cyber security Crossword Puzzles
Cyber Security Awareness 2023-10-10
Across
- - a malicious computer program that displays intrusive pop-up advertisements
- - malware designed to deny access to files by encrypting
- - A flaw or weakness in the computer
- - function used to map data of arbitrary size to fixed-size values
- - taking information and images from other people and uses them to create a new identity for themselves
- - deceiving, pressuring or manipulating people into sending information to wrong people
- - covert method of bypassing normal authentication or encryption in a computer
- - exploit of a vulnerability
- - personal data leak
- - unauthorized alteration of personal data
- - attackers pretend to be an authentic user
- - Hackers demand ransom in this currency
Down
- - install a backdoor in the infected computer
- - vulnerability in a computer system that was previously unknown to its developers or anyone capable of mitigating it
- - website made unavailable to legitimate user
- - group of computers which have been infected and under the control of a malicious actor
- - software tool designed to take advantage of a flaw in a computer system
- - data is complete, trustworthy
- - Malicious software which is installed in your system
- - updates that address security vulnerabilities within a program or product
- - India's first comprehensive data protection law
- - hiding or coding information so that only the person a message was intended for can read it
- - person who attempts to gain unauthorized access to a system
- - right to control how your information is viewed and used
- - Browser for the dark web
25 Clues: - personal data leak • - Browser for the dark web • - exploit of a vulnerability • - data is complete, trustworthy • - A flaw or weakness in the computer • - Hackers demand ransom in this currency • - unauthorized alteration of personal data • - attackers pretend to be an authentic user • - install a backdoor in the infected computer • ...
Cyber Security Crossword 2023-09-10
Across
- when cyber criminals deceive others by acting as someone or something else. usually through email or messages
- a security violation in which sensitive/confidential information has been accessed/stolen by an unauthorized person
- pretending to be someone else in order to get someones personal information
- sends signals to devices
- someone listening to a conversation to gain personal information
- intrusive software made by cyber criminals to damage/destroy computers and computer systems
- checking a users credentials to see if they are allowed to access the protected information
- any activity to protect the functionality and contents of information
- preventing and detecting threats to protect information being stolen/tampered with
- a device used to access the worldwide web
Down
- manipulating or influencing someone to gain access to their computer personal information
- monitors incoming and outgoing networking traffic
- the programs and other operating information used by a computer
- a type of malware that grows and spreads throughout the device inf
- a type of malware that threatens to release personal information if they don't pay a ransom
- securing networks by actively seeking out weaknesses in the defense
- attackers deceiving people into revealing personal info or download malware
- detects and destroys computer viruses
- a computer program that can copy itself and infect a computer without the users permission/knowledge
- a form of security in which information is converted into cypher-text
20 Clues: sends signals to devices • detects and destroys computer viruses • a device used to access the worldwide web • monitors incoming and outgoing networking traffic • the programs and other operating information used by a computer • someone listening to a conversation to gain personal information • a type of malware that grows and spreads throughout the device inf • ...
Cyber security Scruffle 2023-09-07
Across
- bait to receive money from the victim
- keeps your data from being breached/recognized
- an in-person device used to access your data on web
- a form of securing your accounts from other people
- verifies if you are "you"
- a type of attack that is initiated by a user interaction
Down
- a form of attack where someone listens to a conversation to gain personal access
- taking measures to make sure no unknown person has your online data
- protects from online attacks against a business
- no cable internet
- a cyber attack that spreads in a large quantity
- a group of devices which are sharing the same data
- an operating system for your device
- Drive a small plug in with saved files, photos, ect.
- a saved version of your files or general work in case it is lost
- a way of accessing personal information/account unauthorized
- emails, texts or messages from a bait to gain access to your information
- information on your device that is related to what you are doing
- device used to access the online web
- accessing your account through a password to authenticate it is the user.
20 Clues: no cable internet • verifies if you are "you" • an operating system for your device • device used to access the online web • bait to receive money from the victim • keeps your data from being breached/recognized • protects from online attacks against a business • a cyber attack that spreads in a large quantity • a group of devices which are sharing the same data • ...
cyber security vocabulary 2023-09-07
Across
- letter numbers and symbols combined to prevent unauthorized entry
- sofware that creates representations of servers, storage and networks
- a collection of documents
- an illegitimate source, not mainstream
- not connected to the internet
- software that prevents attacks
- handles cpu and high speed ram
- an extra layer of security
- information on a computer
- created on the internet to serve a purpose
- preserves the condition of a computer
- connection between computers
Down
- connects a computer to internet
- an attack via email or text in an attempt at information
- false information used to obtain information
- handles peripherals
- physical parts of a computer
- an account created to send information
- information withheld in exchange for money
- an increased use in cpu
20 Clues: handles peripherals • an increased use in cpu • a collection of documents • information on a computer • an extra layer of security • physical parts of a computer • connection between computers • not connected to the internet • software that prevents attacks • handles cpu and high speed ram • connects a computer to internet • preserves the condition of a computer • ...
Cyber Security Puzzle 2025-03-14
Across
- verifying a users identity
- Secret key to unlock phone
- conveying data onto a fixed value
- part internet used for illegal activities
- Self replicating malware
- Cyberattack that trick's people
- Program with hidden harmful intent
- Secure network connection
- Network devices protection
- unauthorized access exploit
- Securing data by converting to a code
Down
- software that is designed to harm
- the harmful portion of malware
- Unauthorized access to data
- A network of computers that have been infected
- malware that locks data until paid
- software that collects users data
- software that removes malware
- Taking advantage of a security vulnerability
- a software update that fixes bugs
20 Clues: Self replicating malware • Secure network connection • verifying a users identity • Secret key to unlock phone • Network devices protection • Unauthorized access to data • unauthorized access exploit • software that removes malware • the harmful portion of malware • Cyberattack that trick's people • software that is designed to harm • conveying data onto a fixed value • ...
Cyber Security Crossword 2022-09-15
Across
- A misspelt mythical three-headed dog
- Good for checking corruption less for tampering
- a gap in a wall, barrier, or defence
- The Agency
- the epitome of infosec professionals and ultimate champion of cyber month challenges
- Something you own
- When you convert Cipher Text
- System of global connections
- A wall of inferno
- A sweet biscuit having a soft, chewy texture
Down
- Means of access set in code
- Good guy hat
- A famous Ukrainian born worm
- A fictional bear's desire
- Founded by Paul and Bill
- A sad technical group
- High-Class Grizzly
- a Soong-type android
- Access Code
- A notification
- Gone ****, catch you later
21 Clues: The Agency • Access Code • Good guy hat • A notification • Something you own • A wall of inferno • High-Class Grizzly • a Soong-type android • A sad technical group • Founded by Paul and Bill • A fictional bear's desire • Gone ****, catch you later • Means of access set in code • A famous Ukrainian born worm • When you convert Cipher Text • System of global connections • ...
Cyber Security Crossword 2023-02-18
Across
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- The address of a webpage. Check the validity of it before clicking on it.
- Should be constructed of upper and lower case letters, numbers and special characters.\
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Fraudulent phone calls or voice messages purporting to be from reputable company in order to trick users to reveal their personal information.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Security tool that creates a secure, encrypted connection between you and the internet.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- A sequence of words or text used to control access to a computer; similar to a password.
- Facebook, Twitter, Instagram,etc.
- Threatening behavior facilitated through electronics means such as texting.
- Verifying identity.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
Down
- The process of taking plain text and scrambling it into an unreadable format.
- The "A" in the C-I-A Triad. It ensures authorized users have access.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- Unauthorized access to a network, information systems or application.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction.
- The "I" in the C-I-A Triad; protection from unauthorized changes.
20 Clues: Verifying identity. • Facebook, Twitter, Instagram,etc. • The "I" in the C-I-A Triad; protection from unauthorized changes. • The "A" in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Security Awareness 2021-10-13
Across
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- Alerts used as a warning of danger.
- An attempt by hackers to damage or destroy a computer network or system.
- Something that shows up in an email
- An attack focusing on people rather than technology
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
- A dishonest scheme; a fraud.
- A form of malware that monitors user activities and reports them to an external their party
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and
Down
- Identity and Privacy Protection
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP
- Someone attempting to create Identity fraud
- Malware is defined as any device
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
- The ultimate call control center that gives customers full control of all T-Mobile's scam protection options
- The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization
- Hard to detect both by Users
22 Clues: A dishonest scheme; a fraud. • Hard to detect both by Users • Identity and Privacy Protection • Malware is defined as any device • Alerts used as a warning of danger. • Something that shows up in an email • Someone attempting to create Identity fraud • An attack focusing on people rather than technology • ...
Cyber Security Puzzle 2021-10-13
Across
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- An acronym that stands for distributed denial of service – a form of cyber-attack.
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- Refers to a company security policy that allows for employees’ personal devices to be used in business.
- A defensive technology designed to keep the bad guys out. It can be hardware or software-based
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- Breaches the network to gain sensitive information with the owner’s consent – making it completely legal.
- A type of malware that functions by spying on user activity without their knowledge.
Down
- A technique used to manipulate and deceive people to gain sensitive and private information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
- A Technique by which hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- Another kind of malware that allows cybercriminals to remotely control your computer
- An internet version of a home address for your computer, which is identified when it communicates over a network.
- Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- An audio or video clip that has been edited and manipulated to seem real or believable
- A set of programs that tell a computer to perform a task.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: A set of programs that tell a computer to perform a task. • An acronym that stands for distributed denial of service – a form of cyber-attack. • Another kind of malware that allows cybercriminals to remotely control your computer • A type of malware that functions by spying on user activity without their knowledge. • ...
Cyber-security terms 2025-03-12
Across
- Detects computer viruses.
- Trial and error hacking method to crack passwords, encryption keys, and any sensitive information.
- Proving the identity of the user is correct.
- Virus that infects multiple computers simultaneously.
- Tricks such as fake emails, phone calls, and text messages used by attackers to get sensitive information.
- Hackers use to spy on your computer activities.
- Attackers that can evade security systems using a secret entryway.
- Locks's your files and demands for a payment to unlock it.
- Online computing vs physical hardware.
Down
- Learning algorithms that are made to complete a goal.
- Manages who's able to access data.
- Misleading link disguised as something else.
- Software designed to harms computer systems.
- Lost or stolen information from a system.
- A key that only authorized parties can access data to the original format.
- Chain of blocks that holds data, linked together by strong locks.
- Network security made to control, filter, and monitor network traffic.
- Labels assigned to devices that are connected to the internet.
- Unwanted installed ads or pop-ups on your computer.
- Server attack that causes extreme lag.
20 Clues: Detects computer viruses. • Manages who's able to access data. • Server attack that causes extreme lag. • Online computing vs physical hardware. • Lost or stolen information from a system. • Misleading link disguised as something else. • Software designed to harms computer systems. • Proving the identity of the user is correct. • ...
