cyber security Crossword Puzzles
Cyber Smart 2022-01-31
Across
- to keep others out of your personal devices
- online security practices
- keeps your device/s run properly
- physically separate location from the original
- before clicking on links
- steps taken to prevent cyber hacking
- to remove from a system or device
Down
- your sign in
- online
- recognized suspected scams
- when you are requested to provide private information
11 Clues: online • your sign in • before clicking on links • online security practices • recognized suspected scams • keeps your device/s run properly • to remove from a system or device • steps taken to prevent cyber hacking • to keep others out of your personal devices • physically separate location from the original • when you are requested to provide private information
Test 2024-07-19
Across
- Establishes early warning sensors and alert networks to warn others of potential attacks.
- Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
- Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
- Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
- Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
- Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
- Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
- Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
- Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
- Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
- Exploit weaknesses or vulnerabilities to gain access to internal resources.
- Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
- Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.
18 Clues: Exploit weaknesses or vulnerabilities to gain access to internal resources. • Establishes early warning sensors and alert networks to warn others of potential attacks. • Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun. • ...
Brain-Riddle Round 2 2025-02-11
Across
- A system that translates domain names to IP addresses.
- A tool that encrypts internet connections for privacy.
- A team that monitors and defends against cyber threats.
- A method of hiding data within other files.
- The data sent back from a server after a request.
- A remote computing device that communicates with a network.
- A program where hackers get paid for finding security flaws.
Down
- A temporary interaction between a user and a website.
- The part of a cyber attack that carries malicious code.
- A security feature that controls web resource access.
- A process of converting data into a fixed-size value.
- A temporary storage to speed up data access.
- A set of rules for communication between software.
- A type of attack that tricks users into executing unwanted actions.
- A file containing code for automation.
15 Clues: A file containing code for automation. • A method of hiding data within other files. • A temporary storage to speed up data access. • The data sent back from a server after a request. • A set of rules for communication between software. • A temporary interaction between a user and a website. • A security feature that controls web resource access. • ...
Unique MFAT Job Title Holders 2019-04-16
13 Clues: Asset Analyst • Document Writer • Archives Adviser • Comsec Custodian • Purchasing Officer • Sponsorship Manager • Classified Registrar • Commercial Specialist • MFAT Research Adviser • Business Process Manager • Service Delivery Manager • Cyber Security Specialist • Strategy & Planning Manager
Enteprise 2025-08-11
Across
- Liability Insurance – Insurance coverage protecting against financial losses from cyber incidents.
- Intelligence (BI) – Tools and processes that analyse data to help organisations make informed decisions.
- cloud – Cloud services deployed across multiple locations but managed from a central provider.
- Automation – Using AI, machine learning, and robotic process automation to automate complex tasks.
- Mesh – A flexible, modular approach to security where controls are distributed across different systems.
- Immune System (DIS) – Integrated systems designed to detect, prevent, and recover from digital threats.
- Detection and Response (EDR) – Security tools that monitor, detect, and respond to threats on devices.
- – Creating digital interactions across multiple devices, touchpoints, and platforms seamlessly.
Down
- Authentication (MFA) – A login process requiring two or more verification methods for security.
- (XaaS) – Delivering all types of IT services over the internet on a subscription basis.
- Intelligence (AI) – Machines or software that can perform tasks requiring human-like intelligence.
- Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies.
- technology – Tech designed to reduce environmental impact and promote long-term ecological balance.
- – A persistent, virtual 3D space where people can interact, work, and play.
- Screening – Scanning systems to detect security weaknesses before they can be exploited.
- Computing – Computers that use quantum bits (qubits) to solve problems faster than classical computers.
16 Clues: Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies. • – A persistent, virtual 3D space where people can interact, work, and play. • (XaaS) – Delivering all types of IT services over the internet on a subscription basis. • Screening – Scanning systems to detect security weaknesses before they can be exploited. • ...
Policy on Service and Digital 2020-09-01
Across
- Section 4.5 of the PSD includes requirements for the CIO of Canada and Deputy Heads on supporting __________ __________ and capability.
- The management of the functions under the PSD is guided by principles and best practice of the Government of Canada ______________ _______________
- The CIO of Canada is responsible for prescribing enterprise-wide __________ and ____________ standards for quality, accessibility and data interoperability.
- In alignment with a 2016 Direction, the PSD includes requirements for the CIO of Canada and Deputy Heads to support innovation and _____________.
- The objective of the PSD is that ______ ______ ________ and government operations are improved through digital transformation approaches
- Deputy Heads are responsible for maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada _______ _________ _____.
- The CIO of Canada will approve an annual, forward-looking three-year __________-wide plan that establishes strategic direction for the integrated management of service, information, data, IT, and cyber security.
- The Policy on _____ __ _____ articulates how Government of Canada organizations manage service delivery, information and data, information technology, and cyber security in the digital era
- Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________
Down
- Deputy Heads are responsible for ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the _________ _____ and any other relevant legislation, policy or agreement.
- Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.
- Deputy Heads are responsible for establishing __________ governance to ensure the integrated management of service, information, data, IT, and cyber security within their department.
- Deputy Heads must __________ the online end-to-end availability of services and their ease of use to complement all service delivery channels.
- The _____________ ___________________ Officer of Canada provides advice to the President and the Secretary of the Treasury Board of Canada about governing and managing enterprise-wide information, data, IT, cyber security, and service design and delivery.
- The PSD supports the mandate of the Minster for _______ _____________
- The CIO of Canada is responsible for defining ______ ________ requirements to ensure that Government of Canada and departmental information and data, applications, systems and networks are secure, reliable and trusted.
16 Clues: The PSD supports the mandate of the Minster for _______ _____________ • Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems. • Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________ • ...
Cyber Security Crossword 2019-03-23
Across
- Software that modifies a web browser's settings without a user's permission to inject unwanted advertising into the user's browser
- Another type of malware that uses a backdoor and named after the wooden horse that the Greeks used to infiltrate Troy
- A malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR)
- An undocumented way of accessing a system, bypassing the normal authentication mechanisms
- In contrast to viruses, which require the spreading of an infected host file, this is a standalone software and does not require a host program or human help to spread
- Network Security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- It spreads from one computer to another, leaving infections as it travels
- The action of recording (logging) the keys struck on a keyboard, typically secretively, so that the person using the keyboard is unaware that their actions are being monitored
Down
- Software that aims to gather information about a person or organization without their knowledge
- Is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
- Software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process
- A type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- Short for "Denial of Service" Attacks, which is a malicious attempts by one or more people to cause the victim, site, or node to deny service to its customers
- Is derived from the word "robot" and is an automated process that interacts with other network services
- Also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks
- May reside at the user or kernel level in the operating system or lower to include a hypervisor, master boot record, or the system firmware
16 Clues: It spreads from one computer to another, leaving infections as it travels • An undocumented way of accessing a system, bypassing the normal authentication mechanisms • Software that aims to gather information about a person or organization without their knowledge • ...
Interpol Investigation Challenge 2023-10-07
Across
- The United States' primary counter-terrorism agency
- A country in East Asia known for its efforts in countering cyber threats and cyber terrorism
- The country that hosts the annual Munich Security Conference, discussing counter-terrorism strategies
- The country where INTERPOL's General Secretariat is located
- The organization responsible for implementing counter-terrorism sanctions at the United Nations
- A country in Southeast Asia that has faced threats from groups like Abu Sayyaf
- The United States' primary intelligence agency responsible for counter-terrorism analysis
- A term for the unlawful use of violence and intimidation, often for political purposes
- A global network of law enforcement agencies that share information and collaborate on international crime
- The United Nations agency responsible for providing counter-terrorism assistance to member states
Down
- The international organization that sets global standards for combating money laundering and terrorist financing
- A term for the process of gathering and analyzing information to prevent terrorist activities
- The international organization focused on aviation security and counter-terrorism
- A country known for its involvement in counter-terrorism efforts in the Middle East
- The international organization focused on nuclear security and counter-terrorism
- The branch of the military responsible for counter-terrorism operations in the United States
- The European Union's law enforcement agency that deals with cross-border crime and terrorism
- A term for the use of non-lethal tactics and strategies to counter terrorism
- The United Kingdom's primary domestic intelligence and security agency
- A country in East Africa that has faced challenges from terrorist groups like Al-Shabaab
20 Clues: The United States' primary counter-terrorism agency • The country where INTERPOL's General Secretariat is located • The United Kingdom's primary domestic intelligence and security agency • A term for the use of non-lethal tactics and strategies to counter terrorism • A country in Southeast Asia that has faced threats from groups like Abu Sayyaf • ...
