cyber security Crossword Puzzles
Cyber and digital literacy 2024-04-30
Across
- - Knowledge of cyber risks and precautions.
- - Writing instructions for computers.
- - Legal regulations governing cyberspace.
- - Right to control personal information.
- - Internet-based currency for online transactions.
- - Verification of a user's identity.
- - Individuals gaining unauthorized access to systems.
- - Global network connecting computers worldwide.
- - Practices to maintain online safety and security.
- - Accountability for one's online actions.
- - Gap between those with and without access to technology.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Fraudulent acquisition of someone's identity.
- - Representation of a person's online presence.
- - Study of human behavior in cyberspace.
- - Platforms for online social interaction.
- - Conflict conducted in the digital realm.
- - Programs and applications for computers.
- - Fraudulent attempt to obtain sensitive information.
- - Ethical behavior in the digital world.
Down
- - Education on protecting against cyber threats.
- - Electronic system for online financial transactions.
- - Gathering and analyzing digital threat information.
- - Securing data by converting it into a code.
- - Secret word or phrase to access a system.
- - Harassment or intimidation online.
- - Person raised in the digital age.
- - Measures to protect against cyber attacks.
- - Protection of digital systems from cyber threats.
- - Understanding of cyber threats and safety measures.
- - Protection against cyber-related losses.
- - Encoding data for secure transmission.
- - Shared values and norms in the digital community.
- - Barrier to block unauthorized access to a network.
- - Rights related to digital content and technology.
- - Mobile phone with advanced capabilities.
- - Criminal activities conducted via digital means.
- - Potential dangers to digital systems.
- - Promoting products or services online.
- - Responsible use of technology.
- - Unsolicited and often irrelevant messages.
- - Software designed to harm or infiltrate a system.
- - Protection of sensitive information.
- - Ability to effectively use digital tools and technologies.
- - Trail of data left by online activity.
- - Deliberate exploitation of computer systems.
- - Malicious software that replicates itself.
- - Unique name used to identify oneself online.
- - System of interconnected computers.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Harassment or intimidation online. • - Verification of a user's identity. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- - Knowledge of cyber risks and precautions.
- - Writing instructions for computers.
- - Legal regulations governing cyberspace.
- - Right to control personal information.
- - Internet-based currency for online transactions.
- - Verification of a user's identity.
- - Individuals gaining unauthorized access to systems.
- - Global network connecting computers worldwide.
- - Practices to maintain online safety and security.
- - Accountability for one's online actions.
- - Gap between those with and without access to technology.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Fraudulent acquisition of someone's identity.
- - Representation of a person's online presence.
- - Study of human behavior in cyberspace.
- - Platforms for online social interaction.
- - Conflict conducted in the digital realm.
- - Programs and applications for computers.
- - Fraudulent attempt to obtain sensitive information.
- - Ethical behavior in the digital world.
Down
- - Education on protecting against cyber threats.
- - Electronic system for online financial transactions.
- - Gathering and analyzing digital threat information.
- - Securing data by converting it into a code.
- - Secret word or phrase to access a system.
- - Harassment or intimidation online.
- - Person raised in the digital age.
- - Measures to protect against cyber attacks.
- - Protection of digital systems from cyber threats.
- - Understanding of cyber threats and safety measures.
- - Protection against cyber-related losses.
- - Encoding data for secure transmission.
- - Shared values and norms in the digital community.
- - Barrier to block unauthorized access to a network.
- - Rights related to digital content and technology.
- - Mobile phone with advanced capabilities.
- - Criminal activities conducted via digital means.
- - Potential dangers to digital systems.
- - Promoting products or services online.
- - Responsible use of technology.
- - Unsolicited and often irrelevant messages.
- - Software designed to harm or infiltrate a system.
- - Protection of sensitive information.
- - Ability to effectively use digital tools and technologies.
- - Trail of data left by online activity.
- - Deliberate exploitation of computer systems.
- - Malicious software that replicates itself.
- - Unique name used to identify oneself online.
- - System of interconnected computers.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Harassment or intimidation online. • - Verification of a user's identity. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
iSOC Crossword - Basic 2014-10-14
Across
- Viruses, Worms and Trojans etc
- passwords should always be at least ______ characters long.
- The state of being free from danger or threat.
- A software that is designed to detect and destroy computer viruses.
- Be a good cyber friend, don't send e-mails and instant ______ to anyone.
- Always _____ your computer when you leave your desk.
- Do not ______ your password or username with anyone else.
- Never share your _______ with another person.
- Password should be changed every 2-3 months.
- Be cyber savvy, be a ______ user.
Down
- A ____ is a web page address.
- A computer _______ is a group of interconnected computers.
- Classic form of Malware
- your password is like a _______, use it regularly, change it often and do not share it with anyone else.
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- A person who steals information from your system without you knowing about it.
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
- The A in APT
- Protect your laptop or cellphone by treating it like _____.
- Security is in your own _______.
20 Clues: The A in APT • Classic form of Malware • A ____ is a web page address. • Viruses, Worms and Trojans etc • Security is in your own _______. • Be cyber savvy, be a ______ user. • Password should be changed every 2-3 months. • Never share your _______ with another person. • The state of being free from danger or threat. • Always _____ your computer when you leave your desk. • ...
Cyber Security 1 2023-04-23
Across
- Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
- The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
- An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
- An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
- The process of converting data into a code to prevent unauthorized access.
- A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
- A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
- Malicious software designed to infiltrate or damage computer systems, networks, or devices.
- A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
- A type of malicious software that encrypts a victim's files and demands payment for their release.
- The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
- A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
- A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
- A security system that controls incoming and outgoing network traffic based on predetermined rules.
- A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.
15 Clues: The process of converting data into a code to prevent unauthorized access. • Malicious software designed to infiltrate or damage computer systems, networks, or devices. • A type of malicious software that encrypts a victim's files and demands payment for their release. • ...
Cyber Security Crosswords 2024-10-10
Across
- Malware yang bisa menggandakan diri lalu menyebarkannya ke dalam semua jaringan tanpa adanya campur tangan dari pengguna
- Perangkat atau perangkat lunak yang mengontrol lalu lintas jaringan masuk dan keluar untuk melindungi jaringan dari ancaman
- Kebijakan keamanan informasi adalah serangkaian aturan dan prosedur yang ditetapkan untuk melindungi ... dan informasi dalam organisasi
- ... data merupakan salah satu antisipasi ransomware
- Malware yang menyamar sebagai software atau file yang aman
- Untuk menutup kerentanan keamanan yang dapat dieksploitasi oleh penyerang dan memastikan perangkat lunak berfungsi dengan baik
- Main-in-the-... merupakan suatu serangan siber dengan cara menyadap untuk mencuri informasi
- Teknik manipulasi untuk mendapatkan informasi sensitif dengan memanfaatkan kelemahan dari sisi SDM, bukan lewat kerentanan teknis
Down
- Salah satu klasifikasi informasi di BCA
- Autentikasi tambahan untuk melindungi akun diakses pihak tidak berkepentingan
- Perangkat lunak yang dirancang untuk merusak, mengganggu, atau mendapatkan akses tidak sah ke sistem komputer atau jaringan
- Menggunakan kombinasi huruf besar, huruf kecil, angka, dan ... merupakan salah satu langkah untuk memperkuat password
- Kejahatan digital yang mengincar informasi atau data sensitif korban melalui email, unggahan media sosial,voice call, atau pesan teks
- Salah satu serangan siber yang menyerang suatu sistem atau website dengan mengirimkan fake traffic
- ...-day exploit adalah serangan yang memanfaatkan kerentanan perangkat lunak yang belum diketahui oleh pengembang dan belum diperbaiki
15 Clues: Salah satu klasifikasi informasi di BCA • ... data merupakan salah satu antisipasi ransomware • Malware yang menyamar sebagai software atau file yang aman • Autentikasi tambahan untuk melindungi akun diakses pihak tidak berkepentingan • Main-in-the-... merupakan suatu serangan siber dengan cara menyadap untuk mencuri informasi • ...
Cyber security - 2 2025-07-09
Across
- A modern security approach that provides integrated security across distributed systems.
- A framework for developing, implementing, and monitoring IT governance.
- Ensuring that information is accessible only to those authorized to have access.
- A form of public key encryption based on elliptic curves.
- A cryptographic technique for verifying the authenticity of digital messages.
- Strategies and tools to prevent unauthorized data transfer or access.
Down
- Documentation of who handled evidence and when.
- Software used to collect, preserve, and analyze digital evidence.
- Routine practices for maintaining system health and improving security.
- Tools that monitor end-user devices to detect and respond to threats.
- Part of the internet not indexed by standard search engines and often used for illegal activity.
- An attack that injects malicious scripts into content viewed by users.
- An incident in which sensitive data is accessed without authorization.
- An attack that floods a system with traffic to make it unavailable.
- A method or code that takes advantage of a vulnerability.
15 Clues: Documentation of who handled evidence and when. • A form of public key encryption based on elliptic curves. • A method or code that takes advantage of a vulnerability. • Software used to collect, preserve, and analyze digital evidence. • An attack that floods a system with traffic to make it unavailable. • ...
Cyber security - 1 2025-07-09
Across
- Mechanisms that restrict access to systems and data.
- surface, The sum of all the points in a system that are exposed to an attacker.
- A security measure where a device is physically isolated from unsecured networks.
- A prolonged and targeted cyberattack.
- Becoming desensitized to frequent security alerts.
- Verifying the identity of a user, device, or system.
- Granting access to resources based on identity and permissions.
- Blocking known harmful software or processes.
- Ensuring that authorized users have access to information and systems when needed.
Down
- Trying many combinations to guess a password or encryption key.
- A program where organizations reward individuals for finding vulnerabilities.
- A network of infected computers controlled remotely.
- Software that detects and removes malicious software.
- Encryption using a pair of keys – one public and one private.
- An entity that issues digital certificates.
15 Clues: A prolonged and targeted cyberattack. • An entity that issues digital certificates. • Blocking known harmful software or processes. • Becoming desensitized to frequent security alerts. • Mechanisms that restrict access to systems and data. • A network of infected computers controlled remotely. • Verifying the identity of a user, device, or system. • ...
Cyber security - 6 2025-07-09
Across
- A potential cause of an unwanted incident that may result in harm.
- A standard for managing customer data based on five trust service principles.
- Proactively searching for signs of malicious activity.
- A solution that collects and analyzes security data in real time.
- An attack that manipulates a database query through input fields.
- Protocols for securing communications over a network.
- Encryption using the same key for both encryption and decryption.
Down
- Information about threats and threat actors used to inform decisions.
- Manipulating people into divulging confidential information.
- A service that encrypts your internet connection for privacy and security.
- A standard for message logging in a network.
- A security process requiring two different forms of identification.
- Replacing sensitive data with unique identification symbols.
