cyber security Crossword Puzzles

Cyber and digital literacy 2024-04-30

Cyber and digital literacy crossword puzzle
Across
  1. - Knowledge of cyber risks and precautions.
  2. - Writing instructions for computers.
  3. - Legal regulations governing cyberspace.
  4. - Right to control personal information.
  5. - Internet-based currency for online transactions.
  6. - Verification of a user's identity.
  7. - Individuals gaining unauthorized access to systems.
  8. - Global network connecting computers worldwide.
  9. - Practices to maintain online safety and security.
  10. - Accountability for one's online actions.
  11. - Gap between those with and without access to technology.
  12. - Banking services conducted over the internet.
  13. - Investigation of cybercrimes.
  14. - Fraudulent acquisition of someone's identity.
  15. - Representation of a person's online presence.
  16. - Study of human behavior in cyberspace.
  17. - Platforms for online social interaction.
  18. - Conflict conducted in the digital realm.
  19. - Programs and applications for computers.
  20. - Fraudulent attempt to obtain sensitive information.
  21. - Ethical behavior in the digital world.
Down
  1. - Education on protecting against cyber threats.
  2. - Electronic system for online financial transactions.
  3. - Gathering and analyzing digital threat information.
  4. - Securing data by converting it into a code.
  5. - Secret word or phrase to access a system.
  6. - Harassment or intimidation online.
  7. - Person raised in the digital age.
  8. - Measures to protect against cyber attacks.
  9. - Protection of digital systems from cyber threats.
  10. - Understanding of cyber threats and safety measures.
  11. - Protection against cyber-related losses.
  12. - Encoding data for secure transmission.
  13. - Shared values and norms in the digital community.
  14. - Barrier to block unauthorized access to a network.
  15. - Rights related to digital content and technology.
  16. - Mobile phone with advanced capabilities.
  17. - Criminal activities conducted via digital means.
  18. - Potential dangers to digital systems.
  19. - Promoting products or services online.
  20. - Responsible use of technology.
  21. - Unsolicited and often irrelevant messages.
  22. - Software designed to harm or infiltrate a system.
  23. - Protection of sensitive information.
  24. - Ability to effectively use digital tools and technologies.
  25. - Trail of data left by online activity.
  26. - Deliberate exploitation of computer systems.
  27. - Malicious software that replicates itself.
  28. - Unique name used to identify oneself online.
  29. - System of interconnected computers.

50 Clues: - Investigation of cybercrimes.- Responsible use of technology.- Person raised in the digital age.- Harassment or intimidation online.- Verification of a user's identity.- Writing instructions for computers.- System of interconnected computers.- Protection of sensitive information.- Potential dangers to digital systems....

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. - Knowledge of cyber risks and precautions.
  2. - Writing instructions for computers.
  3. - Legal regulations governing cyberspace.
  4. - Right to control personal information.
  5. - Internet-based currency for online transactions.
  6. - Verification of a user's identity.
  7. - Individuals gaining unauthorized access to systems.
  8. - Global network connecting computers worldwide.
  9. - Practices to maintain online safety and security.
  10. - Accountability for one's online actions.
  11. - Gap between those with and without access to technology.
  12. - Banking services conducted over the internet.
  13. - Investigation of cybercrimes.
  14. - Fraudulent acquisition of someone's identity.
  15. - Representation of a person's online presence.
  16. - Study of human behavior in cyberspace.
  17. - Platforms for online social interaction.
  18. - Conflict conducted in the digital realm.
  19. - Programs and applications for computers.
  20. - Fraudulent attempt to obtain sensitive information.
  21. - Ethical behavior in the digital world.
Down
  1. - Education on protecting against cyber threats.
  2. - Electronic system for online financial transactions.
  3. - Gathering and analyzing digital threat information.
  4. - Securing data by converting it into a code.
  5. - Secret word or phrase to access a system.
  6. - Harassment or intimidation online.
  7. - Person raised in the digital age.
  8. - Measures to protect against cyber attacks.
  9. - Protection of digital systems from cyber threats.
  10. - Understanding of cyber threats and safety measures.
  11. - Protection against cyber-related losses.
  12. - Encoding data for secure transmission.
  13. - Shared values and norms in the digital community.
  14. - Barrier to block unauthorized access to a network.
  15. - Rights related to digital content and technology.
  16. - Mobile phone with advanced capabilities.
  17. - Criminal activities conducted via digital means.
  18. - Potential dangers to digital systems.
  19. - Promoting products or services online.
  20. - Responsible use of technology.
  21. - Unsolicited and often irrelevant messages.
  22. - Software designed to harm or infiltrate a system.
  23. - Protection of sensitive information.
  24. - Ability to effectively use digital tools and technologies.
  25. - Trail of data left by online activity.
  26. - Deliberate exploitation of computer systems.
  27. - Malicious software that replicates itself.
  28. - Unique name used to identify oneself online.
  29. - System of interconnected computers.

50 Clues: - Investigation of cybercrimes.- Responsible use of technology.- Person raised in the digital age.- Harassment or intimidation online.- Verification of a user's identity.- Writing instructions for computers.- System of interconnected computers.- Protection of sensitive information.- Potential dangers to digital systems....

iSOC Crossword - Basic 2014-10-14

iSOC Crossword - Basic crossword puzzle
Across
  1. Viruses, Worms and Trojans etc
  2. passwords should always be at least ______ characters long.
  3. The state of being free from danger or threat.
  4. A software that is designed to detect and destroy computer viruses.
  5. Be a good cyber friend, don't send e-mails and instant ______ to anyone.
  6. Always _____ your computer when you leave your desk.
  7. Do not ______ your password or username with anyone else.
  8. Never share your _______ with another person.
  9. Password should be changed every 2-3 months.
  10. Be cyber savvy, be a ______ user.
Down
  1. A ____ is a web page address.
  2. A computer _______ is a group of interconnected computers.
  3. Classic form of Malware
  4. your password is like a _______, use it regularly, change it often and do not share it with anyone else.
  5. Even when Antivirus _______ is installed and updated, your computer is never 100% safe
  6. A person who steals information from your system without you knowing about it.
  7. A _______ is a program that allows a user to find view hear and interact with materials on the internet.
  8. The A in APT
  9. Protect your laptop or cellphone by treating it like _____.
  10. Security is in your own _______.

20 Clues: The A in APTClassic form of MalwareA ____ is a web page address.Viruses, Worms and Trojans etcSecurity is in your own _______.Be cyber savvy, be a ______ user.Password should be changed every 2-3 months.Never share your _______ with another person.The state of being free from danger or threat.Always _____ your computer when you leave your desk....

Cyber Security 1 2023-04-23

Cyber Security 1 crossword puzzle
Across
  1. Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
  2. The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
  3. An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
  4. An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
  5. The process of converting data into a code to prevent unauthorized access.
  6. A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
  7. A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
  1. Malicious software designed to infiltrate or damage computer systems, networks, or devices.
  2. A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
  3. A type of malicious software that encrypts a victim's files and demands payment for their release.
  4. The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
  5. A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
  6. A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
  7. A security system that controls incoming and outgoing network traffic based on predetermined rules.
  8. A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.

15 Clues: The process of converting data into a code to prevent unauthorized access.Malicious software designed to infiltrate or damage computer systems, networks, or devices.A type of malicious software that encrypts a victim's files and demands payment for their release....

Cyber Security Crosswords 2024-10-10

Cyber Security Crosswords crossword puzzle
Across
  1. Malware yang bisa menggandakan diri lalu menyebarkannya ke dalam semua jaringan tanpa adanya campur tangan dari pengguna
  2. Perangkat atau perangkat lunak yang mengontrol lalu lintas jaringan masuk dan keluar untuk melindungi jaringan dari ancaman
  3. Kebijakan keamanan informasi adalah serangkaian aturan dan prosedur yang ditetapkan untuk melindungi ... dan informasi dalam organisasi
  4. ... data merupakan salah satu antisipasi ransomware
  5. Malware yang menyamar sebagai software atau file yang aman
  6. Untuk menutup kerentanan keamanan yang dapat dieksploitasi oleh penyerang dan memastikan perangkat lunak berfungsi dengan baik
  7. Main-in-the-... merupakan suatu serangan siber dengan cara menyadap untuk mencuri informasi
  8. Teknik manipulasi untuk mendapatkan informasi sensitif dengan memanfaatkan kelemahan dari sisi SDM, bukan lewat kerentanan teknis
Down
  1. Salah satu klasifikasi informasi di BCA
  2. Autentikasi tambahan untuk melindungi akun diakses pihak tidak berkepentingan
  3. Perangkat lunak yang dirancang untuk merusak, mengganggu, atau mendapatkan akses tidak sah ke sistem komputer atau jaringan
  4. Menggunakan kombinasi huruf besar, huruf kecil, angka, dan ... merupakan salah satu langkah untuk memperkuat password
  5. Kejahatan digital yang mengincar informasi atau data sensitif korban melalui email, unggahan media sosial,voice call, atau pesan teks
  6. Salah satu serangan siber yang menyerang suatu sistem atau website dengan mengirimkan fake traffic
  7. ...-day exploit adalah serangan yang memanfaatkan kerentanan perangkat lunak yang belum diketahui oleh pengembang dan belum diperbaiki

15 Clues: Salah satu klasifikasi informasi di BCA... data merupakan salah satu antisipasi ransomwareMalware yang menyamar sebagai software atau file yang amanAutentikasi tambahan untuk melindungi akun diakses pihak tidak berkepentinganMain-in-the-... merupakan suatu serangan siber dengan cara menyadap untuk mencuri informasi...

Cyber security - 2 2025-07-09

Cyber security - 2 crossword puzzle
Across
  1. A modern security approach that provides integrated security across distributed systems.
  2. A framework for developing, implementing, and monitoring IT governance.
  3. Ensuring that information is accessible only to those authorized to have access.
  4. A form of public key encryption based on elliptic curves.
  5. A cryptographic technique for verifying the authenticity of digital messages.
  6. Strategies and tools to prevent unauthorized data transfer or access.
Down
  1. Documentation of who handled evidence and when.
  2. Software used to collect, preserve, and analyze digital evidence.
  3. Routine practices for maintaining system health and improving security.
  4. Tools that monitor end-user devices to detect and respond to threats.
  5. Part of the internet not indexed by standard search engines and often used for illegal activity.
  6. An attack that injects malicious scripts into content viewed by users.
  7. An incident in which sensitive data is accessed without authorization.
  8. An attack that floods a system with traffic to make it unavailable.
  9. A method or code that takes advantage of a vulnerability.

15 Clues: Documentation of who handled evidence and when.A form of public key encryption based on elliptic curves.A method or code that takes advantage of a vulnerability.Software used to collect, preserve, and analyze digital evidence.An attack that floods a system with traffic to make it unavailable....

Cyber security - 1 2025-07-09

Cyber security - 1 crossword puzzle
Across
  1. Mechanisms that restrict access to systems and data.
  2. surface, The sum of all the points in a system that are exposed to an attacker.
  3. A security measure where a device is physically isolated from unsecured networks.
  4. A prolonged and targeted cyberattack.
  5. Becoming desensitized to frequent security alerts.
  6. Verifying the identity of a user, device, or system.
  7. Granting access to resources based on identity and permissions.
  8. Blocking known harmful software or processes.
  9. Ensuring that authorized users have access to information and systems when needed.
Down
  1. Trying many combinations to guess a password or encryption key.
  2. A program where organizations reward individuals for finding vulnerabilities.
  3. A network of infected computers controlled remotely.
  4. Software that detects and removes malicious software.
  5. Encryption using a pair of keys – one public and one private.
  6. An entity that issues digital certificates.

15 Clues: A prolonged and targeted cyberattack.An entity that issues digital certificates.Blocking known harmful software or processes.Becoming desensitized to frequent security alerts.Mechanisms that restrict access to systems and data.A network of infected computers controlled remotely.Verifying the identity of a user, device, or system....

Cyber security - 6 2025-07-09

Cyber security - 6 crossword puzzle
Across
  1. A potential cause of an unwanted incident that may result in harm.
  2. A standard for managing customer data based on five trust service principles.
  3. Proactively searching for signs of malicious activity.
  4. A solution that collects and analyzes security data in real time.
  5. An attack that manipulates a database query through input fields.
  6. Protocols for securing communications over a network.
  7. Encryption using the same key for both encryption and decryption.
Down
  1. Information about threats and threat actors used to inform decisions.
  2. Manipulating people into divulging confidential information.
  3. A service that encrypts your internet connection for privacy and security.
  4. A standard for message logging in a network.
  5. A security process requiring two different forms of identification.
  6. Replacing sensitive data with unique identification symbols.
  7. A targeted phishing attack aimed at a specific individual or organization.
  8. A physical or digital device used to authenticate identity.

