cyber security Crossword Puzzles

Cyber Security Crossword 2025-11-06

Cyber Security Crossword crossword puzzle
Across
  1. Secret phrase that shouldn't be "123456"
  2. Test to prove you're human, often involving traffic lights
  3. Fake email scheme that sounds like an aquatic activity
  4. Army of zombie computers controlled by cybercriminals
  5. Malicious program named after an ancient Greek trick
  6. Sneaky software that watches your every click
  7. Secret entrance that bypasses normal security
  8. When unauthorized users break through digital defenses
  9. Three letters for a tunnel that hides your internet traffic
  10. Scrambling data like eggs, but harder to unscramble
  11. Small file that remembers you, not made of chocolate chips
  12. Attack that floods a website like a thousand people calling at once
  13. Umbrella term for software with bad intentions
  14. Digital bouncer that decides who gets into the network party
  15. Alan who cracked codes and fathered computer science
Down
  1. Process of proving you are who you claim to be online
  2. Sweet trap designed to catch cyber attackers
  3. Digital lock-picker, sometimes wearing a white or black hat
  4. Software band-aid that fixes security holes
  5. Digital kidnapper that holds files hostage for money
  6. Spreads from computer to computer like its biological namesake
  7. Pretending to be someone else online, like digital dress-up
  8. Using your body parts as passwords
  9. Self-replicating pest that doesn't need a host file
  10. Silent recorder of every button you press

25 Clues: Using your body parts as passwordsSecret phrase that shouldn't be "123456"Silent recorder of every button you pressSoftware band-aid that fixes security holesSweet trap designed to catch cyber attackersSneaky software that watches your every clickSecret entrance that bypasses normal securityUmbrella term for software with bad intentions...

Important words 2025-03-02

Important words crossword puzzle
Across
  1. a promise that a business gives you
  2. something that solidifies a deal
  3. knowing something
  4. Entering somewhere without authentication
  5. online
  6. something you need for entry
Down
  1. Getting your money stolen
  2. buying goods from shops
  3. call
  4. Getting money back for a product
  5. security
  6. safe
  7. fast transport
  8. can restore lost data

14 Clues: callsafeonlinesecurityfast transportknowing somethingcan restore lost databuying goods from shopsGetting your money stolensomething you need for entryGetting money back for a productsomething that solidifies a deala promise that a business gives youEntering somewhere without authentication

Vigilant 2020-07-08

Vigilant crossword puzzle
Across
  1. Smart devices are always
  2. Do not get hooked
  3. Saves searches online
  4. Once done working
  5. Malicious download
Down
  1. Constantly on guard
  2. Right to my own personal information
  3. Chief Information Security Officer
  4. Shared responsibility
  5. Color of fraud flag
  6. Cyber Security Awareness Month

11 Clues: Do not get hookedOnce done workingMalicious downloadConstantly on guardColor of fraud flagShared responsibilitySaves searches onlineSmart devices are alwaysCyber Security Awareness MonthChief Information Security OfficerRight to my own personal information

On line Security 2015-05-05

On line Security crossword puzzle
Across
  1. websites
  2. google
  3. secret
  4. firefighter
  5. theft robber
  6. bio
  7. chatting facebook
Down
  1. card shopping
  2. yum
  3. online
  4. ware spy
  5. gaurd

12 Clues: yumbiogaurdgoogleonlinesecretwebsitesware spyfirefightertheft robbercard shoppingchatting facebook

General Regulatory Compliance Cryptic Crossword 2024-01-26

General Regulatory Compliance Cryptic Crossword crossword puzzle
Across
  1. DoD standard for implementing cybersecurity
  2. security device to control traffic
  3. deceptive practices to fraudulently steal data
  4. measures to protect against network attack
  5. group of interconnected computers and devices
  6. series of actions leading to a result
  7. simulated cyber attack
  8. potential loss of assets
  9. process of verifying identity of a user
Down
  1. protection of information technology on ships and port facilities
  2. Experts in safeguarding business from evil
  3. security measure of pre-approved IP addresses
  4. process of establishing encrypted links
  5. converting data to coded format
  6. malicious software
  7. digital information created by computer systems
  8. centralized unit and team continuously monitoring security posture
  9. measures and practices to protect digital systems

18 Clues: malicious softwaresimulated cyber attackpotential loss of assetsconverting data to coded formatsecurity device to control trafficseries of actions leading to a resultprocess of establishing encrypted linksprocess of verifying identity of a userExperts in safeguarding business from evilmeasures to protect against network attack...

aw jeez 2023-01-12

aw jeez crossword puzzle
Across
  1. Cyber Security Saleswoman
  2. Teacher
  3. Project Manager
  4. Heart Valve Specialist
  5. College Admissions Director
  6. Pediatric Nurse
  7. U.S. Paralympian
  8. Political Science PhD
  9. Event Planner
  10. Designer
Down
  1. Graduate Student
  2. Pharmacist
  3. Warehouse Associate
  4. UX Designer
  5. Elevator Salesman
  6. Clinical Psychologist
  7. Educational Project Manager
  8. Pet Cremator

18 Clues: TeacherDesignerPharmacistUX DesignerPet CrematorEvent PlannerProject ManagerPediatric NurseGraduate StudentU.S. ParalympianElevator SalesmanWarehouse AssociatePolitical Science PhDClinical PsychologistHeart Valve SpecialistCyber Security SaleswomanCollege Admissions DirectorEducational Project Manager

General Regulatory Compliance Cryptic Crossword 2024-01-26

General Regulatory Compliance Cryptic Crossword crossword puzzle
Across
  1. DoD standard for implementing cybersecurity
  2. security device to control traffic
  3. deceptive practices to fraudulently steal data
  4. measures to protect against network attack
  5. group of interconnected computers and devices
  6. series of actions leading to a result
  7. simulated cyber attack
  8. potential loss of assets
  9. process of verifying identity of a user
Down
  1. protection of information technology on ships and port facilities
  2. Experts in safeguarding business from evil
  3. security measure of pre-approved IP addresses
  4. process of establishing encrypted links
  5. converting data to coded format
  6. malicious software
  7. digital information created by computer systems
  8. centralized unit and team continuously monitoring security posture
  9. measures and practices to protect digital systems

18 Clues: malicious softwaresimulated cyber attackpotential loss of assetsconverting data to coded formatsecurity device to control trafficseries of actions leading to a resultprocess of establishing encrypted linksprocess of verifying identity of a userExperts in safeguarding business from evilmeasures to protect against network attack...

ETHICAL HACKING 2024-08-08

ETHICAL HACKING crossword puzzle
Across
  1. DHCP WORKS ON TOP OF
  2. CYBER SECURITY RESEARCHER
  3. A FIREWALL
  4. HIJACKING TOOLS
Down
  1. IDENTIFYING AND MITIGATING SECURITY THREATS
  2. TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS
  3. A WEB SECURITY VULNERABILITY
  4. ENUMERATION process in security that uncover DNSrecord
  5. HASHING ALGORITHM
  6. FAMOUS TOOL IN PEN TESTING COMMUNITY
  7. WEB APPLICATION DEVELOPED BY OWASP

11 Clues: A FIREWALLHIJACKING TOOLSHASHING ALGORITHMDHCP WORKS ON TOP OFCYBER SECURITY RESEARCHERA WEB SECURITY VULNERABILITYWEB APPLICATION DEVELOPED BY OWASPFAMOUS TOOL IN PEN TESTING COMMUNITYIDENTIFYING AND MITIGATING SECURITY THREATSTOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETSENUMERATION process in security that uncover DNSrecord

Cyber Security 2020-07-19

Cyber Security crossword puzzle
Across
  1. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
  2. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  3. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. A security measure designed to verify an individual`s authorization to access computer or security information.
  5. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  6. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. An environment in which digitized information is distributed on networks of computers.
  2. The largest WAN in the world.
  3. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  4. Shift cipher named after a famous Roman, Julius ?
  5. Machine used in WW2 to send secret messages in Germany.
  6. Statement of intention to inflict damage or hostile action.

12 Clues: The largest WAN in the world.Shift cipher named after a famous Roman, Julius ?Machine used in WW2 to send secret messages in Germany.Statement of intention to inflict damage or hostile action.An environment in which digitized information is distributed on networks of computers....

Cyber Security 2021-10-14

Cyber Security crossword puzzle
Across
  1. attack injects a malicious code into the server
  2. who created a computer worm in 1988?
  3. spyware, ransomware, viruses, and worms
  4. what president created homeland security?
  5. created the first ransomware attack
  6. attack that floods a computer or network
  7. attackwhen hackers insert their way into a two party transaction
Down
  1. advanced, modular banking trojan
  2. attack relies most on human interaction
  3. this person created cyber security
  4. attacks that use fake communication to trick people
  5. what does SQL stand for?

12 Clues: what does SQL stand for?advanced, modular banking trojanthis person created cyber securitycreated the first ransomware attackwho created a computer worm in 1988?attack relies most on human interactionspyware, ransomware, viruses, and wormsattack that floods a computer or networkwhat president created homeland security?...

Cyber Security 2020-08-24

Cyber Security crossword puzzle
Across
  1. move to the other computer.
  2. virus can make copies of itself
  3. a program that
  4. a large number of
  5. example by email,
  6. an uncontrolled way
  7. a computer that
Down
  1. a connection
  2. another computer,
  3. a virus
  4. many people’s mobile phones
  5. messages

12 Clues: a virusmessagesa connectiona program thata computer thatanother computer,a large number ofexample by email,an uncontrolled waymove to the other computer.many people’s mobile phonesvirus can make copies of itself

Cyber Security 2021-10-12

Cyber Security crossword puzzle
Across
  1. a link that wants you to click on it
  2. installed without the user realizing
  3. another word for junk email
  4. proper behaviour online
  5. ride the waves of the internet!
Down
  1. the non editable kind
  2. yarr matey!
  3. like a head cold for your computer
  4. info stored on a computer
  5. dont fall for this trick, its not on the hook
  6. computer bad guy
  7. blocks viruses

12 Clues: yarr matey!blocks virusescomputer bad guythe non editable kindproper behaviour onlineinfo stored on a computeranother word for junk emailride the waves of the internet!like a head cold for your computera link that wants you to click on itinstalled without the user realizingdont fall for this trick, its not on the hook

#InfraNet Cyber Awareness 2022-10-13

#InfraNet Cyber Awareness crossword puzzle
Across
  1. Security or house
  2. Password attack method
  3. Doesn'trequire a host file to replicate itself
  4. This horse can stampede your security defenses
  5. Who is responsible for cybersecurity
  6. Verifying identity
  7. Unauthorized access to a network
  8. Scrambling text into an unreadable format
  9. Similar to a password
Down
  1. Any crime committed electronically
  2. Watches where you go on the internet
  3. Multi-factor authentication
  4. Cyber awareness month
  5. Wireless technology using short-wave UHF radio waves
  6. Attack attempt to acquire personal information
  7. Prevents unauthorized access to or from a private network
  8. The address of a webpage
  9. Program that is designed to automate tasks
  10. Chief information security officer

19 Clues: Security or houseVerifying identityCyber awareness monthSimilar to a passwordPassword attack methodThe address of a webpageMulti-factor authenticationUnauthorized access to a networkAny crime committed electronicallyChief information security officerWatches where you go on the internetWho is responsible for cybersecurity...

Trick or Threat: The Cyber Crossword 2025-04-06

Trick or Threat: The Cyber Crossword crossword puzzle
Across
  1. The IT Team's critical tasks include keeping all software and systems _____
  2. An Incident Response Plan explains exactly what to do during a ____ attack
  3. With cloud systems, professional teams manage ____ 24/7
  4. Examples of cloud systems include ____ workspace and Microsoft 365
  5. MFA stands for _____ Authentication: Your digital shield
  6. The IT Team's critical tasks include enforcing multifactor ___
  7. Cyber threats can harm businesses of all _____
  8. MFA is like having multiple ____ on your digital door
  9. ____ and ipads are great examples of secure devices
  10. A Cybersecurity ___ plan should include talking about security with your team, using multifactor authentication,keeping software updated, creating a response plan, and never stopping learning about digital saferty
  11. The CEO's Role in Cybersecurity includes making cybersecurity a normal part of _____ work
Down
  1. MFA can use text messages, special codes, or other _____ methods.
  2. _____ is about protecting your digital information and systems
  3. The ___ Response plan can be thought of as a "digital first aid kit"
  4. Chromebooks and iPads have built-in ___ features
  5. Some common cyber threats include ____ emails as the most common attack
  6. ____ often target small businesses.
  7. Staff should learn to spot suspicious ____ and emails
  8. All staff needs to understand cybersecurity ____
  9. ____ services are often more secure for small businesses
  10. The CEO's Role in Cybersecurity includes creating a ____ where everyone cares about digital safety

21 Clues: ____ often target small businesses.Cyber threats can harm businesses of all _____Chromebooks and iPads have built-in ___ featuresAll staff needs to understand cybersecurity ________ and ipads are great examples of secure devicesStaff should learn to spot suspicious ____ and emailsMFA is like having multiple ____ on your digital door...