CHRISTMAS 2016 2016-11-26
Across
- BINGO
- THE PROFESSOR
- OLDEST IDENTICAL TWIN
- MISS PSYCHOLOGY
- YOUNGEST IDENTICAL TWIN
- OOBER
- I AM BABY HEAR ME SING
- MISS CHEERLEADER
- ME CYBER-SECURITY
- PEEKY
- SCHOOL CAREGIVER
- MR KARATE
Down
- MOTHER OF FRATERNAL TWINS
- MISS RANTOUL WEATHER GIRL
- ME BEHIND THE SCENES
- PO-BABE
- HOT-DOG
- THIRD GRANDCHILD
- SWIMMER
- OLDEST OF FOUR
- MOTHER OF THREE "FIELD" MICE
- SEAHAWKS FAN
22 Clues: BINGO • OOBER • PEEKY • PO-BABE • HOT-DOG • SWIMMER • MR KARATE • SEAHAWKS FAN • THE PROFESSOR • OLDEST OF FOUR • MISS PSYCHOLOGY • THIRD GRANDCHILD • MISS CHEERLEADER • SCHOOL CAREGIVER • ME CYBER-SECURITY • ME BEHIND THE SCENES • OLDEST IDENTICAL TWIN • I AM BABY HEAR ME SING • YOUNGEST IDENTICAL TWIN • MOTHER OF FRATERNAL TWINS • MISS RANTOUL WEATHER GIRL • MOTHER OF THREE "FIELD" MICE
Murphy's Crossword 2025-12-01
Across
- Slick
- Dog Whisperer
- Interior Designer
- DCR
- Musician
- Weed
- Heavy Machinery
- Clean Freak
- Spy
- Fisherman
- Sponsor
- Doctor
- Proud Father
Down
- Dental Assistant
- Marion’s Favorite Residence
- Stellar Mother
- Loving Babysitter
- Marion & David’s Residence
- ER Tech
- Ambitious
- Cyber Security
- Alternative for Fire
- City of Choice
- Artist
- Married on a Mountaintop
- Handyman
- the mauler
- St. Columbkille’s
- Restaurant Manager
29 Clues: DCR • Spy • Weed • Slick • Artist • Doctor • ER Tech • Sponsor • Musician • Handyman • Ambitious • Fisherman • the mauler • Clean Freak • Proud Father • Dog Whisperer • Stellar Mother • Cyber Security • City of Choice • Heavy Machinery • Dental Assistant • Interior Designer • Loving Babysitter • St. Columbkille’s • Restaurant Manager • Alternative for Fire • Married on a Mountaintop • Marion & David’s Residence • ...
cyber security quiz 2025-07-07
Across
- A security method using fingerprints, face, or retina scans
- A tool that records everything typed on a keyboard
- A software that secretly monitors and collects user information
- The process of verifying the identity of a user or device
- Malware that locks or encrypts data and demands payment to release it
- The process of converting data into a coded form to protect it
- A harmful program that disguises itself as useful software
- The illegal copying, use, or distribution of software
- A set of rules for formatting and transmitting data over networks
Down
- A hidden entry point used to bypass normal security
- A protective barrier that blocks unauthorized access to or from a network
- A group of infected computers remotely controlled by a hacker
- A general term for any software designed to harm or exploit devices
- The act of tricking people into revealing sensitive information online
- A software used to detect, prevent, and remove malicious programs
- A defined sequence of steps used to solve a problem or perform a task
16 Clues: A tool that records everything typed on a keyboard • A hidden entry point used to bypass normal security • The illegal copying, use, or distribution of software • The process of verifying the identity of a user or device • A harmful program that disguises itself as useful software • A security method using fingerprints, face, or retina scans • ...
Security Week 1 2024-08-13
10 Clues: Entry • Protector • Secret entry code • Malicious software • Secure message technique • Prefix for digital security • Identity verification method • Use of personal tech at work • It comes in an email, not a pond • Security marking for government data
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Crossword activity: Find the threat! 2021-06-10
Across
- Security implementation involves four complementary courses of action: prevention, detection, response, and _.
- Don’t use the same _ on different sites and change it regularly.
- Cyber _ includes single actors or groups targeting systems for financial gain or to cause disruption.
- _ is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.
- _ security protects the integrity and privacy of data, both in storage and in transit.
- A loss of _ is the disruption of access to or use of information or an information system.
- _ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- A _ is set on the boundaries of any system or network which monitors and controls network traffic.
Down
- _ security refers to the protection of hardware, software, and data from attackers.
- _ security includes the processes and decisions for handling and protecting data assets.
- The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _.
- Data leakage is an unauthorized transfer of _ to the outside world.
- Avoid using unsecure _ networks in public places
- A(n) _ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
- _ is a malware that aims to steal data about the organization or person.
15 Clues: Avoid using unsecure _ networks in public places • Don’t use the same _ on different sites and change it regularly. • Data leakage is an unauthorized transfer of _ to the outside world. • _ is a malware that aims to steal data about the organization or person. • _ security refers to the protection of hardware, software, and data from attackers. • ...
Careers in Cybersecurity 2025-01-30
Across
- Advises organizations on best practices for securing their systems and data.
- Develops and oversees the implementation of complex security structures.
- Handles and mitigates the impact of security breaches and cyber incidents.
- Monitors and protects an organization's network from cyber threats and vulnerabilities.
Down
- Simulates cyberattacks to identify and fix security weaknesses.
- Investigates cybercrimes and analyzes digital evidence.
- Ensures that an organization adheres to cybersecurity laws and regulations.
- Designs and implements secure network solutions to defend against hackers and cyberattacks.
- Develops algorithms and encryption techniques to secure sensitive information.
9 Clues: Investigates cybercrimes and analyzes digital evidence. • Simulates cyberattacks to identify and fix security weaknesses. • Develops and oversees the implementation of complex security structures. • Handles and mitigates the impact of security breaches and cyber incidents. • Ensures that an organization adheres to cybersecurity laws and regulations. • ...
Last Names of Unique MFAT Job Title Holders 2019-05-09
12 Clues: Asset Analyst • Archives Adviser • Comsec Custodian • Purchasing Officer • Sponsorship Manager • Classified Registrar • Commercial Specialist • MFAT Research Adviser • Business Process Manager • Cyber Security Specialist • Strategy & Planning Manager • Maori Engagement Coordinator
test 2026-02-19
Across
- Connects applications
- Version control system
- JavaScript runtime
- Remote server storage
- Related to security
- JavaScript UI library
- Relational database
- Code hosting platform
Down
- Popular programming language
- Provides services to clients
- Container platform
- Object oriented language
- Markup language
- Styles web pages
- Open source operating system
15 Clues: Markup language • Styles web pages • JavaScript runtime • Container platform • Related to security • Relational database • Connects applications • Remote server storage • JavaScript UI library • Code hosting platform • Version control system • Object oriented language • Popular programming language • Provides services to clients • Open source operating system
Cyber Security Vocab 2022-08-19
Across
- The practice of tricking users online into giving private information through email.
- Protects the way the program builds the device
- People who use the internet to trick often younger users for mostly sexual purposes.
- Sites and applications that allow users to share, create, and participate in social networking
- Unapproved copy of someone else's doing.
- The doctrine that lightly explains copyright material under certain circumstances that you don't need any permission to teach
Down
- The practice of copying someone else's words and calling them your own
- Internet rules to follow.
- A part of code that is able to multiply itself
- a software designed to get through the security of a device's system.
- A non-copyrighted thing that anyone can use without getting in trouble
- Something that holds data.
- Software that is able to automatically show advertising systems when a user is online.
- Something capable of spreading a virus to other devices while still active on the main device.
- software that allows a person to get someone elses data from their hard-drive
- A copyrighted term, word, or, letter representing a company
16 Clues: Internet rules to follow. • Something that holds data. • Unapproved copy of someone else's doing. • A part of code that is able to multiply itself • Protects the way the program builds the device • A copyrighted term, word, or, letter representing a company • a software designed to get through the security of a device's system. • ...
Accenture Crossword 2021-04-09
8 Clues: CYBER SECURITY • UPSKILL TO CLOUD • EQUAL OPPORTUNITY • LESS HUMAN INTERVENTION • VIRTUAL CYBER FUN ACTIVITIES • SUSTAINABLE DEVELOPMENT CONTEST • CONFERENCE ON INDUSTRY EXPERTISE • BUMPER GROWTH IN NEXT GEN TECHNOLOGY
Cyber Hackers & Security 2023-06-01
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
- A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Software designed to detect and destroy computer viruses
- Interconnected computing devices that can exchange data and share resources with each other
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
- It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
- Creation of a false identity by a cybercriminal with the intention of defrauding a victim
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online
- Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
- Baiting a trap for hackers
- The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th
16 Clues: Baiting a trap for hackers • Software designed to detect and destroy computer viruses • Creation of a false identity by a cybercriminal with the intention of defrauding a victim • Interconnected computing devices that can exchange data and share resources with each other • ...
Security Quiz 2013-07-09
Across
- With cloud computing they talk about this notorious number of threats
- one of the first antivirus programs, released in 1987
- this hat color is used when referring to professional hackers recruited specifically to find security gaps.
- This famous code was broken or "hacked" during the second world war
- The first convicted computer criminals, called the 414's got the name from their hometown in
- To use a program, site or system disguised as something else to acquire data
- The company behind the largest cyber-attack in history
- Silvertail plugin for real-time cyber detection
- ECAT stands for Enterprise Compromise ... Tool)
- A tactic used in ancient Greece to deceive a defense (one word)
- ... engineering is the human way to breach a company's information security.
- a non-profit organization working for the security within the cloud
- Alan ... invented this test to measure machines ability to be mistaken for a human being.
- A DOS-Attack is a Denial-of- ... what?
- last name of the founder for the laws of robotics, ensuring our security from acts of A.I.
Down
- a security system that controls the incoming and outgoing network traffic
- A part of the attack used when RSA was hacked in 2011
- a small simple program used to monitor a computers keystrokes
- this symbolical relative used complete surveillance in the book 1984
- SecurID runs on this Operative System
- the practice of secure communication
- This solution can Pull a complete live memory dump from a suspect machine
- The physical "key" that RSA use to create an authentication code
- RSA BSAFE provides security products for this IT-division
- The A in RSA
- programmers that find and work with weaknesses in computer systems
- this annoying verification on the web is used to make sure that you are human by twisting a word.
- a term to describe a flaw or fault in a computer program or system
- the organizational executive responsible for IT security.
29 Clues: The A in RSA • the practice of secure communication • SecurID runs on this Operative System • A DOS-Attack is a Denial-of- ... what? • Silvertail plugin for real-time cyber detection • ECAT stands for Enterprise Compromise ... Tool) • A part of the attack used when RSA was hacked in 2011 • one of the first antivirus programs, released in 1987 • ...
cyber security 2015-12-31
Across
- The process of translating plaintext into ciphertext
- software that records everything you type, then sends it off to whomever installed the software.