Cyber Security Crossword 2025-11-06
Across
- Secret phrase that shouldn't be "123456"
- Test to prove you're human, often involving traffic lights
- Fake email scheme that sounds like an aquatic activity
- Army of zombie computers controlled by cybercriminals
- Malicious program named after an ancient Greek trick
- Sneaky software that watches your every click
- Secret entrance that bypasses normal security
- When unauthorized users break through digital defenses
- Three letters for a tunnel that hides your internet traffic
- Scrambling data like eggs, but harder to unscramble
- Small file that remembers you, not made of chocolate chips
- Attack that floods a website like a thousand people calling at once
- Umbrella term for software with bad intentions
- Digital bouncer that decides who gets into the network party
- Alan who cracked codes and fathered computer science
Down
- Process of proving you are who you claim to be online
- Sweet trap designed to catch cyber attackers
- Digital lock-picker, sometimes wearing a white or black hat
- Software band-aid that fixes security holes
- Digital kidnapper that holds files hostage for money
- Spreads from computer to computer like its biological namesake
- Pretending to be someone else online, like digital dress-up
- Using your body parts as passwords
- Self-replicating pest that doesn't need a host file
- Silent recorder of every button you press
25 Clues: Using your body parts as passwords • Secret phrase that shouldn't be "123456" • Silent recorder of every button you press • Software band-aid that fixes security holes • Sweet trap designed to catch cyber attackers • Sneaky software that watches your every click • Secret entrance that bypasses normal security • Umbrella term for software with bad intentions • ...
Hackers, Scams, and Online Safety 2023-04-22
Across
- Online Harassment
- Security Protects against unauthorized access
- Media manipulation to change image
- Designs, Builds, and tests cybersecurity
- Cyber "kidnapping" for payment
- Tricks for getting private information
- Protects info from cyber attacks
- Harmful Software
- Collects private info without consent
- work that uses personal devices
Down
- Seemlessly harmful Malware until downloaded
- Detects, prevents, and removes malware
- Monitors networks for possible threats
- Software for securing cloud data
- Identifies device by internet connection
- Compromised computers used for cyberattacks
- Designer of data networks
- Paid testers of cybersecurity
- Scrambling date to restrict access
19 Clues: Harmful Software • Online Harassment • Designer of data networks • Paid testers of cybersecurity • Cyber "kidnapping" for payment • work that uses personal devices • Software for securing cloud data • Protects info from cyber attacks • Media manipulation to change image • Scrambling date to restrict access • Collects private info without consent • ...
Important words 2025-03-02
Across
- a promise that a business gives you
- something that solidifies a deal
- knowing something
- Entering somewhere without authentication
- online
- something you need for entry
Down
- Getting your money stolen
- buying goods from shops
- call
- Getting money back for a product
- security
- safe
- fast transport
- can restore lost data
14 Clues: call • safe • online • security • fast transport • knowing something • can restore lost data • buying goods from shops • Getting your money stolen • something you need for entry • Getting money back for a product • something that solidifies a deal • a promise that a business gives you • Entering somewhere without authentication
Vigilant 2020-07-08
11 Clues: Do not get hooked • Once done working • Malicious download • Constantly on guard • Color of fraud flag • Shared responsibility • Saves searches online • Smart devices are always • Cyber Security Awareness Month • Chief Information Security Officer • Right to my own personal information
On line Security 2015-05-05
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
aw jeez 2023-01-12
Across
- Cyber Security Saleswoman
- Teacher
- Project Manager
- Heart Valve Specialist
- College Admissions Director
- Pediatric Nurse
- U.S. Paralympian
- Political Science PhD
- Event Planner
- Designer
Down
- Graduate Student
- Pharmacist
- Warehouse Associate
- UX Designer
- Elevator Salesman
- Clinical Psychologist
- Educational Project Manager
- Pet Cremator
18 Clues: Teacher • Designer • Pharmacist • UX Designer • Pet Cremator • Event Planner • Project Manager • Pediatric Nurse • Graduate Student • U.S. Paralympian • Elevator Salesman • Warehouse Associate • Political Science PhD • Clinical Psychologist • Heart Valve Specialist • Cyber Security Saleswoman • College Admissions Director • Educational Project Manager
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
Cyber Security 2020-08-24
12 Clues: a virus • messages • a connection • a program that • a computer that • another computer, • a large number of • example by email, • an uncontrolled way • move to the other computer. • many people’s mobile phones • virus can make copies of itself
Cyber Security 2021-10-12
Across
- a link that wants you to click on it
- installed without the user realizing
- another word for junk email
- proper behaviour online
- ride the waves of the internet!
Down
- the non editable kind
- yarr matey!
- like a head cold for your computer
- info stored on a computer
- dont fall for this trick, its not on the hook
- computer bad guy
- blocks viruses
12 Clues: yarr matey! • blocks viruses • computer bad guy • the non editable kind • proper behaviour online • info stored on a computer • another word for junk email • ride the waves of the internet! • like a head cold for your computer • a link that wants you to click on it • installed without the user realizing • dont fall for this trick, its not on the hook
Cyber Security 2020-07-19
Across
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A security measure designed to verify an individual`s authorization to access computer or security information.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- An environment in which digitized information is distributed on networks of computers.
- The largest WAN in the world.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- Shift cipher named after a famous Roman, Julius ?
- Machine used in WW2 to send secret messages in Germany.
- Statement of intention to inflict damage or hostile action.
12 Clues: The largest WAN in the world. • Shift cipher named after a famous Roman, Julius ? • Machine used in WW2 to send secret messages in Germany. • Statement of intention to inflict damage or hostile action. • An environment in which digitized information is distributed on networks of computers. • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- who created a computer worm in 1988?
- spyware, ransomware, viruses, and worms
- what president created homeland security?
- created the first ransomware attack
- attack that floods a computer or network
- attackwhen hackers insert their way into a two party transaction
Down
- advanced, modular banking trojan
- attack relies most on human interaction
- this person created cyber security
- attacks that use fake communication to trick people
- what does SQL stand for?
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • attack relies most on human interaction • spyware, ransomware, viruses, and worms • attack that floods a computer or network • what president created homeland security? • ...
ETHICAL HACKING 2024-08-08
Across
- DHCP WORKS ON TOP OF
- CYBER SECURITY RESEARCHER
- A FIREWALL
- HIJACKING TOOLS
Down
- IDENTIFYING AND MITIGATING SECURITY THREATS
- TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS
- A WEB SECURITY VULNERABILITY
- ENUMERATION process in security that uncover DNSrecord
- HASHING ALGORITHM
- FAMOUS TOOL IN PEN TESTING COMMUNITY
- WEB APPLICATION DEVELOPED BY OWASP
11 Clues: A FIREWALL • HIJACKING TOOLS • HASHING ALGORITHM • DHCP WORKS ON TOP OF • CYBER SECURITY RESEARCHER • A WEB SECURITY VULNERABILITY • WEB APPLICATION DEVELOPED BY OWASP • FAMOUS TOOL IN PEN TESTING COMMUNITY • IDENTIFYING AND MITIGATING SECURITY THREATS • TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS • ENUMERATION process in security that uncover DNSrecord
Trick or Threat: The Cyber Crossword 2025-04-06
Across
- The IT Team's critical tasks include keeping all software and systems _____
- An Incident Response Plan explains exactly what to do during a ____ attack
- With cloud systems, professional teams manage ____ 24/7
- Examples of cloud systems include ____ workspace and Microsoft 365
- MFA stands for _____ Authentication: Your digital shield
- The IT Team's critical tasks include enforcing multifactor ___
- Cyber threats can harm businesses of all _____
- MFA is like having multiple ____ on your digital door
- ____ and ipads are great examples of secure devices
- A Cybersecurity ___ plan should include talking about security with your team, using multifactor authentication,keeping software updated, creating a response plan, and never stopping learning about digital saferty
- The CEO's Role in Cybersecurity includes making cybersecurity a normal part of _____ work
Down
- MFA can use text messages, special codes, or other _____ methods.
- _____ is about protecting your digital information and systems
- The ___ Response plan can be thought of as a "digital first aid kit"
- Chromebooks and iPads have built-in ___ features
- Some common cyber threats include ____ emails as the most common attack
- ____ often target small businesses.
- Staff should learn to spot suspicious ____ and emails
- All staff needs to understand cybersecurity ____
- ____ services are often more secure for small businesses
- The CEO's Role in Cybersecurity includes creating a ____ where everyone cares about digital safety
21 Clues: ____ often target small businesses. • Cyber threats can harm businesses of all _____ • Chromebooks and iPads have built-in ___ features • All staff needs to understand cybersecurity ____ • ____ and ipads are great examples of secure devices • Staff should learn to spot suspicious ____ and emails • MFA is like having multiple ____ on your digital door • ...
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
Cyber Security Crossword 2019-09-23
Across
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
- Tim Berners-Lee's Invention (5,4,3)
- Additional copy of data or information used for recovery should the original become lost or corrupt (6)
- a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
- The 'mal' part of the term 'malware' (9)
- a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
- Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
- a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
- bin where users should send suspicious emails within Anglian Water (4,3)
Down
- digital _____, the information about a person that exists on the Internet as a result of online activity (9)
- a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
- websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
- the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
- the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
- These people are responsible for security (9)
- (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
- __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
- a person who uses computers to gain unauthorised access to data (6)
- Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
19 Clues: Tim Berners-Lee's Invention (5,4,3) • The 'mal' part of the term 'malware' (9) • These people are responsible for security (9) • a person who uses computers to gain unauthorised access to data (6) • bin where users should send suspicious emails within Anglian Water (4,3) • ...
Cyber Security Awareness 2023-03-01
Across
- Type of malware that self-replicates and attempts to steal info
- A type of malware that encrypts user's files and then asks for payment to unlock them
- Piece of audio/video that has been altered to make it seem authentic
- A number of compromised computers used to spam or denial of service attacks
- Any unwanted/unsolicited email/phone call
- A type of computer that provides services to other computers/devices
- Emails sent with the intention of stealing money/account credentials
- Any type of communication that exploits the human factor to gather sensitive info (6,11)
- A generic term for any type of malicious software
- Logica/Physical tool used to filter network traffic
- Malware that can reproduce itself for the purpose of spreading itself to other devices in the network
Down
- A type of network that allows secure access to a network from offsite
- A form of malware used to spy on user's devices
- Misleading computer program that looks innocent, but allows a hacker into your system/network via a backdoor (6,5)
- Following someone with legitimate access into a location to get physical entry
- Software update provided by a manufacturer to fix a bug
- Any unauthorised access to data, applications, or servers
- Changing plaintext to cipher text using an algorithm
- On-demand computer hosted by a 3rd party (AWS, MS Azure)
19 Clues: Any unwanted/unsolicited email/phone call • A form of malware used to spy on user's devices • A generic term for any type of malicious software • Logica/Physical tool used to filter network traffic • Changing plaintext to cipher text using an algorithm • Software update provided by a manufacturer to fix a bug • ...
