters used to verify identity. • Software used to detect and prevent malware on a system. • Weak points that hackers exploit in software or hardware. • The unauthorized copying, use, or distribution of software. • The act of gaining unauthorized access to a computer system. • ...
Cyber-Mobbing 2015-01-18
Across
- Im Juristendeutsch den Bully zu stoppen.
- Begriff für Veröffentlichung von intimen Informationen des Opfers z.b private Geschichten oder Geheimnisse über das Internet verbreiten.
- Was sollte man im direkten Umfeld suchen wenn man in solch einer Lage ist?
- Anderes Synonyme für Unterstellung
- In drastischen Fällen kann man bei der Polizei... erstatten.
- Vorgang betätigen damit man im Internet nicht von einer Person belästigt wird.
- Bulling-Opfer wird zu irgendetwas gezwungen und deshalb steht das Opfer unter...
- Wo spielt sich meist Cyber-Mobbing ab? Im...
- Eine Englische Bezeichnung von einer Person die andere absichtlich quält.
Down
- Allgemeiner Begriff für terrorisieren und Beleidigungen per Nachrichten über SMS, E-Mail oder Pinnwandeinträgen.
- Direkte Reaktion des Opfers mitkriegt.
- Was passiert wenn andere unwahre Behauptungen über einen äußern?
- Durch Drohungen oder mit Gewalt unter Druck setzen und zu etwas zwingen.
- Strafrechtlich wird das unter Druck gesetzt auch... genannt.
- Aggressive Art von Cyberbullying, oft aber anonym oder unter falschem Namen.
15 Clues: Anderes Synonyme für Unterstellung • Direkte Reaktion des Opfers mitkriegt. • Im Juristendeutsch den Bully zu stoppen. • Wo spielt sich meist Cyber-Mobbing ab? Im... • Strafrechtlich wird das unter Druck gesetzt auch... genannt. • In drastischen Fällen kann man bei der Polizei... erstatten. • Was passiert wenn andere unwahre Behauptungen über einen äußern? • ...
Cyber Crossword 2021-08-13
Across
- Software written to damage a computer’s performance, steal or alter data, or interfere in other ways with normal functions.
- Measures taken to protect a computer system (as on the internet) against unauthorized access or attack.
- The enciphering and deciphering of messages in secret code or cipher.
- Short for "malicious software". Malware is software designed by cybercriminals to gain access to and damage computers or computer access.
- A method of transforming a text in order to conceal its meaning.
- To engage in activity online that could result in something bad or unpleasant.
- When someone disguises an email address, sender name, phone number, or website URL-often by changing one letter, symbol, or number- to convince you that you are interacting with a trusted source.
- A conversion of something (such as data) into a code or cipher.
Down
- Weakness in the security of a system. Open to attack or damage.
- Software that encrypts data on someone's device until the person agrees to pay some amount of money to regain access to files.
- A set of characters used to identify a user to a computer system. It is similar to a password but much longer.
- Legitimate or innocent looking emails asking you to respond with personal data or to click on a link.
- Short for "malicious software." Malware is software designed by cybercriminals to gain access to and damage computers or computer networks. Typically spread by emails or text that entice people to click on links or open attachments.
- False or inaccurate information, especially that which is deliberately intended to deceive.
- When someone disguises an email address, sender name, phone number, or website URL-often by changing one letter, symbol, or number- to convince you that you are interacting with a source.
- The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
- To convert (something, such as a body of information) from one system of communication into another.
17 Clues: Weakness in the security of a system. Open to attack or damage. • A conversion of something (such as data) into a code or cipher. • A method of transforming a text in order to conceal its meaning. • The enciphering and deciphering of messages in secret code or cipher. • To engage in activity online that could result in something bad or unpleasant. • ...
Cyber Civics 2021-10-22
Across
- the emotion of caring for people and living things
- the screen of the computer
- showing consideration for others
- being truthful and fair
- doing the right thing even when it is difficult
- allows us to see images
- being answerable and accountable
- knowledge put to use to solve practical problems and invent tools
- where everything is stored
Down
- connects power from wall outlet to computer
- a group of people sharing a space or having common characteristics
- short term memory of the computer
- a member of a community
- brains of the computer
- where all things connect
15 Clues: brains of the computer • a member of a community • being truthful and fair • allows us to see images • where all things connect • the screen of the computer • where everything is stored • showing consideration for others • being answerable and accountable • short term memory of the computer • connects power from wall outlet to computer • ...
Cyber Review 2022-05-23
Across
- operating system used by most servers and Android
- type of encryption that uses one key
- name for entire encoded message
- hidden way to access a computer system
- identification method using a body part
- famous German code machine
- keeping a secret
Down
- a security breach
- gives a user access to certain files/programs
- numeric password
- computer bug
- authorized users have easy access
- no unauthorized changes
- most common method of identification
- computer attacker
15 Clues: computer bug • numeric password • keeping a secret • a security breach • computer attacker • no unauthorized changes • famous German code machine • name for entire encoded message • authorized users have easy access • type of encryption that uses one key • most common method of identification • hidden way to access a computer system • identification method using a body part • ...
Cyber Civics 2023-02-01
Across
- a visual representation of yourself online
- being truthful and fair
- doing the right thing even when its unpopular, difficult, or dangerous
- an image that captures exactly what is on a screen
- a member of a community
- when something becomes popular or seen very quickly
- A group of people sharing a space or having characteristics in common.
- a mode of online communication that follows formal rules and requires a subject line and "sign off"
Down
- when you mark that someone is present in a social media post, so that their friends or followers can see the post
- being answerable and accountable.
- someone who intentionally causes trouble or tries to get a reaction out of people online
- unwanted or deceptive emails or posts
- showing thoughtfulness and consideration
- a mode of digital communication usually done informally, with little need for grammar or punctuation
- putting a copy or version of something (like a photo) onto the internet
15 Clues: being truthful and fair • a member of a community • being answerable and accountable. • unwanted or deceptive emails or posts • showing thoughtfulness and consideration • a visual representation of yourself online • an image that captures exactly what is on a screen • when something becomes popular or seen very quickly • ...
cyber ehtics 2025-05-21
Across
- hacking hacking done for good cause is known as ethical hackicng
- transforming into unreadable code
- unwanted bulk
- data unintensional footprints
- practices accessing the internet in an illegal manner
- bombing an mail full of junk files
- data intesional footrints
- piracy when software are copied illegally and distributed
Down
- legal right
- footprint existence in internet
- criminal activites done through internet
- illegal intrusion into a computer
- transforming into readable code
- using the language and thoughts of other person as one's original work
- security system
15 Clues: legal right • unwanted bulk • security system • transforming into readable code • transforming into unreadable code • illegal intrusion into a computer • footprint existence in internet • data intesional footrints • data unintensional footprints • criminal activites done through internet • bombing an mail full of junk files • ...
CYBER ETHICS 2025-05-31
Across
- Misuse of someone's online profile
- Online threats or abuse
- Legal protection for creators of digital content
- illegal downloading of a software
- Observing right and wrong in the use of technology
- Unwanted or junk emails
- Virus-carrying program
Down
- Cyber crime involving deception for financial gain
- Secret word to access an account
- Protecting personal info
- Being polite on the internet
- Fake website to steal info
- Online stealing of someone else's work
- Tracking software
- An online lie to create a false identity
15 Clues: Tracking software • Virus-carrying program • Online threats or abuse • Unwanted or junk emails • Protecting personal info • Fake website to steal info • Being polite on the internet • Secret word to access an account • illegal downloading of a software • Misuse of someone's online profile • Online stealing of someone else's work • An online lie to create a false identity • ...
Cyber ethics 2025-05-29
15 Clues: Run fast • Sea animal • Sea animals • Has a trunk • Flying mammal • Flying animal • Fastest animal • Tallest animal • Slowest animal • Eat love banna • Large marsupial • Helps to travell • Man's best friend • Omnivorous animal • Likes to chase mice
Cyber Ethics 2025-06-12
Across
- What is the process of transforming data into an unreadable code?
- What is the legal right granted by the law for his original work?
- The simplest way to prevent plagiarism is through proper?
- We should always follow copyright policies and?
- When a software is copied and distributed illegally, it's called?
- When a single licenced copy of a software is loading into many computers contrary to the licence's terms, it's called?
Down
- What is an act of harming/harrassing or targetting a person through the internet in a deliberate manner
- We should always do what to avoid softlifting
- What is a combination of "Net" and "Etiquette"
- What means accesing the internet in an illegal manner?
- digital footprint is also known as?
- We should always update our operating systems and?
- The unknown bulk emails that come from unknown sources is?
- What sign in the address bar helps u to identify secured websites?
- An illegal intrusion into a computer system or network is known as what?
15 Clues: digital footprint is also known as? • We should always do what to avoid softlifting • What is a combination of "Net" and "Etiquette" • We should always follow copyright policies and? • We should always update our operating systems and? • What means accesing the internet in an illegal manner? • The simplest way to prevent plagiarism is through proper? • ...
Cyber Ethics 2025-06-13
Across
- – Metropolitan Area Network covering a city
- – Local Area Network used in a small area like a school or office
- – A topology where all devices share a single communication line
- – The overall design of a computer network
- – A device or point where data is sent or received in a network
- – It brings efficiency, economy, and effectiveness in an organization
Down
- – A group of computers and devices linked for sharing data and resources
- – Connections between different nodes or devices in a network
- – A device used to connect a computer to telephone lines for internet
- – The layout in which devices are connected in a network
- – Personal Area Network (small range)
- – A topology where each device connects to exactly two others
- SECURITY – Protecting network data and resources from unauthorized access
- – Wide Area Network covering countries or continents
- – A topology with many routes between devices for better reliability
15 Clues: – Personal Area Network (small range) • – The overall design of a computer network • – Metropolitan Area Network covering a city • – Wide Area Network covering countries or continents • – The layout in which devices are connected in a network • – Connections between different nodes or devices in a network • ...
Cyber Crossword 2025-07-11
Across
- zeros and ones
- protective backing for tablet
- tool used for typing
- act of switching between applications
- installed applications
- protocol for wireless connectivity
- someone who breaks into computers
Down
- act of linking devices
- feature needed for video call
- something that infects your computer
- tool used for clicking in fields
- something that directs electricity to computer
- what connects the world wide web
- maker of iPad
- system like iOS or Windows
15 Clues: maker of iPad • zeros and ones • tool used for typing • act of linking devices • installed applications • system like iOS or Windows • feature needed for video call • protective backing for tablet • tool used for clicking in fields • what connects the world wide web • someone who breaks into computers • protocol for wireless connectivity • something that infects your computer • ...
Cyber Awareness 2025-05-19
Across
- Malware that locks your files and demands money
- Creates a secure connection over a public network
- Unwanted or junk email
- Scrambling data to keep it private
- Global network people use to browse, work, and connect
- A threat from someone within the organization
- A copy of data stored separately in case of loss
- Open Source Intelligence
Down
- Malware that records keystrokes
- Phishing via text messages
- A secret word or phrase used for authentication
- Software that helps detect and remove malicious software
- General term for malicious software
- Network security system that monitors and controls incoming and outgoing traffic
- Making communication look like it comes from a trusted source
15 Clues: Unwanted or junk email • Open Source Intelligence • Phishing via text messages • Malware that records keystrokes • Scrambling data to keep it private • General term for malicious software • A threat from someone within the organization • A secret word or phrase used for authentication • Malware that locks your files and demands money • ...
