cyber security Crossword Puzzles
Cybersecurity 2018-08-02
Across
- CLI command to search for a pattern of letters
- Program used to collect cryptocurrency
- The telephone equivalent of phishing
- Protocol that WannaCry took advantage of
- First step in the cyber kill chain
- A compromised computer in a botnet
- Command to identify Ethernet devices
- Process security analysts use to search for advanced threats
- Resolve hostnames to IP addresses
- The second in the CIA triad
Down
- ... is the process of directing the company approach to security
- ... systems use physical characteristics to determine access
- The process of adding allowed programs to a list is called ...
- Testing technique using invalid or random data as input
- A weakness that can be exploited
- Specifies who gets access to what
- The process of reversing encoded data is ...
- The approach of using multiple layers of security
- Piece of forensic data identifying potential malicious activity
- Uses rules to allow or block traffic
20 Clues: The second in the CIA triad • A weakness that can be exploited • Specifies who gets access to what • Resolve hostnames to IP addresses • First step in the cyber kill chain • A compromised computer in a botnet • The telephone equivalent of phishing • Command to identify Ethernet devices • Uses rules to allow or block traffic • Program used to collect cryptocurrency • ...
CIS 178 Cybersecurity Participation 2023-04-20
Across
- Malware that demands payment
- Software that detects malware
- Criminal activity on computer systems
- secure website connection
- Successful cyber attack
- a software vulnerability
- a system weakness
- malicious digital activity
- data protection method
- fraudulent email technique
Down
- network security barrier
- a traffic overload cyberattack
- user identity verification
- computer infection
- secret access code
- unauthorized access
- harmful software program
- unsolicited email
- A network of infected computers
- physical trait recognition
20 Clues: unsolicited email • a system weakness • computer infection • secret access code • unauthorized access • data protection method • Successful cyber attack • network security barrier • harmful software program • a software vulnerability • secure website connection • user identity verification • physical trait recognition • malicious digital activity • fraudulent email technique • ...
Cyber Ethics 2025-06-14
Across
- – Moral principles that govern behavior
- – Monitoring someone online without consent
- – Unwanted or junk email
- – Online profile that represents a person
- – A person who harasses others on the internet
- – Common language used in email virus scams
- – Special characters used to strengthen passwords
- – Legal right protecting original work
- – Making private information known
- – Code of polite behavior on the internet
- – Malware that locks data until payment is made
Down
- – Measures to protect data from cyber threats
- – Set of moral principles in digital conduct
- – State of being unknown or unidentifiable online
- – Copying someone else's work without credit
- – Portable devices vulnerable to cyber threats
- – A person who gains unauthorized access to systems
- – Fraudulent attempt to get sensitive info
- – Software designed to harm or exploit a computer
- – Popular platform where cyberbullying can occur
20 Clues: – Unwanted or junk email • – Making private information known • – Legal right protecting original work • – Moral principles that govern behavior • – Online profile that represents a person • – Code of polite behavior on the internet • – Fraudulent attempt to get sensitive info • – Monitoring someone online without consent • – Common language used in email virus scams • ...
CBL World 2023-05-05
Across
- Your Cyber Security Partner
- Kidnapped & hold for ransom
- Burning walls, keep intruders away
- Most critical element in CyberSecurity
- Locked with a key, for data security
Down
- Weakness that can be exploited
- Make it strong, complex, and change frequently
- Plug and play your Apps on the cloud
- Assessed, Validated, and Certified
- Rhymes with fishing
- Vaccine for your systems
- Weakest link in CyberSecurity (Human factor)
12 Clues: Rhymes with fishing • Vaccine for your systems • Your Cyber Security Partner • Kidnapped & hold for ransom • Weakness that can be exploited • Assessed, Validated, and Certified • Burning walls, keep intruders away • Plug and play your Apps on the cloud • Locked with a key, for data security • Most critical element in CyberSecurity • Weakest link in CyberSecurity (Human factor) • ...
Security Awareness Crossword 2024-09-29
Across
- Playing games of chance for money
- Relates to people security
- Measures used to secure a site
- Part of the SHEQS function
- Relates to IT security
- Used to mark a boundary
Down
- Deliberate act of destruction
- Malicious software designed to block computer access
- Secret word or phrase used to gain access to somewhere
- state of being comfortable, healthy and happy
10 Clues: Relates to IT security • Used to mark a boundary • Relates to people security • Part of the SHEQS function • Deliberate act of destruction • Measures used to secure a site • Playing games of chance for money • state of being comfortable, healthy and happy • Malicious software designed to block computer access • Secret word or phrase used to gain access to somewhere
Generation & Suppliers Staff 2020-10-01
Across
- Hydrogen Generation
- Cyber Security
- Component Technical Issues
- Knows Access Code to Basement Door in White Flint
- Fuel Cycle Facilities
- DI&C
- Budget
- Dr. Casey’s Best Friend
- FOF Programs
- Reactor Oversight Process
- Helps Jerry with SAC; Marc with New Plants
- Suppliers
- Dry Used Fuel Storage
- Operator Licensing
- Accident Tolerant Fuels
- Physical Security Programs
- Engineering Processes and Programs
- Used Fuel Policy
- Fuel Supply and Trade
- Decommissioning
- FLEX
Down
- Research & Test Reactors
- Radiation Protection
- Codes and Standards
- Second License Renewal
- Sue's Go-to for Security Support
- Leader of the Pack
- Fire Protection
- NERC Issues
- Webinar Magician
- External Affairs
- Emergency Preparedness
- PHE Industry Coordination
- Part 53 Rulemaking
- New (matrix) addition to group
- Fitness for Duty
- Micro Reactors
- Flooding, Seismic and all acts of God
- PADS Oversight
39 Clues: DI&C • FLEX • Budget • Suppliers • NERC Issues • FOF Programs • Cyber Security • Micro Reactors • PADS Oversight • Fire Protection • Decommissioning • Webinar Magician • External Affairs • Fitness for Duty • Used Fuel Policy • Leader of the Pack • Part 53 Rulemaking • Operator Licensing • Hydrogen Generation • Codes and Standards • Radiation Protection • Fuel Cycle Facilities • Dry Used Fuel Storage • ...
Security Awareness 2025 Crossword 2025-02-11
Across
- The purpose of this puzzle is to increase security______
- The loss of ID card, building access cards and compromise of passwords are examples of security _____ and must be reported
- Chief ____ Officer (CSO)
- Hacking is an example of a ____ attack
- Physical security focuses on the safeguarding of sensitive information/_______/facilities
- If a service contract contains a security _____, you must complete an SRCL
- The PGS contains eight security controls and three ____
- These emails are designed to deceive you into providing information
- It is important to regularly exercise your ______ continuity plans
- The current mandatory security awareness course, acronym
- Security in contracting refers to the procurement of goods or _____
- For reliability status, the screening process includes a ___ enforcement inquiry
- _____Information/assets have a potential for injury
- To be privy to certain information, you must have a ____ to know
Down
- Project/Security/ Contracting _____
- Malicious software designed to infiltrate or damage a computer system
- "I Luv Ch3eZ@L0T!" - for example
- Information categorized as ____ can only be processed in a high security zone
- All _____ must be issued temporary passes and escorted to access a GC site
- TBS' ____ on Government Security
- Security control #7, security event
- Reliability ____, the minimum security screening requirement within the Government of Canada
- Training hub for public servants, acronym
- By leaving the building during a Shelter-In-Place, you could put ______ in danger
- The Canadian telecommunications industry is an example of a ____function
- To email Protected B information, it must be_______
- One must ____ documents according to their level of sensitivity
- You must perform this evaluation to categorize your information/assets
- The A,B or C of information management security
- Reporting a security event helps mitigate_____
- A natural ____ is an example of a disruption to a critical function
31 Clues: Chief ____ Officer (CSO) • "I Luv Ch3eZ@L0T!" - for example • TBS' ____ on Government Security • Project/Security/ Contracting _____ • Security control #7, security event • Hacking is an example of a ____ attack • Training hub for public servants, acronym • Reporting a security event helps mitigate_____ • The A,B or C of information management security • ...
Cabinet Departments 2022-11-14
Across
- safety vehicles, roads, USDOT, ODOT
- all legal matters, FBI, DEA, prisons
- USDA, farming, food, crop sales/distribution, economic development
- fair housing, housing planning
- terrorism, disasters, cyber security, border control, immigration
- healthcare, benefits for veterans
- trade, economy, industrial standards, gather data
Down
- schools, loans/grants
- unemployment, workplace safety, wage standards, employee rights
- public health, family services, adoption/foster, drug prevention
- federal lands, conservation, Native American territories, National Parks
- international relations, foreign policies
- production of currency, public debt, tax laws
- waste disposal, energy production, nuclear weapons
- military, national security
15 Clues: schools, loans/grants • military, national security • fair housing, housing planning • healthcare, benefits for veterans • safety vehicles, roads, USDOT, ODOT • all legal matters, FBI, DEA, prisons • international relations, foreign policies • production of currency, public debt, tax laws • trade, economy, industrial standards, gather data • ...
CYBER Crossword 2025-10-21
Across
- : The process of granting or denying specific requests to use resources or information systems.
- : A security mechanism requiring two or more independent credentials for authentication.
- : Fraudulent attempt (often by email) to obtain sensitive information by posing as a trustworthy entity.
- : A hidden or undocumented entry point in software or a system to bypass normal security controls.
- : A weakness in a system, design, implementation, or configuration that can be exploited.
- : Copies of data held in separate storage, used so systems can recover from failures, errors or attacks such as ransomware.
- : A network security device or software that monitors and controls incoming and outgoing network traffic based on rules.
- : Malicious software designed to damage or do unwanted actions on a computer system.
- : Knowledge about threat actors, their tools, tactics, and procedures, used to inform defensive actions.
- : A list of approved items (users, applications, IPs) that are granted access; everything else is typically denied by default.
- : An attack that disrupts normal traffic by overwhelming a target with requests.
- : An individual, group or organisation that has the intent and capability to carry out harmful cyber actions.
Down
- : The confirmed exposure of protected or sensitive information to an unauthorised party.
- : The ability of an organisation to continue operating and recover during or after a cyber-attack or incident.
- : A network of internet-connected devices infected by malware and controlled as a group without the owners’ knowledge.
- : A highly sophisticated cyber attack, often by a well-resourced adversary, aiming to remain undetected for a long period.