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software installed on a network of computers without the owner’s knowledge
Down
- a bridge between two computer networks
- the process of attempting to acquire sensitive information used for identity theft
- to choose options in order to create a custom system
- A capability to limit network traffic between networks and/or information systems
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
cyber security 2022-09-07
Across
- set of programs that tell a computer to perform a task.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- defensive technology designed to keep the bad guys out
- technique used by hackers to obtain sensitive information.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
Down
- that allows us to access our files and/or services through the internet from anywhere in the world.
- type of malware that functions by spying on user activity without their knowledge.
- process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- group of computers, printers and devices that are interconnected and governed as a whole. --
10 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • technique used by hackers to obtain sensitive information. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2023-11-25
Across
- Observe each activity on the internet of the victim, gather all information in the background, and send it to someone else is called _________.
- Name any one cyber attack
- When Internet server is flooded with continuous bogus requests so as to deny legitimate users to use the server or to crash the server is called ____.
- an act of gaining unauthorized access to a computer system or network is called ____.
Down
- A self-replicating program that runs and spreads by modifying other programs or files is ____ A program that is installed on a system to cause it to attack other systems is called _______Zombie
- is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
- Name any one password cracking tool.
- ________ is the attack which extracts confidential information from the bank/financial institutional account holders by illegal ways.
- A program that is installed on a system to cause it to attack other systems is called _______
- This spyware installs itself onto a device while a user is installing specific PC games, then tracks their online activity is ____
10 Clues: Name any one cyber attack • Name any one password cracking tool. • an act of gaining unauthorized access to a computer system or network is called ____. • A program that is installed on a system to cause it to attack other systems is called _______ • is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. • ...
Cyber Security 2023-09-18
Across
- A common 4 letter password that should be avoided
- software to protect your computer
- This is can slow down your computer and watch everywhere you go on the internet
- unauthorized user who attempts to or gains access to an information system
- a network security device that monitors and filters incoming and outgoing network traffic
Down
- Two or more computers connected together to share resources
- Main component of a server
- The front line of denfense in internet security
- A “tunnel” for private network browsing
- type of online harassment in which perpetrators use digital technologies to target and intimidate victims.
10 Clues: Main component of a server • software to protect your computer • A “tunnel” for private network browsing • The front line of denfense in internet security • A common 4 letter password that should be avoided • Two or more computers connected together to share resources • unauthorized user who attempts to or gains access to an information system • ...
Cyber security 2023-09-09
10 Clues: - software • - technology • several people • type of malware • - global network • - computer virus • - cyber criminal • - bullying refers • - multiplying virus • - social engineering
cyber security 2023-10-26
Across
- Making sure something is true or real.
- A secret word to keep your stuff safe.
- Things you learn and know.
- Your own special space on a website.
- The world of computers and the internet.
Down
- To put something on your computer or device.
- Giving permission for something.
- When someone tries to harm or break something.
- Keeping things safe and protected.
- Someone who's really good with computers.
10 Clues: Things you learn and know. • Giving permission for something. • Keeping things safe and protected. • Your own special space on a website. • Making sure something is true or real. • A secret word to keep your stuff safe. • The world of computers and the internet. • Someone who's really good with computers. • To put something on your computer or device. • ...
CYBER SECURITY 2023-02-11
Across
- A form of malware that demands money from the user in return for something
- The form of encryption that requires a single key
- The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!, This_P^zz1e!
- Full name of DoS Attack
- Is a type of malware that downloads onto a computer disguised as a legitimate program
Down
- A password containing at least 10 characters and several unique characters could be described as ______________
- A form of malware that gathers data about you and your device usage and forwards this to a third party without your knowledge or consent
- What type of password is a strong password with descriptors before or after it?
- The process of eavesdropping on what is being sent in a networkwork using a piece of software
- The front line of defense in information security
10 Clues: Full name of DoS Attack • The form of encryption that requires a single key • The front line of defense in information security • A form of malware that demands money from the user in return for something • What type of password is a strong password with descriptors before or after it? • ...
cyber security 2023-04-21
Across
- someones whos motive is to get personal data off of you
- a subset of the Trojan horse malwear
- facts and statistics
- any type of malicious softwear
- facts provided about something or someone
Down
- information that relates to an individual
- pretexting
- a type of malicious softwear
- a network of computers infected by malware
- a network security device
10 Clues: pretexting • facts and statistics • a network security device • a type of malicious softwear • any type of malicious softwear • a subset of the Trojan horse malwear • information that relates to an individual • facts provided about something or someone • a network of computers infected by malware • someones whos motive is to get personal data off of you
CAM 2025 Challenge 2025-09-01
Across
- A type of cyber attack that targets a specific individual or group.
- Always use long and unique _____ for each of your accounts.
- Malware that infects a computer by corrupting or erasing information and sending it to hackers.
- A set of rules that control access to a network.
- A person who breaks into system
- A type of malware that replicates itself to spread.
- A type of cyber attack that tricks people into giving up information.
Down
- A technique used to guess passwords by trying many combinations
- A security flaw in software or hardware.
- A type of attack that floods a website with traffic.
- This sends an email or text when logging in to make sure it is really you.
- A person inside an organisation who poses a security threat.
- Identity check using physical traits.
- A type of software that locks your files and demands payment.
- A small file that tracks your activity on websites.
- Unwanted emails or junk mail
- Private network to make you anonymous on the internet.
17 Clues: Unwanted emails or junk mail • A person who breaks into system • Identity check using physical traits. • A security flaw in software or hardware. • A set of rules that control access to a network. • A small file that tracks your activity on websites. • A type of malware that replicates itself to spread. • A type of attack that floods a website with traffic. • ...
Cyber Security 2019-11-21
Across
- D______ of service
- P_________ mails that try to trick users into giving away personal details.
- Programs similar to viruses except that they are not hidden within other files
- M_______ is malicious software that is designed to hack a system
- Programs that monitor user activities (such as websites visited, usernames and passwords used)
- B_____ force Where a program is used to find a password
Down
- P______ - Where users do not adhere to network policy.
- Programs that attempt to blackmail a user into making a payment to a hacker.
- Programs embedded (hidden) within other files. They replicate themselves and become part of other programs.
- Programs which pretend to be legitimate but in reality are malware.
10 Clues: D______ of service • P______ - Where users do not adhere to network policy. • B_____ force Where a program is used to find a password • M_______ is malicious software that is designed to hack a system • Programs which pretend to be legitimate but in reality are malware. • P_________ mails that try to trick users into giving away personal details. • ...
Cyber security 2024-03-20
Across
- A harmful software
- The act of stealing a users data
- data or programs used to operate computers and execute specific tasks
- stored information
- a person who uses computers to gain unauthorized access to data
Down
- The phrase used to authorize access to your data
- A virus that holds the victims data until a fee is paid
- Digital barrier that blocks access to outside intruders
- The software that protects your computer from viruses
- A virus that displays ads while a program is running
10 Clues: A harmful software • stored information • The act of stealing a users data • The phrase used to authorize access to your data • A virus that displays ads while a program is running • The software that protects your computer from viruses • A virus that holds the victims data until a fee is paid • Digital barrier that blocks access to outside intruders • ...
cyber security 2024-10-10
Across
- used to communicate
- term used for various pop-up advertisements that show up on your computer or mobile device
- used to verify
- the state or condition of being free from being observed or disturbed by other people
- the possible4 exposure to harm or injury
- name used to tell who you are on a website
- info about a particular person that exists on the internet on the result of their online activity
Down
- software developed by cybercriminals
- emails a type of online scam that targets consumers by sending them an e-mail that appears to be from a well known source
- the attempt to manage social change and regulate3 the future development
10 Clues: used to verify • used to communicate • software developed by cybercriminals • the possible4 exposure to harm or injury • name used to tell who you are on a website • the attempt to manage social change and regulate3 the future development • the state or condition of being free from being observed or disturbed by other people • ...
cyber security 2024-10-10
Across
- used to tell who you are on a website
- used to verify or identify
- so they can communicate with you when they need
- are a type of online scam
Down
- info a specific person
- the attempt to manage social change
- term used for most advertisements
- threats a possible exposure to harm
- of the state or condition of being free
- software development by threats
10 Clues: info a specific person • used to verify or identify • are a type of online scam • software development by threats • term used for most advertisements • the attempt to manage social change • threats a possible exposure to harm • used to tell who you are on a website • of the state or condition of being free • so they can communicate with you when they need
Cyber Security 2022-11-14
Across
- A person who tries to gain unauthorised access to a computer.
- The software that runs a computer.
- To copy a file from the internet onto your computer or device.
- A group of interconnected computers/devices.
Down
- Illegal terrorist activity carried out online.
- Files that are encrypted have been altered using a secret code and are unreadable to unauthorised parties.
- Also known as network manager. A person with the responsibility of managing and maintaining the network within an organisation.
- Computer code designed to damage a computer system.
- The programs, applications and data in a computer system. Any parts of a computer system that aren't physical.
- A sequence of logical instructions for carrying out a task. In computing, algorithms are needed to design computer programs.
10 Clues: The software that runs a computer. • A group of interconnected computers/devices. • Illegal terrorist activity carried out online. • Computer code designed to damage a computer system. • A person who tries to gain unauthorised access to a computer. • To copy a file from the internet onto your computer or device. • ...
Cyber Security 2023-09-15
Across
- Method of acquiring passwords over a network
- Process to identify someone
- A method to scramble data
- Displays advertisements on devices
Down
- A protocol to authorize service requests between trusted hosts
- A type of virus which is installed through spam emails
- General recognition for features
- Example of external threats
- Method of protecting against viruses
- A group of infected computers
10 Clues: A method to scramble data • Process to identify someone • Example of external threats • A group of infected computers • General recognition for features • Displays advertisements on devices • Method of protecting against viruses • Method of acquiring passwords over a network • A type of virus which is installed through spam emails • ...