La tecnología 2021-05-25
22 Clues: full • slow • the CD • to work • to ring • the app • to call • the radio • to turn on • the stereo • to turn off • the charger • digitalcamera • the CD player • the MP3 player • the voice mail • the cell phone • the cyber cafe • the (TV) channel • the television set • the remote control • not working ; out of order
Forensic Investigation and Incident Response 2022-09-26
Across
- It is a technique used to consistently trick an adversary during a cyber-attack.
- Identify and track the origin of data, software, and/or hardware elements.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identifying critical assets that could be at risk – what could go wrong?
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • info that can be of vital importance to the outcome of legal proceedings or investigations. • ...
Fnaf: The Silver Eyes 2024-02-23
Across
- Who is Jessica?
- What genre is this book?
- How old is charlie?
- Who is John?
- How old is John?
- Who is the antagonist?
Down
- how did the security guard "die"?
- is Charlie's father dead?
- How many main characters are there?
- Did the security guard die?
- Who does charlie have a crush on?
- Who is the main character?
- How old is the security guard?
- What is the security guards name?
- Who is Charlie's father?
- What is the name of the human-like robot in charlies closet
- how many books are in the series?
- What is the first location the main character visits?
- What is on the cover of the book?
- How many antagonists are there?
20 Clues: Who is John? • Who is Jessica? • How old is John? • How old is charlie? • Who is the antagonist? • What genre is this book? • Who is Charlie's father? • is Charlie's father dead? • Who is the main character? • Did the security guard die? • How old is the security guard? • How many antagonists are there? • how did the security guard "die"? • Who does charlie have a crush on? • ...
Dominic Stanley 2021-03-17
31 Clues: CD • web • app • file • slow • full • file • mouse • screen • stereo • to save • to ring • to chat • browser • charger • printer • website • internet • to erase • @ symbol • to record • cyber cafe • to turn on • MP3 Player • Voice Mail • DVD Player • (Tv) Channel • Text Message • remote control • television set • digital camera
Cashless society 2024-09-03
Across
- reduced amount
- remove funds from account
- people who purchase
- system of money
- goods for sale
- exchange of goods or money
- betting activity
- Cyber criminal
- concealing illegals founds
- practical
Down
- transactions of money
- seller of goods
- earnings on deposits
- people who buy
- Institution for money
- small metal currency
- physical money
- medium of exchange
- financial records
- total to paid
20 Clues: practical • total to paid • reduced amount • people who buy • goods for sale • physical money • Cyber criminal • seller of goods • system of money • betting activity • financial records • medium of exchange • people who purchase • earnings on deposits • small metal currency • transactions of money • Institution for money • remove funds from account • exchange of goods or money • ...
Crossword Puzzle - All about Security ONE 2020-11-08
Across
- Who has the most children?
- The only girl in London
- A Nova Scotia resident
- The crochet queen
- A retiree
- Our team colors
- Someone who has 3 boys
- Early technology
- Someone who has two girls
- Someone who loves the water
- The best thing about Security ONE?
- The “voice” of Security ONE
- Our building was formerly owned by
- The Axe man
- Latest in technology
- A former marine
Down
- the one who fixes it all
- A new grandma
- The dept that never sleeps
- Number of years have we been in this building
- The new bride
- One of most common names at Security One
- The newlywed
- Who has a hyphenated name?
- Person who likes the “oldies”
- The apple man
- Whose kids live the furthest away?
- One of the ones who started it all
- Where is the current Security ONE located?
- An avid hunter
- Street Dave lives on
- When Security One bought Alliance – what street was it on?
- Person with the most dogs
33 Clues: A retiree • The Axe man • The newlywed • A new grandma • The new bride • The apple man • An avid hunter • Our team colors • A former marine • Early technology • The crochet queen • Street Dave lives on • Latest in technology • A Nova Scotia resident • Someone who has 3 boys • The only girl in London • the one who fixes it all • Someone who has two girls • Person with the most dogs • ...
Kim chart 2025-03-28
Across
- focus on strong passwords
- content,contact,and conduct
- regular firmware update
- memory caching itself isn't direct internet security risk
- a metric that is used to evaluate the potential cost and benefits of implementing
- change default login credential
- drive data backups,activate firewalls,avoid public wi-fi,enable multi-factors
- turn off Bluetooth when not n use
- a flag raised wherever you surf the web
- solider state drive offer faster performance
Down
- change your router's default credentials ,update ,firmware ,change the Wi-Fi password
- website security checkers like sucuri site check,online virus scanners from F-secure
- plays a crucial role
- pose internet security risk,including the potenial
- refers to the ability of software or programming language to prevent memory
- screen sensitive data entry
- highlighting the importance of internet safety measure for device
- detail monitoring
- use strong,unique passwords,enable multi-factor
- while a motherboard itselfs isn't directly involved in internet security
- when using flash memory like USB drive for internet safety
- can pose internet security risks if not handled carefully
- the security and privacy measure related to smart speaker
23 Clues: detail monitoring • plays a crucial role • regular firmware update • focus on strong passwords • content,contact,and conduct • screen sensitive data entry • change default login credential • turn off Bluetooth when not n use • a flag raised wherever you surf the web • solider state drive offer faster performance • use strong,unique passwords,enable multi-factor • ...
Services 2022-05-08
Across
- The fastest travelling service
- Fixes your tap
- Safes the land
- Makes your party memorable
- Guarantees social security
- Guarantees iformation technologies security
- Bulids homes
- Makes your back yard beautiful
Down
- Headcooker
- Fixes your vehicle
- Fixes your mental status
- Makes your hairy places good looking
- Makes you beautiful
- Coffe artist
- Heals you
- Relaxes your body
- Mops up a place
- Serves the meal
18 Clues: Heals you • Headcooker • Coffe artist • Bulids homes • Fixes your tap • Safes the land • Mops up a place • Serves the meal • Relaxes your body • Fixes your vehicle • Makes you beautiful • Fixes your mental status • Makes your party memorable • Guarantees social security • The fastest travelling service • Makes your back yard beautiful • Makes your hairy places good looking • ...
Services 2022-05-08
Across
- Relaxes your body
- Coffe artist
- Makes your back yard beautiful
- Fixes your mental status
- Makes you beautiful
- Makes your hairy places good looking
- Serves the meal
- The fastest travelling service
- Safes the land
- Mops up a place
Down
- Fixes your vehicle
- Guarantees informational technologies security
- Heals you
- Headcooker
- Guarantees social security
- Makes your party memorable
- Bulids homes
- Fixes your tap
18 Clues: Heals you • Headcooker • Coffe artist • Bulids homes • Fixes your tap • Safes the land • Serves the meal • Mops up a place • Relaxes your body • Fixes your vehicle • Makes you beautiful • Fixes your mental status • Guarantees social security • Makes your party memorable • Makes your back yard beautiful • The fastest travelling service • Makes your hairy places good looking • ...
Forensic Investigation and Incident Response 2022-09-26
Across
- Identifying critical assets that could be at risk – what could go wrong?
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
Down
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identify and track the origin of data, software, and/or hardware elements.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- It is a technique used to consistently trick an adversary during a cyber-attack.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • Understanding the potential impacts of cyber threats were they to materialize is important. • ...
Cyber-Mobbing 2015-01-18
Across
- Direkte Reaktion des Opfers mitkriegt.
- Vorgang betätigen damit man im Internet nicht von einer Person belästigt wird.
- Im Juristendeutsch den Bully zu stoppen.
- Aggressive Art von Cyberbullying, oft aber anonym oder unter falschem Namen.
- Allgemeiner Begriff für terrorisieren und Beleidigungen per Nachrichten über SMS, E-Mail oder Pinnwandeinträgen.
- Was passiert wenn andere unwahre Behauptungen über einen äußern?
- Wo spielt sich meist Cyber-Mobbing ab? Im...
- Was sollte man im direkten Umfeld suchen wenn man in solch einer Lage ist?
Down
- Durch Drohungen oder mit Gewalt unter Druck setzen und zu etwas zwingen.
- In drastischen Fällen kann man bei der Polizei... erstatten.
- Strafrechtlich wird das unter Druck gesetzt auch... genannt.
- Begriff für Veröffentlichung von intimen Informationen des Opfers z.b private Geschichten oder Geheimnisse über das Internet verbreiten.
- Eine Englische Bezeichnung von einer Person die andere absichtlich quält.
- Bulling-Opfer wird zu irgendetwas gezwungen und deshalb steht das Opfer unter...
- Anderes Synonyme für Unterstellung
15 Clues: Anderes Synonyme für Unterstellung • Direkte Reaktion des Opfers mitkriegt. • Im Juristendeutsch den Bully zu stoppen. • Wo spielt sich meist Cyber-Mobbing ab? Im... • In drastischen Fällen kann man bei der Polizei... erstatten. • Strafrechtlich wird das unter Druck gesetzt auch... genannt. • Was passiert wenn andere unwahre Behauptungen über einen äußern? • ...
Cyber Knowledge 2020-09-17
Across
- Someone who sees cyberbullying but does nothing to help.
- The legal right given to an originator to print, publish, perform, film, or record the originator's work.
- The denial of access to particular parts of the internet.
- Sharing someone's secrets or embarrassing information online.
- A program, or set of instructions, that runs on a computer.
- An image with text used to describe a thought, idea, or joke that is widely shared.
- An image or user name that represents a person online.
- A person who is known for creating controversy in an online setting.
- Intentionally excluding someone from an online group, like a buddy list or a game.
Down
- Using algorithms to create complex codes out of simple data
- Designed to detect and destroy computer viruses.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Any device used to communicate provocative messages and/or sexual images.
- An attempt to trick someone, usually with the intention of stealing money or private information.
- Any software program in which advertising banners are displayed while the program is running.
15 Clues: Designed to detect and destroy computer viruses. • An image or user name that represents a person online. • Someone who sees cyberbullying but does nothing to help. • The denial of access to particular parts of the internet. • Using algorithms to create complex codes out of simple data • A program, or set of instructions, that runs on a computer. • ...
Cyber & Me 2020-10-19
Across
- Intentionally excluding someone from an online group, like a buddy list or a game.
- A program, or set of instructions, that runs on a computer.
- An image or user name that represents a person online
- Someone who sees cyberbullying but does nothing to help.
- Sharing someone's secrets or embarrassing information online.
- A person who is known for creating controversy in an online setting.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Designed to detect and destroy computer viruses.
Down
- Any device used to communicate provocative messages and/or sexual images.
- using algorithms to create complex codes out of simple data
- The legal right given to an originator to print, publish, perform, film, or record the originator's work.
- An image with text used to describe a thought, idea, or joke that is widely shared.
- An attempt to trick someone, usually with the intention of stealing money or private information.
- Any software program in which advertising banners are displayed while the program is running.
- The denial of access to particular parts of the internet.
15 Clues: Designed to detect and destroy computer viruses. • An image or user name that represents a person online • Someone who sees cyberbullying but does nothing to help. • The denial of access to particular parts of the internet. • using algorithms to create complex codes out of simple data • A program, or set of instructions, that runs on a computer. • ...
Cyber & Me 2020-10-19
Across
- Intentionally excluding someone from an online group, like a buddy list or a game.
- Sharing someone's secrets or embarrassing information online.
- The legal right given to an originator to print publish, perform, film, or record the originator's work.
- Designed to detect and destroy computer viruses.