15 Clues: A standard for message logging in a network.Protocols for securing communications over a network.Proactively searching for signs of malicious activity.A physical or digital device used to authenticate identity.Manipulating people into divulging confidential information.Replacing sensitive data with unique identification symbols....

Cyber Security Crossword 2025-09-30

Cyber Security Crossword crossword puzzle
Across
  1. What helps keep your computer clean?
  2. What kind of email tries to trick you?
  3. What do you call bad software?
  4. What is the month we celebrate online safety
  5. What do you use to log into a computer?
  6. What do you click to leave a website?
  7. What should you never open from strangers?
  8. What blocks bad websites?
Down
  1. What should you do before clicking a link?
  2. What should you do to your apps to keep them safe?
  3. What do you call a fake website?
  4. What do you call someone who breaks into computers?
  5. What should you do if something online feels wrong?
  6. What should you never share online?
  7. What is the internet also called?

15 Clues: What blocks bad websites?What do you call bad software?What do you call a fake website?What is the internet also called?What should you never share online?What helps keep your computer clean?What do you click to leave a website?What kind of email tries to trick you?What do you use to log into a computer?What should you do before clicking a link?...

crossword1 2024-10-23

crossword1 crossword puzzle
Across
  1. Stuxnet primarily targets which type of systems
  2. Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
  3. Which security key is a physical device that acts as a second factor for user authentication.
  4. National Nodal Agency for responding to computer security incidents as and when they occur
  5. Botnet that was responsible for a series of DDoS attacks in 2016
  6. Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
  7. Patch Management Solution used in all PCs of GAIL
  8. Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
  9. What does letter “I” in the cyber security term CIA stands for
  10. Type of rogue WIFI access point used for Wi-Fi phishing
  11. Network protocol that collects and analyzes IP traffic data to monitor network
  12. Security standard that specifically helps in safeguarding Payment Card Data
Down
  1. Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
  2. BCP stands for
  3. The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  4. What is EU’s new data protection law
  5. Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
  6. Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
  7. What networking architecture that GAIL recently migrated to that enables more efficient network management?
  8. The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
  9. A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
  10. Act of stealing the card information rather than the card itself

22 Clues: BCP stands forWhat is EU’s new data protection lawStuxnet primarily targets which type of systemsPatch Management Solution used in all PCs of GAILType of rogue WIFI access point used for Wi-Fi phishingWhat does letter “I” in the cyber security term CIA stands forBotnet that was responsible for a series of DDoS attacks in 2016...

Cyber security - 5 2025-07-09

Cyber security - 5 crossword puzzle
Across
  1. The process of gathering information about a target system.
  2. A centralized unit that deals with security issues.
  3. An unskilled attacker who uses existing tools to launch attacks.
  4. A set of security settings that serve as a benchmark for systems.
  5. A f
  6. An observable occurrence relevant to system security.
  7. Malware designed to gain unauthorized root or administrative access.
  8. Malware that encrypts a victim’s files and demands payment to restore access.
  9. Running untested or untrusted programs in isolation to prevent damage.
Down
  1. An evaluation of an organization’s security policies and systems.
  2. Identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize or control their impact.
  3. A protocol for secure remote login and command execution.
  4. Simulated attackers and defenders security testing.
  5. The practice of writing software that is resistant to attacks.
  6. Analyzing a system to understand its design and vulnerabilities.

15 Clues: A fA centralized unit that deals with security issues.Simulated attackers and defenders security testing.An observable occurrence relevant to system security.A protocol for secure remote login and command execution.The process of gathering information about a target system.The practice of writing software that is resistant to attacks....

CYBER 2021-03-27

CYBER crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. The method of obtaining user information through fraudulent communications targeted directly at people.
  4. The way in which the identity of a user is confirmed.
  5. security A technique for protecting computers, networks, programs, and
Down
  1. A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
  2. Software that automatically displays or downloads material when a user is offline.
  3. are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
  4. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
  5. A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.

10 Clues: The way in which the identity of a user is confirmed.security A technique for protecting computers, networks, programs, andA secret word or phrase that is used to access a computer system or service.Software that automatically displays or downloads material when a user is offline....

CySec 2025-10-24

CySec crossword puzzle
Across
  1. you let anyone inside your company’s building? When your company’s physical security is a concern to you, then why not also your cyber security. Most would say that the impact of a cyber breach is way more significant than a physical one.
  2. Information’s storage
  3. of cyber security
  4. CySec we have a solution for your troubles. As a company specified in Cyber Security for small businesses, we offer discrete and secure cloud storage for your data. On top of that are we able to build up your security network around your workspace to ensure a smooth ongoing workflow within the company.
Down
  1. company’s information’s are for sure the most vital part of your company. Materials and products can be produced quickly with small effort, but the planning process and the knowledge behind it, is your company’s most valuable asset. A breach into your system could be fatal. Not to mention the time and money wasted when your company is offline and your employees can’t work.
  2. security: Your Challenge - Our solution
  3. solutions for your problems
  4. wait until it is too late, because afterwards one can only do damage reduction. Secure yourself a meeting with our specialists now. Contact us at CySec@aon.at. You will find further information at CySec.at.

8 Clues: of cyber securityInformation’s storagesolutions for your problemssecurity: Your Challenge - Our solutionwait until it is too late, because afterwards one can only do damage reduction. Secure yourself a meeting with our specialists now. Contact us at CySec@aon.at. You will find further information at CySec.at....

Spam 2024-08-15

Spam crossword puzzle
Across
  1. Ads
  2. Deceptive
  3. Violation
  4. Instagram
  5. Engagement
Down
  1. Meta
  2. Cyber
  3. Personality

8 Clues: AdsMetaCyberDeceptiveViolationInstagramEngagementPersonality

crossword1 2024-10-23

crossword1 crossword puzzle
Across
  1. Stuxnet primarily targets which type of systems
  2. Which XDR product caused a Blue Screen of Death (BSOD) on Microsoft Windows devices
  3. Which security key is a physical device that acts as a second factor for user authentication.
  4. National Nodal Agency for responding to computer security incidents as and when they occur
  5. Botnet that was responsible for a series of DDoS attacks in 2016
  6. Digital activity that intentionally targets or harms women, exploiting their personal information, privacy, and dignity
  7. Patch Management Solution used in all PCs of GAIL
  8. Chinese researchers successfully cracked which encryption using quantum computers from D-Wave
  9. What does letter “I” in the cyber security term CIA stands for
  10. Type of rogue WIFI access point used for Wi-Fi phishing
  11. Network protocol that collects and analyzes IP traffic data to monitor network
  12. Security standard that specifically helps in safeguarding Payment Card Data
Down
  1. Which Windows security feature provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices
  2. BCP stands for
  3. The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  4. What is EU’s new data protection law
  5. Sarah receives a WhatsApp text from Emily, claiming to be a bank executive, urging her to click a link to verify her compromised account. Type of WhatsApp phishing tactic used is
  6. Type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable
  7. What networking architecture that GAIL recently migrated to that enables more efficient network management?
  8. The practice of encrypting information to protect its confidentiality, integrity, authentication, and non-repudiation
  9. A cyber scam where fraudsters, posing as law enforcement officials, make video calls claiming the victim or their family is involved in criminal activity
  10. Act of stealing the card information rather than the card itself

22 Clues: BCP stands forWhat is EU’s new data protection lawStuxnet primarily targets which type of systemsPatch Management Solution used in all PCs of GAILType of rogue WIFI access point used for Wi-Fi phishingWhat does letter “I” in the cyber security term CIA stands forBotnet that was responsible for a series of DDoS attacks in 2016...

cyber ethics 2025-06-13

cyber ethics crossword puzzle
Across
  1. Censorship – Controlling or restricting content
  2. Fraud – Scams and deception in cyberspace
  3. – Monitoring online activity
  4. Law – Legal rules for digital activities
  5. – Keeping personal information safe online
  6. Footprint – The online traces you leave behind
  7. Theft – Stealing someone’s personal details.
  8. – Online harassment and intimidation
  9. – Unauthorized access to digital systems
  10. Protection – Safeguarding stored information
Down
  1. Intelligence – Smart systems making decisions
  2. – Criminal activities in the digital world
  3. Property – Ownership of creative digital work
  4. Warfare – Using data as a weapon
  5. – Scrambling data to keep it secret
  6. Neutrality – Equal access to internet resources
  7. – Protecting systems and data from threats
  8. – Tricking people into revealing sensitive data
  9. Rights – Online freedoms and responsibilities
  10. Hacking – Hacking for security, not harm

20 Clues: – Monitoring online activityWarfare – Using data as a weapon– Scrambling data to keep it secret– Online harassment and intimidationLaw – Legal rules for digital activitiesHacking – Hacking for security, not harm– Unauthorized access to digital systemsFraud – Scams and deception in cyberspace– Criminal activities in the digital world...

IGCSE computer science cyber security threats 2025-04-28

IGCSE computer science cyber security threats crossword puzzle
Across
  1. type of malware that does not depend on a users act , and instead look for vulnerability holes in a network to duplicate itself and clog up bandwidth
  2. cyber security threat that examines packets passing through a hardware to intercept them
  3. cyber threat that sends a fake email to the user which encourages the user to click link or respond to the email , providing their personal data to the cyber criminal
  4. cyber threat that involves downloading malicious software onto a users hard drive to re direct the requests sent by the user to a genuine website to a fake website instead
  5. manupilating and deceiving people into providing their personal data
  6. any malicious software designed to disrupt a users data or computer
  7. cyber threat that involves installing malware to many computers to create a bot net to flood a webserver with requests
  8. type of malware downloaded on to a users hardware that gathers certain data and sends them to the third party
  9. type of malware that is downloaded on to the hard drive by user unknowingly and duplicates itself to corrupt data and take up storage space
Down
  1. type of malware that disguises other malware which is released
  2. cyber threat which uses trial and error method to crack a users password and gain access to their personal information
  3. type of malware designed to automatically create pop up adds that can collect personal information
  4. name given to a cyber criminal
  5. type of malware that encrypts a users data and demands a set amount of money to decrypt the data
  6. act of gaining unauthorised access to data .

15 Clues: name given to a cyber criminalact of gaining unauthorised access to data .type of malware that disguises other malware which is releasedany malicious software designed to disrupt a users data or computermanupilating and deceiving people into providing their personal data...

CS 102 Lecture 5 Crossword Puzzle 2017-04-18

CS 102 Lecture 5 Crossword Puzzle crossword puzzle
Across
  1. The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
  2. This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
  3. This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
  1. These attacks play on human error to bypass technical security controls.
  2. This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
  3. Programs that act without a user's knowledge and alter operations of computers and mobile devices.
  4. This cyber-criminal describes someone who enter a computer or network illegally.
  5. This cyber criminal uses the internet or network to destroy computers for political reasons.
  6. The ____ web is a portion of the internet that cannot be accessed through regular search engines.
  7. These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.

10 Clues: These attacks play on human error to bypass technical security controls.This cyber-criminal describes someone who enter a computer or network illegally.This cyber criminal uses the internet or network to destroy computers for political reasons.The ____ web is a portion of the internet that cannot be accessed through regular search engines....

Cyber and DIGITAL LITERACY 2024-04-30

Cyber and DIGITAL LITERACY crossword puzzle
Across
  1. - Criminal activities conducted via digital means.
  2. - Measures to protect against cyber attacks.
  3. - Secret word or phrase to access a system.
  4. - Fraudulent acquisition of someone's identity.
  5. - Rights related to digital content and technology.
  6. - Securing data by converting it into a code.
  7. - Shared values and norms in the digital community.
  8. - Gathering and analyzing digital threat information.
  9. - Practices to maintain online safety and security.
  10. - Gap between those with and without access to technology.
  11. - Protection against cyber-related losses.
  12. - Study of human behavior in cyberspace.
  13. - Understanding of cyber threats and safety measures.
  14. - Malicious software that replicates itself.
  15. - Software designed to harm or infiltrate a system.
  16. - Promoting products or services online.
  17. - Programs and applications for computers.
  18. - Writing instructions for computers.
  19. - System of interconnected computers.
  20. - Potential dangers to digital systems.
  21. - Person raised in the digital age.
  22. - Knowledge of cyber risks and precautions.
  23. - Mobile phone with advanced capabilities.
  24. - Encoding data for secure transmission.
  25. - Right to control personal information.
  26. - Education on protecting against cyber threats.
  27. - Global network connecting computers worldwide.
  28. - Accountability for one's online actions.
  29. - Banking services conducted over the internet.
  30. - Unique name used to identify oneself online.
Down
  1. - Ethical behavior in the digital world.
  2. - Protection of sensitive information.
  3. - Investigation of cybercrimes.
  4. - Verification of a user's identity.
  5. - Ability to effectively use digital tools and technologies.
  6. - Harassment or intimidation online.
  7. - Barrier to block unauthorized access to a network.
  8. - Conflict conducted in the digital realm.
  9. - Deliberate exploitation of computer systems.
  10. - Protection of digital systems from cyber threats.
  11. - Internet-based currency for online transactions.
  12. - Platforms for online social interaction.
  13. - Representation of a person's online presence.
  14. - Fraudulent attempt to obtain sensitive information.
  15. - Individuals gaining unauthorized access to systems.
  16. - Unsolicited and often irrelevant messages.
  17. - Legal regulations governing cyberspace.
  18. - Responsible use of technology.
  19. - Electronic system for online financial transactions.
  20. footprint - Trail of data left by online activity.