Cyber Security 2023-10-10
Across
- a secret word or combination of letters or numbers, used for communicating with another person or with a computer to prove who you are:
- protection of a person, building, organization, or country against threats such as crime or attacks by foreign countries:
- the instructions that control what a computer does; computer programs:
- an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines:
- software that automatically puts advertisements onto a computer screen when a person is using the internet:
Down
- a computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
- involving, using, or relating to computers, especially the internet
- computer software that is designed to damage the way a computer works
- software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
- the large system of connected computers around the world that allows people to share information and communicate with each other:
10 Clues: involving, using, or relating to computers, especially the internet • computer software that is designed to damage the way a computer works • the instructions that control what a computer does; computer programs: • software that automatically puts advertisements onto a computer screen when a person is using the internet: • ...
cyber security 2017-05-12
Across
- threat through natural disasters
- reviewing or reading data, information or system documentations without permission of the owner
- sending to much traffic to a particular computer system
Down
- allowing information to pass to any person or organisation without permission
- crimes that can only be carried out using computer networks or systems
- users can be denied access to services or data which they require and have the permission
- cause problems with companies for political reasons
- the technician or network manager will take the steps required to remove or reduce the vulnerability
- gaining access to computer systems
- a remote security scanning tool
10 Clues: a remote security scanning tool • threat through natural disasters • gaining access to computer systems • cause problems with companies for political reasons • sending to much traffic to a particular computer system • crimes that can only be carried out using computer networks or systems • allowing information to pass to any person or organisation without permission • ...
CYBER SECURITY 2023-09-20
10 Clues: malware • set of rules • trial and error • malicious software • cyber architecture • distributive information • steal sensitive information • protection of computing security • authorised parties able to access • protecting info from unauthorised party
Cyber security 2023-04-21
Across
- hacking with malicious intent
- looking over at someones phone
- genorater attacks a quiz with questions to get infomation
- facts and statistics together
- attack dupes victum into opening emails/text messeges
- error action/decision that wasnt intended
- force attack hacking method uses trial and error to crack passwords
Down
- facts provided/learnt
- hacking without malicious intent
- gain unortharized acsess to someones deatails
10 Clues: facts provided/learnt • facts and statistics together • hacking with malicious intent • looking over at someones phone • hacking without malicious intent • error action/decision that wasnt intended • gain unortharized acsess to someones deatails • attack dupes victum into opening emails/text messeges • genorater attacks a quiz with questions to get infomation • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
Cyber Security 2023-10-10
Across
- a secret word or combination of letters or numbers, used for communicating with another person or with a computer to prove who you are:
- protection of a person, building, organization, or country against threats such as crime or attacks by foreign countries:
- the instructions that control what a computer does; computer programs:
- an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines:
- software that automatically puts advertisements onto a computer screen when a person is using the internet:
Down
- a computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
- involving, using, or relating to computers, especially the internet
- computer software that is designed to damage the way a computer works
- software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
- the large system of connected computers around the world that allows people to share information and communicate with each other:
10 Clues: involving, using, or relating to computers, especially the internet • computer software that is designed to damage the way a computer works • the instructions that control what a computer does; computer programs: • software that automatically puts advertisements onto a computer screen when a person is using the internet: • ...
Cyber security 2025-07-07
Across
- : Malicious software that replicates itself
- : Scam tricking individuals for personal info
- : Protects against malicious programs
- : Someone who exploits security vulnerabilities to access systems
- : Converting data into secret code
Down
- : Locks system until ransom paid
- : Hidden flaw in software
- : Secretly gathers personal information from computers
- : Malware that appears legitimate
- : Protects networks by filtering incoming and outgoing traffic
10 Clues: : Hidden flaw in software • : Locks system until ransom paid • : Malware that appears legitimate • : Converting data into secret code • : Protects against malicious programs • : Malicious software that replicates itself • : Scam tricking individuals for personal info • : Secretly gathers personal information from computers • ...
Cyber security 2022-09-07
Across
- An important process that verifies a user is really who they are; many different ways this can be done
- I am not a robot
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- a collection of malware infested computers that form a network to attack
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
- Full name of DoS attack
- An annoying malware that spams you with ads
- When raw data is put into context and has meaning, the data transforms into _____
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
10 Clues: I am not a robot • Full name of DoS attack • An annoying malware that spams you with ads • a collection of malware infested computers that form a network to attack • When raw data is put into context and has meaning, the data transforms into _____ • Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing. • ...
cyber security 2022-09-07
Across
- technique used by hackers to obtain sensitive information.
- set of programs that tell a computer to perform a task.
- defensive technology designed to keep the bad guys out
- group of computers, printers and devices that are interconnected and governed as a whole. --
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- type of malware that functions by spying on user activity without their knowledge.
- process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- that allows us to access our files and/or services through the internet from anywhere in the world.
10 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • technique used by hackers to obtain sensitive information. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2022-11-23
Across
- You could say that you can never make yourself 100% secure against attackers.
- Trojans, spyware, adware, and worms are all examples of this
- Users on a network can be put into groups, with each group having a unique set of privileges
- This is type of malware that is installed by the user of the computer without them knowing it's malware
- this is a type of malware that looks at what you do on your computer and can log everyone of your keystrokes
Down
- It scans the data to make sure it doesn’t contain anything malicious and that it follows the rules set by the network.
- is software that scans any file that is able to execute code
- is the term for when human users of a system are tricked into providing confidential information
- a software that automatically checks for available updates for the software you have on your computer.
- a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?
10 Clues: is software that scans any file that is able to execute code • Trojans, spyware, adware, and worms are all examples of this • You could say that you can never make yourself 100% secure against attackers. • Users on a network can be put into groups, with each group having a unique set of privileges • ...
Cyber safety Georgia 2016-06-08
Across
- information: people can hack into it
- software: it will protect your security
- people go on it
- people use it to communicate online
- media: people share what they have done or be mean
- it is a virus
- need it
- for something to load
- bullying : it can hurt your feelings
Down
- : your divice is sick
- most people should have it
- pretends to be someone and steels information
- can interrupt it
- theft: someone that steels something
- ups : silly things come on you divice
- it happens often
16 Clues: need it • it is a virus • people go on it • can interrupt it • it happens often • : your divice is sick • for something to load • most people should have it • people use it to communicate online • information: people can hack into it • theft: someone that steels something • bullying : it can hurt your feelings • ups : silly things come on you divice • ...
Cybersecurity 2021-10-23
Across
- Avoid using these public ones
- Being harassed or threatened online
- Cybersecurity Awareness Month
- Frequent software --- fix cybersecurity “loopholes” attackers can exploit
- Something you shouldn't share online
- This security software company was purchased by Intel in February 2011
- Software that is created specifically to help detect, prevent and remove software viruses
- Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
- The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
- Cybersecurity Awareness Month Theme 2021
- Type of security threat
- An attempt by hackers to damage or destroy a computer network or system
- Being pursued by someone through the anonymity of social media
- Establishes secure and encrypted connections to provide greater privacy
15 Clues: Type of security threat • Avoid using these public ones • Cybersecurity Awareness Month • Being harassed or threatened online • Something you shouldn't share online • Cybersecurity Awareness Month Theme 2021 • Being pursued by someone through the anonymity of social media • An attempt by hackers to damage or destroy a computer network or system • ...
CF Chapter 1 & 2 2023-10-23
Across
- A secure virtual network that uses the public network (i.e., the Internet). The security of a virtual private network lies in the encryption of packet content between the endpoints that define the virtual private network
- The 3 states of data are Data at rest, Data in transit, Data in ???
- Script Kiddies are cyber-criminals having little or no ???, often using existing tools or instructions to launch attacks.
- The 3 security services for controlling access are ???, Authorization, Accounting
- is a weakness that makes a target susceptible to an attack.
Down
- The 3 principles of security are Confidentiality, ???, Availability
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Hat Hackers cyber-criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- A type records that cyber criminals would be interested in stealing from organisations (hint: hospital)
- ??? net is a method of sending information from one device to another using removable media
10 Clues: is a weakness that makes a target susceptible to an attack. • The 3 principles of security are Confidentiality, ???, Availability • The 3 states of data are Data at rest, Data in transit, Data in ??? • The 3 security services for controlling access are ???, Authorization, Accounting • ...
cyber security 2022-09-15
Across
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- vector: The technique a hacker uses to gain access to a computer or network in order to achieve a malicious outcome.
- privilege: Having ultimate control of any given system.
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
Down
- A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
- Persistent Threats: When an unauthorized user invades a network, stays for an extended period of time, and steals data without harming the network.
- hat hacking Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
- The way in which the identity of a user is confirmed.
- Software that automatically displays or downloads material when a user is offline.
10 Clues: The way in which the identity of a user is confirmed. • privilege: Having ultimate control of any given system. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • Software that automatically displays or downloads material when a user is offline. • ...
cyber security 2022-09-07
Across
- technique used by hackers to obtain sensitive information.
- set of programs that tell a computer to perform a task.
- defensive technology designed to keep the bad guys out
- group of computers, printers and devices that are interconnected and governed as a whole. --
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- type of malware that functions by spying on user activity without their knowledge.
- process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- that allows us to access our files and/or services through the internet from anywhere in the world.
10 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • technique used by hackers to obtain sensitive information. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2020-10-20
Across
- the process of encoding something.
- the program and other operating information used by computers.
- due regard for the feelings, wishes and rights of others.