- : A threat posed by someone within the organisation, e.g., an employee, who uses their access (intentionally or unintentionally) to harm the organisation.
- : Verifying the identity of a user, process or device.
- : A record of events (who did what, when) used to support security monitoring and investigation.
- : The approval or permission for someone or something to perform an action.
- : The process of converting plaintext into ciphertext to prevent unauthorized access.
- : A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause undesired behaviour.
- : A vulnerability or exploit that is unknown to the vendor and has no patch available at time of attack.
23 Clues: : Verifying the identity of a user, process or device. • : The approval or permission for someone or something to perform an action. • : An attack that disrupts normal traffic by overwhelming a target with requests. • : Malicious software designed to damage or do unwanted actions on a computer system. • ...
Data Privacy and Cybersecurity 2022-08-15
Across
- This 2020 ballot initiative amended 2 down
- This type of document guides an organization's response after a data privacy and security incident
- A law firm that guides an organization through a data privacy and security incident
- A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
- This European Union law served as the basis for the creation of 2 down
- Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
- A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
- An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
- Number of comprehensive consumer privacy laws in the United States
- The United States' first state-specific consumer privacy law
- A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
- Unauthorized activity on an organization’s digital network
- The Advisen 2022 "Cyber Law Firm of the Year"
- This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"
14 Clues: This 2020 ballot initiative amended 2 down • The Advisen 2022 "Cyber Law Firm of the Year" • Unauthorized activity on an organization’s digital network • The United States' first state-specific consumer privacy law • Number of comprehensive consumer privacy laws in the United States • This year's Cybersecurity Awareness Month theme - "See ___ in Cyber" • ...
Plain Language Safety Code Alerts 2024-11-26
Across
- You found a suspicious package
- Person in cardiac/Respiratory arrest or needing medical assistance
- Disaster, incoming patient
- Security assistance needed for a hostage situation
- Severe Weather
- You observe fire or smoke
- A Cyber attack has occured on DCH's computer system
- Initiated to prevent combative or disruptive person from entering the building
- A Hazardous Arbonne Agent has been detected outside.
Down
- Only one unit needs to move patients out of their rooms into the hallway for safety.
- A Hazardous Material spill has occurred in the Hospital
- Missing person
- Security assistance needed for a violent person with a Gun
- Security Assistance Needed for a combative person
- Inpatient experiencing distress
15 Clues: Missing person • Severe Weather • You observe fire or smoke • Disaster, incoming patient • You found a suspicious package • Inpatient experiencing distress • Security Assistance Needed for a combative person • Security assistance needed for a hostage situation • A Cyber attack has occured on DCH's computer system • A Hazardous Arbonne Agent has been detected outside. • ...
CYBER SECURITY CHALLENGE 2024-11-21
14 Clues: Secure data • Virus remover • Protected data • Network shield • Computer threat • Security symbol • Data protection • Harmful software • Internet platform • Login requirement • Unauthorized access • Computer connection • Computer information • Programmer's language
Crossword 2023-03-14
Across
- Acronym for chief information security officer
- A cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed
- Antigen ______ Defense
- _____ Response Consulting
- Your Antigen resource for your licensing needs
- Cyber Risk _______
Down
- Antigen Security's partner for insurance carriers
- Antigen Security's partner for insurance brokers
- Acronym for digital forensics & incident response
- The possibility of a malicious attempt to damage or disrupt a computer network or system.
- Managed ______ Providers
11 Clues: Cyber Risk _______ • Antigen ______ Defense • Managed ______ Providers • _____ Response Consulting • Acronym for chief information security officer • Your Antigen resource for your licensing needs • Antigen Security's partner for insurance brokers • Antigen Security's partner for insurance carriers • Acronym for digital forensics & incident response • ...
KICT Crossword Puzzle 2022-07-20
Across
- / KICT Flagship
- / Undergraduate Student Societies
- / KICT was established in _____ 2001
- / Undergraduate Programme
- / Postgraduate Programme
- / Code to _____
- / A Department at KICT
Down
- / Centre of Excellence for Cyber Security
- / Postgraduate Student Societies
- Digital Education / KICT Flagship
- / KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
- / KICT Robe Colour
- Sejahtera / KICT Flagship
- / Postgraduate Programme
- / KICT International Journal
15 Clues: / KICT Flagship • / Code to _____ • / KICT Robe Colour • / A Department at KICT • / Postgraduate Programme • / Postgraduate Programme • / Undergraduate Programme • Sejahtera / KICT Flagship • / KICT International Journal • / Postgraduate Student Societies • / Undergraduate Student Societies • Digital Education / KICT Flagship • ...
CYBER SECURITY CHALLENGE 2024-11-21
14 Clues: Secure data • Virus remover • Protected data • Network shield • Security symbol • Computer threat • Data protection • Harmful software • Internet platform • Login requirement • Computer connection • Unauthorized access • Computer information • Programmer's language
Cyber Security 2022-06-08
Across
- A tool used to mask your online identity by redirecting and encrypting your data before it is sent
- An attack that aims to make a service or website unusable by 'flooding' it with malicious traffic
- Malware that locks data and encrypts it to commit fraud
- Malware that gathers information from a person or company by violating privacy
Down
- Gathers sensitive information that involves both social engineering and email
- Malware that infects devices with multiple, intrusive, ads
- Malware that infects and spreads with files and links together with social engineering
- Infects devices through suspicious files and links
- Works like a virus, but can infect devices on it's own and through software vulnerabilities
9 Clues: Infects devices through suspicious files and links • Malware that locks data and encrypts it to commit fraud • Malware that infects devices with multiple, intrusive, ads • Gathers sensitive information that involves both social engineering and email • Malware that gathers information from a person or company by violating privacy • ...
Cyber Security 2021-03-30
9 Clues: Private • Fake emails • Only for you • Attached to a file • Needs to be downloaded • An extra layer of protection • A code that protects your account • Uses vulnerabilities to get access • An illegal way of accessing your device
Cyber Security 2023-10-27
Across
- A trail of data left behind online
- Having a duty to deal with something
- Browser
- How our online information should be
Down
- Saying hurtful things to someone online
- Helps protect your information
- Intended to be kept secret
- Machinery, computers and telecommunication
- What you connect to, to access online servers
9 Clues: Browser • Intended to be kept secret • Helps protect your information • A trail of data left behind online • Having a duty to deal with something • How our online information should be • Saying hurtful things to someone online • Machinery, computers and telecommunication • What you connect to, to access online servers
cyber security 2023-04-21
Across
- Looking at someone's information over their shoulder.
- Stimuli that has meaningful context.
- software designed to interfere with a computer's normal functioning.
- Inventing a scenario to engage with victim.
- A person who breaks into computers to gain unauthorized access to information.
Down
- malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
- malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
- Information that relates to an individual.
- Efficient information that was translated.
9 Clues: Stimuli that has meaningful context. • Information that relates to an individual. • Efficient information that was translated. • Inventing a scenario to engage with victim. • Looking at someone's information over their shoulder. • software designed to interfere with a computer's normal functioning. • ...
Cyber Security 2025-04-29
9 Clues: Betrug • Suchti • gibt es sehr viele • Wo findet alles statt? • Verdient man durchs arbeiten • Andere Leute ärgern und ausschließen • Dort mit fremden Nutzern austauschen • Schmiert man auf brot und schmeckt gut • wenn man sich als andere person ausgibt um Leuten eine Falle zu stellen
Cyber Security Crossword 2021-02-12
Across
- and gathers information on a
- can be a worm virus or trojan
- a person how uses computers to get
- access to information and data.
- a specific type of computer virus that
- how they use their computer
Down
- malicious form of self-replicating software
- a type of virus and worm that carries
- a specific type of attack
- unwanted software that
- Set of symbols/numbers/letters which is
- information processed or stored by a
- to access an account
- you into downloading it onto your
14 Clues: to access an account • unwanted software that • a specific type of attack • how they use their computer • and gathers information on a • can be a worm virus or trojan • access to information and data. • you into downloading it onto your • a person how uses computers to get • information processed or stored by a • a type of virus and worm that carries • ...
cyber security 2017-06-30
Across
- IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE
- IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE
- ITS A TYPE OF CREATURE THAT WRIGGLES
- RISKS IT IS EASILY ACCESSIBLE AND CAN BE A DANGEROUS PLACE WHERE THERE ARE PREDATORS,CYBER CRIMANALS AND BULLIES
Down
- IT IS SHORT FOR "MALICIOUS SOFTWARE"
- IS A PROGRAM OR A PIECE OF CODE THAT IS LOADED ONTO YOUR COMPUTER WITHOUT YOUR KNOWLEDGE
- BLOCKS ACCESS FROM THE VICTIMS DATA
- ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE
- IT IS THE TERM USED BY THE ANCIENT GREEK STORY OF THE WOODEN HORSE THAT WAS USED TO HELP GREEK TROOPS
9 Clues: BLOCKS ACCESS FROM THE VICTIMS DATA • IT IS SHORT FOR "MALICIOUS SOFTWARE" • ITS A TYPE OF CREATURE THAT WRIGGLES • IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE • IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE • ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE • ...
Cyber Security 2021-10-29
Across
- Malicious software that infects a user's computer and changes how is operates
- User's data is held hostage until a payment is made
- Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
- Hidden software that records a user's information secretly for a third-party
- The practice of protecting internet-connected systems from digital attacks
- A an email disguised as a legitimate source that tricks users into offering up personal information
Down
- Is protecting of information from malicious damage and unauthorized access
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A form of malware that is self-replicating infecting a computer and can spread across its network
9 Clues: User's data is held hostage until a payment is made • Is protecting of information from malicious damage and unauthorized access • The practice of protecting internet-connected systems from digital attacks • Hidden software that records a user's information secretly for a third-party • ...
Cyber Security 2021-11-05
Across
- a secret word or phrase that must be used to gain admission to a place
- physical characteristics that can be used to identify individuals
- looking at someone's information over their shoulder
- a type of malicious code or program written to alter the way a computer operates
Down
- an identification used by a person with access to a computer, network, or online service
- randomly generated sequence of letters or numbers that appear as a distorted image, and a text box
- a type of malware that spreads copies of itself from computer to computer
- persuade someone in a clever or slightly dishonest way to allow you to do something or to give you something
- type of scam where criminals impersonate someone via email or messages
9 Clues: looking at someone's information over their shoulder • physical characteristics that can be used to identify individuals • a secret word or phrase that must be used to gain admission to a place • type of scam where criminals impersonate someone via email or messages • a type of malware that spreads copies of itself from computer to computer • ...