50 Clues: - Investigation of cybercrimes.- Responsible use of technology.- Person raised in the digital age.- Verification of a user's identity.- Harassment or intimidation online.- Writing instructions for computers.- System of interconnected computers.- Protection of sensitive information.- Potential dangers to digital systems....

DIGITAL LITERACY and CYBER HYGIENE 2025-01-21

DIGITAL LITERACY and CYBER HYGIENE crossword puzzle
Across
  1. - Legal regulations governing cyberspace.
  2. - Programs and applications for computers.
  3. - Verification of a user's identity.
  4. - Electronic system for online financial transactions.
  5. - Shared values and norms in the digital community.
  6. - Platforms for online social interaction.
  7. - Criminal activities conducted via digital means.
  8. - Unique name used to identify oneself online.
  9. - Measures to protect against cyber attacks.
  10. - Ethical behavior in the digital world.
  11. - Protection of sensitive information.
  12. - Malicious software that replicates itself.
  13. footprint - Trail of data left by online activity.
  14. - Ability to effectively use digital tools and technologies.
  15. - Securing data by converting it into a code.
  16. - Fraudulent acquisition of someone's identity.
  17. - Barrier to block unauthorized access to a network.
  18. - Protection of digital systems from cyber threats.
  19. - Global network connecting computers worldwide.
  20. - Gap between those with and without access to technology.
  21. - Responsible use of technology.
  22. - Encoding data for secure transmission.
Down
  1. - Deliberate exploitation of computer systems.
  2. - Representation of a person's online presence.
  3. - Internet-based currency for online transactions.
  4. - Software designed to harm or infiltrate a system.
  5. - Right to control personal information.
  6. - Mobile phone with advanced capabilities.
  7. - Banking services conducted over the internet.
  8. - Investigation of cybercrimes.
  9. - Individuals gaining unauthorized access to systems.
  10. - Accountability for one's online actions.
  11. - Knowledge of cyber risks and precautions.
  12. - Potential dangers to digital systems.
  13. - Protection against cyber-related losses.
  14. - Harassment or intimidation online.
  15. - Study of human behavior in cyberspace.
  16. - Fraudulent attempt to obtain sensitive information.
  17. - Secret word or phrase to access a system.
  18. - Writing instructions for computers.
  19. - Conflict conducted in the digital realm.
  20. - Education on protecting against cyber threats.
  21. - Unsolicited and often irrelevant messages.
  22. - Gathering and analyzing digital threat information.
  23. - Understanding of cyber threats and safety measures.
  24. - System of interconnected computers.
  25. - Promoting products or services online.
  26. - Person raised in the digital age.
  27. - Practices to maintain online safety and security.
  28. - Rights related to digital content and technology.

50 Clues: - Investigation of cybercrimes.- Responsible use of technology.- Person raised in the digital age.- Verification of a user's identity.- Harassment or intimidation online.- Writing instructions for computers.- System of interconnected computers.- Protection of sensitive information.- Potential dangers to digital systems....

Cybersecurity 2018-08-02

Cybersecurity crossword puzzle
Across
  1. CLI command to search for a pattern of letters
  2. Program used to collect cryptocurrency
  3. The telephone equivalent of phishing
  4. Protocol that WannaCry took advantage of
  5. First step in the cyber kill chain
  6. A compromised computer in a botnet
  7. Command to identify Ethernet devices
  8. Process security analysts use to search for advanced threats
  9. Resolve hostnames to IP addresses
  10. The second in the CIA triad
Down
  1. ... is the process of directing the company approach to security
  2. ... systems use physical characteristics to determine access
  3. The process of adding allowed programs to a list is called ...
  4. Testing technique using invalid or random data as input
  5. A weakness that can be exploited
  6. Specifies who gets access to what
  7. The process of reversing encoded data is ...
  8. The approach of using multiple layers of security
  9. Piece of forensic data identifying potential malicious activity
  10. Uses rules to allow or block traffic

20 Clues: The second in the CIA triadA weakness that can be exploitedSpecifies who gets access to whatResolve hostnames to IP addressesFirst step in the cyber kill chainA compromised computer in a botnetThe telephone equivalent of phishingCommand to identify Ethernet devicesUses rules to allow or block trafficProgram used to collect cryptocurrency...

CIS 178 Cybersecurity Participation 2023-04-20

CIS 178 Cybersecurity Participation crossword puzzle
Across
  1. Malware that demands payment
  2. Software that detects malware
  3. Criminal activity on computer systems
  4. secure website connection
  5. Successful cyber attack
  6. a software vulnerability
  7. a system weakness
  8. malicious digital activity
  9. data protection method
  10. fraudulent email technique
Down
  1. network security barrier
  2. a traffic overload cyberattack
  3. user identity verification
  4. computer infection
  5. secret access code
  6. unauthorized access
  7. harmful software program
  8. unsolicited email
  9. A network of infected computers
  10. physical trait recognition

20 Clues: unsolicited emaila system weaknesscomputer infectionsecret access codeunauthorized accessdata protection methodSuccessful cyber attacknetwork security barrierharmful software programa software vulnerabilitysecure website connectionuser identity verificationphysical trait recognitionmalicious digital activityfraudulent email technique...

Cyber Ethics 2025-06-14

Cyber Ethics crossword puzzle
Across
  1. – Moral principles that govern behavior
  2. – Monitoring someone online without consent
  3. – Unwanted or junk email
  4. – Online profile that represents a person
  5. – A person who harasses others on the internet
  6. – Common language used in email virus scams
  7. – Special characters used to strengthen passwords
  8. – Legal right protecting original work
  9. – Making private information known
  10. – Code of polite behavior on the internet
  11. – Malware that locks data until payment is made
Down
  1. – Measures to protect data from cyber threats
  2. – Set of moral principles in digital conduct
  3. – State of being unknown or unidentifiable online
  4. – Copying someone else's work without credit
  5. – Portable devices vulnerable to cyber threats
  6. – A person who gains unauthorized access to systems
  7. – Fraudulent attempt to get sensitive info
  8. – Software designed to harm or exploit a computer
  9. – Popular platform where cyberbullying can occur

20 Clues: – Unwanted or junk email– Making private information known– Legal right protecting original work– Moral principles that govern behavior– Online profile that represents a person– Code of polite behavior on the internet– Fraudulent attempt to get sensitive info– Monitoring someone online without consent– Common language used in email virus scams...

CBL World 2023-05-05

CBL World crossword puzzle
Across
  1. Your Cyber Security Partner
  2. Kidnapped & hold for ransom
  3. Burning walls, keep intruders away
  4. Most critical element in CyberSecurity
  5. Locked with a key, for data security
Down
  1. Weakness that can be exploited
  2. Make it strong, complex, and change frequently
  3. Plug and play your Apps on the cloud
  4. Assessed, Validated, and Certified
  5. Rhymes with fishing
  6. Vaccine for your systems
  7. Weakest link in CyberSecurity (Human factor)

12 Clues: Rhymes with fishingVaccine for your systemsYour Cyber Security PartnerKidnapped & hold for ransomWeakness that can be exploitedAssessed, Validated, and CertifiedBurning walls, keep intruders awayPlug and play your Apps on the cloudLocked with a key, for data securityMost critical element in CyberSecurityWeakest link in CyberSecurity (Human factor)...

Generation & Suppliers Staff 2020-10-01

Generation & Suppliers Staff crossword puzzle
Across
  1. Hydrogen Generation
  2. Cyber Security
  3. Component Technical Issues
  4. Knows Access Code to Basement Door in White Flint
  5. Fuel Cycle Facilities
  6. DI&C
  7. Budget
  8. Dr. Casey’s Best Friend
  9. FOF Programs
  10. Reactor Oversight Process
  11. Helps Jerry with SAC; Marc with New Plants
  12. Suppliers
  13. Dry Used Fuel Storage
  14. Operator Licensing
  15. Accident Tolerant Fuels
  16. Physical Security Programs
  17. Engineering Processes and Programs
  18. Used Fuel Policy
  19. Fuel Supply and Trade
  20. Decommissioning
  21. FLEX
Down
  1. Research & Test Reactors
  2. Radiation Protection
  3. Codes and Standards
  4. Second License Renewal
  5. Sue's Go-to for Security Support
  6. Leader of the Pack
  7. Fire Protection
  8. NERC Issues
  9. Webinar Magician
  10. External Affairs
  11. Emergency Preparedness
  12. PHE Industry Coordination
  13. Part 53 Rulemaking
  14. New (matrix) addition to group
  15. Fitness for Duty
  16. Micro Reactors
  17. Flooding, Seismic and all acts of God
  18. PADS Oversight

39 Clues: DI&CFLEXBudgetSuppliersNERC IssuesFOF ProgramsCyber SecurityMicro ReactorsPADS OversightFire ProtectionDecommissioningWebinar MagicianExternal AffairsFitness for DutyUsed Fuel PolicyLeader of the PackPart 53 RulemakingOperator LicensingHydrogen GenerationCodes and StandardsRadiation ProtectionFuel Cycle FacilitiesDry Used Fuel Storage...

Security Awareness Crossword 2024-09-29

Security Awareness Crossword crossword puzzle
Across
  1. Playing games of chance for money
  2. Relates to people security
  3. Measures used to secure a site
  4. Part of the SHEQS function
  5. Relates to IT security
  6. Used to mark a boundary
Down
  1. Deliberate act of destruction
  2. Malicious software designed to block computer access
  3. Secret word or phrase used to gain access to somewhere
  4. state of being comfortable, healthy and happy

10 Clues: Relates to IT securityUsed to mark a boundaryRelates to people securityPart of the SHEQS functionDeliberate act of destructionMeasures used to secure a sitePlaying games of chance for moneystate of being comfortable, healthy and happyMalicious software designed to block computer accessSecret word or phrase used to gain access to somewhere

Cabinet Departments 2022-11-14

Cabinet Departments crossword puzzle
Across
  1. safety vehicles, roads, USDOT, ODOT
  2. all legal matters, FBI, DEA, prisons
  3. USDA, farming, food, crop sales/distribution, economic development
  4. fair housing, housing planning
  5. terrorism, disasters, cyber security, border control, immigration
  6. healthcare, benefits for veterans
  7. trade, economy, industrial standards, gather data
Down
  1. schools, loans/grants
  2. unemployment, workplace safety, wage standards, employee rights
  3. public health, family services, adoption/foster, drug prevention
  4. federal lands, conservation, Native American territories, National Parks
  5. international relations, foreign policies
  6. production of currency, public debt, tax laws
  7. waste disposal, energy production, nuclear weapons
  8. military, national security

15 Clues: schools, loans/grantsmilitary, national securityfair housing, housing planninghealthcare, benefits for veteranssafety vehicles, roads, USDOT, ODOTall legal matters, FBI, DEA, prisonsinternational relations, foreign policiesproduction of currency, public debt, tax lawstrade, economy, industrial standards, gather data...

Security Awareness 2025 Crossword 2025-02-11

Security Awareness 2025 Crossword crossword puzzle
Across
  1. The purpose of this puzzle is to increase security______
  2. The loss of ID card, building access cards and compromise of passwords are examples of security _____ and must be reported
  3. Chief ____ Officer (CSO)
  4. Hacking is an example of a ____ attack
  5. Physical security focuses on the safeguarding of sensitive information/_______/facilities
  6. If a service contract contains a security _____, you must complete an SRCL
  7. The PGS contains eight security controls and three ____
  8. These emails are designed to deceive you into providing information
  9. It is important to regularly exercise your ______ continuity plans
  10. The current mandatory security awareness course, acronym
  11. Security in contracting refers to the procurement of goods or _____
  12. For reliability status, the screening process includes a ___ enforcement inquiry
  13. _____Information/assets have a potential for injury
  14. To be privy to certain information, you must have a ____ to know
Down
  1. Project/Security/ Contracting _____
  2. Malicious software designed to infiltrate or damage a computer system
  3. "I Luv Ch3eZ@L0T!" - for example
  4. Information categorized as ____ can only be processed in a high security zone
  5. All _____ must be issued temporary passes and escorted to access a GC site
  6. TBS' ____ on Government Security
  7. Security control #7, security event
  8. Reliability ____, the minimum security screening requirement within the Government of Canada
  9. Training hub for public servants, acronym
  10. By leaving the building during a Shelter-In-Place, you could put ______ in danger
  11. The Canadian telecommunications industry is an example of a ____function
  12. To email Protected B information, it must be_______
  13. One must ____ documents according to their level of sensitivity
  14. You must perform this evaluation to categorize your information/assets
  15. The A,B or C of information management security
  16. Reporting a security event helps mitigate_____
  17. A natural ____ is an example of a disruption to a critical function

31 Clues: Chief ____ Officer (CSO)"I Luv Ch3eZ@L0T!" - for exampleTBS' ____ on Government SecurityProject/Security/ Contracting _____Security control #7, security eventHacking is an example of a ____ attackTraining hub for public servants, acronymReporting a security event helps mitigate_____The A,B or C of information management security...