Cyber Security Crossword 2019-09-23

Cyber Security Crossword crossword puzzle
Across
  1. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
  2. Tim Berners-Lee's Invention (5,4,3)
  3. Additional copy of data or information used for recovery should the original become lost or corrupt (6)
  4. a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
  5. The 'mal' part of the term 'malware' (9)
  6. a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
  7. Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
  8. a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
  9. bin where users should send suspicious emails within Anglian Water (4,3)
Down
  1. digital _____, the information about a person that exists on the Internet as a result of online activity (9)
  2. a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
  3. websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
  4. the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
  5. the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
  6. These people are responsible for security (9)
  7. (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
  8. __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
  9. a person who uses computers to gain unauthorised access to data (6)
  10. Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)

19 Clues: Tim Berners-Lee's Invention (5,4,3)The 'mal' part of the term 'malware' (9)These people are responsible for security (9)a person who uses computers to gain unauthorised access to data (6)bin where users should send suspicious emails within Anglian Water (4,3)...

Cyber Security Awareness 2023-03-01

Cyber Security Awareness crossword puzzle
Across
  1. Type of malware that self-replicates and attempts to steal info
  2. A type of malware that encrypts user's files and then asks for payment to unlock them
  3. Piece of audio/video that has been altered to make it seem authentic
  4. A number of compromised computers used to spam or denial of service attacks
  5. Any unwanted/unsolicited email/phone call
  6. A type of computer that provides services to other computers/devices
  7. Emails sent with the intention of stealing money/account credentials
  8. Any type of communication that exploits the human factor to gather sensitive info (6,11)
  9. A generic term for any type of malicious software
  10. Logica/Physical tool used to filter network traffic
  11. Malware that can reproduce itself for the purpose of spreading itself to other devices in the network
Down
  1. A type of network that allows secure access to a network from offsite
  2. A form of malware used to spy on user's devices
  3. Misleading computer program that looks innocent, but allows a hacker into your system/network via a backdoor (6,5)
  4. Following someone with legitimate access into a location to get physical entry
  5. Software update provided by a manufacturer to fix a bug
  6. Any unauthorised access to data, applications, or servers
  7. Changing plaintext to cipher text using an algorithm
  8. On-demand computer hosted by a 3rd party (AWS, MS Azure)

19 Clues: Any unwanted/unsolicited email/phone callA form of malware used to spy on user's devicesA generic term for any type of malicious softwareLogica/Physical tool used to filter network trafficChanging plaintext to cipher text using an algorithmSoftware update provided by a manufacturer to fix a bug...

Cyber Security Puzzle 2023-01-25

Cyber Security Puzzle crossword puzzle
Across
  1. When nations network w/goal of damage
  2. Set of rules computer follows
  3. Tricked to click hidden elements
  4. Pop ups
  5. Codes that protects during encryption
  6. system prevents unauthorized network access
  7. Holds your information hostage
  8. Done through email not water
  9. Dangerous and no one knows yet
Down
  1. They self replicate
  2. How your informations kept safe
  3. Gives attacker control of pc
  4. Sneaky hidden cyber attack
  5. Language made of 1's & 0's
  6. Users connect remotely to another network
  7. Something malicious
  8. sends massive traffic to crash site
  9. Tracks and stores your keystrokes
  10. Worm-like but needs human interaction

19 Clues: Pop upsThey self replicateSomething maliciousSneaky hidden cyber attackLanguage made of 1's & 0'sGives attacker control of pcDone through email not waterSet of rules computer followsHolds your information hostageDangerous and no one knows yetHow your informations kept safeTricked to click hidden elementsTracks and stores your keystrokes...

CTF-CW-5 2025-11-17

CTF-CW-5 crossword puzzle
Across
  1. System�s ability to handle growth
  2. Web Application Firewall: protects websites
  3. When someone breaks a formal rule
  4. Proof collected in a cyber investigation
  5. Openness about security controls and processes.
  6. Email security service trusted by Tekion.
  7. Person/role overseeing rules or limits
  8. Hiding real numbers with random stand-ins again
  9. Process for managing computer security events
  10. The things done to prevent or detect risks
  11. Role managing security events
Down
  1. Framework for managing artificial intelligence risks and compliance
  2. Moral principles guiding artificial intelligence development
  3. Innovation hub for new products at Tekion.
  4. Individual whose personal data is being processed
  5. Multi-factor authentication: more than password required
  6. Steps to fix incident aftermath
  7. Limits of coverage
  8. Special cyberops expert team at Tekion.
  9. Unique identifier for a networked device

20 Clues: Limits of coverageRole managing security eventsSteps to fix incident aftermathSystem�s ability to handle growthWhen someone breaks a formal rulePerson/role overseeing rules or limitsSpecial cyberops expert team at Tekion.Proof collected in a cyber investigationUnique identifier for a networked deviceEmail security service trusted by Tekion....

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. a software that enable a user to obtain information about another's computer activities.
  2. is when it have virus automatically on the computer or laptop
  3. is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  4. type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. an attempt by hackers to damage or destroy the system.
  6. is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
  7. a type of danger when people harm you.
Down
  1. is the action of protecting, or the state of being protected.
  2. when danger happen in internet.
  3. is a network of social interactions and personal relationships.
  4. ransomware is usually aimed at individuals, it's only a matter of time before business is targeted as well"r
  5. card fraud is Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.

12 Clues: when danger happen in internet.a type of danger when people harm you.an attempt by hackers to damage or destroy the system.is the action of protecting, or the state of being protected.is when it have virus automatically on the computer or laptopis a network of social interactions and personal relationships....

Cyber Security 2023-09-15

Cyber Security crossword puzzle
Across
  1. software that looks like a real program, but is actually a type of malware in disguise
  2. onion-style routing technique for transmitting data
  3. protect the malware and can enable any malware installed to still be on the system after many multiple reboots
  4. security method that requires two forms of identification
  5. cameras to increase security
  6. transmits data over a short-range
  7. A safe environment for files to be opened without affect your pc
Down
  1. software that is secretly installed on your computer
  2. System which sets of sound when triggered
  3. Monitors and filters incoming and outgoing network traffic
  4. analysis of people's unique physical characteristics
  5. identifying a user’s identity

12 Clues: cameras to increase securityidentifying a user’s identitytransmits data over a short-rangeSystem which sets of sound when triggeredonion-style routing technique for transmitting datasoftware that is secretly installed on your computeranalysis of people's unique physical characteristicssecurity method that requires two forms of identification...

Cyber security 2023-10-27

Cyber security crossword puzzle
Across
  1. The act of being protected.
  2. The main means of mass communication.
  3. To be hidden from others.
  4. To remain unthreatened.
  5. Someone who harms others.
  6. Someone you do not know.
Down
  1. Out of sight.
  2. Facts learned from someone or something.
  3. Relating to society.
  4. To be protected.
  5. To whom you are fond of.
  6. Being online.

12 Clues: Out of sight.Being online.To be protected.Relating to society.To remain unthreatened.To whom you are fond of.Someone you do not know.To be hidden from others.Someone who harms others.The act of being protected.The main means of mass communication.Facts learned from someone or something.

Cyber Security 2025-07-11

Cyber Security crossword puzzle
Across
  1. Someone who uses ethical hacking to help
  2. Software designed to harm a computer
  3. Legal software that tracks users secretly
  4. Process of converting data into a secret code
  5. Device used to protect a network
Down
  1. A scam where attackers trick you into giving personal info
  2. Mail Unwanted and repetitive email messages
  3. A secret word or phrase used to gain access
  4. Someone who breaks into systems illegally
  5. Network that connects computers globally
  6. Program that protects your computer from viruses
  7. A type of malware that demands money

12 Clues: Device used to protect a networkSoftware designed to harm a computerA type of malware that demands moneySomeone who uses ethical hacking to helpNetwork that connects computers globallySomeone who breaks into systems illegallyLegal software that tracks users secretlyMail Unwanted and repetitive email messages...

All About Ryan 2026-01-22

All About Ryan crossword puzzle
Across
  1. Indoor
  2. Instrument 4
  3. Instrument 3
  4. Instrument 5
  5. Pet
  6. Cyber
  7. Kicking Sport
  8. Instrument
  9. Juicy
  10. Instrument 2
  11. Bike
  12. Lake
  13. Wrist
  14. Chamber
Down
  1. Blanket
  2. Iowa
  3. Superhero Costume
  4. Polar
  5. Stuffed Animal
  6. Ford
  7. Spaceman Toy
  8. Acting Role
  9. Outdoor
  10. Water
  11. Kentucky
  12. Montreal
  13. Travel Abroad

27 Clues: PetIowaFordBikeLakePolarCyberWaterJuicyWristIndoorBlanketOutdoorChamberKentuckyMontrealInstrumentActing RoleInstrument 4Instrument 3Instrument 5Spaceman ToyInstrument 2Kicking SportTravel AbroadStuffed AnimalSuperhero Costume

CTF-CW-5 2025-11-17

CTF-CW-5 crossword puzzle
Across
  1. System�s ability to handle growth
  2. Web Application Firewall: protects websites
  3. When someone breaks a formal rule
  4. Proof collected in a cyber investigation
  5. Openness about security controls and processes.
  6. Email security service trusted by Tekion.
  7. Person/role overseeing rules or limits
  8. Hiding real numbers with random stand-ins again
  9. Process for managing computer security events
  10. The things done to prevent or detect risks
  11. Role managing security events
Down
  1. Framework for managing artificial intelligence risks and compliance
  2. Moral principles guiding artificial intelligence development
  3. Innovation hub for new products at Tekion.
  4. Individual whose personal data is being processed
  5. Multi-factor authentication: more than password required
  6. Steps to fix incident aftermath
  7. Limits of coverage
  8. Special cyberops expert team at Tekion.
  9. Unique identifier for a networked device

20 Clues: Limits of coverageRole managing security eventsSteps to fix incident aftermathSystem�s ability to handle growthWhen someone breaks a formal rulePerson/role overseeing rules or limitsSpecial cyberops expert team at Tekion.Proof collected in a cyber investigationUnique identifier for a networked deviceEmail security service trusted by Tekion....

cyber security 2022-09-30

cyber security crossword puzzle
Across
  1. person who finds and exploits the weakness in computer systems.
  2. process of finding weakness in computer or private networks.
  3. comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
  4. designed to disrupt, damaged, or gain unauthorized access to a computer system.
  5. exploits vulnerabilities on the device to encrypt important files.
  6. an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
  1. used to obtained sensitive information from users.
  2. that downloads onto a computer disguised as a legitimate program.
  3. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. a secret word or phrase that must be used to gain admission to a place.
  5. malicious software.
  6. monitors the victim's internet activity, tracks login credentials and spies on sensitive information.

12 Clues: malicious software.used to obtained sensitive information from users.process of finding weakness in computer or private networks.person who finds and exploits the weakness in computer systems.that downloads onto a computer disguised as a legitimate program.exploits vulnerabilities on the device to encrypt important files....

Cyber Security 2017-07-13

Cyber Security crossword puzzle
Across
  1. This is when someone spends irrelevant or unsolicited messages to loads of people
  2. This is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
  3. This is when your speaking to someone and another person is watching/listening without the person knowing
  4. Loads of private computers that can see what your doing without the users knowing
  5. Something that can go onto your computer and can destroy data and corrupt the system
Down
  1. This is when someone takes your personal info and uses it to take your credit card etc
  2. These are physical parts you can connect to a system
  3. This is a person who uses computers to gain unauthorized access to data
  4. This is a software that threatens to delete your data for a specific amount of money
  5. This is a program or a set of instructions
  6. This a secret word or phrase that must be used to gain access to a place/website
  7. This is software designed to detect and destroy computer viruses

12 Clues: This is a program or a set of instructionsThese are physical parts you can connect to a systemThis is software designed to detect and destroy computer virusesThis is a person who uses computers to gain unauthorized access to dataThis a secret word or phrase that must be used to gain access to a place/website...

Cyber Security 2021-10-14

Cyber Security crossword puzzle
Across
  1. attack injects a malicious code into the server
  2. created the first ransomware attack
  3. what does SQL stand for?
  4. what president created homeland security?
  5. attack relies most on human interaction
Down
  1. attacks that use fake communication to trick people
  2. this person created cyber security
  3. who created a computer worm in 1988?
  4. advanced, modular banking trojan
  5. attackwhen hackers insert their way into a two party transaction
  6. attack that floods a computer or network
  7. spyware, ransomware, viruses, and worms

12 Clues: what does SQL stand for?advanced, modular banking trojanthis person created cyber securitycreated the first ransomware attackwho created a computer worm in 1988?spyware, ransomware, viruses, and wormsattack relies most on human interactionattack that floods a computer or networkwhat president created homeland security?...

Cyber Security 2024-08-17

Cyber Security crossword puzzle
Across
  1. What malware strain is used to add more malware to an infected device?
  2. What color hat hacker invades systems for malicious purposes?
  3. What is the most common file type for malware?
  4. What classification of malware was MyDoom?
Down
  1. What job position is responsible for designing security systems? Two words.
  2. What's the name of a program that keeps track of keys pressed (often used in phishing and infostealers)?
  3. What malware type locks you out of your system and often demands money?
  4. What malware strain was sent via an email attachment stating a love letter?
  5. What color hat hacker attempts to invade systems with permission to search for issues?
  6. What color hat hacker are newbies to the hacking world?
  7. What malware type replicates across the system?
  8. What was the largest data breach in history exposing more than 3.2B people?