- the imparting or exchanging of information by speaking, writing or any other medium.
Down
- the state or fact of having the duty to deal with something or have control over something.
- the string of characters which allow access into a device.
- malware on your device when it is not secure.
- the feeling of being safe from danger or threat.
- Something that protects our device from unauthorized access.
- a device we use in our daily life (hint: it ends with an R)
10 Clues: the process of encoding something. • malware on your device when it is not secure. • the feeling of being safe from danger or threat. • due regard for the feelings, wishes and rights of others. • the string of characters which allow access into a device. • a device we use in our daily life (hint: it ends with an R) • ...
Cyber Security 2023-05-02
Across
- Process of developing, adding, and testing security features within applications to prevent security vulnerabilities
- A person who makes and rents out costumes
- Virtual Private Network
- Information, especially facts or numbers
Down
- A secret word or combination of letters or numbers
- The system for using computers to send messages over the internet
- A large system consisting of many similar parts that are connected together to allow movement or communication between or along the parts
- A device or program that stops people from seeing or using information on a computer without permission while it is connected to the internet
- An object or machine that has been invented for a particular purpose
- The large system of connected computers around the world that allows people to share information and communicate with each other
10 Clues: Virtual Private Network • Information, especially facts or numbers • A person who makes and rents out costumes • A secret word or combination of letters or numbers • The system for using computers to send messages over the internet • An object or machine that has been invented for a particular purpose • ...
cyber security 2022-05-05
Across
- a type of malware that modifies information on a computer
- virtual private network
- distributed denial of service
- someone who enters a technological divice illegaly
- attacker uses malici=ous codes to take the victims information
- a type of software allowing an attacker to take over a computer
Down
- set of programs that allow a computer to perform the task
- a technique allowing the hacker to imporsonate
- protection of technological devices
- malicious softwares
10 Clues: malicious softwares • virtual private network • distributed denial of service • protection of technological devices • a technique allowing the hacker to imporsonate • someone who enters a technological divice illegaly • a type of malware that modifies information on a computer • set of programs that allow a computer to perform the task • ...
CYBER SECURITY 2023-09-20
Across
- to steal sensitive information
- malware
- protection of computing systems and data that these systems store
- set of rules
Down
- the virtual and dynamic space created by the machine clones
- protecting info.from inauthorized parties
- attack data to web application
- malicious software
- attack uses trial & attack method
- automated process
10 Clues: malware • set of rules • automated process • malicious software • to steal sensitive information • attack data to web application • attack uses trial & attack method • protecting info.from inauthorized parties • the virtual and dynamic space created by the machine clones • protection of computing systems and data that these systems store
Cyber Security 2023-09-09
10 Clues: set of rules • automated process • cyber architecture • malware to replicate itself • distribution of information • to steal sensitive information • unexcepted changes in computer • malicious spread through files • attack use the trial-and-error method • protecting info. from unauthorized parties
Cyber Security 2024-03-14
Across
- a technology that creates a secure, encrypted connection over an insecure network like the Internet.
- practice of sending spam emails by impersonating legitimate sources.
- a situation in which an attacker can physically look at a device’s screen or keyboard and enter passwords to obtain personal information
- an error in the design or implementation of a system that can be exploited to cause unexpected or undesirable behaviour
- the process of transforming an ordinary message (plaintext) into a meaningless message (ciphertext)
- Only authorized users and processes should be able to access or modify data
Down
- Authorized users should be able to access data whenever they need to do so
- a hardware or software-based network security device that monitors all incoming and outgoing traffic
- a type of attack on computing devices in which an attacker attempts to steal the identity of a legitimate user and pretend to be someone else
- malware to extort money from users for ransom by gaining unauthorized access to sensitive user information and demanding payment to delete or return that information from the user.
10 Clues: practice of sending spam emails by impersonating legitimate sources. • Authorized users should be able to access data whenever they need to do so • Only authorized users and processes should be able to access or modify data • the process of transforming an ordinary message (plaintext) into a meaningless message (ciphertext) • ...
Cyber security 2023-10-06
Across
- Network that is designed to block unauthorized access
- person who uses computers to gain unauthorized access
- software control panel that enables the user to configure the appearance or actions
- Authorized Use Policy
- malicious software that holds your data for ransom
Down
- any software that infects and damages a computer
- fraudulent practice of sending emails or other messages pretending to be a reputable company
- software to detect and destroy computer virus
- a secret word or phrase that must be used to gain admission
- collection of items of the same type stored in a hidden or inaccessible
10 Clues: Authorized Use Policy • software to detect and destroy computer virus • any software that infects and damages a computer • malicious software that holds your data for ransom • Network that is designed to block unauthorized access • person who uses computers to gain unauthorized access • a secret word or phrase that must be used to gain admission • ...
Cyber Security 2024-11-28
Across
- A program that can harm your computer, often by stealing data
- The network that connects millions of computers around the world.
- The act of protecting your personal data and devices from harm.
- The act of pretending to be someone else to gain access to personal information
- A type of message that tricks you into giving up personal information
- A digital address used to identify a website
Down
- A security software designed to prevent harmful software from entering your computer
- The act of making sure your devices and data are safe online
- A system used to keep information private by converting it into a code
- A secret word or phrase used to gain access to a computer or system.
10 Clues: A digital address used to identify a website • The act of making sure your devices and data are safe online • A program that can harm your computer, often by stealing data • The act of protecting your personal data and devices from harm. • The network that connects millions of computers around the world. • ...
Cyber Security 2024-08-05
Across
- To keep your social media secure you should check your ____
- If someone is looking over your shoulder your being?
- What should you never share online?
- When creating a strong password lenght = ?
Down
- Another name for a computer virus (7)
- Do this regularly to your devices
- Hacking people is know as social ______?
- A type of phishing involving QR codes
- If you recieve a phishing email at work you should?
- What should you share instead of attachements?
10 Clues: Do this regularly to your devices • What should you never share online? • Another name for a computer virus (7) • A type of phishing involving QR codes • Hacking people is know as social ______? • When creating a strong password lenght = ? • What should you share instead of attachements? • If you recieve a phishing email at work you should? • ...
Cyber Security 2024-10-08
Across
- Digital systems and the online world
- Process of identifying a user's identity
- Technology allows us to access files through IE
- Used by hackers to obtain sensitive information
Down
- Limits access to private networks
- Method of protecting sensitive information
- Copy of a system or the network to protect data
- Software designed to detect malware infections
- Causes damaged on computers
- Small files stored on a computer
10 Clues: Causes damaged on computers • Small files stored on a computer • Limits access to private networks • Digital systems and the online world • Process of identifying a user's identity • Method of protecting sensitive information • Software designed to detect malware infections • Copy of a system or the network to protect data • Technology allows us to access files through IE • ...
cyber security 2024-10-25
Across
- Tries to steal information by impersonating a trusted entity.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Specialist Protects a company from cyber threats.
- A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- Creates harmful software to damage the network.
Down
- The process of converting information or data into a code to prevent unauthorized access.
- An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Acts as a security barrier, inspecting every request and filtering threats.
- Attempts to break into a system by manipulating data input.
10 Clues: Creates harmful software to damage the network. • Specialist Protects a company from cyber threats. • Attempts to break into a system by manipulating data input. • Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
CYBER SECURITY 2025-09-22
Across
- Tempat cari maklumat, main game, tengok video
- Beritahu guru atau ibu bapa jika ada masalah
- Perkataan rahsia untuk masuk akaun
- Beri sesuatu kepada orang lain
- Milik sendiri, jangan kongsi dengan orang lain
Down
- Nama yang digunakan untuk log masuk
- Helah untuk curi maklumat atau duit
- Tekan butang pada skrin
- Orang yang cuba masuk komputer tanpa izin
- Tidak bahaya dan dilindungi
10 Clues: Tekan butang pada skrin • Tidak bahaya dan dilindungi • Beri sesuatu kepada orang lain • Perkataan rahsia untuk masuk akaun • Nama yang digunakan untuk log masuk • Helah untuk curi maklumat atau duit • Orang yang cuba masuk komputer tanpa izin • Beritahu guru atau ibu bapa jika ada masalah • Tempat cari maklumat, main game, tengok video • ...
Cybersecurity 2023-09-13
Across
- Avoid using these public ones
- Being harassed or threatened online
- Cybersecurity Awareness Month
- Frequent software --- fix cybersecurity “loopholes” attackers can exploit
- Something you shouldn't share online
- This security software company was purchased by Intel in February 2011
- Software that is created specifically to help detect, prevent and remove software viruses
- Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
- The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
- Cybersecurity Awareness Month Theme 2021
- Type of security threat
- An attempt by hackers to damage or destroy a computer network or system
- Being pursued by someone through the anonymity of social media
- Establishes secure and encrypted connections to provide greater privacy
15 Clues: Type of security threat • Avoid using these public ones • Cybersecurity Awareness Month • Being harassed or threatened online • Something you shouldn't share online • Cybersecurity Awareness Month Theme 2021 • Being pursued by someone through the anonymity of social media • An attempt by hackers to damage or destroy a computer network or system • ...
Module 7 Puzzle 2021-09-29
Across
- Accessed to find postings from or about your target
- This conflict in 1990 had the first known cyber warfare component
- The NSA and ______ have allegedly had one of their cyber spies caught in the past
- Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- This command shows any shared files that are open
- This website is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- This type of warfare often involves propaganda and disinformation campaigns
- Modeling language used by systems engineers
- The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- Using the Internet to terrorize someone or some group of individuals
Down
- This matrix is the most appropriate tool for capturing the requirements of any security process or system
- This type of diagram shows how any entity might interact with a system
- Cyber criminals can use your personal information to guess these
- A political group that has used the internet for political intimidation
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- This type of "data" is data relevant to an investigation
- The most popular search engine used to gather personal information
- This website has been a focus of identity theft criminals to gain access to personal data and pictures
- Linux stores these logs at the following location /var/log/mail.*
20 Clues: Modeling language used by systems engineers • This command shows any shared files that are open • Accessed to find postings from or about your target • This type of "data" is data relevant to an investigation • Cyber criminals can use your personal information to guess these • This conflict in 1990 had the first known cyber warfare component • ...