- An image or user name that represents a person online
- An attempt to trick someone, usually with the intention of stealing money or private information.
- using algorithms to create complex codes out of simple data
Down
- An image with text used to describe a thought, idea, or joke that is widely shared.
- A program, or set of instructions, that runs on a computer.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Someone who sees cyberbullying but does nothing to help.
- Any device used to communicate provocative messages and/or sexual images.
- The denial of access to particular parts of the internet.
- A person who is known for creating controversy in an online setting.
- Any software program in which advertising banners are displayed while the program is running.
15 Clues: Designed to detect and destroy computer viruses. • An image or user name that represents a person online • Someone who sees cyberbullying but does nothing to help. • The denial of access to particular parts of the internet. • A program, or set of instructions, that runs on a computer. • using algorithms to create complex codes out of simple data • ...
Cyber-1 2023-09-26
Across
- A network security device that monitors and filters incoming and outgoing network traffic to block or allow data based on a set of security rules.
- breach The unauthorized access, disclosure, or exposure of sensitive or confidential data to individuals or entities not authorized to possess it.
- A deliberate and malicious attempt to breach the security of a computer system, network, or device.
- The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.
- A weakness or flaw in a system's security that can be exploited by attackers to compromise its integrity, confidentiality, or availability.
- A secret combination of characters used to authenticate a user and grant access to a system, device, or application.
- The process of verifying the identity of a user, device, or system before granting access to resources.
- A collection of interconnected devices and systems that allow data and information to be shared among users.
Down
- Criminal activities carried out using digital technologies, including hacking, fraud, and identity theft.
- Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- Unauthorized access or entry into a computer system, network, or environment with malicious intent.
- Software designed to damage, disrupt, or gain unauthorized access to computer systems, including viruses, worms, and spyware.
- A type of cyberattack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information like login credentials.
- A software update or fix released to address security vulnerabilities or improve the performance of an application or operating system.
15 Clues: A deliberate and malicious attempt to breach the security of a computer system, network, or device. • Unauthorized access or entry into a computer system, network, or environment with malicious intent. • The process of verifying the identity of a user, device, or system before granting access to resources. • ...
Cyber Safety 2025-03-19
Across
- The data connected to a specific person that could be used to identify them.
- __ is software that is created to damage or gain unauthorized access to a computer system.
- You should never share or reuse these.
- Always keep your passwords in a __ place.
- You should utilize a __ and firewalls to keep your data protected.
- Always ensure your __ is up to date.
Down
- Many AI systems have been found to reflect __ in their training.
- Spending too much time online can have a negative __.
- The practice of sending messages pretending to be a legitimate source in hopes of receiving personal information is called __.
- You should have __ factor authentication turned on.
- The 20-20-20 rule is a common tool people use to ensure they are taking ___ from their screens.
- Your password should __ or more characters long.
- If you ever feel uncomfortable, the best thing you can do is __ or report the source.
- A good example of this is "myfishfellfromthetree".
- Sharing personal information can lead to this kind of theft.
15 Clues: Always ensure your __ is up to date. • You should never share or reuse these. • Always keep your passwords in a __ place. • Your password should __ or more characters long. • A good example of this is "myfishfellfromthetree". • You should have __ factor authentication turned on. • Spending too much time online can have a negative __. • ...
Cyber Ethics 2025-06-04
Across
- – Breaking into someone’s computer or account without permission.
- – Staying safe while using the internet.
- – Good manners while using the internet.
- – A fake message or email that tries to steal your personal info.
- – Keeping your personal info safe on the internet.
- – The data you leave behind when using the internet.
- – Harmful software that can damage your computer.
- – Crimes done using computers or the internet.
- – Legal right to own and protect your creative work.
Down
- – Hurting or teasing someone online.
- – A program that protects your computer from viruses.
- – Rules for using computers and the internet in a good and fair way.
- – A password that is hard to guess and keeps your account safe.
- – Using apps like Instagram, WhatsApp, etc., carefully.
- – Copying someone else’s work and saying it’s yours.
15 Clues: – Hurting or teasing someone online. • – Staying safe while using the internet. • – Good manners while using the internet. • – Crimes done using computers or the internet. • – Harmful software that can damage your computer. • – Keeping your personal info safe on the internet. • – Copying someone else’s work and saying it’s yours. • ...
CYBER ETHICS 2025-05-19
Across
- a program or set of programs that disrupts the normal functioning of a computer
- the process of transforming data into unreadable code
- the act of sending an email to a user, misleading him to believe that it is from trusted person or organisation
- the criminal practice of using social influence over the telephone system, most often using features facilitated by voice over IP, to gain access to sensitive information
- purchasing a single licenced copy of the software and load it onto several computers contrary to the licence's terms
- the act of using or imitating the language an d thoughts of another person as one's original work
- at the receiving end, the process of conversion of encrypted information into a readable form
Down
- an act harming or harassing a person through information technology in deliberate manner
- a legal right granted by the law to the creator for his original work
- an illegal intrusion into a computer system or network
- to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet
- a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on
- the technical people who are experts in breaking into systems to steal important data, such as financial details, passwords, etc
- they are generally sent in large numbers for commercial advertising purposes
- a right related to the new inventions that grants the inventor the sole right to make, use, and sell that invention for a specific period of time
15 Clues: the process of transforming data into unreadable code • an illegal intrusion into a computer system or network • a legal right granted by the law to the creator for his original work • they are generally sent in large numbers for commercial advertising purposes • a program or set of programs that disrupts the normal functioning of a computer • ...
Cyber Ethics 2025-06-13
Across
- Sending unsolicited bulk messages online.
- Digital evidence left behind after using the internet.
- The right to control personal digital information.
- Converting coded data back into readable form
- Acts like hacking or identity theft
- A form of cybercrime asking for payment to restore data
- Scrambling data to keep it safe.
- Altering digital content and claiming it as your own
- Criminal activity involving a computer or network.
Down
- Malicious code designed to harm systems
- Technology used to protect against unauthorized access
- Harassment that takes place over digital devices.
- A person who breaks into systems illegally.
- Illegal copying or use of software.
- A self-replicating program that spreads without permission.
15 Clues: Scrambling data to keep it safe. • Illegal copying or use of software. • Acts like hacking or identity theft • Malicious code designed to harm systems • Sending unsolicited bulk messages online. • A person who breaks into systems illegally. • Converting coded data back into readable form • Harassment that takes place over digital devices. • ...
Cyber Ethics 2025-06-14
Across
- REFERS TO UNWANTED BULK EMAILS THAT COME FROM UNKNOWN SOURCES
- A RIGHT RELATED TO NEW INVENTIONS
- ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- INFORMATION AND COMMUNICATION TECHNOLOGY
- CRIMINAL PRACTICE OF USING SOCIAL INFLUENCE OVER THE TELEPHONE
- ACT OF SENDING AN EMAIL TO A USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
- WHEN A SINGLE LICENSED COPY OF A SOFTWARE IS LOADED INTO MANY COMPUTERS CONTRARY TO THE LICENCE’S TERMS
- REFERS TO BEING AWARE OF THE ETHICAL PRACTICES AND BEHAVING RESPONSIBLY WHILE USING THE INTERNET
Down
- A SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER
- THE SIMPLEST WAY TO PREVENT PLAGIARISM
- THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE
- SURF THE INTERNET UNDER SUPERVISION OF PARENTS
- LEGAL RIGHT GRANTED BY LAW TO THE CREATOR FOR HIS ORIGINAL WORK
- A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER
15 Clues: A RIGHT RELATED TO NEW INVENTIONS • THE SIMPLEST WAY TO PREVENT PLAGIARISM • INFORMATION AND COMMUNICATION TECHNOLOGY • REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER • SURF THE INTERNET UNDER SUPERVISION OF PARENTS • THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE • A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER • ...
CYBER ETHICS 2025-05-21
Across
- Illegally accessing computer systems.
- Staying safe while using the internet.
- Making data unreadable to others.
- Copying someone work without any credit.
- A secret word for logging in safely.
- Someone who posts mean or false comments online.
- Harmful software like viruses.
- Bullying someone online.
Down
- Tricking people to get personal information.
- Keeping personal information safe.
- Good manners on the internet.
- Unwanted or junk emails.
- Legal right to one's own work.
- The trail you leave online.
- Protects a computer from unauthorized access.
15 Clues: Unwanted or junk emails. • Bullying someone online. • The trail you leave online. • Good manners on the internet. • Legal right to one's own work. • Harmful software like viruses. • Making data unreadable to others. • Keeping personal information safe. • A secret word for logging in safely. • Illegally accessing computer systems. • Staying safe while using the internet. • ...
Cyber ethics 2025-06-06
Across
- a type of protecting software
- the practice of making the mail server full by sending bulk mails
- a security program which can be accessed by numerical
- unwanted bulk emails that come from unknown source.
- using the language and thought of another person as ones original work
- stealing and misusing someone's personal information
- any software being copied or distributed illegally
- being aware of the ethical practices
Down
- a system created for security of our computer by fingerprints
- access to some others resource illegally
- obtaining money from depositors by claiming to be an authorized bank
- crimes happening in network or social site
- damages our hard ware ans software
- misleading victim by sending an email
- protects our computer from harmful invaders
15 Clues: a type of protecting software • damages our hard ware ans software • being aware of the ethical practices • misleading victim by sending an email • access to some others resource illegally • crimes happening in network or social site • protects our computer from harmful invaders • any software being copied or distributed illegally • ...
La Tecnología y El Coche 2022-02-14
information security 2024-10-03
Across
- A framework for reacting to security breaches
- ,Person ensuring security policies are integrated with employee lifecycle
- ,Type of authentication requiring multiple credentials
- , Sensitive data classification requiring protection
- ,Person responsible for overall security in an organization
- , Software to detect and remove malicious software
- ,Network security system that monitors and controls traffic
- ,Subject Matter Expert, responsible for expertise in specific areas
Down
- ,A method to store data to protect against loss
- ,Process to manage third-party risk
- ,Ensuring that information is accurate and unaltered
- ,Oversight structure of an information security program
- ,Meeting regulatory requirements and internal policies
- , Policy ensuring access is based on least privilege
- ,Process of identifying and evaluating potential threats
- , Malicious software that demands payment
16 Clues: ,Process to manage third-party risk • , Malicious software that demands payment • A framework for reacting to security breaches • ,A method to store data to protect against loss • ,Ensuring that information is accurate and unaltered • , Policy ensuring access is based on least privilege • ,Meeting regulatory requirements and internal policies • ...
Computing word bank 2023-08-28
Across
- kokoonpano
- laitteisto
- what is an "app" a shortened version of
- for example a computer, smartphone, server
- palvelin
- do the math
- kopioida
- downloading the latest version of a software
- tehtävä
- sulauttaa
- for example Chrome or Firefox
- tallentaa, varastoida
Down
- varmuuskopio, varmuuskopioida
- CPU
- luoda
- 01101110 01101111
- liittää
- palomuuri
- protects your personal data from cyber attacks
- portti
- used to type
- kieltää
22 Clues: CPU • luoda • portti • liittää • tehtävä • kieltää • palvelin • kopioida • palomuuri • sulauttaa • kokoonpano • laitteisto • do the math • used to type • 01101110 01101111 • tallentaa, varastoida • varmuuskopio, varmuuskopioida • for example Chrome or Firefox • what is an "app" a shortened version of • for example a computer, smartphone, server • downloading the latest version of a software • ...