Cyber Security Puzzle 2023-01-25
Across
- When nations network w/goal of damage
- Set of rules computer follows
- Tricked to click hidden elements
- Pop ups
- Codes that protects during encryption
- system prevents unauthorized network access
- Holds your information hostage
- Done through email not water
- Dangerous and no one knows yet
Down
- They self replicate
- How your informations kept safe
- Gives attacker control of pc
- Sneaky hidden cyber attack
- Language made of 1's & 0's
- Users connect remotely to another network
- Something malicious
- sends massive traffic to crash site
- Tracks and stores your keystrokes
- Worm-like but needs human interaction
19 Clues: Pop ups • They self replicate • Something malicious • Sneaky hidden cyber attack • Language made of 1's & 0's • Gives attacker control of pc • Done through email not water • Set of rules computer follows • Holds your information hostage • Dangerous and no one knows yet • How your informations kept safe • Tricked to click hidden elements • Tracks and stores your keystrokes • ...
CTF-CW-5 2025-11-17
Across
- System�s ability to handle growth
- Web Application Firewall: protects websites
- When someone breaks a formal rule
- Proof collected in a cyber investigation
- Openness about security controls and processes.
- Email security service trusted by Tekion.
- Person/role overseeing rules or limits
- Hiding real numbers with random stand-ins again
- Process for managing computer security events
- The things done to prevent or detect risks
- Role managing security events
Down
- Framework for managing artificial intelligence risks and compliance
- Moral principles guiding artificial intelligence development
- Innovation hub for new products at Tekion.
- Individual whose personal data is being processed
- Multi-factor authentication: more than password required
- Steps to fix incident aftermath
- Limits of coverage
- Special cyberops expert team at Tekion.
- Unique identifier for a networked device
20 Clues: Limits of coverage • Role managing security events • Steps to fix incident aftermath • System�s ability to handle growth • When someone breaks a formal rule • Person/role overseeing rules or limits • Special cyberops expert team at Tekion. • Proof collected in a cyber investigation • Unique identifier for a networked device • Email security service trusted by Tekion. • ...
cyber security 2017-06-30
Across
- a software that enable a user to obtain information about another's computer activities.
- is when it have virus automatically on the computer or laptop
- is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
- type of malicious software designed to block access to a computer system until a sum of money is paid.
- an attempt by hackers to damage or destroy the system.
- is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- a type of danger when people harm you.
Down
- is the action of protecting, or the state of being protected.
- when danger happen in internet.
- is a network of social interactions and personal relationships.
- ransomware is usually aimed at individuals, it's only a matter of time before business is targeted as well"r
- card fraud is Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
12 Clues: when danger happen in internet. • a type of danger when people harm you. • an attempt by hackers to damage or destroy the system. • is the action of protecting, or the state of being protected. • is when it have virus automatically on the computer or laptop • is a network of social interactions and personal relationships. • ...
Cyber Security 2023-09-15
Across
- software that looks like a real program, but is actually a type of malware in disguise
- onion-style routing technique for transmitting data
- protect the malware and can enable any malware installed to still be on the system after many multiple reboots
- security method that requires two forms of identification
- cameras to increase security
- transmits data over a short-range
- A safe environment for files to be opened without affect your pc
Down
- software that is secretly installed on your computer
- System which sets of sound when triggered
- Monitors and filters incoming and outgoing network traffic
- analysis of people's unique physical characteristics
- identifying a user’s identity
12 Clues: cameras to increase security • identifying a user’s identity • transmits data over a short-range • System which sets of sound when triggered • onion-style routing technique for transmitting data • software that is secretly installed on your computer • analysis of people's unique physical characteristics • security method that requires two forms of identification • ...
Cyber security 2023-10-27
12 Clues: Out of sight. • Being online. • To be protected. • Relating to society. • To remain unthreatened. • To whom you are fond of. • Someone you do not know. • To be hidden from others. • Someone who harms others. • The act of being protected. • The main means of mass communication. • Facts learned from someone or something.
Cyber Security 2025-07-11
Across
- Someone who uses ethical hacking to help
- Software designed to harm a computer
- Legal software that tracks users secretly
- Process of converting data into a secret code
- Device used to protect a network
Down
- A scam where attackers trick you into giving personal info
- Mail Unwanted and repetitive email messages
- A secret word or phrase used to gain access
- Someone who breaks into systems illegally
- Network that connects computers globally
- Program that protects your computer from viruses
- A type of malware that demands money
12 Clues: Device used to protect a network • Software designed to harm a computer • A type of malware that demands money • Someone who uses ethical hacking to help • Network that connects computers globally • Someone who breaks into systems illegally • Legal software that tracks users secretly • Mail Unwanted and repetitive email messages • ...
All About Ryan 2026-01-22
27 Clues: Pet • Iowa • Ford • Bike • Lake • Polar • Cyber • Water • Juicy • Wrist • Indoor • Blanket • Outdoor • Chamber • Kentucky • Montreal • Instrument • Acting Role • Instrument 4 • Instrument 3 • Instrument 5 • Spaceman Toy • Instrument 2 • Kicking Sport • Travel Abroad • Stuffed Animal • Superhero Costume
cyber security 2022-09-30
Across
- person who finds and exploits the weakness in computer systems.
- process of finding weakness in computer or private networks.
- comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
- designed to disrupt, damaged, or gain unauthorized access to a computer system.
- exploits vulnerabilities on the device to encrypt important files.
- an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
- used to obtained sensitive information from users.
- that downloads onto a computer disguised as a legitimate program.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- a secret word or phrase that must be used to gain admission to a place.
- malicious software.
- monitors the victim's internet activity, tracks login credentials and spies on sensitive information.
12 Clues: malicious software. • used to obtained sensitive information from users. • process of finding weakness in computer or private networks. • person who finds and exploits the weakness in computer systems. • that downloads onto a computer disguised as a legitimate program. • exploits vulnerabilities on the device to encrypt important files. • ...
Cyber Security 2017-07-13
Across
- This is when someone spends irrelevant or unsolicited messages to loads of people
- This is a software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
- This is when your speaking to someone and another person is watching/listening without the person knowing
- Loads of private computers that can see what your doing without the users knowing
- Something that can go onto your computer and can destroy data and corrupt the system
Down
- This is when someone takes your personal info and uses it to take your credit card etc
- These are physical parts you can connect to a system
- This is a person who uses computers to gain unauthorized access to data
- This is a software that threatens to delete your data for a specific amount of money
- This is a program or a set of instructions
- This a secret word or phrase that must be used to gain access to a place/website
- This is software designed to detect and destroy computer viruses
12 Clues: This is a program or a set of instructions • These are physical parts you can connect to a system • This is software designed to detect and destroy computer viruses • This is a person who uses computers to gain unauthorized access to data • This a secret word or phrase that must be used to gain access to a place/website • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- created the first ransomware attack
- what does SQL stand for?
- what president created homeland security?
- attack relies most on human interaction
Down
- attacks that use fake communication to trick people
- this person created cyber security
- who created a computer worm in 1988?
- advanced, modular banking trojan
- attackwhen hackers insert their way into a two party transaction
- attack that floods a computer or network
- spyware, ransomware, viruses, and worms
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • spyware, ransomware, viruses, and worms • attack relies most on human interaction • attack that floods a computer or network • what president created homeland security? • ...
Cyber Security 2024-08-17
Across
- What malware strain is used to add more malware to an infected device?
- What color hat hacker invades systems for malicious purposes?
- What is the most common file type for malware?
- What classification of malware was MyDoom?
Down
- What job position is responsible for designing security systems? Two words.
- What's the name of a program that keeps track of keys pressed (often used in phishing and infostealers)?
- What malware type locks you out of your system and often demands money?
- What malware strain was sent via an email attachment stating a love letter?
- What color hat hacker attempts to invade systems with permission to search for issues?
- What color hat hacker are newbies to the hacking world?
- What malware type replicates across the system?
- What was the largest data breach in history exposing more than 3.2B people?
12 Clues: What classification of malware was MyDoom? • What is the most common file type for malware? • What malware type replicates across the system? • What color hat hacker are newbies to the hacking world? • What color hat hacker invades systems for malicious purposes? • What malware strain is used to add more malware to an infected device? • ...
CTF-CW-5 2025-11-17
Across
- System�s ability to handle growth
- Web Application Firewall: protects websites
- When someone breaks a formal rule
- Proof collected in a cyber investigation
- Openness about security controls and processes.
- Email security service trusted by Tekion.
- Person/role overseeing rules or limits
- Hiding real numbers with random stand-ins again
- Process for managing computer security events
- The things done to prevent or detect risks
- Role managing security events
Down
- Framework for managing artificial intelligence risks and compliance
- Moral principles guiding artificial intelligence development
- Innovation hub for new products at Tekion.
- Individual whose personal data is being processed
- Multi-factor authentication: more than password required
- Steps to fix incident aftermath
- Limits of coverage
- Special cyberops expert team at Tekion.
- Unique identifier for a networked device
20 Clues: Limits of coverage • Role managing security events • Steps to fix incident aftermath • System�s ability to handle growth • When someone breaks a formal rule • Person/role overseeing rules or limits • Special cyberops expert team at Tekion. • Proof collected in a cyber investigation • Unique identifier for a networked device • Email security service trusted by Tekion. • ...
Cyber Security Crossword 2019-09-23
Across
- a computer program that records every keystroke made by a user, particularrly to gain fraudulent access to passwords and other sensitive information. (9)
- digital _____, the information about a person that exists on the Internet as a result of online activity (9)
- websites and applications that allow users to create and share content or to participate in forums or other like-minded online services (6,5)
- Tim Berners-Lee's Invention (5,4,3)
- __________ Serial Bus - a connection type typically used by memory sticks which can store large amounts of data and are easy to lose! (9)
- Shoulder ________ - Direct observation, such as looking over a person's shoulder, in order to elicit information (such as passwords etc) (7)
- Treat it like you underwear, never share it, change it regularly and don't leave it out for others to see (8)
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers (8)
- The 'mal' part of the term 'malware' (9)
- bin where users should send suspicious emails within Anglian Water (4,3)
Down
- These people are responsible for security (9)
- a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (1,1,1,1)
- a type of malicious software designed to block access to a computer system until a sum of money is paid (10)
- a service capable of allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area (2,2)
- a person who uses computers to gain unauthorised access to data (6)
- the practice of manipulating a website user's activity by hiding hyperlinks beneath legitimate website clickable content, thereby causing the user to perform actions of which they are unaware. (12)
- the process of transforming information or data into a code, specifically to prevent unauthorised access (10)
- (software) designed to detect and destroy computer viruses - available free for Anglian WAter users. (9)
- Additional copy of data or information used for recovery should the original become lost or corrupt (6)
19 Clues: Tim Berners-Lee's Invention (5,4,3) • The 'mal' part of the term 'malware' (9) • These people are responsible for security (9) • a person who uses computers to gain unauthorised access to data (6) • bin where users should send suspicious emails within Anglian Water (4,3) • ...