12 Clues: What classification of malware was MyDoom?What is the most common file type for malware?What malware type replicates across the system?What color hat hacker are newbies to the hacking world?What color hat hacker invades systems for malicious purposes?What malware strain is used to add more malware to an infected device?...

THE ITT 2024-05-16

THE ITT crossword puzzle
Across
  1. A hacker with malicious intentions. Cyber-Security and Legislation
  2. How does a human interact with a computer? HCI
  3. Integers, data type. Data and Testing
  4. An electronic message that can be sent.
  5. No video, Just sound. Digital Communication
  6. A way of visualising/organising information. Design Tools
  7. A prevention to DOS attacks. Cyber-Security and Legislation
  8. A use of a HCI to track heartrate. HCI
Down
  1. A promotion technique using written and visual information.
  2. Plan for how elements will work together. Design Tools
  3. Facts and figures with no context. Data and Testing
  4. A way of communication, type of channel. Digital Communications
  5. A digital storing place to transfer data.
  6. One of the four pillars. IOE
  7. Internet Of Everything. IOE

15 Clues: Internet Of Everything. IOEOne of the four pillars. IOEIntegers, data type. Data and TestingA use of a HCI to track heartrate. HCIAn electronic message that can be sent.A digital storing place to transfer data.No video, Just sound. Digital CommunicationHow does a human interact with a computer? HCIFacts and figures with no context. Data and Testing...

Cyber Security Crossword 2019-09-23

Cyber Security Crossword crossword puzzle
Across
  1. a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
  2. digital _____, the information about a person that exists on the Internet as a result of online activity (9)
  3. websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
  4. Tim Berners-Lee's Invention (5,4,3)
  5. __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
  6. Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
  7. Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
  8. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
  9. The 'mal' part of the term 'malware' (9)
  10. bin where users should send suspicious emails within Anglian Water (4,3)
Down
  1. These people are responsible for security (9)
  2. a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
  3. a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
  4. a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
  5. a person who uses computers to gain unauthorised access to data (6)
  6. the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
  7. the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
  8. (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
  9. Additional copy of data or information used for recovery should the original become lost or corrupt (6)

19 Clues: Tim Berners-Lee's Invention (5,4,3)The 'mal' part of the term 'malware' (9)These people are responsible for security (9)a person who uses computers to gain unauthorised access to data (6)bin where users should send suspicious emails within Anglian Water (4,3)...

Cyber Security Puzzle 2023-01-25

Cyber Security Puzzle crossword puzzle
Across
  1. When nations network w/goal of damage
  2. Set of rules computer follows
  3. Tricked to click hidden elements
  4. Pop ups
  5. Codes that protects during encryption
  6. system prevents unauthorized network access
  7. Holds your information hostage
  8. Done through email not water
  9. Dangerous and no one knows yet
Down
  1. They self replicate
  2. How your informations kept safe
  3. Gives attacker control of pc
  4. Sneaky hidden cyber attack
  5. Language made of 1's & 0's
  6. Users connect remotely to another network
  7. Something malicious
  8. sends massive traffic to crash site
  9. Tracks and stores your keystrokes
  10. Worm-like but needs human interaction

19 Clues: Pop upsThey self replicateSomething maliciousSneaky hidden cyber attackLanguage made of 1's & 0'sGives attacker control of pcDone through email not waterSet of rules computer followsHolds your information hostageDangerous and no one knows yetHow your informations kept safeTricked to click hidden elementsTracks and stores your keystrokes...

Cyber Security Terms 2023-09-12

Cyber Security Terms crossword puzzle
Across
  1. Spam is the name commonly given to unsolicited emails.
  2. Code left by a person thats hidden that can be used to shut down software
  3. Prevents Virus
  4. A form of malware used by hackers to spy on you and your computer activities.
  5. It is a group of applications that instruct a computer to carry out a task
  6. A combination of the words “robot” and “network”
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
  9. Process of verifying your not a bot
  10. when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
  1. Encryption is a process of maintaining data confidentiality
  2. providing on-demand services over the internet.
  3. Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
  4. a wide variety of bad software used to infect and/or damage a system
  5. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  6. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  7. Any technology, be it software or hardware, used to keep intruders out.
  8. Unprocessed Information
  9. a method of connecting a series of computers and devices in a private encrypted network,

19 Clues: Prevents VirusUnprocessed InformationProcess of verifying your not a botproviding on-demand services over the internet.A combination of the words “robot” and “network”Spam is the name commonly given to unsolicited emails.Encryption is a process of maintaining data confidentialitya wide variety of bad software used to infect and/or damage a system...

I.T. cyber security 2023-09-10

I.T. cyber security crossword puzzle
Across
  1. to identify any activity on your network
  2. a type of security and encryption for your router
  3. pop-ups meant to direct you from one website to another
  4. a type of malware that replicates itself by inserting its own code into other programs if successfully executed
  5. an individual who commits crimes via the internet
  6. to erase something like data or information
  7. meant to cover and protect an individual or companies losses from a cyber attack
  8. digital information
  9. is an application or program
  10. a program meant for designated and certain uses
Down
  1. to return something to its previous state
  2. composed of a certain number of characters
  3. to disguise yourself as someone familiar to operate a cyber attack on a victim
  4. a software meant to hold an individual or companies data hostage
  5. to fix something back in working order
  6. helps secure information moving across your network
  7. to get the latest version of a certain application or sorftware
  8. to gain control of
  9. a malicious way to get valuable items like data or money from a user

19 Clues: to gain control ofdigital informationis an application or programto fix something back in working orderto identify any activity on your networkto return something to its previous statecomposed of a certain number of charactersto erase something like data or informationa program meant for designated and certain uses...

Cyber Security Terms 2023-09-12

Cyber Security Terms crossword puzzle
Across
  1. Spam is the name commonly given to unsolicited emails.
  2. Code left by a person thats hidden that can be used to shut down software
  3. Prevents Virus
  4. A form of malware used by hackers to spy on you and your computer activities.
  5. It is a group of applications that instruct a computer to carry out a task
  6. A combination of the words “robot” and “network”
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
  9. Process of verifying your not a bot
  10. when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
  1. Encryption is a process of maintaining data confidentiality
  2. providing on-demand services over the internet.
  3. Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
  4. a wide variety of bad software used to infect and/or damage a system
  5. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  6. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  7. Any technology, be it software or hardware, used to keep intruders out.
  8. Unprocessed Information
  9. a method of connecting a series of computers and devices in a private encrypted network,

19 Clues: Prevents VirusUnprocessed InformationProcess of verifying your not a botproviding on-demand services over the internet.A combination of the words “robot” and “network”Spam is the name commonly given to unsolicited emails.Encryption is a process of maintaining data confidentialitya wide variety of bad software used to infect and/or damage a system...

Cyber Security Terms 2023-09-12

Cyber Security Terms crossword puzzle
Across
  1. Spam is the name commonly given to unsolicited emails.
  2. Code left by a person thats hidden that can be used to shut down software
  3. Prevents Virus
  4. A form of malware used by hackers to spy on you and your computer activities.
  5. It is a group of applications that instruct a computer to carry out a task
  6. A combination of the words “robot” and “network”
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
  9. Process of verifying your not a bot
  10. when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
  1. Encryption is a process of maintaining data confidentiality
  2. providing on-demand services over the internet.
  3. Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
  4. a wide variety of bad software used to infect and/or damage a system
  5. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  6. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  7. Any technology, be it software or hardware, used to keep intruders out.
  8. Unprocessed Information
  9. a method of connecting a series of computers and devices in a private encrypted network,

19 Clues: Prevents VirusUnprocessed InformationProcess of verifying your not a botproviding on-demand services over the internet.A combination of the words “robot” and “network”Spam is the name commonly given to unsolicited emails.Encryption is a process of maintaining data confidentialitya wide variety of bad software used to infect and/or damage a system...

Cyber Security Threats 2025-11-19

Cyber Security Threats crossword puzzle
Across
  1. Fake messages or emails pretending to be genuine to steal information.
  2. Redirecting a user to a fake version of a legitimate website.
  3. Persuading someone to give information by pretending to be someone trustworthy.
  4. Messages designed to deceive users into clicking links or giving information.
  5. Software that secretly gathers user information without permission.
  6. An attack that floods a service or website with traffic so it cannot function.
  7. A network of infected devices controlled remotely by an attacker.
  8. Entering systems, networks or data without permission.
  9. Attempting to gain unauthorised access to systems or data.
  10. A malicious program that attaches to files and spreads between systems.
  11. Tricking a user into clicking on something different from what they think they are clicking.
Down
  1. Dishonest schemes to trick people into giving money or information.
  2. Watching someone enter their PIN or password to steal it.
  3. Stealing someone’s personal details and using them fraudulently.
  4. Sites designed to imitate real ones in order to steal data.
  5. Malicious software such as viruses, spyware, worms or trojans.
  6. Self-replicating malware that spreads across networks without user action.
  7. Software that forces unwanted advertising onto a device.
  8. Manipulating people into giving away confidential information.

19 Clues: Entering systems, networks or data without permission.Software that forces unwanted advertising onto a device.Watching someone enter their PIN or password to steal it.Attempting to gain unauthorised access to systems or data.Sites designed to imitate real ones in order to steal data.Redirecting a user to a fake version of a legitimate website....

Cyber Security Month Training 2018-10-18

Cyber Security Month Training crossword puzzle
Across
  1. Trust your BLANK, if it feels suspicious, it probably is
  2. weakest point of any and all security plans
  3. prevents users from accessing their system or personal files and demands ransom payment in order to regain access
  4. Who's responsibility is cyber security/information security?
Down
  1. should be difficult to guess
  2. attempt to acquire sensitive information by email
  3. It only takes one BLANK to let someone into the system
  4. Instead of a password, it is suggested you use a
  5. A BLANK helps protect your computer from an external attack
  6. the best way to keep people aware of cyber security threats

10 Clues: should be difficult to guessweakest point of any and all security plansInstead of a password, it is suggested you use aattempt to acquire sensitive information by emailIt only takes one BLANK to let someone into the systemTrust your BLANK, if it feels suspicious, it probably isA BLANK helps protect your computer from an external attack...

CSAM23 - Crossword Puzzle 2023-07-25

CSAM23 - Crossword Puzzle crossword puzzle
Across
  1. Form of malware designed to encrypt files and render them unusable
  2. SETA mascot
  3. Attempt to obtain personal information from a recipient via short message service (SMS) or text message app
  4. Where to send suspicious emails
  5. Potential danger that could exploit a vulnerability in your organization
  6. Probability of exposure resulting from a data breach
Down
  1. Security framework requiring authentication of all users
  2. Who should you contact regarding any Cyber Security Awareness Training?
  3. Check sender's ______ to verify that it is a legitimate email
  4. Who/What is the most important layer in preventing a phishing attack?
  5. in which platform do we take Cyber Security Awareness Training
  6. An unauthorized person attempting to access a system

12 Clues: SETA mascotWhere to send suspicious emailsAn unauthorized person attempting to access a systemProbability of exposure resulting from a data breachSecurity framework requiring authentication of all usersCheck sender's ______ to verify that it is a legitimate emailin which platform do we take Cyber Security Awareness Training...

Buzzwords 2024-07-05

Buzzwords crossword puzzle
Across
  1. Yet another cyber security certification
  2. Trusting, in a mutual way
  3. The Chinese have a great one of these
  4. They wear hoodies and use laptops with green text
  5. $20/month for full access, or Open__
  6. Everything is stored in these
  7. Classic cyber security buzzword for secure communication
  8. I keep getting emails from Jim
Down
  1. The other half of the SSH connection, or a number for your computer
  2. Something Yogi would stick his hand in, or a virtual trap
  3. Startup companies love this approach to AI
  4. Error said with an accent
  5. Classic encryption algorithm
  6. Magical data center with petabytes of storage
  7. What Mason tried to use to run League of Legends, or how DDOS attacks work
  8. Elon musk's favorite way of storing data

16 Clues: Trusting, in a mutual wayError said with an accentClassic encryption algorithmEverything is stored in theseI keep getting emails from Jim$20/month for full access, or Open__The Chinese have a great one of theseYet another cyber security certificationElon musk's favorite way of storing dataStartup companies love this approach to AI...

Career Choices 2022-05-10

Career Choices crossword puzzle
Across
  1. Man, Principal
  2. Teacher
  3. Sonographer
  4. Electrician
  5. Engineer
Down
  1. Lawyer
  2. Security, Investigator
  3. Work
  4. Accountant
  5. Coach
  6. Tech, Librarian

11 Clues: WorkCoachLawyerTeacherEngineerAccountantSonographerElectricianMan, PrincipalTech, LibrarianSecurity, Investigator

SN33003FP Chapter 1 Crossword 2024-07-03

SN33003FP Chapter 1 Crossword crossword puzzle
Across
  1. Sensors and alert networks that warn of potential attacks.
  2. Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
  3. Highly trained hackers who steal secrets or commit sabotage for their government.
  4. Threats posed by the increasing use of mobile devices to access enterprise information.
  5. Sharing of critical information about serious attacks to prevent similar ones.
  6. Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
  7. Framework for implementing cybersecurity measures within an organization.
  8. Black hat hackers who steal money from consumers and businesses.
  9. Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
  10. Legislation to discourage cyberattacks and punish cyber criminals.
  11. Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
  1. Threats from employees or partners with inside access and knowledge.
  2. Gray hat hackers who protest against political and social ideas by leaking sensitive information.
  3. Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
  4. Teenagers or hobbyists with little skill who hack for fun, not profit.
  5. Threats that exploit weaknesses to gain access to internal resources.
  6. Technology connecting billions of devices to the Internet, affecting data protection needs.
  7. Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.