CYBER Crossword 2025-10-21

CYBER Crossword crossword puzzle
Across
  1. : The process of granting or denying specific requests to use resources or information systems.
  2. : A security mechanism requiring two or more independent credentials for authentication.
  3. : Fraudulent attempt (often by email) to obtain sensitive information by posing as a trustworthy entity.
  4. : A hidden or undocumented entry point in software or a system to bypass normal security controls.
  5. : A weakness in a system, design, implementation, or configuration that can be exploited.
  6. : Copies of data held in separate storage, used so systems can recover from failures, errors or attacks such as ransomware.
  7. : A network security device or software that monitors and controls incoming and outgoing network traffic based on rules.
  8. : Malicious software designed to damage or do unwanted actions on a computer system.
  9. : Knowledge about threat actors, their tools, tactics, and procedures, used to inform defensive actions.
  10. : A list of approved items (users, applications, IPs) that are granted access; everything else is typically denied by default.
  11. : An attack that disrupts normal traffic by overwhelming a target with requests.
  12. : An individual, group or organisation that has the intent and capability to carry out harmful cyber actions.
Down
  1. : The confirmed exposure of protected or sensitive information to an unauthorised party.
  2. : The ability of an organisation to continue operating and recover during or after a cyber-attack or incident.
  3. : A network of internet-connected devices infected by malware and controlled as a group without the owners’ knowledge.
  4. : A highly sophisticated cyber attack, often by a well-resourced adversary, aiming to remain undetected for a long period.
  5. : A threat posed by someone within the organisation, e.g., an employee, who uses their access (intentionally or unintentionally) to harm the organisation.
  6. : Verifying the identity of a user, process or device.
  7. : A record of events (who did what, when) used to support security monitoring and investigation.
  8. : The approval or permission for someone or something to perform an action.
  9. : The process of converting plaintext into ciphertext to prevent unauthorized access.
  10. : A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause undesired behaviour.
  11. : A vulnerability or exploit that is unknown to the vendor and has no patch available at time of attack.

23 Clues: : Verifying the identity of a user, process or device.: The approval or permission for someone or something to perform an action.: An attack that disrupts normal traffic by overwhelming a target with requests.: Malicious software designed to damage or do unwanted actions on a computer system....

Data Privacy and Cybersecurity 2022-08-15

Data Privacy and Cybersecurity crossword puzzle
Across
  1. This 2020 ballot initiative amended 2 down
  2. This type of document guides an organization's response after a data privacy and security incident
  3. A law firm that guides an organization through a data privacy and security incident
  4. A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
  5. This European Union law served as the basis for the creation of 2 down
  6. Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
  7. A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
  8. An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
  1. Number of comprehensive consumer privacy laws in the United States
  2. The United States' first state-specific consumer privacy law
  3. A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
  4. Unauthorized activity on an organization’s digital network
  5. The Advisen 2022 "Cyber Law Firm of the Year"
  6. This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"

14 Clues: This 2020 ballot initiative amended 2 downThe Advisen 2022 "Cyber Law Firm of the Year"Unauthorized activity on an organization’s digital networkThe United States' first state-specific consumer privacy lawNumber of comprehensive consumer privacy laws in the United StatesThis year's Cybersecurity Awareness Month theme - "See ___ in Cyber"...

Plain Language Safety Code Alerts 2024-11-26

Plain Language Safety Code Alerts crossword puzzle
Across
  1. You found a suspicious package
  2. Person in cardiac/Respiratory arrest or needing medical assistance
  3. Disaster, incoming patient
  4. Security assistance needed for a hostage situation
  5. Severe Weather
  6. You observe fire or smoke
  7. A Cyber attack has occured on DCH's computer system
  8. Initiated to prevent combative or disruptive person from entering the building
  9. A Hazardous Arbonne Agent has been detected outside.
Down
  1. Only one unit needs to move patients out of their rooms into the hallway for safety.
  2. A Hazardous Material spill has occurred in the Hospital
  3. Missing person
  4. Security assistance needed for a violent person with a Gun
  5. Security Assistance Needed for a combative person
  6. Inpatient experiencing distress

15 Clues: Missing personSevere WeatherYou observe fire or smokeDisaster, incoming patientYou found a suspicious packageInpatient experiencing distressSecurity Assistance Needed for a combative personSecurity assistance needed for a hostage situationA Cyber attack has occured on DCH's computer systemA Hazardous Arbonne Agent has been detected outside....

CYBER SECURITY CHALLENGE 2024-11-21

CYBER SECURITY CHALLENGE crossword puzzle
Across
  1. Network shield
  2. Virus remover
  3. Harmful software
  4. Programmer's language
  5. Data protection
  6. Login requirement
Down
  1. Protected data
  2. Secure data
  3. Security symbol
  4. Computer connection
  5. Computer threat
  6. Unauthorized access
  7. Internet platform
  8. Computer information

14 Clues: Secure dataVirus removerProtected dataNetwork shieldSecurity symbolComputer threatData protectionHarmful softwareInternet platformLogin requirementComputer connectionUnauthorized accessComputer informationProgrammer's language

CYBER SECURITY CHALLENGE 2024-11-21

CYBER SECURITY CHALLENGE crossword puzzle
Across
  1. Computer threat
  2. Secure data
  3. Programmer's language
  4. Network shield
  5. Data protection
  6. Internet platform
  7. Login requirement
  8. Computer connection
Down
  1. Protected data
  2. Virus remover
  3. Security symbol
  4. Harmful software
  5. Unauthorized access
  6. Computer information

14 Clues: Secure dataVirus removerProtected dataNetwork shieldComputer threatSecurity symbolData protectionHarmful softwareInternet platformLogin requirementUnauthorized accessComputer connectionComputer informationProgrammer's language

Crossword 2023-03-14

Crossword crossword puzzle
Across
  1. Acronym for chief information security officer
  2. A cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed
  3. Antigen ______ Defense
  4. _____ Response Consulting
  5. Your Antigen resource for your licensing needs
  6. Cyber Risk _______
Down
  1. Antigen Security's partner for insurance carriers
  2. Antigen Security's partner for insurance brokers
  3. Acronym for digital forensics & incident response
  4. The possibility of a malicious attempt to damage or disrupt a computer network or system.
  5. Managed ______ Providers

11 Clues: Cyber Risk _______Antigen ______ DefenseManaged ______ Providers_____ Response ConsultingAcronym for chief information security officerYour Antigen resource for your licensing needsAntigen Security's partner for insurance brokersAntigen Security's partner for insurance carriersAcronym for digital forensics & incident response...

KICT Crossword Puzzle 2022-07-20

KICT Crossword Puzzle crossword puzzle
Across
  1. / KICT Flagship
  2. / Undergraduate Student Societies
  3. / KICT was established in _____ 2001
  4. / Undergraduate Programme
  5. / Postgraduate Programme
  6. / Code to _____
  7. / A Department at KICT
Down
  1. / Centre of Excellence for Cyber Security
  2. / Postgraduate Student Societies
  3. Digital Education / KICT Flagship
  4. / KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
  5. / KICT Robe Colour
  6. Sejahtera / KICT Flagship
  7. / Postgraduate Programme
  8. / KICT International Journal

15 Clues: / KICT Flagship/ Code to _____/ KICT Robe Colour/ A Department at KICT/ Postgraduate Programme/ Postgraduate Programme/ Undergraduate ProgrammeSejahtera / KICT Flagship/ KICT International Journal/ Postgraduate Student Societies/ Undergraduate Student SocietiesDigital Education / KICT Flagship...

Cyber Security 2022-06-08

Cyber Security crossword puzzle
Across
  1. A tool used to mask your online identity by redirecting and encrypting your data before it is sent
  2. An attack that aims to make a service or website unusable by 'flooding' it with malicious traffic
  3. Malware that locks data and encrypts it to commit fraud
  4. Malware that gathers information from a person or company by violating privacy
Down
  1. Gathers sensitive information that involves both social engineering and email
  2. Malware that infects devices with multiple, intrusive, ads
  3. Malware that infects and spreads with files and links together with social engineering
  4. Infects devices through suspicious files and links
  5. Works like a virus, but can infect devices on it's own and through software vulnerabilities

9 Clues: Infects devices through suspicious files and linksMalware that locks data and encrypts it to commit fraudMalware that infects devices with multiple, intrusive, adsGathers sensitive information that involves both social engineering and emailMalware that gathers information from a person or company by violating privacy...

Cyber Security 2021-03-30

Cyber Security crossword puzzle
Across
  1. Only for you
  2. Fake emails
  3. Uses vulnerabilities to get access
  4. An extra layer of protection
  5. Attached to a file
Down
  1. Private
  2. Needs to be downloaded
  3. A code that protects your account
  4. An illegal way of accessing your device

9 Clues: PrivateFake emailsOnly for youAttached to a fileNeeds to be downloadedAn extra layer of protectionA code that protects your accountUses vulnerabilities to get accessAn illegal way of accessing your device

Cyber Security 2023-10-27

Cyber Security crossword puzzle
Across
  1. A trail of data left behind online
  2. Having a duty to deal with something
  3. Browser
  4. How our online information should be
Down
  1. Saying hurtful things to someone online
  2. Helps protect your information
  3. Intended to be kept secret
  4. Machinery, computers and telecommunication
  5. What you connect to, to access online servers

9 Clues: BrowserIntended to be kept secretHelps protect your informationA trail of data left behind onlineHaving a duty to deal with somethingHow our online information should beSaying hurtful things to someone onlineMachinery, computers and telecommunicationWhat you connect to, to access online servers

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. Looking at someone's information over their shoulder.
  2. Stimuli that has meaningful context.
  3. software designed to interfere with a computer's normal functioning.
  4. Inventing a scenario to engage with victim.
  5. A person who breaks into computers to gain unauthorized access to information.
Down
  1. malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
  2. malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
  3. Information that relates to an individual.
  4. Efficient information that was translated.

9 Clues: Stimuli that has meaningful context.Information that relates to an individual.Efficient information that was translated.Inventing a scenario to engage with victim.Looking at someone's information over their shoulder.software designed to interfere with a computer's normal functioning....

Cyber Security 2025-04-29

Cyber Security crossword puzzle
Across
  1. Verdient man durchs arbeiten
  2. Schmiert man auf brot und schmeckt gut
  3. Dort mit fremden Nutzern austauschen
  4. Suchti
Down
  1. Wo findet alles statt?
  2. wenn man sich als andere person ausgibt um Leuten eine Falle zu stellen
  3. gibt es sehr viele
  4. Andere Leute ärgern und ausschließen
  5. Betrug

9 Clues: BetrugSuchtigibt es sehr vieleWo findet alles statt?Verdient man durchs arbeitenAndere Leute ärgern und ausschließenDort mit fremden Nutzern austauschenSchmiert man auf brot und schmeckt gutwenn man sich als andere person ausgibt um Leuten eine Falle zu stellen

Cyber Security Crossword 2021-02-12

Cyber Security Crossword crossword puzzle
Across
  1. and gathers information on a
  2. can be a worm virus or trojan
  3. a person how uses computers to get
  4. access to information and data.
  5. a specific type of computer virus that
  6. how they use their computer
Down
  1. malicious form of self-replicating software
  2. a type of virus and worm that carries
  3. a specific type of attack
  4. unwanted software that
  5. Set of symbols/numbers/letters which is
  6. information processed or stored by a
  7. to access an account
  8. you into downloading it onto your

14 Clues: to access an accountunwanted software thata specific type of attackhow they use their computerand gathers information on acan be a worm virus or trojanaccess to information and data.you into downloading it onto youra person how uses computers to getinformation processed or stored by aa type of virus and worm that carries...