The Internet and Social Media: 2025-02-24
Across
- – Video diary blog
- – Secures accounts
- – Find information
- – Exit an account
- – Respond to posts
- – Opens websites
- – Online user page
- – Small digital icon
- – Short Twitter post
Down
- – Track updates online
- – Share content online
- – Live video broadcast
- – Access an account
- – #Trending symbol
- – Viral online joke
- – Related to Internet
- – Online data storage
- – Connects web pages
- – Unwanted online messages
- – Click to approve
20 Clues: – Opens websites • – Exit an account • – Video diary blog • – Secures accounts • – Find information • – #Trending symbol • – Respond to posts • – Online user page • – Click to approve • – Access an account • – Viral online joke • – Connects web pages • – Small digital icon • – Short Twitter post • – Related to Internet • – Online data storage • – Track updates online • – Share content online • ...
Network & Security 2021-01-14
Across
- uniquely identifies the computer’s NIC.
- number of categories/classes of IP addresses
- Each node is connected to a central component
- “Something for something”
- what cable is mainly for cable television and internet access
- Security measure widely-accepted that should be guaranteed in every secure system.
- Each node is connected in a circular data path
- A group of computers and network devices connected together that is limited to a geographical area
- Network not restricted to a geographical location
Down
- A mixture of the other network topologies
- Each node is connected to each other
- Type of transfer that is used for a sender to send to all nodes on a network
- file, application, printer, and proxy are types of
- A set of rules or protocol for transmitting data between devices
- All nodes are connected to a single cable
- Device that routes data from one network to another based on their IP address
- A group of computers and other devices connected in some way so that they can exchange data.
17 Clues: “Something for something” • Each node is connected to each other • uniquely identifies the computer’s NIC. • A mixture of the other network topologies • All nodes are connected to a single cable • number of categories/classes of IP addresses • Each node is connected to a central component • Each node is connected in a circular data path • ...
Aviation Security 2021-09-05
Across
- Location of security document folder.
- A form completed by the PIC only outstation.
- 4D's technique:_______ ,distract, dilute and deny.
- Stages of a hijack:___________, custodial and resolution.
- Last door on the RHS
- "Commander I must come to the flight deck immediately"
- The area of the PAX cabin immediately in front on the Flight Crew compartment, including galleys and lavatories.
- Three in premium cabin and Eight in economy cabin as per area of responsibility.
Down
- A condition of the Flight Crew Compartment door being closed and locked securely, with no traffic permitted in or out of the flight deck.
- Whose authorization is required to restrain a PAX?
- Repetitive smoking offence
- Four potentially disruptive Passengers can be carried on a flight.
- Form to be filled out when an item is found on completion of post disembarkation lost and found.
- At which convention was the commander's power acknowledged?
- Alcohol must never be served to PAX less than ___________ years of age.
- Attempted breach or actual breach of the flight crew compartment in flight.
- De-escalation technique
17 Clues: Last door on the RHS • De-escalation technique • Repetitive smoking offence • Location of security document folder. • A form completed by the PIC only outstation. • Whose authorization is required to restrain a PAX? • 4D's technique:_______ ,distract, dilute and deny. • "Commander I must come to the flight deck immediately" • ...
Salesforce Security 2021-07-04
Across
- Connects two objects.
- Time Zone in which all date / timestamps in Salesforce are stored.
- Every custom object and custom field ends with this.
- This is used to model real-life or systemic concepts in Salesforce.
- A Salesforce standard object can be extended using this.
- A user in Salesforce may or may not have this.
- A standard object representing a potential customer.
- A user may have zero or more of this.
- Every user in Salesforce needs to have this.
- Defines the minimum level of record access for all objects (acronym).
Down
- Switch between apps using this.
- A standard object representing a person working at a customer.
- A standard object representing a partner or a customer.
- The place where you go to administer Salesforce and its various settings.
- Every object in Salesforce has this field.
- Shows list of object records
- A collection of tabs.
17 Clues: Connects two objects. • A collection of tabs. • Shows list of object records • Switch between apps using this. • A user may have zero or more of this. • Every object in Salesforce has this field. • Every user in Salesforce needs to have this. • A user in Salesforce may or may not have this. • Every custom object and custom field ends with this. • ...
National security 2023-10-28
Across
- the act of looking for or trying to get something; an effort to secure or attain
- the state of continuing to live or exist, often despite difficulty or danger
- the reduction of something by a large amount so that there is not enough left
- the activities involved in protecting a country, building or person against attack, danger, etc.
- a person who has been attacked, injured or killed as the result of a crime, a disease, an accident, etc.
- behaviour or attitudes that show high moral standards
- the situation in which people have work
- a lack of food during a long period of time in a region
- necessary or essential in order for something to succeed or exist
Down
- the use of natural products and energy in a way that does not harm the environment
- a person or an organization that is involved in politics, society, etc. in some way because of their actions
- the state of one who lacks a usual or socially acceptable amount of money or material possessions
- of or inside a particular country; not foreign or international
- the history, traditions, buildings and objects that a country or society has had for many years and that are considered an important part of its character
- a poor condition of health caused by a lack of food or a lack of the right type of food
- the state of being a country with freedom to govern itself
- unfair, cruel or violent treatment of somebody
17 Clues: the situation in which people have work • unfair, cruel or violent treatment of somebody • behaviour or attitudes that show high moral standards • a lack of food during a long period of time in a region • the state of being a country with freedom to govern itself • of or inside a particular country; not foreign or international • ...
Dasabase security 2024-10-15
Across
- What are the 3 Principles of Information Security? (second one)
- This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- What are the 3 Principles of Information Security? (third one)
- An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
Down
- A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- Software used to protect against malicious software
- Malicious software designed to harm or exploit any programmable device
- A type of cyberattack where malicious code is inserted into SQL queries to access data.
- Malicious software that can corrupt or steal data stored in a database.
- Divides left hand operand by right hand operand and returns remainder
- The process of controlling who has access to specific data in a database.
- The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- The primary language used to create web pages
- Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
17 Clues: The primary language used to create web pages • Software used to protect against malicious software • What are the 3 Principles of Information Security? (third one) • What are the 3 Principles of Information Security? (second one) • Divides left hand operand by right hand operand and returns remainder • ...
Ensimmäinen tehtävä 2022-11-24
12 Clues: Del Neigh • Anti-hero • Essin alaa • Jupun alaa • Virvan alaa • Riinan alaa • Auttaa ummetukseen • Tarun palkanmaksaja • Mitä tänään tehdään? • Tarde ulkomaalaisille • Tappio ja melkein Essi • Täälläkin olemme syöneet
2025 Cybersecurity Awareness Month 2025-09-24
Across
- Software that displays unwanted advertisements.
- A vulnerability unknown to those who should mitigate it.
- Network security system that monitors and controls incoming and outgoing traffic.
- System that aggregates and analyzes security data.
- Software update that fixes vulnerabilities.
- Malware disguised as legitimate software.
- Symmetric encryption standard used worldwide.
- Unauthorized transmission of sensitive information.
- Isolated environment for testing suspicious code.
- Framework for managing digital identities.
- Routine practices to maintain security health.
- Simulated attack to evaluate system security.
- Security broker between users and cloud services.
- Security method requiring multiple forms of verification.
- Software that secretly gathers user information.
- Protocol for secure communication over networks.
- Attack method that tries every possible password combination.
Down
- Psychological manipulation to trick users into giving up confidential info.
- General term for malicious software.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- Malware that encrypts data and demands payment for its release.
- Prolonged and targeted cyberattack.
- Creates a secure connection over the internet.
- Malware that hides its presence from detection.
- Process of converting data into a coded format.
- Controls access to privileged accounts.
- Network of infected devices controlled remotely.
- Malware that replicates itself to spread.
- Hidden method of bypassing normal authentication.
- Converts data into a fixed-size string.
30 Clues: Prolonged and targeted cyberattack. • General term for malicious software. • Controls access to privileged accounts. • Converts data into a fixed-size string. • Malware disguised as legitimate software. • Malware that replicates itself to spread. • Framework for managing digital identities. • Software update that fixes vulnerabilities. • ...
Americas acronyms 2024-10-24
Across
- You can mail a potato through this without a package
- represents government in Supreme Court
- space
- Future farmers association
- Established the internet time service
- word combination of America and track
- Nicknamed Ginnie Mae
- nickname Freddie Mac
- Responsible for national security
- Provides intelligence for the president and cabinet
Down
- Homeland security
- science based federal agency
- Biggest customer is amazon
- headquarters in Lyon France
- nickmaned Fannie Mae
- Federal housing administration
- Transportation security
- National labor relations board
- Department of health and education
- Stabilized banking system
20 Clues: space • Homeland security • nickmaned Fannie Mae • Nicknamed Ginnie Mae • nickname Freddie Mac • Transportation security • Stabilized banking system • Biggest customer is amazon • Future farmers association • headquarters in Lyon France • science based federal agency • Federal housing administration • National labor relations board • Responsible for national security • ...
cyber 2022-02-10
Across
- the port that listens to queries/connections
- stored data
- point to point tunneling protocol
- protects data flow between peers
Down
- extension of pptp
- filter prevents a local computer from using a URL/IP to access the local server.
- communicates to sites on your behalf
- allows a single transmission to reach multiple people
- protects local network from internet
9 Clues: stored data • extension of pptp • protects data flow between peers • point to point tunneling protocol • communicates to sites on your behalf • protects local network from internet • the port that listens to queries/connections • allows a single transmission to reach multiple people • filter prevents a local computer from using a URL/IP to access the local server.
The Tantra Universe 2018-02-03
Across
- he wants Anu village to stay hidden
- a child with a surname of Esha
- he said that the jinans hate the mandarans
- NPC with Reaka surname
- she was once a religion leader
- a security soldier that guards temple
- Founder of exile town
- one of the char responsible of sacrifices to the god of fire Agni
- Surname is Uhal
- soldier from the army of Amar
- A travelling deva that sells medicine
- a playful boy in Anu village
- a former solider, now a keeper
Down
- An elite soldier because he is strong
- a new security Soldier
- a security solider that guards coloseum
- a zombie like NPC standing beside a dungeon portal
- godless disciple of Zangzu
- a town treasurer
- Security Soldier
- a ghost girl
- clothes maker
- family came from the fisherman of the Naga clan
- a security solider that guards another temple
- the chiefguard
- an alcoholic character
- Daughter of the great sculptor Bishubakarman.
- Running boy
- a weapon maker from the yaksa clan
29 Clues: Running boy • a ghost girl • clothes maker • the chiefguard • Surname is Uhal • a town treasurer • Security Soldier • Founder of exile town • a new security Soldier • NPC with Reaka surname • an alcoholic character • godless disciple of Zangzu • a playful boy in Anu village • soldier from the army of Amar • a child with a surname of Esha • she was once a religion leader • ...
CX 2019-12-11
Across
- A security feature also a top CS school.
- Erm, this acronym was coined by Gartner. [9][8][1][3]
- This hound of Hades is also a computer network guardian
- When I am not busy working as actors' surname I make users privileged
- Security products secure their stuff in this box
- Alice shares her key with Bob this way
- Every year DB security trains this SWAT team
- I am withholding the clue for this one.
- I feel lucky... and lucky and lucky!
- New Zealand and Time Zone are looking at each other
Down
- Solve this anagram - Costco lancers. 2 words.
- The mo'ment' of truth when you run this free security tool
- Secure your cloud data for free!