18 Clues: Sensors and alert networks that warn of potential attacks.Black hat hackers who steal money from consumers and businesses.Legislation to discourage cyberattacks and punish cyber criminals.Threats from employees or partners with inside access and knowledge.Threats that exploit weaknesses to gain access to internal resources....

CTF-CW1 2025-11-14

CTF-CW1 crossword puzzle
Across
  1. When your day job is putting out cyber fires
  2. Turning real secrets into Monopoly money
  3. The digital gremlin living in your files
  4. Your digital 911 squad
  5. The software version of duct tape fixes
  6. Handshakes for computers, but without fingers
  7. Investigation before making a business decision
  8. Tekion’s loyal watchdog—barking at every securty incident
  9. At Tekion, this gatekeeper checks every badge before you log in!
  10. The boundaries of an audit or project
Down
  1. The “odd couple” sitcom: IT and security join forces!
  2. Scrambling your secrets like eggs for breakfast
  3. Fake facts that make AI smart without spilling your secrets.
  4. The puppet master deciding what your info does next.
  5. California’s version of “Don’t touch my data, bro!”
  6. That bedtime read you scroll past before clicking “Accept.”
  7. Tekion’s cyber ninja—silently defending apps from danger as they operate!
  8. Quantitative measure for assessment
  9. A missing or ineffective security measure
  10. Is your defense standing tall or slouching?

20 Clues: Your digital 911 squadQuantitative measure for assessmentThe boundaries of an audit or projectThe software version of duct tape fixesTurning real secrets into Monopoly moneyThe digital gremlin living in your filesA missing or ineffective security measureIs your defense standing tall or slouching?When your day job is putting out cyber fires...

Defensive Concepts & Best Practices 2025-10-07

Defensive Concepts & Best Practices crossword puzzle
Across
  1. CONTROL Restricting system access based on privileges
  2. Process of verifying user identity
  3. RESPONSE Structured approach for handling security events
  4. Authentication without traditional credentials
  5. Secure tunnel for online privacy
  6. Copy of data for recovery purposes
  7. Physical or digital item used to verify identity
Down
  1. HYGIENE Daily security habits to maintain a safe system
  2. ENGINEERING Manipulation of people to gain confidential info
  3. TRUST Security model assuming no user or system is inherently trusted
  4. Security method using more than one verification factor
  5. Regularly updating software to fix vulnerabilities
  6. BREACH Unauthorized disclosure of confidential information
  7. KEY Secret used to decrypt encrypted information
  8. AWARENESS Training users on digital safety

15 Clues: Secure tunnel for online privacyProcess of verifying user identityCopy of data for recovery purposesAWARENESS Training users on digital safetyAuthentication without traditional credentialsKEY Secret used to decrypt encrypted informationPhysical or digital item used to verify identityRegularly updating software to fix vulnerabilities...

Cybersecurity 2024-04-12

Cybersecurity crossword puzzle
Across
  1. Any information connected to a specific individual that can be used to uncover that individual's identity (3)
  2. Word referring to who can use a specific system or view specific data
  3. A security measure that requires two or more proofs of identity to grant you access to a system (3)
  4. A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
  5. The process of translating plain text data (plaintext) into something that appears to be random and meaningless
  6. A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
  7. A type of backup in which an exact replica of data is created and stored in a separate location
  8. A broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems (2)
  9. IoT (3)
  10. Law which upholds the right of the public to access information that the government holds about them (4)
  11. The assurance that sensitive information is accessed only by authorised individuals or entities
  12. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  13. The protection of information that says who we are, what we do and what we believe
  14. is a type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
  15. Type of backup that contains only those files which have been altered since the last backup
  16. attack is carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
  17. Type of cyber attack that uses third-party tools or services to infiltrate a target’s system or network (2)
  18. Divides a computer network into smaller parts. The purpose is to improve network performance and security.
  19. Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
  20. Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
Down
  1. Physical, network, and operational separation of data to keep it safe from both external cyberattacks and internal threats
  2. Type of backup that involves backing up data that was created or changed since the last full backup
  3. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
  4. Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
  5. The process of converting ciphertext (random and meaningless) back to plaintext
  6. The act of compromising digital devices and networks through unauthorised access to an account or computer system
  7. A perceived threat to an organisation that comes from people within the organisation (2)
  8. Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
  9. Word related to data being held on system devices such as hard drives and servers
  10. An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
  11. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  12. Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
  13. Backup Strategy for sending a copy of data to a secondary, off-site, online location
  14. Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
  15. The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
  16. Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
  17. The greatest vulnerability in a system when thinking about cybersecurity
  18. Type of backup that backs up everything since the last back up
  19. A tool used in risk management to assess and prioritise risks based on their likelihood and potential impact (2)
  20. Type of encryption that involves the use of one key for both encryption and decryption

40 Clues: IoT (3)Type of backup that backs up everything since the last back upWord referring to who can use a specific system or view specific dataThe greatest vulnerability in a system when thinking about cybersecurityThe process of converting ciphertext (random and meaningless) back to plaintext...

Cybersecurity Fundamentals Chapter 8 2022-11-08

Cybersecurity Fundamentals Chapter 8 crossword puzzle
Across
  1. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. poorly enforced security policies, no awareness of security
  3. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. open source linux security distribution.
  5. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. includes the users who access the organization's information system.
Down
  1. assess computer, computer systems, networks, or applications for weakness.
  2. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. laws prohibit undesired behaviors.
  5. intercept and log network traffic
  6. provides free analysis and warning service to internet users and organizations.
  7. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.

14 Clues: intercept and log network trafficlaws prohibit undesired behaviors.open source linux security distribution.poorly enforced security policies, no awareness of securityincludes the users who access the organization's information system.assess computer, computer systems, networks, or applications for weakness....

Program Hornet Crossword 2025-11-27

Program Hornet Crossword crossword puzzle
Across
  1. Optimising use of hypervisor technologies
  2. Implementing M365 tools to improve communication
  3. Access the network seamlessly across the globe
  4. Enhance the sharing of data between various applications
  5. Trusted identity to securely access facilities
Down
  1. Modern and interconnected record management solution
  2. Modernising the technologies used to manage ICT operations
  3. Optimising ways of working to speed up ICT delivery
  4. Migrating workloads and data to multi cloud environments
  5. Implementing Service Now capability
  6. Cyber Security data and application layers to strengthen cyber security

11 Clues: Implementing Service Now capabilityOptimising use of hypervisor technologiesAccess the network seamlessly across the globeTrusted identity to securely access facilitiesImplementing M365 tools to improve communicationOptimising ways of working to speed up ICT deliveryModern and interconnected record management solution...

NCPD FCU Security Awareness Puzzle 2016-10-12

NCPD FCU Security Awareness Puzzle crossword puzzle
Across
  1. Your password should be ______ for you to remember, but difficult for anyone else to guess.
  2. Unsolicited email, which often attempts to sell a product or service is known as this.
  3. Always check the senders name as well as the email subject before clicking on the message so you don't get _____ into opening a phishing email.
  4. Software updates installed on your computer are known as this.
  5. This term defines a psychological manipulation of people into performing actions or divulging confidential information.
  6. When reviewing your email, if you don't know the sender of an email, always remember the phrase "When in doubt, throw it ____".
  7. Never open unexpected or _______ looking emails, or click on any questionable links contained within an email.
  8. _________ is one of the most important communication tools used in the work environment.
  9. This term defines an attempt to acquire sensitive information such as usernames, passwords, &/or credit card #'s by masquerading as a legitimate source in an email communication.
  10. A password that is considered to be "strong", is also known as a _______ password.
  11. The month of ______________ is officially known as "National Cyber Security Awareness Month".
  12. NCPD FCU's best line of defense against cyber security threats is ___.
  13. When discarding documents containing sensitive information, it's critical that you ______ them.
  14. The term "shoulder surfing" refers to unauthorized users attempting to view information displayed on your computer _______.
  15. A computer ________can corrupt or delete data, use your email to spread itself to other computers, or even erase everything on 1 or more hard drives.
  16. It's critical that you report all suspicious or unusual PC problems to the __ department ASAP.
Down
  1. When you step _______ from your desk, always lock your computer screen to prevent outsiders from accessing your PC.
  2. The primary goal of Cyber Security training is to promote cyber ____________.
  3. Computer __________ should be password protected & set to automatically activate after a few minutes of mouse or keyboard inactivity.
  4. To keep hard copies of sensitive documents confidential, remember to follow our "Clean Desk _______" & safely store these documents from unauthorized view.
  5. Store documents containing _________ information such as account #'s, SSN#, &/or credit card #'s in a locked area when you leave your desk.
  6. Knowing what to shred & as well as what to keep may help deter ________ theft.
  7. Your network _________ is a form of authentication, which is used to get you logged into the network.
  8. Use this 3 key combination to lock your PC screen each time you leave your desk: <Ctrl> <Alt> & <_________>.
  9. When creating various passwords, it's important for you to make each password slightly _________.
  10. It's a good practice to always _______ longer passwords for added security.
  11. When opening email, be ever cautious of embedded ______ contained in all email messages.
  12. A _________ is someone who seeks and exploits weaknesses in a computer system or computer network.
  13. Be wary of accepting any ___-__ messages on your PC that appear about updating program files such as Flash or Java.
  14. At the end of the workday, always remember to close all applications & log ___ of your computer.
  15. Stay alert so that you don't become a ________ of cyber crime.
  16. Several weeks ago, Yahoo confirmed that hackers had stolen data from at least 500 million of it's ________ accounts.
  17. Employees are reminded to always remain aware in order to minimize your cyber security _____ on all work, mobile & home devices.

33 Clues: Software updates installed on your computer are known as this.Stay alert so that you don't become a ________ of cyber crime.NCPD FCU's best line of defense against cyber security threats is ___.It's a good practice to always _______ longer passwords for added security.The primary goal of Cyber Security training is to promote cyber ____________....

Cyber Security CrossWord 2025-08-20

Cyber Security CrossWord crossword puzzle
Across
  1. Who should you reach out to when you have security-related questions?
  2. What type of attack relies on deceiving you by pretending to be someone you know or trust?
  3. What is the name of the tool you use to connect securely to the company network remotely?
  4. Who is the newest member of the security team?
  5. How often must employees reset their passwords according to policy?
  6. What compliance standard governs how we protect payment card data?
  7. What is the domain name of our internal emails?
  8. What is the minimum length of our password according to policy?
Down
  1. What do we call an email scam that tricks people into clicking malicious links?
  2. What type of data must be protected under PCI rules?
  3. What tool on your company laptop automatically scans for and blocks malware?
  4. What do we call the use of multiple methods of authentication to verify identity?
  5. What is the guest access system?
  6. Who is the head of our SiriusXM security team?
  7. What tool do employees use for Single Sign-On to company applications?
  8. What should you always do if you suspect a security incident?
  9. What kind of attack locks files until money is paid?
  10. What should you do when you step away from your computer?

18 Clues: What is the guest access system?Who is the head of our SiriusXM security team?Who is the newest member of the security team?What is the domain name of our internal emails?What type of data must be protected under PCI rules?What kind of attack locks files until money is paid?What should you do when you step away from your computer?...

Eimears dm litereracy crossword 2021-11-09

Eimears dm litereracy crossword crossword puzzle
Across
  1. photos
  2. chatting with friends
  3. Celebrity magazine
  4. devices
  5. time
  6. Fifa
  7. Ipad kids
  8. Being mean
  9. dancing
Down
  1. Be safe people
  2. Snap streak
  3. texting, playing games
  4. Mams and dads app
  5. fun to play
  6. Be safe
  7. Online
  8. Online
  9. Talking and playing games with peopl
  10. to stay in touch
  11. affecting your time awareness

20 Clues: timeFifaphotosOnlineOnlineBe safedevicesdancingIpad kidsBeing meanSnap streakfun to playBe safe peopleto stay in touchMams and dads appCelebrity magazinechatting with friendstexting, playing gamesaffecting your time awarenessTalking and playing games with peopl

Cybersecurity 2024-03-14

Cybersecurity crossword puzzle
Across
  1. Data Hostage
  2. Data Recovery
  3. Logs, Activity Tracking
  4. Unique Authentication
  5. Fake Identity
  6. Secure Data
  7. Virus Threats
  8. Isolated Testing
  9. Layered Authentication
  10. Fake Emails
  11. Engineering, Manipulative Tactics
Down
  1. Unpatched Vulnerability
  2. Security, Device Protection
  3. Fake emails
  4. Network Protection
  5. Extra Verification
  6. Insurance, Risk Coverage
  7. Secure Connection
  8. Network Overload
  9. Software Updates

20 Clues: Fake emailsSecure DataFake EmailsData HostageData RecoveryFake IdentityVirus ThreatsIsolated TestingNetwork OverloadSoftware UpdatesSecure ConnectionNetwork ProtectionExtra VerificationUnique AuthenticationLayered AuthenticationUnpatched VulnerabilityLogs, Activity TrackingInsurance, Risk CoverageSecurity, Device Protection...