Cyber Security 2023-04-04

Cyber Security crossword puzzle
Across
  1. malware that can encrypt your files and demand payment in exchange for the decryption key
  2. is often sent as an email to trick you into giving you your personal information.
  3. type of malware that can secretly gather information about your online activity
Down
  1. malware that disguises itself as a legitimate program or file, but it has a malicious purpose
  2. similar to a virus in that it can replicate and spread from one computer to another, but it doesn't need to attach itself to files or programs
  3. a program that monitors the traffic coming in and out of your device
  4. a program that protects your computer from malware
  5. can spread from one computer to another by attaching itself to files or programs
  6. malicious software designed to cause harm to your device

9 Clues: a program that protects your computer from malwaremalicious software designed to cause harm to your devicea program that monitors the traffic coming in and out of your devicetype of malware that can secretly gather information about your online activitycan spread from one computer to another by attaching itself to files or programs...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. migrate
  2. kidnapper
  3. james bond is
  4. trapdoor
  5. ladybug
Down
  1. ancient greek horse trick
  2. catching fish
  3. underground
  4. computer

9 Clues: migrateladybugcomputertrapdoorkidnapperundergroundjames bond iscatching fishancient greek horse trick

Cyber Security 2022-10-13

Cyber Security crossword puzzle
Across
  1. A cybercrime that uses the phone to steal confidential data.
  2. When you swipe your access card, beware of persons nearby who may try __________.
  3. protector This helps protect your screen from shoulder surfing.
  4. Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
  1. This network security device sits at the edge of your network and governs access.
  2. This software is installed on your computer to protect it from viruses and malware.
  3. A network of computers infected by malware and that are under the control of a single attacking party.
  4. A person who uses computers to gain unauthorized access to data.
  5. Computer software with malicious intent.

9 Clues: Computer software with malicious intent.A cybercrime that uses the phone to steal confidential data.protector This helps protect your screen from shoulder surfing.A person who uses computers to gain unauthorized access to data.This network security device sits at the edge of your network and governs access....

Cyber Security 2024-12-26

Cyber Security crossword puzzle
Across
  1. A sequence of characters or words to keep your account safe
  2. A program that detect and remove virus
  3. Nasty software that can have a bad impact on your device
  4. Unwanted emails or messages
Down
  1. A location on the internet where you can save your data
  2. The program you use to access the Internet like chrome or Firefox
  3. Getting into other's computer without their permission
  4. Legal Aid to fight against Cyber Crimes
  5. A copy of your data stored somewhere else.

9 Clues: Unwanted emails or messagesA program that detect and remove virusLegal Aid to fight against Cyber CrimesA copy of your data stored somewhere else.A location on the internet where you can save your dataNasty software that can have a bad impact on your deviceGetting into other's computer without their permission...

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE
  2. IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE
  3. ITS A TYPE OF CREATURE THAT WRIGGLES
  4. RISKS IT IS EASILY ACCESSIBLE AND CAN BE A DANGEROUS PLACE WHERE THERE ARE PREDATORS,CYBER CRIMANALS AND BULLIES
Down
  1. IT IS SHORT FOR "MALICIOUS SOFTWARE"
  2. IS A PROGRAM OR A PIECE OF CODE THAT IS LOADED ONTO YOUR COMPUTER WITHOUT YOUR KNOWLEDGE
  3. BLOCKS ACCESS FROM THE VICTIMS DATA
  4. ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE
  5. IT IS THE TERM USED BY THE ANCIENT GREEK STORY OF THE WOODEN HORSE THAT WAS USED TO HELP GREEK TROOPS

9 Clues: BLOCKS ACCESS FROM THE VICTIMS DATAIT IS SHORT FOR "MALICIOUS SOFTWARE"ITS A TYPE OF CREATURE THAT WRIGGLESIT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGEIT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWAREATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE...

Cyber Security 2021-10-29

Cyber Security crossword puzzle
Across
  1. Malicious software that infects a user's computer and changes how is operates
  2. User's data is held hostage until a payment is made
  3. Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
  4. Hidden software that records a user's information secretly for a third-party
  5. The practice of protecting internet-connected systems from digital attacks
  6. A an email disguised as a legitimate source that tricks users into offering up personal information
Down
  1. Is protecting of information from malicious damage and unauthorized access
  2. A kind of software used to prevent, scan, detect and delete viruses from a computer
  3. A form of malware that is self-replicating infecting a computer and can spread across its network

9 Clues: User's data is held hostage until a payment is madeIs protecting of information from malicious damage and unauthorized accessThe practice of protecting internet-connected systems from digital attacksHidden software that records a user's information secretly for a third-party...

Cyber Security 2021-11-05

Cyber Security crossword puzzle
Across
  1. a secret word or phrase that must be used to gain admission to a place
  2. physical characteristics that can be used to identify individuals
  3. looking at someone's information over their shoulder
  4. a type of malicious code or program written to alter the way a computer operates
Down
  1. an identification used by a person with access to a computer, network, or online service
  2. randomly generated sequence of letters or numbers that appear as a distorted image, and a text box
  3. a type of malware that spreads copies of itself from computer to computer
  4. persuade someone in a clever or slightly dishonest way to allow you to do something or to give you something
  5. type of scam where criminals impersonate someone via email or messages

9 Clues: looking at someone's information over their shoulderphysical characteristics that can be used to identify individualsa secret word or phrase that must be used to gain admission to a placetype of scam where criminals impersonate someone via email or messagesa type of malware that spreads copies of itself from computer to computer...

Cyber Security 2024-02-05

Cyber Security crossword puzzle
Across
  1. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
  2. Gaining unauthorised access to or control of a computer system.
  3. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
  4. An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
  5. Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
  1. A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
  2. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  3. This is a form of attack that makes multiple attempts to discover something (such as a password).
  4. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.

9 Clues: Gaining unauthorised access to or control of a computer system.This is a form of attack that makes multiple attempts to discover something (such as a password).An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder....

Cyber Security 2024-10-09

Cyber Security crossword puzzle
Across
  1. When data is transformed into a format that is unreadable without a decryption key
  2. Software designed to harm or exploit any programmable device, service, or network
  3. Someone who tests system security by trying to find vulnerabilities
  4. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
  5. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
  6. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
  1. A weak spot in a system’s security defenses
  2. Malicious software that locks a user’s files and demands a ransom to restore access
  3. A process used to verify a user’s identity, typically through passwords or biometrics

9 Clues: A weak spot in a system’s security defensesSomeone who tests system security by trying to find vulnerabilitiesSoftware designed to harm or exploit any programmable device, service, or networkWhen data is transformed into a format that is unreadable without a decryption key...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

Digitech Cyber Security 2024-08-19

Digitech Cyber Security crossword puzzle
Across
  1. The practice and study of techniques for secure communication
  2. - A simple substitution cipher named after a Roman leader
  3. A cipher that uses symbols instead of letters
  4. - A harmful software program
  5. A one-way function used for integrity checks
  6. The result of encryption
  7. A type of encryption where two different keys are used
  8. A type of encryption where the same key is used
Down
  1. - Ensuring that information is only accessible to those authorized
  2. - The unencrypted message
  3. - A cipher that uses multiple substitution alphabets
  4. - A key kept secret in asymmetric encryption
  5. A famous WWII machine used for encryption
  6. An early cipher used by the Spartans

14 Clues: The result of encryption- The unencrypted message- A harmful software programAn early cipher used by the SpartansA famous WWII machine used for encryption- A key kept secret in asymmetric encryptionA one-way function used for integrity checksA cipher that uses symbols instead of lettersA type of encryption where the same key is used...

Cyber Security Revision 2024-09-19

Cyber Security Revision crossword puzzle
Across
  1. A small program designed to cause damage.
  2. A security method where a code is sent to a phone or email to verify someone's identity.
  3. Type of hacker who hacks illegally, usually to make money.
  4. Part of the Internet that is behind passwords, etc.
  5. Type of hacker who hacks legally.
  6. Software used to remove viruses.
  7. Type of hacker who hacks illegally but for the greater good.
Down
  1. A hacking method, often using email, that tricks people into entering details such as passwords.
  2. What hackers use to trick people into giving personal details.
  3. Using someone's personal details to pretend to be them, often to take out loans, etc.
  4. Part of the Internet accessed using a search engine.
  5. Part of the Internet that often contains illegal content.
  6. Software used to gain illegal access to a computer system.
  7. Unwanted email, often associated with phishing.

14 Clues: Software used to remove viruses.Type of hacker who hacks legally.A small program designed to cause damage.Unwanted email, often associated with phishing.Part of the Internet that is behind passwords, etc.Part of the Internet accessed using a search engine.Part of the Internet that often contains illegal content....

FITAVocab.TC 2013-05-16

FITAVocab.TC crossword puzzle
Across
  1. programs that you can download
  2. ethical uses of or on a computer or the web
  3. circuit board
  4. something that shows off a a business and shows people what it is about
  5. crediting a persons work
  6. extra docking system
  7. the security of or on a computer
  8. a paid internet access
  9. central processing unit
  10. a companies "slogan"
  11. a type of layout
  12. a format of a program on your computer
  13. a combination of many search engines
  14. a program that allows you to create documents
  15. the thing at the top of the screen
  16. a port to get wifi
  17. storing space
  18. liquid crystal display
  19. an illegal way of taking credit for somebody's invention
  20. light emitting diode
  21. National Cyber Security Alliance
  22. what you have on you desktop already
Down
  1. a term that describes safety o the computer or on the web
  2. decision tool
  3. a place where you can virtually go and search on the web
  4. a system that allows you to connect to other peoples devices over wifi or cellular data
  5. cd port
  6. an adjective that describes cyber in a way that is someway pixel ly
  7. the old fashion watch "not digital"
  8. things that you can buy to play or enjoy on
  9. confusing
  10. a term that describes the web and computers
  11. a virtually folder where you can save your documents, files
  12. your work
  13. a user that is online
  14. a device that can go anywhere
  15. a thing of the computer that allows you to move around on the screen or click
  16. memory card

38 Clues: cd portconfusingyour workmemory carddecision toolcircuit boardstoring spacea type of layouta port to get wifiextra docking systema companies "slogan"light emitting diodea user that is onlinea paid internet accessliquid crystal displaycentral processing unitcrediting a persons worka device that can go anywhereprograms that you can download...

1 2025-03-01

1 crossword puzzle
Across
  1. Audio talk show
  2. Exercise and health
  3. Natural food label
  4. Fully present mentally
  5. New business venture
  6. Virtual world experience
  7. Rising prices
  8. Reduce waste
  9. Independent work style
  10. Online order arrival
  11. Secure digital ledger
  12. Healthy eating science
Down
  1. Security key
  2. Mysterious or puzzling
  3. Travel for leisure
  4. Watching online content
  5. Always traveling
  6. Internet-related
  7. Battery-powered cars
  8. Advanced computing field
  9. Relaxing getaway
  10. No cables needed
  11. Not naturally made
  12. Disease prevention shot
  13. Earth's weather patterns

25 Clues: Security keyReduce wasteRising pricesAudio talk showAlways travelingInternet-relatedRelaxing getawayNo cables neededTravel for leisureNatural food labelNot naturally madeExercise and healthNew business ventureBattery-powered carsOnline order arrivalSecure digital ledgerMysterious or puzzlingFully present mentallyIndependent work style...

Cyber safety Evie Williams 2016-06-08

Cyber safety Evie Williams crossword puzzle
Across
  1. crime any internet
  2. something that stops people getting on your computer
  3. this word is the opposite of dangerous,
  4. A ringer on your computer when someone is trying to get on
  5. any software to prevent crimes online
  6. a type of bullying
  7. something that will stop viruses getting on your computer
  8. a code so people don't get on to your device
  9. mail that is not wanted
  10. a hostile strongly worded message that may contain obscene language
  11. the name a user selects to be identified on a computer or a network
  12. don't believe what someone says
  13. do not say rude words online,
Down
  1. a piece of information about your visit to a website that some websites record automatically on your computer,
  2. information about someone
  3. a computer cold
  4. something that should not be shared
  5. a person who takes over someone's device
  6. room a location online that allows multiple users to communicate electronically with each other in real time,
  7. a form of malicous displays unsolicited advertising on your computer
  8. a type of stalking
  9. at tracking feature of Internet browsers that shows all the recent websites visited
  10. Internet games that intensionly cause problems or cyber bullying other games
  11. tag the nickname the user has chosen to be identified by when playing internet games,
  12. to copy a file from one computer system
  13. a way to make money by deceiving people

26 Clues: a computer coldcrime any interneta type of stalkinga type of bullyingmail that is not wantedinformation about someonedo not say rude words online,don't believe what someone sayssomething that should not be sharedany software to prevent crimes onlinethis word is the opposite of dangerous,to copy a file from one computer system...