- A targeted phishing attack aimed at a specific individual or organization.
- A physical or digital device used to authenticate identity.
15 Clues: A standard for message logging in a network. • Protocols for securing communications over a network. • Proactively searching for signs of malicious activity. • A physical or digital device used to authenticate identity. • Manipulating people into divulging confidential information. • Replacing sensitive data with unique identification symbols. • ...
Cyber Security Crossword 2025-09-30
Across
- What helps keep your computer clean?
- What kind of email tries to trick you?
- What do you call bad software?
- What is the month we celebrate online safety
- What do you use to log into a computer?
- What do you click to leave a website?
- What should you never open from strangers?
- What blocks bad websites?
Down
- What should you do before clicking a link?
- What should you do to your apps to keep them safe?
- What do you call a fake website?
- What do you call someone who breaks into computers?
- What should you do if something online feels wrong?
- What should you never share online?
- What is the internet also called?
15 Clues: What blocks bad websites? • What do you call bad software? • What do you call a fake website? • What is the internet also called? • What should you never share online? • What helps keep your computer clean? • What do you click to leave a website? • What kind of email tries to trick you? • What do you use to log into a computer? • What should you do before clicking a link? • ...
crossword1 2024-10-23
Across
- Stuxnet primarily targets which type of systems
- Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
- Which security key is a physical device that acts as a second factor for user authentication.
- National Nodal Agency for responding to computer security incidents as and when they occur
- Botnet that was responsible for a series of DDoS attacks in 2016
- Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
- Patch Management Solution used in all PCs of GAIL
- Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
- What does letter “I” in the cyber security term CIA stands for
- Type of rogue WIFI access point used for Wi-Fi phishing
- Network protocol that collects and analyzes IP traffic data to monitor network
- Security standard that specifically helps in safeguarding Payment Card Data
Down
- Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
- BCP stands for
- The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- What is EU’s new data protection law
- Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
- Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
- What networking architecture that GAIL recently migrated to that enables more efficient network management?
- The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
- A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
- Act of stealing the card information rather than the card itself
22 Clues: BCP stands for • What is EU’s new data protection law • Stuxnet primarily targets which type of systems • Patch Management Solution used in all PCs of GAIL • Type of rogue WIFI access point used for Wi-Fi phishing • What does letter “I” in the cyber security term CIA stands for • Botnet that was responsible for a series of DDoS attacks in 2016 • ...
Cyber security - 5 2025-07-09
Across
- The process of gathering information about a target system.
- A centralized unit that deals with security issues.
- An unskilled attacker who uses existing tools to launch attacks.
- A set of security settings that serve as a benchmark for systems.
- A f
- An observable occurrence relevant to system security.
- Malware designed to gain unauthorized root or administrative access.
- Malware that encrypts a victim’s files and demands payment to restore access.
- Running untested or untrusted programs in isolation to prevent damage.
Down
- An evaluation of an organization’s security policies and systems.
- Identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize or control their impact.
- A protocol for secure remote login and command execution.
- Simulated attackers and defenders security testing.
- The practice of writing software that is resistant to attacks.
- Analyzing a system to understand its design and vulnerabilities.
15 Clues: A f • A centralized unit that deals with security issues. • Simulated attackers and defenders security testing. • An observable occurrence relevant to system security. • A protocol for secure remote login and command execution. • The process of gathering information about a target system. • The practice of writing software that is resistant to attacks. • ...
CYBER 2021-03-27
Across
- A secret word or phrase that is used to access a computer system or service.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- The method of obtaining user information through fraudulent communications targeted directly at people.
- The way in which the identity of a user is confirmed.
- security A technique for protecting computers, networks, programs, and
Down
- A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
- Software that automatically displays or downloads material when a user is offline.
- are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
- Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
- A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.
10 Clues: The way in which the identity of a user is confirmed. • security A technique for protecting computers, networks, programs, and • A secret word or phrase that is used to access a computer system or service. • Software that automatically displays or downloads material when a user is offline. • ...
CySec 2025-10-24
Across
- you let anyone inside your company’s building? When your company’s physical security is a concern to you, then why not also your cyber security. Most would say that the impact of a cyber breach is way more significant than a physical one.
- Information’s storage
- of cyber security
- CySec we have a solution for your troubles. As a company specified in Cyber Security for small businesses, we offer discrete and secure cloud storage for your data. On top of that are we able to build up your security network around your workspace to ensure a smooth ongoing workflow within the company.
Down
- company’s information’s are for sure the most vital part of your company. Materials and products can be produced quickly with small effort, but the planning process and the knowledge behind it, is your company’s most valuable asset. A breach into your system could be fatal. Not to mention the time and money wasted when your company is offline and your employees can’t work.
- security: Your Challenge - Our solution
- solutions for your problems
- wait until it is too late, because afterwards one can only do damage reduction. Secure yourself a meeting with our specialists now. Contact us at CySec@aon.at. You will find further information at CySec.at.
8 Clues: of cyber security • Information’s storage • solutions for your problems • security: Your Challenge - Our solution • wait until it is too late, because afterwards one can only do damage reduction. Secure yourself a meeting with our specialists now. Contact us at CySec@aon.at. You will find further information at CySec.at. • ...
Spam 2024-08-15
crossword1 2024-10-23
Across
- Stuxnet primarily targets which type of systems
- Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
- Which security key is a physical device that acts as a second factor for user authentication.
- National Nodal Agency for responding to computer security incidents as and when they occur
- Botnet that was responsible for a series of DDoS attacks in 2016
- Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
- Patch Management Solution used in all PCs of GAIL
- Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
- What does letter “I” in the cyber security term CIA stands for
- Type of rogue WIFI access point used for Wi-Fi phishing
- Network protocol that collects and analyzes IP traffic data to monitor network
- Security standard that specifically helps in safeguarding Payment Card Data
Down
- Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
- BCP stands for
- The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- What is EU’s new data protection law
- Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
- Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
- What networking architecture that GAIL recently migrated to that enables more efficient network management?
- The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
- A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
- Act of stealing the card information rather than the card itself
22 Clues: BCP stands for • What is EU’s new data protection law • Stuxnet primarily targets which type of systems • Patch Management Solution used in all PCs of GAIL • Type of rogue WIFI access point used for Wi-Fi phishing • What does letter “I” in the cyber security term CIA stands for • Botnet that was responsible for a series of DDoS attacks in 2016 • ...
cyber ethics 2025-06-13
Across
- Censorship – Controlling or restricting content
- Fraud – Scams and deception in cyberspace
- – Monitoring online activity
- Law – Legal rules for digital activities
- – Keeping personal information safe online
- Footprint – The online traces you leave behind
- Theft – Stealing someone’s personal details.
- – Online harassment and intimidation
- – Unauthorized access to digital systems
- Protection – Safeguarding stored information
Down
- Intelligence – Smart systems making decisions
- – Criminal activities in the digital world
- Property – Ownership of creative digital work
- Warfare – Using data as a weapon
- – Scrambling data to keep it secret
- Neutrality – Equal access to internet resources
- – Protecting systems and data from threats
- – Tricking people into revealing sensitive data
- Rights – Online freedoms and responsibilities
- Hacking – Hacking for security, not harm
20 Clues: – Monitoring online activity • Warfare – Using data as a weapon • – Scrambling data to keep it secret • – Online harassment and intimidation • Law – Legal rules for digital activities • Hacking – Hacking for security, not harm • – Unauthorized access to digital systems • Fraud – Scams and deception in cyberspace • – Criminal activities in the digital world • ...
IGCSE computer science cyber security threats 2025-04-28
Across
- type of malware that does not depend on a users act , and instead look for vulnerability holes in a network to duplicate itself and clog up bandwidth
- cyber security threat that examines packets passing through a hardware to intercept them
- cyber threat that sends a fake email to the user which encourages the user to click link or respond to the email , providing their personal data to the cyber criminal
- cyber threat that involves downloading malicious software onto a users hard drive to re direct the requests sent by the user to a genuine website to a fake website instead
- manupilating and deceiving people into providing their personal data
- any malicious software designed to disrupt a users data or computer
- cyber threat that involves installing malware to many computers to create a bot net to flood a webserver with requests
- type of malware downloaded on to a users hardware that gathers certain data and sends them to the third party
- type of malware that is downloaded on to the hard drive by user unknowingly and duplicates itself to corrupt data and take up storage space
Down
- type of malware that disguises other malware which is released
- cyber threat which uses trial and error method to crack a users password and gain access to their personal information
- type of malware designed to automatically create pop up adds that can collect personal information
- name given to a cyber criminal
- type of malware that encrypts a users data and demands a set amount of money to decrypt the data
- act of gaining unauthorised access to data .
15 Clues: name given to a cyber criminal • act of gaining unauthorised access to data . • type of malware that disguises other malware which is released • any malicious software designed to disrupt a users data or computer • manupilating and deceiving people into providing their personal data • ...
CS 102 Lecture 5 Crossword Puzzle 2017-04-18
Across
- The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
- This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
- This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
- These attacks play on human error to bypass technical security controls.
- This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
- Programs that act without a user's knowledge and alter operations of computers and mobile devices.
- This cyber-criminal describes someone who enter a computer or network illegally.
- This cyber criminal uses the internet or network to destroy computers for political reasons.
- The ____ web is a portion of the internet that cannot be accessed through regular search engines.
- These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.
10 Clues: These attacks play on human error to bypass technical security controls. • This cyber-criminal describes someone who enter a computer or network illegally. • This cyber criminal uses the internet or network to destroy computers for political reasons. • The ____ web is a portion of the internet that cannot be accessed through regular search engines. • ...
Cyber and DIGITAL LITERACY 2024-04-30
Across
- - Criminal activities conducted via digital means.
- - Measures to protect against cyber attacks.
- - Secret word or phrase to access a system.
- - Fraudulent acquisition of someone's identity.
- - Rights related to digital content and technology.
- - Securing data by converting it into a code.
- - Shared values and norms in the digital community.
- - Gathering and analyzing digital threat information.
- - Practices to maintain online safety and security.
- - Gap between those with and without access to technology.
- - Protection against cyber-related losses.
- - Study of human behavior in cyberspace.
- - Understanding of cyber threats and safety measures.
- - Malicious software that replicates itself.
- - Software designed to harm or infiltrate a system.
- - Promoting products or services online.
- - Programs and applications for computers.
- - Writing instructions for computers.
- - System of interconnected computers.
- - Potential dangers to digital systems.
- - Person raised in the digital age.
- - Knowledge of cyber risks and precautions.
- - Mobile phone with advanced capabilities.
- - Encoding data for secure transmission.
- - Right to control personal information.
- - Education on protecting against cyber threats.
- - Global network connecting computers worldwide.
- - Accountability for one's online actions.
- - Banking services conducted over the internet.
- - Unique name used to identify oneself online.
Down
- - Ethical behavior in the digital world.
- - Protection of sensitive information.