Cyber Security Puzzle 2023-01-25
Across
- When nations network w/goal of damage
- Set of rules computer follows
- Tricked to click hidden elements
- Pop ups
- Codes that protects during encryption
- system prevents unauthorized network access
- Holds your information hostage
- Done through email not water
- Dangerous and no one knows yet
Down
- They self replicate
- How your informations kept safe
- Gives attacker control of pc
- Sneaky hidden cyber attack
- Language made of 1's & 0's
- Users connect remotely to another network
- Something malicious
- sends massive traffic to crash site
- Tracks and stores your keystrokes
- Worm-like but needs human interaction
19 Clues: Pop ups • They self replicate • Something malicious • Sneaky hidden cyber attack • Language made of 1's & 0's • Gives attacker control of pc • Done through email not water • Set of rules computer follows • Holds your information hostage • Dangerous and no one knows yet • How your informations kept safe • Tricked to click hidden elements • Tracks and stores your keystrokes • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
I.T. cyber security 2023-09-10
Across
- to identify any activity on your network
- a type of security and encryption for your router
- pop-ups meant to direct you from one website to another
- a type of malware that replicates itself by inserting its own code into other programs if successfully executed
- an individual who commits crimes via the internet
- to erase something like data or information
- meant to cover and protect an individual or companies losses from a cyber attack
- digital information
- is an application or program
- a program meant for designated and certain uses
Down
- to return something to its previous state
- composed of a certain number of characters
- to disguise yourself as someone familiar to operate a cyber attack on a victim
- a software meant to hold an individual or companies data hostage
- to fix something back in working order
- helps secure information moving across your network
- to get the latest version of a certain application or sorftware
- to gain control of
- a malicious way to get valuable items like data or money from a user
19 Clues: to gain control of • digital information • is an application or program • to fix something back in working order • to identify any activity on your network • to return something to its previous state • composed of a certain number of characters • to erase something like data or information • a program meant for designated and certain uses • ...
THE ITT 2024-05-16
Across
- A hacker with malicious intentions. Cyber-Security and Legislation
- How does a human interact with a computer? HCI
- Integers, data type. Data and Testing
- An electronic message that can be sent.
- No video, Just sound. Digital Communication
- A way of visualising/organising information. Design Tools
- A prevention to DOS attacks. Cyber-Security and Legislation
- A use of a HCI to track heartrate. HCI
Down
- A promotion technique using written and visual information.
- Plan for how elements will work together. Design Tools
- Facts and figures with no context. Data and Testing
- A way of communication, type of channel. Digital Communications
- A digital storing place to transfer data.
- One of the four pillars. IOE
- Internet Of Everything. IOE
15 Clues: Internet Of Everything. IOE • One of the four pillars. IOE • Integers, data type. Data and Testing • A use of a HCI to track heartrate. HCI • An electronic message that can be sent. • A digital storing place to transfer data. • No video, Just sound. Digital Communication • How does a human interact with a computer? HCI • Facts and figures with no context. Data and Testing • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
Cyber Security Terms 2023-09-12
Across
- Spam is the name commonly given to unsolicited emails.
- Code left by a person thats hidden that can be used to shut down software
- Prevents Virus
- A form of malware used by hackers to spy on you and your computer activities.
- It is a group of applications that instruct a computer to carry out a task
- A combination of the words “robot” and “network”
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data.
- Process of verifying your not a bot
- when a hacker changes the IP address of an email so that it seems to come from a trusted source.
Down
- Encryption is a process of maintaining data confidentiality
- providing on-demand services over the internet.
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
- a wide variety of bad software used to infect and/or damage a system
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- Any technology, be it software or hardware, used to keep intruders out.
- Unprocessed Information
- a method of connecting a series of computers and devices in a private encrypted network,
19 Clues: Prevents Virus • Unprocessed Information • Process of verifying your not a bot • providing on-demand services over the internet. • A combination of the words “robot” and “network” • Spam is the name commonly given to unsolicited emails. • Encryption is a process of maintaining data confidentiality • a wide variety of bad software used to infect and/or damage a system • ...
Cyber Security Threats 2025-11-19
Across
- Fake messages or emails pretending to be genuine to steal information.
- Redirecting a user to a fake version of a legitimate website.
- Persuading someone to give information by pretending to be someone trustworthy.
- Messages designed to deceive users into clicking links or giving information.
- Software that secretly gathers user information without permission.
- An attack that floods a service or website with traffic so it cannot function.
- A network of infected devices controlled remotely by an attacker.
- Entering systems, networks or data without permission.
- Attempting to gain unauthorised access to systems or data.
- A malicious program that attaches to files and spreads between systems.
- Tricking a user into clicking on something different from what they think they are clicking.
Down
- Dishonest schemes to trick people into giving money or information.
- Watching someone enter their PIN or password to steal it.
- Stealing someone’s personal details and using them fraudulently.
- Sites designed to imitate real ones in order to steal data.
- Malicious software such as viruses, spyware, worms or trojans.
- Self-replicating malware that spreads across networks without user action.
- Software that forces unwanted advertising onto a device.
- Manipulating people into giving away confidential information.
19 Clues: Entering systems, networks or data without permission. • Software that forces unwanted advertising onto a device. • Watching someone enter their PIN or password to steal it. • Attempting to gain unauthorised access to systems or data. • Sites designed to imitate real ones in order to steal data. • Redirecting a user to a fake version of a legitimate website. • ...
Cyber Security Month Training 2018-10-18
Across
- Trust your BLANK, if it feels suspicious, it probably is
- weakest point of any and all security plans
- prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- Who's responsibility is cyber security/information security?
Down
- should be difficult to guess
- attempt to acquire sensitive information by email
- It only takes one BLANK to let someone into the system
- Instead of a password, it is suggested you use a
- A BLANK helps protect your computer from an external attack
- the best way to keep people aware of cyber security threats
10 Clues: should be difficult to guess • weakest point of any and all security plans • Instead of a password, it is suggested you use a • attempt to acquire sensitive information by email • It only takes one BLANK to let someone into the system • Trust your BLANK, if it feels suspicious, it probably is • A BLANK helps protect your computer from an external attack • ...
CSAM23 - Crossword Puzzle 2023-07-25
Across
- Form of malware designed to encrypt files and render them unusable
- SETA mascot
- Attempt to obtain personal information from a recipient via short message service (SMS) or text message app
- Where to send suspicious emails
- Potential danger that could exploit a vulnerability in your organization
- Probability of exposure resulting from a data breach
Down
- Security framework requiring authentication of all users
- Who should you contact regarding any Cyber Security Awareness Training?
- Check sender's ______ to verify that it is a legitimate email
- Who/What is the most important layer in preventing a phishing attack?
- in which platform do we take Cyber Security Awareness Training
- An unauthorized person attempting to access a system
12 Clues: SETA mascot • Where to send suspicious emails • An unauthorized person attempting to access a system • Probability of exposure resulting from a data breach • Security framework requiring authentication of all users • Check sender's ______ to verify that it is a legitimate email • in which platform do we take Cyber Security Awareness Training • ...
Buzzwords 2024-07-05
Across
- Yet another cyber security certification
- Trusting, in a mutual way
- The Chinese have a great one of these
- They wear hoodies and use laptops with green text
- $20/month for full access, or Open__
- Everything is stored in these
- Classic cyber security buzzword for secure communication
- I keep getting emails from Jim
Down
- The other half of the SSH connection, or a number for your computer
- Something Yogi would stick his hand in, or a virtual trap
- Startup companies love this approach to AI
- Error said with an accent
- Classic encryption algorithm
- Magical data center with petabytes of storage
- What Mason tried to use to run League of Legends, or how DDOS attacks work
- Elon musk's favorite way of storing data
16 Clues: Trusting, in a mutual way • Error said with an accent • Classic encryption algorithm • Everything is stored in these • I keep getting emails from Jim • $20/month for full access, or Open__ • The Chinese have a great one of these • Yet another cyber security certification • Elon musk's favorite way of storing data • Startup companies love this approach to AI • ...
SN33003FP Chapter 1 Crossword 2024-07-03
Across
- Sensors and alert networks that warn of potential attacks.
- Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- Highly trained hackers who steal secrets or commit sabotage for their government.
- Threats posed by the increasing use of mobile devices to access enterprise information.
- Sharing of critical information about serious attacks to prevent similar ones.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Framework for implementing cybersecurity measures within an organization.
- Black hat hackers who steal money from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- Legislation to discourage cyberattacks and punish cyber criminals.
- Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- Threats from employees or partners with inside access and knowledge.
- Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who hack for fun, not profit.
- Threats that exploit weaknesses to gain access to internal resources.
- Technology connecting billions of devices to the Internet, affecting data protection needs.
- Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.
18 Clues: Sensors and alert networks that warn of potential attacks. • Black hat hackers who steal money from consumers and businesses. • Legislation to discourage cyberattacks and punish cyber criminals. • Threats from employees or partners with inside access and knowledge. • Threats that exploit weaknesses to gain access to internal resources. • ...
Career Choices 2022-05-10
CTF-CW1 2025-11-14
Across
- When your day job is putting out cyber fires
- Turning real secrets into Monopoly money
- The digital gremlin living in your files
- Your digital 911 squad
- The software version of duct tape fixes
- Handshakes for computers, but without fingers
- Investigation before making a business decision
- Tekion’s loyal watchdog—barking at every securty incident
- At Tekion, this gatekeeper checks every badge before you log in!
- The boundaries of an audit or project
Down
- The “odd couple” sitcom: IT and security join forces!
- Scrambling your secrets like eggs for breakfast
- Fake facts that make AI smart without spilling your secrets.
- The puppet master deciding what your info does next.
- California’s version of “Don’t touch my data, bro!”
- That bedtime read you scroll past before clicking “Accept.”
- Tekion’s cyber ninja—silently defending apps from danger as they operate!
- Quantitative measure for assessment
- A missing or ineffective security measure
- Is your defense standing tall or slouching?
20 Clues: Your digital 911 squad • Quantitative measure for assessment • The boundaries of an audit or project • The software version of duct tape fixes • Turning real secrets into Monopoly money • The digital gremlin living in your files • A missing or ineffective security measure • Is your defense standing tall or slouching? • When your day job is putting out cyber fires • ...
Defensive Concepts & Best Practices 2025-10-07
Across
- CONTROL Restricting system access based on privileges
- Process of verifying user identity
- RESPONSE Structured approach for handling security events
- Authentication without traditional credentials
- Secure tunnel for online privacy
- Copy of data for recovery purposes
- Physical or digital item used to verify identity
Down
- HYGIENE Daily security habits to maintain a safe system
- ENGINEERING Manipulation of people to gain confidential info
- TRUST Security model assuming no user or system is inherently trusted
- Security method using more than one verification factor
- Regularly updating software to fix vulnerabilities
- BREACH Unauthorized disclosure of confidential information
- KEY Secret used to decrypt encrypted information
- AWARENESS Training users on digital safety
15 Clues: Secure tunnel for online privacy • Process of verifying user identity • Copy of data for recovery purposes • AWARENESS Training users on digital safety • Authentication without traditional credentials • KEY Secret used to decrypt encrypted information • Physical or digital item used to verify identity • Regularly updating software to fix vulnerabilities • ...