037-1 2024-07-12
Across
- Unauthorized access to sensitive data.
- Pertaining to the digital world and security.
- Individuals who exploit security vulnerabilities.
- A scandal involving unauthorized data access.
- Investigation of digital evidence.
- To make something less secure or vulnerable.
- Financial information affected by the breach.
- Wrongful deception to gain something.
- Information that was compromised.
- Ongoing observation to detect irregularities.
- Notification of a potential security issue.
- Personal information targeted by cybercriminals.
- Legal resolution and compensation related to the breach.
- Credentials potentially compromised in the breach.
Down
- State of having sensitive data made public.
- Type of information that could be stolen.
- A software update for fixing vulnerabilities.
- Individuals affected by the data breach.
- Unintentional release of confidential information.
- To protect against unauthorized access.
- A technique used to obtain sensitive information fraudulently.
- The company involved in the 2017 breach.
- To gain unauthorized access to a system.
- Process of encoding data for security.
- Rules governing data protection.
25 Clues: Rules governing data protection. • Information that was compromised. • Investigation of digital evidence. • Wrongful deception to gain something. • Unauthorized access to sensitive data. • Process of encoding data for security. • To protect against unauthorized access. • Individuals affected by the data breach. • The company involved in the 2017 breach. • ...
Cyber Security 2022-12-11
Across
- A unique address that identifies a device on the internet
- A security mechanism that creates a virtual trap to lure attackers
- Servers that are accessed over the internet
- A network security device that monitors and filters incoming and outgoing network traffic
- A form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords
- A network of computers infected by malware that are under the control of a single attacking party
Down
- Phishing attacks that involve the use of voice calls
- An undocumented way of gaining access to computer system
- A type of artificial intelligence used to create convincing images, audio and video hoaxes
- The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable
10 Clues: Servers that are accessed over the internet • Phishing attacks that involve the use of voice calls • An undocumented way of gaining access to computer system • A unique address that identifies a device on the internet • A security mechanism that creates a virtual trap to lure attackers • ...
Cyber security 2023-04-21
12 Clues: data • error • attack • Hacking • Hacking • permission • engineering • force attack • authentication • generator attacks • of Service attack • Denial of Service attack
Cyber Security 2022-04-28
Across
- process of going from cipher text to plain text
- A type of attack where user sends a fraudulent message to trick a person
- A network system that monitors and controls incoming and outgoing traffic
- A tool to mask location by changing your ip address
- A weakness in a program that can be exploited
- A violation where sensitive data is compromised
Down
- process of going from plain text to cipher text
- Distributed denial of service. makes website unusable by flooding it
- Technique used to manipulate people in order to receive sensitive information
- malicious software that wreaks havoc on a computer
10 Clues: A weakness in a program that can be exploited • process of going from plain text to cipher text • process of going from cipher text to plain text • A violation where sensitive data is compromised • malicious software that wreaks havoc on a computer • A tool to mask location by changing your ip address • ...
Cyber Security 2019-07-31
Across
- An attempt to trick someone, with the intention of stealing money
- A malware names after an animal
- ________ is malicious software that does harm to the computer
- Messages sent to trick people and steal personal information
- Most dangerous computer virus
Down
- ________ replicates itself
- Unwanted emails that may contain viruses
- It is ________ to share your address online.
- Who should be responsible for your online safety?
- A malware named after a bug
10 Clues: ________ replicates itself • A malware named after a bug • Most dangerous computer virus • A malware names after an animal • Unwanted emails that may contain viruses • It is ________ to share your address online. • Who should be responsible for your online safety? • Messages sent to trick people and steal personal information • ...
cyber security 2023-12-13
Across
- Protection réseau qui contrôle le trafic pour empêcher les menaces extérieures.
- Tout événement, processus ou action potentiellement nuisible ou malveillant qui peut compromettre la sécurité d'un système informatique, d'un réseau ou de données.
- Garantie que les données n'ont pas été altérées, modifiées ou corrompues de manière non autorisée
- Point faible ou une faille dans un système informatique qui peut être exploitée pour compromettre la sécurité, permettant des attaques ou des accès non autorisés.
- Réseau sécurisé permettant des communications cryptées entre des appareils distants via Internet.
- Utilise deux clés différentes pour chiffrer et déchiffrer les données, offrant une sécurité élevée.
Down
- Pratique consistant à diviser un réseau en sous-réseaux logiques distincts pour améliorer la sécurité, la gestion du trafic et limiter l'impact des failles de sécurité.
- Processus de conversion de données en une chaîne de caractères alphanumériques fixe, utilisée pour l'intégrité des données et la confidentialité.
- Modèle de sécurité informatique où l'accès et les autorisations sur les ressources sont déterminés par le propriétaire de la ressource.
- Preuve numérique pour vérifier qui a envoyé des données et s'ils ont été modifiés.
10 Clues: Protection réseau qui contrôle le trafic pour empêcher les menaces extérieures. • Preuve numérique pour vérifier qui a envoyé des données et s'ils ont été modifiés. • Garantie que les données n'ont pas été altérées, modifiées ou corrompues de manière non autorisée • ...
cyber security 2023-12-13
Across
- Réseau sécurisé permettant des communications cryptées entre des appareils distants via Internet.
- Modèle de sécurité informatique où l'accès et les autorisations sur les ressources sont déterminés par le propriétaire de la ressource.
- Tout événement, processus ou action potentiellement nuisible ou malveillant qui peut compromettre la sécurité d'un système informatique, d'un réseau ou de données.
- Point faible ou une faille dans un système informatique qui peut être exploitée pour compromettre la sécurité, permettant des attaques ou des accès non autorisés.
- Processus de conversion de données en une chaîne de caractères alphanumériques fixe, utilisée pour l'intégrité des données et la confidentialité.
Down
- Utilise deux clés différentes pour chiffrer et déchiffrer les données, offrant une sécurité élevée.
- Garantie que les données n'ont pas été altérées, modifiées ou corrompues de manière non autorisée
- Protection réseau qui contrôle le trafic pour empêcher les menaces extérieures.
- Preuve numérique pour vérifier qui a envoyé des données et s'ils ont été modifiés.
- Pratique consistant à diviser un réseau en sous-réseaux logiques distincts pour améliorer la sécurité, la gestion du trafic et limiter l'impact des failles de sécurité.
10 Clues: Protection réseau qui contrôle le trafic pour empêcher les menaces extérieures. • Preuve numérique pour vérifier qui a envoyé des données et s'ils ont été modifiés. • Garantie que les données n'ont pas été altérées, modifiées ou corrompues de manière non autorisée • ...
Cyber Security 2024-03-26
Across
- A piece of software designed to update or fix vulnerabilities in a computer program.
- The practice of protecting systems, networks, and programs from digital attacks.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Software designed to harm or gain unauthorized access to a computer system.
- A secret combination of characters used to gain access to a system.
Down
- A network security system that monitors and controls incoming and outgoing network traffic.
- Software designed to detect and remove malicious software.
- Software that secretly gathers information about a person or organization.
- A type of malware disguised as legitimate software.
- The process of converting information into a code to prevent unauthorized access.
10 Clues: A type of malware disguised as legitimate software. • Software designed to detect and remove malicious software. • A secret combination of characters used to gain access to a system. • Software that secretly gathers information about a person or organization. • Software designed to harm or gain unauthorized access to a computer system. • ...
Cyber security 2024-03-20
Across
- The software that protects your computer from viruses
- The phrase used to authorize access to your data
- A virus that holds the victims data until a fee is paid
Down
- A harmful software
- Digital barrier that blocks access to outside intruders
- a person who uses computers to gain unauthorized access to data
- A virus that displays ads while a program is running
- stored information
- The act of stealing a users data
- data or programs used to operate computers and execute specific tasks
10 Clues: A harmful software • stored information • The act of stealing a users data • The phrase used to authorize access to your data • A virus that displays ads while a program is running • The software that protects your computer from viruses • Digital barrier that blocks access to outside intruders • A virus that holds the victims data until a fee is paid • ...
Cyber Security 2023-10-10
10 Clues: A bad password • Be smart and avoid • You need a secure ... • The first virus (1986) • Never trust suspicious... • Can damage or destroy files • Secretly records information • Minimum characters in a password • A short term for malicious software • Helps filter unwanted things on computer
cyber security 2024-10-25
Across
- Injection Hacker: Attempts to break into a system by manipulating data input.
- Acts as a security barrier, inspecting every request and filtering threats.
- Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Specialist: Protects a company from cyber threats.
Down
- Developer: Creates harmful software to damage the network.
- Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- The process of converting information or data into a code to prevent unauthorized access.
- Scammer: Tries to steal information by impersonating a trusted entity.
10 Clues: Specialist: Protects a company from cyber threats. • Developer: Creates harmful software to damage the network. • Scammer: Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • Injection Hacker: Attempts to break into a system by manipulating data input. • ...
cyber security 2024-10-25
Across
- Injection Hacker: Attempts to break into a system by manipulating data input.
- Acts as a security barrier, inspecting every request and filtering threats.
- Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Specialist Protects a company from cyber threats.
Down
- Creates harmful software to damage the network.
- Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- The process of converting information or data into a code to prevent unauthorized access.
- Tries to steal information by impersonating a trusted entity.