- - Investigation of cybercrimes.
- - Verification of a user's identity.
- - Ability to effectively use digital tools and technologies.
- - Harassment or intimidation online.
- - Barrier to block unauthorized access to a network.
- - Conflict conducted in the digital realm.
- - Deliberate exploitation of computer systems.
- - Protection of digital systems from cyber threats.
- - Internet-based currency for online transactions.
- - Platforms for online social interaction.
- - Representation of a person's online presence.
- - Fraudulent attempt to obtain sensitive information.
- - Individuals gaining unauthorized access to systems.
- - Unsolicited and often irrelevant messages.
- - Legal regulations governing cyberspace.
- - Responsible use of technology.
- - Electronic system for online financial transactions.
- footprint - Trail of data left by online activity.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Verification of a user's identity. • - Harassment or intimidation online. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
DIGITAL LITERACY and CYBER HYGIENE 2025-01-21
Across
- - Legal regulations governing cyberspace.
- - Programs and applications for computers.
- - Verification of a user's identity.
- - Electronic system for online financial transactions.
- - Shared values and norms in the digital community.
- - Platforms for online social interaction.
- - Criminal activities conducted via digital means.
- - Unique name used to identify oneself online.
- - Measures to protect against cyber attacks.
- - Ethical behavior in the digital world.
- - Protection of sensitive information.
- - Malicious software that replicates itself.
- footprint - Trail of data left by online activity.
- - Ability to effectively use digital tools and technologies.
- - Securing data by converting it into a code.
- - Fraudulent acquisition of someone's identity.
- - Barrier to block unauthorized access to a network.
- - Protection of digital systems from cyber threats.
- - Global network connecting computers worldwide.
- - Gap between those with and without access to technology.
- - Responsible use of technology.
- - Encoding data for secure transmission.
Down
- - Deliberate exploitation of computer systems.
- - Representation of a person's online presence.
- - Internet-based currency for online transactions.
- - Software designed to harm or infiltrate a system.
- - Right to control personal information.
- - Mobile phone with advanced capabilities.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Individuals gaining unauthorized access to systems.
- - Accountability for one's online actions.
- - Knowledge of cyber risks and precautions.
- - Potential dangers to digital systems.
- - Protection against cyber-related losses.
- - Harassment or intimidation online.
- - Study of human behavior in cyberspace.
- - Fraudulent attempt to obtain sensitive information.
- - Secret word or phrase to access a system.
- - Writing instructions for computers.
- - Conflict conducted in the digital realm.
- - Education on protecting against cyber threats.
- - Unsolicited and often irrelevant messages.
- - Gathering and analyzing digital threat information.
- - Understanding of cyber threats and safety measures.
- - System of interconnected computers.
- - Promoting products or services online.
- - Person raised in the digital age.
- - Practices to maintain online safety and security.
- - Rights related to digital content and technology.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Verification of a user's identity. • - Harassment or intimidation online. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
Cybersecurity 2018-08-02
Across
- CLI command to search for a pattern of letters
- Program used to collect cryptocurrency
- The telephone equivalent of phishing
- Protocol that WannaCry took advantage of
- First step in the cyber kill chain
- A compromised computer in a botnet
- Command to identify Ethernet devices
- Process security analysts use to search for advanced threats
- Resolve hostnames to IP addresses
- The second in the CIA triad
Down
- ... is the process of directing the company approach to security
- ... systems use physical characteristics to determine access
- The process of adding allowed programs to a list is called ...
- Testing technique using invalid or random data as input
- A weakness that can be exploited
- Specifies who gets access to what
- The process of reversing encoded data is ...
- The approach of using multiple layers of security
- Piece of forensic data identifying potential malicious activity
- Uses rules to allow or block traffic
20 Clues: The second in the CIA triad • A weakness that can be exploited • Specifies who gets access to what • Resolve hostnames to IP addresses • First step in the cyber kill chain • A compromised computer in a botnet • The telephone equivalent of phishing • Command to identify Ethernet devices • Uses rules to allow or block traffic • Program used to collect cryptocurrency • ...
CIS 178 Cybersecurity Participation 2023-04-20
Across
- Malware that demands payment
- Software that detects malware
- Criminal activity on computer systems
- secure website connection
- Successful cyber attack
- a software vulnerability
- a system weakness
- malicious digital activity
- data protection method
- fraudulent email technique
Down
- network security barrier
- a traffic overload cyberattack
- user identity verification
- computer infection
- secret access code
- unauthorized access
- harmful software program
- unsolicited email
- A network of infected computers
- physical trait recognition
20 Clues: unsolicited email • a system weakness • computer infection • secret access code • unauthorized access • data protection method • Successful cyber attack • network security barrier • harmful software program • a software vulnerability • secure website connection • user identity verification • physical trait recognition • malicious digital activity • fraudulent email technique • ...
Cyber Ethics 2025-06-14
Across
- – Moral principles that govern behavior
- – Monitoring someone online without consent
- – Unwanted or junk email
- – Online profile that represents a person
- – A person who harasses others on the internet
- – Common language used in email virus scams
- – Special characters used to strengthen passwords
- – Legal right protecting original work
- – Making private information known
- – Code of polite behavior on the internet
- – Malware that locks data until payment is made
Down
- – Measures to protect data from cyber threats
- – Set of moral principles in digital conduct
- – State of being unknown or unidentifiable online
- – Copying someone else's work without credit
- – Portable devices vulnerable to cyber threats
- – A person who gains unauthorized access to systems
- – Fraudulent attempt to get sensitive info
- – Software designed to harm or exploit a computer
- – Popular platform where cyberbullying can occur
20 Clues: – Unwanted or junk email • – Making private information known • – Legal right protecting original work • – Moral principles that govern behavior • – Online profile that represents a person • – Code of polite behavior on the internet • – Fraudulent attempt to get sensitive info • – Monitoring someone online without consent • – Common language used in email virus scams • ...
CBL World 2023-05-05
Across
- Your Cyber Security Partner
- Kidnapped & hold for ransom
- Burning walls, keep intruders away
- Most critical element in CyberSecurity
- Locked with a key, for data security
Down
- Weakness that can be exploited
- Make it strong, complex, and change frequently
- Plug and play your Apps on the cloud
- Assessed, Validated, and Certified
- Rhymes with fishing
- Vaccine for your systems
- Weakest link in CyberSecurity (Human factor)
12 Clues: Rhymes with fishing • Vaccine for your systems • Your Cyber Security Partner • Kidnapped & hold for ransom • Weakness that can be exploited • Assessed, Validated, and Certified • Burning walls, keep intruders away • Plug and play your Apps on the cloud • Locked with a key, for data security • Most critical element in CyberSecurity • Weakest link in CyberSecurity (Human factor) • ...
Generation & Suppliers Staff 2020-10-01
Across
- Hydrogen Generation
- Cyber Security
- Component Technical Issues
- Knows Access Code to Basement Door in White Flint
- Fuel Cycle Facilities
- DI&C
- Budget
- Dr. Casey’s Best Friend
- FOF Programs
- Reactor Oversight Process
- Helps Jerry with SAC; Marc with New Plants
- Suppliers
- Dry Used Fuel Storage
- Operator Licensing
- Accident Tolerant Fuels
- Physical Security Programs
- Engineering Processes and Programs
- Used Fuel Policy
- Fuel Supply and Trade
- Decommissioning
- FLEX
Down
- Research & Test Reactors
- Radiation Protection
- Codes and Standards
- Second License Renewal
- Sue's Go-to for Security Support
- Leader of the Pack
- Fire Protection
- NERC Issues
- Webinar Magician
- External Affairs
- Emergency Preparedness
- PHE Industry Coordination
- Part 53 Rulemaking
- New (matrix) addition to group
- Fitness for Duty
- Micro Reactors
- Flooding, Seismic and all acts of God
- PADS Oversight
39 Clues: DI&C • FLEX • Budget • Suppliers • NERC Issues • FOF Programs • Cyber Security • Micro Reactors • PADS Oversight • Fire Protection • Decommissioning • Webinar Magician • External Affairs • Fitness for Duty • Used Fuel Policy • Leader of the Pack • Part 53 Rulemaking • Operator Licensing • Hydrogen Generation • Codes and Standards • Radiation Protection • Fuel Cycle Facilities • Dry Used Fuel Storage • ...
Security Awareness Crossword 2024-09-29
Across
- Playing games of chance for money
- Relates to people security
- Measures used to secure a site
- Part of the SHEQS function
- Relates to IT security
- Used to mark a boundary
Down
- Deliberate act of destruction
- Malicious software designed to block computer access
- Secret word or phrase used to gain access to somewhere
- state of being comfortable, healthy and happy
10 Clues: Relates to IT security • Used to mark a boundary • Relates to people security • Part of the SHEQS function • Deliberate act of destruction • Measures used to secure a site • Playing games of chance for money • state of being comfortable, healthy and happy • Malicious software designed to block computer access • Secret word or phrase used to gain access to somewhere
Cabinet Departments 2022-11-14
Across
- safety vehicles, roads, USDOT, ODOT
- all legal matters, FBI, DEA, prisons
- USDA, farming, food, crop sales/distribution, economic development
- fair housing, housing planning
- terrorism, disasters, cyber security, border control, immigration
- healthcare, benefits for veterans
- trade, economy, industrial standards, gather data
Down
- schools, loans/grants
- unemployment, workplace safety, wage standards, employee rights
- public health, family services, adoption/foster, drug prevention
- federal lands, conservation, Native American territories, National Parks
- international relations, foreign policies
- production of currency, public debt, tax laws
- waste disposal, energy production, nuclear weapons
- military, national security
15 Clues: schools, loans/grants • military, national security • fair housing, housing planning • healthcare, benefits for veterans • safety vehicles, roads, USDOT, ODOT • all legal matters, FBI, DEA, prisons • international relations, foreign policies • production of currency, public debt, tax laws • trade, economy, industrial standards, gather data • ...