Cybersecurity 2024-04-12
Across
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- Word referring to who can use a specific system or view specific data
- A security measure that requires two or more proofs of identity to grant you access to a system (3)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- A type of backup in which an exact replica of data is created and stored in a separate location
- A broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems (2)
- IoT (3)
- Law which upholds the right of the public to access information that the government holds about them (4)
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The protection of information that says who we are, what we do and what we believe
- is a type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- Type of backup that contains only those files which have been altered since the last backup
- attack is carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Type of cyber attack that uses third-party tools or services to infiltrate a target’s system or network (2)
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
Down
- Physical, network, and operational separation of data to keep it safe from both external cyberattacks and internal threats
- Type of backup that involves backing up data that was created or changed since the last full backup
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- The process of converting ciphertext (random and meaningless) back to plaintext
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
- A perceived threat to an organisation that comes from people within the organisation (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- The greatest vulnerability in a system when thinking about cybersecurity
- Type of backup that backs up everything since the last back up
- A tool used in risk management to assess and prioritise risks based on their likelihood and potential impact (2)
- Type of encryption that involves the use of one key for both encryption and decryption
40 Clues: IoT (3) • Type of backup that backs up everything since the last back up • Word referring to who can use a specific system or view specific data • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • ...
Cybersecurity Fundamentals Chapter 8 2022-11-08
Across
- US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- poorly enforced security policies, no awareness of security
- the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- open source linux security distribution.
- disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- a method of testing the areas of weakness in systems by using various malicious techniques.
- includes the users who access the organization's information system.
Down
- assess computer, computer systems, networks, or applications for weakness.
- a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- laws prohibit undesired behaviors.
- intercept and log network traffic
- provides free analysis and warning service to internet users and organizations.
- help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.
14 Clues: intercept and log network traffic • laws prohibit undesired behaviors. • open source linux security distribution. • poorly enforced security policies, no awareness of security • includes the users who access the organization's information system. • assess computer, computer systems, networks, or applications for weakness. • ...
Program Hornet Crossword 2025-11-27
Across
- Optimising use of hypervisor technologies
- Implementing M365 tools to improve communication
- Access the network seamlessly across the globe
- Enhance the sharing of data between various applications
- Trusted identity to securely access facilities
Down
- Modern and interconnected record management solution
- Modernising the technologies used to manage ICT operations
- Optimising ways of working to speed up ICT delivery
- Migrating workloads and data to multi cloud environments
- Implementing Service Now capability
- Cyber Security data and application layers to strengthen cyber security
11 Clues: Implementing Service Now capability • Optimising use of hypervisor technologies • Access the network seamlessly across the globe • Trusted identity to securely access facilities • Implementing M365 tools to improve communication • Optimising ways of working to speed up ICT delivery • Modern and interconnected record management solution • ...
NCPD FCU Security Awareness Puzzle 2016-10-12
Across
- Your password should be ______ for you to remember, but difficult for anyone else to guess.
- Unsolicited email, which often attempts to sell a product or service is known as this.
- Always check the senders name as well as the email subject before clicking on the message so you don't get _____ into opening a phishing email.
- Software updates installed on your computer are known as this.
- This term defines a psychological manipulation of people into performing actions or divulging confidential information.
- When reviewing your email, if you don't know the sender of an email, always remember the phrase "When in doubt, throw it ____".
- Never open unexpected or _______ looking emails, or click on any questionable links contained within an email.
- _________ is one of the most important communication tools used in the work environment.
- This term defines an attempt to acquire sensitive information such as usernames, passwords, &/or credit card #'s by masquerading as a legitimate source in an email communication.
- A password that is considered to be "strong", is also known as a _______ password.
- The month of ______________ is officially known as "National Cyber Security Awareness Month".
- NCPD FCU's best line of defense against cyber security threats is ___.
- When discarding documents containing sensitive information, it's critical that you ______ them.
- The term "shoulder surfing" refers to unauthorized users attempting to view information displayed on your computer _______.
- A computer ________can corrupt or delete data, use your email to spread itself to other computers, or even erase everything on 1 or more hard drives.
- It's critical that you report all suspicious or unusual PC problems to the __ department ASAP.
Down
- When you step _______ from your desk, always lock your computer screen to prevent outsiders from accessing your PC.
- The primary goal of Cyber Security training is to promote cyber ____________.
- Computer __________ should be password protected & set to automatically activate after a few minutes of mouse or keyboard inactivity.
- To keep hard copies of sensitive documents confidential, remember to follow our "Clean Desk _______" & safely store these documents from unauthorized view.
- Store documents containing _________ information such as account #'s, SSN#, &/or credit card #'s in a locked area when you leave your desk.
- Knowing what to shred & as well as what to keep may help deter ________ theft.
- Your network _________ is a form of authentication, which is used to get you logged into the network.
- Use this 3 key combination to lock your PC screen each time you leave your desk: <Ctrl> <Alt> & <_________>.
- When creating various passwords, it's important for you to make each password slightly _________.
- It's a good practice to always _______ longer passwords for added security.
- When opening email, be ever cautious of embedded ______ contained in all email messages.
- A _________ is someone who seeks and exploits weaknesses in a computer system or computer network.
- Be wary of accepting any ___-__ messages on your PC that appear about updating program files such as Flash or Java.
- At the end of the workday, always remember to close all applications & log ___ of your computer.
- Stay alert so that you don't become a ________ of cyber crime.
- Several weeks ago, Yahoo confirmed that hackers had stolen data from at least 500 million of it's ________ accounts.
- Employees are reminded to always remain aware in order to minimize your cyber security _____ on all work, mobile & home devices.
33 Clues: Software updates installed on your computer are known as this. • Stay alert so that you don't become a ________ of cyber crime. • NCPD FCU's best line of defense against cyber security threats is ___. • It's a good practice to always _______ longer passwords for added security. • The primary goal of Cyber Security training is to promote cyber ____________. • ...
Cyber Security CrossWord 2025-08-20
Across
- Who should you reach out to when you have security-related questions?
- What type of attack relies on deceiving you by pretending to be someone you know or trust?
- What is the name of the tool you use to connect securely to the company network remotely?
- Who is the newest member of the security team?
- How often must employees reset their passwords according to policy?
- What compliance standard governs how we protect payment card data?
- What is the domain name of our internal emails?
- What is the minimum length of our password according to policy?
Down
- What do we call an email scam that tricks people into clicking malicious links?
- What type of data must be protected under PCI rules?
- What tool on your company laptop automatically scans for and blocks malware?
- What do we call the use of multiple methods of authentication to verify identity?
- What is the guest access system?
- Who is the head of our SiriusXM security team?
- What tool do employees use for Single Sign-On to company applications?
- What should you always do if you suspect a security incident?
- What kind of attack locks files until money is paid?
- What should you do when you step away from your computer?
18 Clues: What is the guest access system? • Who is the head of our SiriusXM security team? • Who is the newest member of the security team? • What is the domain name of our internal emails? • What type of data must be protected under PCI rules? • What kind of attack locks files until money is paid? • What should you do when you step away from your computer? • ...
Eimears dm litereracy crossword 2021-11-09
20 Clues: time • Fifa • photos • Online • Online • Be safe • devices • dancing • Ipad kids • Being mean • Snap streak • fun to play • Be safe people • to stay in touch • Mams and dads app • Celebrity magazine • chatting with friends • texting, playing games • affecting your time awareness • Talking and playing games with peopl
Cybersecurity 2024-03-14
Across
- Data Hostage
- Data Recovery
- Logs, Activity Tracking
- Unique Authentication
- Fake Identity
- Secure Data
- Virus Threats
- Isolated Testing
- Layered Authentication
- Fake Emails
- Engineering, Manipulative Tactics
Down
- Unpatched Vulnerability
- Security, Device Protection
- Fake emails
- Network Protection
- Extra Verification
- Insurance, Risk Coverage
- Secure Connection
- Network Overload
- Software Updates
20 Clues: Fake emails • Secure Data • Fake Emails • Data Hostage • Data Recovery • Fake Identity • Virus Threats • Isolated Testing • Network Overload • Software Updates • Secure Connection • Network Protection • Extra Verification • Unique Authentication • Layered Authentication • Unpatched Vulnerability • Logs, Activity Tracking • Insurance, Risk Coverage • Security, Device Protection • ...
GS Lecture 7 2025-02-25
Across
- An emerging _ revolution is at hand, and is expected to revolutionise sensing, imaging, precise positioning, navigation, timing, communications, computing, etc...
- _ system in the Israel-Gaza conflict uses data to rank people.
- So far, despite the hype, there are no clear indications of a possible _ cyber war.
- The US first used satellites in the _ war.
- Groups such as _ use digital technologies to recruit, train, fundraise and purchase supplies.
- The US maintains _ space programmes.
- Cyber operations can also be used during peacetime.
- Comparing cyber vs. non-cyber: Cash payments vs. _ transfers.
- After 2022, this country emerged as the 12th biggest cyber power.
- The _ use of space became more central to war fighting during the 1991 Gulf War.
- Issue of translation: there ar ebig _ in terminology and definitions, e.g. between the US, Russia, and China.
- Hamas/Iran/sympathisers launch cyber attacks on Israel (minimal impact).
- Russia attacked various targets in this country (such as government websites, denial of service, banks, and media organisations) following a decision by the (country's) government to move Soviet-era statue and graves.
- Terrorist attacks produce shock (explosions, casualties), whereas cyber operations take time, money, and _ skills.
- 11-day bombing campagin against Hamas labelled Israel's '_'.
- This country ranks as the 3rd biggest cyber power, after the US and China.
- In the Ukraine war, AI is used to _ and analyse open-source data, such as social media content to identify Russian soldiers, weapons, systems, units or their movements.
- Advances in AI and Quantum tech are likely to have important implications for the military in decades ahead but _ to completely change the nature of war and conflict.
- "_ is best understood as a descriptive prefix, an adjective conveying the digital or computer-like nature of the noun to which it is attached."
- All _ conflicts have a cyber dimension.
- AI can support decision-making through virtual _.
- "[Used by state and non-state actors] Hostile actions in cyberspace tha thave effects that amplify or are equivalent to major kinetic violence."
- A group named 'Guardians of the Peace' from this country launched a cyber attack against Sony in November 2014.
- "A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers."
- Russian cyberattacks _ to have decisive impact in support of invasion.
- Satellite reconnaissance completely changes the nuclear (and international) landscape - It provides stability in arms races, facilitates arms control, and reduces _ of a sneak attack.
- There is no indication that any single domain is '_' - e.g. a 'victory' in cyberspace does not equate with a victory in war.
- Broad security _ of war, deterrence, etc. can be applied to cyberspace.
- Rules of the road/laws of cyber war are _ to establish, making it less of a preferable choice for governments (they prefer to choose methods that they understand better).
Down
- _' use of cyber-acquired intel helps with attack planning.
- The number of satellites has exponentially _ [increased/decreased] in recent years.
- Israel's Iron Dome system ignores incoming threats if it determines they will land in _ areas.
- "Hack-and-_": The name of a cyber attack by Russia on the US during the 2016 US Presidential Election.
- Stakeholders in cyber security include _, government agencies, and civil society.
- So far, all cyber attacks have had _ durations.
- _ groups focus on what is cheap, noticeable, and deadly.
- Ai can _ the adversary's AI systems.
- Cyber operations are usually launched in tandem with _ military operations (e.g. during Russo-Georgian war).
- Ukraine's IT _ causes some disruption to Russian society but strategic impact is marginal.
- In the Ukraine war, commercial satellite _ delivers crucial intelligence to Ukraine.