Cyber Security 2024-02-05
Across
- The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
- Gaining unauthorised access to or control of a computer system.
- An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
- An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
- Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
- A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
- The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- This is a form of attack that makes multiple attempts to discover something (such as a password).
- This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.
9 Clues: Gaining unauthorised access to or control of a computer system. • This is a form of attack that makes multiple attempts to discover something (such as a password). • An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder. • ...
Cyber Security 2024-10-09
Across
- When data is transformed into a format that is unreadable without a decryption key
- Software designed to harm or exploit any programmable device, service, or network
- Someone who tests system security by trying to find vulnerabilities
- Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
- A security measure that uses a combination of letters, numbers, and symbols to protect accounts
- A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
- A weak spot in a system’s security defenses
- Malicious software that locks a user’s files and demands a ransom to restore access
- A process used to verify a user’s identity, typically through passwords or biometrics
9 Clues: A weak spot in a system’s security defenses • Someone who tests system security by trying to find vulnerabilities • Software designed to harm or exploit any programmable device, service, or network • When data is transformed into a format that is unreadable without a decryption key • ...
cyber security 2022-10-21
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Cyber Security 2023-04-04
Across
- malware that can encrypt your files and demand payment in exchange for the decryption key
- is often sent as an email to trick you into giving you your personal information.
- type of malware that can secretly gather information about your online activity
Down
- malware that disguises itself as a legitimate program or file, but it has a malicious purpose
- similar to a virus in that it can replicate and spread from one computer to another, but it doesn't need to attach itself to files or programs
- a program that monitors the traffic coming in and out of your device
- a program that protects your computer from malware
- can spread from one computer to another by attaching itself to files or programs
- malicious software designed to cause harm to your device
9 Clues: a program that protects your computer from malware • malicious software designed to cause harm to your device • a program that monitors the traffic coming in and out of your device • type of malware that can secretly gather information about your online activity • can spread from one computer to another by attaching itself to files or programs • ...
cyber security 2022-10-21
cyber security 2022-10-21
Cyber Security 2022-10-13
Across
- A cybercrime that uses the phone to steal confidential data.
- When you swipe your access card, beware of persons nearby who may try __________.
- protector This helps protect your screen from shoulder surfing.
- Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
- This network security device sits at the edge of your network and governs access.
- This software is installed on your computer to protect it from viruses and malware.
- A network of computers infected by malware and that are under the control of a single attacking party.
- A person who uses computers to gain unauthorized access to data.
- Computer software with malicious intent.
9 Clues: Computer software with malicious intent. • A cybercrime that uses the phone to steal confidential data. • protector This helps protect your screen from shoulder surfing. • A person who uses computers to gain unauthorized access to data. • This network security device sits at the edge of your network and governs access. • ...
Cyber Security 2024-12-26
Across
- A sequence of characters or words to keep your account safe
- A program that detect and remove virus
- Nasty software that can have a bad impact on your device
- Unwanted emails or messages
Down
- A location on the internet where you can save your data
- The program you use to access the Internet like chrome or Firefox
- Getting into other's computer without their permission
- Legal Aid to fight against Cyber Crimes
- A copy of your data stored somewhere else.
9 Clues: Unwanted emails or messages • A program that detect and remove virus • Legal Aid to fight against Cyber Crimes • A copy of your data stored somewhere else. • A location on the internet where you can save your data • Nasty software that can have a bad impact on your device • Getting into other's computer without their permission • ...
1 2025-03-01
Across
- Audio talk show
- Exercise and health
- Natural food label
- Fully present mentally
- New business venture
- Virtual world experience
- Rising prices
- Reduce waste
- Independent work style
- Online order arrival
- Secure digital ledger
- Healthy eating science
Down
- Security key
- Mysterious or puzzling
- Travel for leisure
- Watching online content
- Always traveling
- Internet-related
- Battery-powered cars
- Advanced computing field
- Relaxing getaway
- No cables needed
- Not naturally made
- Disease prevention shot
- Earth's weather patterns
25 Clues: Security key • Reduce waste • Rising prices • Audio talk show • Always traveling • Internet-related • Relaxing getaway • No cables needed • Travel for leisure • Natural food label • Not naturally made • Exercise and health • New business venture • Battery-powered cars • Online order arrival • Secure digital ledger • Mysterious or puzzling • Fully present mentally • Independent work style • ...
FITAVocab.TC 2013-05-16
Across
- programs that you can download
- ethical uses of or on a computer or the web
- circuit board
- something that shows off a a business and shows people what it is about
- crediting a persons work
- extra docking system
- the security of or on a computer
- a paid internet access
- central processing unit
- a companies "slogan"
- a type of layout
- a format of a program on your computer
- a combination of many search engines
- a program that allows you to create documents
- the thing at the top of the screen
- a port to get wifi
- storing space
- liquid crystal display
- an illegal way of taking credit for somebody's invention
- light emitting diode
- National Cyber Security Alliance
- what you have on you desktop already
Down
- a term that describes safety o the computer or on the web
- decision tool
- a place where you can virtually go and search on the web
- a system that allows you to connect to other peoples devices over wifi or cellular data
- cd port
- an adjective that describes cyber in a way that is someway pixel ly
- the old fashion watch "not digital"
- things that you can buy to play or enjoy on
- confusing
- a term that describes the web and computers
- a virtually folder where you can save your documents, files
- your work
- a user that is online
- a device that can go anywhere
- a thing of the computer that allows you to move around on the screen or click
- memory card
38 Clues: cd port • confusing • your work • memory card • decision tool • circuit board • storing space • a type of layout • a port to get wifi • extra docking system • a companies "slogan" • light emitting diode • a user that is online • a paid internet access • liquid crystal display • central processing unit • crediting a persons work • a device that can go anywhere • programs that you can download • ...
Digitech Cyber Security 2024-08-19
Across
- The practice and study of techniques for secure communication
- - A simple substitution cipher named after a Roman leader
- A cipher that uses symbols instead of letters
- - A harmful software program
- A one-way function used for integrity checks
- The result of encryption
- A type of encryption where two different keys are used
- A type of encryption where the same key is used
Down
- - Ensuring that information is only accessible to those authorized
- - The unencrypted message
- - A cipher that uses multiple substitution alphabets
- - A key kept secret in asymmetric encryption
- A famous WWII machine used for encryption
- An early cipher used by the Spartans
14 Clues: The result of encryption • - The unencrypted message • - A harmful software program • An early cipher used by the Spartans • A famous WWII machine used for encryption • - A key kept secret in asymmetric encryption • A one-way function used for integrity checks • A cipher that uses symbols instead of letters • A type of encryption where the same key is used • ...
Cyber Security Revision 2024-09-19
Across
- A small program designed to cause damage.
- A security method where a code is sent to a phone or email to verify someone's identity.
- Type of hacker who hacks illegally, usually to make money.
- Part of the Internet that is behind passwords, etc.
- Type of hacker who hacks legally.
- Software used to remove viruses.
- Type of hacker who hacks illegally but for the greater good.
Down
- A hacking method, often using email, that tricks people into entering details such as passwords.
- What hackers use to trick people into giving personal details.
- Using someone's personal details to pretend to be them, often to take out loans, etc.
- Part of the Internet accessed using a search engine.
- Part of the Internet that often contains illegal content.
- Software used to gain illegal access to a computer system.
- Unwanted email, often associated with phishing.
14 Clues: Software used to remove viruses. • Type of hacker who hacks legally. • A small program designed to cause damage. • Unwanted email, often associated with phishing. • Part of the Internet that is behind passwords, etc. • Part of the Internet accessed using a search engine. • Part of the Internet that often contains illegal content. • ...
RU ITEC411: Crime and Security. 2024-11-25
Across
- Traveling to sue under strict libel laws in certain countries.
- Malicious software designed to gather user information without consent.
- The process of encoding information to prevent unauthorized access.
- Denial-of-service attack that disrupts online services.
- The use of someone else's personal information for fraud
- A security tool used to filter and monitor network traffic.
- Using hacking to promote a political cause.
- Phishing attacks carried out via voice calls.
- Fraudulent attempts to obtain sensitive information via email.
- Hackers who improve system security by identifying vulnerabilities.
- A security tool to lure and study hackers.
Down
- Security measures using unique biological characteristics
- Measures taken to protect computer systems from cyber attacks.
- A sophisticated worm that targeted Iranian nuclear facilities
- Manipulating individuals to divulge confidential information.
- An organization that addresses trade agreements, including cross-border digital issues.
- Phishing attacks carried out via SMS.
- The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
- Unauthorized access to or manipulation of computer systems.
- Redirecting users to fraudulent websites to steal personal data.
20 Clues: Phishing attacks carried out via SMS. • A security tool to lure and study hackers. • Using hacking to promote a political cause. • Phishing attacks carried out via voice calls. • Denial-of-service attack that disrupts online services. • The use of someone else's personal information for fraud • Security measures using unique biological characteristics • ...
Security Awareness Crossword 2023-11-17
Across
- This item must be worn whilst on site or in the office
- Government checks carried out to confirm trustowrthiness
- The branch of security that protects online threats
- The branch of security that protects hardware
- This agency regulates our security arrangements.
- The branch of security concerning people
- A sign that something may be troubling a colleague
Down
- A technique for attempting to acquire information
- The information marking permitted on Cyclife servers
- legal substance that can affect decision making
- This briefing is given if you are visiting a country where the FIS operate
- You must do this to your screen when you walk away from your laptop
- Substances that can affect the way the body functions
- Person required when a visitor is on site
- The '_ _ _ _' to know principal should be applied when sharing sensitive information
15 Clues: The branch of security concerning people • Person required when a visitor is on site • The branch of security that protects hardware • legal substance that can affect decision making • This agency regulates our security arrangements. • A technique for attempting to acquire information • A sign that something may be troubling a colleague • ...