GS Lecture 7 2025-02-25

GS Lecture 7 crossword puzzle
Across
  1. An emerging _ revolution is at hand, and is expected to revolutionise sensing, imaging, precise positioning, navigation, timing, communications, computing, etc...
  2. _ system in the Israel-Gaza conflict uses data to rank people.
  3. So far, despite the hype, there are no clear indications of a possible _ cyber war.
  4. The US first used satellites in the _ war.
  5. Groups such as _ use digital technologies to recruit, train, fundraise and purchase supplies.
  6. The US maintains _ space programmes.
  7. Cyber operations can also be used during peacetime.
  8. Comparing cyber vs. non-cyber: Cash payments vs. _ transfers.
  9. After 2022, this country emerged as the 12th biggest cyber power.
  10. The _ use of space became more central to war fighting during the 1991 Gulf War.
  11. Issue of translation: there ar ebig _ in terminology and definitions, e.g. between the US, Russia, and China.
  12. Hamas/Iran/sympathisers launch cyber attacks on Israel (minimal impact).
  13. Russia attacked various targets in this country (such as government websites, denial of service, banks, and media organisations) following a decision by the (country's) government to move Soviet-era statue and graves.
  14. Terrorist attacks produce shock (explosions, casualties), whereas cyber operations take time, money, and _ skills.
  15. 11-day bombing campagin against Hamas labelled Israel's '_'.
  16. This country ranks as the 3rd biggest cyber power, after the US and China.
  17. In the Ukraine war, AI is used to _ and analyse open-source data, such as social media content to identify Russian soldiers, weapons, systems, units or their movements.
  18. Advances in AI and Quantum tech are likely to have important implications for the military in decades ahead but _ to completely change the nature of war and conflict.
  19. "_ is best understood as a descriptive prefix, an adjective conveying the digital or computer-like nature of the noun to which it is attached."
  20. All _ conflicts have a cyber dimension.
  21. AI can support decision-making through virtual _.
  22. "[Used by state and non-state actors] Hostile actions in cyberspace tha thave effects that amplify or are equivalent to major kinetic violence."
  23. A group named 'Guardians of the Peace' from this country launched a cyber attack against Sony in November 2014.
  24. "A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers."
  25. Russian cyberattacks _ to have decisive impact in support of invasion.
  26. Satellite reconnaissance completely changes the nuclear (and international) landscape - It provides stability in arms races, facilitates arms control, and reduces _ of a sneak attack.
  27. There is no indication that any single domain is '_' - e.g. a 'victory' in cyberspace does not equate with a victory in war.
  28. Broad security _ of war, deterrence, etc. can be applied to cyberspace.
  29. Rules of the road/laws of cyber war are _ to establish, making it less of a preferable choice for governments (they prefer to choose methods that they understand better).
Down
  1. _' use of cyber-acquired intel helps with attack planning.
  2. The number of satellites has exponentially _ [increased/decreased] in recent years.
  3. Israel's Iron Dome system ignores incoming threats if it determines they will land in _ areas.
  4. "Hack-and-_": The name of a cyber attack by Russia on the US during the 2016 US Presidential Election.
  5. Stakeholders in cyber security include _, government agencies, and civil society.
  6. So far, all cyber attacks have had _ durations.
  7. _ groups focus on what is cheap, noticeable, and deadly.
  8. Ai can _ the adversary's AI systems.
  9. Cyber operations are usually launched in tandem with _ military operations (e.g. during Russo-Georgian war).
  10. Ukraine's IT _ causes some disruption to Russian society but strategic impact is marginal.
  11. In the Ukraine war, commercial satellite _ delivers crucial intelligence to Ukraine.
  12. AI can help create/detect fake _ and deep fakes.
  13. AI can help create automated targeting and behavioural _.
  14. Quantum sensors can allow underground mapping, see around corners, and make oceans _ (for detecting submarines).
  15. Ukraine's IT Army was created on February 26th 2022 as a part of Ministry of Digital _.
  16. Cyber operations are _ compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) - more than half of cyber operations are aimed at collecting information or disseminating information.
  17. The main emphasis of government cyber operations, making adversary aware of presence.
  18. Refers to the use of cyber operations to deter actions within other domains of conflict or the deterrence of adversary cyberspace operations within the cyber domain.
  19. This country's cyberattacks on Hamas are limited because it does not rely much on the internet.
  20. In 2019, NATO adopted a _ and recognised space as a new operational domain, alongside air, land, maritime, and cyberspace.
  21. Cyber war involves direct attacks in cyberspace that are not per se aimed at military forces, but are directed at opponents' _ enabled systems in general."
  22. _ satellites provide connectivity for the Ukrainian military and are vital for drone strikes.
  23. Israel can turn on/off internet connectivity in _.
  24. Ukrainian cyber defences were _ due to advances in AI-enhanced threat intelligence and the quick distribution of protective software to cloud services and other computer networks.
  25. Cyberspace can be viewed as its own domain but it rarely exists _ from other domains. This is also true of the space domain.

54 Clues: The US maintains _ space programmes.Ai can _ the adversary's AI systems.All _ conflicts have a cyber dimension.The US first used satellites in the _ war.So far, all cyber attacks have had _ durations.AI can help create/detect fake _ and deep fakes.AI can support decision-making through virtual _.Israel can turn on/off internet connectivity in _....

профессии 2023-04-09

профессии crossword puzzle
Across
  1. Specialist in designing systems for collecting and processing large arrays of data received from the Internet, and developing analytical models and interfaces for assembling them.
  2. Specialist engaged in shaping regulatory interaction on the Internet (including virtual worlds) and devising legal protection systems for people and property on the Internet (including virtual property).
  3. Advisor on the information security of Internet users.
  4. An employee whose job responsibilities include ensuring the regular operation of a fleet of computer equipment, networks and software.
  5. Specialist investigating cyber crimes
  6. A specialist in programming, that is, the creation of computer programs.
  7. This professional develops user-friendly, adaptive and safe interfaces for equipment, devices and software of various levels.
  8. Specialist in the information security of technological processes at automated industrial facilities.
Down
  1. Professional who designs interfaces compatible with the human nervous system, for controlling computers and household and industrial robots, taking into account the psychological and physiological traits of the user.
  2. Qualified specialist for a wide spectrum of operations involving data processing systems.
  3. Specialist tasked with dealing with the lower levels of information infrastructure, ensuring the security of dedicated network segments at these levels
  4. Professional who develops linguistic systems for semantic translation (translation taking into account context and shades of meaning) and text information processing (including semantic search on the Internet).
  5. Specialist in software development. Audits complex IT systems processing data and making decisions based on such data.
  6. Specialist in communications with end users of IT products and promotion of new solutions to groups having a conservative attitude towards advanced technology.
  7. A specialist who creates ready-made IT solutions from prebuilt templates using a graphical user interface instead of classical programming.

15 Clues: Specialist investigating cyber crimesAdvisor on the information security of Internet users.A specialist in programming, that is, the creation of computer programs.Qualified specialist for a wide spectrum of operations involving data processing systems....

T Level Paper 2 Revision 2025-03-25

T Level Paper 2 Revision crossword puzzle
Across
  1. A type of malware that encrypts files and demands payment
  2. A weakness in a system that can be exploited by a threat
  3. A virtual space where users interact with applications and services over the internet
  4. A network type that allows remote access to a secure private system
  5. A type of cloud service that provides a fully managed computing environment
  6. A security measure that inspects and filters network traffic
  7. A key concern when deploying applications in a cloud environment
  8. A form of cyber attack where an attacker tricks users into providing sensitive information
Down
  1. The process of encoding data to prevent unauthorized access
  2. A type of cyber attack that floods a network with traffic
  3. A model of computing where resources are dynamically allocated and managed as needed
  4. The ability of a system to handle increasing workloads by adding resources
  5. A security process that verifies a user's identity
  6. A legal framework that regulates personal data protection

14 Clues: A security process that verifies a user's identityA weakness in a system that can be exploited by a threatA type of malware that encrypts files and demands paymentA type of cyber attack that floods a network with trafficA legal framework that regulates personal data protectionThe process of encoding data to prevent unauthorized access...

cyber-security-560 2024-09-05

cyber-security-560 crossword puzzle
Across
  1. Method of gaining access to accounts by systematically trying all possible password combinations.
  2. Update to software that fixes vulnerabilities or bugs to improve security and performance.
  3. Security process requiring two different forms of identification for access. (sigla)
  4. Vulnerability in software that is exploited before the developer has a chance to fix it.
  5. Provides secure, encrypted connections over less secure networks.
  6. Software designed to detect and remove malware from computers.
  7. Software that secretly monitors and collects information about users without their knowledge.
  8. System that monitors network traffic for suspicious activities or policy violations.
  9. General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
  10. Software or hardware that records every keystroke made on a computer.
Down
  1. Attack that overloads a system, making it unavailable to legitimate users.
  2. The process of converting data into a coded form to prevent unauthorized access.
  3. Hidden way to bypass normal authentication to gain unauthorized access to a system.
  4. Type of malware that encrypts data and demands a ransom for its release.
  5. Software or hardware that monitors and controls incoming and outgoing network traffic.
  6. Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  7. Network of infected computers that can be remotely controlled by a cybercriminal.
  8. Malware disguised as legitimate software but allows unauthorized access to a user’s system.

18 Clues: Software designed to detect and remove malware from computers.Provides secure, encrypted connections over less secure networks.Software or hardware that records every keystroke made on a computer.Type of malware that encrypts data and demands a ransom for its release.Attack that overloads a system, making it unavailable to legitimate users....

Brain-Riddle Round 2 2025-02-11

Brain-Riddle Round 2 crossword puzzle
Across
  1. A team that monitors and defends against cyber threats.
  2. The data sent back from a server after a request.
  3. A method of hiding data within other files.
  4. A file containing code for automation.
  5. A program where hackers get paid for finding security flaws.
Down
  1. A security feature that controls web resource access.
  2. Temporary storage that speeds up data retrieval.
  3. A remote computing device that communicates with a network.
  4. A temporary interaction between a user and a website.
  5. A network utility used to test connectivity.
  6. A lightweight data format used for data exchange.
  7. A type of attack that tricks users into executing unwanted actions.
  8. The part of a cyber attack that carries malicious code.
  9. A process of converting data into a fixed-size value.
  10. A communication endpoint for network connections.

15 Clues: A file containing code for automation.A method of hiding data within other files.A network utility used to test connectivity.Temporary storage that speeds up data retrieval.The data sent back from a server after a request.A lightweight data format used for data exchange.A communication endpoint for network connections....

CyberSecurity 2025-05-19

CyberSecurity crossword puzzle
Across
  1. Malware that disguises itself as legitimate software (6)
  2. A team or center that monitors and defends against cyber threats (3)
  3. A person who gains unauthorized access to systems (6)
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
  5. Software update to fix vulnerabilities (5)
  6. Malicious code that replicates itself by attaching to files (5)
  7. Malware that encrypts files and demands payment to restore access (10)
Down
  1. Technique used to convert data into unreadable form for security (10)
  2. A network of infected devices used for cyber attacks (6)
  3. Software that secretly gathers user information without consent (7)
  4. Security system that monitors and controls incoming and outgoing network traffic (8)
  5. Security method requiring multiple verification steps (3)

12 Clues: Software update to fix vulnerabilities (5)A person who gains unauthorized access to systems (6)Malware that disguises itself as legitimate software (6)A network of infected devices used for cyber attacks (6)Security method requiring multiple verification steps (3)Malicious code that replicates itself by attaching to files (5)...

CYBER SECURITY 2022-11-01

CYBER SECURITY crossword puzzle
Across
  1. WEB
  2. VIRUS
  3. CYBER
Down
  1. LA
  2. BULLYING
  3. SECURITY

6 Clues: LAWEBVIRUSCYBERBULLYINGSECURITY

Cyber Security 2017-06-30

Cyber Security crossword puzzle
Across
  1. ancient
  2. a computer virus
  3. a software that can damage your computer system
  4. infects the computer
  5. helps you
  6. Risks can hurt you
Down
  1. can take your personal information
  2. Network online websites
  3. it helps you protect a secret
  4. Theft takes your personality
  5. connected to the internet

11 Clues: ancienthelps youa computer virusinfects the computerRisks can hurt youconnected to the internetNetwork online websitesit helps you protect a secretTheft takes your personalitycan take your personal informationa software that can damage your computer system

Cyber Security 2022-11-28

Cyber Security crossword puzzle
Across
  1. program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself.
  2. a piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions.
  3. Worms cause problems by using up network bandwidth and therefore slowing down the network
  4. a large collection of malware-infected devices (zombies).
  5. type of malicious software designed to harm or exploit any programmable device, service or network.
  6. network security device that monitors and filters incoming and outgoing network traffic
Down
  1. this locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. unwanted software that monitors and gathers information on a person and how they use their computer.
  3. over 50% of all internet traffic is
  4. engineering manipulating, influencing, or deceiving you in order to gain control over your computer system
  5. infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.

11 Clues: over 50% of all internet traffic isa large collection of malware-infected devices (zombies).network security device that monitors and filters incoming and outgoing network trafficWorms cause problems by using up network bandwidth and therefore slowing down the network...