- This cannot be Job Number >= 2
- Sizeof(DB sec Org) - 100. Universal answer to everything
- Answer lies in the process of understanding the cipher
- Apparently, I am optional.
- The CAPTCHA strikes back
- A type of key which is also an Oxymoron
- I look like a treat but that's my trick.
20 Clues: The CAPTCHA strikes back • Apparently, I am optional. • This cannot be Job Number >= 2 • Secure your cloud data for free! • I feel lucky... and lucky and lucky! • Alice shares her key with Bob this way • A type of key which is also an Oxymoron • I am withholding the clue for this one. • A security feature also a top CS school. • I look like a treat but that's my trick. • ...
cyber 2022-02-10
Across
- the port that listens to queries/connections
- stored data
- point to point tunneling protocol
- protects data flow between peers
Down
- extension of pptp
- filter prevents a local computer from using a URL/IP to access the local server.
- communicates to sites on your behalf
- allows a single transmission to reach multiple people
- protects local network from internet
9 Clues: stored data • extension of pptp • protects data flow between peers • point to point tunneling protocol • communicates to sites on your behalf • protects local network from internet • the port that listens to queries/connections • allows a single transmission to reach multiple people • filter prevents a local computer from using a URL/IP to access the local server.
cyber 2022-02-10
Across
- the port that listens to queries/connections
- stored data
- point to point tunneling protocol
- protects data flow between peers
Down
- extension of pptp
- filter prevents a local computer from using a URL/IP to access the local server.
- communicates to sites on your behalf
- allows a single transmission to reach multiple people
- protects local network from internet
9 Clues: stored data • extension of pptp • protects data flow between peers • point to point tunneling protocol • communicates to sites on your behalf • protects local network from internet • the port that listens to queries/connections • allows a single transmission to reach multiple people • filter prevents a local computer from using a URL/IP to access the local server.
Cyber Security Tips: Avoid Email Scams 2022-08-19
Across
- An email may be phishing if it asks you to do something with _______ to avoid restrictions or consequences
- Make sure to pay close attention to the sender's ____ ______.
- A fake email could use a _______ yet clever domain, like @ssrnc instead of @ssmc
- Pay attention to email subject lines containing this label
- Do not open these. Especially if the email is from an unknown source
- If an email contains a link, do this to see the URL instead of clicking on it to see if it seems suspicious
Down
- Forward the email to ______@ssmc.ae if you suspect it is phishing or call 2424
- Look closely at the _______ to see if it is generic or unprofessional
- Use caution when receiving an ________ email from any external party
- fraudulent practice of sending emails pretending to be from reputable companies in an attempt to get individuals to reveal personal information
10 Clues: Pay attention to email subject lines containing this label • Make sure to pay close attention to the sender's ____ ______. • Use caution when receiving an ________ email from any external party • Do not open these. Especially if the email is from an unknown source • Look closely at the _______ to see if it is generic or unprofessional • ...
Cyber security and Ethics Cross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Unsolicited messages sent in bulk by email
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Non-GT Cyber Security Fun Quiz 2025-09-23
Across
- A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
- _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
- The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
- A program designed to spread from one computer to another is called a _ _ _ _ _.
- The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
- The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
- _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
- The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
- A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
- A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.
10 Clues: The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _. • A program designed to spread from one computer to another is called a _ _ _ _ _. • A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet. • A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information. • ...
Thanksgiving in Spanish 2022-11-23
#PreventionStartsWithUs Crossword Puzzle 2023-06-28
Across
- What is the practice of disguising information to make it unreadable by unauthorized individuals?
- What is the most popular IDE among automation developers?
- What operating system was Rpm Arming designed for?
- A virus that encrypts your data and you have to pay to receive the encryption key.
- What is the term for a type of cyber attack that targets vulnerabilities in web applications, often through injecting malicious code?
Down
- This type of malware uses a combination of encryption, evasion techniques, and anti-analysis mechanisms to avoid detection and analysis.
- What is the practice of manipulating or falsifying data to deceive or mislead computer systems or users?
- Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cyber crime.
- A former name for DPA
- What is the term for a type of cyber attack that involves sending an overwhelming amount of traffic to a target system to disrupt its normal functioning?
10 Clues: A former name for DPA • What operating system was Rpm Arming designed for? • What is the most popular IDE among automation developers? • A virus that encrypts your data and you have to pay to receive the encryption key. • What is the practice of disguising information to make it unreadable by unauthorized individuals? • ...
credit transactions 2025-05-29
Across
- You buy with this and pay it off at the end of the month
- a written contract between the debtor and creditor
- creditor has possession of the collateral
- brief, written notice of the existence of a security interest in the identified property
- the one who is owed
- what you put up incase you cant pay
- legal method or device creating a security interest
- the point at which a security interest becomes legally effective against the ownership
- exists when the security interest is superior to all other claims in the collateral
- the one who owes money, services.
Down
- filing by a creditor releasing a security interest in collateral
- filing is not required to protect a seller’s security interest in consumer goods against other creditors of the buyer
- when you borrow money you are in ______
- classification of collateral that represents value in money, goods, or promises
- legal presumption that everyone has knowledge of facts on public file
- the right to reclaim property if payment isnt paid
- interest in or claim against specified property
17 Clues: the one who is owed • the one who owes money, services. • what you put up incase you cant pay • when you borrow money you are in ______ • creditor has possession of the collateral • interest in or claim against specified property • a written contract between the debtor and creditor • the right to reclaim property if payment isnt paid • ...
DNSnetworks 2022-11-09
Across
- Technology that keeps malicious actors out
- Type of malware used to spy on you and your computer activities.
- A type of scam where a malicious actor impersonates a business or organization.
- Bad software that is used to infect a computer or system.
- Process of identifying and verifying a user’s identity.
- Combo of the words “robot” and “network”. A network of infected computers that are being used to create security breaches.
Down
- A sort of malware that locks you out of your system in exchange for a ransom.
- A type of malware that does harm to your files and then gets passed on to other computers and systems.
- A cyber attack on a computer system.
- Codes that protect your information from malicious hackers. It needs to be deciphered in order to read or view it.
- Someone who can act on your systems and server's vulnerabilities. They can be either “white hat” or “Black-hat.” White-hat means they are trying to improve your systems. Black-hat means they have malicious intent.
11 Clues: A cyber attack on a computer system. • Technology that keeps malicious actors out • Process of identifying and verifying a user’s identity. • Bad software that is used to infect a computer or system. • Type of malware used to spy on you and your computer activities. • A sort of malware that locks you out of your system in exchange for a ransom. • ...
Types of Cyber Threats & Malwares Crossword Puzzle 2025-03-13
Across
- A method of hiding malicious code in legitimate files.
- A software that secretly gathers user information without consent.
- A program that allows unauthorized remote access.
- A network of infected devices controlled remotely by hackers
- A program that appears legitimate but contains harmful code.
Down
- A software that secretly records keystrokes.
- A malicious software that locks files and demands a ransom.
- A type of malware that spreads by copying itself.
- A malware designed to hide its presence and maintain privileged access.
- A type of cyber attack where fake emails trick users.
- A cyber attack that floods a network to disrupt services.
11 Clues: A software that secretly records keystrokes. • A type of malware that spreads by copying itself. • A program that allows unauthorized remote access. • A type of cyber attack where fake emails trick users. • A method of hiding malicious code in legitimate files. • A cyber attack that floods a network to disrupt services. • ...
Computer Networks 2023-05-18
Across
- A cyber attack that makes a computer and its resources unavailable.
- Only authorized persons can modify the data and information on the computer.
- A malicious piece of computer programs that pretends to be legitimate.
- A device that connects your computer to the internet
- A cyber attack where someone pretends to be someone else to steal information.
- A device used to connect multiple computer network devices.
- A device that connects different computer networks together
- Persons can access the computer whenever they want and from any location.
Down
- A malicious piece of computer software.
- The transmission of data between computers
- Only authorized persons have access to sensitive data and information.
- A Company that provides internet.
- A type of virus that spreads through email.
- A device that boost a wireless signal.
- A malicious piece of software that steals information with your knowledge.
15 Clues: A Company that provides internet. • A device that boost a wireless signal. • A malicious piece of computer software. • The transmission of data between computers • A type of virus that spreads through email. • A device that connects your computer to the internet • A device used to connect multiple computer network devices. • ...
Cybercrime 2024-04-15
Across
- To convert data into a code to prevent unauthorized access
- To obtain something, typically money, through force or threats
- Measures implemented to protect against cyber threats
- A score assigned to an individual indicating their creditworthiness.
- Not asked for
- Individuals or entities who suffer harm or loss due to cybercrime.
Down
- Software that secretly gathers information about a user's activities without their knowledge.
- an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- A person who uses computers to gain unauthorized access to data
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- A fraudulent scheme performed by an individual or group.
- Deceitful or dishonest behavior for personal gain.
- An action that harms others or is against the law
- Money demanded for the release of captive data or system access
- An organized collection of data stored and accessed electronically
15 Clues: Not asked for • An action that harms others or is against the law • Deceitful or dishonest behavior for personal gain. • Measures implemented to protect against cyber threats • A fraudulent scheme performed by an individual or group. • To convert data into a code to prevent unauthorized access • To obtain something, typically money, through force or threats • ...
Security 2023-12-17
Across
- Suspicious mail with an URL.
- Someone who tricks or lies to get something valuable in a dishonest way.
- An unwanted messages or ads you get, usually in your email or messages, trying to sell you things or trick you.
- Block access to your personal data unless a ransom is paid.
- A bad person who might take away your info!
- A bad software that can steal information, cause problems, or let others control your computer without permission.
Down
- a digital barrier that helps protect your computer or network from unauthorized access and potential threats from the internet
- Pretending another person over call and asks for money.
- A new MDR platform installed in your device which do not let you download or open suspicious applicatios.
- GP installed Data Leakage Protection (DLP) to prevent you from using ________.
10 Clues: Suspicious mail with an URL. • A bad person who might take away your info! • Pretending another person over call and asks for money. • Block access to your personal data unless a ransom is paid. • Someone who tricks or lies to get something valuable in a dishonest way. • GP installed Data Leakage Protection (DLP) to prevent you from using ________. • ...
Security 2023-08-23
Across
- tightly closed and locked
- practicing and instilling confidence in school by preparing for emergency
- control, self-discipline
Down
- make sure the rules are followed
- to empty
- danger
- limited to only certain people, not for the general public
- behavior among students that is intended to cause emotional and/or physical harm.
- someone who is actively attempting to hurt and/or kill people by using guns.
- The Family Educational Rights and Privacy AcT
10 Clues: danger • to empty • control, self-discipline • tightly closed and locked • make sure the rules are followed • The Family Educational Rights and Privacy AcT • limited to only certain people, not for the general public • practicing and instilling confidence in school by preparing for emergency • someone who is actively attempting to hurt and/or kill people by using guns. • ...
Security 2025-03-17
Across
- A scam where attackers pretend to be a trusted entity to steal information.
- Malicious software designed to gather user information without consent.
- A malicious program designed to damage or destroy data.
- A systematic approach to solving computer problems.
Down
- A duplicate copy of important files for safeguarding against data loss.
- The process of converting data into an unreadable form for security.
- A string of characters used to secure user accounts.
- A secure connection that allows remote access to a private network.
- A security barrier that filters and controls network traffic.
- A program that appears harmless but allows hackers remote access.