Cyber safety Evie Williams 2016-06-08
Across
- crime any internet
- something that stops people getting on your computer
- this word is the opposite of dangerous,
- A ringer on your computer when someone is trying to get on
- any software to prevent crimes online
- a type of bullying
- something that will stop viruses getting on your computer
- a code so people don't get on to your device
- mail that is not wanted
- a hostile strongly worded message that may contain obscene language
- the name a user selects to be identified on a computer or a network
- don't believe what someone says
- do not say rude words online,
Down
- a piece of information about your visit to a website that some websites record automatically on your computer,
- information about someone
- a computer cold
- something that should not be shared
- a person who takes over someone's device
- room a location online that allows multiple users to communicate electronically with each other in real time,
- a form of malicous displays unsolicited advertising on your computer
- a type of stalking
- at tracking feature of Internet browsers that shows all the recent websites visited
- Internet games that intensionly cause problems or cyber bullying other games
- tag the nickname the user has chosen to be identified by when playing internet games,
- to copy a file from one computer system
- a way to make money by deceiving people
26 Clues: a computer cold • crime any internet • a type of stalking • a type of bullying • mail that is not wanted • information about someone • do not say rude words online, • don't believe what someone says • something that should not be shared • any software to prevent crimes online • this word is the opposite of dangerous, • to copy a file from one computer system • ...
Security 2019-04-26
Across
- Country to which the taking of a Babcock IT Asset is prohibited
- A word or phrase used to access your PC / Phone
- A potential external threat either to an individual or Babcock
- A person closely following an employee into an area or through a barrier without showing a security pass
- Data ********* allows you to directly request access to shared folders
- A PED Zone Colours
- We all signed this as part of our contract Official ******* Act
- One of the mandatory Babcock training models ***** Security Awareness
Down
- Babcock IT system can be red, blue or white
- A loss or compromise of classified information will result in this being raised
- Complete the Designator (NNPPI) – Naval Nuclear ********** Programme Information
- A way to dispose of information securely
- Security Response Level displayed on the entrance gates
- Surname of the Submarine Business Unit Security BSM
- One of the recognised Classification Marking
- Method of ensuring good practice, governance adherence to procedures
- Email Scam stealing personal / business information
- A computer virus
18 Clues: A computer virus • A PED Zone Colours • A way to dispose of information securely • Babcock IT system can be red, blue or white • One of the recognised Classification Marking • A word or phrase used to access your PC / Phone • Surname of the Submarine Business Unit Security BSM • Email Scam stealing personal / business information • ...
Cyber Security 2022-09-14
Across
- software that is in a constant state of updating. intended to be convenient to the user and meant to disrupt hackers
- hacking with malicious intent. typically to gain access to a computer and steal as much data as possible
- software that automatically displays material when a user offline
- an attack that disrupts the service to waste time, effort, and money
- hacking that is meant to do minimal damage and is usually done out of curiosity
Down
- an internet traffic filter meant to stop unauthorized incoming and outgoing traffic
- the core of a computer's operating system that houses the most essential functions of the computer
- the physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception
9 Clues: software that automatically displays material when a user offline • an attack that disrupts the service to waste time, effort, and money • hacking that is meant to do minimal damage and is usually done out of curiosity • an internet traffic filter meant to stop unauthorized incoming and outgoing traffic • ...
cyber security 2022-10-21
Cyber Security 2023-06-13
Across
- Verifying the identity of a user, process or device before allowing access to resources in a system.
- The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
- Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
- engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
- A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
- A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
- A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
- Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
- A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).
9 Clues: Verifying the identity of a user, process or device before allowing access to resources in a system. • Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people. • engineering The methods used to manipulate people into carrying out specific actions, or divulging information. • ...
cyber security 2024-10-09
Across
- a communication method that uses electronic devices to deliver messages across computer networks
- never share your private
- always have a secure
- a symbol, word, or words legally registered or established by use as representing a company or product.
- a website or app almost always has access to your personal
- a person who uses computers to gain unauthorized access to data
Down
- never use somebody elses legal right to print, publish, perform, film, or record literary, artistic, or musical material,or you will be
- the information about a particular person that exists on the internet as a result of their online activity
- never click on sketchy
- when creating username never use your real
10 Clues: always have a secure • never click on sketchy • never share your private • when creating username never use your real • a website or app almost always has access to your personal • a person who uses computers to gain unauthorized access to data • a communication method that uses electronic devices to deliver messages across computer networks • ...
KICT Crossword Puzzle 2022-07-20
Across
- Undergraduate Programme
- Postgraduate Programme
- KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
- KICT International Journal
- KICT Flagship
- A Department at KICT
- KICT Flagship
Down
- KICT Flagship
- Postgraduate Programme
- KICT Robe Colour
- KICT was established in _____ 2001
- Code to _____
- Undergraduate Student Societies
- Postgraduate Student Societies
- Centre of Excellence for Cyber Security
15 Clues: KICT Flagship • Code to _____ • KICT Flagship • KICT Flagship • KICT Robe Colour • A Department at KICT • Postgraduate Programme • Postgraduate Programme • Undergraduate Programme • KICT International Journal • Postgraduate Student Societies • Undergraduate Student Societies • KICT was established in _____ 2001 • Centre of Excellence for Cyber Security • ...
Information Security Crossword Puzzle 2023-04-28
Across
- ILoveYou123, 123456, and P@ssw0rd are all this.
- Keeps out most attacks and is both human and machine.
- The amount of systems that should have the same username and password.
- The most effective tool to thwart cyber attacks.
- These employees are part of the information security team.
- It is 100% secure.
- When anything seems strange.
- What to do with sensitive information before sending.
Down
- Software that is designed to do terrible things.
- Weakest link in the security chain.
- Anything suspicious raises these.
- You should only use our computers for this.
- An attempt to get you to let an attacker do their thing.
- A legal source of information that has private material.
- The first step in information security awareness is being about to do this with security threats.
- It's okay to trust, but you should also do this.
16 Clues: It is 100% secure. • When anything seems strange. • Anything suspicious raises these. • Weakest link in the security chain. • You should only use our computers for this. • ILoveYou123, 123456, and P@ssw0rd are all this. • Software that is designed to do terrible things. • The most effective tool to thwart cyber attacks. • It's okay to trust, but you should also do this. • ...
Cybersecurity Crossword Puzzle 2023-09-11
Across
- - Refers to a revision or improvement made to a software program or system in order to fix bugs, enhance features, or patch security vulnerabilities.
- - The prefix "cyber" relates to computers, digital technology, and the internet. It frequently appears in contexts related to cybersecurity and cyber-related terms.
- - Ensuring its safety and protecting it from threats, risks, or vulnerabilities. In the realm of cybersecurity, it often entails safeguarding assets and data.
- - In cybersecurity, the term "spoofed" is used to describe the act of fabricating or deceiving information or the origin of data.
- - Short for advertisements, are messages or content created to promote products, services, or ideas.
- - DomainKeys Identified Mail (DKIM) is another method of email authentication. It allows recipients to verify if an email was genuinely sent from the claimed domain and authorized by it.
- - The process of converting information or data into code to prevent access or protect it from being read by anyone without the decryption key.
- - Verification.
- - To restore.
Down
- - A password is a combination of letters, numbers, and symbols that grants access to a computer system, account, or digital resource.
- - A type of coverage that businesses obtain to protect themselves against losses and liabilities resulting from cyberattacks and data breaches.
- - Sender Policy Framework is an email authentication protocol that helps prevent email spoofing by verifying if the sending mail server has permission to send emails on behalf of a domain.
- - An organized method or collection of recommendations for implementing security measures and protocols aimed at safeguarding an organization's assets.
- - Which stands for Domain-based Message Authentication, Reporting, and Conformance, is a protocol used for email authentication and reporting. Its primary purpose is to assist organizations in safeguarding their email domains against misuse in email spoofing attacks.
- - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry.
- - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.
- - Email is a used method of exchanging messages over the internet. It serves as a communication tool for both business purposes.
- DRIVE - A portable device used for storing and transferring data between computers. It relies on flash memory technology.
- - Refers to a fraudulent scheme intended to deceive individuals or organizations into providing money, personal information, or other valuable assets.
- - When a computer or device is infected, it means that it has been compromised by malware or a virus. This can disrupt its functioning and lead to data theft.
20 Clues: - To restore. • - Verification. • - Short for advertisements, are messages or content created to promote products, services, or ideas. • - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer. • - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry. • ...
cyber security 2022-10-21
Cyber security 2022-11-28
Across
- - replicate themselves but do not attach themselves to files as a virus does.
- engineering - another word for phishing
- - locks a computer, encrypts files, and therefore prevents the user from being able to access the data
- - unwanted software that monitors and gathers information on a person and how they use their computer
Down
- - software that is designed to gain access to your computer with malicious intent
- - a large collection of malware-infected devices
- - will replicate itself by maliciously modifying other computer programs and inserting code
- - a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions
- - any device connected to a network
9 Clues: - any device connected to a network • engineering - another word for phishing • - a large collection of malware-infected devices • - replicate themselves but do not attach themselves to files as a virus does. • - software that is designed to gain access to your computer with malicious intent • ...
Cyber Security 2023-09-14
Across
- Disrupt, damage, or gain unauthorized access to a computer system
- Fake rental properties posted online
- Negative behavior inflicted online
- Victims fall for recruiting emails and receive a bogus bank check, which they deposit and use for "mystery" shopping
Down
- The Recipient has not granted or verified permission for a message to be sent
- Data left behind on the internet
- A combination of uppercase letters, lowercase letters, numbers, and symbols
- Public area offering WIFI access
- Watch for spelling mistakes, and email addresses as they can easily be misrepresented
9 Clues: Data left behind on the internet • Public area offering WIFI access • Negative behavior inflicted online • Fake rental properties posted online • Disrupt, damage, or gain unauthorized access to a computer system • A combination of uppercase letters, lowercase letters, numbers, and symbols • ...
CYBER SECURITY 2024-05-11
CYBER SECURITY 2024-05-11
Across
- _____ emel adalah emel yang tidak diingini yang sering masuk ke peti masuk e-mel anda, sering kali mengganggu dan tidak diundang
- Teknik penipuan dalam talian yang menggunakan e-mel atau laman web palsu untuk mendapatkan maklumat peribadi dari mangsanya
- Salah satu perisian berbahaya yang mengunci akses kepada data mangsa dan meminta tebusan untuk membebaskannya
- Salah satu jenayah siber berkait rapat dengan media sosial
- _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital
- salah satu bentuk penipuan atas talian
Down
- Program berbahaya yang diselitkan ke dalam sistem komputer tanpa izin, bertujuan untuk mencuri data
- Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer
- Salah satu jenayah siber yang menggunakan kecerdasan buatan (AI) untuk mencipta video palsu yang sukar dibezakan dari yang sebenar
9 Clues: salah satu bentuk penipuan atas talian • Salah satu jenayah siber berkait rapat dengan media sosial • _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital • Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer • ...
