cyber security Crossword Puzzles
Cyber Security Crossword 2025-11-06
Across
- Secret phrase that shouldn't be "123456"
- Test to prove you're human, often involving traffic lights
- Fake email scheme that sounds like an aquatic activity
- Army of zombie computers controlled by cybercriminals
- Malicious program named after an ancient Greek trick
- Sneaky software that watches your every click
- Secret entrance that bypasses normal security
- When unauthorized users break through digital defenses
- Three letters for a tunnel that hides your internet traffic
- Scrambling data like eggs, but harder to unscramble
- Small file that remembers you, not made of chocolate chips
- Attack that floods a website like a thousand people calling at once
- Umbrella term for software with bad intentions
- Digital bouncer that decides who gets into the network party
- Alan who cracked codes and fathered computer science
Down
- Process of proving you are who you claim to be online
- Sweet trap designed to catch cyber attackers
- Digital lock-picker, sometimes wearing a white or black hat
- Software band-aid that fixes security holes
- Digital kidnapper that holds files hostage for money
- Spreads from computer to computer like its biological namesake
- Pretending to be someone else online, like digital dress-up
- Using your body parts as passwords
- Self-replicating pest that doesn't need a host file
- Silent recorder of every button you press
25 Clues: Using your body parts as passwords • Secret phrase that shouldn't be "123456" • Silent recorder of every button you press • Software band-aid that fixes security holes • Sweet trap designed to catch cyber attackers • Sneaky software that watches your every click • Secret entrance that bypasses normal security • Umbrella term for software with bad intentions • ...
Important words 2025-03-02
Across
- a promise that a business gives you
- something that solidifies a deal
- knowing something
- Entering somewhere without authentication
- online
- something you need for entry
Down
- Getting your money stolen
- buying goods from shops
- call
- Getting money back for a product
- security
- safe
- fast transport
- can restore lost data
14 Clues: call • safe • online • security • fast transport • knowing something • can restore lost data • buying goods from shops • Getting your money stolen • something you need for entry • Getting money back for a product • something that solidifies a deal • a promise that a business gives you • Entering somewhere without authentication
Vigilant 2020-07-08
11 Clues: Do not get hooked • Once done working • Malicious download • Constantly on guard • Color of fraud flag • Shared responsibility • Saves searches online • Smart devices are always • Cyber Security Awareness Month • Chief Information Security Officer • Right to my own personal information
On line Security 2015-05-05
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
aw jeez 2023-01-12
Across
- Cyber Security Saleswoman
- Teacher
- Project Manager
- Heart Valve Specialist
- College Admissions Director
- Pediatric Nurse
- U.S. Paralympian
- Political Science PhD
- Event Planner
- Designer
Down
- Graduate Student
- Pharmacist
- Warehouse Associate
- UX Designer
- Elevator Salesman
- Clinical Psychologist
- Educational Project Manager
- Pet Cremator
18 Clues: Teacher • Designer • Pharmacist • UX Designer • Pet Cremator • Event Planner • Project Manager • Pediatric Nurse • Graduate Student • U.S. Paralympian • Elevator Salesman • Warehouse Associate • Political Science PhD • Clinical Psychologist • Heart Valve Specialist • Cyber Security Saleswoman • College Admissions Director • Educational Project Manager
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
ETHICAL HACKING 2024-08-08
Across
- DHCP WORKS ON TOP OF
- CYBER SECURITY RESEARCHER
- A FIREWALL
- HIJACKING TOOLS
Down
- IDENTIFYING AND MITIGATING SECURITY THREATS
- TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS
- A WEB SECURITY VULNERABILITY
- ENUMERATION process in security that uncover DNSrecord
- HASHING ALGORITHM
- FAMOUS TOOL IN PEN TESTING COMMUNITY
- WEB APPLICATION DEVELOPED BY OWASP
11 Clues: A FIREWALL • HIJACKING TOOLS • HASHING ALGORITHM • DHCP WORKS ON TOP OF • CYBER SECURITY RESEARCHER • A WEB SECURITY VULNERABILITY • WEB APPLICATION DEVELOPED BY OWASP • FAMOUS TOOL IN PEN TESTING COMMUNITY • IDENTIFYING AND MITIGATING SECURITY THREATS • TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS • ENUMERATION process in security that uncover DNSrecord
Cyber Security 2020-07-19
Across
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A security measure designed to verify an individual`s authorization to access computer or security information.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- An environment in which digitized information is distributed on networks of computers.
- The largest WAN in the world.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- Shift cipher named after a famous Roman, Julius ?
- Machine used in WW2 to send secret messages in Germany.
- Statement of intention to inflict damage or hostile action.
12 Clues: The largest WAN in the world. • Shift cipher named after a famous Roman, Julius ? • Machine used in WW2 to send secret messages in Germany. • Statement of intention to inflict damage or hostile action. • An environment in which digitized information is distributed on networks of computers. • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- who created a computer worm in 1988?
- spyware, ransomware, viruses, and worms
- what president created homeland security?
- created the first ransomware attack
- attack that floods a computer or network
- attackwhen hackers insert their way into a two party transaction
Down
- advanced, modular banking trojan
- attack relies most on human interaction
- this person created cyber security
- attacks that use fake communication to trick people
- what does SQL stand for?
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • attack relies most on human interaction • spyware, ransomware, viruses, and worms • attack that floods a computer or network • what president created homeland security? • ...
Cyber Security 2020-08-24
12 Clues: a virus • messages • a connection • a program that • a computer that • another computer, • a large number of • example by email, • an uncontrolled way • move to the other computer. • many people’s mobile phones • virus can make copies of itself
Cyber Security 2021-10-12
Across
- a link that wants you to click on it
- installed without the user realizing
- another word for junk email
- proper behaviour online
- ride the waves of the internet!
Down
- the non editable kind
- yarr matey!
- like a head cold for your computer
- info stored on a computer
- dont fall for this trick, its not on the hook
- computer bad guy
- blocks viruses
12 Clues: yarr matey! • blocks viruses • computer bad guy • the non editable kind • proper behaviour online • info stored on a computer • another word for junk email • ride the waves of the internet! • like a head cold for your computer • a link that wants you to click on it • installed without the user realizing • dont fall for this trick, its not on the hook
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
Trick or Threat: The Cyber Crossword 2025-04-06
Across
- The IT Team's critical tasks include keeping all software and systems _____
- An Incident Response Plan explains exactly what to do during a ____ attack
- With cloud systems, professional teams manage ____ 24/7
- Examples of cloud systems include ____ workspace and Microsoft 365
- MFA stands for _____ Authentication: Your digital shield
- The IT Team's critical tasks include enforcing multifactor ___
- Cyber threats can harm businesses of all _____
- MFA is like having multiple ____ on your digital door
- ____ and ipads are great examples of secure devices
- A Cybersecurity ___ plan should include talking about security with your team, using multifactor authentication,keeping software updated, creating a response plan, and never stopping learning about digital saferty
- The CEO's Role in Cybersecurity includes making cybersecurity a normal part of _____ work
Down
- MFA can use text messages, special codes, or other _____ methods.
- _____ is about protecting your digital information and systems
- The ___ Response plan can be thought of as a "digital first aid kit"
- Chromebooks and iPads have built-in ___ features
- Some common cyber threats include ____ emails as the most common attack
- ____ often target small businesses.
- Staff should learn to spot suspicious ____ and emails
- All staff needs to understand cybersecurity ____
- ____ services are often more secure for small businesses
- The CEO's Role in Cybersecurity includes creating a ____ where everyone cares about digital safety
21 Clues: ____ often target small businesses. • Cyber threats can harm businesses of all _____ • Chromebooks and iPads have built-in ___ features • All staff needs to understand cybersecurity ____ • ____ and ipads are great examples of secure devices • Staff should learn to spot suspicious ____ and emails • MFA is like having multiple ____ on your digital door • ...
Cyber Security Crossword 2019-09-23
Across
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
- Tim Berners-Lee's Invention (5,4,3)
- Additional copy of data or information used for recovery should the original become lost or corrupt (6)
- a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
- The 'mal' part of the term 'malware' (9)
- a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
- Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
- a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
- bin where users should send suspicious emails within Anglian Water (4,3)
Down
- digital _____, the information about a person that exists on the Internet as a result of online activity (9)
- a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
- websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
- the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
- the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
- These people are responsible for security (9)
- (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
- __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
- a person who uses computers to gain unauthorised access to data (6)
- Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
19 Clues: Tim Berners-Lee's Invention (5,4,3) • The 'mal' part of the term 'malware' (9) • These people are responsible for security (9) • a person who uses computers to gain unauthorised access to data (6) • bin where users should send suspicious emails within Anglian Water (4,3) • ...
Cyber Security Awareness 2023-03-01
Across
- Type of malware that self-replicates and attempts to steal info
- A type of malware that encrypts user's files and then asks for payment to unlock them
- Piece of audio/video that has been altered to make it seem authentic
- A number of compromised computers used to spam or denial of service attacks
- Any unwanted/unsolicited email/phone call
- A type of computer that provides services to other computers/devices
- Emails sent with the intention of stealing money/account credentials
- Any type of communication that exploits the human factor to gather sensitive info (6,11)
- A generic term for any type of malicious software
- Logica/Physical tool used to filter network traffic
- Malware that can reproduce itself for the purpose of spreading itself to other devices in the network
Down
- A type of network that allows secure access to a network from offsite
- A form of malware used to spy on user's devices
- Misleading computer program that looks innocent, but allows a hacker into your system/network via a backdoor (6,5)
- Following someone with legitimate access into a location to get physical entry
- Software update provided by a manufacturer to fix a bug
- Any unauthorised access to data, applications, or servers
- Changing plaintext to cipher text using an algorithm
- On-demand computer hosted by a 3rd party (AWS, MS Azure)
19 Clues: Any unwanted/unsolicited email/phone call • A form of malware used to spy on user's devices • A generic term for any type of malicious software • Logica/Physical tool used to filter network traffic • Changing plaintext to cipher text using an algorithm • Software update provided by a manufacturer to fix a bug • ...