Security Awareness 2025 Crossword 2025-02-11
Across
- The purpose of this puzzle is to increase security______
- The loss of ID card, building access cards and compromise of passwords are examples of security _____ and must be reported
- Chief ____ Officer (CSO)
- Hacking is an example of a ____ attack
- Physical security focuses on the safeguarding of sensitive information/_______/facilities
- If a service contract contains a security _____, you must complete an SRCL
- The PGS contains eight security controls and three ____
- These emails are designed to deceive you into providing information
- It is important to regularly exercise your ______ continuity plans
- The current mandatory security awareness course, acronym
- Security in contracting refers to the procurement of goods or _____
- For reliability status, the screening process includes a ___ enforcement inquiry
- _____Information/assets have a potential for injury
- To be privy to certain information, you must have a ____ to know
Down
- Project/Security/ Contracting _____
- Malicious software designed to infiltrate or damage a computer system
- "I Luv Ch3eZ@L0T!" - for example
- Information categorized as ____ can only be processed in a high security zone
- All _____ must be issued temporary passes and escorted to access a GC site
- TBS' ____ on Government Security
- Security control #7, security event
- Reliability ____, the minimum security screening requirement within the Government of Canada
- Training hub for public servants, acronym
- By leaving the building during a Shelter-In-Place, you could put ______ in danger
- The Canadian telecommunications industry is an example of a ____function
- To email Protected B information, it must be_______
- One must ____ documents according to their level of sensitivity
- You must perform this evaluation to categorize your information/assets
- The A,B or C of information management security
- Reporting a security event helps mitigate_____
- A natural ____ is an example of a disruption to a critical function
31 Clues: Chief ____ Officer (CSO) • "I Luv Ch3eZ@L0T!" - for example • TBS' ____ on Government Security • Project/Security/ Contracting _____ • Security control #7, security event • Hacking is an example of a ____ attack • Training hub for public servants, acronym • Reporting a security event helps mitigate_____ • The A,B or C of information management security • ...
CYBER Crossword 2025-10-21
Across
- : The process of granting or denying specific requests to use resources or information systems.
- : A security mechanism requiring two or more independent credentials for authentication.
- : Fraudulent attempt (often by email) to obtain sensitive information by posing as a trustworthy entity.
- : A hidden or undocumented entry point in software or a system to bypass normal security controls.
- : A weakness in a system, design, implementation, or configuration that can be exploited.
- : Copies of data held in separate storage, used so systems can recover from failures, errors or attacks such as ransomware.
- : A network security device or software that monitors and controls incoming and outgoing network traffic based on rules.
- : Malicious software designed to damage or do unwanted actions on a computer system.
- : Knowledge about threat actors, their tools, tactics, and procedures, used to inform defensive actions.
- : A list of approved items (users, applications, IPs) that are granted access; everything else is typically denied by default.
- : An attack that disrupts normal traffic by overwhelming a target with requests.
- : An individual, group or organisation that has the intent and capability to carry out harmful cyber actions.
Down
- : The confirmed exposure of protected or sensitive information to an unauthorised party.
- : The ability of an organisation to continue operating and recover during or after a cyber-attack or incident.
- : A network of internet-connected devices infected by malware and controlled as a group without the owners’ knowledge.
- : A highly sophisticated cyber attack, often by a well-resourced adversary, aiming to remain undetected for a long period.
- : A threat posed by someone within the organisation, e.g., an employee, who uses their access (intentionally or unintentionally) to harm the organisation.
- : Verifying the identity of a user, process or device.
- : A record of events (who did what, when) used to support security monitoring and investigation.
- : The approval or permission for someone or something to perform an action.
- : The process of converting plaintext into ciphertext to prevent unauthorized access.
- : A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause undesired behaviour.
- : A vulnerability or exploit that is unknown to the vendor and has no patch available at time of attack.
23 Clues: : Verifying the identity of a user, process or device. • : The approval or permission for someone or something to perform an action. • : An attack that disrupts normal traffic by overwhelming a target with requests. • : Malicious software designed to damage or do unwanted actions on a computer system. • ...
Data Privacy and Cybersecurity 2022-08-15
Across
- This 2020 ballot initiative amended 2 down
- This type of document guides an organization's response after a data privacy and security incident
- A law firm that guides an organization through a data privacy and security incident
- A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
- This European Union law served as the basis for the creation of 2 down
- Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
- A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
- An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
- Number of comprehensive consumer privacy laws in the United States
- The United States' first state-specific consumer privacy law
- A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
- Unauthorized activity on an organization’s digital network
- The Advisen 2022 "Cyber Law Firm of the Year"
- This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"
14 Clues: This 2020 ballot initiative amended 2 down • The Advisen 2022 "Cyber Law Firm of the Year" • Unauthorized activity on an organization’s digital network • The United States' first state-specific consumer privacy law • Number of comprehensive consumer privacy laws in the United States • This year's Cybersecurity Awareness Month theme - "See ___ in Cyber" • ...
Plain Language Safety Code Alerts 2024-11-26
Across
- You found a suspicious package
- Person in cardiac/Respiratory arrest or needing medical assistance
- Disaster, incoming patient
- Security assistance needed for a hostage situation
- Severe Weather
- You observe fire or smoke
- A Cyber attack has occured on DCH's computer system
- Initiated to prevent combative or disruptive person from entering the building
- A Hazardous Arbonne Agent has been detected outside.
Down
- Only one unit needs to move patients out of their rooms into the hallway for safety.
- A Hazardous Material spill has occurred in the Hospital
- Missing person
- Security assistance needed for a violent person with a Gun
- Security Assistance Needed for a combative person
- Inpatient experiencing distress
15 Clues: Missing person • Severe Weather • You observe fire or smoke • Disaster, incoming patient • You found a suspicious package • Inpatient experiencing distress • Security Assistance Needed for a combative person • Security assistance needed for a hostage situation • A Cyber attack has occured on DCH's computer system • A Hazardous Arbonne Agent has been detected outside. • ...
CYBER SECURITY CHALLENGE 2024-11-21
14 Clues: Secure data • Virus remover • Protected data • Network shield • Security symbol • Computer threat • Data protection • Harmful software • Internet platform • Login requirement • Computer connection • Unauthorized access • Computer information • Programmer's language
CYBER SECURITY CHALLENGE 2024-11-21
14 Clues: Secure data • Virus remover • Protected data • Network shield • Computer threat • Security symbol • Data protection • Harmful software • Internet platform • Login requirement • Unauthorized access • Computer connection • Computer information • Programmer's language
Crossword 2023-03-14
Across
- Acronym for chief information security officer
- A cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed
- Antigen ______ Defense
- _____ Response Consulting
- Your Antigen resource for your licensing needs
- Cyber Risk _______
Down
- Antigen Security's partner for insurance carriers
- Antigen Security's partner for insurance brokers
- Acronym for digital forensics & incident response
- The possibility of a malicious attempt to damage or disrupt a computer network or system.
- Managed ______ Providers
11 Clues: Cyber Risk _______ • Antigen ______ Defense • Managed ______ Providers • _____ Response Consulting • Acronym for chief information security officer • Your Antigen resource for your licensing needs • Antigen Security's partner for insurance brokers • Antigen Security's partner for insurance carriers • Acronym for digital forensics & incident response • ...
KICT Crossword Puzzle 2022-07-20
Across
- / KICT Flagship
- / Undergraduate Student Societies
- / KICT was established in _____ 2001
- / Undergraduate Programme
- / Postgraduate Programme
- / Code to _____
- / A Department at KICT
Down
- / Centre of Excellence for Cyber Security
- / Postgraduate Student Societies
- Digital Education / KICT Flagship
- / KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
- / KICT Robe Colour
- Sejahtera / KICT Flagship
- / Postgraduate Programme
- / KICT International Journal
15 Clues: / KICT Flagship • / Code to _____ • / KICT Robe Colour • / A Department at KICT • / Postgraduate Programme • / Postgraduate Programme • / Undergraduate Programme • Sejahtera / KICT Flagship • / KICT International Journal • / Postgraduate Student Societies • / Undergraduate Student Societies • Digital Education / KICT Flagship • ...
Cyber Security 2022-06-08
Across
- A tool used to mask your online identity by redirecting and encrypting your data before it is sent
- An attack that aims to make a service or website unusable by 'flooding' it with malicious traffic
- Malware that locks data and encrypts it to commit fraud
- Malware that gathers information from a person or company by violating privacy
Down
- Gathers sensitive information that involves both social engineering and email
- Malware that infects devices with multiple, intrusive, ads
- Malware that infects and spreads with files and links together with social engineering
- Infects devices through suspicious files and links
- Works like a virus, but can infect devices on it's own and through software vulnerabilities
9 Clues: Infects devices through suspicious files and links • Malware that locks data and encrypts it to commit fraud • Malware that infects devices with multiple, intrusive, ads • Gathers sensitive information that involves both social engineering and email • Malware that gathers information from a person or company by violating privacy • ...
Cyber Security 2021-03-30
9 Clues: Private • Fake emails • Only for you • Attached to a file • Needs to be downloaded • An extra layer of protection • A code that protects your account • Uses vulnerabilities to get access • An illegal way of accessing your device
Cyber Security 2023-10-27
Across
- A trail of data left behind online
- Having a duty to deal with something
- Browser
- How our online information should be
Down
- Saying hurtful things to someone online
- Helps protect your information
- Intended to be kept secret
- Machinery, computers and telecommunication
- What you connect to, to access online servers
9 Clues: Browser • Intended to be kept secret • Helps protect your information • A trail of data left behind online • Having a duty to deal with something • How our online information should be • Saying hurtful things to someone online • Machinery, computers and telecommunication • What you connect to, to access online servers
cyber security 2023-04-21
Across
- Looking at someone's information over their shoulder.
- Stimuli that has meaningful context.
- software designed to interfere with a computer's normal functioning.
- Inventing a scenario to engage with victim.
- A person who breaks into computers to gain unauthorized access to information.
Down
- malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
- malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
- Information that relates to an individual.
- Efficient information that was translated.
9 Clues: Stimuli that has meaningful context. • Information that relates to an individual. • Efficient information that was translated. • Inventing a scenario to engage with victim. • Looking at someone's information over their shoulder. • software designed to interfere with a computer's normal functioning. • ...
Cyber Security 2025-04-29
9 Clues: Betrug • Suchti • gibt es sehr viele • Wo findet alles statt? • Verdient man durchs arbeiten • Andere Leute ärgern und ausschließen • Dort mit fremden Nutzern austauschen • Schmiert man auf brot und schmeckt gut • wenn man sich als andere person ausgibt um Leuten eine Falle zu stellen
Cyber Security Crossword 2021-02-12
Across
- and gathers information on a
- can be a worm virus or trojan
- a person how uses computers to get
- access to information and data.
- a specific type of computer virus that
- how they use their computer
Down
- malicious form of self-replicating software
- a type of virus and worm that carries
- a specific type of attack
- unwanted software that
- Set of symbols/numbers/letters which is
- information processed or stored by a
- to access an account
- you into downloading it onto your
14 Clues: to access an account • unwanted software that • a specific type of attack • how they use their computer • and gathers information on a • can be a worm virus or trojan • access to information and data. • you into downloading it onto your • a person how uses computers to get • information processed or stored by a • a type of virus and worm that carries • ...
Cyber Security 2023-04-04
Across
- malware that can encrypt your files and demand payment in exchange for the decryption key
- is often sent as an email to trick you into giving you your personal information.