RU ITEC411: Crime and Security. 2024-11-25

RU ITEC411: Crime and Security. crossword puzzle
Across
  1. Traveling to sue under strict libel laws in certain countries.
  2. Malicious software designed to gather user information without consent.
  3. The process of encoding information to prevent unauthorized access.
  4. Denial-of-service attack that disrupts online services.
  5. The use of someone else's personal information for fraud
  6. A security tool used to filter and monitor network traffic.
  7. Using hacking to promote a political cause.
  8. Phishing attacks carried out via voice calls.
  9. Fraudulent attempts to obtain sensitive information via email.
  10. Hackers who improve system security by identifying vulnerabilities.
  11. A security tool to lure and study hackers.
Down
  1. Security measures using unique biological characteristics
  2. Measures taken to protect computer systems from cyber attacks.
  3. A sophisticated worm that targeted Iranian nuclear facilities
  4. Manipulating individuals to divulge confidential information.
  5. An organization that addresses trade agreements, including cross-border digital issues.
  6. Phishing attacks carried out via SMS.
  7. The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
  8. Unauthorized access to or manipulation of computer systems.
  9. Redirecting users to fraudulent websites to steal personal data.

20 Clues: Phishing attacks carried out via SMS.A security tool to lure and study hackers.Using hacking to promote a political cause.Phishing attacks carried out via voice calls.Denial-of-service attack that disrupts online services.The use of someone else's personal information for fraudSecurity measures using unique biological characteristics...

Security 2019-04-26

Security crossword puzzle
Across
  1. Country to which the taking of a Babcock IT Asset is prohibited
  2. A word or phrase used to access your PC / Phone
  3. A potential external threat either to an individual or Babcock
  4. A person closely following an employee into an area or through a barrier without showing a security pass
  5. Data ********* allows you to directly request access to shared folders
  6. A PED Zone Colours
  7. We all signed this as part of our contract Official ******* Act
  8. One of the mandatory Babcock training models ***** Security Awareness
Down
  1. Babcock IT system can be red, blue or white
  2. A loss or compromise of classified information will result in this being raised
  3. Complete the Designator (NNPPI) – Naval Nuclear ********** Programme Information
  4. A way to dispose of information securely
  5. Security Response Level displayed on the entrance gates
  6. Surname of the Submarine Business Unit Security BSM
  7. One of the recognised Classification Marking
  8. Method of ensuring good practice, governance adherence to procedures
  9. Email Scam stealing personal / business information
  10. A computer virus

18 Clues: A computer virusA PED Zone ColoursA way to dispose of information securelyBabcock IT system can be red, blue or whiteOne of the recognised Classification MarkingA word or phrase used to access your PC / PhoneSurname of the Submarine Business Unit Security BSMEmail Scam stealing personal / business information...

Security Awareness Crossword 2023-11-17

Security Awareness Crossword crossword puzzle
Across
  1. This item must be worn whilst on site or in the office
  2. Government checks carried out to confirm trustowrthiness
  3. The branch of security that protects online threats
  4. The branch of security that protects hardware
  5. This agency regulates our security arrangements.
  6. The branch of security concerning people
  7. A sign that something may be troubling a colleague
Down
  1. A technique for attempting to acquire information
  2. The information marking permitted on Cyclife servers
  3. legal substance that can affect decision making
  4. This briefing is given if you are visiting a country where the FIS operate
  5. You must do this to your screen when you walk away from your laptop
  6. Substances that can affect the way the body functions
  7. Person required when a visitor is on site
  8. The '_ _ _ _' to know principal should be applied when sharing sensitive information

15 Clues: The branch of security concerning peoplePerson required when a visitor is on siteThe branch of security that protects hardwarelegal substance that can affect decision makingThis agency regulates our security arrangements.A technique for attempting to acquire informationA sign that something may be troubling a colleague...

Cyber Security 2022-09-14

Cyber Security crossword puzzle
Across
  1. software that is in a constant state of updating. intended to be convenient to the user and meant to disrupt hackers
  2. hacking with malicious intent. typically to gain access to a computer and steal as much data as possible
  3. software that automatically displays material when a user offline
  4. an attack that disrupts the service to waste time, effort, and money
  5. hacking that is meant to do minimal damage and is usually done out of curiosity
Down
  1. an internet traffic filter meant to stop unauthorized incoming and outgoing traffic
  2. the core of a computer's operating system that houses the most essential functions of the computer
  3. the physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
  4. creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception

9 Clues: software that automatically displays material when a user offlinean attack that disrupts the service to waste time, effort, and moneyhacking that is meant to do minimal damage and is usually done out of curiosityan internet traffic filter meant to stop unauthorized incoming and outgoing traffic...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. computer
  2. james bond is
  3. trapdoor
  4. migrate
Down
  1. kidnapper
  2. ancient Greek horse trick
  3. catching fish
  4. ​underground
  5. ladybug

9 Clues: ladybugmigratecomputertrapdoorkidnapper​undergroundjames bond iscatching fishancient Greek horse trick

Cyber Security 2023-06-13

Cyber Security crossword puzzle
Across
  1. Verifying the identity of a user, process or device before allowing access to resources in a system.
  2. The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
  3. Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
  4. engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
  5. A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
  6. A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
  1. A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
  2. Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
  3. A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).

9 Clues: Verifying the identity of a user, process or device before allowing access to resources in a system.Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.engineering The methods used to manipulate people into carrying out specific actions, or divulging information....

cyber security 2024-10-09

cyber security crossword puzzle
Across
  1. a communication method that uses electronic devices to deliver messages across computer networks
  2. never share your private
  3. always have a secure
  4. a symbol, word, or words legally registered or established by use as representing a company or product.
  5. a website or app almost always has access to your personal
  6. a person who uses computers to gain unauthorized access to data
Down
  1. never use somebody elses legal right to print, publish, perform, film, or record literary, artistic, or musical material,or you will be
  2. the information about a particular person that exists on the internet as a result of their online activity
  3. never click on sketchy
  4. when creating username never use your real

10 Clues: always have a securenever click on sketchynever share your privatewhen creating username never use your reala website or app almost always has access to your personala person who uses computers to gain unauthorized access to dataa communication method that uses electronic devices to deliver messages across computer networks...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

Cyber security 2022-11-28

Cyber security crossword puzzle
Across
  1. - replicate themselves but do not attach themselves to files as a virus does.
  2. engineering - another word for phishing
  3. - locks a computer, encrypts files, and therefore prevents the user from being able to access the data
  4. - unwanted software that monitors and gathers information on a person and how they use their computer
Down
  1. - software that is designed to gain access to your computer with malicious intent
  2. - a large collection of malware-infected devices
  3. - will replicate itself by maliciously modifying other computer programs and inserting code
  4. - a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions
  5. - any device connected to a network

9 Clues: - any device connected to a networkengineering - another word for phishing- a large collection of malware-infected devices- replicate themselves but do not attach themselves to files as a virus does.- software that is designed to gain access to your computer with malicious intent...

Cyber Security 2023-09-14

Cyber Security crossword puzzle
Across
  1. Disrupt, damage, or gain unauthorized access to a computer system
  2. Fake rental properties posted online
  3. Negative behavior inflicted online
  4. Victims fall for recruiting emails and receive a bogus bank check, which they deposit and use for "mystery" shopping
Down
  1. The Recipient has not granted or verified permission for a message to be sent
  2. Data left behind on the internet
  3. A combination of uppercase letters, lowercase letters, numbers, and symbols
  4. Public area offering WIFI access
  5. Watch for spelling mistakes, and email addresses as they can easily be misrepresented

9 Clues: Data left behind on the internetPublic area offering WIFI accessNegative behavior inflicted onlineFake rental properties posted onlineDisrupt, damage, or gain unauthorized access to a computer systemA combination of uppercase letters, lowercase letters, numbers, and symbols...

CYBER SECURITY 2024-05-11

CYBER  SECURITY crossword puzzle
Across
  1. hh
  2. aa
  3. gg
  4. ee
  5. ff
Down
  1. cc
  2. dd
  3. ii
  4. bb

9 Clues: ccddhhaaiiggbbeeff

CYBER SECURITY 2024-05-11

CYBER  SECURITY crossword puzzle
Across
  1. _____ emel adalah emel yang tidak diingini yang sering masuk ke peti masuk e-mel anda, sering kali mengganggu dan tidak diundang
  2. Teknik penipuan dalam talian yang menggunakan e-mel atau laman web palsu untuk mendapatkan maklumat peribadi dari mangsanya
  3. Salah satu perisian berbahaya yang mengunci akses kepada data mangsa dan meminta tebusan untuk membebaskannya
  4. Salah satu jenayah siber berkait rapat dengan media sosial
  5. _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital
  6. salah satu bentuk penipuan atas talian
Down
  1. Program berbahaya yang diselitkan ke dalam sistem komputer tanpa izin, bertujuan untuk mencuri data
  2. Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer
  3. Salah satu jenayah siber yang menggunakan kecerdasan buatan (AI) untuk mencipta video palsu yang sukar dibezakan dari yang sebenar

9 Clues: salah satu bentuk penipuan atas talianSalah satu jenayah siber berkait rapat dengan media sosial_____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digitalPerlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer...

Cyber Security 2024-10-09

Cyber Security crossword puzzle
Across
  1. When data is transformed into a format that is unreadable without a decryption key
  2. Software designed to harm or exploit any programmable device, service, or network
  3. Someone who tests system security by trying to find vulnerabilities
  4. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
  5. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
  6. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
  1. A weak spot in a system’s security defenses
  2. Malicious software that locks a user’s files and demands a ransom to restore access
  3. A process used to verify a user’s identity, typically through passwords or biometrics

9 Clues: A weak spot in a system’s security defensesSomeone who tests system security by trying to find vulnerabilitiesSoftware designed to harm or exploit any programmable device, service, or networkWhen data is transformed into a format that is unreadable without a decryption key...

Cyber Security 2024-11-13

Cyber Security crossword puzzle
Across
  1. An unauthorised user who attempts to or gain access to a network
  2. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
  3. Securing your online accounts with an extra layer of protection is called ____________________ authentication
  4. Computer programs that can block, detect, and remove viruses and other malware
Down
  1. A mechanism to create a secure connection between a computer and the network
  2. The unauthorised disclosure or unwanted exposure of confidential information
  3. The protection of digital information, as well as the integrity of the infrastructure
  4. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
  5. Faking the sender’s email address to gain access to a secure network

9 Clues: An unauthorised user who attempts to or gain access to a networkFaking the sender’s email address to gain access to a secure networkA mechanism to create a secure connection between a computer and the networkThe unauthorised disclosure or unwanted exposure of confidential information...

Cybersecurity Crossword Puzzle 2023-09-11

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. - Refers to a revision or improvement made to a software program or system in order to fix bugs, enhance features, or patch security vulnerabilities.
  2. - The prefix "cyber" relates to computers, digital technology, and the internet. It frequently appears in contexts related to cybersecurity and cyber-related terms.
  3. - Ensuring its safety and protecting it from threats, risks, or vulnerabilities. In the realm of cybersecurity, it often entails safeguarding assets and data.
  4. - In cybersecurity, the term "spoofed" is used to describe the act of fabricating or deceiving information or the origin of data.
  5. - Short for advertisements, are messages or content created to promote products, services, or ideas.
  6. - DomainKeys Identified Mail (DKIM) is another method of email authentication. It allows recipients to verify if an email was genuinely sent from the claimed domain and authorized by it.
  7. - The process of converting information or data into code to prevent access or protect it from being read by anyone without the decryption key.
  8. - Verification.
  9. - To restore.
Down
  1. - A password is a combination of letters, numbers, and symbols that grants access to a computer system, account, or digital resource.
  2. - A type of coverage that businesses obtain to protect themselves against losses and liabilities resulting from cyberattacks and data breaches.
  3. - Sender Policy Framework is an email authentication protocol that helps prevent email spoofing by verifying if the sending mail server has permission to send emails on behalf of a domain.
  4. - An organized method or collection of recommendations for implementing security measures and protocols aimed at safeguarding an organization's assets.
  5. - Which stands for Domain-based Message Authentication, Reporting, and Conformance, is a protocol used for email authentication and reporting. Its primary purpose is to assist organizations in safeguarding their email domains against misuse in email spoofing attacks.
  6. - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry.
  7. - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.
  8. - Email is a used method of exchanging messages over the internet. It serves as a communication tool for both business purposes.
  9. DRIVE - A portable device used for storing and transferring data between computers. It relies on flash memory technology.
  10. - Refers to a fraudulent scheme intended to deceive individuals or organizations into providing money, personal information, or other valuable assets.
  11. - When a computer or device is infected, it means that it has been compromised by malware or a virus. This can disrupt its functioning and lead to data theft.

20 Clues: - To restore.- Verification.- Short for advertisements, are messages or content created to promote products, services, or ideas.- Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.- The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry....