Cyber Security Puzzle 2023-01-25
Across
- When nations network w/goal of damage
- Set of rules computer follows
- Tricked to click hidden elements
- Pop ups
- Codes that protects during encryption
- system prevents unauthorized network access
- Holds your information hostage
- Done through email not water
- Dangerous and no one knows yet
Down
- They self replicate
- How your informations kept safe
- Gives attacker control of pc
- Sneaky hidden cyber attack
- Language made of 1's & 0's
- Users connect remotely to another network
- Something malicious
- sends massive traffic to crash site
- Tracks and stores your keystrokes
- Worm-like but needs human interaction
19 Clues: Pop ups • They self replicate • Something malicious • Sneaky hidden cyber attack • Language made of 1's & 0's • Gives attacker control of pc • Done through email not water • Set of rules computer follows • Holds your information hostage • Dangerous and no one knows yet • How your informations kept safe • Tricked to click hidden elements • Tracks and stores your keystrokes • ...
CTF-CW-5 2025-11-17
Across
- System�s ability to handle growth
- Web Application Firewall: protects websites
- When someone breaks a formal rule
- Proof collected in a cyber investigation
- Openness about security controls and processes.
- Email security service trusted by Tekion.
- Person/role overseeing rules or limits
- Hiding real numbers with random stand-ins again
- Process for managing computer security events
- The things done to prevent or detect risks
- Role managing security events
Down
- Framework for managing artificial intelligence risks and compliance
- Moral principles guiding artificial intelligence development
- Innovation hub for new products at Tekion.
- Individual whose personal data is being processed
- Multi-factor authentication: more than password required
- Steps to fix incident aftermath
- Limits of coverage
- Special cyberops expert team at Tekion.
- Unique identifier for a networked device
20 Clues: Limits of coverage • Role managing security events • Steps to fix incident aftermath • System�s ability to handle growth • When someone breaks a formal rule • Person/role overseeing rules or limits • Special cyberops expert team at Tekion. • Proof collected in a cyber investigation • Unique identifier for a networked device • Email security service trusted by Tekion. • ...
cyber security 2017-06-30
Across
- a software that enable a user to obtain information about another's computer activities.
- is when it have virus automatically on the computer or laptop
- is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
- type of malicious software designed to block access to a computer system until a sum of money is paid.
- an attempt by hackers to damage or destroy the system.
- is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- a type of danger when people harm you.
Down
- is the action of protecting, or the state of being protected.
- when danger happen in internet.
- is a network of social interactions and personal relationships.
- ransomware is usually aimed at individuals, it's only a matter of time before business is targeted as well"r
- card fraud is Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
12 Clues: when danger happen in internet. • a type of danger when people harm you. • an attempt by hackers to damage or destroy the system. • is the action of protecting, or the state of being protected. • is when it have virus automatically on the computer or laptop • is a network of social interactions and personal relationships. • ...
Cyber Security 2023-09-15
Across
- software that looks like a real program, but is actually a type of malware in disguise
- onion-style routing technique for transmitting data
- protect the malware and can enable any malware installed to still be on the system after many multiple reboots
- security method that requires two forms of identification
- cameras to increase security
- transmits data over a short-range
- A safe environment for files to be opened without affect your pc
Down
- software that is secretly installed on your computer
- System which sets of sound when triggered
- Monitors and filters incoming and outgoing network traffic
- analysis of people's unique physical characteristics
- identifying a user’s identity
12 Clues: cameras to increase security • identifying a user’s identity • transmits data over a short-range • System which sets of sound when triggered • onion-style routing technique for transmitting data • software that is secretly installed on your computer • analysis of people's unique physical characteristics • security method that requires two forms of identification • ...
Cyber security 2023-10-27
12 Clues: Out of sight. • Being online. • To be protected. • Relating to society. • To remain unthreatened. • To whom you are fond of. • Someone you do not know. • To be hidden from others. • Someone who harms others. • The act of being protected. • The main means of mass communication. • Facts learned from someone or something.
Cyber Security 2025-07-11
Across
- Someone who uses ethical hacking to help
- Software designed to harm a computer
- Legal software that tracks users secretly
- Process of converting data into a secret code
- Device used to protect a network
Down
- A scam where attackers trick you into giving personal info
- Mail Unwanted and repetitive email messages
- A secret word or phrase used to gain access
- Someone who breaks into systems illegally
- Network that connects computers globally
- Program that protects your computer from viruses
- A type of malware that demands money
12 Clues: Device used to protect a network • Software designed to harm a computer • A type of malware that demands money • Someone who uses ethical hacking to help • Network that connects computers globally • Someone who breaks into systems illegally • Legal software that tracks users secretly • Mail Unwanted and repetitive email messages • ...
All About Ryan 2026-01-22
27 Clues: Pet • Iowa • Ford • Bike • Lake • Polar • Cyber • Water • Juicy • Wrist • Indoor • Blanket • Outdoor • Chamber • Kentucky • Montreal • Instrument • Acting Role • Instrument 4 • Instrument 3 • Instrument 5 • Spaceman Toy • Instrument 2 • Kicking Sport • Travel Abroad • Stuffed Animal • Superhero Costume
CTF-CW-5 2025-11-17
Across
- System�s ability to handle growth
- Web Application Firewall: protects websites
- When someone breaks a formal rule
- Proof collected in a cyber investigation
- Openness about security controls and processes.
- Email security service trusted by Tekion.
- Person/role overseeing rules or limits
- Hiding real numbers with random stand-ins again
- Process for managing computer security events
- The things done to prevent or detect risks
- Role managing security events
Down
- Framework for managing artificial intelligence risks and compliance
- Moral principles guiding artificial intelligence development
- Innovation hub for new products at Tekion.
- Individual whose personal data is being processed
- Multi-factor authentication: more than password required
- Steps to fix incident aftermath
- Limits of coverage
- Special cyberops expert team at Tekion.
- Unique identifier for a networked device
20 Clues: Limits of coverage • Role managing security events • Steps to fix incident aftermath • System�s ability to handle growth • When someone breaks a formal rule • Person/role overseeing rules or limits • Special cyberops expert team at Tekion. • Proof collected in a cyber investigation • Unique identifier for a networked device • Email security service trusted by Tekion. • ...
cyber security 2022-09-30
Across
- person who finds and exploits the weakness in computer systems.
- process of finding weakness in computer or private networks.
- comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
- designed to disrupt, damaged, or gain unauthorized access to a computer system.
- exploits vulnerabilities on the device to encrypt important files.
- an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
- used to obtained sensitive information from users.
- that downloads onto a computer disguised as a legitimate program.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- a secret word or phrase that must be used to gain admission to a place.
- malicious software.
- monitors the victim's internet activity, tracks login credentials and spies on sensitive information.
12 Clues: malicious software. • used to obtained sensitive information from users. • process of finding weakness in computer or private networks. • person who finds and exploits the weakness in computer systems. • that downloads onto a computer disguised as a legitimate program. • exploits vulnerabilities on the device to encrypt important files. • ...
Cyber Security 2017-07-13
Across
- This is when someone spends irrelevant or unsolicited messages to loads of people
- This is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
- This is when your speaking to someone and another person is watching/listening without the person knowing
- Loads of private computers that can see what your doing without the users knowing
- Something that can go onto your computer and can destroy data and corrupt the system
Down
- This is when someone takes your personal info and uses it to take your credit card etc
- These are physical parts you can connect to a system
- This is a person who uses computers to gain unauthorized access to data
- This is a software that threatens to delete your data for a specific amount of money
- This is a program or a set of instructions
- This a secret word or phrase that must be used to gain access to a place/website
- This is software designed to detect and destroy computer viruses
12 Clues: This is a program or a set of instructions • These are physical parts you can connect to a system • This is software designed to detect and destroy computer viruses • This is a person who uses computers to gain unauthorized access to data • This a secret word or phrase that must be used to gain access to a place/website • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- created the first ransomware attack
- what does SQL stand for?
- what president created homeland security?
- attack relies most on human interaction
Down
- attacks that use fake communication to trick people
- this person created cyber security
- who created a computer worm in 1988?
- advanced, modular banking trojan
- attackwhen hackers insert their way into a two party transaction
- attack that floods a computer or network
- spyware, ransomware, viruses, and worms
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • spyware, ransomware, viruses, and worms • attack relies most on human interaction • attack that floods a computer or network • what president created homeland security? • ...
Cyber Security 2024-08-17
Across
- What malware strain is used to add more malware to an infected device?
- What color hat hacker invades systems for malicious purposes?
- What is the most common file type for malware?
- What classification of malware was MyDoom?
Down
- What job position is responsible for designing security systems? Two words.
- What's the name of a program that keeps track of keys pressed (often used in phishing and infostealers)?
- What malware type locks you out of your system and often demands money?
- What malware strain was sent via an email attachment stating a love letter?
- What color hat hacker attempts to invade systems with permission to search for issues?
- What color hat hacker are newbies to the hacking world?
- What malware type replicates across the system?
- What was the largest data breach in history exposing more than 3.2B people?
12 Clues: What classification of malware was MyDoom? • What is the most common file type for malware? • What malware type replicates across the system? • What color hat hacker are newbies to the hacking world? • What color hat hacker invades systems for malicious purposes? • What malware strain is used to add more malware to an infected device? • ...
THE ITT 2024-05-16
Across
- A hacker with malicious intentions. Cyber-Security and Legislation
- How does a human interact with a computer? HCI
- Integers, data type. Data and Testing
- An electronic message that can be sent.
- No video, Just sound. Digital Communication
- A way of visualising/organising information. Design Tools
- A prevention to DOS attacks. Cyber-Security and Legislation
- A use of a HCI to track heartrate. HCI
Down
- A promotion technique using written and visual information.
- Plan for how elements will work together. Design Tools
- Facts and figures with no context. Data and Testing
- A way of communication, type of channel. Digital Communications
- A digital storing place to transfer data.
- One of the four pillars. IOE
- Internet Of Everything. IOE
15 Clues: Internet Of Everything. IOE • One of the four pillars. IOE • Integers, data type. Data and Testing • A use of a HCI to track heartrate. HCI • An electronic message that can be sent. • A digital storing place to transfer data. • No video, Just sound. Digital Communication • How does a human interact with a computer? HCI • Facts and figures with no context. Data and Testing • ...
Cyber Security Crossword 2019-09-23
Across
- a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
- digital _____, the information about a person that exists on the Internet as a result of online activity (9)
- websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
- Tim Berners-Lee's Invention (5,4,3)
- __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
- Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
- Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
- The 'mal' part of the term 'malware' (9)
- bin where users should send suspicious emails within Anglian Water (4,3)
Down
- These people are responsible for security (9)
- a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
- a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
- a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
- a person who uses computers to gain unauthorised access to data (6)
- the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
- the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
- (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
- Additional copy of data or information used for recovery should the original become lost or corrupt (6)
19 Clues: Tim Berners-Lee's Invention (5,4,3) • The 'mal' part of the term 'malware' (9) • These people are responsible for security (9) • a person who uses computers to gain unauthorised access to data (6) • bin where users should send suspicious emails within Anglian Water (4,3) • ...