Cyber-Security 2022-11-28

Cyber-Security crossword puzzle
Across
  1. locks computer and encrypts files
  2. Malicious software that self-replicates
  3. Gaining unauthorised access to a computer
  4. malware hidden as a useful function
  5. Someone trying to hack a computer
Down
  1. Safety online
  2. Email from 'reputable source' with a link
  3. spread through the network + use resources
  4. To help prevent unauthorised access
  5. makes malicious ads display when online
  6. Monitors how people use their device

11 Clues: Safety onlinelocks computer and encrypts filesSomeone trying to hack a computerTo help prevent unauthorised accessmalware hidden as a useful functionMonitors how people use their devicemakes malicious ads display when onlineMalicious software that self-replicatesEmail from 'reputable source' with a linkGaining unauthorised access to a computer...

Cyber security 2023-04-18

Cyber security crossword puzzle
Across
  1. month of arrest
  2. Distributed Denial of Service
  3. who took over
  4. attacker how did they attack
  5. set of Security to stop incoming intruders
  6. set of computer that are all linked together
  7. type of cybercrime
Down
  1. cybercrime
  2. demand for payment to remove the virus
  3. using a PC to mine for crypto
  4. who was arrested
  5. assaults attacks on the web

12 Clues: cybercrimewho took overmonth of arrestwho was arrestedtype of cybercrimeassaults attacks on the webattacker how did they attackDistributed Denial of Serviceusing a PC to mine for cryptodemand for payment to remove the virusset of Security to stop incoming intrudersset of computer that are all linked together

Küberturvalisus 2020-04-05

Küberturvalisus crossword puzzle
Across
  1. Klaviatuur
  2. Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata.
  3. Lehekülg, kust saab infot ohutult interneti kasutamise kohta.
  4. ....... telefoni number on 116111.
Down
  1. Teise inimese identiteedi volituseta kasutamine.
  2. Salasõna
  3. Cyber security
  4. Programm, mis nakatab sinu arvutit.
  5. Computer security
  6. Information security

10 Clues: SalasõnaKlaviatuurCyber securityComputer securityInformation security....... telefoni number on 116111.Programm, mis nakatab sinu arvutit.Teise inimese identiteedi volituseta kasutamine.Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata.Lehekülg, kust saab infot ohutult interneti kasutamise kohta.

Second 2025-08-13

Second crossword puzzle
Across
  1. Force Attempting every possible password combination
  2. Person or group harassing others online
  3. Software designed to secretly monitor your activity
  4. Malicious code hidden inside another program
  5. Engineering Technique to trick people into revealing confidential information
  6. Security technique that converts data into unreadable form
  7. Hygiene Set of online habits to maintain security and privacy
Down
  1. Copy of important files kept separately for safety
  2. Horse Malicious program disguised as legitimate software
  3. Program that records every keystroke you type
  4. Fraud tactic to make a site look like another
  5. Official Indian body responding to cybersecurity incidents
  6. Injection Data theft by manipulating a website’s database queries
  7. Act 2000 Law in India dealing with cyber crimes
  8. Cyber attack exploiting a vulnerability before it’s fixed
  9. Device or software used to secure online privacy by masking IP

16 Clues: Person or group harassing others onlineMalicious code hidden inside another programProgram that records every keystroke you typeFraud tactic to make a site look like anotherAct 2000 Law in India dealing with cyber crimesCopy of important files kept separately for safetySoftware designed to secretly monitor your activity...

Cyber-security 2021-01-17

Cyber-security crossword puzzle
Across
  1. refers to the security of a computer or computer system
  2. authentication mechanisms, access channels and systems all have to work properly
  3. demands a ransom from you to get things back on track.
  4. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
  1. ensure that information is hidden from people unauthorised to access it.
  2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
  3. helps hackers spy on systems and their users.
  4. self-replicating and spreads without end-user action, causing real devastation.
  5. ensuring that data has not been tampered with and, therefore, can be trusted.
  6. are attempts to expose users to unwanted, potentially malicious advertising.
  7. malicious instructions that appear as legitimate programs.

11 Clues: helps hackers spy on systems and their users.demands a ransom from you to get things back on track.refers to the security of a computer or computer systemmalicious instructions that appear as legitimate programs.ensure that information is hidden from people unauthorised to access it....

Cyber Security 2023-09-14

Cyber Security crossword puzzle
Across
  1. A scam where attacks deceive people into revealing data
  2. system designed to defend your data
  3. allows you to connect to internet
  4. a modern digital electronic device
  5. defense
Down
  1. a encrypted connection over the internet from a device to network
  2. data or program use to operate computers
  3. hiddden or secret word
  4. a program that infect a computer
  5. A collections of continuous value that conveys information
  6. a person who uses computers to gain unauthorized access to data.

11 Clues: defensehiddden or secret worda program that infect a computerallows you to connect to interneta modern digital electronic devicesystem designed to defend your datadata or program use to operate computersA scam where attacks deceive people into revealing dataA collections of continuous value that conveys information...

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. Encoding data with a password or key
  2. a hardware or software network security system
  3. protecting an account with something you know and something you have or are
  4. secures your account
  5. a network created using the world wide web
Down
  1. the type of malware that WannaCry is
  2. What CCPA and GDPR are trying to protect
  3. A type of malware that replicates itself
  4. malicious software that acts legitimately but has underlying malicious intent
  5. the process of making copies of data to use when original files are lost, destroyed or corrupted
  6. the act of sending false emails to unsuspecting people for fraudulent purposes

11 Clues: secures your accountthe type of malware that WannaCry isEncoding data with a password or keyWhat CCPA and GDPR are trying to protectA type of malware that replicates itselfa network created using the world wide weba hardware or software network security systemprotecting an account with something you know and something you have or are...

Cyber security 2017-05-12

Cyber security crossword puzzle
Across
  1. Exposes any attempts by attackers to overcome security controls.
  2. Natural disasters such as floods.
  3. Countries always spy on each other.
  4. The level of assurance that the data will be available to those who need it when they want it.
  5. A person who uses existing codes to hack into computers.
  6. The real name of our cyber security teacher.
Down
  1. A method that is used to test the security of software.
  2. Access must be restricted to those authorised to view the data in question.
  3. An individual who gains unauthorised access to a computer system or network.
  4. The level of assurance as to the accuracy and trustworthiness of the data.
  5. Software designed to prevent, detect and eradicate malicious software.

11 Clues: Natural disasters such as floods.Countries always spy on each other.The real name of our cyber security teacher.A method that is used to test the security of software.A person who uses existing codes to hack into computers.Exposes any attempts by attackers to overcome security controls....

Cyber Security 2024-09-04

Cyber Security crossword puzzle
Across
  1. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website.
  2. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge).
  3. A location on the internet where you can save your data (rather than on your computer or device)
  4. Getting into someone else’s computer or device without their permission.
  5. A way to stop hackers getting into your accounts, even if they know your password.
Down
  1. You need to create one of these to access services on the internet (such as email and shopping).
  2. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of.
  3. Nasty software that can have a bad impact on your device or computer
  4. Unwanted emails or messages that usually try to sell you something.
  5. A copy of the information held on a device (such as photos and documents) which is stored somewhere else
  6. A sequence of characters (or words) used to stop criminals from accessing your accounts.

11 Clues: Unwanted emails or messages that usually try to sell you something.Nasty software that can have a bad impact on your device or computerGetting into someone else’s computer or device without their permission.A way to stop hackers getting into your accounts, even if they know your password....

Cyber security 2022-11-18

Cyber security crossword puzzle
Across
  1. unwanted software that monitors and gathers information on a person and how they use their computer
  2. when human users of a system are tricked into providing confidential information
  3. software designed to gain access to your computer with malicious intent
Down
  1. automated programs that repeat tasks repeatedly botnet a large collection of malware-infected devices (zombies)
  2. measures put in place to make it harder for attackers
  3. checks incoming and outgoing network
  4. piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions
  5. an attack using botnet
  6. attach themselves to files and self-replicate
  7. infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
  8. software that scans any file that is able to execute code

11 Clues: an attack using botnetchecks incoming and outgoing networkattach themselves to files and self-replicatemeasures put in place to make it harder for attackerssoftware that scans any file that is able to execute codesoftware designed to gain access to your computer with malicious intent...

Cyber Security 2023-05-31

Cyber Security crossword puzzle
Across
  1. Original lead singers birth city
  2. What tool?
  3. I'm looking for a metal?
  4. Original band home country
  5. Original band home country
Down
  1. Guitarist's stage name
  2. Original artist is buried here
  3. What kind of car?
  4. Original singers birthname
  5. Original singers debut album
  6. What time of day?
  7. Last name of the guy Chaim Witz created this band with

12 Clues: What tool?What kind of car?What time of day?Guitarist's stage nameI'm looking for a metal?Original singers birthnameOriginal band home countryOriginal band home countryOriginal singers debut albumOriginal artist is buried hereOriginal lead singers birth cityLast name of the guy Chaim Witz created this band with

Cybersecurity 2024-04-12

Cybersecurity crossword puzzle
Across
  1. Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
  2. Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
  3. Word related to data being held on system devices such as hard drives and servers
  4. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  5. Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
  6. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
  7. Backup Strategy for sending a copy of data to a secondary, off-site, online location
  8. The process of translating plain text data (plaintext) into something that appears to be random and meaningless
  9. Type of encryption that involves the use of one key for both encryption and decryption
  10. Type of backup that backs up everything since the last back up
  11. Type of backup that involves backing up data that was created or changed since the last full backup
  12. Law which upholds the right of the public to access information that the government holds about them (4)
  13. Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
  14. Type of backup that contains only those files which have been altered since the last backup
  15. Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
  16. Type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
  17. The act of compromising digital devices and networks through unauthorised access to an account or computer system
Down
  1. An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
  2. The protection of information that says who we are, what we do and what we believe
  3. Any information connected to a specific individual that can be used to uncover that individual's identity (3)
  4. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  5. The assurance that sensitive information is accessed only by authorised individuals or entities
  6. A perceived threat to an organisation that comes from people within the organisation (2)
  7. A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
  8. Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
  9. The greatest vulnerability in a system when thinking about cybersecurity
  10. Attack carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
  11. Divides a computer network into smaller parts. The purpose is to improve network performance and security.
  12. The process of converting ciphertext (random and meaningless) back to plaintext
  13. The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
  14. A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
  15. IoT (3)
  16. A type of backup in which an exact replica of data is created and stored in a separate location
  17. Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key

34 Clues: IoT (3)Type of backup that backs up everything since the last back upThe greatest vulnerability in a system when thinking about cybersecurityThe process of converting ciphertext (random and meaningless) back to plaintextWord related to data being held on system devices such as hard drives and servers...

Cyber Security 2022-02-10

Cyber Security crossword puzzle
Across
  1. prevents a local computer from using a URL or an IP address to gain access to the server
  2. Legacy firewall
  3. Point to point
  4. blocks cookies
  5. blocks internet requests from unknown sources
Down
  1. block multicast
  2. Layer 2 tunneling protocol pass through
  3. Passthrough for ispec
  4. blocks java
  5. blocks ActiveX
  6. blocks proxy servers

11 Clues: blocks javablocks ActiveXPoint to pointblocks cookiesblock multicastLegacy firewallblocks proxy serversPassthrough for ispecLayer 2 tunneling protocol pass throughblocks internet requests from unknown sourcesprevents a local computer from using a URL or an IP address to gain access to the server

Cyber Security 2026-01-28

Cyber Security crossword puzzle
Across
  1. millions of computers and devices all linked together to allow them to communicate
  2. the term for all of the different types of program that are written to
  3. A person who tries to gain access to a computer system without permission
  4. a program written to cause damage to the programs installed on a computer
  5. |The process you go through to gain access to a computer system
  6. a set of letters or characters that allow you to access a computer system
Down
  1. When you write something in a secret code so nobody else can read it
  2. facts on the Internet that aren't true and are designed to cause people to worry
  3. The computers in one place that are connected together to share devices and information
  4. word to describe a computer system that nobody can access without permission
  5. A program designed to track down and remove dangerous programs on your computer

11 Clues: |The process you go through to gain access to a computer systemWhen you write something in a secret code so nobody else can read itthe term for all of the different types of program that are written toA person who tries to gain access to a computer system without permissiona program written to cause damage to the programs installed on a computer...

Cyber security 2021-04-15

Cyber security crossword puzzle
Across
  1. person who tries to gain unauthorised access to a computer
  2. unauthorised access to a computer.
  3. techniques that rely on measurable physical characteristics (eg fingerprint or iris) that can be automatically checked
  4. software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them
  5. program secretly installed on a computer to automatically collect information about the user over a period of time
  6. that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details
Down
  1. that causes pop-ups or windows that will not close
  2. attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details
  3. cyberattack that redirects a user from a genuine website to a fake one
  4. that appears legitimate, but performs some malicious activity when it is run
  5. computer program designed to replicate and damage other computer systems and software.

11 Clues: unauthorised access to a computer.that causes pop-ups or windows that will not closeperson who tries to gain unauthorised access to a computercyberattack that redirects a user from a genuine website to a fake onethat appears legitimate, but performs some malicious activity when it is run...