10 Clues: Creates harmful software to damage the network. • Specialist Protects a company from cyber threats. • Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • Injection Hacker: Attempts to break into a system by manipulating data input. • ...
CYBER SECURITY 2025-01-07
Across
- The process of converting data into a code to prevent unauthorized access.
- Detection A system or process that monitors network traffic for suspicious activity or policy violations.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Management The process of managing updates and patches to software to fix vulnerabilities or bugs.
- The process of verifying the identity of a user or device, often using passwords or biometric data.
- An incident in which unauthorized access or disclosure of sensitive data occurs.
Down
- A weakness in a system or network that could be exploited by a threat to gain unauthorized access.
- A type of malicious software that locks or encrypts data and demands payment for its release.
- A type of cyberattack where fraudulent attempts are made to obtain sensitive information by disguising as a trustworthy entity.
- Malicious software designed to harm or exploit any device or network.
10 Clues: Malicious software designed to harm or exploit any device or network. • The process of converting data into a code to prevent unauthorized access. • An incident in which unauthorized access or disclosure of sensitive data occurs. • A type of malicious software that locks or encrypts data and demands payment for its release. • ...
cyber security 2025-01-21
Across
- metode keamanan yang menggunakan dua bentuk identifikasi untuk mengakses data dan sumber daya
- bentuk modernisasi ataupun pembaharuan dari penggunaan teknologi
- Teknologi yang mengubah data menjadi kode agar tidak mudah dibaca tanpa kunci tertentu
- Program berbahaya yang dapat mencuri atau merusak data.
- praktik untuk melindungi sistem, jaringan, dan data dari serangan digital
Down
- Teknologi desentralisasi yang aman dan melindungi data dari manipulasi.
- Teknik penipuan untuk mencuri data pengguna melalui email atau situs palsu
- sekumpulan fakta atau informasi mentah yang dapat berupa angka, simbol, kata-kata, atau gambar
- ruang virtual yang terbentuk dari jaringan komputer dan internet.
- program yang dirancang untuk merusak atau mengganggu sistem komputer
10 Clues: Program berbahaya yang dapat mencuri atau merusak data. • bentuk modernisasi ataupun pembaharuan dari penggunaan teknologi • ruang virtual yang terbentuk dari jaringan komputer dan internet. • program yang dirancang untuk merusak atau mengganggu sistem komputer • Teknologi desentralisasi yang aman dan melindungi data dari manipulasi. • ...
Cybersecurity Awareness - Security at Home 2025-09-26
Across
- The process of identifying, evaluating, and prioritizing risks to organizational assets.
- Protection of devices like laptops, desktops, and mobile phones from cyber threats.
- Determines what an authenticated user is allowed to do within a system.
- is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
- A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
Down
- Routine practices and steps users take to maintain system health and improve security.
- A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- Manipulating people into divulging confidential information or performing actions that compromise security.
- Mechanisms that restrict access to systems, data, and resources based on user roles and permissions.
10 Clues: Determines what an authenticated user is allowed to do within a system. • Protection of devices like laptops, desktops, and mobile phones from cyber threats. • Routine practices and steps users take to maintain system health and improve security. • The process of identifying, evaluating, and prioritizing risks to organizational assets. • ...
Cyber Security Awareness 2023-03-04
Across
- Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
- A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
- The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
- Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
- The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
- Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
- A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
- Strategies for creating strong, unique passwords and protecting them from unauthorized access.
- Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
- Best practices for keeping digital devices and online accounts clean and secure.
- Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.
12 Clues: Best practices for keeping digital devices and online accounts clean and secure. • Strategies for creating strong, unique passwords and protecting them from unauthorized access. • Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans. • ...
Tech Apps 2023-10-09
22 Clues: codes • faults • access • signal • the end • of data • methods • computer • hardware • stations • contents • hypertext • into code • its state • information • remote data • metalanguage • linking of computers • systems-basic functions • security-controls to protect • physical needs for operation • arranged in columns and rows
Fun Games 2023-09-15
10 Clues: End-user devices • An internet traffic • A security mechanism • The process or action • Violation of the security • Property that information • Property of being accessible • A cyber attacker who uses software • Property of accuracy and completeness • The alternative way to access software
Cybersecurity Awareness Month Crossword 2023-09-18
Across
- A security process that requires users to provide two different authentication factors before gaining access.
- Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- The process of examining network traffic to identify anomalies and potential security threats.
- Software designed to detect, prevent, and remove malicious software from a computer or network.
- A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.
15 Clues: The process of examining network traffic to identify anomalies and potential security threats. • Software designed to detect, prevent, and remove malicious software from a computer or network. • The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality. • ...
037-1 2024-07-12
Across
- Unauthorized access to sensitive data.
- Pertaining to the digital world and security.
- Individuals who exploit security vulnerabilities.
- A scandal involving unauthorized data access.
- Investigation of digital evidence.
- To make something less secure or vulnerable.
- Financial information affected by the breach.
- Wrongful deception to gain something.
- Information that was compromised.
- Ongoing observation to detect irregularities.
- Notification of a potential security issue.
- Personal information targeted by cybercriminals.
- Legal resolution and compensation related to the breach.
- Credentials potentially compromised in the breach.
Down
- State of having sensitive data made public.
- Type of information that could be stolen.
- A software update for fixing vulnerabilities.
- Individuals affected by the data breach.
- Unintentional release of confidential information.
- To protect against unauthorized access.
- A technique used to obtain sensitive information fraudulently.
- The company involved in the 2017 breach.
- To gain unauthorized access to a system.
- Process of encoding data for security.
- Rules governing data protection.
25 Clues: Rules governing data protection. • Information that was compromised. • Investigation of digital evidence. • Wrongful deception to gain something. • Unauthorized access to sensitive data. • Process of encoding data for security. • To protect against unauthorized access. • Individuals affected by the data breach. • The company involved in the 2017 breach. • ...
Cyber Security Crossword 2023-06-21
Across
- Company which developed 7 step model for identification and prevention of cyber intrusions activity
- Type of Malware derived from the Greek Story
- Cyber Security model designed to guide policies for information security
- Keyword entered in Command Prompt which will give the IP address of the device
- Type of computer memory that is used to store data and instructions that are often accessed
Down
- Open Source platform for containerization designed by Google
- LINUX based OS developed for penetration testing and digital forensics
- Intergovernmental Organisation where "The Web was born"
- Free and open-source utility which is used to scan networks and security auditing.
- Set of rules and standards that govern how data is transmitted over a network
10 Clues: Type of Malware derived from the Greek Story • Intergovernmental Organisation where "The Web was born" • Open Source platform for containerization designed by Google • LINUX based OS developed for penetration testing and digital forensics • Cyber Security model designed to guide policies for information security • ...
Cyber Security Terms 2024-07-10
Across
- A type of malware that locks your computer or files and asks for money to unlock them.
- An update for a program that fixes problems or makes it better.
- A method used by cybercriminals to trick individuals into providing sensitive information, by pretending to be someone they are not
- A weak spot in a computer system that bad people can use to do bad things.
- A tool that helps keep your computer safe by controlling what data comes in and goes out.
- A security method where you need two things to log in, like a password and a code sent to your phone.
Down
- The psychological manipulation of people into performing actions or divulging confidential information, often used by attackers to gain access to systems or data.
- (Virtual Private Network) A service that hides your online activity to keep it private and secure.
- A type of malware disguised as legitimate software. Users are typically tricked into loading and executing it on their systems.
- A trick where someone pretends to be someone else to steal your information or get access to your computer.
- A method where someone tries every possible password until they find the right one.
- Malicious software that is made to harm your computer or steal information.
- Software that secretly gathers information about a person or organization without their knowledge, often to benefit a third party.
- A program that helps protect your computer by finding and getting rid of bad software, like viruses.
- A way to change information into a secret code so that only certain people can read it.
15 Clues: An update for a program that fixes problems or makes it better. • A weak spot in a computer system that bad people can use to do bad things. • Malicious software that is made to harm your computer or steal information. • A method where someone tries every possible password until they find the right one. • ...
Vocabulary Cyber Security 2023-08-09
Across
- taking money and information illegally
- caller disguises information on caller id
- Unauthorized disclosure of sensitive information
- process of verifying identity
- fraud letters have fake false promises
- Unauthorized accessing of network
Down
- take purses, wallets and mail
- pretend to be you to get personal information
- manipulation of face or voice
- Diving go thru trash for Personal information
- asking for personal information thru email
- moral principles guiding behavior
- steal credit card information with device
- Dishonest trick to cheat someone
- pretending to be someone you trust
15 Clues: take purses, wallets and mail • manipulation of face or voice • process of verifying identity • Dishonest trick to cheat someone • moral principles guiding behavior • Unauthorized accessing of network • pretending to be someone you trust • taking money and information illegally • fraud letters have fake false promises • caller disguises information on caller id • ...
Identity Security Crossword: IAM, PAM, IGA, CIAM & ZeroTrust 2024-08-01
Across
- Privileged Access Management acronym.
- Open standard for access delegation, commonly used for API access.
- Lightweight Directory Access Protocol, used for accessing and maintaining distributed directory information.
- Security model that requires strict identity verification.
- Single Sign-On, allows users to authenticate once and access multiple applications.
- Multi-Factor Authentication, adds extra layers of security.
- Process of granting or denying access to resources.
- Customer Identity and Access Management.
- Identity Governance and Administration.
- Methods of verifying identity using physical characteristics.
Down
- Process of verifying the identity of a user.
- Role-Based Access Control, permissions based on user roles.
- Process of removing user accounts and access rights.
- Process of setting up user accounts and access rights.
- Linking of a user's identity across multiple security domains.
- Security Assertion Markup Language, used for exchanging authentication data.
- Identity and Access Management framework.