- type of malware that can secretly gather information about your online activity
Down
- malware that disguises itself as a legitimate program or file, but it has a malicious purpose
- similar to a virus in that it can replicate and spread from one computer to another, but it doesn't need to attach itself to files or programs
- a program that monitors the traffic coming in and out of your device
- a program that protects your computer from malware
- can spread from one computer to another by attaching itself to files or programs
- malicious software designed to cause harm to your device
9 Clues: a program that protects your computer from malware • malicious software designed to cause harm to your device • a program that monitors the traffic coming in and out of your device • type of malware that can secretly gather information about your online activity • can spread from one computer to another by attaching itself to files or programs • ...
cyber security 2022-10-21
cyber security 2022-10-21
Cyber Security 2022-10-13
Across
- A cybercrime that uses the phone to steal confidential data.
- When you swipe your access card, beware of persons nearby who may try __________.
- protector This helps protect your screen from shoulder surfing.
- Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
- This network security device sits at the edge of your network and governs access.
- This software is installed on your computer to protect it from viruses and malware.
- A network of computers infected by malware and that are under the control of a single attacking party.
- A person who uses computers to gain unauthorized access to data.
- Computer software with malicious intent.
9 Clues: Computer software with malicious intent. • A cybercrime that uses the phone to steal confidential data. • protector This helps protect your screen from shoulder surfing. • A person who uses computers to gain unauthorized access to data. • This network security device sits at the edge of your network and governs access. • ...
Cyber Security 2024-12-26
Across
- A sequence of characters or words to keep your account safe
- A program that detect and remove virus
- Nasty software that can have a bad impact on your device
- Unwanted emails or messages
Down
- A location on the internet where you can save your data
- The program you use to access the Internet like chrome or Firefox
- Getting into other's computer without their permission
- Legal Aid to fight against Cyber Crimes
- A copy of your data stored somewhere else.
9 Clues: Unwanted emails or messages • A program that detect and remove virus • Legal Aid to fight against Cyber Crimes • A copy of your data stored somewhere else. • A location on the internet where you can save your data • Nasty software that can have a bad impact on your device • Getting into other's computer without their permission • ...
cyber security 2017-06-30
Across
- IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE
- IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE
- ITS A TYPE OF CREATURE THAT WRIGGLES
- RISKS IT IS EASILY ACCESSIBLE AND CAN BE A DANGEROUS PLACE WHERE THERE ARE PREDATORS,CYBER CRIMANALS AND BULLIES
Down
- IT IS SHORT FOR "MALICIOUS SOFTWARE"
- IS A PROGRAM OR A PIECE OF CODE THAT IS LOADED ONTO YOUR COMPUTER WITHOUT YOUR KNOWLEDGE
- BLOCKS ACCESS FROM THE VICTIMS DATA
- ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE
- IT IS THE TERM USED BY THE ANCIENT GREEK STORY OF THE WOODEN HORSE THAT WAS USED TO HELP GREEK TROOPS
9 Clues: BLOCKS ACCESS FROM THE VICTIMS DATA • IT IS SHORT FOR "MALICIOUS SOFTWARE" • ITS A TYPE OF CREATURE THAT WRIGGLES • IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE • IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE • ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE • ...
Cyber Security 2021-10-29
Across
- Malicious software that infects a user's computer and changes how is operates
- User's data is held hostage until a payment is made
- Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
- Hidden software that records a user's information secretly for a third-party
- The practice of protecting internet-connected systems from digital attacks
- A an email disguised as a legitimate source that tricks users into offering up personal information
Down
- Is protecting of information from malicious damage and unauthorized access
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A form of malware that is self-replicating infecting a computer and can spread across its network
9 Clues: User's data is held hostage until a payment is made • Is protecting of information from malicious damage and unauthorized access • The practice of protecting internet-connected systems from digital attacks • Hidden software that records a user's information secretly for a third-party • ...
Cyber Security 2021-11-05
Across
- a secret word or phrase that must be used to gain admission to a place
- physical characteristics that can be used to identify individuals
- looking at someone's information over their shoulder
- a type of malicious code or program written to alter the way a computer operates
Down
- an identification used by a person with access to a computer, network, or online service
- randomly generated sequence of letters or numbers that appear as a distorted image, and a text box
- a type of malware that spreads copies of itself from computer to computer
- persuade someone in a clever or slightly dishonest way to allow you to do something or to give you something
- type of scam where criminals impersonate someone via email or messages
9 Clues: looking at someone's information over their shoulder • physical characteristics that can be used to identify individuals • a secret word or phrase that must be used to gain admission to a place • type of scam where criminals impersonate someone via email or messages • a type of malware that spreads copies of itself from computer to computer • ...
Cyber Security 2024-02-05
Across
- The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- Gaining unauthorised access to or control of a computer system.
- An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
- An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
- A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- This is a form of attack that makes multiple attempts to discover something (such as a password).
- This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
9 Clues: Gaining unauthorised access to or control of a computer system. • This is a form of attack that makes multiple attempts to discover something (such as a password). • An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder. • ...
Cyber Security 2024-10-09
Across
- When data is transformed into a format that is unreadable without a decryption key
- Software designed to harm or exploit any programmable device, service, or network
- Someone who tests system security by trying to find vulnerabilities
- Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
- A security measure that uses a combination of letters, numbers, and symbols to protect accounts
- A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
- A weak spot in a system’s security defenses
- Malicious software that locks a user’s files and demands a ransom to restore access
- A process used to verify a user’s identity, typically through passwords or biometrics
9 Clues: A weak spot in a system’s security defenses • Someone who tests system security by trying to find vulnerabilities • Software designed to harm or exploit any programmable device, service, or network • When data is transformed into a format that is unreadable without a decryption key • ...
cyber security 2022-10-21
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Digitech Cyber Security 2024-08-19
Across
- The practice and study of techniques for secure communication
- - A simple substitution cipher named after a Roman leader
- A cipher that uses symbols instead of letters
- - A harmful software program
- A one-way function used for integrity checks
- The result of encryption
- A type of encryption where two different keys are used
- A type of encryption where the same key is used
Down
- - Ensuring that information is only accessible to those authorized
- - The unencrypted message
- - A cipher that uses multiple substitution alphabets
- - A key kept secret in asymmetric encryption
- A famous WWII machine used for encryption
- An early cipher used by the Spartans
14 Clues: The result of encryption • - The unencrypted message • - A harmful software program • An early cipher used by the Spartans • A famous WWII machine used for encryption • - A key kept secret in asymmetric encryption • A one-way function used for integrity checks • A cipher that uses symbols instead of letters • A type of encryption where the same key is used • ...
Cyber Security Revision 2024-09-19
Across
- A small program designed to cause damage.
- A security method where a code is sent to a phone or email to verify someone's identity.
- Type of hacker who hacks illegally, usually to make money.
- Part of the Internet that is behind passwords, etc.
- Type of hacker who hacks legally.
- Software used to remove viruses.
- Type of hacker who hacks illegally but for the greater good.
Down
- A hacking method, often using email, that tricks people into entering details such as passwords.
- What hackers use to trick people into giving personal details.
- Using someone's personal details to pretend to be them, often to take out loans, etc.
- Part of the Internet accessed using a search engine.
- Part of the Internet that often contains illegal content.
- Software used to gain illegal access to a computer system.
- Unwanted email, often associated with phishing.
14 Clues: Software used to remove viruses. • Type of hacker who hacks legally. • A small program designed to cause damage. • Unwanted email, often associated with phishing. • Part of the Internet that is behind passwords, etc. • Part of the Internet accessed using a search engine. • Part of the Internet that often contains illegal content. • ...
FITAVocab.TC 2013-05-16
Across
- programs that you can download
- ethical uses of or on a computer or the web
- circuit board
- something that shows off a a business and shows people what it is about
- crediting a persons work
- extra docking system
- the security of or on a computer
- a paid internet access
- central processing unit
- a companies "slogan"
- a type of layout
- a format of a program on your computer
- a combination of many search engines
- a program that allows you to create documents
- the thing at the top of the screen
- a port to get wifi
- storing space
- liquid crystal display
- an illegal way of taking credit for somebody's invention
- light emitting diode
- National Cyber Security Alliance
- what you have on you desktop already
Down
- a term that describes safety o the computer or on the web
- decision tool
- a place where you can virtually go and search on the web
- a system that allows you to connect to other peoples devices over wifi or cellular data
- cd port
- an adjective that describes cyber in a way that is someway pixel ly
- the old fashion watch "not digital"
- things that you can buy to play or enjoy on
- confusing
- a term that describes the web and computers
- a virtually folder where you can save your documents, files
- your work
- a user that is online
- a device that can go anywhere
- a thing of the computer that allows you to move around on the screen or click
- memory card
38 Clues: cd port • confusing • your work • memory card • decision tool • circuit board • storing space • a type of layout • a port to get wifi • extra docking system • a companies "slogan" • light emitting diode • a user that is online • a paid internet access • liquid crystal display • central processing unit • crediting a persons work • a device that can go anywhere • programs that you can download • ...
1 2025-03-01
Across
- Audio talk show
- Exercise and health
- Natural food label
- Fully present mentally
- New business venture
- Virtual world experience
- Rising prices
- Reduce waste
- Independent work style
- Online order arrival
- Secure digital ledger
- Healthy eating science
Down
- Security key
- Mysterious or puzzling
- Travel for leisure
- Watching online content
- Always traveling
- Internet-related
- Battery-powered cars
- Advanced computing field
- Relaxing getaway
- No cables needed
- Not naturally made
- Disease prevention shot
- Earth's weather patterns
25 Clues: Security key • Reduce waste • Rising prices • Audio talk show • Always traveling • Internet-related • Relaxing getaway • No cables needed • Travel for leisure • Natural food label • Not naturally made • Exercise and health • New business venture • Battery-powered cars • Online order arrival • Secure digital ledger • Mysterious or puzzling • Fully present mentally • Independent work style • ...
Cyber safety Evie Williams 2016-06-08
Across
- crime any internet
- something that stops people getting on your computer
- this word is the opposite of dangerous,
- A ringer on your computer when someone is trying to get on
- any software to prevent crimes online
- a type of bullying
- something that will stop viruses getting on your computer
- a code so people don't get on to your device
- mail that is not wanted
- a hostile strongly worded message that may contain obscene language
- the name a user selects to be identified on a computer or a network
- don't believe what someone says
- do not say rude words online,
Down
- a piece of information about your visit to a website that some websites record automatically on your computer,
- information about someone
- a computer cold
- something that should not be shared
- a person who takes over someone's device
- room a location online that allows multiple users to communicate electronically with each other in real time,
- a form of malicous displays unsolicited advertising on your computer
- a type of stalking
- at tracking feature of Internet browsers that shows all the recent websites visited
- Internet games that intensionly cause problems or cyber bullying other games
- tag the nickname the user has chosen to be identified by when playing internet games,
- to copy a file from one computer system
- a way to make money by deceiving people
26 Clues: a computer cold • crime any internet • a type of stalking • a type of bullying • mail that is not wanted • information about someone • do not say rude words online, • don't believe what someone says • something that should not be shared • any software to prevent crimes online • this word is the opposite of dangerous, • to copy a file from one computer system • ...