10 Clues: A systematic approach to solving computer problems. • A string of characters used to secure user accounts. • A malicious program designed to damage or destroy data. • A security barrier that filters and controls network traffic. • A program that appears harmless but allows hackers remote access. • ...
Security 2025-04-25
Across
- Oberbegriff für schädliche Software
- Psychologische Manipulation zur Informationsgewinnung
- Kryptografische Prüfziffer von Daten
- Täuschungsmethode, um an persönliche Daten zu gelangen
- Angriff auf eine bisher unbekannte Sicherheitslücke
Down
- Simulierter Angriff zur Sicherheitsüberprüfung
- Erpresst Nutzer durch Verschlüsselung ihrer Daten
- Authentifizierungsmethode mit zusätzlicher Sicherheit
- Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
- Schützt Netzwerke vor unautorisierten Zugriffen
10 Clues: Oberbegriff für schädliche Software • Kryptografische Prüfziffer von Daten • Simulierter Angriff zur Sicherheitsüberprüfung • Schützt Netzwerke vor unautorisierten Zugriffen • Erpresst Nutzer durch Verschlüsselung ihrer Daten • Angriff auf eine bisher unbekannte Sicherheitslücke • Authentifizierungsmethode mit zusätzlicher Sicherheit • ...
SN33003FP Chapter 4 2024-09-12
Across
- The art of making the message confusing, ambiguous, or harder to understand
- A substitute control used when the ideal option is not possible
- Conceals data (the message) in another file such as a graphic, audio, or other text file
- Keeps track of what you do, including what you access, the amount of time you access resources, and any changes made
- Uses the same pre-shared (public) key to encrypt and decrypt data
- The science of making and breaking secret codes
- Process of claiming your identity within a system
- Secures data by replacing sensitive information with a non-sensitive version
- Identifies the different types of unauthorized activity
- Combines plaintext with a secret key to create ciphertext (encrypted text)
- Letters are replaced
- Actual barriers deployed to prevent unauthorized users from gaining physical access
- Determines which resources you can access, and the operations that you can perform
- Discourages individuals from doing the wrong thing
- Counteracts something that is undesirable and restores systems to normal after unauthorized activity occurs
- Verifies your identity with what you know, what you have, or who you are
- Involves identification, authentication, authorization, and accountability
Down
- Uses one key to encrypt data and a different key to decrypt data
- Restores resources, functions, and capabilities after a violation of a security policy
- Policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access
- Stops unwanted or unauthorized activity from happening
- Uses at least two methods of verification
- A way to store and transmit data so only the intended recipient can read or process it
- Letters are rearranged
24 Clues: Letters are replaced • Letters are rearranged • Uses at least two methods of verification • The science of making and breaking secret codes • Process of claiming your identity within a system • Discourages individuals from doing the wrong thing • Stops unwanted or unauthorized activity from happening • Identifies the different types of unauthorized activity • ...
CYBER FORENSICS 2016-08-25
Across
- A Disk Editing Tool
- random memory dumps in hidden storage areas
- Customized setting for MS-DOS
- Road map to data on a disk
- covertly capture sensitive information, passwords, and network logons
- A system startup task
- Section of a track , 512 bytes
- Disk Encryption Mechanism
Down
- Theft Recovery Software for Laptops and PCs
- Identify potential hazards in Location
- Character code used by NTFS
- Encrypted files in NTFS
- Type of Military Computer Forensic Technology
- A group working on digital evidence
- Stores time and date related information in a PC
15 Clues: A Disk Editing Tool • A system startup task • Encrypted files in NTFS • Disk Encryption Mechanism • Road map to data on a disk • Character code used by NTFS • Customized setting for MS-DOS • Section of a track , 512 bytes • A group working on digital evidence • Identify potential hazards in Location • Theft Recovery Software for Laptops and PCs • ...
Cyber Bullying 2013-05-20
Across
- a website
- denial of access
- eletronic universe made for internet
- a person being hurt
- abuse from another individual
- someone who follows and finds out your information
- two or more computers that are connected
- sending angry,rude,or obscene messages)
Down
- when a person dresses up as another
- suicide (cyber bullying victimization)
- intermediary diguises
- abusive comments
- a false business scheme
- done to provoke or inflame others
- unisolated eletronic mail
15 Clues: a website • denial of access • abusive comments • a person being hurt • intermediary diguises • a false business scheme • unisolated eletronic mail • abuse from another individual • done to provoke or inflame others • when a person dresses up as another • eletronic universe made for internet • suicide (cyber bullying victimization) • sending angry,rude,or obscene messages) • ...
Cyber Safety 2015-01-27
15 Clues: fails • adrese • parole • saņemt • izdzēst • e-pasts • izmantot • saglabāt • pielikums • tērzētava • tiešsaiste • svešinieks • sarakstīties • lejupielādēt • segvārds,iesauka
Cyber-Mobbing 2015-01-18
Across
- Allgemeiner Begriff für terrorisieren und Beleidigungen per Nachrichten über SMS, E-Mail oder Pinnwandeinträgen.
- Aggressive Art von Cyberbullying, oft aber anonym oder unter falschem Namen.
- Im Juristendeutsch den Bully zu stoppen.
- Vorgang betätigen damit man im Internet nicht von einer Person belästigt wird.
- Anderes Synonyme für Unterstellung
- Bulling-Opfer wird zu irgendetwas gezwungen und deshalb steht das Opfer unter...
- Was passiert wenn andere unwahre Behauptungen über einen äußern?
- Eine Englische Bezeichnung von einer Person die andere absichtlich quält.
Down
- In drastischen Fällen kann man bei der Polizei... erstatten.
- Strafrechtlich wird das unter Druck gesetzt auch... genannt.
- Direkte Reaktion des Opfers mitkriegt.
- Begriff für Veröffentlichung von intimen Informationen des Opfers z.b private Geschichten oder Geheimnisse über das Internet verbreiten.
- Durch Drohungen oder mit Gewalt unter Druck setzen und zu etwas zwingen.
- Was sollte man im direkten Umfeld suchen wenn man in solch einer Lage ist?
- Wo spielt sich meist Cyber-Mobbing ab? Im...
15 Clues: Anderes Synonyme für Unterstellung • Direkte Reaktion des Opfers mitkriegt. • Im Juristendeutsch den Bully zu stoppen. • Wo spielt sich meist Cyber-Mobbing ab? Im... • In drastischen Fällen kann man bei der Polizei... erstatten. • Strafrechtlich wird das unter Druck gesetzt auch... genannt. • Was passiert wenn andere unwahre Behauptungen über einen äußern? • ...
Cyber Crimes 2017-01-25
Across
- restricts access to a computer
- infect other programs
- hacker who stops crime
- floods the bandwidth
- deceptively labeled program
- illegal hacker
- disguising as a trustworthy entity
Down
- gathers inforamtion about a person
- copies itself
- Redirects users to false websites
- offers an opportunity
- designed to infiltrate
- illegal copying of programs
- online harassment
- gaining unauthorized access
15 Clues: copies itself • illegal hacker • online harassment • floods the bandwidth • offers an opportunity • infect other programs • designed to infiltrate • hacker who stops crime • illegal copying of programs • deceptively labeled program • gaining unauthorized access • restricts access to a computer • Redirects users to false websites • gathers inforamtion about a person • ...
Cyber School 2024-08-20
15 Clues: час • вместе • ученики • километры • далеко от • онлайн школа • вставать рано • спортивный день • разговаривать с • школьные задания • помогать на ферме • заниматься, учиться • встречаться каждый год • по интернету / в интернете • отправлять по электронной почте
Cyber Italia 2024-11-30
15 Clues: net • hoax • cash • degree • so-called • aftertaste • reasonable • incitement • to consider • to hope for • to vent, to release • to push, to encourage • appropriate, suitable • to distribute, to supply • to improve, to make progress
Cyber Ethics 2025-06-14
Across
- REFERS TO UNWANTED BULK EMAILS THAT COME FROM UNKNOWN SOURCES
- A RIGHT RELATED TO NEW INVENTIONS
- ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- INFORMATION AND COMMUNICATION TECHNOLOGY
- CRIMINAL PRACTICE OF USING SOCIAL INFLUENCE OVER THE TELEPHONE
- ACT OF SENDING AN EMAIL TO A USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
- WHEN A SINGLE LICENSED COPY OF A SOFTWARE IS LOADED INTO MANY COMPUTERS CONTRARY TO THE LICENCE’S TERMS
- REFERS TO BEING AWARE OF THE ETHICAL PRACTICES AND BEHAVING RESPONSIBLY WHILE USING THE INTERNET
Down
- A SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER
- THE SIMPLEST WAY TO PREVENT PLAGIARISM
- THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE
- SURF THE INTERNET UNDER SUPERVISION OF PARENTS
- LEGAL RIGHT GRANTED BY LAW TO THE CREATOR FOR HIS ORIGINAL WORK
- A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER
15 Clues: A RIGHT RELATED TO NEW INVENTIONS • THE SIMPLEST WAY TO PREVENT PLAGIARISM • INFORMATION AND COMMUNICATION TECHNOLOGY • REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER • SURF THE INTERNET UNDER SUPERVISION OF PARENTS • THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE • A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER • ...
Cyber Ethics 2025-06-14
Across
- REFERS TO UNWANTED BULK EMAILS THAT COME FROM UNKNOWN SOURCES
- A RIGHT RELATED TO NEW INVENTIONS
- ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- INFORMATION AND COMMUNICATION TECHNOLOGY
- CRIMINAL PRACTICE OF USING SOCIAL INFLUENCE OVER THE TELEPHONE
- ACT OF SENDING AN EMAIL TO A USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
- WHEN A SINGLE LICENSED COPY OF A SOFTWARE IS LOADED INTO MANY COMPUTERS CONTRARY TO THE LICENCE’S TERMS
- REFERS TO BEING AWARE OF THE ETHICAL PRACTICES AND BEHAVING RESPONSIBLY WHILE USING THE INTERNET
Down
- A SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER
- THE SIMPLEST WAY TO PREVENT PLAGIARISM
- THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE
- SURF THE INTERNET UNDER SUPERVISION OF PARENTS
- LEGAL RIGHT GRANTED BY LAW TO THE CREATOR FOR HIS ORIGINAL WORK
- A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER
15 Clues: A RIGHT RELATED TO NEW INVENTIONS • THE SIMPLEST WAY TO PREVENT PLAGIARISM • INFORMATION AND COMMUNICATION TECHNOLOGY • REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER • SURF THE INTERNET UNDER SUPERVISION OF PARENTS • THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE • A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER • ...
Cyber Ethics 2025-06-15
Across
- are technical people who are experts in breaking into systems to steal important data, password,etc
- it is the process of transforming data into unreadable code.
- it is a program that disrupts the normal functioning of a computer.
- it refers to an illegal intrusion into a computer system or network.
- it is a security system that prevents unauthorised people from accessing your system and network.
- it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- it is an act of harming a person through information technology in a deliberate manner.
- it refers to criminal activities that involve the use of computers,networks and etc.
Down
- it this process the encrypted information convert into a unreadable from.
- it is a criminal practice of using social influence over the telephone system.
- it refers to unwanted bulk emails that come from unknown sources.
- it is An act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
- it is the combination of two words malicious and software.
- it is a malicious technique of tricking a we'd user into clicking something different from what the user perceives he/she is clicking on.
- it is the combination of two terms,'net' and 'ettiquette'.