- Process of converting data into a secure format.
- Attribute-Based Access Control, permissions based on user attributes.
- Cyber attack to obtain sensitive information by disguising as a trustworthy entity.
20 Clues: Privileged Access Management acronym. • Identity Governance and Administration. • Customer Identity and Access Management. • Identity and Access Management framework. • Process of verifying the identity of a user. • Process of converting data into a secure format. • Process of granting or denying access to resources. • ...
provalas 2025-09-30
Across
- makes sure users are who they say
- used to hack
- who does security build trust with
- sensitive data that is not tampered with
- business managers who categorize decides authorization
- management instructions on how things should run
- facts, recorded observation, statistics
- hackers go after what
- if your password has 8 characters/ alphabetic + numeric
Down
- installation malware, entry into internal systems
- users given access to sensitive info
- note taking app
- browser based
- proof that a transfer was successful
- only users who need access to info have access
- cloud storage
- physical access
- voice over internet protocol
- authorized access to info
- where does security start
20 Clues: used to hack • browser based • cloud storage • note taking app • physical access • hackers go after what • authorized access to info • where does security start • voice over internet protocol • makes sure users are who they say • who does security build trust with • users given access to sensitive info • proof that a transfer was successful • facts, recorded observation, statistics • ...
Cybersecurity Fundamental Chapter 8 Part 1 2024-06-05
Across
- Security professionals who simulate cyberattacks on systems to identify vulnerabilities.
- Includes all hardware devices such as desktops, laptops, tablets, and smartphones connected to the network, which are vulnerable to various security threats.
- Experts who monitor and analyze security measures to protect an organization's information systems.
- Services hosted by cloud providers, including SaaS, PaaS, and IaaS, where organizations must protect their resources within the cloud environment.
- Programs aimed at educating users about security policies, risks, and best practices to mitigate threats.
- A network domain consisting of interconnected devices within a limited area, requiring strong security measures to protect against unauthorized access and data breaches.
Down
- The study of ethical issues and the impact of computer technology on individuals and society.
- The realm encompassing all users accessing an organization's information system, often considered the weakest link in security.
- Legislation and regulations that govern the behavior and measures required to protect information and information systems.
- Refers to private cloud services and infrastructure accessible to an organization via the internet, posing threats like unauthorized access and network probing.
10 Clues: Security professionals who simulate cyberattacks on systems to identify vulnerabilities. • The study of ethical issues and the impact of computer technology on individuals and society. • Experts who monitor and analyze security measures to protect an organization's information systems. • ...
Cyber Security Crossword 2021-10-14
Across
- Do not accept trade orders via _____ or voicemail
- Require _______ confirmation for trade orders sent via email.
- Always use _______________ for all sensitive data on computers and removable media.
- Report Security Incidents to the ___________ Service Center x74357.
- “Do Your Part. #____________________.”
- Don't click on _________ links
- Report ___________ emails to the Cyber Threat Center (cyberthreat@raymondjames.com).
Down
- As part of the STOP.THINK.CONNECT.™ national public awareness ___________, CISA is also sharing Cybersecurity Awareness Month Resources to reduce cybersecurity risks and protect you online.
- ______________ is Cyber Security Awareness month.
- Type [_______] in the subject line of emails with sensitive data.
- PII stands for personally ____________ information
- Use a password of PIN to protect your mobile device. Have the device require a password after _________ minutes of inactivity.
- If you are unsure of the legitimacy of an email do not click on any links or open any _______________.
- Connect directly to the Raymond James ___________ only through wireless access points managed and configured by the ___________ Engineering Department.
- If you plan to enter a contract with a third-party or are changing your contract, please request a ______ assessment.
15 Clues: Don't click on _________ links • “Do Your Part. #____________________.” • ______________ is Cyber Security Awareness month. • Do not accept trade orders via _____ or voicemail • PII stands for personally ____________ information • Require _______ confirmation for trade orders sent via email. • Type [_______] in the subject line of emails with sensitive data. • ...
Cyber Security Puzzle 2024-04-22
Across
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
- the physical opening where a data cable can be plugged in
Down
- an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
- A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- a form of testing that is performed with knowledge of a target system's internals
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
- an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- capability to limit network traffic between networks and/or information systems.
- The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
- The unauthorized transfer of information from an information system.
15 Clues: the physical opening where a data cable can be plugged in • The unauthorized transfer of information from an information system. • capability to limit network traffic between networks and/or information systems. • a form of testing that is performed with knowledge of a target system's internals • ...
Cyber Threats & Security 2025-02-03
Across
- Deceptive attack tricking users into revealing sensitive information.
- Malware disguised as legitimate software to trick users.
- Extra security layer requiring two authentication factors.
- Software that detects and removes malicious programs.
- Security method using physical traits like fingerprints or facial recognition.
- System that filters and blocks unauthorized network traffic.
Down
- Capturing data while it is being transmitted over a network.
- Overloading a server with excessive traffic to disrupt service.
- Repeatedly guessing passwords to gain unauthorized access.
- Redirecting users to fake websites to steal personal data.
- Manipulating people into giving away confidential information
- Restricting system access based on user roles.
- An intermediary server between users and websites for security and privacy.
- Secret string of characters used for authentication.
- Malware that secretly collects user information without consent.(Social Engineering) Manipulating people into giving away confidential information.
15 Clues: Restricting system access based on user roles. • Secret string of characters used for authentication. • Software that detects and removes malicious programs. • Malware disguised as legitimate software to trick users. • Repeatedly guessing passwords to gain unauthorized access. • Redirecting users to fake websites to steal personal data. • ...
Cyber security - 4 2025-07-09
Across
- A tool that captures and analyzes network traffic.
- Actions taken after gaining access, like data extraction.
- A server that acts as an intermediary for requests from clients.
- A network protocol for collecting IP traffic information.
- A software update designed to fix vulnerabilities or bugs.
- Preventing parties from denying their actions or commitments.
- Dividing a network into segments to improve security.
- Software designed to cause damage or unauthorized actions.
- A framework for developing and executing exploit code.
- scanning, Checking for open ports to identify services running on a system.
Down
- Exploiting a bug or vulnerability to gain elevated access rights.
- A framework for managing digital keys and certificates.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- The process of applying updates to software to fix vulnerabilities.
- An attack where the attacker secretly intercepts communication between two parties.
15 Clues: A tool that captures and analyzes network traffic. • Dividing a network into segments to improve security. • A framework for developing and executing exploit code. • A framework for managing digital keys and certificates. • Actions taken after gaining access, like data extraction. • A network protocol for collecting IP traffic information. • ...
antoine cyber security 2026-04-01
Across
- A cyber attack that tricks people into giving personal information through fake messages or websites
- Any software designed to harm, damage, or gain unauthorized access to a computer
- The process of converting data into a secret code to protect it
- A self-replicating malware that spreads across networks without needing a file
- Gaining unauthorized access to computer systems or data
- – A security method that requires two forms of verification to access an account
- – Malware that disguises itself as a safe program to trick users into installing it
- The process of proving who you are when logging into a system
- A type of malware that spreads by attaching itself to files and programs
Down
- Software that secretly collects information about a user without their knowledge
- Protecting data from unauthorized access, use, or damage
- A secret word or phrase used to verify a user’s identity
- Malware that locks or encrypts files and demands payment to restore access
- A security system that monitors and controls incoming and outgoing network traffic
- Protecting computer networks from unauthorized access or attacks
15 Clues: Protecting data from unauthorized access, use, or damage • A secret word or phrase used to verify a user’s identity • Gaining unauthorized access to computer systems or data • The process of proving who you are when logging into a system • The process of converting data into a secret code to protect it • ...
Cyber security - 1 2025-07-09
Across
- Mechanisms that restrict access to systems and data.
- surface, The sum of all the points in a system that are exposed to an attacker.
- A security measure where a device is physically isolated from unsecured networks.
- A prolonged and targeted cyberattack.
- Becoming desensitized to frequent security alerts.
- Verifying the identity of a user, device, or system.
- Granting access to resources based on identity and permissions.
- Blocking known harmful software or processes.
- Ensuring that authorized users have access to information and systems when needed.
Down
- Trying many combinations to guess a password or encryption key.
- A program where organizations reward individuals for finding vulnerabilities.
- A network of infected computers controlled remotely.
- Software that detects and removes malicious software.
- Encryption using a pair of keys – one public and one private.
- An entity that issues digital certificates.
15 Clues: A prolonged and targeted cyberattack. • An entity that issues digital certificates. • Blocking known harmful software or processes. • Becoming desensitized to frequent security alerts. • Mechanisms that restrict access to systems and data. • A network of infected computers controlled remotely. • Verifying the identity of a user, device, or system. • ...
Cyber security - 3 2025-07-09
Across
- The process of sharing cryptographic keys securely.
- A security risk originating from within the organization.
- A system that monitors and controls incoming and outgoing network traffic.
- A set of procedures for identifying and handling security incidents.
- Reviewing logs to detect suspicious or unauthorized activities.
- Creating an exact copy of a digital device for investigation.
Down
- Guaranteeing the accuracy and completeness of data.
- Controlling network access using device MAC addresses.
- Strategies to detect and prevent threats from within the organization.
- Taking advantage of vulnerabilities to gain access.
- Sending IP packets with a false source IP address.
- A function that converts data into a fixed-size string of characters.
- Software or hardware that detects unauthorized access or anomalies.
- A European regulation on data protection and privacy.
- A system that actively blocks detected threats.
15 Clues: A system that actively blocks detected threats. • Sending IP packets with a false source IP address. • Guaranteeing the accuracy and completeness of data. • The process of sharing cryptographic keys securely. • Taking advantage of vulnerabilities to gain access. • A European regulation on data protection and privacy. • ...