Cyber security 2022-11-28

Cyber security crossword puzzle
Across
  1. Methods to help yourself be safe online
  2. People who hack with little knowledge
  3. Malware disguised as something useful ie game
  4. Watching a victim enter sensitive data
Down
  1. Example of ransom wars attack
  2. Self replicating software
  3. Email disguised as a reputable source
  4. Entering in different passwords for luck
  5. Flooding a targeted machine with requests
  6. Creating a scenario to make the victim panic
  7. These use the network and it’s resources

11 Clues: Self replicating softwareExample of ransom wars attackEmail disguised as a reputable sourcePeople who hack with little knowledgeWatching a victim enter sensitive dataMethods to help yourself be safe onlineEntering in different passwords for luckThese use the network and it’s resourcesFlooding a targeted machine with requests...

Cyber Security 2024-02-05

Cyber Security crossword puzzle
Across
  1. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
  2. Gaining unauthorised access to or control of a computer system.
  3. Generator Attack An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
  4. Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password).
  5. Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.
  6. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
Down
  1. Engineering A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
  2. Computer Misuse Act Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
  3. Hacking Performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
  4. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  5. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.

11 Clues: Gaining unauthorised access to or control of a computer system.Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password)....

Cyber Security 2025-01-14

Cyber Security crossword puzzle
Across
  1. Refers to legal property rights of a person over creations (artistic/commercial) of his/her mind
  2. Virtual diaries created by people to share their hobbies, thought with like minded people
  3. It is called as network of networks
  4. Safe and responsible use of Internet to safeguard one's information
  5. Person who purposely posts opposing, sarcastic, insulting comments about something/someone
  6. Emails sent by people which is fake/not genuine
Down
  1. Usage or imitation of the language and thoughts of another person projected as own's original work
  2. It is also called as a digital dossier
  3. Hacking done for national security and creating safer systems
  4. Criminals portray incorrect details as an employer
  5. Bulk mail sent by identified or unidentified source

11 Clues: It is called as network of networksIt is also called as a digital dossierEmails sent by people which is fake/not genuineCriminals portray incorrect details as an employerBulk mail sent by identified or unidentified sourceHacking done for national security and creating safer systemsSafe and responsible use of Internet to safeguard one's information...

Cyberattack Response 2024-06-28

Cyberattack Response crossword puzzle
Across
  1. Information harm
  2. Call for action
  3. Act of bringing attention
  4. Prevent further damage
  5. Combating hate organization
  6. Dangerous falsehoods
  7. Siddhayoga group action
  8. To mislead
  9. Urgent message
Down
  1. Legal action group
  2. To observe or see
  3. Online security threat
  4. Online keyword suggestions
  5. Essential response
  6. Search engine
  7. Sudden, harmful event
  8. Malicious software
  9. Involuntary reaction
  10. Organized group
  11. To act with purpose

20 Clues: To misleadSearch engineUrgent messageCall for actionOrganized groupInformation harmTo observe or seeLegal action groupEssential responseMalicious softwareTo act with purposeInvoluntary reactionDangerous falsehoodsSudden, harmful eventOnline security threatPrevent further damageSiddhayoga group actionAct of bringing attention...

TEKA TEKI SILANG P5 2023-10-04

TEKA TEKI SILANG P5 crossword puzzle
Across
  1. Sikap yang dapat dimunculkan dalam mengantisipasi kejahatan di dunia maya
  2. Ancaman yang dapat terjadi di media akibat Cyber crime
  3. Aspek dalam cyber security
  4. Bentuk perundungan di dunia maya
  5. Salah satu jaringan yang kadang dimanfaatkan oleh hacker
Down
  1. Data informasi probadi yang harus dilindungi
  2. Salah satu kerugian dari kejahatan dunia maya
  3. Bentuk dari Cyber Crime
  4. Jaringan komunikasi global
  5. Salah satu kejahatan yang menggunakan kemajuan teknologi.

10 Clues: Bentuk dari Cyber CrimeAspek dalam cyber securityJaringan komunikasi globalBentuk perundungan di dunia mayaData informasi probadi yang harus dilindungiSalah satu kerugian dari kejahatan dunia mayaAncaman yang dapat terjadi di media akibat Cyber crimeSalah satu jaringan yang kadang dimanfaatkan oleh hacker...

IGYUK Angol rejtvény 2024./VII-VIII. - Security 2024-08-29

IGYUK Angol rejtvény 2024./VII-VIII. - Security crossword puzzle
Across
  1. Closed ... Television, or CCTV for short
  2. ...security = The field of security in the virtual world
  3. A piece of document describing past errors and events in a system
  4. A short phrase or combination of characters used to restrict access to information
  5. A system generating loud noise when triggered
Down
  1. The act of observing an area or person for security reasons
  2. A device used to restrict access to doors, boxes, or containers. Needs a key.
  3. The act of entereing one's property to steal things
  4. Computer tool to keep out cyber attacks
  5. A person in charge of protecting a place, a thing or a person

10 Clues: Computer tool to keep out cyber attacksClosed ... Television, or CCTV for shortA system generating loud noise when triggeredThe act of entereing one's property to steal things...security = The field of security in the virtual worldThe act of observing an area or person for security reasons...

E-Safety Crossword Puzzle 2021-02-14

E-Safety Crossword Puzzle crossword puzzle
Across
  1. security measure
  2. ..line
  3. social .....
  4. laptop
Down
  1. backrub
  2. World Wide Web
  3. safari
  4. internet
  5. Online bullying
  6. ...... media

10 Clues: safari..linelaptopbackrubinternetsocial ........... mediaWorld Wide WebOnline bullyingsecurity measure

Cyber Security ACMH 2018-09-21

Cyber Security ACMH crossword puzzle
Across
  1. Malware that is loaded onto a computer and then run without the user's knowledge or knowledge of it's full effects.
  2. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
  3. Something that can cause harm to a system or organization.
  4. The transformation of data to hide its information content.
  5. Malware that passes information about a computer user's activities to an external party.
  6. Intrusion detection system that also blocks unauthorized access when detected.
  7. The process to verify that someone is who they claim to be when they try to access a computer or online service.
Down
  1. Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.
  2. Obtaining evidence of identity by two independent means.
  3. Software intended to infiltrate and damage or disable computers.
  4. The process of identifying, analyzing and evaluating risk.
  5. A flaw or weakness that can be used to attack a system or organization.
  6. Method used by criminals to try to obtain financial or other confidential information from internet users, usually through email.
  7. A secret series of characters used to authenticate a person's identity.
  8. Malware that replicates itself so it can spread to infiltrate other computers.
  9. Someone who violates computer security for malicious reasons, kudos or personal gain.
  10. Something that could cause an organization no to meet one of its objectives

17 Clues: Obtaining evidence of identity by two independent means.The process of identifying, analyzing and evaluating risk.Something that can cause harm to a system or organization.The transformation of data to hide its information content.Software intended to infiltrate and damage or disable computers....

Science and technology 2023-11-19

Science and technology crossword puzzle
Across
  1. - Celestial study
  2. - Step-by-step process
  3. - Disease prevention
  4. - Global network
  5. - Entire DNA set
Down
  1. - Basic particle
  2. - Biological technology
  3. - Tiny technology
  4. - Energy from the sun
  5. - Orbital communication
  6. - Digital security
  7. - Physics realm
  8. - Genetic code

13 Clues: - Genetic code- Physics realm- Basic particle- Global network- Entire DNA set- Tiny technology- Celestial study- Digital security- Disease prevention- Energy from the sun- Step-by-step process- Biological technology- Orbital communication

Cyber Cross 2025-03-18

Cyber Cross crossword puzzle
Across
  1. Protects your online privacy using encrypted tunnels - initials (3)
  2. A cyber security measure - Two-factor _ (14)
  3. A company famous for Windows (9)
  4. _ Horse - Malware that tricks users by pretending to be something else (6)
  5. The virtual world, or a digital universe? (9)
  6. Steve Jobs' famous company (5)
  7. A mathematical step-by-step method to solve a problem (9)
  8. The process of converting information into a code to prevent unauthorised access (10)
Down
  1. Angling for a deceptive cyber attack (8)
  2. Web pages love to leave these sweet things behind on your device (7)
  3. _ Learning - teaching computers to improve from experience (8)
  4. You can buy one-of-a-kind digital art with these – initials (3)
  5. Security barrier, but not the brick kind! (8)
  6. TURING This famous figure cracked the Enigma code (4,6)
  7. Competitive gaming (7)
  8. A hidden part of the internet, often used for illegal activities (4,3)

16 Clues: Competitive gaming (7)Steve Jobs' famous company (5)A company famous for Windows (9)Angling for a deceptive cyber attack (8)A cyber security measure - Two-factor _ (14)Security barrier, but not the brick kind! (8)The virtual world, or a digital universe? (9)TURING This famous figure cracked the Enigma code (4,6)...

IoT Puzzle 2025-04-01

IoT Puzzle crossword puzzle
Across
  1. The practice of protecting internet-connected systems from cyber threats.
  2. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
  3. A security system that monitors and controls incoming and outgoing network traffic.
  4. The process of converting data into a code to prevent unauthorized access.
  5. Short-range wireless technology.
  6. Devices that collect and transmit real-time data from the environment.
Down
  1. Malicious software designed to harm or exploit devices or networks.
  2. Wireless standard for IoT connectivity.
  3. Software embedded in IoT devices that controls their operations.
  4. Verifying a user’s identity before granting access to a system.
  5. Remote servers used for data storage & processing.
  6. Connects IoT devices to the internet.
  7. Wireless transmission of data.
  8. Wireless communication protocol for IoT.
  9. A type of cyber-attack where attackers trick users into providing sensitive information.
  10. A network topology where devices connect directly and relay data to each other.

16 Clues: Wireless transmission of data.Short-range wireless technology.Connects IoT devices to the internet.Wireless standard for IoT connectivity.Wireless communication protocol for IoT.Remote servers used for data storage & processing.Verifying a user’s identity before granting access to a system....

Cybersecurity Puzzle 2024-10-14

Cybersecurity Puzzle crossword puzzle
Across
  1. using historical data and advanced predictive algorithms
  2. AI- driven systems demonstrate this against evolving threats
  3. One of the databases used in the study
  4. a form of network intrusion
  5. pose an ever-growing challenge to security
Down
  1. researchers argue that this approach will simplify cybersecurity
  2. A form of cyber applications of AI bas
  3. A critical concern against AI systems
  4. one of the various facets of cyber security

9 Clues: a form of network intrusionA critical concern against AI systemsA form of cyber applications of AI basOne of the databases used in the studypose an ever-growing challenge to securityone of the various facets of cyber securityusing historical data and advanced predictive algorithmsAI- driven systems demonstrate this against evolving threats...

Cyber Smart 2022-01-31

Cyber Smart crossword puzzle
Across
  1. to keep others out of your personal devices
  2. online security practices
  3. keeps your device/s run properly
  4. physically separate location from the original
  5. before clicking on links
  6. steps taken to prevent cyber hacking
  7. to remove from a system or device
Down
  1. your sign in
  2. online
  3. recognized suspected scams
  4. when you are requested to provide private information

11 Clues: onlineyour sign inbefore clicking on linksonline security practicesrecognized suspected scamskeeps your device/s run properlyto remove from a system or devicesteps taken to prevent cyber hackingto keep others out of your personal devicesphysically separate location from the originalwhen you are requested to provide private information

Test 2024-07-19

Test crossword puzzle
Across
  1. Establishes early warning sensors and alert networks to warn others of potential attacks.
  2. Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
  3. Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
  4. Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
  5. Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
  6. Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
  7. Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
  8. Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
  9. Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
  10. Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
  11. Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
  1. Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
  2. Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
  3. Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
  4. Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
  5. Exploit weaknesses or vulnerabilities to gain access to internal resources.
  6. Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
  7. Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.

18 Clues: Exploit weaknesses or vulnerabilities to gain access to internal resources.Establishes early warning sensors and alert networks to warn others of potential attacks.Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun....

Brain-Riddle Round 2 2025-02-11

Brain-Riddle Round 2 crossword puzzle
Across
  1. A system that translates domain names to IP addresses.
  2. A tool that encrypts internet connections for privacy.
  3. A team that monitors and defends against cyber threats.
  4. A method of hiding data within other files.
  5. The data sent back from a server after a request.
  6. A remote computing device that communicates with a network.
  7. A program where hackers get paid for finding security flaws.
Down
  1. A temporary interaction between a user and a website.
  2. The part of a cyber attack that carries malicious code.
  3. A security feature that controls web resource access.
  4. A process of converting data into a fixed-size value.
  5. A temporary storage to speed up data access.
  6. A set of rules for communication between software.
  7. A type of attack that tricks users into executing unwanted actions.
  8. A file containing code for automation.

15 Clues: A file containing code for automation.A method of hiding data within other files.A temporary storage to speed up data access.The data sent back from a server after a request.A set of rules for communication between software.A temporary interaction between a user and a website.A security feature that controls web resource access....