15 Clues: it is the combination of two words malicious and software. • it is the combination of two terms,'net' and 'ettiquette'. • it is the process of transforming data into unreadable code. • it refers to unwanted bulk emails that come from unknown sources. • it is a program that disrupts the normal functioning of a computer. • ...
cyber ethics 2025-06-12
Across
- are small text files stored on your computer by web browsers when you visit websites.
- it is an act of harming or harassing through information technology in deliberate manner.
- in this type of attack a piece of malicious code is installed on a computer server it misdricts the users to fraudulent website.
- is a secret combination of characters (letters, numbers, and symbols) used to verify your identity.
- refers to a copy of important data stored in an alternative location to ensure recovery in case the original data is lost or corrupted.
- is ay illegal activity done through internet.
- is a type of cybercrime that involves threatening or coercing individuals or organizations to pay money or provide some other response in exchange for stopping an attack or regaining access to their data.
- is used as a form of identification and access control.
- is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
- also known as domain squatting, refers to the practice of registering, trafficking in, or using an Internet domain name with a bad faith intent to profit from the goodwill of a trademark belonging to someone else.
Down
- it is the creation of malicious program to perform harmful task.
- when an attacker harasses a victim through social media platform.
- it is the action of forging a copy or imitation of a document, signature, banknote, or work of art
- is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
- it is an act of sending an email; misleading him to belive that it came from trusted source.
15 Clues: is ay illegal activity done through internet. • is used as a form of identification and access control. • it is the creation of malicious program to perform harmful task. • when an attacker harasses a victim through social media platform. • are small text files stored on your computer by web browsers when you visit websites. • ...
Cyber Ethics 2025-06-07
Across
- Unwanted bulk emails
- You purchase a single liscence copy of a software and load it onto several computers contrary to the liscence's term
- Malicious technique of tricking a web user
- Act of harrasing a person through information tecnology
- An act of sending an email to a user misleading him to belief that it is from a trusted person/organisation
- converts the encrypted information into a readable form
- A program that disrupts the normal functioning of computer
- Illegal intrusion into a computer system
Down
- Act of using or imitating the language or thoughts of another person as one's original work
- Criminal practice of using social influence over the telephone system
- Process of transforming data into an unreadable code
- Protects your brand name and logo
- Refers to being aware of the ethical practices
- A law granted to a creator for his/her original work
- Security system
15 Clues: Security system • Unwanted bulk emails • Protects your brand name and logo • Illegal intrusion into a computer system • Malicious technique of tricking a web user • Refers to being aware of the ethical practices • Process of transforming data into an unreadable code • A law granted to a creator for his/her original work • ...
Cyber Ethics 2025-06-03
Across
- Is a set of procedures moral principle and ethical practices that regulate the use of computer and the internet
- It refer to being aware of the ethical practices and behaving responsibly and appropriately while using the internet
- Is a program or a set of programs that disrupts the normal functioning of a computer
- Is a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on
- Refer to the act of imitating the language and thought of another person and projecting them as one's own original work
- It is an act of harming or harrassing a person through information technology in a deliberate manner
- Is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
Down
- when software is copied and distributed illegally
- Refer to an illegal intrusion into a computer system or network
- Is an impression or information about a person that exists on the internet because of his online activity
- It refer to unwanted bulk email that comes from unknown source
- Is the legal rules and restrictions imposed on online users
- Is the criminal practice of using social influence over the telephone system
- It refers to criminal activities that involves the use of computer networks and the internet connection with the intent to cause harm to individual or their digital devices
- Is the process of transforming data into an unreadable code
15 Clues: when software is copied and distributed illegally • Is the legal rules and restrictions imposed on online users • Is the process of transforming data into an unreadable code • It refer to unwanted bulk email that comes from unknown source • Refer to an illegal intrusion into a computer system or network • ...
Cyber Ethics 2025-05-22
Across
- A legal right granted by law to the creator for his original work
- Protecting personal data
- Copying someone's work
- System protector
- Used to log in
- Online bully
- Good online behavior
- Accessing without permission
Down
- Virus protection program
- Unwanted emails
- Illegal computer expert
- Moral tech rules
- Secretly watching
- Steals personal data
- THE process of transforming data into an unreadable code
15 Clues: Online bully • Used to log in • Unwanted emails • Moral tech rules • System protector • Secretly watching • Steals personal data • Good online behavior • Copying someone's work • Illegal computer expert • Virus protection program • Protecting personal data • Accessing without permission • THE process of transforming data into an unreadable code • ...
Cyber ethics 2025-06-17
Across
- - Treating others politely and kindly online
- - A scam to trick people into giving sensitive information
- - A secret key to access a computer or account
- - Copying someone’s work and presenting it as your own
- News - False information spread through websites or social media
- - Bullying someone through digital devices or platforms
- - Repeatedly sending offensive or threatening messages online
- - A law that protects original works from being used without permission
Down
- - Permission to use or share someone’s personal information
- - Moral rules about right and wrong behavior
- Footprint - The trail of data left behind when using the internet
- - Following what is right and wrong on the internet
- - Gaining unauthorized access to data or devices
- - The right to keep personal information secure and private
- - Pretending to be someone else online
15 Clues: - Pretending to be someone else online • - Moral rules about right and wrong behavior • - Treating others politely and kindly online • - A secret key to access a computer or account • - Gaining unauthorized access to data or devices • - Following what is right and wrong on the internet • - Copying someone’s work and presenting it as your own • ...
Cyber Ethics 2025-06-17
Across
- Faking the source of data or communication.
- Converting data into a form that is unreadable to unauthorized user
- The illegal copying or distribution of copyrighted software
- Software designed to damage or disable computers and computer systems.
- Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, used in commerce.
- The use of electronic communication to bully or harass someone.
- Unsolicited and unwanted emails or messages
- The act of stealing someone's personal information and using it to impersonate them.
Down
- An acronym that stands for "Terms of Service
- Measures taken to protect computer systems and data from unauthorized access or damage.
- The right of individuals to control the collection and use of their personal information.
- The legal right that grants the creator of an original work exclusive control over its use and distribution.
- Unauthorized access to a computer or network
- The doctrine that allows limited use of copyrighted material without permission for purposes such as criticism, commentary, or education.
- An attempt to trick someone into revealing personal information, such as passwords or credit card details
- personal data and information are kept secure and protected from unauthorized access or misuse.
16 Clues: Faking the source of data or communication. • Unsolicited and unwanted emails or messages • An acronym that stands for "Terms of Service • Unauthorized access to a computer or network • The illegal copying or distribution of copyrighted software • The use of electronic communication to bully or harass someone. • ...
Cyber Safety 2024-02-29
Across
- A free social networking site where users broadcast short posts known as tweets.
- A mobile app that allows users to send and receive "self-destructing" photos and videos
- App used to send information to each others
- Websites and applications that enable users to create and share content or to participate in social networking.
- Created in order for children and their parents to quickly and easily report suspected incidents of child sexual exploitation that occur on the Internet
- A free, online photo-sharing application and social network platform
Down
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
- Secret word or phrase that must be used to gain admission to something
- The condition of being protected from or unlikely to cause danger, risk, or injury.
- Use of technology to harass, threaten, embarrass, or target another person
- Virtual private network
- A type of malware that replicate themselves and spread throughout the entire system
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- A person who uses computers to gain unauthorized access to data.
15 Clues: Virtual private network • App used to send information to each others • A person who uses computers to gain unauthorized access to data. • A free, online photo-sharing application and social network platform • Secret word or phrase that must be used to gain admission to something • Use of technology to harass, threaten, embarrass, or target another person • ...
Cyber Ethics 2025-06-13
Across
- Criminal Activities
- Disrupts normal functioning of computer
- Type of Cybercrime
- Illegal Intrusion into a computer
- Transforming data into unreadable code
- Software copied or distributed illegally
Down
- Secured Website identification
- Prevents Plagiarism
- Harming a person through IT
- Act of stealing someone's personal info
- Misleading
- Highly technical people who secretly steal important data
- Sending bulk mails till the mail server gets full
- Unwanted bulk emails coming from unknown sources
- Digital Dossier
15 Clues: Misleading • Digital Dossier • Type of Cybercrime • Prevents Plagiarism • Criminal Activities • Harming a person through IT • Secured Website identification • Illegal Intrusion into a computer • Transforming data into unreadable code • Act of stealing someone's personal info • Disrupts normal functioning of computer • Software copied or distributed illegally • ...
cyber ethics 2025-06-14
Across
- bullying with the use of digital techniques
- the right to keep personal information from being shared without consent
- when someone steals your personal information to commit fraud or other crimes
- moral priciples that guide our behaviour when using computer or internet
- unsolicited emails or messages often sent in bulk
- a secret word or phrase used to gain access to computer resource
- the set of rules for behaving properly online
Down
- creation of mind such as inventions, literary, and artistic works
- malicious software designed to damage or gain unauthorized access to computer systems
- the trail of data left behind when using internet
- a security system that monitors and controls incoming and outgoing network traffic
- the process of protecting information or data by using mathematical models
- a legal right granted to the creator of an original work
- a type of scam where attackers try to trick users through sensitive information
- unauthorized access to a computer or network
15 Clues: bullying with the use of digital techniques • unauthorized access to a computer or network • the set of rules for behaving properly online • the trail of data left behind when using internet • unsolicited emails or messages often sent in bulk • a legal right granted to the creator of an original work • a secret word or phrase used to gain access to computer resource • ...
Cyber ethics 2025-06-05
Across
- is a legal right granted by law to creator for his original work
- it is an impression or information about a person that exists on the Internet because of his online activity
- is a combination of two terms net and etiquette it refers to being aware of ethical practices and behaving responsibly and appropriately while using the internet
- spam refers to unwanted bulk emails that come from unknown sources they are generally sent in large numbers for commercial advertising purposes millions of copies of the same message are sent to email users worldwide
- when software is copied and distributed illegally it is called
- the simplest way to prevent plagiarism is through proper
- refers to criminal activities that involve the use of computers networks and the internet connections with the intent to cause harm to individual or their digital devices
- it is a set of programs that disturbs the normal functioning of a computer
Down
- it refers to an act of stealing and misusing someones personal information
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- means accessing the internet in an illegal manner
- it is an act of harming a person through information technology in a deliberate manner
- obtaining money from depositors by cleaning to be an authorised bank or financial institution
- refers to an illegal intrusion into a computer system or network
- refers to the act of using or imitating the language and thoughts of another person as ones original work
15 Clues: means accessing the internet in an illegal manner • the simplest way to prevent plagiarism is through proper • when software is copied and distributed illegally it is called • is a legal right granted by law to creator for his original work • refers to an illegal intrusion into a computer system or network • ...
Cyber Ethics 2025-06-10
Across
- a security system that prevents unauthorised people from accessing your system and network.
- it is an act of harming or harassing a person through information technology in a deliberate manner.
- technical people who are experts in breaking into systems to steal important data.
- a computer virus is a program or a set of programs that disrupts the normal functioning of a computer.
- the act of breaking into a computer system,often on a network.
- an illegal intrusion into a computer system or network
- the process of transforming data into unreadable code.
- highly technical people who secretly break into computers to steal important data or sometimes to destroy it.
Down
- criminal activities that involve the use internet connections and many devices with the intent to cause harm to individuals.
- unwanted bulk emails that come from unknown sources.
- it refers to being aware of ethical practices,and behaving responsibly and appropriately while using the internet.