Cyber Security 2024-10-09
Across
- When data is transformed into a format that is unreadable without a decryption key
- Software designed to harm or exploit any programmable device, service, or network
- Someone who tests system security by trying to find vulnerabilities
- Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
- A security measure that uses a combination of letters, numbers, and symbols to protect accounts
- A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
- A weak spot in a system’s security defenses
- Malicious software that locks a user’s files and demands a ransom to restore access
- A process used to verify a user’s identity, typically through passwords or biometrics
9 Clues: A weak spot in a system’s security defenses • Someone who tests system security by trying to find vulnerabilities • Software designed to harm or exploit any programmable device, service, or network • When data is transformed into a format that is unreadable without a decryption key • ...
Cyber Security 2024-11-13
Across
- An unauthorised user who attempts to or gain access to a network
- A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
- Securing your online accounts with an extra layer of protection is called ____________________ authentication
- Computer programs that can block, detect, and remove viruses and other malware
Down
- A mechanism to create a secure connection between a computer and the network
- The unauthorised disclosure or unwanted exposure of confidential information
- The protection of digital information, as well as the integrity of the infrastructure
- Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
- Faking the sender’s email address to gain access to a secure network
9 Clues: An unauthorised user who attempts to or gain access to a network • Faking the sender’s email address to gain access to a secure network • A mechanism to create a secure connection between a computer and the network • The unauthorised disclosure or unwanted exposure of confidential information • ...
CISO Crossword Quiz - 2225 2025-08-02
Across
- Which secured number is not required for receiving money through UPI?
- What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
- What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
- What disguised link leads to a malicious webpage?
Down
- What method uses a QR code to lead users to fake webpage/payment sites?
- What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
- What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
- What should be strong and unique to protect your online accounts?
- What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
- What attack tricks people into clicking something different than they think?
10 Clues: What disguised link leads to a malicious webpage? • What should be strong and unique to protect your online accounts? • Which secured number is not required for receiving money through UPI? • What method uses a QR code to lead users to fake webpage/payment sites? • What attack tricks people into clicking something different than they think? • ...
RCAL Cipher Challenge August 2024-08-19
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
Compliance Crossword 2022-08-29
Across
- Accessing PHI without a _______ business reason is a HIPAA violation.
- Type of email used to send sensitive information
- All IPMG employee-owners have an ________ to report HIPAA violations
- Number of PHI direct identifiers
- The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
- Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
- When should a HIPAA violation be reported?
- Required when connecting device to a public network
- Malicious emails used to trick people into sharing login information
- Type of disposal of paper records that is a HIPAA violation
Down
- Staff can report compliance concerns without fear of _________.
- Where I can search for documents and other useful information related to compliance
- IPMG Manual to review cyber security requirements
- The company with six titles of Best Places to Work in Indiana
- You should always lock this when leaving unattended
- The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
- The name of the Corporate Compliance Manager
- Who to report HIPAA violations to, aside from the Corporate Compliance Manager
- The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
- Only ______ applications can be used to conduct IPMG business
20 Clues: Number of PHI direct identifiers • When should a HIPAA violation be reported? • The name of the Corporate Compliance Manager • Type of email used to send sensitive information • IPMG Manual to review cyber security requirements • You should always lock this when leaving unattended • Required when connecting device to a public network • ...
Cyber Security word search 2022-09-12
Across
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- a form of electronic cash
- A malicious threat to a group or organization that comes from someone within
- A secret word or phrase that is used to access a computer system or service.
- An internet traffic filter meant to stop unauthorized incoming.
- A language used to create and control the content on a website
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- it allows you to create a secure connection to another network using the internet.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
- Code that is embedded into the hardware of a computer.
- A form of malicious software that disguises itself as a harmless computer program
- The core of a computer’s operating system that houses the most essential functions of the computer.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- Confirmation of someone's identity, either using a password or a fingerprint.
- Creating a fake identity on a social network account
- An error, flaw, failure in a computer program
- is the string of numbers used to identify each computer using the internet on a network.
- Customizable additions to software for extra functionality.
21 Clues: a form of electronic cash • An error, flaw, failure in a computer program • Creating a fake identity on a social network account • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality. • A language used to create and control the content on a website • ...
C for Cyber Security 2022-10-10
Across
- A fraudulent email purportedly from a reputable company attempting to get personal information
- Something personal to you and should never be shared
- A malicious software designed to block access to a computer system until a sum of money is paid
- The process of identifying a user’s identity
- The process of taking plain text and scrambling it into an unreadable format
- A combination of the words “robot” and “network”
- A piece of software or application that displays advertisements on your computer
- A piece of hardware or software, used to keep intruders out
- An icon displayed along a web browser URL; indicates a secure mode
- the address of a website; check its validity before clicking on it
- Unauthorized access to a network, information systems or application
- Alert / Always on the lookout
Down
- A sequence of words or text used to control access to a computer; similar to a password
- A form of malware used by hackers to spy on you and your computer activities
- A flaw or weakness in a computer system that could be exploited to violate the system’s security
- Threatening behavior facilitated through electronic means such as texting
- In addition to passwords; provides better security
- Facebook, Twitter, Instagram etc. (Two Words)
- When a hacker changes source of an email so that it seems to come from a trusted source
- harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
20 Clues: Alert / Always on the lookout • The process of identifying a user’s identity • Facebook, Twitter, Instagram etc. (Two Words) • A combination of the words “robot” and “network” • In addition to passwords; provides better security • Something personal to you and should never be shared • A piece of hardware or software, used to keep intruders out • ...
Cyber Security Crossword Puzzle 2023-09-09
Across
- information
- used to navigate through the web
- verifies that the severs address matches the "from" address you see
- the action of verifying the identity of a user
- a device that sends packets to a computers network
- An encrypted connection over the internet from a device to a network
- tells other servers which servers are allowed to send emails using your business's domain name
- puts a digital signature on outgoing mail so servers can verify that an email from your domain actually was sent from your organization’s servers
- software designed to block access to a computer system until a sum of money is paid
- a piece of code cable of copying itself and spreading through a computer system
Down
- software that is designed to disrupt or damage anything in a computer system
- when software or data can be access through unauthorized personnel
- restricted access to something
- protect information by turning it into code
- A persons whos job is to sell things for the company
- the programs and operating information used by a computer
- To imitate something or trick someone
- usually in the form of emails, it is used to gain personal information by posing as well known companies
- interactive parts that work together to exchange information
- software designed to destroy computer viruses
20 Clues: information • restricted access to something • used to navigate through the web • To imitate something or trick someone • protect information by turning it into code • software designed to destroy computer viruses • the action of verifying the identity of a user • a device that sends packets to a computers network • A persons whos job is to sell things for the company • ...
Introduction to Cyber Security 2023-09-10
Across
- A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
- A component of a computer system that prevents unauthorized data access.
- a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
- A software update or repair published by developers to correct security flaws or enhance system performance.
- When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
- unwanted email messages
- Computer program that is used to provide customized adverts
- a field in which computers and networks are employed
- An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
- To imitate a character, users exploit internet platforms to acquire access or personal information.
- Manipulation used to obtain unauthorized access to a computer system
- software that is secretly installed on a user's device in order to acquire confidential information
- a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
- A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
- An unauthorized effort to gain access to a computer
- Malware that prevents an organization from accessing a file system.
- avoiding an organization's existing security mechanisms
- software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
- The process of protecting digital information over its full life cycle.
- A collection of personal computers used to infect malicious software.
20 Clues: unwanted email messages • An unauthorized effort to gain access to a computer • a field in which computers and networks are employed • avoiding an organization's existing security mechanisms • Computer program that is used to provide customized adverts • Malware that prevents an organization from accessing a file system. • ...
Cyber Security Participation puzzle 2023-03-17
Across
- attacks seeking out personal information
- malware that reproduces itself
- multiple steps to log in
- software that displays ads
- a mischeivious hacker
- lots of attackers preventing legitimate users
- scrambling data so it cant be read
- happens when a hacker is successful
- devices controlled by malware
- shield for data
- media changed to look authentic
Down
- software that checks for malware
- software that tracks you
- apps that give computers instructions
- network pro learning hacking techniques
- software that is harmful
- malware that makes you pay
- tricks users into clicking on harmful links
- malware pretending to be useful
- internet access at starbucks
20 Clues: shield for data • a mischeivious hacker • software that tracks you • software that is harmful • multiple steps to log in • software that displays ads • malware that makes you pay • internet access at starbucks • devices controlled by malware • malware that reproduces itself • malware pretending to be useful • media changed to look authentic • software that checks for malware • ...
MGregori's Cyber Security Crossword 2025-03-13
Across
- Investigates cybercrime evidence
- Captures network traffic data
- Physically isolated network security
- Converts data into code
- Overloads system with traffic
- Malicious software or programs
- Encrypts files, demands payment
- Blocks unauthorized network access
- Isolates untrusted code execution
- – Repeated password guessing attack
Down
- Fraudulent email for credentials
- Steals active user session
- web Hidden, encrypted online network
- Targets vendor software security
- Gains unauthorized higher access
- Takes advantage of vulnerabilities
- Disguised as legitimate software
- Malicious code triggers conditionally
- Network of infected computers
- Unknown software vulnerability
20 Clues: Converts data into code • Steals active user session • Captures network traffic data • Overloads system with traffic • Network of infected computers • Malicious software or programs • Unknown software vulnerability • Encrypts files, demands payment • Fraudulent email for credentials • Investigates cybercrime evidence • Targets vendor software security • ...
Cyber Safety and Security 2025-06-13
Across
- A crime where someone steals your personal information and uses it to commit fraud in your name.
- A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
- A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
- Creations of the human mind, such as inventions or artistic works, that are legally protected.
- Focuses on your right to control your personal information, including who collects it and how it's used.
- Protecting digital data from unauthorized access, use, or disclosure.
- The act of presenting someone else's work or ideas as one's own without proper citation.
- Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
- A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
- A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
- The trace of data you create as you navigate the online world, also called a "digital shadow".
- Any illegal activity facilitated by electronic devices and the internet.
- The use of electronic means to bully or harass another person, often through negative or false content.
- Data deliberately provided by an individual through online activities, such as information submitted on forms.