Cyber Security Puzzle 2023-01-25
Across
- When nations network w/goal of damage
- Set of rules computer follows
- Tricked to click hidden elements
- Pop ups
- Codes that protects during encryption
- system prevents unauthorized network access
- Holds your information hostage
- Done through email not water
- Dangerous and no one knows yet
Down
- They self replicate
- How your informations kept safe
- Gives attacker control of pc
- Sneaky hidden cyber attack
- Language made of 1's & 0's
- Users connect remotely to another network
- Something malicious
- sends massive traffic to crash site
- Tracks and stores your keystrokes
- Worm-like but needs human interaction
19 Clues: Pop ups • They self replicate • Something malicious • Sneaky hidden cyber attack • Language made of 1's & 0's • Gives attacker control of pc • Done through email not water • Set of rules computer follows • Holds your information hostage • Dangerous and no one knows yet • How your informations kept safe • Tricked to click hidden elements • Tracks and stores your keystrokes • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
I.T. cyber security 2023-09-10
Across
- to identify any activity on your network
- a type of security and encryption for your router
- pop-ups meant to direct you from one website to another
- a type of malware that replicates itself by inserting its own code into other programs if successfully executed
- an individual who commits crimes via the internet
- to erase something like data or information
- meant to cover and protect an individual or companies losses from a cyber attack
- digital information
- is an application or program
- a program meant for designated and certain uses
Down
- to return something to its previous state
- composed of a certain number of characters
- to disguise yourself as someone familiar to operate a cyber attack on a victim
- a software meant to hold an individual or companies data hostage
- to fix something back in working order
- helps secure information moving across your network
- to get the latest version of a certain application or sorftware
- to gain control of
- a malicious way to get valuable items like data or money from a user
19 Clues: to gain control of • digital information • is an application or program • to fix something back in working order • to identify any activity on your network • to return something to its previous state • composed of a certain number of characters • to erase something like data or information • a program meant for designated and certain uses • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
Cyber Security Threats 2025-11-19
Across
- Fake messages or emails pretending to be genuine to steal information.
- Redirecting a user to a fake version of a legitimate website.
- Persuading someone to give information by pretending to be someone trustworthy.
- Messages designed to deceive users into clicking links or giving information.
- Software that secretly gathers user information without permission.
- An attack that floods a service or website with traffic so it cannot function.
- A network of infected devices controlled remotely by an attacker.
- Entering systems, networks or data without permission.
- Attempting to gain unauthorised access to systems or data.
- A malicious program that attaches to files and spreads between systems.
- Tricking a user into clicking on something different from what they think they are clicking.
Down
- Dishonest schemes to trick people into giving money or information.
- Watching someone enter their PIN or password to steal it.
- Stealing someone’s personal details and using them fraudulently.
- Sites designed to imitate real ones in order to steal data.
- Malicious software such as viruses, spyware, worms or trojans.
- Self-replicating malware that spreads across networks without user action.
- Software that forces unwanted advertising onto a device.
- Manipulating people into giving away confidential information.
19 Clues: Entering systems, networks or data without permission. • Software that forces unwanted advertising onto a device. • Watching someone enter their PIN or password to steal it. • Attempting to gain unauthorised access to systems or data. • Sites designed to imitate real ones in order to steal data. • Redirecting a user to a fake version of a legitimate website. • ...
Cyber Security Month Training 2018-10-18
Across
- Trust your BLANK, if it feels suspicious, it probably is
- weakest point of any and all security plans
- prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- Who's responsibility is cyber security/information security?
Down
- should be difficult to guess
- attempt to acquire sensitive information by email
- It only takes one BLANK to let someone into the system
- Instead of a password, it is suggested you use a
- A BLANK helps protect your computer from an external attack
- the best way to keep people aware of cyber security threats
10 Clues: should be difficult to guess • weakest point of any and all security plans • Instead of a password, it is suggested you use a • attempt to acquire sensitive information by email • It only takes one BLANK to let someone into the system • Trust your BLANK, if it feels suspicious, it probably is • A BLANK helps protect your computer from an external attack • ...
CSAM23 - Crossword Puzzle 2023-07-25
Across
- Form of malware designed to encrypt files and render them unusable
- SETA mascot
- Attempt to obtain personal information from a recipient via short message service (SMS) or text message app
- Where to send suspicious emails
- Potential danger that could exploit a vulnerability in your organization
- Probability of exposure resulting from a data breach
Down
- Security framework requiring authentication of all users
- Who should you contact regarding any Cyber Security Awareness Training?
- Check sender's ______ to verify that it is a legitimate email
- Who/What is the most important layer in preventing a phishing attack?
- in which platform do we take Cyber Security Awareness Training
- An unauthorized person attempting to access a system
12 Clues: SETA mascot • Where to send suspicious emails • An unauthorized person attempting to access a system • Probability of exposure resulting from a data breach • Security framework requiring authentication of all users • Check sender's ______ to verify that it is a legitimate email • in which platform do we take Cyber Security Awareness Training • ...
Buzzwords 2024-07-05
Across
- Yet another cyber security certification
- Trusting, in a mutual way
- The Chinese have a great one of these
- They wear hoodies and use laptops with green text
- $20/month for full access, or Open__
- Everything is stored in these
- Classic cyber security buzzword for secure communication
- I keep getting emails from Jim
Down
- The other half of the SSH connection, or a number for your computer
- Something Yogi would stick his hand in, or a virtual trap
- Startup companies love this approach to AI
- Error said with an accent
- Classic encryption algorithm
- Magical data center with petabytes of storage
- What Mason tried to use to run League of Legends, or how DDOS attacks work
- Elon musk's favorite way of storing data
16 Clues: Trusting, in a mutual way • Error said with an accent • Classic encryption algorithm • Everything is stored in these • I keep getting emails from Jim • $20/month for full access, or Open__ • The Chinese have a great one of these • Yet another cyber security certification • Elon musk's favorite way of storing data • Startup companies love this approach to AI • ...
Career Choices 2022-05-10
SN33003FP Chapter 1 Crossword 2024-07-03
Across
- Sensors and alert networks that warn of potential attacks.
- Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- Highly trained hackers who steal secrets or commit sabotage for their government.
- Threats posed by the increasing use of mobile devices to access enterprise information.
- Sharing of critical information about serious attacks to prevent similar ones.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Framework for implementing cybersecurity measures within an organization.
- Black hat hackers who steal money from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- Legislation to discourage cyberattacks and punish cyber criminals.
- Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- Threats from employees or partners with inside access and knowledge.
- Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who hack for fun, not profit.
- Threats that exploit weaknesses to gain access to internal resources.
- Technology connecting billions of devices to the Internet, affecting data protection needs.
- Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.
18 Clues: Sensors and alert networks that warn of potential attacks. • Black hat hackers who steal money from consumers and businesses. • Legislation to discourage cyberattacks and punish cyber criminals. • Threats from employees or partners with inside access and knowledge. • Threats that exploit weaknesses to gain access to internal resources. • ...
CTF-CW1 2025-11-14
Across
- When your day job is putting out cyber fires
- Turning real secrets into Monopoly money
- The digital gremlin living in your files
- Your digital 911 squad
- The software version of duct tape fixes
- Handshakes for computers, but without fingers
- Investigation before making a business decision
- Tekion’s loyal watchdog—barking at every securty incident
- At Tekion, this gatekeeper checks every badge before you log in!
- The boundaries of an audit or project
Down
- The “odd couple” sitcom: IT and security join forces!
- Scrambling your secrets like eggs for breakfast
- Fake facts that make AI smart without spilling your secrets.
- The puppet master deciding what your info does next.
- California’s version of “Don’t touch my data, bro!”
- That bedtime read you scroll past before clicking “Accept.”
- Tekion’s cyber ninja—silently defending apps from danger as they operate!
- Quantitative measure for assessment
- A missing or ineffective security measure
- Is your defense standing tall or slouching?
20 Clues: Your digital 911 squad • Quantitative measure for assessment • The boundaries of an audit or project • The software version of duct tape fixes • Turning real secrets into Monopoly money • The digital gremlin living in your files • A missing or ineffective security measure • Is your defense standing tall or slouching? • When your day job is putting out cyber fires • ...
Defensive Concepts & Best Practices 2025-10-07
Across
- CONTROL Restricting system access based on privileges
- Process of verifying user identity
- RESPONSE Structured approach for handling security events
- Authentication without traditional credentials
- Secure tunnel for online privacy
- Copy of data for recovery purposes
- Physical or digital item used to verify identity
Down
- HYGIENE Daily security habits to maintain a safe system
- ENGINEERING Manipulation of people to gain confidential info
- TRUST Security model assuming no user or system is inherently trusted
- Security method using more than one verification factor
- Regularly updating software to fix vulnerabilities
- BREACH Unauthorized disclosure of confidential information
- KEY Secret used to decrypt encrypted information
- AWARENESS Training users on digital safety
15 Clues: Secure tunnel for online privacy • Process of verifying user identity • Copy of data for recovery purposes • AWARENESS Training users on digital safety • Authentication without traditional credentials • KEY Secret used to decrypt encrypted information • Physical or digital item used to verify identity • Regularly updating software to fix vulnerabilities • ...
Cybersecurity 2024-04-12
Across
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- Word referring to who can use a specific system or view specific data
- A security measure that requires two or more proofs of identity to grant you access to a system (3)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- A type of backup in which an exact replica of data is created and stored in a separate location
- A broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems (2)
- IoT (3)
- Law which upholds the right of the public to access information that the government holds about them (4)
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The protection of information that says who we are, what we do and what we believe
- is a type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- Type of backup that contains only those files which have been altered since the last backup
- attack is carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Type of cyber attack that uses third-party tools or services to infiltrate a target’s system or network (2)
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
Down
- Physical, network, and operational separation of data to keep it safe from both external cyberattacks and internal threats
- Type of backup that involves backing up data that was created or changed since the last full backup
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- The process of converting ciphertext (random and meaningless) back to plaintext
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
- A perceived threat to an organisation that comes from people within the organisation (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- The greatest vulnerability in a system when thinking about cybersecurity
- Type of backup that backs up everything since the last back up
- A tool used in risk management to assess and prioritise risks based on their likelihood and potential impact (2)
- Type of encryption that involves the use of one key for both encryption and decryption
40 Clues: IoT (3) • Type of backup that backs up everything since the last back up • Word referring to who can use a specific system or view specific data • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • ...