RU ITEC411: Crime and Security. 2024-11-25
Across
- Traveling to sue under strict libel laws in certain countries.
- Malicious software designed to gather user information without consent.
- The process of encoding information to prevent unauthorized access.
- Denial-of-service attack that disrupts online services.
- The use of someone else's personal information for fraud
- A security tool used to filter and monitor network traffic.
- Using hacking to promote a political cause.
- Phishing attacks carried out via voice calls.
- Fraudulent attempts to obtain sensitive information via email.
- Hackers who improve system security by identifying vulnerabilities.
- A security tool to lure and study hackers.
Down
- Security measures using unique biological characteristics
- Measures taken to protect computer systems from cyber attacks.
- A sophisticated worm that targeted Iranian nuclear facilities
- Manipulating individuals to divulge confidential information.
- An organization that addresses trade agreements, including cross-border digital issues.
- Phishing attacks carried out via SMS.
- The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
- Unauthorized access to or manipulation of computer systems.
- Redirecting users to fraudulent websites to steal personal data.
20 Clues: Phishing attacks carried out via SMS. • A security tool to lure and study hackers. • Using hacking to promote a political cause. • Phishing attacks carried out via voice calls. • Denial-of-service attack that disrupts online services. • The use of someone else's personal information for fraud • Security measures using unique biological characteristics • ...
Security 2019-04-26
Across
- Country to which the taking of a Babcock IT Asset is prohibited
- A word or phrase used to access your PC / Phone
- A potential external threat either to an individual or Babcock
- A person closely following an employee into an area or through a barrier without showing a security pass
- Data ********* allows you to directly request access to shared folders
- A PED Zone Colours
- We all signed this as part of our contract Official ******* Act
- One of the mandatory Babcock training models ***** Security Awareness
Down
- Babcock IT system can be red, blue or white
- A loss or compromise of classified information will result in this being raised
- Complete the Designator (NNPPI) – Naval Nuclear ********** Programme Information
- A way to dispose of information securely
- Security Response Level displayed on the entrance gates
- Surname of the Submarine Business Unit Security BSM
- One of the recognised Classification Marking
- Method of ensuring good practice, governance adherence to procedures
- Email Scam stealing personal / business information
- A computer virus
18 Clues: A computer virus • A PED Zone Colours • A way to dispose of information securely • Babcock IT system can be red, blue or white • One of the recognised Classification Marking • A word or phrase used to access your PC / Phone • Surname of the Submarine Business Unit Security BSM • Email Scam stealing personal / business information • ...
Security Awareness Crossword 2023-11-17
Across
- This item must be worn whilst on site or in the office
- Government checks carried out to confirm trustowrthiness
- The branch of security that protects online threats
- The branch of security that protects hardware
- This agency regulates our security arrangements.
- The branch of security concerning people
- A sign that something may be troubling a colleague
Down
- A technique for attempting to acquire information
- The information marking permitted on Cyclife servers
- legal substance that can affect decision making
- This briefing is given if you are visiting a country where the FIS operate
- You must do this to your screen when you walk away from your laptop
- Substances that can affect the way the body functions
- Person required when a visitor is on site
- The '_ _ _ _' to know principal should be applied when sharing sensitive information
15 Clues: The branch of security concerning people • Person required when a visitor is on site • The branch of security that protects hardware • legal substance that can affect decision making • This agency regulates our security arrangements. • A technique for attempting to acquire information • A sign that something may be troubling a colleague • ...
Cyber Security 2022-09-14
Across
- software that is in a constant state of updating. intended to be convenient to the user and meant to disrupt hackers
- hacking with malicious intent. typically to gain access to a computer and steal as much data as possible
- software that automatically displays material when a user offline
- an attack that disrupts the service to waste time, effort, and money
- hacking that is meant to do minimal damage and is usually done out of curiosity
Down
- an internet traffic filter meant to stop unauthorized incoming and outgoing traffic
- the core of a computer's operating system that houses the most essential functions of the computer
- the physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception
9 Clues: software that automatically displays material when a user offline • an attack that disrupts the service to waste time, effort, and money • hacking that is meant to do minimal damage and is usually done out of curiosity • an internet traffic filter meant to stop unauthorized incoming and outgoing traffic • ...
cyber security 2022-10-21
Cyber Security 2023-06-13
Across
- Verifying the identity of a user, process or device before allowing access to resources in a system.
- The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
- Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
- engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
- A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
- A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
- A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
- Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
- A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).
9 Clues: Verifying the identity of a user, process or device before allowing access to resources in a system. • Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people. • engineering The methods used to manipulate people into carrying out specific actions, or divulging information. • ...
cyber security 2024-10-09
Across
- a communication method that uses electronic devices to deliver messages across computer networks
- never share your private
- always have a secure
- a symbol, word, or words legally registered or established by use as representing a company or product.
- a website or app almost always has access to your personal
- a person who uses computers to gain unauthorized access to data
Down
- never use somebody elses legal right to print, publish, perform, film, or record literary, artistic, or musical material,or you will be
- the information about a particular person that exists on the internet as a result of their online activity
- never click on sketchy
- when creating username never use your real
10 Clues: always have a secure • never click on sketchy • never share your private • when creating username never use your real • a website or app almost always has access to your personal • a person who uses computers to gain unauthorized access to data • a communication method that uses electronic devices to deliver messages across computer networks • ...
cyber security 2022-10-21
Cyber security 2022-11-28
Across
- - replicate themselves but do not attach themselves to files as a virus does.
- engineering - another word for phishing
- - locks a computer, encrypts files, and therefore prevents the user from being able to access the data
- - unwanted software that monitors and gathers information on a person and how they use their computer
Down
- - software that is designed to gain access to your computer with malicious intent
- - a large collection of malware-infected devices
- - will replicate itself by maliciously modifying other computer programs and inserting code
- - a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions
- - any device connected to a network
9 Clues: - any device connected to a network • engineering - another word for phishing • - a large collection of malware-infected devices • - replicate themselves but do not attach themselves to files as a virus does. • - software that is designed to gain access to your computer with malicious intent • ...
Cyber Security 2023-09-14
Across
- Disrupt, damage, or gain unauthorized access to a computer system
- Fake rental properties posted online
- Negative behavior inflicted online
- Victims fall for recruiting emails and receive a bogus bank check, which they deposit and use for "mystery" shopping
Down
- The Recipient has not granted or verified permission for a message to be sent
- Data left behind on the internet
- A combination of uppercase letters, lowercase letters, numbers, and symbols
- Public area offering WIFI access
- Watch for spelling mistakes, and email addresses as they can easily be misrepresented
9 Clues: Data left behind on the internet • Public area offering WIFI access • Negative behavior inflicted online • Fake rental properties posted online • Disrupt, damage, or gain unauthorized access to a computer system • A combination of uppercase letters, lowercase letters, numbers, and symbols • ...
CYBER SECURITY 2024-05-11
CYBER SECURITY 2024-05-11
Across
- _____ emel adalah emel yang tidak diingini yang sering masuk ke peti masuk e-mel anda, sering kali mengganggu dan tidak diundang
- Teknik penipuan dalam talian yang menggunakan e-mel atau laman web palsu untuk mendapatkan maklumat peribadi dari mangsanya
- Salah satu perisian berbahaya yang mengunci akses kepada data mangsa dan meminta tebusan untuk membebaskannya
- Salah satu jenayah siber berkait rapat dengan media sosial
- _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital
- salah satu bentuk penipuan atas talian
Down
- Program berbahaya yang diselitkan ke dalam sistem komputer tanpa izin, bertujuan untuk mencuri data
- Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer
- Salah satu jenayah siber yang menggunakan kecerdasan buatan (AI) untuk mencipta video palsu yang sukar dibezakan dari yang sebenar
9 Clues: salah satu bentuk penipuan atas talian • Salah satu jenayah siber berkait rapat dengan media sosial • _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital • Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer • ...
Cyber Security 2024-10-09
Across
- When data is transformed into a format that is unreadable without a decryption key
- Software designed to harm or exploit any programmable device, service, or network
- Someone who tests system security by trying to find vulnerabilities
- Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
- A security measure that uses a combination of letters, numbers, and symbols to protect accounts
- A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
- A weak spot in a system’s security defenses
- Malicious software that locks a user’s files and demands a ransom to restore access
- A process used to verify a user’s identity, typically through passwords or biometrics
9 Clues: A weak spot in a system’s security defenses • Someone who tests system security by trying to find vulnerabilities • Software designed to harm or exploit any programmable device, service, or network • When data is transformed into a format that is unreadable without a decryption key • ...
Cyber Security 2024-11-13
Across
- An unauthorised user who attempts to or gain access to a network
- A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
- Securing your online accounts with an extra layer of protection is called ____________________ authentication
- Computer programs that can block, detect, and remove viruses and other malware
Down
- A mechanism to create a secure connection between a computer and the network
- The unauthorised disclosure or unwanted exposure of confidential information
- The protection of digital information, as well as the integrity of the infrastructure
- Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
- Faking the sender’s email address to gain access to a secure network
9 Clues: An unauthorised user who attempts to or gain access to a network • Faking the sender’s email address to gain access to a secure network • A mechanism to create a secure connection between a computer and the network • The unauthorised disclosure or unwanted exposure of confidential information • ...
Cybersecurity Crossword Puzzle 2023-09-11
Across
- - Refers to a revision or improvement made to a software program or system in order to fix bugs, enhance features, or patch security vulnerabilities.
- - The prefix "cyber" relates to computers, digital technology, and the internet. It frequently appears in contexts related to cybersecurity and cyber-related terms.
- - Ensuring its safety and protecting it from threats, risks, or vulnerabilities. In the realm of cybersecurity, it often entails safeguarding assets and data.
- - In cybersecurity, the term "spoofed" is used to describe the act of fabricating or deceiving information or the origin of data.
- - Short for advertisements, are messages or content created to promote products, services, or ideas.
- - DomainKeys Identified Mail (DKIM) is another method of email authentication. It allows recipients to verify if an email was genuinely sent from the claimed domain and authorized by it.
- - The process of converting information or data into code to prevent access or protect it from being read by anyone without the decryption key.
- - Verification.
- - To restore.
Down
- - A password is a combination of letters, numbers, and symbols that grants access to a computer system, account, or digital resource.
- - A type of coverage that businesses obtain to protect themselves against losses and liabilities resulting from cyberattacks and data breaches.
- - Sender Policy Framework is an email authentication protocol that helps prevent email spoofing by verifying if the sending mail server has permission to send emails on behalf of a domain.
- - An organized method or collection of recommendations for implementing security measures and protocols aimed at safeguarding an organization's assets.