- Occurs when unauthorized individuals gain access to sensitive or confidential information.
- Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
- Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
- Encoding data so it can only be decrypted and read by authorized parties.
- Data collected automatically without intentional participation, like browsing history, often through cookies.
- Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
- A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- Ensuring data is accessible only to authorized individuals or systems.
- A legal right protecting original works of authorship like books, music, or computer programs.
- Software used to detect and remove malicious programs from computer systems.
- Malicious software used to harm or exploit a computer system, server, or network.
- A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.
26 Clues: Protecting digital data from unauthorized access, use, or disclosure. • Ensuring data is accessible only to authorized individuals or systems. • Any illegal activity facilitated by electronic devices and the internet. • Encoding data so it can only be decrypted and read by authorized parties. • ...
Cyber Cross word 2025-03-09
Cyber 2023-12-04
10 Clues: Data security • Cyber threats • Email scam tactic • Network protection • Private browsing tunnel • Fake website redirection • Data encryption extortion • Unique authentication method • Vulnerability exploitation tactic • Isolated software testing environment
Cloud (Data Centre) Controls and Cyber Controls 2020-10-15
Across
- Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
- BCP Tests and Wallet Cards are examples of business ___________ management documentation
- Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
- IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
- All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
- Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
- Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
- Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
- Information assets are ________ for vulnerabilities and reported for remediation
- Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
- _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
- Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
- To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
- Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
- IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed
15 Clues: Information assets are ________ for vulnerabilities and reported for remediation • BCP Tests and Wallet Cards are examples of business ___________ management documentation • Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans • ...
FIT E Final Quiz Vocab 2013-05-17
8 Clues: Pertaining to a computer • A peripheral, click click • Google, Yahoo, Bing, etc. • National Cyber Security Tool • Like a waiter for your computer • Where you plug in your flash drive • Short Term Memory for Your Computer • What you can download like Pages, Word, Outlook
crossword puzzle 2022-12-31
Across
- cyber security international exam
- an open source operating system
- a notebook computer
- our country
- computer language
- brain of the computer
- popular search engine
- microsoft browser
Down
- that we learning now
- social media platform
- we can't touch that in computer
- institute of network hardware software
- software which configure the hardware
- a developer platform
14 Clues: our country • computer language • microsoft browser • a notebook computer • that we learning now • a developer platform • social media platform • brain of the computer • popular search engine • we can't touch that in computer • an open source operating system • cyber security international exam • software which configure the hardware • institute of network hardware software
Security homes and Security 2024-05-06
Across
- Weak points in a system's security that may be exploited by cybercriminals in smart home devices.
- Popular voice-controlled smart assistant which raises privacy concerns regarding the data it collects.
- Security technique used to encode data sent between smart devices to prevent unauthorized access.
- A deceptive method often used to steal user credentials by mimicking legitimate requests or notifications, increasingly targeted at smart device users.
- A line of smart home products known for integrating security features but still poses risks if not properly managed.
Down
- A device often connected to smart home networks that can be manipulated remotely, highlighting the need for secure configurations.
- Unauthorized gathering of private information through electronic means in a connected home.
- Residences equipped with interconnected devices that can be managed remotely but may expose owners to cyber threats
- A type of malware that converts networked devices into controlled 'bots', often used in large-scale network attacks, including those on IoT devices.
- Measures and protocols implemented to protect smart home devices from cyber threats.
- Individuals who seek unauthorized access to networked devices, often targeting poorly secured smart home systems.
11 Clues: Measures and protocols implemented to protect smart home devices from cyber threats. • Unauthorized gathering of private information through electronic means in a connected home. • Weak points in a system's security that may be exploited by cybercriminals in smart home devices. • ...
Intro to Cyber Security 2023-09-07
Across
- the possibility of being attacked or harmed
- difficult
- the opposite of virus
- people who don't have access to
- malware denying users access to files in their own computer.
- information stolen without the owner's knowing
- coding a message
- forwards data between computer networks
- Adopt,develop
- find,identify,catch
Down
- converting to largely automatic operation
- quick to react
- a word or something that is used when logging in along with the username
- practice of sending fradulent emails
- supplier of equipment or a trader
- a person who commits scamming
- windows8,windows10,linux
- attack online
- copy of file kept for potential disasters
- designed to provide communications security of a computer network
20 Clues: difficult • attack online • Adopt,develop • quick to react • coding a message • find,identify,catch • the opposite of virus • windows8,windows10,linux • a person who commits scamming • people who don't have access to • supplier of equipment or a trader • practice of sending fradulent emails • forwards data between computer networks • converting to largely automatic operation • ...
Cyber Security Crossword Fun 2023-07-05
Across
- Collects sensitive information without consent
- Malicious software spread through networks
- Protects against malicious activity
- Intrudes remotely on a device
- Hidden internet used for criminal activity
- Malicious software disguised as a legitimate program
- Bullying that happens online
- stealing someone's identity
- Users are tricked into pressing something that is
- Internet that can't be accessed through standard search engines
Down
- Malicious software that encrypts until a ransom is paid
- White hat hacking
- access sensitive information
- Virus spread through infected email attachments
- Keeps track of computer keys pressed
- Displays unwanted advertisements
- tricking people on the internet
- Encrypted connection between 2 devices
- Networks being controlled with malicious software
- Malicious code that is triggered by something
- Measurement or analysis of individuals
21 Clues: White hat hacking • stealing someone's identity • access sensitive information • Bullying that happens online • Intrudes remotely on a device • tricking people on the internet • Displays unwanted advertisements • Protects against malicious activity • Keeps track of computer keys pressed • Encrypted connection between 2 devices • Measurement or analysis of individuals • ...
Cyber Security Awareness Quiz 2024-09-20
Cyber Security Awareness Month 2025-08-07
Across
- A software that is designed to cause damage to a computer, server, or network.
- A program that secretly tracks your online activity and collects personal information.
- The act of stealing and using another person's personal information without their permission.
- A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- Using social media to gather personal information about a target to gain their trust.
- A type of denial-of-service attack that floods a server with a massive amount of traffic, making it unavailable to users.
- A digital signature that verifies the identity of a website or user.
- A code that restricts access to your phone or computer.
- The "lock" icon you see in your browser when a website is secure, ensuring a private connection.
- A person who breaks into computer systems, often for illegal purposes.
- A person who uses hacking to promote a political or social cause.
- course! Here are the clues and answers in the format you requested, with the answer first, followed by a space, and then the clue.
- The use of a fake email address to trick a recipient into believing the email is from a different sender.
- Clues
- A service that encrypts your internet traffic and hides your IP address, protecting your online privacy.
- me know if you would like me to create more clues or if you need the puzzle in a different format!
- A type of malicious software that tricks users into downloading or buying fake antivirus software by displaying fake warnings.
- A set of rules and procedures for communicating data between computer systems.
Down
- A type of malware that secretly records your keystrokes to steal your login credentials and other sensitive information.
- Clues
- The practice of protecting your data and systems from digital attacks.
- A secret word or phrase used to prove your identity to gain access to a computer or other account.
- A network that is not secure and can be accessed by anyone, making it a target for hackers.
- The process of converting plain text into an unreadable code to prevent unauthorized access.
- A type of malicious software that can replicate itself and spread to other computers.
- A deceptive link that tricks you into clicking it, often leading to a malicious website or download.
- Clues
- A fake website designed to deceive you and steal your information.
- A type of scam where a criminal pretends to be a legitimate person or organization to steal personal information.
- A security vulnerability that is exploited by attackers before a patch or fix is available.
- What you should do with your password on a regular basis.
- An intrusion prevention system that monitors a network for malicious activity and takes action to block it.
- An authentication method that requires two or more forms of verification to gain access to a resource.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A type of malware that gives an attacker full administrative control over a system, often without the user's knowledge.
35 Clues: Clues • Clues • Clues • A code that restricts access to your phone or computer. • What you should do with your password on a regular basis. • A person who uses hacking to promote a political or social cause. • A fake website designed to deceive you and steal your information. • A digital signature that verifies the identity of a website or user. • ...
CIS120-Cyber Security Puzzle 2025-08-25
Across
- cyberattacks for financial gain.
- an ever growing digital world.
- Key code to unlock or open .
- protects your software.
- a fix for software
- a +10 password.
- Falsifying negative comments on web.
- using body parts to access.
- strongly motivated by their beliefs.
Down
- user must pay fee to restore.
- cause disruption and panic.
- password or general.
- process a user has permission.
- Stands for malicious & software.
- falsifying identity.
- malware and social engineering.
- (-1) - (-10) password.
- protects you from attackers.
- copying itself into another program.
- selling their knowledge of vulnerabilities.
20 Clues: a +10 password. • a fix for software • password or general. • falsifying identity. • (-1) - (-10) password. • protects your software. • cause disruption and panic. • using body parts to access. • Key code to unlock or open . • protects you from attackers. • user must pay fee to restore. • an ever growing digital world. • process a user has permission. • malware and social engineering. • ...
cyber security crossword puzzle 2021-03-17
Across
- a vulnerability hackers will take advantage of
- if someone gave u a ps5 for Christmas but you open the box and its socks
- canned meat but also annoying emails
- what we deal with trying to watch pirated movies
- purposely put on your computer to steal your information
- tik tok instagram facebook snapchat are all examples of...
- slimy little animal that lives in the dirt and will ruin your computer
- the one thing you don't want on your computer
- after 10pm you can probably find me in a discord...
- you could say the zodiac killer put an ... on his letters to the police
Down
- where organized information is stored
- can be compared to finding dory
- we use one to complete our security labs
- seems okay but contains malware
- advertisements displayed by software
- our teachers send us way too many of these
- using social tactics to get information
- what comes with phishing emails
- tree diagram of the processes that a product goes through
- when the internet is down we turn this off and turn it back on
20 Clues: can be compared to finding dory • seems okay but contains malware • what comes with phishing emails • advertisements displayed by software • canned meat but also annoying emails • where organized information is stored • using social tactics to get information • we use one to complete our security labs • our teachers send us way too many of these • ...
Cyber Security Awareness Month 2021-10-15
Across
- Hard to detect both by Users.
- The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
- An attack focusing on people rather than technology.
- A form of malware that monitors user activities and reports them to an external their party.
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- Something that shows up in an email.
- Threats Malware is defined as any device.
Down
- A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
- The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
- A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- a dishonest scheme; a fraud.
- Alerts used as a warning of danger.