Cybersecurity Fundamentals Chapter 8 2022-11-08
Across
- US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- poorly enforced security policies, no awareness of security
- the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- open source linux security distribution.
- disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- a method of testing the areas of weakness in systems by using various malicious techniques.
- includes the users who access the organization's information system.
Down
- assess computer, computer systems, networks, or applications for weakness.
- a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- laws prohibit undesired behaviors.
- intercept and log network traffic
- provides free analysis and warning service to internet users and organizations.
- help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.
14 Clues: intercept and log network traffic • laws prohibit undesired behaviors. • open source linux security distribution. • poorly enforced security policies, no awareness of security • includes the users who access the organization's information system. • assess computer, computer systems, networks, or applications for weakness. • ...
Program Hornet Crossword 2025-11-27
Across
- Optimising use of hypervisor technologies
- Implementing M365 tools to improve communication
- Access the network seamlessly across the globe
- Enhance the sharing of data between various applications
- Trusted identity to securely access facilities
Down
- Modern and interconnected record management solution
- Modernising the technologies used to manage ICT operations
- Optimising ways of working to speed up ICT delivery
- Migrating workloads and data to multi cloud environments
- Implementing Service Now capability
- Cyber Security data and application layers to strengthen cyber security
11 Clues: Implementing Service Now capability • Optimising use of hypervisor technologies • Access the network seamlessly across the globe • Trusted identity to securely access facilities • Implementing M365 tools to improve communication • Optimising ways of working to speed up ICT delivery • Modern and interconnected record management solution • ...
NCPD FCU Security Awareness Puzzle 2016-10-12
Across
- Your password should be ______ for you to remember, but difficult for anyone else to guess.
- Unsolicited email, which often attempts to sell a product or service is known as this.
- Always check the senders name as well as the email subject before clicking on the message so you don't get _____ into opening a phishing email.
- Software updates installed on your computer are known as this.
- This term defines a psychological manipulation of people into performing actions or divulging confidential information.
- When reviewing your email, if you don't know the sender of an email, always remember the phrase "When in doubt, throw it ____".
- Never open unexpected or _______ looking emails, or click on any questionable links contained within an email.
- _________ is one of the most important communication tools used in the work environment.
- This term defines an attempt to acquire sensitive information such as usernames, passwords, &/or credit card #'s by masquerading as a legitimate source in an email communication.
- A password that is considered to be "strong", is also known as a _______ password.
- The month of ______________ is officially known as "National Cyber Security Awareness Month".
- NCPD FCU's best line of defense against cyber security threats is ___.
- When discarding documents containing sensitive information, it's critical that you ______ them.
- The term "shoulder surfing" refers to unauthorized users attempting to view information displayed on your computer _______.
- A computer ________can corrupt or delete data, use your email to spread itself to other computers, or even erase everything on 1 or more hard drives.
- It's critical that you report all suspicious or unusual PC problems to the __ department ASAP.
Down
- When you step _______ from your desk, always lock your computer screen to prevent outsiders from accessing your PC.
- The primary goal of Cyber Security training is to promote cyber ____________.
- Computer __________ should be password protected & set to automatically activate after a few minutes of mouse or keyboard inactivity.
- To keep hard copies of sensitive documents confidential, remember to follow our "Clean Desk _______" & safely store these documents from unauthorized view.
- Store documents containing _________ information such as account #'s, SSN#, &/or credit card #'s in a locked area when you leave your desk.
- Knowing what to shred & as well as what to keep may help deter ________ theft.
- Your network _________ is a form of authentication, which is used to get you logged into the network.
- Use this 3 key combination to lock your PC screen each time you leave your desk: <Ctrl> <Alt> & <_________>.
- When creating various passwords, it's important for you to make each password slightly _________.
- It's a good practice to always _______ longer passwords for added security.
- When opening email, be ever cautious of embedded ______ contained in all email messages.
- A _________ is someone who seeks and exploits weaknesses in a computer system or computer network.
- Be wary of accepting any ___-__ messages on your PC that appear about updating program files such as Flash or Java.
- At the end of the workday, always remember to close all applications & log ___ of your computer.
- Stay alert so that you don't become a ________ of cyber crime.
- Several weeks ago, Yahoo confirmed that hackers had stolen data from at least 500 million of it's ________ accounts.
- Employees are reminded to always remain aware in order to minimize your cyber security _____ on all work, mobile & home devices.
33 Clues: Software updates installed on your computer are known as this. • Stay alert so that you don't become a ________ of cyber crime. • NCPD FCU's best line of defense against cyber security threats is ___. • It's a good practice to always _______ longer passwords for added security. • The primary goal of Cyber Security training is to promote cyber ____________. • ...
Cyber Security CrossWord 2025-08-20
Across
- Who should you reach out to when you have security-related questions?
- What type of attack relies on deceiving you by pretending to be someone you know or trust?
- What is the name of the tool you use to connect securely to the company network remotely?
- Who is the newest member of the security team?
- How often must employees reset their passwords according to policy?
- What compliance standard governs how we protect payment card data?
- What is the domain name of our internal emails?
- What is the minimum length of our password according to policy?
Down
- What do we call an email scam that tricks people into clicking malicious links?
- What type of data must be protected under PCI rules?
- What tool on your company laptop automatically scans for and blocks malware?
- What do we call the use of multiple methods of authentication to verify identity?
- What is the guest access system?
- Who is the head of our SiriusXM security team?
- What tool do employees use for Single Sign-On to company applications?
- What should you always do if you suspect a security incident?
- What kind of attack locks files until money is paid?
- What should you do when you step away from your computer?
18 Clues: What is the guest access system? • Who is the head of our SiriusXM security team? • Who is the newest member of the security team? • What is the domain name of our internal emails? • What type of data must be protected under PCI rules? • What kind of attack locks files until money is paid? • What should you do when you step away from your computer? • ...
Eimears dm litereracy crossword 2021-11-09
20 Clues: time • Fifa • photos • Online • Online • Be safe • devices • dancing • Ipad kids • Being mean • Snap streak • fun to play • Be safe people • to stay in touch • Mams and dads app • Celebrity magazine • chatting with friends • texting, playing games • affecting your time awareness • Talking and playing games with peopl
Cybersecurity 2024-03-14
Across
- Data Hostage
- Data Recovery
- Logs, Activity Tracking
- Unique Authentication
- Fake Identity
- Secure Data
- Virus Threats
- Isolated Testing
- Layered Authentication
- Fake Emails
- Engineering, Manipulative Tactics
Down
- Unpatched Vulnerability
- Security, Device Protection
- Fake emails
- Network Protection
- Extra Verification
- Insurance, Risk Coverage
- Secure Connection
- Network Overload
- Software Updates
20 Clues: Fake emails • Secure Data • Fake Emails • Data Hostage • Data Recovery • Fake Identity • Virus Threats • Isolated Testing • Network Overload • Software Updates • Secure Connection • Network Protection • Extra Verification • Unique Authentication • Layered Authentication • Unpatched Vulnerability • Logs, Activity Tracking • Insurance, Risk Coverage • Security, Device Protection • ...
GS Lecture 7 2025-02-25
Across
- An emerging _ revolution is at hand, and is expected to revolutionise sensing, imaging, precise positioning, navigation, timing, communications, computing, etc...
- _ system in the Israel-Gaza conflict uses data to rank people.
- So far, despite the hype, there are no clear indications of a possible _ cyber war.
- The US first used satellites in the _ war.
- Groups such as _ use digital technologies to recruit, train, fundraise and purchase supplies.
- The US maintains _ space programmes.
- Cyber operations can also be used during peacetime.
- Comparing cyber vs. non-cyber: Cash payments vs. _ transfers.
- After 2022, this country emerged as the 12th biggest cyber power.
- The _ use of space became more central to war fighting during the 1991 Gulf War.
- Issue of translation: there ar ebig _ in terminology and definitions, e.g. between the US, Russia, and China.
- Hamas/Iran/sympathisers launch cyber attacks on Israel (minimal impact).
- Russia attacked various targets in this country (such as government websites, denial of service, banks, and media organisations) following a decision by the (country's) government to move Soviet-era statue and graves.
- Terrorist attacks produce shock (explosions, casualties), whereas cyber operations take time, money, and _ skills.
- 11-day bombing campagin against Hamas labelled Israel's '_'.
- This country ranks as the 3rd biggest cyber power, after the US and China.
- In the Ukraine war, AI is used to _ and analyse open-source data, such as social media content to identify Russian soldiers, weapons, systems, units or their movements.
- Advances in AI and Quantum tech are likely to have important implications for the military in decades ahead but _ to completely change the nature of war and conflict.
- "_ is best understood as a descriptive prefix, an adjective conveying the digital or computer-like nature of the noun to which it is attached."
- All _ conflicts have a cyber dimension.
- AI can support decision-making through virtual _.
- "[Used by state and non-state actors] Hostile actions in cyberspace tha thave effects that amplify or are equivalent to major kinetic violence."
- A group named 'Guardians of the Peace' from this country launched a cyber attack against Sony in November 2014.
- "A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers."
- Russian cyberattacks _ to have decisive impact in support of invasion.
- Satellite reconnaissance completely changes the nuclear (and international) landscape - It provides stability in arms races, facilitates arms control, and reduces _ of a sneak attack.
- There is no indication that any single domain is '_' - e.g. a 'victory' in cyberspace does not equate with a victory in war.
- Broad security _ of war, deterrence, etc. can be applied to cyberspace.
- Rules of the road/laws of cyber war are _ to establish, making it less of a preferable choice for governments (they prefer to choose methods that they understand better).
Down
- _' use of cyber-acquired intel helps with attack planning.
- The number of satellites has exponentially _ [increased/decreased] in recent years.
- Israel's Iron Dome system ignores incoming threats if it determines they will land in _ areas.
- "Hack-and-_": The name of a cyber attack by Russia on the US during the 2016 US Presidential Election.
- Stakeholders in cyber security include _, government agencies, and civil society.
- So far, all cyber attacks have had _ durations.
- _ groups focus on what is cheap, noticeable, and deadly.
- Ai can _ the adversary's AI systems.
- Cyber operations are usually launched in tandem with _ military operations (e.g. during Russo-Georgian war).
- Ukraine's IT _ causes some disruption to Russian society but strategic impact is marginal.
- In the Ukraine war, commercial satellite _ delivers crucial intelligence to Ukraine.
- AI can help create/detect fake _ and deep fakes.
- AI can help create automated targeting and behavioural _.