- - Which stands for Domain-based Message Authentication, Reporting, and Conformance, is a protocol used for email authentication and reporting. Its primary purpose is to assist organizations in safeguarding their email domains against misuse in email spoofing attacks.
- - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry.
- - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.
- - Email is a used method of exchanging messages over the internet. It serves as a communication tool for both business purposes.
- DRIVE - A portable device used for storing and transferring data between computers. It relies on flash memory technology.
- - Refers to a fraudulent scheme intended to deceive individuals or organizations into providing money, personal information, or other valuable assets.
- - When a computer or device is infected, it means that it has been compromised by malware or a virus. This can disrupt its functioning and lead to data theft.
20 Clues: - To restore. • - Verification. • - Short for advertisements, are messages or content created to promote products, services, or ideas. • - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer. • - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry. • ...
Information Security Crossword Puzzle 2023-04-28
Across
- ILoveYou123, 123456, and P@ssw0rd are all this.
- Keeps out most attacks and is both human and machine.
- The amount of systems that should have the same username and password.
- The most effective tool to thwart cyber attacks.
- These employees are part of the information security team.
- It is 100% secure.
- When anything seems strange.
- What to do with sensitive information before sending.
Down
- Software that is designed to do terrible things.
- Weakest link in the security chain.
- Anything suspicious raises these.
- You should only use our computers for this.
- An attempt to get you to let an attacker do their thing.
- A legal source of information that has private material.
- The first step in information security awareness is being about to do this with security threats.
- It's okay to trust, but you should also do this.
16 Clues: It is 100% secure. • When anything seems strange. • Anything suspicious raises these. • Weakest link in the security chain. • You should only use our computers for this. • ILoveYou123, 123456, and P@ssw0rd are all this. • Software that is designed to do terrible things. • The most effective tool to thwart cyber attacks. • It's okay to trust, but you should also do this. • ...
KICT Crossword Puzzle 2022-07-20
Across
- Undergraduate Programme
- Postgraduate Programme
- KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
- KICT International Journal
- KICT Flagship
- A Department at KICT
- KICT Flagship
Down
- KICT Flagship
- Postgraduate Programme
- KICT Robe Colour
- KICT was established in _____ 2001
- Code to _____
- Undergraduate Student Societies
- Postgraduate Student Societies
- Centre of Excellence for Cyber Security
15 Clues: KICT Flagship • Code to _____ • KICT Flagship • KICT Flagship • KICT Robe Colour • A Department at KICT • Postgraduate Programme • Postgraduate Programme • Undergraduate Programme • KICT International Journal • Postgraduate Student Societies • Undergraduate Student Societies • KICT was established in _____ 2001 • Centre of Excellence for Cyber Security • ...
CISO Crossword Quiz - 2225 2025-08-02
Across
- Which secured number is not required for receiving money through UPI?
- What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
- What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
- What disguised link leads to a malicious webpage?
Down
- What method uses a QR code to lead users to fake webpage/payment sites?
- What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
- What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
- What should be strong and unique to protect your online accounts?
- What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
- What attack tricks people into clicking something different than they think?
10 Clues: What disguised link leads to a malicious webpage? • What should be strong and unique to protect your online accounts? • Which secured number is not required for receiving money through UPI? • What method uses a QR code to lead users to fake webpage/payment sites? • What attack tricks people into clicking something different than they think? • ...
RCAL Cipher Challenge August 2024-08-19
Compliance Crossword 2022-08-29
Across
- Accessing PHI without a _______ business reason is a HIPAA violation.
- Type of email used to send sensitive information
- All IPMG employee-owners have an ________ to report HIPAA violations
- Number of PHI direct identifiers
- The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
- Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
- When should a HIPAA violation be reported?
- Required when connecting device to a public network
- Malicious emails used to trick people into sharing login information
- Type of disposal of paper records that is a HIPAA violation
Down
- Staff can report compliance concerns without fear of _________.
- Where I can search for documents and other useful information related to compliance
- IPMG Manual to review cyber security requirements
- The company with six titles of Best Places to Work in Indiana
- You should always lock this when leaving unattended
- The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
- The name of the Corporate Compliance Manager
- Who to report HIPAA violations to, aside from the Corporate Compliance Manager
- The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
- Only ______ applications can be used to conduct IPMG business
20 Clues: Number of PHI direct identifiers • When should a HIPAA violation be reported? • The name of the Corporate Compliance Manager • Type of email used to send sensitive information • IPMG Manual to review cyber security requirements • You should always lock this when leaving unattended • Required when connecting device to a public network • ...
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
AI-Driven Cybersecurity 2026-03-30
Across
- Secure data coding
- AI that creates content
- Data changes that fool AI
- Harmful software
- Finding hidden attacks
- AI trained on text data
- AI that learns from data
- Handling cyber attacks
Down
- Network security barrier
- Controlled infected network
- Email scam attack
- Autonomous AI system
- Malware that locks files
- Protects online systems
- AI neural network model
15 Clues: Harmful software • Email scam attack • Secure data coding • Autonomous AI system • Finding hidden attacks • Handling cyber attacks • AI that creates content • AI trained on text data • Protects online systems • AI neural network model • Network security barrier • Malware that locks files • AI that learns from data • Data changes that fool AI • Controlled infected network
Cyber Security word search 2022-09-12
Across
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- a form of electronic cash
- A malicious threat to a group or organization that comes from someone within
- A secret word or phrase that is used to access a computer system or service.
- An internet traffic filter meant to stop unauthorized incoming.
- A language used to create and control the content on a website
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- it allows you to create a secure connection to another network using the internet.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
- Code that is embedded into the hardware of a computer.
- A form of malicious software that disguises itself as a harmless computer program
- The core of a computer’s operating system that houses the most essential functions of the computer.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- Confirmation of someone's identity, either using a password or a fingerprint.
- Creating a fake identity on a social network account
- An error, flaw, failure in a computer program
- is the string of numbers used to identify each computer using the internet on a network.
- Customizable additions to software for extra functionality.
21 Clues: a form of electronic cash • An error, flaw, failure in a computer program • Creating a fake identity on a social network account • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality. • A language used to create and control the content on a website • ...
C for Cyber Security 2022-10-10
Across
- A fraudulent email purportedly from a reputable company attempting to get personal information
- Something personal to you and should never be shared
- A malicious software designed to block access to a computer system until a sum of money is paid
- The process of identifying a user’s identity
- The process of taking plain text and scrambling it into an unreadable format
- A combination of the words “robot” and “network”
- A piece of software or application that displays advertisements on your computer
- A piece of hardware or software, used to keep intruders out
- An icon displayed along a web browser URL; indicates a secure mode
- the address of a website; check its validity before clicking on it
- Unauthorized access to a network, information systems or application
- Alert / Always on the lookout
Down
- A sequence of words or text used to control access to a computer; similar to a password
- A form of malware used by hackers to spy on you and your computer activities
- A flaw or weakness in a computer system that could be exploited to violate the system’s security
- Threatening behavior facilitated through electronic means such as texting
- In addition to passwords; provides better security
- Facebook, Twitter, Instagram etc. (Two Words)
- When a hacker changes source of an email so that it seems to come from a trusted source
- harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
20 Clues: Alert / Always on the lookout • The process of identifying a user’s identity • Facebook, Twitter, Instagram etc. (Two Words) • A combination of the words “robot” and “network” • In addition to passwords; provides better security • Something personal to you and should never be shared • A piece of hardware or software, used to keep intruders out • ...
Cyber Security Crossword Puzzle 2023-09-09
Across
- information
- used to navigate through the web
- verifies that the severs address matches the "from" address you see
- the action of verifying the identity of a user
- a device that sends packets to a computers network
- An encrypted connection over the internet from a device to a network
- tells other servers which servers are allowed to send emails using your business's domain name
- puts a digital signature on outgoing mail so servers can verify that an email from your domain actually was sent from your organization’s servers
- software designed to block access to a computer system until a sum of money is paid
- a piece of code cable of copying itself and spreading through a computer system
Down
- software that is designed to disrupt or damage anything in a computer system
- when software or data can be access through unauthorized personnel
- restricted access to something
- protect information by turning it into code
- A persons whos job is to sell things for the company
- the programs and operating information used by a computer
- To imitate something or trick someone
- usually in the form of emails, it is used to gain personal information by posing as well known companies
- interactive parts that work together to exchange information
- software designed to destroy computer viruses
20 Clues: information • restricted access to something • used to navigate through the web • To imitate something or trick someone • protect information by turning it into code • software designed to destroy computer viruses • the action of verifying the identity of a user • a device that sends packets to a computers network • A persons whos job is to sell things for the company • ...
Introduction to Cyber Security 2023-09-10
Across
- A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
- A component of a computer system that prevents unauthorized data access.
- a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
- A software update or repair published by developers to correct security flaws or enhance system performance.
- When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
- unwanted email messages
- Computer program that is used to provide customized adverts
- a field in which computers and networks are employed
- An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
- To imitate a character, users exploit internet platforms to acquire access or personal information.
- Manipulation used to obtain unauthorized access to a computer system
- software that is secretly installed on a user's device in order to acquire confidential information
- a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
- A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
- An unauthorized effort to gain access to a computer
- Malware that prevents an organization from accessing a file system.
- avoiding an organization's existing security mechanisms
- software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
- The process of protecting digital information over its full life cycle.
- A collection of personal computers used to infect malicious software.
20 Clues: unwanted email messages • An unauthorized effort to gain access to a computer • a field in which computers and networks are employed • avoiding an organization's existing security mechanisms • Computer program that is used to provide customized adverts • Malware that prevents an organization from accessing a file system. • ...
Cyber Security Participation puzzle 2023-03-17
Across
- attacks seeking out personal information
- malware that reproduces itself
- multiple steps to log in
- software that displays ads
- a mischeivious hacker
- lots of attackers preventing legitimate users
- scrambling data so it cant be read
- happens when a hacker is successful
- devices controlled by malware
- shield for data
- media changed to look authentic
Down
- software that checks for malware
- software that tracks you
- apps that give computers instructions
- network pro learning hacking techniques
- software that is harmful
- malware that makes you pay
- tricks users into clicking on harmful links
- malware pretending to be useful
- internet access at starbucks
20 Clues: shield for data • a mischeivious hacker • software that tracks you • software that is harmful • multiple steps to log in • software that displays ads • malware that makes you pay • internet access at starbucks • devices controlled by malware • malware that reproduces itself • malware pretending to be useful • media changed to look authentic • software that checks for malware • ...