Information Security Crossword Puzzle 2023-04-28

Information Security Crossword Puzzle crossword puzzle
Across
  1. ILoveYou123, 123456, and P@ssw0rd are all this.
  2. Keeps out most attacks and is both human and machine.
  3. The amount of systems that should have the same username and password.
  4. The most effective tool to thwart cyber attacks.
  5. These employees are part of the information security team.
  6. It is 100% secure.
  7. When anything seems strange.
  8. What to do with sensitive information before sending.
Down
  1. Software that is designed to do terrible things.
  2. Weakest link in the security chain.
  3. Anything suspicious raises these.
  4. You should only use our computers for this.
  5. An attempt to get you to let an attacker do their thing.
  6. A legal source of information that has private material.
  7. The first step in information security awareness is being about to do this with security threats.
  8. It's okay to trust, but you should also do this.

16 Clues: It is 100% secure.When anything seems strange.Anything suspicious raises these.Weakest link in the security chain.You should only use our computers for this.ILoveYou123, 123456, and P@ssw0rd are all this.Software that is designed to do terrible things.The most effective tool to thwart cyber attacks.It's okay to trust, but you should also do this....

KICT Crossword Puzzle 2022-07-20

KICT Crossword Puzzle crossword puzzle
Across
  1. Undergraduate Programme
  2. Postgraduate Programme
  3. KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
  4. KICT International Journal
  5. KICT Flagship
  6. A Department at KICT
  7. KICT Flagship
Down
  1. KICT Flagship
  2. Postgraduate Programme
  3. KICT Robe Colour
  4. KICT was established in _____ 2001
  5. Code to _____
  6. Undergraduate Student Societies
  7. Postgraduate Student Societies
  8. Centre of Excellence for Cyber Security

15 Clues: KICT FlagshipCode to _____KICT FlagshipKICT FlagshipKICT Robe ColourA Department at KICTPostgraduate ProgrammePostgraduate ProgrammeUndergraduate ProgrammeKICT International JournalPostgraduate Student SocietiesUndergraduate Student SocietiesKICT was established in _____ 2001Centre of Excellence for Cyber Security...

CISO Crossword Quiz - 2225 2025-08-02

CISO Crossword Quiz - 2225 crossword puzzle
Across
  1. Which secured number is not required for receiving money through UPI?
  2. What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
  3. What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
  4. What disguised link leads to a malicious webpage?
Down
  1. What method uses a QR code to lead users to fake webpage/payment sites?
  2. What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
  3. What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
  4. What should be strong and unique to protect your online accounts?
  5. What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
  6. What attack tricks people into clicking something different than they think?

10 Clues: What disguised link leads to a malicious webpage?What should be strong and unique to protect your online accounts?Which secured number is not required for receiving money through UPI?What method uses a QR code to lead users to fake webpage/payment sites?What attack tricks people into clicking something different than they think?...

RCAL Cipher Challenge August 2024-08-19

RCAL Cipher Challenge August crossword puzzle
Across
  1. nvjkxrkv (where do we meet)
  2. tpsvi
  3. zewfidrkzfe
  4. jvtlizkp
  5. urkr
Down
  1. vekvigizjv
  2. wzmvkyzikp (when do we meet)
  3. uvjzxe
  4. ivutvcc (what club is this)

9 Clues: urkrtpsviuvjzxejvtlizkpvekvigizjvzewfidrkzfenvjkxrkv (where do we meet)ivutvcc (what club is this)wzmvkyzikp (when do we meet)

Compliance Crossword 2022-08-29

Compliance Crossword crossword puzzle
Across
  1. Accessing PHI without a _______ business reason is a HIPAA violation.
  2. Type of email used to send sensitive information
  3. All IPMG employee-owners have an ________ to report HIPAA violations
  4. Number of PHI direct identifiers
  5. The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
  6. Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
  7. When should a HIPAA violation be reported?
  8. Required when connecting device to a public network
  9. Malicious emails used to trick people into sharing login information
  10. Type of disposal of paper records that is a HIPAA violation
Down
  1. Staff can report compliance concerns without fear of _________.
  2. Where I can search for documents and other useful information related to compliance
  3. IPMG Manual to review cyber security requirements
  4. The company with six titles of Best Places to Work in Indiana
  5. You should always lock this when leaving unattended
  6. The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
  7. The name of the Corporate Compliance Manager
  8. Who to report HIPAA violations to, aside from the Corporate Compliance Manager
  9. The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
  10. Only ______ applications can be used to conduct IPMG business

20 Clues: Number of PHI direct identifiersWhen should a HIPAA violation be reported?The name of the Corporate Compliance ManagerType of email used to send sensitive informationIPMG Manual to review cyber security requirementsYou should always lock this when leaving unattendedRequired when connecting device to a public network...

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. Before an application goes live, it needs to go through a security ___.
  3. Process of updating to address security vulnerabilities.
  4. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. SIEM tool from IBM.
Down
  1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. We are all cyber ___.
  3. Used in cryptography to prove authenticity of a device, server, or user.
  4. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. Linux distro used for ethical hacking.

10 Clues: SIEM tool from IBM.We are all cyber ___.Linux distro used for ethical hacking.Process of updating to address security vulnerabilities.Before an application goes live, it needs to go through a security ___.Used in cryptography to prove authenticity of a device, server, or user....

AI-Driven Cybersecurity 2026-03-30

AI-Driven Cybersecurity crossword puzzle
Across
  1. Secure data coding
  2. AI that creates content
  3. Data changes that fool AI
  4. Harmful software
  5. Finding hidden attacks
  6. AI trained on text data
  7. AI that learns from data
  8. Handling cyber attacks
Down
  1. Network security barrier
  2. Controlled infected network
  3. Email scam attack
  4. Autonomous AI system
  5. Malware that locks files
  6. Protects online systems
  7. AI neural network model

15 Clues: Harmful softwareEmail scam attackSecure data codingAutonomous AI systemFinding hidden attacksHandling cyber attacksAI that creates contentAI trained on text dataProtects online systemsAI neural network modelNetwork security barrierMalware that locks filesAI that learns from dataData changes that fool AIControlled infected network

Cyber Security word search 2022-09-12

Cyber Security word search crossword puzzle
Across
  1. any kind of software designed to damage, or enable unauthorized access, to computer systems.
  2. a form of electronic cash
  3. A malicious threat to a group or organization that comes from someone within
  4. A secret word or phrase that is used to access a computer system or service.
  5. An internet traffic filter meant to stop unauthorized incoming.
  6. A language used to create and control the content on a website
  7. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  8. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  9. it allows you to create a secure connection to another network using the internet.
  10. A cyber attacker who uses software and social engineering methods to steal data and information.
  11. Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
  12. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
  1. Code that is embedded into the hardware of a computer.
  2. A form of malicious software that disguises itself as a harmless computer program
  3. The core of a computer’s operating system that houses the most essential functions of the computer.
  4. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  5. Confirmation of someone's identity, either using a password or a fingerprint.
  6. Creating a fake identity on a social network account
  7. An error, flaw, failure in a computer program
  8. is the string of numbers used to identify each computer using the internet on a network.
  9. Customizable additions to software for extra functionality.

21 Clues: a form of electronic cashAn error, flaw, failure in a computer programCreating a fake identity on a social network accountCode that is embedded into the hardware of a computer.Customizable additions to software for extra functionality.A language used to create and control the content on a website...

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A fraudulent email purportedly from a reputable company attempting to get personal information
  2. Something personal to you and should never be shared
  3. A malicious software designed to block access to a computer system until a sum of money is paid
  4. The process of identifying a user’s identity
  5. The process of taking plain text and scrambling it into an unreadable format
  6. A combination of the words “robot” and “network”
  7. A piece of software or application that displays advertisements on your computer
  8. A piece of hardware or software, used to keep intruders out
  9. An icon displayed along a web browser URL; indicates a secure mode
  10. the address of a website; check its validity before clicking on it
  11. Unauthorized access to a network, information systems or application
  12. Alert / Always on the lookout
Down
  1. A sequence of words or text used to control access to a computer; similar to a password
  2. A form of malware used by hackers to spy on you and your computer activities
  3. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  4. Threatening behavior facilitated through electronic means such as texting
  5. In addition to passwords; provides better security
  6. Facebook, Twitter, Instagram etc. (Two Words)
  7. When a hacker changes source of an email so that it seems to come from a trusted source
  8. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer

20 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityFacebook, Twitter, Instagram etc. (Two Words)A combination of the words “robot” and “network”In addition to passwords; provides better securitySomething personal to you and should never be sharedA piece of hardware or software, used to keep intruders out...

Cyber Security Crossword Puzzle 2023-09-09

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. information
  2. used to navigate through the web
  3. verifies that the severs address matches the "from" address you see
  4. the action of verifying the identity of a user
  5. a device that sends packets to a computers network
  6. An encrypted connection over the internet from a device to a network
  7. tells other servers which servers are allowed to send emails using your business's domain name
  8. puts a digital signature on outgoing mail so servers can verify that an email from your domain actually was sent from your organization’s servers
  9. software designed to block access to a computer system until a sum of money is paid
  10. a piece of code cable of copying itself and spreading through a computer system
Down
  1. software that is designed to disrupt or damage anything in a computer system
  2. when software or data can be access through unauthorized personnel
  3. restricted access to something
  4. protect information by turning it into code
  5. A persons whos job is to sell things for the company
  6. the programs and operating information used by a computer
  7. To imitate something or trick someone
  8. usually in the form of emails, it is used to gain personal information by posing as well known companies
  9. interactive parts that work together to exchange information
  10. software designed to destroy computer viruses

20 Clues: informationrestricted access to somethingused to navigate through the webTo imitate something or trick someoneprotect information by turning it into codesoftware designed to destroy computer virusesthe action of verifying the identity of a usera device that sends packets to a computers networkA persons whos job is to sell things for the company...

Introduction to Cyber Security 2023-09-10

Introduction to Cyber Security crossword puzzle
Across
  1. A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
  2. A component of a computer system that prevents unauthorized data access.
  3. a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
  4. A software update or repair published by developers to correct security flaws or enhance system performance.
  5. When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
  6. unwanted email messages
  7. Computer program that is used to provide customized adverts
  8. a field in which computers and networks are employed
  9. An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
  1. To imitate a character, users exploit internet platforms to acquire access or personal information.
  2. Manipulation used to obtain unauthorized access to a computer system
  3. software that is secretly installed on a user's device in order to acquire confidential information
  4. a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
  5. A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
  6. An unauthorized effort to gain access to a computer
  7. Malware that prevents an organization from accessing a file system.
  8. avoiding an organization's existing security mechanisms
  9. software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
  10. The process of protecting digital information over its full life cycle.
  11. A collection of personal computers used to infect malicious software.

20 Clues: unwanted email messagesAn unauthorized effort to gain access to a computera field in which computers and networks are employedavoiding an organization's existing security mechanismsComputer program that is used to provide customized advertsMalware that prevents an organization from accessing a file system....

Cyber Security Participation puzzle 2023-03-17

Cyber Security Participation puzzle crossword puzzle
Across
  1. attacks seeking out personal information
  2. malware that reproduces itself
  3. multiple steps to log in
  4. software that displays ads
  5. a mischeivious hacker
  6. lots of attackers preventing legitimate users
  7. scrambling data so it cant be read
  8. happens when a hacker is successful
  9. devices controlled by malware
  10. shield for data
  11. media changed to look authentic
Down
  1. software that checks for malware
  2. software that tracks you
  3. apps that give computers instructions
  4. network pro learning hacking techniques
  5. software that is harmful
  6. malware that makes you pay
  7. tricks users into clicking on harmful links
  8. malware pretending to be useful
  9. internet access at starbucks

20 Clues: shield for dataa mischeivious hackersoftware that tracks yousoftware that is harmfulmultiple steps to log insoftware that displays adsmalware that makes you payinternet access at starbucksdevices controlled by malwaremalware that reproduces itselfmalware pretending to be usefulmedia changed to look authenticsoftware that checks for malware...

MGregori's Cyber Security Crossword 2025-03-13

MGregori's Cyber Security Crossword crossword puzzle
Across
  1. Investigates cybercrime evidence
  2. Captures network traffic data
  3. Physically isolated network security
  4. Converts data into code
  5. Overloads system with traffic
  6. Malicious software or programs
  7. Encrypts files, demands payment
  8. Blocks unauthorized network access
  9. Isolates untrusted code execution
  10. – Repeated password guessing attack
Down
  1. Fraudulent email for credentials
  2. Steals active user session
  3. web Hidden, encrypted online network
  4. Targets vendor software security
  5. Gains unauthorized higher access
  6. Takes advantage of vulnerabilities
  7. Disguised as legitimate software
  8. Malicious code triggers conditionally
  9. Network of infected computers
  10. Unknown software vulnerability

20 Clues: Converts data into codeSteals active user sessionCaptures network traffic dataOverloads system with trafficNetwork of infected computersMalicious software or programsUnknown software vulnerabilityEncrypts files, demands paymentFraudulent email for credentialsInvestigates cybercrime evidenceTargets vendor software security...