- Quantum sensors can allow underground mapping, see around corners, and make oceans _ (for detecting submarines).
- Ukraine's IT Army was created on February 26th 2022 as a part of Ministry of Digital _.
- Cyber operations are _ compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) - more than half of cyber operations are aimed at collecting information or disseminating information.
- The main emphasis of government cyber operations, making adversary aware of presence.
- Refers to the use of cyber operations to deter actions within other domains of conflict or the deterrence of adversary cyberspace operations within the cyber domain.
- This country's cyberattacks on Hamas are limited because it does not rely much on the internet.
- In 2019, NATO adopted a _ and recognised space as a new operational domain, alongside air, land, maritime, and cyberspace.
- Cyber war involves direct attacks in cyberspace that are not per se aimed at military forces, but are directed at opponents' _ enabled systems in general."
- _ satellites provide connectivity for the Ukrainian military and are vital for drone strikes.
- Israel can turn on/off internet connectivity in _.
- Ukrainian cyber defences were _ due to advances in AI-enhanced threat intelligence and the quick distribution of protective software to cloud services and other computer networks.
- Cyberspace can be viewed as its own domain but it rarely exists _ from other domains. This is also true of the space domain.
54 Clues: The US maintains _ space programmes. • Ai can _ the adversary's AI systems. • All _ conflicts have a cyber dimension. • The US first used satellites in the _ war. • So far, all cyber attacks have had _ durations. • AI can help create/detect fake _ and deep fakes. • AI can support decision-making through virtual _. • Israel can turn on/off internet connectivity in _. • ...
профессии 2023-04-09
Across
- Specialist in designing systems for collecting and processing large arrays of data received from the Internet, and developing analytical models and interfaces for assembling them.
- Specialist engaged in shaping regulatory interaction on the Internet (including virtual worlds) and devising legal protection systems for people and property on the Internet (including virtual property).
- Advisor on the information security of Internet users.
- An employee whose job responsibilities include ensuring the regular operation of a fleet of computer equipment, networks and software.
- Specialist investigating cyber crimes
- A specialist in programming, that is, the creation of computer programs.
- This professional develops user-friendly, adaptive and safe interfaces for equipment, devices and software of various levels.
- Specialist in the information security of technological processes at automated industrial facilities.
Down
- Professional who designs interfaces compatible with the human nervous system, for controlling computers and household and industrial robots, taking into account the psychological and physiological traits of the user.
- Qualified specialist for a wide spectrum of operations involving data processing systems.
- Specialist tasked with dealing with the lower levels of information infrastructure, ensuring the security of dedicated network segments at these levels
- Professional who develops linguistic systems for semantic translation (translation taking into account context and shades of meaning) and text information processing (including semantic search on the Internet).
- Specialist in software development. Audits complex IT systems processing data and making decisions based on such data.
- Specialist in communications with end users of IT products and promotion of new solutions to groups having a conservative attitude towards advanced technology.
- A specialist who creates ready-made IT solutions from prebuilt templates using a graphical user interface instead of classical programming.
15 Clues: Specialist investigating cyber crimes • Advisor on the information security of Internet users. • A specialist in programming, that is, the creation of computer programs. • Qualified specialist for a wide spectrum of operations involving data processing systems. • ...
T Level Paper 2 Revision 2025-03-25
Across
- A type of malware that encrypts files and demands payment
- A weakness in a system that can be exploited by a threat
- A virtual space where users interact with applications and services over the internet
- A network type that allows remote access to a secure private system
- A type of cloud service that provides a fully managed computing environment
- A security measure that inspects and filters network traffic
- A key concern when deploying applications in a cloud environment
- A form of cyber attack where an attacker tricks users into providing sensitive information
Down
- The process of encoding data to prevent unauthorized access
- A type of cyber attack that floods a network with traffic
- A model of computing where resources are dynamically allocated and managed as needed
- The ability of a system to handle increasing workloads by adding resources
- A security process that verifies a user's identity
- A legal framework that regulates personal data protection
14 Clues: A security process that verifies a user's identity • A weakness in a system that can be exploited by a threat • A type of malware that encrypts files and demands payment • A type of cyber attack that floods a network with traffic • A legal framework that regulates personal data protection • The process of encoding data to prevent unauthorized access • ...
cyber-security-560 2024-09-05
Across
- Method of gaining access to accounts by systematically trying all possible password combinations.
- Update to software that fixes vulnerabilities or bugs to improve security and performance.
- Security process requiring two different forms of identification for access. (sigla)
- Vulnerability in software that is exploited before the developer has a chance to fix it.
- Provides secure, encrypted connections over less secure networks.
- Software designed to detect and remove malware from computers.
- Software that secretly monitors and collects information about users without their knowledge.
- System that monitors network traffic for suspicious activities or policy violations.
- General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
- Software or hardware that records every keystroke made on a computer.
Down
- Attack that overloads a system, making it unavailable to legitimate users.
- The process of converting data into a coded form to prevent unauthorized access.
- Hidden way to bypass normal authentication to gain unauthorized access to a system.
- Type of malware that encrypts data and demands a ransom for its release.
- Software or hardware that monitors and controls incoming and outgoing network traffic.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Network of infected computers that can be remotely controlled by a cybercriminal.
- Malware disguised as legitimate software but allows unauthorized access to a user’s system.
18 Clues: Software designed to detect and remove malware from computers. • Provides secure, encrypted connections over less secure networks. • Software or hardware that records every keystroke made on a computer. • Type of malware that encrypts data and demands a ransom for its release. • Attack that overloads a system, making it unavailable to legitimate users. • ...
Brain-Riddle Round 2 2025-02-11
Across
- A team that monitors and defends against cyber threats.
- The data sent back from a server after a request.
- A method of hiding data within other files.
- A file containing code for automation.
- A program where hackers get paid for finding security flaws.
Down
- A security feature that controls web resource access.
- Temporary storage that speeds up data retrieval.
- A remote computing device that communicates with a network.
- A temporary interaction between a user and a website.
- A network utility used to test connectivity.
- A lightweight data format used for data exchange.
- A type of attack that tricks users into executing unwanted actions.
- The part of a cyber attack that carries malicious code.
- A process of converting data into a fixed-size value.
- A communication endpoint for network connections.
15 Clues: A file containing code for automation. • A method of hiding data within other files. • A network utility used to test connectivity. • Temporary storage that speeds up data retrieval. • The data sent back from a server after a request. • A lightweight data format used for data exchange. • A communication endpoint for network connections. • ...
CyberSecurity 2025-05-19
Across
- Malware that disguises itself as legitimate software (6)
- A team or center that monitors and defends against cyber threats (3)
- A person who gains unauthorized access to systems (6)
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
- Software update to fix vulnerabilities (5)
- Malicious code that replicates itself by attaching to files (5)
- Malware that encrypts files and demands payment to restore access (10)
Down
- Technique used to convert data into unreadable form for security (10)
- A network of infected devices used for cyber attacks (6)
- Software that secretly gathers user information without consent (7)
- Security system that monitors and controls incoming and outgoing network traffic (8)
- Security method requiring multiple verification steps (3)
12 Clues: Software update to fix vulnerabilities (5) • A person who gains unauthorized access to systems (6) • Malware that disguises itself as legitimate software (6) • A network of infected devices used for cyber attacks (6) • Security method requiring multiple verification steps (3) • Malicious code that replicates itself by attaching to files (5) • ...
CYBER SECURITY 2022-11-01
Cyber Security 2017-06-30
11 Clues: ancient • helps you • a computer virus • infects the computer • Risks can hurt you • connected to the internet • Network online websites • it helps you protect a secret • Theft takes your personality • can take your personal information • a software that can damage your computer system
Cyber Security 2022-11-28
Across
- program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself.
- a piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions.
- Worms cause problems by using up network bandwidth and therefore slowing down the network
- a large collection of malware-infected devices (zombies).
- type of malicious software designed to harm or exploit any programmable device, service or network.
- network security device that monitors and filters incoming and outgoing network traffic
Down
- this locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- unwanted software that monitors and gathers information on a person and how they use their computer.
- over 50% of all internet traffic is
- engineering manipulating, influencing, or deceiving you in order to gain control over your computer system
- infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
11 Clues: over 50% of all internet traffic is • a large collection of malware-infected devices (zombies). • network security device that monitors and filters incoming and outgoing network traffic • Worms cause problems by using up network bandwidth and therefore slowing down the network • ...
Cyber-Security 2022-11-28
Across
- locks computer and encrypts files
- Malicious software that self-replicates
- Gaining unauthorised access to a computer
- malware hidden as a useful function
- Someone trying to hack a computer
Down
- Safety online
- Email from 'reputable source' with a link
- spread through the network + use resources
- To help prevent unauthorised access
- makes malicious ads display when online
- Monitors how people use their device
11 Clues: Safety online • locks computer and encrypts files • Someone trying to hack a computer • To help prevent unauthorised access • malware hidden as a useful function • Monitors how people use their device • makes malicious ads display when online • Malicious software that self-replicates • Email from 'reputable source' with a link • Gaining unauthorised access to a computer • ...
Cyber security 2023-04-18
Across
- month of arrest
- Distributed Denial of Service
- who took over
- attacker how did they attack
- set of Security to stop incoming intruders
- set of computer that are all linked together
- type of cybercrime
Down
- cybercrime
- demand for payment to remove the virus
- using a PC to mine for crypto
- who was arrested
- assaults attacks on the web
12 Clues: cybercrime • who took over • month of arrest • who was arrested • type of cybercrime • assaults attacks on the web • attacker how did they attack • Distributed Denial of Service • using a PC to mine for crypto • demand for payment to remove the virus • set of Security to stop incoming intruders • set of computer that are all linked together
Küberturvalisus 2020-04-05
Across
- Klaviatuur
- Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata.
- Lehekülg, kust saab infot ohutult interneti kasutamise kohta.
- ....... telefoni number on 116111.
Down
- Teise inimese identiteedi volituseta kasutamine.
- Salasõna
- Cyber security
- Programm, mis nakatab sinu arvutit.
- Computer security
- Information security
10 Clues: Salasõna • Klaviatuur • Cyber security • Computer security • Information security • ....... telefoni number on 116111. • Programm, mis nakatab sinu arvutit. • Teise inimese identiteedi volituseta kasutamine. • Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata. • Lehekülg, kust saab infot ohutult interneti kasutamise kohta.