MGregori's Cyber Security Crossword 2025-03-13
Across
- Investigates cybercrime evidence
- Captures network traffic data
- Physically isolated network security
- Converts data into code
- Overloads system with traffic
- Malicious software or programs
- Encrypts files, demands payment
- Blocks unauthorized network access
- Isolates untrusted code execution
- – Repeated password guessing attack
Down
- Fraudulent email for credentials
- Steals active user session
- web Hidden, encrypted online network
- Targets vendor software security
- Gains unauthorized higher access
- Takes advantage of vulnerabilities
- Disguised as legitimate software
- Malicious code triggers conditionally
- Network of infected computers
- Unknown software vulnerability
20 Clues: Converts data into code • Steals active user session • Captures network traffic data • Overloads system with traffic • Network of infected computers • Malicious software or programs • Unknown software vulnerability • Encrypts files, demands payment • Fraudulent email for credentials • Investigates cybercrime evidence • Targets vendor software security • ...
Cyber Safety and Security 2025-06-13
Across
- A crime where someone steals your personal information and uses it to commit fraud in your name.
- A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
- A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
- Creations of the human mind, such as inventions or artistic works, that are legally protected.
- Focuses on your right to control your personal information, including who collects it and how it's used.
- Protecting digital data from unauthorized access, use, or disclosure.
- The act of presenting someone else's work or ideas as one's own without proper citation.
- Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
- A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
- A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
- The trace of data you create as you navigate the online world, also called a "digital shadow".
- Any illegal activity facilitated by electronic devices and the internet.
- The use of electronic means to bully or harass another person, often through negative or false content.
- Data deliberately provided by an individual through online activities, such as information submitted on forms.
- Occurs when unauthorized individuals gain access to sensitive or confidential information.
- Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
- Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
- Encoding data so it can only be decrypted and read by authorized parties.
- Data collected automatically without intentional participation, like browsing history, often through cookies.
- Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
- A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- Ensuring data is accessible only to authorized individuals or systems.
- A legal right protecting original works of authorship like books, music, or computer programs.
- Software used to detect and remove malicious programs from computer systems.
- Malicious software used to harm or exploit a computer system, server, or network.
- A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.
26 Clues: Protecting digital data from unauthorized access, use, or disclosure. • Ensuring data is accessible only to authorized individuals or systems. • Any illegal activity facilitated by electronic devices and the internet. • Encoding data so it can only be decrypted and read by authorized parties. • ...
Cyber Cross word 2025-03-09
Cyber 2023-12-04
10 Clues: Data security • Cyber threats • Email scam tactic • Network protection • Private browsing tunnel • Fake website redirection • Data encryption extortion • Unique authentication method • Vulnerability exploitation tactic • Isolated software testing environment
Cloud (Data Centre) Controls and Cyber Controls 2020-10-15
Across
- Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
- BCP Tests and Wallet Cards are examples of business ___________ management documentation
- Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
- IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
- All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
- Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
- Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
- Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
- Information assets are ________ for vulnerabilities and reported for remediation
- Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
- _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
- Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
- To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
- Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
- IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed
15 Clues: Information assets are ________ for vulnerabilities and reported for remediation • BCP Tests and Wallet Cards are examples of business ___________ management documentation • Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans • ...
cyber security crossword puzzle 2021-03-17
Across
- a vulnerability hackers will take advantage of
- if someone gave u a ps5 for Christmas but you open the box and its socks
- canned meat but also annoying emails
- what we deal with trying to watch pirated movies
- purposely put on your computer to steal your information
- tik tok instagram facebook snapchat are all examples of...
- slimy little animal that lives in the dirt and will ruin your computer
- the one thing you don't want on your computer
- after 10pm you can probably find me in a discord...
- you could say the zodiac killer put an ... on his letters to the police
Down
- where organized information is stored
- can be compared to finding dory
- we use one to complete our security labs
- seems okay but contains malware
- advertisements displayed by software
- our teachers send us way too many of these
- using social tactics to get information
- what comes with phishing emails
- tree diagram of the processes that a product goes through
- when the internet is down we turn this off and turn it back on
20 Clues: can be compared to finding dory • seems okay but contains malware • what comes with phishing emails • advertisements displayed by software • canned meat but also annoying emails • where organized information is stored • using social tactics to get information • we use one to complete our security labs • our teachers send us way too many of these • ...
Cyber Security Awareness Month 2021-10-15
Across
- Hard to detect both by Users.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
- An attack focusing on people rather than technology.
- A form of malware that monitors user activities and reports them to an external their party.
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- Something that shows up in an email.
- Threats Malware is defined as any device.
Down
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- a dishonest scheme; a fraud.
- Alerts used as a warning of danger.
- The ultimate call control center that gives customers full control of all scam protection options.
- The act of falsifying the identity of the source of a communication or interaction.
- Identity and Privacy Protection.
- Someone attempting to create Identity fraud.
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
- An attempt by hackers to damage or destroy a computer network or system.
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
22 Clues: a dishonest scheme; a fraud. • Hard to detect both by Users. • Identity and Privacy Protection. • Alerts used as a warning of danger. • Something that shows up in an email. • Threats Malware is defined as any device. • Someone attempting to create Identity fraud. • An attack focusing on people rather than technology. • ...
Basics of Cyber Security 2021-06-29
Across
- threatening behavior facilitated through electronic means such as texting.
- a wireless technology standard used over short distances using short-wavelength UHF radio waves.
- hardware or software designed to prevent unauthorized access to or from a private network.
- should be constructed of upper and lower case letters, numbers, and special characters.
- fraudulent email purportedly from a reputable company attempting to get personal information.
- A sequence of words or text used to control access to a computer; similar to a password.
- The address of a webpage. Check the validity of it before clicking on it.
- the process of taking plain text and scrambling it into an unreadable format.
- a flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
- harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- facebook, Twitter, Instagram, etc. (Two words)
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- verifying identity.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Unauthorized access to a network, information systems, or application.
- the “A” in the C-I-A Triad. It ensures authorized users have access.
20 Clues: verifying identity. • facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • the “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Security Awareness 2022 2022-07-19
Across
- A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
- A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
- The recovery of data following computer failure or loss
- Another kind of malware that allows cybercriminals to remotely control your computer
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
- Malware that passes information about a computer user’s activities to an external party
- Obtaining services by using someone else’s resources
- A device or software designed to prevent unauthorized access to a computer or network
- A term related to the malicious concept of a botnet
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
- high-speed internet access
Down
- A flaw or weakness that can be used to attack a system or organization
- Computer that provides data or services to other computers over a network
- An app on your phone that generates a code to add an extra level of security to a password
- The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
- A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
- Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
- Method used by criminals to obtain financial or other confidential information
- It's not really a _____, it's just someone else's computer
- This should be at least 8 characters long
- The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
- Something of value to a person, business, or organization
- Something that could cause an organization not to meet one of its objectives
- Malware that replicates itself so it can spread to infiltrate other computers
26 Clues: high-speed internet access • This should be at least 8 characters long • A term related to the malicious concept of a botnet • Obtaining services by using someone else’s resources • The recovery of data following computer failure or loss • Something of value to a person, business, or organization • It's not really a _____, it's just someone else's computer • ...
C for Cyber Security 2022-10-10
Across
- A form of malware used by hackers to spy on you and your computer activities
- Unauthorized access to a network, information systems or application
- A piece of software or application that displays advertisements on your computer
- When a hacker changes source of an email so that it seems to come from a trusted source
- A sequence of words or text used to control access to a computer; similar to a password
- The process of taking plain text and scrambling it into an unreadable format
- A piece of hardware or software, used to keep intruders out
- Threatening behavior facilitated through electronic means such as texting
- In addition to passwords; provides better security
- A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
- Something personal to you and should never be shared
- A malicious software designed to block access to a computer system until a sum of money is paid
- media Facebook, Twitter, Instagram etc. (Two Words)
- The process of identifying a user’s identity
- A combination of the words “robot” and “network”
- the address of a website; check its validity before clicking on it
- A fraudulent email purportedly from a reputable company attempting to get personal information
- Alert / Always on the lookout
- harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
- An icon displayed along a web browser URL - indicates a secure mode
20 Clues: Alert / Always on the lookout • The process of identifying a user’s identity • A combination of the words “robot” and “network” • In addition to passwords; provides better security • media Facebook, Twitter, Instagram etc. (Two Words) • Something personal to you and should never be shared • A piece of hardware or software, used to keep intruders out • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
25 Cyber Security Facts 2023-08-30
Across
- is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- communications standard that enables application programs and computing devices to exchange messages over a network.
- the capacity at which a network can transmit data.
- a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
- is a malware designed to deny a user or organization access to files on their computer.
- the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- storage mode of computer data storage in which digital data is stored on servers in off-site locations.
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- a system of signals or symbols for communication.
- refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
- malware designed to collect online banking credentials and other sensitive information from infected machines
Down
- technique used by fraudsters to get control of your phone number.
- the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
- software used by cybercriminals to gain control over a target computer or network.
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
- is a type of security measure known as challenge-response authentication.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- information that has been translated into a form that is efficient for movement or processing
- the method by which information is converted into secret code that hides the information's true meaning.
- he hidden collective of internet sites only accessible by a specialized web browser.
- a formal request to an authority for something
- an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
- The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
25 Clues: a formal request to an authority for something • a system of signals or symbols for communication. • the capacity at which a network can transmit data. • technique used by fraudsters to get control of your phone number. • is a type of security measure known as challenge-response authentication. • ...
Cyber Security Crossword Puzzle 2025-03-12
Across
- viruses, worms, and ransomware
- security system that monitors traffic
- records keystrokes to steal passwords
- manipulate people to give data
- encrypts internet connections
- delivery of computing services
- convert data into coded format
- fixes vulnerabilities or improves security
- secretly gathers user information
- network of infected computers
- encrypts a victims data
- verifying the identity of user
Down
- analyze business data for decisions
- collection and analysis of data
- bypassing normal authentication
- process store distribute information
- impersonate a trustworthy entity
- overwhelms a network with excessiveness
- confidential information is stolen
- determine whats allowed for access
20 Clues: encrypts a victims data • encrypts internet connections • network of infected computers • viruses, worms, and ransomware • manipulate people to give data • delivery of computing services • convert data into coded format • verifying the identity of user • collection and analysis of data • bypassing normal authentication • impersonate a trustworthy entity • ...
FIT E Final Quiz Vocab 2013-05-17
8 Clues: Pertaining to a computer • A peripheral, click click • Google, Yahoo, Bing, etc. • National Cyber Security Tool • Like a waiter for your computer • Where you plug in your flash drive • Short Term Memory for Your Computer • What you can download like Pages, Word, Outlook
crossword puzzle 2022-12-31
Across
- cyber security international exam
- an open source operating system
- a notebook computer
- our country
- computer language
- brain of the computer
- popular search engine
- microsoft browser
Down
- that we learning now
- social media platform
- we can't touch that in computer
- institute of network hardware software
- software which configure the hardware
- a developer platform
14 Clues: our country • computer language • microsoft browser • a notebook computer • that we learning now • a developer platform • social media platform • brain of the computer • popular search engine • we can't touch that in computer • an open source operating system • cyber security international exam • software which configure the hardware • institute of network hardware software