- The ultimate call control center that gives customers full control of all scam protection options.
- The act of falsifying the identity of the source of a communication or interaction.
- Identity and Privacy Protection.
- Someone attempting to create Identity fraud.
- A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
- An attempt by hackers to damage or destroy a computer network or system.
- A security tool, which may be a hardware or software solution that is used to filter network traffic.
22 Clues: a dishonest scheme; a fraud. • Hard to detect both by Users. • Identity and Privacy Protection. • Alerts used as a warning of danger. • Something that shows up in an email. • Threats Malware is defined as any device. • Someone attempting to create Identity fraud. • An attack focusing on people rather than technology. • ...
Basics of Cyber Security 2021-06-29
Across
- threatening behavior facilitated through electronic means such as texting.
- a wireless technology standard used over short distances using short-wavelength UHF radio waves.
- hardware or software designed to prevent unauthorized access to or from a private network.
- should be constructed of upper and lower case letters, numbers, and special characters.
- fraudulent email purportedly from a reputable company attempting to get personal information.
- A sequence of words or text used to control access to a computer; similar to a password.
- The address of a webpage. Check the validity of it before clicking on it.
- the process of taking plain text and scrambling it into an unreadable format.
- a flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
- harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- facebook, Twitter, Instagram, etc. (Two words)
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- verifying identity.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Unauthorized access to a network, information systems, or application.
- the “A” in the C-I-A Triad. It ensures authorized users have access.
20 Clues: verifying identity. • facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • the “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Security Awareness 2022 2022-07-19
Across
- A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
- A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
- The recovery of data following computer failure or loss
- Another kind of malware that allows cybercriminals to remotely control your computer
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
- Malware that passes information about a computer user’s activities to an external party
- Obtaining services by using someone else’s resources
- A device or software designed to prevent unauthorized access to a computer or network
- A term related to the malicious concept of a botnet
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
- high-speed internet access
Down
- A flaw or weakness that can be used to attack a system or organization
- Computer that provides data or services to other computers over a network
- An app on your phone that generates a code to add an extra level of security to a password
- The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
- A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
- Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
- Method used by criminals to obtain financial or other confidential information
- It's not really a _____, it's just someone else's computer
- This should be at least 8 characters long
- The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
- Something of value to a person, business, or organization
- Something that could cause an organization not to meet one of its objectives
- Malware that replicates itself so it can spread to infiltrate other computers
26 Clues: high-speed internet access • This should be at least 8 characters long • A term related to the malicious concept of a botnet • Obtaining services by using someone else’s resources • The recovery of data following computer failure or loss • Something of value to a person, business, or organization • It's not really a _____, it's just someone else's computer • ...
C for Cyber Security 2022-10-10
Across
- A form of malware used by hackers to spy on you and your computer activities
- Unauthorized access to a network, information systems or application
- A piece of software or application that displays advertisements on your computer
- When a hacker changes source of an email so that it seems to come from a trusted source
- A sequence of words or text used to control access to a computer; similar to a password
- The process of taking plain text and scrambling it into an unreadable format
- A piece of hardware or software, used to keep intruders out
- Threatening behavior facilitated through electronic means such as texting
- In addition to passwords; provides better security
- A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
- Something personal to you and should never be shared
- A malicious software designed to block access to a computer system until a sum of money is paid
- media Facebook, Twitter, Instagram etc. (Two Words)
- The process of identifying a user’s identity
- A combination of the words “robot” and “network”
- the address of a website; check its validity before clicking on it
- A fraudulent email purportedly from a reputable company attempting to get personal information
- Alert / Always on the lookout
- harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
- An icon displayed along a web browser URL - indicates a secure mode
20 Clues: Alert / Always on the lookout • The process of identifying a user’s identity • A combination of the words “robot” and “network” • In addition to passwords; provides better security • media Facebook, Twitter, Instagram etc. (Two Words) • Something personal to you and should never be shared • A piece of hardware or software, used to keep intruders out • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
25 Cyber Security Facts 2023-08-30
Across
- is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- communications standard that enables application programs and computing devices to exchange messages over a network.
- the capacity at which a network can transmit data.
- a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
- is a malware designed to deny a user or organization access to files on their computer.
- the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- storage mode of computer data storage in which digital data is stored on servers in off-site locations.
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- a system of signals or symbols for communication.
- refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
- malware designed to collect online banking credentials and other sensitive information from infected machines
Down
- technique used by fraudsters to get control of your phone number.
- the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
- software used by cybercriminals to gain control over a target computer or network.
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
- is a type of security measure known as challenge-response authentication.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- information that has been translated into a form that is efficient for movement or processing
- the method by which information is converted into secret code that hides the information's true meaning.
- he hidden collective of internet sites only accessible by a specialized web browser.
- a formal request to an authority for something
- an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
- The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
25 Clues: a formal request to an authority for something • a system of signals or symbols for communication. • the capacity at which a network can transmit data. • technique used by fraudsters to get control of your phone number. • is a type of security measure known as challenge-response authentication. • ...
Cyber Security Crossword Puzzle 2025-03-12
Across
- viruses, worms, and ransomware
- security system that monitors traffic
- records keystrokes to steal passwords
- manipulate people to give data
- encrypts internet connections
- delivery of computing services
- convert data into coded format
- fixes vulnerabilities or improves security
- secretly gathers user information
- network of infected computers
- encrypts a victims data
- verifying the identity of user
Down
- analyze business data for decisions
- collection and analysis of data
- bypassing normal authentication
- process store distribute information
- impersonate a trustworthy entity
- overwhelms a network with excessiveness
- confidential information is stolen
- determine whats allowed for access
20 Clues: encrypts a victims data • encrypts internet connections • network of infected computers • viruses, worms, and ransomware • manipulate people to give data • delivery of computing services • convert data into coded format • verifying the identity of user • collection and analysis of data • bypassing normal authentication • impersonate a trustworthy entity • ...
Integrity & Compliance Week Crossword 2024-04-29
Across
- Corporate adherence to laws and ethics
- Cloud service's stamp of security approval from Uncle Sam (abbr.)
- Golden State's guard of personal digital space (abbr.)
- Core value of honesty and strong moral principles
- Global benchmark for quality and safety (abbr.)
- Point Security Cyber defense where your network meets the world
- Expert in construction cost data and procurement efficiency
- Diversified industrial growth company with a knack for innovation
Down
- Assurance report for service organizations (abbr.)
- U.S. regulation keeping defense-related tech secure (abbr.)
- Countries Nations where trade is a no-go
- Protector of your medical secrets (abbr.)
- Non-citizens with potential access to controlled tech
- Credit card's shield against data theft (abbr.)
- California's updated privacy rights legislation, effective 2023 (abbr.)
- Controls exports for national security (abbr.)
- Compliance Ensuring cross-border business respects international rules
- Framework safeguarding personal data across the pond (abbr.)
18 Clues: Corporate adherence to laws and ethics • Countries Nations where trade is a no-go • Protector of your medical secrets (abbr.) • Controls exports for national security (abbr.) • Credit card's shield against data theft (abbr.) • Global benchmark for quality and safety (abbr.) • Core value of honesty and strong moral principles • ...
Christmas Cyber Security 2022-11-23
13 Clues: The P in ODPO • Malicious Spam • A false website • Malicious Software • Illness in an email • Harmless Junk Email • The main man at Xmas • A threat from within • A red nosed reindeer • Malicious Text Messages • The Grinch's first name • Responsible for reporting • Information with no context
Vishing Puzzle 2022-04-05
Basics of Cyber Security 2021-06-29
Across
- a wireless technology standard used over short distances using short-wavelength UHF radio waves.
- verifying identity.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- hardware or software designed to prevent unauthorized access to or from a private network.
- the “A” in the C-I-A Triad. It ensures authorized users have access.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- fraudulent email purportedly from a reputable company attempting to get personal information.
- a flaw or weakness in a computer system that could be exploited to violate the system’s security.
- fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
- Unauthorized access to a network, information systems, or application.
- the process of taking plain text and scrambling it into an unreadable format.
- facebook, Twitter, Instagram, etc. (Two words)
- threatening behavior facilitated through electronic means such as texting.
- The address of a webpage. Check the validity of it before clicking on it.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- A sequence of words or text used to control access to a computer; similar to a password.
- harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- should be constructed of upper and lower case letters, numbers, and special characters.
- security tool that creates a secure, encrypted connection between you and the Internet (acronym).
20 Clues: verifying identity. • facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • the “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
BIOMETRICS and CYBER SECURITY 2023-05-25
Across
- are no longer needed in home security because of biometric security systems
- a bank that uses heartrate to confirm a customer
- a type of recognition
- the type of biometrics that walking, speaking and typing habit
- a type of recognition
- the type of biometrics that uses the structure of your body
- a college that is developing a camera that can scan irises of people from 10 meters away
- the type of biometrics that uses DNA and blood
- the unique pattern in a person finger is used in vein recognition
- banks use these as part of there biometric security systems
- used in airport security
- a person’s walking style is used, because everyone walks a bit differently
Down
- a type of recognition
- a security used to authorize transaction in financial and money
- uses the distinctive frequencies, pitch and tone of a person’s voice
- they worry that biometric violate personal privacy
- has a digital photograph, fingerprint or Iris
- an airport where they are using 80 camera
- is used by the US as an electronic passport
- the most common type of biometrics used in the healthcare profession
- uses facial anatomy to ID someone
- it is one of the most extensively used biometric verficiation systems
- a bank that uses speech recognition
- used in law enforcement for criminal ID
- a type of recognition
25 Clues: a type of recognition • a type of recognition • a type of recognition • a type of recognition • used in airport security • uses facial anatomy to ID someone • a bank that uses speech recognition • used in law enforcement for criminal ID • an airport where they are using 80 camera • is used by the US as an electronic passport • has a digital photograph, fingerprint or Iris • ...
Cyber Security Term Puzzle 2023-09-10
Across
- "Protecting partnerships from cyber threats."
- "Unwanted inbox clutter."
- "Digital explorer of systems."
- "Malicious software causing harm."
- Theft "Stealing your digital identity."
- "Digital identity impersonation."
- "Proving your identity securely."
- "Software fix for vulnerabilities."
- "Private internet tunnel."
- "Unauthorized data escape."
- "Email authenticity verifier."
- "Secure data transmission protocols."
Down
- "Online home for your website."
- "Your gateway to the online world."