- a malicious intent of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- using or imitating the language and thoughts of another person as one's original work.
- the criminal practice of using social influence over the telephone system.
- It is an act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation.
15 Clues: unwanted bulk emails that come from unknown sources. • an illegal intrusion into a computer system or network • the process of transforming data into unreadable code. • the act of breaking into a computer system,often on a network. • the criminal practice of using social influence over the telephone system. • ...
Cyber Ethics 2025-05-23
Across
- It is a computer program that disrupts the normal functioning of a computer.
- They are technical people who are experts in breaking into systems to steal important data.
- Hacking which is done for a good cause,such as national security.
- It can be defined as the legal rules and restrictions imposed on online rulers.
- When software is copied and distributed illegally.
- It refers to the unwanted bulk emails that come from unknown sources.
- It is the criminal practice of using social influence over the telephone system.
- There is an equivalent term to hacking.
Down
- It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- It is the process of transforming data into unreadable code.
- It refers to criminal activities that involve the use of computers,networks,and the internet connections with the intent to cause harm to individuals.
- It is a set of procedures,moral principles that regulate the use of a computer.
- It is an act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation.
- It is malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- It is security system that prevents unauthorised people from accessing your system and network.
15 Clues: There is an equivalent term to hacking. • When software is copied and distributed illegally. • It is the process of transforming data into unreadable code. • Hacking which is done for a good cause,such as national security. • It refers to the unwanted bulk emails that come from unknown sources. • ...
Cyber ethics. 2025-06-11
Across
- an impression or information about a person that exists other internet because of his online activity.
- a set of procedures,moral principles,and ethical practices that regulate the use of a computer and the internet.
- a malicious technique of tracking a web user into clicking on something different from what the user perceives he/she is clicking on.
- an act of stealing and misusing someone's personal information.
- purchase a single licenced copy of the software and load it onto several computers contrary to the licence's terms.
- criminal activities involving the use of computers,networks,and the internet connections with the intent to cause harm to individuals or digital devices.
Down
- unwanted bulk emails that come from unknown sources.
- an act of harming or harassing a person through information technology in a deliberate manner.
- an illegal intrusion into a computer system or network.
- act of using or imitating the language and thoughts of another person as one's original work.
- process where software is copied and distributed illegally.
- fraudly obtained money from depositors by claiming be an authorised bank or a financial institution.
- the legal rules and restrictions imposed on online users.
- an act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation
- a program or a set of programs that disrupts the normal functioning of a computer.
15 Clues: unwanted bulk emails that come from unknown sources. • an illegal intrusion into a computer system or network. • the legal rules and restrictions imposed on online users. • process where software is copied and distributed illegally. • an act of stealing and misusing someone's personal information. • ...
Cyber Ethics 2025-06-06
Across
- fraudulently obtaining money from depositors by claiming to be an authorised bank or a financial institution.
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
- it refers to unwanted bulk emails that come from unknown sources.
- when software is copied and distributed illegally.
- it refers to criminal activities with the intent to cause harm to individuals or their digital devices.
- it refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet.
- it refers to an illegal intrusion into a computer system or network.
- it is a malicious technique of tricking a web user into clicking on something different from what the user perceives he is clicking on.
- it is an act of harming or harassing a person through information technology in a manner deliberate manner
Down
- this refers to an act of stealing and misusing someone's personal information.
- it is an digital impression about a person that exist on the internet because of his online activity.
- it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- it is a program or a set of programs that disrupts the normal functioning of a computer.
- the moral rules that should be followed while using internet.
- they are technical people who are experts in breaking into systems to steal important data.
15 Clues: when software is copied and distributed illegally. • the moral rules that should be followed while using internet. • it refers to unwanted bulk emails that come from unknown sources. • it refers to an illegal intrusion into a computer system or network. • this refers to an act of stealing and misusing someone's personal information. • ...
Cyber Ethics 2025-06-08
Across
- - It refers to a set of procedures, moral principles, and ethical practices that regulates the use of a computer and the internet
- - It refers to the act of using or imitating the language and thoughts of another person and projecting them as one's own original work.
- - It is an act of harming, harassing, or targetting a person using the internet in a deliberate manner.
- - It is a process of transforming data into unreadable code.
- - It converts the encrypted information into a readable form.
- - It is a security system that prevents unauthorised people from accessing your system and network.
- - It is a legal right granted by law to the creator for his original work.
Down
- - It refers to an illegal intrusion into a computer system or network.
- - It is the simplest way to prevent plagiarism.
- - It refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet.
- - It refers to an act of stealing and misusing someone's personal information.
- - It refers to unwanted bulk emails that come from unknown sources.
- - When software is copied and distributed illegally.
- - It is an impression or information about a person that exists on the internet because of his online activity.
- - It is a program or a set of programs that disrupts the normal functioning of a computer.
15 Clues: - It is the simplest way to prevent plagiarism. • - When software is copied and distributed illegally. • - It is a process of transforming data into unreadable code. • - It converts the encrypted information into a readable form. • - It refers to unwanted bulk emails that come from unknown sources. • ...
Cyber Ethics 2025-05-22
Across
- The combination of the word net and etiquetee.
- The combination of the word voice and phishing.
- Legal rules and restrictions imposed on online users.
- Equivalent term to hacking.
- Unwanted bulk emails that come from unknown sources.
- The act of using and imitating the language and thoughts of another parson as one's original work.
- Accessing the internet in an illegal manner
Down
- Type of a cybercrime that includes sending an email to a user,misleading him to believe that it is from a trusted person or an organisation.
- When software is copied and distributed illegally.
- Hacking which is done for a good cause.
- Criminal activities that involve the use of computers, networks,and the internet connections with the intent to cause harm to individuals.
- Illegal intrusion into a computer system or network.
- Program that disrupts the normal functioning of a computer
- When spam attackers keep sending bulk emails till the mail server gets full.
- Security system that prevents unauthorised people from accessing your system.
15 Clues: Equivalent term to hacking. • Hacking which is done for a good cause. • Accessing the internet in an illegal manner • The combination of the word net and etiquetee. • The combination of the word voice and phishing. • When software is copied and distributed illegally. • Illegal intrusion into a computer system or network. • ...
Cyber Ethics 2025-06-02
Across
- The act of harming or harrasing a person through informational technology in a deliberate manner
- a program or a set of programs wich disrupts the normal functioning of a device
- The practice of sending mails till the mail server gets full
- The legal right granted by the law to the creator for his orginal work
- Information about a person that exists on the internet because of his online activity
- The act of sending an email and misleading the user to belive it is from a trusted source
- An illegal intrusion into a computer or network without the user's notice
Down
- A criminal activity which involves the use of Compters,Networks and Intrnet connections with the intention to harm an individual or thier device
- The process of converting encrypted data into readable form
- A malicious technique of tricking a web user into clicking on somthing else from what the user precives he/she is clicking on
- The process of transforming data into unreadeable code
- Loading a single licenced copy of a software onto multiple computers contrary to licence's terms
- The act of copying or imitating another person's work as thier's
- A security system that prevents unauthourised people from accessing your system and network
- Unwanted bulk e-mails that come from unkown scources
15 Clues: Unwanted bulk e-mails that come from unkown scources • The process of transforming data into unreadeable code • The process of converting encrypted data into readable form • The practice of sending mails till the mail server gets full • The act of copying or imitating another person's work as thier's • ...
Cyber Ethics 2025-06-02
Across
- It refers to criminal activity that involve the use of computers, network and the internet connection with the intend to cause harm to individuals or their digital devices
- It means accessing the Internet in an illegal manner
- They are highly technical people who secretly break into computers to steal important data or sometimes to destroy it
- It the process of transforming data into unreadable code
- It refers to the act if using or imitating the language and thought of another person as ones original work
- While using the internet, we need to follow certain moral rules, which includes honesty, respecting the privacy of others, and the property rights. These rules are called
Down
- Sometimes, spam attackers keep sending bulk mails till the mail server gets full this practice is known as
- It is the process which convert the encrypted information into a readable form
- It is a process in which we purchase a single licensed copy of the software and load it into several computers contrary to licences term.
- Hacking which is done a good cause, such as national security, is known as
- the original writer and the source from which the material has been taken is essential and is known as
- When software is copied and distributed illegally it is called
- It is a security system that prevent unauthorised people from accessing your system and network
- It refers unwanted bulk emails that come from unknown sources
- It refers to an illegal intrusion into a computer system or network
15 Clues: It means accessing the Internet in an illegal manner • It the process of transforming data into unreadable code • It refers unwanted bulk emails that come from unknown sources • When software is copied and distributed illegally it is called • It refers to an illegal intrusion into a computer system or network • ...
CYBER ETHICS 2025-06-15
Across
- Unauthorized access to systems, often unethical or illegal
- Legal frameworks that regulate online conduct, data use, and cybercrimes
- Impersonating someone or something digitally to trick users
- Repeatedly using the internet to harass or intimidate someone
- Hiding one’s identity online
Down
- Using digital platforms to harass, threaten, or demean others
- Copying someone else’s digital work without permission or credit
- The right to control access to your personal information online
- Criminal activities carried out using computers or the internet
- Software that automatically displays or downloads advertising content
- Downloading or distributing copyrighted digital content without authorization
- Deceiving users to steal sensitive information via fake communication
- Online etiquette
- Securing information to protect it from unauthorized access
- Falsely assuming another person’s identity online
15 Clues: Online etiquette • Hiding one’s identity online • Falsely assuming another person’s identity online • Unauthorized access to systems, often unethical or illegal • Impersonating someone or something digitally to trick users • Securing information to protect it from unauthorized access • Using digital platforms to harass, threaten, or demean others • ...
6th Grade Computers Vocabulary 6 2019-11-13
Across
- distribute (multimedia files) over the internet for playback on a mobile device or a personal computer. You Tube is an example
- describes the trail you leave in cyberspace and on any form of digital communication.
- The do’s and don’ts of online communication
- one who uses cyber space to hunt human beings with the intent to exploit, gain information, money, or possessions
- a set of icons or buttons that are a part of a software program’s interface or an open window
Down
- the illegal use of someone else’s personal information (example: a Social Security number) in order to obtain money or credit
- Any hardware, software system that helps its user accomplish a task
- the art of deliberately, cleverly, and secretly ticking people off, usually via the internet, using dialogue
- the buying and selling of product or service over electronic systems such as the Internet and other computer networks
- to act like another person
- an online discussion site where people can hold conversations in the form of posted messages
11 Clues: to act like another person • The do’s and don’ts of online communication • Any hardware, software system that helps its user accomplish a task • describes the trail you leave in cyberspace and on any form of digital communication. • an online discussion site where people can hold conversations in the form of posted messages • ...
La Tecnología y El Coche 2022-02-14
Information Security 2020-12-18
Across
- a set of computer equipment and programs
- a secret word
- a machine
- to take something without the permission
- an arrangement with a bank
- someone's right to keep their personal matters secret
- computer program
- an action that affects someone in an unwanted way
Down
- someone allow you to do something
- keep something safe
- information
- illegal activities
- the act of stopping something from happening
- connected computers around the world
- you buy something need this
- positions of authority
- an illegal plan for tricking people
17 Clues: a machine • information • a secret word • computer program • illegal activities • keep something safe • positions of authority • an arrangement with a bank • you buy something need this • someone allow you to do something • an illegal plan for tricking people • connected computers around the world • a set of computer equipment and programs • to take something without the permission • ...