Second 2025-08-13
Across
- Force Attempting every possible password combination
- Person or group harassing others online
- Software designed to secretly monitor your activity
- Malicious code hidden inside another program
- Engineering Technique to trick people into revealing confidential information
- Security technique that converts data into unreadable form
- Hygiene Set of online habits to maintain security and privacy
Down
- Copy of important files kept separately for safety
- Horse Malicious program disguised as legitimate software
- Program that records every keystroke you type
- Fraud tactic to make a site look like another
- Official Indian body responding to cybersecurity incidents
- Injection Data theft by manipulating a website’s database queries
- Act 2000 Law in India dealing with cyber crimes
- Cyber attack exploiting a vulnerability before it’s fixed
- Device or software used to secure online privacy by masking IP
16 Clues: Person or group harassing others online • Malicious code hidden inside another program • Program that records every keystroke you type • Fraud tactic to make a site look like another • Act 2000 Law in India dealing with cyber crimes • Copy of important files kept separately for safety • Software designed to secretly monitor your activity • ...
Cyber-security 2021-01-17
Across
- refers to the security of a computer or computer system
- authentication mechanisms, access channels and systems all have to work properly
- demands a ransom from you to get things back on track.
- result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
- ensure that information is hidden from people unauthorised to access it.
- modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
- helps hackers spy on systems and their users.
- self-replicating and spreads without end-user action, causing real devastation.
- ensuring that data has not been tampered with and, therefore, can be trusted.
- are attempts to expose users to unwanted, potentially malicious advertising.
- malicious instructions that appear as legitimate programs.
11 Clues: helps hackers spy on systems and their users. • demands a ransom from you to get things back on track. • refers to the security of a computer or computer system • malicious instructions that appear as legitimate programs. • ensure that information is hidden from people unauthorised to access it. • ...
Cyber Security 2023-09-14
Across
- A scam where attacks deceive people into revealing data
- system designed to defend your data
- allows you to connect to internet
- a modern digital electronic device
- defense
Down
- a encrypted connection over the internet from a device to network
- data or program use to operate computers
- hiddden or secret word
- a program that infect a computer
- A collections of continuous value that conveys information
- a person who uses computers to gain unauthorized access to data.
11 Clues: defense • hiddden or secret word • a program that infect a computer • allows you to connect to internet • a modern digital electronic device • system designed to defend your data • data or program use to operate computers • A scam where attacks deceive people into revealing data • A collections of continuous value that conveys information • ...
Cyber Security 2021-10-01
Across
- Encoding data with a password or key
- a hardware or software network security system
- protecting an account with something you know and something you have or are
- secures your account
- a network created using the world wide web
Down
- the type of malware that WannaCry is
- What CCPA and GDPR are trying to protect
- A type of malware that replicates itself
- malicious software that acts legitimately but has underlying malicious intent
- the process of making copies of data to use when original files are lost, destroyed or corrupted
- the act of sending false emails to unsuspecting people for fraudulent purposes
11 Clues: secures your account • the type of malware that WannaCry is • Encoding data with a password or key • What CCPA and GDPR are trying to protect • A type of malware that replicates itself • a network created using the world wide web • a hardware or software network security system • protecting an account with something you know and something you have or are • ...
Cyber security 2017-05-12
Across
- Exposes any attempts by attackers to overcome security controls.
- Natural disasters such as floods.
- Countries always spy on each other.
- The level of assurance that the data will be available to those who need it when they want it.
- A person who uses existing codes to hack into computers.
- The real name of our cyber security teacher.
Down
- A method that is used to test the security of software.
- Access must be restricted to those authorised to view the data in question.
- An individual who gains unauthorised access to a computer system or network.
- The level of assurance as to the accuracy and trustworthiness of the data.
- Software designed to prevent, detect and eradicate malicious software.
11 Clues: Natural disasters such as floods. • Countries always spy on each other. • The real name of our cyber security teacher. • A method that is used to test the security of software. • A person who uses existing codes to hack into computers. • Exposes any attempts by attackers to overcome security controls. • ...
Cyber Security 2024-09-04
Across
- A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website.
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge).
- A location on the internet where you can save your data (rather than on your computer or device)
- Getting into someone else’s computer or device without their permission.
- A way to stop hackers getting into your accounts, even if they know your password.
Down
- You need to create one of these to access services on the internet (such as email and shopping).
- Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of.
- Nasty software that can have a bad impact on your device or computer
- Unwanted emails or messages that usually try to sell you something.
- A copy of the information held on a device (such as photos and documents) which is stored somewhere else
- A sequence of characters (or words) used to stop criminals from accessing your accounts.
11 Clues: Unwanted emails or messages that usually try to sell you something. • Nasty software that can have a bad impact on your device or computer • Getting into someone else’s computer or device without their permission. • A way to stop hackers getting into your accounts, even if they know your password. • ...
Cyber security 2022-11-18
Across
- unwanted software that monitors and gathers information on a person and how they use their computer
- when human users of a system are tricked into providing confidential information
- software designed to gain access to your computer with malicious intent
Down
- automated programs that repeat tasks repeatedly botnet a large collection of malware-infected devices (zombies)
- measures put in place to make it harder for attackers
- checks incoming and outgoing network
- piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions
- an attack using botnet
- attach themselves to files and self-replicate
- infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
- software that scans any file that is able to execute code
11 Clues: an attack using botnet • checks incoming and outgoing network • attach themselves to files and self-replicate • measures put in place to make it harder for attackers • software that scans any file that is able to execute code • software designed to gain access to your computer with malicious intent • ...
Cyber Security 2023-05-31
Across
- Original lead singers birth city
- What tool?
- I'm looking for a metal?
- Original band home country
- Original band home country
Down
- Guitarist's stage name
- Original artist is buried here
- What kind of car?
- Original singers birthname
- Original singers debut album
- What time of day?
- Last name of the guy Chaim Witz created this band with
12 Clues: What tool? • What kind of car? • What time of day? • Guitarist's stage name • I'm looking for a metal? • Original singers birthname • Original band home country • Original band home country • Original singers debut album • Original artist is buried here • Original lead singers birth city • Last name of the guy Chaim Witz created this band with
Cybersecurity 2024-04-12
Across
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- Type of encryption that involves the use of one key for both encryption and decryption
- Type of backup that backs up everything since the last back up
- Type of backup that involves backing up data that was created or changed since the last full backup
- Law which upholds the right of the public to access information that the government holds about them (4)
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- Type of backup that contains only those files which have been altered since the last backup
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- Type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
Down
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The protection of information that says who we are, what we do and what we believe
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A perceived threat to an organisation that comes from people within the organisation (2)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- The greatest vulnerability in a system when thinking about cybersecurity
- Attack carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- The process of converting ciphertext (random and meaningless) back to plaintext
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- IoT (3)
- A type of backup in which an exact replica of data is created and stored in a separate location
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
34 Clues: IoT (3) • Type of backup that backs up everything since the last back up • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • Word related to data being held on system devices such as hard drives and servers • ...
Cyber Security 2022-02-10
Across
- prevents a local computer from using a URL or an IP address to gain access to the server
- Legacy firewall
- Point to point
- blocks cookies
- blocks internet requests from unknown sources
Down
- block multicast
- Layer 2 tunneling protocol pass through
- Passthrough for ispec
- blocks java
- blocks ActiveX
- blocks proxy servers
11 Clues: blocks java • blocks ActiveX • Point to point • blocks cookies • block multicast • Legacy firewall • blocks proxy servers • Passthrough for ispec • Layer 2 tunneling protocol pass through • blocks internet requests from unknown sources • prevents a local computer from using a URL or an IP address to gain access to the server
Cyber Security 2026-01-28
Across
- millions of computers and devices all linked together to allow them to communicate
- the term for all of the different types of program that are written to
- A person who tries to gain access to a computer system without permission
- a program written to cause damage to the programs installed on a computer
- |The process you go through to gain access to a computer system
- a set of letters or characters that allow you to access a computer system
Down
- When you write something in a secret code so nobody else can read it
- facts on the Internet that aren't true and are designed to cause people to worry
- The computers in one place that are connected together to share devices and information
- word to describe a computer system that nobody can access without permission
- A program designed to track down and remove dangerous programs on your computer
11 Clues: |The process you go through to gain access to a computer system • When you write something in a secret code so nobody else can read it • the term for all of the different types of program that are written to • A person who tries to gain access to a computer system without permission • a program written to cause damage to the programs installed on a computer • ...
Cyber security 2021-04-15
Across
- person who tries to gain unauthorised access to a computer
- unauthorised access to a computer.
- techniques that rely on measurable physical characteristics (eg fingerprint or iris) that can be automatically checked
- software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them
- program secretly installed on a computer to automatically collect information about the user over a period of time
- that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details
Down
- that causes pop-ups or windows that will not close
- attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details
- cyberattack that redirects a user from a genuine website to a fake one
- that appears legitimate, but performs some malicious activity when it is run
- computer program designed to replicate and damage other computer systems and software.
11 Clues: unauthorised access to a computer. • that causes pop-ups or windows that will not close • person who tries to gain unauthorised access to a computer • cyberattack that redirects a user from a genuine website to a fake one • that appears legitimate, but performs some malicious activity when it is run • ...
Cyber security 2022-11-28
Across
- Methods to help yourself be safe online
- People who hack with little knowledge
- Malware disguised as something useful ie game
- Watching a victim enter sensitive data
Down
- Example of ransom wars attack
- Self replicating software
- Email disguised as a reputable source
- Entering in different passwords for luck
- Flooding a targeted machine with requests
- Creating a scenario to make the victim panic
- These use the network and it’s resources
11 Clues: Self replicating software • Example of ransom wars attack • Email disguised as a reputable source • People who hack with little knowledge • Watching a victim enter sensitive data • Methods to help yourself be safe online • Entering in different passwords for luck • These use the network and it’s resources • Flooding a targeted machine with requests • ...
Cyber Security 2024-02-05
Across
- The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- Gaining unauthorised access to or control of a computer system.
- Generator Attack An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password).
- Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.
- An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
Down
- Engineering A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- Computer Misuse Act Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
- Hacking Performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
- The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
11 Clues: Gaining unauthorised access to or control of a computer system. • Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data. • Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password). • ...