- AI can help create/detect fake _ and deep fakes.
- AI can help create automated targeting and behavioural _.
- Quantum sensors can allow underground mapping, see around corners, and make oceans _ (for detecting submarines).
- Ukraine's IT Army was created on February 26th 2022 as a part of Ministry of Digital _.
- Cyber operations are _ compared to financial crimes, espionage, and information operations (e.g. hybrid or grey zone war) - more than half of cyber operations are aimed at collecting information or disseminating information.
- The main emphasis of government cyber operations, making adversary aware of presence.
- Refers to the use of cyber operations to deter actions within other domains of conflict or the deterrence of adversary cyberspace operations within the cyber domain.
- This country's cyberattacks on Hamas are limited because it does not rely much on the internet.
- In 2019, NATO adopted a _ and recognised space as a new operational domain, alongside air, land, maritime, and cyberspace.
- Cyber war involves direct attacks in cyberspace that are not per se aimed at military forces, but are directed at opponents' _ enabled systems in general."
- _ satellites provide connectivity for the Ukrainian military and are vital for drone strikes.
- Israel can turn on/off internet connectivity in _.
- Ukrainian cyber defences were _ due to advances in AI-enhanced threat intelligence and the quick distribution of protective software to cloud services and other computer networks.
- Cyberspace can be viewed as its own domain but it rarely exists _ from other domains. This is also true of the space domain.
54 Clues: The US maintains _ space programmes. • Ai can _ the adversary's AI systems. • All _ conflicts have a cyber dimension. • The US first used satellites in the _ war. • So far, all cyber attacks have had _ durations. • AI can help create/detect fake _ and deep fakes. • AI can support decision-making through virtual _. • Israel can turn on/off internet connectivity in _. • ...
cyber-security-560 2024-09-05
Across
- Method of gaining access to accounts by systematically trying all possible password combinations.
- Update to software that fixes vulnerabilities or bugs to improve security and performance.
- Security process requiring two different forms of identification for access. (sigla)
- Vulnerability in software that is exploited before the developer has a chance to fix it.
- Provides secure, encrypted connections over less secure networks.
- Software designed to detect and remove malware from computers.
- Software that secretly monitors and collects information about users without their knowledge.
- System that monitors network traffic for suspicious activities or policy violations.
- General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
- Software or hardware that records every keystroke made on a computer.
Down
- Attack that overloads a system, making it unavailable to legitimate users.
- The process of converting data into a coded form to prevent unauthorized access.
- Hidden way to bypass normal authentication to gain unauthorized access to a system.
- Type of malware that encrypts data and demands a ransom for its release.
- Software or hardware that monitors and controls incoming and outgoing network traffic.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Network of infected computers that can be remotely controlled by a cybercriminal.
- Malware disguised as legitimate software but allows unauthorized access to a user’s system.
18 Clues: Software designed to detect and remove malware from computers. • Provides secure, encrypted connections over less secure networks. • Software or hardware that records every keystroke made on a computer. • Type of malware that encrypts data and demands a ransom for its release. • Attack that overloads a system, making it unavailable to legitimate users. • ...
T Level Paper 2 Revision 2025-03-25
Across
- A type of malware that encrypts files and demands payment
- A weakness in a system that can be exploited by a threat
- A virtual space where users interact with applications and services over the internet
- A network type that allows remote access to a secure private system
- A type of cloud service that provides a fully managed computing environment
- A security measure that inspects and filters network traffic
- A key concern when deploying applications in a cloud environment
- A form of cyber attack where an attacker tricks users into providing sensitive information
Down
- The process of encoding data to prevent unauthorized access
- A type of cyber attack that floods a network with traffic
- A model of computing where resources are dynamically allocated and managed as needed
- The ability of a system to handle increasing workloads by adding resources
- A security process that verifies a user's identity
- A legal framework that regulates personal data protection
14 Clues: A security process that verifies a user's identity • A weakness in a system that can be exploited by a threat • A type of malware that encrypts files and demands payment • A type of cyber attack that floods a network with traffic • A legal framework that regulates personal data protection • The process of encoding data to prevent unauthorized access • ...
профессии 2023-04-09
Across
- Specialist in designing systems for collecting and processing large arrays of data received from the Internet, and developing analytical models and interfaces for assembling them.
- Specialist engaged in shaping regulatory interaction on the Internet (including virtual worlds) and devising legal protection systems for people and property on the Internet (including virtual property).
- Advisor on the information security of Internet users.
- An employee whose job responsibilities include ensuring the regular operation of a fleet of computer equipment, networks and software.
- Specialist investigating cyber crimes
- A specialist in programming, that is, the creation of computer programs.
- This professional develops user-friendly, adaptive and safe interfaces for equipment, devices and software of various levels.
- Specialist in the information security of technological processes at automated industrial facilities.
Down
- Professional who designs interfaces compatible with the human nervous system, for controlling computers and household and industrial robots, taking into account the psychological and physiological traits of the user.
- Qualified specialist for a wide spectrum of operations involving data processing systems.
- Specialist tasked with dealing with the lower levels of information infrastructure, ensuring the security of dedicated network segments at these levels
- Professional who develops linguistic systems for semantic translation (translation taking into account context and shades of meaning) and text information processing (including semantic search on the Internet).
- Specialist in software development. Audits complex IT systems processing data and making decisions based on such data.
- Specialist in communications with end users of IT products and promotion of new solutions to groups having a conservative attitude towards advanced technology.
- A specialist who creates ready-made IT solutions from prebuilt templates using a graphical user interface instead of classical programming.
15 Clues: Specialist investigating cyber crimes • Advisor on the information security of Internet users. • A specialist in programming, that is, the creation of computer programs. • Qualified specialist for a wide spectrum of operations involving data processing systems. • ...
CyberSecurity 2025-05-19
Across
- Malware that disguises itself as legitimate software (6)
- A team or center that monitors and defends against cyber threats (3)
- A person who gains unauthorized access to systems (6)
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
- Software update to fix vulnerabilities (5)
- Malicious code that replicates itself by attaching to files (5)
- Malware that encrypts files and demands payment to restore access (10)
Down
- Technique used to convert data into unreadable form for security (10)
- A network of infected devices used for cyber attacks (6)
- Software that secretly gathers user information without consent (7)
- Security system that monitors and controls incoming and outgoing network traffic (8)
- Security method requiring multiple verification steps (3)
12 Clues: Software update to fix vulnerabilities (5) • A person who gains unauthorized access to systems (6) • Malware that disguises itself as legitimate software (6) • A network of infected devices used for cyber attacks (6) • Security method requiring multiple verification steps (3) • Malicious code that replicates itself by attaching to files (5) • ...
Brain-Riddle Round 2 2025-02-11
Across
- A team that monitors and defends against cyber threats.
- The data sent back from a server after a request.
- A method of hiding data within other files.
- A file containing code for automation.
- A program where hackers get paid for finding security flaws.
Down
- A security feature that controls web resource access.
- Temporary storage that speeds up data retrieval.
- A remote computing device that communicates with a network.
- A temporary interaction between a user and a website.
- A network utility used to test connectivity.
- A lightweight data format used for data exchange.
- A type of attack that tricks users into executing unwanted actions.
- The part of a cyber attack that carries malicious code.
- A process of converting data into a fixed-size value.
- A communication endpoint for network connections.
15 Clues: A file containing code for automation. • A method of hiding data within other files. • A network utility used to test connectivity. • Temporary storage that speeds up data retrieval. • The data sent back from a server after a request. • A lightweight data format used for data exchange. • A communication endpoint for network connections. • ...
CEH Chapter 1 2026-02-17
Across
- process to identify analyze and resolve incidents
- using AI to identify and block fraudulent transactions
- structured framework describing stages of cyber attacks
- weakness exploitable by threat actors
- authorized security testing to identify vulnerabilities
- gathering intelligence from human technical and open sources
- verification that user or data is genuine
- points where trust levels change in application
- actions to investigate contain mitigate and eradicate incidents
- monitoring network for abnormal or unauthorized activity
- analyzing data patterns to anticipate future threats
- restoring systems services and data after incident
- identifying active hosts open ports services
- framework for managing information security risks
- collecting and combining data before exfiltration
- attacker enumeration and discovery inside target network
- locations where users or attackers access application
- severity or impact if risk event occurs
- US law requiring federal agency information security programs
- uncertainty of potential damage from an adverse event
- technology performing repetitive security tasks automatically
- multiple security layers protecting information systems
- EU regulation protecting personal data and privacy
- patterns methods used by threat actors
- systems and data accessible when required
- chart comparing likelihood and consequence to rate risk
- collecting and analyzing threat data for decisions
Down
- structured process to identify application security threats
- assurance sender cannot deny transmitted message
- gaining higher access rights after compromise
- pattern of activity showing malicious behavior
- chance that a risk event will occur
- unknown security flaw exploited before patch
- extracting detailed system information through active queries
- identifying potential attacks targets and methods before attack
- collection and analysis of cyber threat data
- hiding malicious traffic inside DNS requests
- spotting unusual activity that may indicate attacks
- security standard for organizations handling cardholder data
- forensic clues suggesting intrusion or malicious activity
- assurance information accessible only authorized users
- initial information gathering before launching attack
- preventing spread of incident to other systems
- protection against unauthorized modification of data
- using AI to detect botnet behavior and intrusions
- layered security approach using multiple controls
- misuse of scripts to automate attacks or exfiltration
- remote control script placed on a web server
- attempt to exploit system security weaknesses
49 Clues: chance that a risk event will occur • weakness exploitable by threat actors • patterns methods used by threat actors • severity or impact if risk event occurs • verification that user or data is genuine • systems and data accessible when required • unknown security flaw exploited before patch • collection and analysis of cyber threat data • ...
CYBER SECURITY 2022-11-01
Küberturvalisus 2020-04-05
Across
- Klaviatuur
- Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata.
- Lehekülg, kust saab infot ohutult interneti kasutamise kohta.
- ....... telefoni number on 116111.
Down
- Teise inimese identiteedi volituseta kasutamine.
- Salasõna
- Cyber security
- Programm, mis nakatab sinu arvutit.
- Computer security
- Information security
10 Clues: Salasõna • Klaviatuur • Cyber security • Computer security • Information security • ....... telefoni number on 116111. • Programm, mis nakatab sinu arvutit. • Teise inimese identiteedi volituseta kasutamine. • Vahel ka ähvardava sisuga kirjad, mida ei tohiks edasi saata. • Lehekülg, kust saab infot ohutult interneti kasutamise kohta.
Cyber Security 2017-06-30
11 Clues: ancient • helps you • a computer virus • infects the computer • Risks can hurt you • connected to the internet • Network online websites • it helps you protect a secret • Theft takes your personality • can take your personal information • a software that can damage your computer system
Cyber Security 2022-11-28
Across
- program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself.
- a piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions.
- Worms cause problems by using up network bandwidth and therefore slowing down the network
- a large collection of malware-infected devices (zombies).
- type of malicious software designed to harm or exploit any programmable device, service or network.
- network security device that monitors and filters incoming and outgoing network traffic
Down
- this locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- unwanted software that monitors and gathers information on a person and how they use their computer.