- "Data hostage situation”
- "Data lock with secret code."
- "Email authentication guardian."
- “Locking doors to data”
- "Deceptive emails, beware!"
- "Guardian against digital infections."
20 Clues: “Locking doors to data” • "Data hostage situation” • "Unwanted inbox clutter." • "Private internet tunnel." • "Deceptive emails, beware!" • "Unauthorized data escape." • "Data lock with secret code." • "Digital explorer of systems." • "Email authenticity verifier." • "Online home for your website." • "Email authentication guardian." • "Digital identity impersonation." • ...
Algorithms, Programming & Cyber Security 2025-12-08
Across
- When someone tries to break into computers (2 words)
- Changing a value from one type to another, like number to text
- A way to make the computer choose what to do if something is true
- Looking through a list one by one until you find it (2 words)
- A password that is hard for someone else to guess (2 words)
- A name that stores a piece of information like a number or word
- A whole number without decimals
- A method to put a list of items in order by comparing each pair (2 words)
- Finds the remainder when one number is divided by another (2 words)
- What the computer does if nothing else is true
- Checks another condition if the first one was false
- Used to compare two values like bigger or smaller (2 words)
- Adding one to a number
- Software that is designed to harm a computer
Down
- Text made up of letters, numbers, or symbols
- Tricking people to get information or access (2 words)
- Repeats actions a set number of times
- A loop inside another loop (2 words)
- Subtracting one from a number
- Repeats actions until a condition is no longer true
- The kind of information something is, like number or text (2 words)
- Searching a sorted list by repeatedly splitting it in half (2 words)
- Finds the remainder after division
- A method to sort a list by splitting and combining it (2 words)
- A number that has a decimal point
- A type that can only be True or False
- Checks if at least one condition is true
- Text or numbers typed by the person using the program (2 words)
- Checks if two conditions are both true
29 Clues: Adding one to a number • Subtracting one from a number • A whole number without decimals • A number that has a decimal point • Finds the remainder after division • A loop inside another loop (2 words) • Repeats actions a set number of times • A type that can only be True or False • Checks if two conditions are both true • Checks if at least one condition is true • ...
In the World of IT: Crime and Security 2024-11-19
Across
- exclusive legal right.
- Ensures that information is accessible to authorize persons when required without delay.
- Action derived from intelligent threats to violate the security of the system
- Security hole.
- Ensures that that the computer users or those who access information are who they claim to be.
- Both sending and collecting of information from unsuspecting people.
- An action that has the potential to compromise and/or violate security.
- Work on its own without attaching itself to file or programs.
- Pointing you to a malicious and illegitimate website by redirecting the legitimate URL.
- This involves actions that supplement the precautionary measures.
Down
- One of the layers of security that protects personnel, hardware, programs, networks, and data from physical threat.
- Term used for actions taken by someone to gain unauthorizes access to a computer.
- A person who breaks into computer systems.
- Sending emails purporting to be from reputable companies to gain personal information.
- Characteristics of the culture of computers, information, technology, and virtual reality.
- Often sent as email attachment or download with the intent of infecting the computer.
- Excessive gaming behavior.
- Action take in advance to protect the system against threats.
- Infects your computer (viruses, worms, spyware.
- One of the layers of security that allows the system to set security rules to determine what is displayed to which user.
20 Clues: Security hole. • exclusive legal right. • Excessive gaming behavior. • A person who breaks into computer systems. • Infects your computer (viruses, worms, spyware. • Action take in advance to protect the system against threats. • Work on its own without attaching itself to file or programs. • This involves actions that supplement the precautionary measures. • ...
Vishing Puzzle 2022-04-05
CTF-CW-7 2025-11-17
Across
- Making scrambled data readable again
- Actively searching for cyber attackers
- Assessment by outside professionals
- API documentation and tryout platform at Tekion.
- Automated remote data collection
- Technique hiding original data with modified content
- Record of all valuable items
- Web application firewall by Akamai that protects Tekion�s websites.
- Evaluation or court case
- Technique making data unclear while preserving its utility
Down
- Using technology to perform security tasks automatically
- Security model: never trust, always verify
- Gaining higher access than intended
- Immediate patch for a critical bug
- Documentation of all personal data processing activities
- Learning sessions for staff
- Smart procurement tool used by Tekion for purchasing.
- European Union's comprehensive artificial intelligence regulation
- Updating code to fix holes�again
- A set of documented IT procedures
20 Clues: Evaluation or court case • Learning sessions for staff • Record of all valuable items • Automated remote data collection • Updating code to fix holes�again • A set of documented IT procedures • Immediate patch for a critical bug • Gaining higher access than intended • Assessment by outside professionals • Making scrambled data readable again • ...
BROWSING SAFELY 2025-06-07
Across
- ILLEGAL ENTRY
- CRIMINAL ACTIVITY
- PREVENT FROM UNAUTHORISED ACCES
- HARASSING PEOPLE
- SPOOFING HOAXING OR MISLEADING
- THEFT STEALING IDENTITY
Down
- BEFRIENDING
- SECURITY PRECAUTIONS FROM CYBER ATTACK
- SENDING AN E-MAIL;MISLEADING;TRUSTED PERSON
- UNETHICAL HACKER
- ANOTHER NAME OF VITAL;UNDER
- FRAUD ILLEGAL METHOD;BELONG TO BANK
12 Clues: BEFRIENDING • ILLEGAL ENTRY • UNETHICAL HACKER • HARASSING PEOPLE • CRIMINAL ACTIVITY • ANOTHER NAME OF VITAL;UNDER • PREVENT FROM UNAUTHORISED ACCES • THEFT STEALING IDENTITY • SPOOFING HOAXING OR MISLEADING • SENDING AN E-MAIL;MISLEADING;TRUSTED PERSON • FRAUD ILLEGAL METHOD;BELONG TO BANK • SECURITY PRECAUTIONS FROM CYBER ATTACK
Iroquois Cyber Security Crossword 2022-09-15
Across
- Multi Factor Authentication
- When you are unsure a URL is real
- What not to do for unknown texts
- What to do to numbers of unwanted texts
- A classic in person attack
- Phone based social engineering
- malicious software
- A way to harvest data
- Subtle signs of danger
- Bypassing physical access controls
- Phishing that targets users
- How Colonial Pipeline was attacked
- Email based social engineering
Down
- Social Media used to gather info
- Used to separate parts of a URL
- The art of deceiving
- Scrambles data in a computer
- What you hover over in an email
- Text based Social Engineering
- Button in Outlook to report emails
- A website address
- Who does cybercrime target?
- Type of drive used to store data
- Used for Man in the middle attacks
24 Clues: A website address • malicious software • The art of deceiving • A way to harvest data • Subtle signs of danger • A classic in person attack • Multi Factor Authentication • Phishing that targets users • Who does cybercrime target? • Scrambles data in a computer • Text based Social Engineering • Phone based social engineering • Email based social engineering • ...
Cyber Security Terminology Puzzle 2023-01-25
Across
- any type of harmful software
- software that shields against viruses
- used to signin and protect accounts
- creates secure connection
- data scrambled for safe sending
- unique string of numbers
- free wifi used in public
- hacker that hacks for profit
- malware locks user until payment
- infects systems
Down
- being mean online
- online storage
- malware pretending to be useful
- secure identification of ones account
- malware that uses clicks
- overloading a network
- attacks seeking out personal information
- malware that tracks you
- shields unauthorized access of data
- using personal devices in workplace
- malware software that uses ads
21 Clues: online storage • infects systems • being mean online • overloading a network • malware that tracks you • malware that uses clicks • unique string of numbers • free wifi used in public • creates secure connection • any type of harmful software • hacker that hacks for profit • malware software that uses ads • malware pretending to be useful • data scrambled for safe sending • ...
Cyber-Security Amanda Peart 2020-10-21
Across
- C of the CIA triad
- computer operating system for Apple Computer's MacIntosh line of personal computers and workstations
- the physical components that a computer system requires to function
- a bit of data, which is sent by a sender, to a recipient
- the software that supports a computer's basic functions
- a person who uses computers to gain unauthorized access to data
- I if the CIA Triad
- to decode (a message) with or without previous knowledge of its key
- encompasses measures taken to improve the security of an application
- a file that exists of cells in rows and columns and can help arrange, calculate and sort data
- a legal instrument governing the use or redistribution of software
- heads the national effort to investigate and prosecute internet crimes, including "cyber-based terrorism, espionage, computer intrusions, and major cyber fraud"
- the programs and other operating information used by a computer
- A fo the CIA Triad
Down
- allows the user to interact with the computer by typing in commands
- caused 1 billion user accounts may have been comprised
- nothing to do with a certain well-recognized US intelligence agency
- the field of work in which someone manages one or more systems
- convert (information or data) into a cipher or code, especially to prevent unauthorized access
- each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet
- the art of writing or solving codes
- the study of codes, or the art of writing and solving them
- a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword
- A piece of software that prevents pop-up advertisements from being displayed
- a hardware or software component that stores data
- activity that either targets or uses a computer, a computer network or a networked device
- a software program that runs on your computer
- job is to protect online data from being compromised
- developed by Microsoft Corporation to run personal computers
- a way for software developers to fine-tune a product to make it the best it can be
30 Clues: C of the CIA triad • I if the CIA Triad • A fo the CIA Triad • the art of writing or solving codes • a software program that runs on your computer • a hardware or software component that stores data • job is to protect online data from being compromised • caused 1 billion user accounts may have been comprised • the software that supports a computer's basic functions • ...
Cyber Security Awareness Month 2021-10-08
Across
- Results in the loss of contact details if it were stolen
- What does cybersecurity have in common with Halloween?
- _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
- What you will cause IT to have if you get a virus on your computer
- Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
- Hackers ____ their identity.
- This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
- A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
- What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
- This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
- You don't want to be the business with the most _____ network on the block.
- These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
- How your computer might act once infected by a virus.
- Happens on Halloween night
- If you click on a phishing email you might want to ____ your job
- For hackers, it’s all about the _____ and it’s their treat they succeed
- These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
- A bridge between two computer networks.
- In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
- The process of translating plaintext into ciphertext.
20 Clues: Happens on Halloween night • Hackers ____ their identity. • A bridge between two computer networks. • How your computer might act once infected by a virus. • The process of translating plaintext into ciphertext. • What does cybersecurity have in common with Halloween? • Results in the loss of contact details if it were stolen • ...