Cyber Safety and Security 2025-06-13

Cyber Safety and Security crossword puzzle
Across
  1. A crime where someone steals your personal information and uses it to commit fraud in your name.
  2. A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
  3. A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
  4. Creations of the human mind, such as inventions or artistic works, that are legally protected.
  5. Focuses on your right to control your personal information, including who collects it and how it's used.
  6. Protecting digital data from unauthorized access, use, or disclosure.
  7. The act of presenting someone else's work or ideas as one's own without proper citation.
  8. Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
  9. A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
  10. A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
  1. The trace of data you create as you navigate the online world, also called a "digital shadow".
  2. Any illegal activity facilitated by electronic devices and the internet.
  3. The use of electronic means to bully or harass another person, often through negative or false content.
  4. Data deliberately provided by an individual through online activities, such as information submitted on forms.
  5. Occurs when unauthorized individuals gain access to sensitive or confidential information.
  6. Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
  7. Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
  8. Encoding data so it can only be decrypted and read by authorized parties.
  9. Data collected automatically without intentional participation, like browsing history, often through cookies.
  10. Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
  11. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
  12. Ensuring data is accessible only to authorized individuals or systems.
  13. A legal right protecting original works of authorship like books, music, or computer programs.
  14. Software used to detect and remove malicious programs from computer systems.
  15. Malicious software used to harm or exploit a computer system, server, or network.
  16. A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.

26 Clues: Protecting digital data from unauthorized access, use, or disclosure.Ensuring data is accessible only to authorized individuals or systems.Any illegal activity facilitated by electronic devices and the internet.Encoding data so it can only be decrypted and read by authorized parties....

Cyber Cross word 2025-03-09

Cyber Cross word crossword puzzle
Across
  1. sensitive information
  2. space
  3. cyber
Down
  1. learning in person and online
  2. theft
  3. invasion of privacy

6 Clues: theftspacecyberinvasion of privacysensitive informationlearning in person and online

Cyber 2023-12-04

Cyber crossword puzzle
Across
  1. Email scam tactic
  2. Network protection
  3. Private browsing tunnel
  4. Unique authentication method
  5. Data security
  6. Vulnerability exploitation tactic
Down
  1. Fake website redirection
  2. Isolated software testing environment
  3. Data encryption extortion
  4. Cyber threats

10 Clues: Data securityCyber threatsEmail scam tacticNetwork protectionPrivate browsing tunnelFake website redirectionData encryption extortionUnique authentication methodVulnerability exploitation tacticIsolated software testing environment

Cloud (Data Centre) Controls and Cyber Controls 2020-10-15

Cloud (Data Centre) Controls and Cyber Controls crossword puzzle
Across
  1. Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
  2. BCP Tests and Wallet Cards are examples of business ___________ management documentation
  3. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
  4. IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
  5. All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
  6. Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
  7. Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
  8. Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
  1. Information assets are ________ for vulnerabilities and reported for remediation
  2. Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
  3. _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
  4. Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
  5. To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
  6. Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
  7. IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed

15 Clues: Information assets are ________ for vulnerabilities and reported for remediationBCP Tests and Wallet Cards are examples of business ___________ management documentationCyber incidents are __________, prioritised, escalated and recorded as per incident response plans...

cyber security crossword puzzle 2021-03-17

cyber security crossword puzzle crossword puzzle
Across
  1. a vulnerability hackers will take advantage of
  2. if someone gave u a ps5 for Christmas but you open the box and its socks
  3. canned meat but also annoying emails
  4. what we deal with trying to watch pirated movies
  5. purposely put on your computer to steal your information
  6. tik tok instagram facebook snapchat are all examples of...
  7. slimy little animal that lives in the dirt and will ruin your computer
  8. the one thing you don't want on your computer
  9. after 10pm you can probably find me in a discord...
  10. you could say the zodiac killer put an ... on his letters to the police
Down
  1. where organized information is stored
  2. can be compared to finding dory
  3. we use one to complete our security labs
  4. seems okay but contains malware
  5. advertisements displayed by software
  6. our teachers send us way too many of these
  7. using social tactics to get information
  8. what comes with phishing emails
  9. tree diagram of the processes that a product goes through
  10. when the internet is down we turn this off and turn it back on

20 Clues: can be compared to finding doryseems okay but contains malwarewhat comes with phishing emailsadvertisements displayed by softwarecanned meat but also annoying emailswhere organized information is storedusing social tactics to get informationwe use one to complete our security labsour teachers send us way too many of these...

Cyber Security Awareness Month 2021-10-15

Cyber Security Awareness Month crossword puzzle
Across
  1. Hard to detect both by Users.
  2. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
  3. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
  4. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
  5. An attack focusing on people rather than technology.
  6. A form of malware that monitors user activities and reports them to an external their party.
  7. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
  8. Something that shows up in an email.
  9. Threats Malware is defined as any device.
Down
  1. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
  2. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
  3. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
  4. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
  5. a dishonest scheme; a fraud.
  6. Alerts used as a warning of danger.
  7. The ultimate call control center that gives customers full control of all scam protection options.
  8. The act of falsifying the identity of the source of a communication or interaction.
  9. Identity and Privacy Protection.
  10. Someone attempting to create Identity fraud.
  11. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
  12. An attempt by hackers to damage or destroy a computer network or system.
  13. A security tool, which may be a hardware or software solution that is used to filter network traffic.

22 Clues: a dishonest scheme; a fraud.Hard to detect both by Users.Identity and Privacy Protection.Alerts used as a warning of danger.Something that shows up in an email.Threats Malware is defined as any device.Someone attempting to create Identity fraud.An attack focusing on people rather than technology....

Basics of Cyber Security 2021-06-29

Basics of Cyber Security crossword puzzle
Across
  1. threatening behavior facilitated through electronic means such as texting.
  2. a wireless technology standard used over short distances using short-wavelength UHF radio waves.
  3. hardware or software designed to prevent unauthorized access to or from a private network.
  4. should be constructed of upper and lower case letters, numbers, and special characters.
  5. fraudulent email purportedly from a reputable company attempting to get personal information.
  6. A sequence of words or text used to control access to a computer; similar to a password.
  7. The address of a webpage. Check the validity of it before clicking on it.
  8. the process of taking plain text and scrambling it into an unreadable format.
  9. a flaw or weakness in a computer system that could be exploited to violate the system’s security.
  10. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  11. fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. facebook, Twitter, Instagram, etc. (Two words)
  4. The “I” in the C-I-A Triad; protection from unauthorized changes.
  5. verifying identity.
  6. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  7. security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Unauthorized access to a network, information systems, or application.
  9. the “A” in the C-I-A Triad. It ensures authorized users have access.

20 Clues: verifying identity.facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.the “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cyber Security Awareness 2022 2022-07-19

Cyber Security Awareness 2022 crossword puzzle
Across
  1. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
  2. A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
  3. The recovery of data following computer failure or loss
  4. Another kind of malware that allows cybercriminals to remotely control your computer
  5. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
  6. Malware that passes information about a computer user’s activities to an external party
  7. Obtaining services by using someone else’s resources
  8. A device or software designed to prevent unauthorized access to a computer or network
  9. A term related to the malicious concept of a botnet
  10. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  11. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
  12. high-speed internet access
Down
  1. A flaw or weakness that can be used to attack a system or organization
  2. Computer that provides data or services to other computers over a network
  3. An app on your phone that generates a code to add an extra level of security to a password
  4. The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
  5. A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
  6. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
  7. Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
  8. Method used by criminals to obtain financial or other confidential information
  9. It's not really a _____, it's just someone else's computer
  10. This should be at least 8 characters long
  11. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
  12. Something of value to a person, business, or organization
  13. Something that could cause an organization not to meet one of its objectives
  14. Malware that replicates itself so it can spread to infiltrate other computers

26 Clues: high-speed internet accessThis should be at least 8 characters longA term related to the malicious concept of a botnetObtaining services by using someone else’s resourcesThe recovery of data following computer failure or lossSomething of value to a person, business, or organizationIt's not really a _____, it's just someone else's computer...

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A form of malware used by hackers to spy on you and your computer activities
  2. Unauthorized access to a network, information systems or application
  3. A piece of software or application that displays advertisements on your computer
  4. When a hacker changes source of an email so that it seems to come from a trusted source
  5. A sequence of words or text used to control access to a computer; similar to a password
  6. The process of taking plain text and scrambling it into an unreadable format
  7. A piece of hardware or software, used to keep intruders out
  8. Threatening behavior facilitated through electronic means such as texting
  9. In addition to passwords; provides better security
  10. A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
  1. Something personal to you and should never be shared
  2. A malicious software designed to block access to a computer system until a sum of money is paid
  3. media Facebook, Twitter, Instagram etc. (Two Words)
  4. The process of identifying a user’s identity
  5. A combination of the words “robot” and “network”
  6. the address of a website; check its validity before clicking on it
  7. A fraudulent email purportedly from a reputable company attempting to get personal information
  8. Alert / Always on the lookout
  9. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  10. An icon displayed along a web browser URL - indicates a secure mode

20 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityA combination of the words “robot” and “network”In addition to passwords; provides better securitymedia Facebook, Twitter, Instagram etc. (Two Words)Something personal to you and should never be sharedA piece of hardware or software, used to keep intruders out...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

25 Cyber Security Facts 2023-08-30

25 Cyber Security Facts crossword puzzle
Across
  1. is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. communications standard that enables application programs and computing devices to exchange messages over a network.
  3. the capacity at which a network can transmit data.
  4. a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
  5. is a malware designed to deny a user or organization access to files on their computer.
  6. the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
  7. a computer network security system that restricts internet traffic in, out, or within a private network.
  8. storage mode of computer data storage in which digital data is stored on servers in off-site locations.
  9. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
  10. a system of signals or symbols for communication.
  11. refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
  12. malware designed to collect online banking credentials and other sensitive information from infected machines
Down
  1. technique used by fraudsters to get control of your phone number.
  2. the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  3. software used by cybercriminals to gain control over a target computer or network.
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
  5. is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
  6. is a type of security measure known as challenge-response authentication.
  7. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  8. information that has been translated into a form that is efficient for movement or processing
  9. the method by which information is converted into secret code that hides the information's true meaning.
  10. he hidden collective of internet sites only accessible by a specialized web browser.
  11. a formal request to an authority for something
  12. an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
  13. The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

25 Clues: a formal request to an authority for somethinga system of signals or symbols for communication.the capacity at which a network can transmit data.technique used by fraudsters to get control of your phone number.is a type of security measure known as challenge-response authentication....

Cyber Security Crossword Puzzle 2025-03-12

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. viruses, worms, and ransomware
  2. security system that monitors traffic
  3. records keystrokes to steal passwords
  4. manipulate people to give data
  5. encrypts internet connections
  6. delivery of computing services
  7. convert data into coded format
  8. fixes vulnerabilities or improves security
  9. secretly gathers user information
  10. network of infected computers
  11. encrypts a victims data
  12. verifying the identity of user
Down
  1. analyze business data for decisions
  2. collection and analysis of data
  3. bypassing normal authentication
  4. process store distribute information
  5. impersonate a trustworthy entity
  6. overwhelms a network with excessiveness
  7. confidential information is stolen
  8. determine whats allowed for access

20 Clues: encrypts a victims dataencrypts internet connectionsnetwork of infected computersviruses, worms, and ransomwaremanipulate people to give datadelivery of computing servicesconvert data into coded formatverifying the identity of usercollection and analysis of databypassing normal authenticationimpersonate a trustworthy entity...

FIT E Final Quiz Vocab 2013-05-17

FIT E Final Quiz Vocab crossword puzzle
Across
  1. What you can download like Pages, Word, Outlook
  2. Pertaining to a computer
  3. Short Term Memory for Your Computer
  4. Like a waiter for your computer
  5. National Cyber Security Tool
Down
  1. Where you plug in your flash drive
  2. A peripheral, click click
  3. Google, Yahoo, Bing, etc.

8 Clues: Pertaining to a computerA peripheral, click clickGoogle, Yahoo, Bing, etc.National Cyber Security ToolLike a waiter for your computerWhere you plug in your flash driveShort Term Memory for Your ComputerWhat you can download like Pages, Word, Outlook

crossword puzzle 2022-12-31

crossword puzzle crossword puzzle
Across
  1. cyber security international exam
  2. an open source operating system
  3. a notebook computer
  4. our country
  5. computer language
  6. brain of the computer
  7. popular search engine
  8. microsoft browser
Down
  1. that we learning now
  2. social media platform
  3. we can't touch that in computer
  4. institute of network hardware software
  5. software which configure the hardware
  6. a developer platform

14 Clues: our countrycomputer languagemicrosoft browsera notebook computerthat we learning nowa developer platformsocial media platformbrain of the computerpopular search enginewe can't touch that in computeran open source operating systemcyber security international examsoftware which configure the hardwareinstitute of network hardware software