- over 50% of all internet traffic is
- engineering manipulating, influencing, or deceiving you in order to gain control over your computer system
- infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
11 Clues: over 50% of all internet traffic is • a large collection of malware-infected devices (zombies). • network security device that monitors and filters incoming and outgoing network traffic • Worms cause problems by using up network bandwidth and therefore slowing down the network • ...
Cyber-Security 2022-11-28
Across
- locks computer and encrypts files
- Malicious software that self-replicates
- Gaining unauthorised access to a computer
- malware hidden as a useful function
- Someone trying to hack a computer
Down
- Safety online
- Email from 'reputable source' with a link
- spread through the network + use resources
- To help prevent unauthorised access
- makes malicious ads display when online
- Monitors how people use their device
11 Clues: Safety online • locks computer and encrypts files • Someone trying to hack a computer • To help prevent unauthorised access • malware hidden as a useful function • Monitors how people use their device • makes malicious ads display when online • Malicious software that self-replicates • Email from 'reputable source' with a link • Gaining unauthorised access to a computer • ...
Cyber security 2023-04-18
Across
- month of arrest
- Distributed Denial of Service
- who took over
- attacker how did they attack
- set of Security to stop incoming intruders
- set of computer that are all linked together
- type of cybercrime
Down
- cybercrime
- demand for payment to remove the virus
- using a PC to mine for crypto
- who was arrested
- assaults attacks on the web
12 Clues: cybercrime • who took over • month of arrest • who was arrested • type of cybercrime • assaults attacks on the web • attacker how did they attack • Distributed Denial of Service • using a PC to mine for crypto • demand for payment to remove the virus • set of Security to stop incoming intruders • set of computer that are all linked together
Second 2025-08-13
Across
- Force Attempting every possible password combination
- Person or group harassing others online
- Software designed to secretly monitor your activity
- Malicious code hidden inside another program
- Engineering Technique to trick people into revealing confidential information
- Security technique that converts data into unreadable form
- Hygiene Set of online habits to maintain security and privacy
Down
- Copy of important files kept separately for safety
- Horse Malicious program disguised as legitimate software
- Program that records every keystroke you type
- Fraud tactic to make a site look like another
- Official Indian body responding to cybersecurity incidents
- Injection Data theft by manipulating a website’s database queries
- Act 2000 Law in India dealing with cyber crimes
- Cyber attack exploiting a vulnerability before it’s fixed
- Device or software used to secure online privacy by masking IP
16 Clues: Person or group harassing others online • Malicious code hidden inside another program • Program that records every keystroke you type • Fraud tactic to make a site look like another • Act 2000 Law in India dealing with cyber crimes • Copy of important files kept separately for safety • Software designed to secretly monitor your activity • ...
CSAT Cyber Security Checkpopint 2026-03-16
Across
- What you should do with all links
- Retina scans and fingerprints
- Spyware, ransomware, viruses, oh my!
- This authentication needs two or more things
- Interconnected web of computers
- Your internet viewing app
- BIG catch for cyber criminals
- Last thing before the first single slash in a URL
- Longer is Stronger
- An SMS text phish
- From white to red
- Voice trickery that sounds fishy!
- Blocks malicious connections
- A fence provides this
- Not the kind from the ocean
- Verifying Identity
- Scrambled for security
- The new DTCC MFA process
- Uhoh, your data has been exposed!
- DTCC password manager
Down
- To whom should you report suspicious messages?
- DTCC Technology launching in July
- Last name of our CISO
- Triggers to make you click
- Records your keystrokes
- Malicious software holding data hostage
- What you should do when you suspect a phish
- Virtual storage in the sky
- Don't use unsecured public ______
- Your computer is sick
- Suspicious email
- Wears a black hat
- Cyber Security ____ Office (CSRO)
- A malicious QR Code
- Cyber vigilance
- You entered your login info in a fake site
- AI-generated deception
- Check your texts closely
- The world's most wanted hacker
- Used to be called SATEC
- Artificial or Real?
41 Clues: Cyber vigilance • Suspicious email • Wears a black hat • An SMS text phish • From white to red • Longer is Stronger • Verifying Identity • A malicious QR Code • Artificial or Real? • Last name of our CISO • Your computer is sick • A fence provides this • DTCC password manager • AI-generated deception • Scrambled for security • Records your keystrokes • Used to be called SATEC • ...
Cybersecurity 2024-04-12
Across
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- Type of encryption that involves the use of one key for both encryption and decryption
- Type of backup that backs up everything since the last back up
- Type of backup that involves backing up data that was created or changed since the last full backup
- Law which upholds the right of the public to access information that the government holds about them (4)
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- Type of backup that contains only those files which have been altered since the last backup
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- Type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
Down
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The protection of information that says who we are, what we do and what we believe
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A perceived threat to an organisation that comes from people within the organisation (2)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- The greatest vulnerability in a system when thinking about cybersecurity
- Attack carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- The process of converting ciphertext (random and meaningless) back to plaintext
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- IoT (3)
- A type of backup in which an exact replica of data is created and stored in a separate location
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
34 Clues: IoT (3) • Type of backup that backs up everything since the last back up • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • Word related to data being held on system devices such as hard drives and servers • ...
Cyber Security 2021-10-01
Across
- Encoding data with a password or key
- a hardware or software network security system
- protecting an account with something you know and something you have or are
- secures your account
- a network created using the world wide web
Down
- the type of malware that WannaCry is
- What CCPA and GDPR are trying to protect
- A type of malware that replicates itself
- malicious software that acts legitimately but has underlying malicious intent
- the process of making copies of data to use when original files are lost, destroyed or corrupted
- the act of sending false emails to unsuspecting people for fraudulent purposes
11 Clues: secures your account • the type of malware that WannaCry is • Encoding data with a password or key • What CCPA and GDPR are trying to protect • A type of malware that replicates itself • a network created using the world wide web • a hardware or software network security system • protecting an account with something you know and something you have or are • ...
Cyber security 2017-05-12
Across
- Exposes any attempts by attackers to overcome security controls.
- Natural disasters such as floods.
- Countries always spy on each other.
- The level of assurance that the data will be available to those who need it when they want it.
- A person who uses existing codes to hack into computers.
- The real name of our cyber security teacher.
Down
- A method that is used to test the security of software.
- Access must be restricted to those authorised to view the data in question.
- An individual who gains unauthorised access to a computer system or network.
- The level of assurance as to the accuracy and trustworthiness of the data.
- Software designed to prevent, detect and eradicate malicious software.
11 Clues: Natural disasters such as floods. • Countries always spy on each other. • The real name of our cyber security teacher. • A method that is used to test the security of software. • A person who uses existing codes to hack into computers. • Exposes any attempts by attackers to overcome security controls. • ...
Cyber Security 2024-09-04
Across
- A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website.
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge).
- A location on the internet where you can save your data (rather than on your computer or device)
- Getting into someone else’s computer or device without their permission.
- A way to stop hackers getting into your accounts, even if they know your password.
Down
- You need to create one of these to access services on the internet (such as email and shopping).
- Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of.
- Nasty software that can have a bad impact on your device or computer
- Unwanted emails or messages that usually try to sell you something.
- A copy of the information held on a device (such as photos and documents) which is stored somewhere else
- A sequence of characters (or words) used to stop criminals from accessing your accounts.
11 Clues: Unwanted emails or messages that usually try to sell you something. • Nasty software that can have a bad impact on your device or computer • Getting into someone else’s computer or device without their permission. • A way to stop hackers getting into your accounts, even if they know your password. • ...
Cyber security 2022-11-18
Across
- unwanted software that monitors and gathers information on a person and how they use their computer
- when human users of a system are tricked into providing confidential information
- software designed to gain access to your computer with malicious intent
Down
- automated programs that repeat tasks repeatedly botnet a large collection of malware-infected devices (zombies)
- measures put in place to make it harder for attackers
- checks incoming and outgoing network
- piece of software that appears to perform a useful function but unbeknown to the user it also performs malicious actions
- an attack using botnet
- attach themselves to files and self-replicate
- infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
- software that scans any file that is able to execute code
11 Clues: an attack using botnet • checks incoming and outgoing network • attach themselves to files and self-replicate • measures put in place to make it harder for attackers • software that scans any file that is able to execute code • software designed to gain access to your computer with malicious intent • ...
Cyber Security 2023-05-31
Across
- Original lead singers birth city
- What tool?
- I'm looking for a metal?
- Original band home country
- Original band home country
Down
- Guitarist's stage name
- Original artist is buried here
- What kind of car?
- Original singers birthname
- Original singers debut album
- What time of day?
- Last name of the guy Chaim Witz created this band with
12 Clues: What tool? • What kind of car? • What time of day? • Guitarist's stage name • I'm looking for a metal? • Original singers birthname • Original band home country • Original band home country • Original singers debut album • Original artist is buried here • Original lead singers birth city • Last name of the guy Chaim Witz created this band with
Cyber-security 2021-01-17
Across
- refers to the security of a computer or computer system
- authentication mechanisms, access channels and systems all have to work properly
- demands a ransom from you to get things back on track.
- result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
- ensure that information is hidden from people unauthorised to access it.
- modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
- helps hackers spy on systems and their users.
- self-replicating and spreads without end-user action, causing real devastation.
- ensuring that data has not been tampered with and, therefore, can be trusted.
- are attempts to expose users to unwanted, potentially malicious advertising.
- malicious instructions that appear as legitimate programs.
11 Clues: helps hackers spy on systems and their users. • demands a ransom from you to get things back on track. • refers to the security of a computer or computer system • malicious instructions that appear as legitimate programs. • ensure that information is hidden from people unauthorised to access it. • ...
Cyber Security 2023-09-14
Across
- A scam where attacks deceive people into revealing data
- system designed to defend your data
- allows you to connect to internet
- a modern digital electronic device
- defense
Down
- a encrypted connection over the internet from a device to network
- data or program use to operate computers
- hiddden or secret word
- a program that infect a computer
- A collections of continuous value that conveys information
- a person who uses computers to gain unauthorized access to data.
11 Clues: defense • hiddden or secret word • a program that infect a computer • allows you to connect to internet • a modern digital electronic device • system designed to defend your data • data or program use to operate computers • A scam where attacks deceive people into revealing data • A collections of continuous value that conveys information • ...
Cyber Security 2022-02-10
Across
- prevents a local computer from using a URL or an IP address to gain access to the server
- Legacy firewall
- Point to point
- blocks cookies
- blocks internet requests from unknown sources
Down
- block multicast
- Layer 2 tunneling protocol pass through
- Passthrough for ispec
- blocks java
- blocks ActiveX
- blocks proxy servers
11 Clues: blocks java • blocks ActiveX • Point to point • blocks cookies • block multicast • Legacy firewall • blocks proxy servers • Passthrough for ispec • Layer 2 tunneling protocol pass through • blocks internet requests from unknown sources • prevents a local computer from using a URL or an IP address to gain access to the server
Cyber Security 2026-01-28
Across
- millions of computers and devices all linked together to allow them to communicate
- the term for all of the different types of program that are written to
- A person who tries to gain access to a computer system without permission
- a program written to cause damage to the programs installed on a computer
- |The process you go through to gain access to a computer system
- a set of letters or characters that allow you to access a computer system
Down
- When you write something in a secret code so nobody else can read it
- facts on the Internet that aren't true and are designed to cause people to worry
- The computers in one place that are connected together to share devices and information
- word to describe a computer system that nobody can access without permission
- A program designed to track down and remove dangerous programs on your computer
11 Clues: |The process you go through to gain access to a computer system • When you write something in a secret code so nobody else can read it • the term for all of the different types of program that are written to • A person who tries to gain access to a computer system without permission • a program written to cause damage to the programs installed on a computer • ...