Cyber Security 2025-01-14
Across
- Refers to legal property rights of a person over creations (artistic/commercial) of his/her mind
- Virtual diaries created by people to share their hobbies, thought with like minded people
- It is called as network of networks
- Safe and responsible use of Internet to safeguard one's information
- Person who purposely posts opposing, sarcastic, insulting comments about something/someone
- Emails sent by people which is fake/not genuine
Down
- Usage or imitation of the language and thoughts of another person projected as own's original work
- It is also called as a digital dossier
- Hacking done for national security and creating safer systems
- Criminals portray incorrect details as an employer
- Bulk mail sent by identified or unidentified source
11 Clues: It is called as network of networks • It is also called as a digital dossier • Emails sent by people which is fake/not genuine • Criminals portray incorrect details as an employer • Bulk mail sent by identified or unidentified source • Hacking done for national security and creating safer systems • Safe and responsible use of Internet to safeguard one's information • ...
Cyberattack Response 2024-06-28
Across
- Information harm
- Call for action
- Act of bringing attention
- Prevent further damage
- Combating hate organization
- Dangerous falsehoods
- Siddhayoga group action
- To mislead
- Urgent message
Down
- Legal action group
- To observe or see
- Online security threat
- Online keyword suggestions
- Essential response
- Search engine
- Sudden, harmful event
- Malicious software
- Involuntary reaction
- Organized group
- To act with purpose
20 Clues: To mislead • Search engine • Urgent message • Call for action • Organized group • Information harm • To observe or see • Legal action group • Essential response • Malicious software • To act with purpose • Involuntary reaction • Dangerous falsehoods • Sudden, harmful event • Online security threat • Prevent further damage • Siddhayoga group action • Act of bringing attention • ...
TEKA TEKI SILANG P5 2023-10-04
Across
- Sikap yang dapat dimunculkan dalam mengantisipasi kejahatan di dunia maya
- Ancaman yang dapat terjadi di media akibat Cyber crime
- Aspek dalam cyber security
- Bentuk perundungan di dunia maya
- Salah satu jaringan yang kadang dimanfaatkan oleh hacker
Down
- Data informasi probadi yang harus dilindungi
- Salah satu kerugian dari kejahatan dunia maya
- Bentuk dari Cyber Crime
- Jaringan komunikasi global
- Salah satu kejahatan yang menggunakan kemajuan teknologi.
10 Clues: Bentuk dari Cyber Crime • Aspek dalam cyber security • Jaringan komunikasi global • Bentuk perundungan di dunia maya • Data informasi probadi yang harus dilindungi • Salah satu kerugian dari kejahatan dunia maya • Ancaman yang dapat terjadi di media akibat Cyber crime • Salah satu jaringan yang kadang dimanfaatkan oleh hacker • ...
IGYUK Angol rejtvény 2024./VII-VIII. - Security 2024-08-29
Across
- Closed ... Television, or CCTV for short
- ...security = The field of security in the virtual world
- A piece of document describing past errors and events in a system
- A short phrase or combination of characters used to restrict access to information
- A system generating loud noise when triggered
Down
- The act of observing an area or person for security reasons
- A device used to restrict access to doors, boxes, or containers. Needs a key.
- The act of entereing one's property to steal things
- Computer tool to keep out cyber attacks
- A person in charge of protecting a place, a thing or a person
10 Clues: Computer tool to keep out cyber attacks • Closed ... Television, or CCTV for short • A system generating loud noise when triggered • The act of entereing one's property to steal things • ...security = The field of security in the virtual world • The act of observing an area or person for security reasons • ...
E-Safety Crossword Puzzle 2021-02-14
Cyber Security ACMH 2018-09-21
Across
- Malware that is loaded onto a computer and then run without the user's knowledge or knowledge of it's full effects.
- Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
- Something that can cause harm to a system or organization.
- The transformation of data to hide its information content.
- Malware that passes information about a computer user's activities to an external party.
- Intrusion detection system that also blocks unauthorized access when detected.
- The process to verify that someone is who they claim to be when they try to access a computer or online service.
Down
- Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.
- Obtaining evidence of identity by two independent means.
- Software intended to infiltrate and damage or disable computers.
- The process of identifying, analyzing and evaluating risk.
- A flaw or weakness that can be used to attack a system or organization.
- Method used by criminals to try to obtain financial or other confidential information from internet users, usually through email.
- A secret series of characters used to authenticate a person's identity.
- Malware that replicates itself so it can spread to infiltrate other computers.
- Someone who violates computer security for malicious reasons, kudos or personal gain.
- Something that could cause an organization no to meet one of its objectives
17 Clues: Obtaining evidence of identity by two independent means. • The process of identifying, analyzing and evaluating risk. • Something that can cause harm to a system or organization. • The transformation of data to hide its information content. • Software intended to infiltrate and damage or disable computers. • ...
Science and technology 2023-11-19
13 Clues: - Genetic code • - Physics realm • - Basic particle • - Global network • - Entire DNA set • - Tiny technology • - Celestial study • - Digital security • - Disease prevention • - Energy from the sun • - Step-by-step process • - Biological technology • - Orbital communication
Cyber Cross 2025-03-18
Across
- Protects your online privacy using encrypted tunnels - initials (3)
- A cyber security measure - Two-factor _ (14)
- A company famous for Windows (9)
- _ Horse - Malware that tricks users by pretending to be something else (6)
- The virtual world, or a digital universe? (9)
- Steve Jobs' famous company (5)
- A mathematical step-by-step method to solve a problem (9)
- The process of converting information into a code to prevent unauthorised access (10)
Down
- Angling for a deceptive cyber attack (8)
- Web pages love to leave these sweet things behind on your device (7)
- _ Learning - teaching computers to improve from experience (8)
- You can buy one-of-a-kind digital art with these – initials (3)
- Security barrier, but not the brick kind! (8)
- TURING This famous figure cracked the Enigma code (4,6)
- Competitive gaming (7)
- A hidden part of the internet, often used for illegal activities (4,3)
16 Clues: Competitive gaming (7) • Steve Jobs' famous company (5) • A company famous for Windows (9) • Angling for a deceptive cyber attack (8) • A cyber security measure - Two-factor _ (14) • Security barrier, but not the brick kind! (8) • The virtual world, or a digital universe? (9) • TURING This famous figure cracked the Enigma code (4,6) • ...
IoT Puzzle 2025-04-01
Across
- The practice of protecting internet-connected systems from cyber threats.
- A secret or hidden way to bypass security and gain unauthorized access to a system or network.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a code to prevent unauthorized access.
- Short-range wireless technology.
- Devices that collect and transmit real-time data from the environment.
Down
- Malicious software designed to harm or exploit devices or networks.
- Wireless standard for IoT connectivity.
- Software embedded in IoT devices that controls their operations.
- Verifying a user’s identity before granting access to a system.
- Remote servers used for data storage & processing.
- Connects IoT devices to the internet.
- Wireless transmission of data.
- Wireless communication protocol for IoT.
- A type of cyber-attack where attackers trick users into providing sensitive information.
- A network topology where devices connect directly and relay data to each other.
16 Clues: Wireless transmission of data. • Short-range wireless technology. • Connects IoT devices to the internet. • Wireless standard for IoT connectivity. • Wireless communication protocol for IoT. • Remote servers used for data storage & processing. • Verifying a user’s identity before granting access to a system. • ...
Cybersecurity Puzzle 2024-10-14
Across
- using historical data and advanced predictive algorithms
- AI- driven systems demonstrate this against evolving threats
- One of the databases used in the study
- a form of network intrusion
- pose an ever-growing challenge to security
Down
- researchers argue that this approach will simplify cybersecurity
- A form of cyber applications of AI bas
- A critical concern against AI systems
- one of the various facets of cyber security
9 Clues: a form of network intrusion • A critical concern against AI systems • A form of cyber applications of AI bas • One of the databases used in the study • pose an ever-growing challenge to security • one of the various facets of cyber security • using historical data and advanced predictive algorithms • AI- driven systems demonstrate this against evolving threats • ...
Cyber Smart 2022-01-31
Across
- to keep others out of your personal devices
- online security practices
- keeps your device/s run properly
- physically separate location from the original
- before clicking on links
- steps taken to prevent cyber hacking
- to remove from a system or device
Down
- your sign in
- online
- recognized suspected scams
- when you are requested to provide private information
11 Clues: online • your sign in • before clicking on links • online security practices • recognized suspected scams • keeps your device/s run properly • to remove from a system or device • steps taken to prevent cyber hacking • to keep others out of your personal devices • physically separate location from the original • when you are requested to provide private information
Test 2024-07-19
Across
- Establishes early warning sensors and alert networks to warn others of potential attacks.
- Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
- Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
- Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
- Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
- Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
- Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
- Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
- Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
- Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
- Exploit weaknesses or vulnerabilities to gain access to internal resources.
- Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
- Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.
18 Clues: Exploit weaknesses or vulnerabilities to gain access to internal resources. • Establishes early warning sensors and alert networks to warn others of potential attacks. • Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun. • ...
Brain-Riddle Round 2 2025-02-11
Across
- A system that translates domain names to IP addresses.
- A tool that encrypts internet connections for privacy.
- A team that monitors and defends against cyber threats.
- A method of hiding data within other files.
- The data sent back from a server after a request.
- A remote computing device that communicates with a network.
- A program where hackers get paid for finding security flaws.
Down
- A temporary interaction between a user and a website.
- The part of a cyber attack that carries malicious code.
- A security feature that controls web resource access.
- A process of converting data into a fixed-size value.
- A temporary storage to speed up data access.
- A set of rules for communication between software.
- A type of attack that tricks users into executing unwanted actions.
- A file containing code for automation.
15 Clues: A file containing code for automation. • A method of hiding data within other files. • A temporary storage to speed up data access. • The data sent back from a server after a request. • A set of rules for communication between software. • A temporary interaction between a user and a website. • A security feature that controls web resource access. • ...
Unique MFAT Job Title Holders 2019-04-16
13 Clues: Asset Analyst • Document Writer • Archives Adviser • Comsec Custodian • Purchasing Officer • Sponsorship Manager • Classified Registrar • Commercial Specialist • MFAT Research Adviser • Business Process Manager • Service Delivery Manager • Cyber Security Specialist • Strategy & Planning Manager
Enteprise 2025-08-11
Across
- Liability Insurance – Insurance coverage protecting against financial losses from cyber incidents.
- Intelligence (BI) – Tools and processes that analyse data to help organisations make informed decisions.
- cloud – Cloud services deployed across multiple locations but managed from a central provider.
- Automation – Using AI, machine learning, and robotic process automation to automate complex tasks.
- Mesh – A flexible, modular approach to security where controls are distributed across different systems.
- Immune System (DIS) – Integrated systems designed to detect, prevent, and recover from digital threats.
- Detection and Response (EDR) – Security tools that monitor, detect, and respond to threats on devices.
- – Creating digital interactions across multiple devices, touchpoints, and platforms seamlessly.