Unique MFAT Job Title Holders 2019-04-16

Unique MFAT Job Title Holders crossword puzzle
Across
  1. Archives Adviser
  2. Sponsorship Manager
  3. MFAT Research Adviser
  4. Asset Analyst
  5. Purchasing Officer
  6. Service Delivery Manager
Down
  1. Strategy & Planning Manager
  2. Commercial Specialist
  3. Comsec Custodian
  4. Classified Registrar
  5. Cyber Security Specialist
  6. Business Process Manager
  7. Document Writer

13 Clues: Asset AnalystDocument WriterArchives AdviserComsec CustodianPurchasing OfficerSponsorship ManagerClassified RegistrarCommercial SpecialistMFAT Research AdviserBusiness Process ManagerService Delivery ManagerCyber Security SpecialistStrategy & Planning Manager

Enteprise 2025-08-11

Enteprise crossword puzzle
Across
  1. Liability Insurance – Insurance coverage protecting against financial losses from cyber incidents.
  2. Intelligence (BI) – Tools and processes that analyse data to help organisations make informed decisions.
  3. cloud – Cloud services deployed across multiple locations but managed from a central provider.
  4. Automation – Using AI, machine learning, and robotic process automation to automate complex tasks.
  5. Mesh – A flexible, modular approach to security where controls are distributed across different systems.
  6. Immune System (DIS) – Integrated systems designed to detect, prevent, and recover from digital threats.
  7. Detection and Response (EDR) – Security tools that monitor, detect, and respond to threats on devices.
  8. – Creating digital interactions across multiple devices, touchpoints, and platforms seamlessly.
Down
  1. Authentication (MFA) – A login process requiring two or more verification methods for security.
  2. (XaaS) – Delivering all types of IT services over the internet on a subscription basis.
  3. Intelligence (AI) – Machines or software that can perform tasks requiring human-like intelligence.
  4. Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies.
  5. technology – Tech designed to reduce environmental impact and promote long-term ecological balance.
  6. – A persistent, virtual 3D space where people can interact, work, and play.
  7. Screening – Scanning systems to detect security weaknesses before they can be exploited.
  8. Computing – Computers that use quantum bits (qubits) to solve problems faster than classical computers.

16 Clues: Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies.– A persistent, virtual 3D space where people can interact, work, and play.(XaaS) – Delivering all types of IT services over the internet on a subscription basis.Screening – Scanning systems to detect security weaknesses before they can be exploited....

Policy on Service and Digital 2020-09-01

Policy on Service and Digital crossword puzzle
Across
  1. Section 4.5 of the PSD includes requirements for the CIO of Canada and Deputy Heads on supporting __________ __________ and capability.
  2. The management of the functions under the PSD is guided by principles and best practice of the Government of Canada ______________ _______________
  3. The CIO of Canada is responsible for prescribing enterprise-wide __________ and ____________ standards for quality, accessibility and data interoperability.
  4. In alignment with a 2016 Direction, the PSD includes requirements for the CIO of Canada and Deputy Heads to support innovation and _____________.
  5. The objective of the PSD is that ______ ______ ________ and government operations are improved through digital transformation approaches
  6. Deputy Heads are responsible for maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada _______ _________ _____.
  7. The CIO of Canada will approve an annual, forward-looking three-year __________-wide plan that establishes strategic direction for the integrated management of service, information, data, IT, and cyber security.
  8. The Policy on _____ __ _____ articulates how Government of Canada organizations manage service delivery, information and data, information technology, and cyber security in the digital era
  9. Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________
Down
  1. Deputy Heads are responsible for ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the _________ _____ and any other relevant legislation, policy or agreement.
  2. Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.
  3. Deputy Heads are responsible for establishing __________ governance to ensure the integrated management of service, information, data, IT, and cyber security within their department.
  4. Deputy Heads must __________ the online end-to-end availability of services and their ease of use to complement all service delivery channels.
  5. The _____________ ___________________ Officer of Canada provides advice to the President and the Secretary of the Treasury Board of Canada about governing and managing enterprise-wide information, data, IT, cyber security, and service design and delivery.
  6. The PSD supports the mandate of the Minster for _______ _____________
  7. The CIO of Canada is responsible for defining ______ ________ requirements to ensure that Government of Canada and departmental information and data, applications, systems and networks are secure, reliable and trusted.

16 Clues: The PSD supports the mandate of the Minster for _______ _____________Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________...

Cyber Security Crossword 2019-03-23

Cyber Security Crossword crossword puzzle
Across
  1. Software that modifies a web browser's settings without a user's permission to inject unwanted advertising into the user's browser
  2. Another type of malware that uses a backdoor and named after the wooden horse that the Greeks used to infiltrate Troy
  3. A malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR)
  4. An undocumented way of accessing a system, bypassing the normal authentication mechanisms
  5. In contrast to viruses, which require the spreading of an infected host file, this is a standalone software and does not require a host program or human help to spread
  6. Network Security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  7. It spreads from one computer to another, leaving infections as it travels
  8. The action of recording (logging) the keys struck on a keyboard, typically secretively, so that the person using the keyboard is unaware that their actions are being monitored
Down
  1. Software that aims to gather information about a person or organization without their knowledge
  2. Is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
  3. Software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process
  4. A type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
  5. Short for "Denial of Service" Attacks, which is a malicious attempts by one or more people to cause the victim, site, or node to deny service to its customers
  6. Is derived from the word "robot" and is an automated process that interacts with other network services
  7. Also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks
  8. May reside at the user or kernel level in the operating system or lower to include a hypervisor, master boot record, or the system firmware

16 Clues: It spreads from one computer to another, leaving infections as it travelsAn undocumented way of accessing a system, bypassing the normal authentication mechanismsSoftware that aims to gather information about a person or organization without their knowledge...

Interpol Investigation Challenge 2023-10-07

Interpol Investigation Challenge crossword puzzle
Across
  1. The United States' primary counter-terrorism agency
  2. A country in East Asia known for its efforts in countering cyber threats and cyber terrorism
  3. The country that hosts the annual Munich Security Conference, discussing counter-terrorism strategies
  4. The country where INTERPOL's General Secretariat is located
  5. The organization responsible for implementing counter-terrorism sanctions at the United Nations
  6. A country in Southeast Asia that has faced threats from groups like Abu Sayyaf
  7. The United States' primary intelligence agency responsible for counter-terrorism analysis
  8. A term for the unlawful use of violence and intimidation, often for political purposes
  9. A global network of law enforcement agencies that share information and collaborate on international crime
  10. The United Nations agency responsible for providing counter-terrorism assistance to member states
Down
  1. The international organization that sets global standards for combating money laundering and terrorist financing
  2. A term for the process of gathering and analyzing information to prevent terrorist activities
  3. The international organization focused on aviation security and counter-terrorism
  4. A country known for its involvement in counter-terrorism efforts in the Middle East
  5. The international organization focused on nuclear security and counter-terrorism
  6. The branch of the military responsible for counter-terrorism operations in the United States
  7. The European Union's law enforcement agency that deals with cross-border crime and terrorism
  8. A term for the use of non-lethal tactics and strategies to counter terrorism
  9. The United Kingdom's primary domestic intelligence and security agency
  10. A country in East Africa that has faced challenges from terrorist groups like Al-Shabaab

20 Clues: The United States' primary counter-terrorism agencyThe country where INTERPOL's General Secretariat is locatedThe United Kingdom's primary domestic intelligence and security agencyA term for the use of non-lethal tactics and strategies to counter terrorismA country in Southeast Asia that has faced threats from groups like Abu Sayyaf...

CHRISTMAS 2016 2016-11-26

CHRISTMAS 2016 crossword puzzle
Across
  1. BINGO
  2. THE PROFESSOR
  3. OLDEST IDENTICAL TWIN
  4. MISS PSYCHOLOGY
  5. YOUNGEST IDENTICAL TWIN
  6. OOBER
  7. I AM BABY HEAR ME SING
  8. MISS CHEERLEADER
  9. ME CYBER-SECURITY
  10. PEEKY
  11. SCHOOL CAREGIVER
  12. MR KARATE
Down
  1. MOTHER OF FRATERNAL TWINS
  2. MISS RANTOUL WEATHER GIRL
  3. ME BEHIND THE SCENES
  4. PO-BABE
  5. HOT-DOG
  6. THIRD GRANDCHILD
  7. SWIMMER
  8. OLDEST OF FOUR
  9. MOTHER OF THREE "FIELD" MICE
  10. SEAHAWKS FAN

22 Clues: BINGOOOBERPEEKYPO-BABEHOT-DOGSWIMMERMR KARATESEAHAWKS FANTHE PROFESSOROLDEST OF FOURMISS PSYCHOLOGYTHIRD GRANDCHILDMISS CHEERLEADERSCHOOL CAREGIVERME CYBER-SECURITYME BEHIND THE SCENESOLDEST IDENTICAL TWINI AM BABY HEAR ME SINGYOUNGEST IDENTICAL TWINMOTHER OF FRATERNAL TWINSMISS RANTOUL WEATHER GIRLMOTHER OF THREE "FIELD" MICE

Murphy's Crossword 2025-12-01

Murphy's Crossword crossword puzzle
Across
  1. Slick
  2. Dog Whisperer
  3. Interior Designer
  4. DCR
  5. Musician
  6. Weed
  7. Heavy Machinery
  8. Clean Freak
  9. Spy
  10. Fisherman
  11. Sponsor
  12. Doctor
  13. Proud Father
Down
  1. Dental Assistant
  2. Marion’s Favorite Residence
  3. Stellar Mother
  4. Loving Babysitter
  5. Marion & David’s Residence
  6. ER Tech
  7. Ambitious
  8. Cyber Security
  9. Alternative for Fire
  10. City of Choice
  11. Artist
  12. Married on a Mountaintop
  13. Handyman
  14. the mauler
  15. St. Columbkille’s
  16. Restaurant Manager

29 Clues: DCRSpyWeedSlickArtistDoctorER TechSponsorMusicianHandymanAmbitiousFishermanthe maulerClean FreakProud FatherDog WhispererStellar MotherCyber SecurityCity of ChoiceHeavy MachineryDental AssistantInterior DesignerLoving BabysitterSt. Columbkille’sRestaurant ManagerAlternative for FireMarried on a MountaintopMarion & David’s Residence...

Crossword activity: Find the threat! 2021-06-10

Crossword activity: Find the threat! crossword puzzle
Across
  1. Security implementation involves four complementary courses of action: prevention, detection, response, and _.
  2. Don’t use the same _ on different sites and change it regularly.
  3. Cyber _ includes single actors or groups targeting systems for financial gain or to cause disruption.
  4. _ is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.
  5. _ security protects the integrity and privacy of data, both in storage and in transit.
  6. A loss of _ is the disruption of access to or use of information or an information system.
  7. _ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  8. A _ is set on the boundaries of any system or network which monitors and controls network traffic.
Down
  1. _ security refers to the protection of hardware, software, and data from attackers.
  2. _ security includes the processes and decisions for handling and protecting data assets.
  3. The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _.
  4. Data leakage is an unauthorized transfer of _ to the outside world.
  5. Avoid using unsecure _ networks in public places
  6. A(n) _ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
  7. _ is a malware that aims to steal data about the organization or person.

15 Clues: Avoid using unsecure _ networks in public placesDon’t use the same _ on different sites and change it regularly.Data leakage is an unauthorized transfer of _ to the outside world._ is a malware that aims to steal data about the organization or person._ security refers to the protection of hardware, software, and data from attackers....

cyber security quiz 2025-07-07

cyber security quiz crossword puzzle
Across
  1. A security method using fingerprints, face, or retina scans
  2. A tool that records everything typed on a keyboard
  3. A software that secretly monitors and collects user information
  4. The process of verifying the identity of a user or device
  5. Malware that locks or encrypts data and demands payment to release it
  6. The process of converting data into a coded form to protect it
  7. A harmful program that disguises itself as useful software
  8. The illegal copying, use, or distribution of software
  9. A set of rules for formatting and transmitting data over networks
Down
  1. A hidden entry point used to bypass normal security
  2. A protective barrier that blocks unauthorized access to or from a network
  3. A group of infected computers remotely controlled by a hacker
  4. A general term for any software designed to harm or exploit devices
  5. The act of tricking people into revealing sensitive information online
  6. A software used to detect, prevent, and remove malicious programs
  7. A defined sequence of steps used to solve a problem or perform a task

16 Clues: A tool that records everything typed on a keyboardA hidden entry point used to bypass normal securityThe illegal copying, use, or distribution of softwareThe process of verifying the identity of a user or deviceA harmful program that disguises itself as useful softwareA security method using fingerprints, face, or retina scans...

Security Week 1 2024-08-13

Security Week 1 crossword puzzle
Across
  1. Identity verification method
  2. Use of personal tech at work
  3. Entry
  4. Secure message technique
Down
  1. It comes in an email, not a pond
  2. Malicious software
  3. Security marking for government data
  4. Prefix for digital security
  5. Protector
  6. Secret entry code

10 Clues: EntryProtectorSecret entry codeMalicious softwareSecure message techniquePrefix for digital securityIdentity verification methodUse of personal tech at workIt comes in an email, not a pondSecurity marking for government data

CyF Chapter 1 2023-10-08

CyF Chapter 1 crossword puzzle
Across
  1. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. Attacks that originate from within an organization are known as ___________ security threats.
  3. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. DDoS in cyber security means "Distributed ______-of-Service.
  6. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. Criminals use this tool to capture data streams over a network.
  2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. What is another word used to describe the speed of data.
  4. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. The acronym of the practice where people used their own devices to access enterprise information.
  8. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.

20 Clues: What is another word used to describe the speed of data.DDoS in cyber security means "Distributed ______-of-Service.Criminals use this tool to capture data streams over a network.Cyber ______ is a weakness that makes a target susceptible to an attackCriminals can also use rogue devices, such as _____ Wi-Fi access points....