Cyber Security 2026-02-22
Across
- Unauthorized access attempt
- Two-factor authentication abbreviation
- Malicious software
- Person who breaks security
- Secret key for authentication
- Digital signature ensures this
Down
- Protection system for network
- Software that detects viruses
- Spy software
- Encrypting data method
- Technique to steal passwords by fake website
11 Clues: Spy software • Malicious software • Encrypting data method • Unauthorized access attempt • Protection system for network • Person who breaks security • Software that detects viruses • Secret key for authentication • Digital signature ensures this • Two-factor authentication abbreviation • Technique to steal passwords by fake website
Cyber security 2021-04-15
Across
- person who tries to gain unauthorised access to a computer
- unauthorised access to a computer.
- techniques that rely on measurable physical characteristics (eg fingerprint or iris) that can be automatically checked
- software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them
- program secretly installed on a computer to automatically collect information about the user over a period of time
- that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details
Down
- that causes pop-ups or windows that will not close
- attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details
- cyberattack that redirects a user from a genuine website to a fake one
- that appears legitimate, but performs some malicious activity when it is run
- computer program designed to replicate and damage other computer systems and software.
11 Clues: unauthorised access to a computer. • that causes pop-ups or windows that will not close • person who tries to gain unauthorised access to a computer • cyberattack that redirects a user from a genuine website to a fake one • that appears legitimate, but performs some malicious activity when it is run • ...
Cyber security 2022-11-28
Across
- Methods to help yourself be safe online
- People who hack with little knowledge
- Malware disguised as something useful ie game
- Watching a victim enter sensitive data
Down
- Example of ransom wars attack
- Self replicating software
- Email disguised as a reputable source
- Entering in different passwords for luck
- Flooding a targeted machine with requests
- Creating a scenario to make the victim panic
- These use the network and it’s resources
11 Clues: Self replicating software • Example of ransom wars attack • Email disguised as a reputable source • People who hack with little knowledge • Watching a victim enter sensitive data • Methods to help yourself be safe online • Entering in different passwords for luck • These use the network and it’s resources • Flooding a targeted machine with requests • ...
Cyber Security 2024-02-05
Across
- The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- Gaining unauthorised access to or control of a computer system.
- Generator Attack An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password).
- Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data.
- An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
Down
- Engineering A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- Computer Misuse Act Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
- Hacking Performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
- The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
11 Clues: Gaining unauthorised access to or control of a computer system. • Hacking An authorised attempt to gain unauthorised access to a computer system, application, or data. • Force Attack This is a form of attack that makes multiple attempts to discover something (such as a password). • ...
Cyber Security 2025-01-14
Across
- Refers to legal property rights of a person over creations (artistic/commercial) of his/her mind
- Virtual diaries created by people to share their hobbies, thought with like minded people
- It is called as network of networks
- Safe and responsible use of Internet to safeguard one's information
- Person who purposely posts opposing, sarcastic, insulting comments about something/someone
- Emails sent by people which is fake/not genuine
Down
- Usage or imitation of the language and thoughts of another person projected as own's original work
- It is also called as a digital dossier
- Hacking done for national security and creating safer systems
- Criminals portray incorrect details as an employer
- Bulk mail sent by identified or unidentified source
11 Clues: It is called as network of networks • It is also called as a digital dossier • Emails sent by people which is fake/not genuine • Criminals portray incorrect details as an employer • Bulk mail sent by identified or unidentified source • Hacking done for national security and creating safer systems • Safe and responsible use of Internet to safeguard one's information • ...
Cyberattack Response 2024-06-28
Across
- Information harm
- Call for action
- Act of bringing attention
- Prevent further damage
- Combating hate organization
- Dangerous falsehoods
- Siddhayoga group action
- To mislead
- Urgent message
Down
- Legal action group
- To observe or see
- Online security threat
- Online keyword suggestions
- Essential response
- Search engine
- Sudden, harmful event
- Malicious software
- Involuntary reaction
- Organized group
- To act with purpose
20 Clues: To mislead • Search engine • Urgent message • Call for action • Organized group • Information harm • To observe or see • Legal action group • Essential response • Malicious software • To act with purpose • Involuntary reaction • Dangerous falsehoods • Sudden, harmful event • Online security threat • Prevent further damage • Siddhayoga group action • Act of bringing attention • ...
TEKA TEKI SILANG P5 2023-10-04
Across
- Sikap yang dapat dimunculkan dalam mengantisipasi kejahatan di dunia maya
- Ancaman yang dapat terjadi di media akibat Cyber crime
- Aspek dalam cyber security
- Bentuk perundungan di dunia maya
- Salah satu jaringan yang kadang dimanfaatkan oleh hacker
Down
- Data informasi probadi yang harus dilindungi
- Salah satu kerugian dari kejahatan dunia maya
- Bentuk dari Cyber Crime
- Jaringan komunikasi global
- Salah satu kejahatan yang menggunakan kemajuan teknologi.
10 Clues: Bentuk dari Cyber Crime • Aspek dalam cyber security • Jaringan komunikasi global • Bentuk perundungan di dunia maya • Data informasi probadi yang harus dilindungi • Salah satu kerugian dari kejahatan dunia maya • Ancaman yang dapat terjadi di media akibat Cyber crime • Salah satu jaringan yang kadang dimanfaatkan oleh hacker • ...
IGYUK Angol rejtvény 2024./VII-VIII. - Security 2024-08-29
Across
- Closed ... Television, or CCTV for short
- ...security = The field of security in the virtual world
- A piece of document describing past errors and events in a system
- A short phrase or combination of characters used to restrict access to information
- A system generating loud noise when triggered
Down
- The act of observing an area or person for security reasons
- A device used to restrict access to doors, boxes, or containers. Needs a key.
- The act of entereing one's property to steal things
- Computer tool to keep out cyber attacks
- A person in charge of protecting a place, a thing or a person
10 Clues: Computer tool to keep out cyber attacks • Closed ... Television, or CCTV for short • A system generating loud noise when triggered • The act of entereing one's property to steal things • ...security = The field of security in the virtual world • The act of observing an area or person for security reasons • ...
E-Safety Crossword Puzzle 2021-02-14
Cyber Security ACMH 2018-09-21
Across
- Malware that is loaded onto a computer and then run without the user's knowledge or knowledge of it's full effects.
- Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
- Something that can cause harm to a system or organization.
- The transformation of data to hide its information content.
- Malware that passes information about a computer user's activities to an external party.
- Intrusion detection system that also blocks unauthorized access when detected.
- The process to verify that someone is who they claim to be when they try to access a computer or online service.
Down
- Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.
- Obtaining evidence of identity by two independent means.
- Software intended to infiltrate and damage or disable computers.
- The process of identifying, analyzing and evaluating risk.
- A flaw or weakness that can be used to attack a system or organization.
- Method used by criminals to try to obtain financial or other confidential information from internet users, usually through email.
- A secret series of characters used to authenticate a person's identity.
- Malware that replicates itself so it can spread to infiltrate other computers.
- Someone who violates computer security for malicious reasons, kudos or personal gain.
- Something that could cause an organization no to meet one of its objectives
17 Clues: Obtaining evidence of identity by two independent means. • The process of identifying, analyzing and evaluating risk. • Something that can cause harm to a system or organization. • The transformation of data to hide its information content. • Software intended to infiltrate and damage or disable computers. • ...
Science and technology 2023-11-19
13 Clues: - Genetic code • - Physics realm • - Basic particle • - Global network • - Entire DNA set • - Tiny technology • - Celestial study • - Digital security • - Disease prevention • - Energy from the sun • - Step-by-step process • - Biological technology • - Orbital communication
Cyber Cross 2025-03-18
Across
- Protects your online privacy using encrypted tunnels - initials (3)
- A cyber security measure - Two-factor _ (14)
- A company famous for Windows (9)
- _ Horse - Malware that tricks users by pretending to be something else (6)
- The virtual world, or a digital universe? (9)
- Steve Jobs' famous company (5)
- A mathematical step-by-step method to solve a problem (9)
- The process of converting information into a code to prevent unauthorised access (10)
Down
- Angling for a deceptive cyber attack (8)
- Web pages love to leave these sweet things behind on your device (7)
- _ Learning - teaching computers to improve from experience (8)
- You can buy one-of-a-kind digital art with these – initials (3)
- Security barrier, but not the brick kind! (8)
- TURING This famous figure cracked the Enigma code (4,6)
- Competitive gaming (7)
- A hidden part of the internet, often used for illegal activities (4,3)
16 Clues: Competitive gaming (7) • Steve Jobs' famous company (5) • A company famous for Windows (9) • Angling for a deceptive cyber attack (8) • A cyber security measure - Two-factor _ (14) • Security barrier, but not the brick kind! (8) • The virtual world, or a digital universe? (9) • TURING This famous figure cracked the Enigma code (4,6) • ...
IoT Puzzle 2025-04-01
Across
- The practice of protecting internet-connected systems from cyber threats.
- A secret or hidden way to bypass security and gain unauthorized access to a system or network.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a code to prevent unauthorized access.
- Short-range wireless technology.
- Devices that collect and transmit real-time data from the environment.
Down
- Malicious software designed to harm or exploit devices or networks.
- Wireless standard for IoT connectivity.
- Software embedded in IoT devices that controls their operations.
- Verifying a user’s identity before granting access to a system.
- Remote servers used for data storage & processing.
- Connects IoT devices to the internet.
- Wireless transmission of data.
- Wireless communication protocol for IoT.
- A type of cyber-attack where attackers trick users into providing sensitive information.
- A network topology where devices connect directly and relay data to each other.
16 Clues: Wireless transmission of data. • Short-range wireless technology. • Connects IoT devices to the internet. • Wireless standard for IoT connectivity. • Wireless communication protocol for IoT. • Remote servers used for data storage & processing. • Verifying a user’s identity before granting access to a system. • ...
Cybersecurity Puzzle 2024-10-14
Across
- using historical data and advanced predictive algorithms
- AI- driven systems demonstrate this against evolving threats
- One of the databases used in the study
- a form of network intrusion
- pose an ever-growing challenge to security
Down
- researchers argue that this approach will simplify cybersecurity
- A form of cyber applications of AI bas
- A critical concern against AI systems
- one of the various facets of cyber security
9 Clues: a form of network intrusion • A critical concern against AI systems • A form of cyber applications of AI bas • One of the databases used in the study • pose an ever-growing challenge to security • one of the various facets of cyber security • using historical data and advanced predictive algorithms • AI- driven systems demonstrate this against evolving threats • ...