Down
- Authentication (MFA) – A login process requiring two or more verification methods for security.
- (XaaS) – Delivering all types of IT services over the internet on a subscription basis.
- Intelligence (AI) – Machines or software that can perform tasks requiring human-like intelligence.
- Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies.
- technology – Tech designed to reduce environmental impact and promote long-term ecological balance.
- – A persistent, virtual 3D space where people can interact, work, and play.
- Screening – Scanning systems to detect security weaknesses before they can be exploited.
- Computing – Computers that use quantum bits (qubits) to solve problems faster than classical computers.
16 Clues: Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies. • – A persistent, virtual 3D space where people can interact, work, and play. • (XaaS) – Delivering all types of IT services over the internet on a subscription basis. • Screening – Scanning systems to detect security weaknesses before they can be exploited. • ...
Policy on Service and Digital 2020-09-01
Across
- Section 4.5 of the PSD includes requirements for the CIO of Canada and Deputy Heads on supporting __________ __________ and capability.
- The management of the functions under the PSD is guided by principles and best practice of the Government of Canada ______________ _______________
- The CIO of Canada is responsible for prescribing enterprise-wide __________ and ____________ standards for quality, accessibility and data interoperability.
- In alignment with a 2016 Direction, the PSD includes requirements for the CIO of Canada and Deputy Heads to support innovation and _____________.
- The objective of the PSD is that ______ ______ ________ and government operations are improved through digital transformation approaches
- Deputy Heads are responsible for maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada _______ _________ _____.
- The CIO of Canada will approve an annual, forward-looking three-year __________-wide plan that establishes strategic direction for the integrated management of service, information, data, IT, and cyber security.
- The Policy on _____ __ _____ articulates how Government of Canada organizations manage service delivery, information and data, information technology, and cyber security in the digital era
- Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________
Down
- Deputy Heads are responsible for ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the _________ _____ and any other relevant legislation, policy or agreement.
- Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.
- Deputy Heads are responsible for establishing __________ governance to ensure the integrated management of service, information, data, IT, and cyber security within their department.
- Deputy Heads must __________ the online end-to-end availability of services and their ease of use to complement all service delivery channels.
- The _____________ ___________________ Officer of Canada provides advice to the President and the Secretary of the Treasury Board of Canada about governing and managing enterprise-wide information, data, IT, cyber security, and service design and delivery.
- The PSD supports the mandate of the Minster for _______ _____________
- The CIO of Canada is responsible for defining ______ ________ requirements to ensure that Government of Canada and departmental information and data, applications, systems and networks are secure, reliable and trusted.
16 Clues: The PSD supports the mandate of the Minster for _______ _____________ • Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems. • Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________ • ...
Cyber Security Crossword 2019-03-23
Across
- Software that modifies a web browser's settings without a user's permission to inject unwanted advertising into the user's browser
- Another type of malware that uses a backdoor and named after the wooden horse that the Greeks used to infiltrate Troy
- A malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR)
- An undocumented way of accessing a system, bypassing the normal authentication mechanisms
- In contrast to viruses, which require the spreading of an infected host file, this is a standalone software and does not require a host program or human help to spread
- Network Security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- It spreads from one computer to another, leaving infections as it travels
- The action of recording (logging) the keys struck on a keyboard, typically secretively, so that the person using the keyboard is unaware that their actions are being monitored
Down
- Software that aims to gather information about a person or organization without their knowledge
- Is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
- Software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process
- A type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- Short for "Denial of Service" Attacks, which is a malicious attempts by one or more people to cause the victim, site, or node to deny service to its customers
- Is derived from the word "robot" and is an automated process that interacts with other network services
- Also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks
- May reside at the user or kernel level in the operating system or lower to include a hypervisor, master boot record, or the system firmware
16 Clues: It spreads from one computer to another, leaving infections as it travels • An undocumented way of accessing a system, bypassing the normal authentication mechanisms • Software that aims to gather information about a person or organization without their knowledge • ...
Interpol Investigation Challenge 2023-10-07
Across
- The United States' primary counter-terrorism agency
- A country in East Asia known for its efforts in countering cyber threats and cyber terrorism
- The country that hosts the annual Munich Security Conference, discussing counter-terrorism strategies
- The country where INTERPOL's General Secretariat is located
- The organization responsible for implementing counter-terrorism sanctions at the United Nations
- A country in Southeast Asia that has faced threats from groups like Abu Sayyaf
- The United States' primary intelligence agency responsible for counter-terrorism analysis
- A term for the unlawful use of violence and intimidation, often for political purposes
- A global network of law enforcement agencies that share information and collaborate on international crime
- The United Nations agency responsible for providing counter-terrorism assistance to member states
Down
- The international organization that sets global standards for combating money laundering and terrorist financing
- A term for the process of gathering and analyzing information to prevent terrorist activities
- The international organization focused on aviation security and counter-terrorism
- A country known for its involvement in counter-terrorism efforts in the Middle East
- The international organization focused on nuclear security and counter-terrorism
- The branch of the military responsible for counter-terrorism operations in the United States
- The European Union's law enforcement agency that deals with cross-border crime and terrorism
- A term for the use of non-lethal tactics and strategies to counter terrorism
- The United Kingdom's primary domestic intelligence and security agency
- A country in East Africa that has faced challenges from terrorist groups like Al-Shabaab
20 Clues: The United States' primary counter-terrorism agency • The country where INTERPOL's General Secretariat is located • The United Kingdom's primary domestic intelligence and security agency • A term for the use of non-lethal tactics and strategies to counter terrorism • A country in Southeast Asia that has faced threats from groups like Abu Sayyaf • ...
CHRISTMAS 2016 2016-11-26
Across
- BINGO
- THE PROFESSOR
- OLDEST IDENTICAL TWIN
- MISS PSYCHOLOGY
- YOUNGEST IDENTICAL TWIN
- OOBER
- I AM BABY HEAR ME SING
- MISS CHEERLEADER
- ME CYBER-SECURITY
- PEEKY
- SCHOOL CAREGIVER
- MR KARATE
Down
- MOTHER OF FRATERNAL TWINS
- MISS RANTOUL WEATHER GIRL
- ME BEHIND THE SCENES
- PO-BABE
- HOT-DOG
- THIRD GRANDCHILD
- SWIMMER
- OLDEST OF FOUR
- MOTHER OF THREE "FIELD" MICE
- SEAHAWKS FAN
22 Clues: BINGO • OOBER • PEEKY • PO-BABE • HOT-DOG • SWIMMER • MR KARATE • SEAHAWKS FAN • THE PROFESSOR • OLDEST OF FOUR • MISS PSYCHOLOGY • THIRD GRANDCHILD • MISS CHEERLEADER • SCHOOL CAREGIVER • ME CYBER-SECURITY • ME BEHIND THE SCENES • OLDEST IDENTICAL TWIN • I AM BABY HEAR ME SING • YOUNGEST IDENTICAL TWIN • MOTHER OF FRATERNAL TWINS • MISS RANTOUL WEATHER GIRL • MOTHER OF THREE "FIELD" MICE
Murphy's Crossword 2025-12-01
Across
- Slick
- Dog Whisperer
- Interior Designer
- DCR
- Musician
- Weed
- Heavy Machinery
- Clean Freak
- Spy
- Fisherman
- Sponsor
- Doctor
- Proud Father
Down
- Dental Assistant
- Marion’s Favorite Residence
- Stellar Mother
- Loving Babysitter
- Marion & David’s Residence
- ER Tech
- Ambitious
- Cyber Security
- Alternative for Fire
- City of Choice
- Artist
- Married on a Mountaintop
- Handyman
- the mauler
- St. Columbkille’s
- Restaurant Manager
29 Clues: DCR • Spy • Weed • Slick • Artist • Doctor • ER Tech • Sponsor • Musician • Handyman • Ambitious • Fisherman • the mauler • Clean Freak • Proud Father • Dog Whisperer • Stellar Mother • Cyber Security • City of Choice • Heavy Machinery • Dental Assistant • Interior Designer • Loving Babysitter • St. Columbkille’s • Restaurant Manager • Alternative for Fire • Married on a Mountaintop • Marion & David’s Residence • ...
Crossword activity: Find the threat! 2021-06-10
Across
- Security implementation involves four complementary courses of action: prevention, detection, response, and _.
- Don’t use the same _ on different sites and change it regularly.
- Cyber _ includes single actors or groups targeting systems for financial gain or to cause disruption.
- _ is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.
- _ security protects the integrity and privacy of data, both in storage and in transit.
- A loss of _ is the disruption of access to or use of information or an information system.
- _ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- A _ is set on the boundaries of any system or network which monitors and controls network traffic.
Down
- _ security refers to the protection of hardware, software, and data from attackers.
- _ security includes the processes and decisions for handling and protecting data assets.
- The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _.
- Data leakage is an unauthorized transfer of _ to the outside world.
- Avoid using unsecure _ networks in public places
- A(n) _ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
- _ is a malware that aims to steal data about the organization or person.
15 Clues: Avoid using unsecure _ networks in public places • Don’t use the same _ on different sites and change it regularly. • Data leakage is an unauthorized transfer of _ to the outside world. • _ is a malware that aims to steal data about the organization or person. • _ security refers to the protection of hardware, software, and data from attackers. • ...
cyber security quiz 2025-07-07
Across
- A security method using fingerprints, face, or retina scans
- A tool that records everything typed on a keyboard
- A software that secretly monitors and collects user information
- The process of verifying the identity of a user or device
- Malware that locks or encrypts data and demands payment to release it
- The process of converting data into a coded form to protect it
- A harmful program that disguises itself as useful software
- The illegal copying, use, or distribution of software
- A set of rules for formatting and transmitting data over networks
Down
- A hidden entry point used to bypass normal security
- A protective barrier that blocks unauthorized access to or from a network
- A group of infected computers remotely controlled by a hacker
- A general term for any software designed to harm or exploit devices
- The act of tricking people into revealing sensitive information online
- A software used to detect, prevent, and remove malicious programs
- A defined sequence of steps used to solve a problem or perform a task
16 Clues: A tool that records everything typed on a keyboard • A hidden entry point used to bypass normal security • The illegal copying, use, or distribution of software • The process of verifying the identity of a user or device • A harmful program that disguises itself as useful software • A security method using fingerprints, face, or retina scans • ...
Security Week 1 2024-08-13
10 Clues: Entry • Protector • Secret entry code • Malicious software • Secure message technique • Prefix for digital security • Identity verification method • Use of personal tech at work • It comes in an email, not a pond • Security marking for government data
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
