cyber security Crossword Puzzles

Cybersecurity 2018-08-02

Cybersecurity crossword puzzle
Across
  1. CLI command to search for a pattern of letters
  2. Program used to collect cryptocurrency
  3. The telephone equivalent of phishing
  4. Protocol that WannaCry took advantage of
  5. First step in the cyber kill chain
  6. A compromised computer in a botnet
  7. Command to identify Ethernet devices
  8. Process security analysts use to search for advanced threats
  9. Resolve hostnames to IP addresses
  10. The second in the CIA triad
Down
  1. ... is the process of directing the company approach to security
  2. ... systems use physical characteristics to determine access
  3. The process of adding allowed programs to a list is called ...
  4. Testing technique using invalid or random data as input
  5. A weakness that can be exploited
  6. Specifies who gets access to what
  7. The process of reversing encoded data is ...
  8. The approach of using multiple layers of security
  9. Piece of forensic data identifying potential malicious activity
  10. Uses rules to allow or block traffic

20 Clues: The second in the CIA triadA weakness that can be exploitedSpecifies who gets access to whatResolve hostnames to IP addressesFirst step in the cyber kill chainA compromised computer in a botnetThe telephone equivalent of phishingCommand to identify Ethernet devicesUses rules to allow or block trafficProgram used to collect cryptocurrency...

CIS 178 Cybersecurity Participation 2023-04-20

CIS 178 Cybersecurity Participation crossword puzzle
Across
  1. Malware that demands payment
  2. Software that detects malware
  3. Criminal activity on computer systems
  4. secure website connection
  5. Successful cyber attack
  6. a software vulnerability
  7. a system weakness
  8. malicious digital activity
  9. data protection method
  10. fraudulent email technique
Down
  1. network security barrier
  2. a traffic overload cyberattack
  3. user identity verification
  4. computer infection
  5. secret access code
  6. unauthorized access
  7. harmful software program
  8. unsolicited email
  9. A network of infected computers
  10. physical trait recognition

20 Clues: unsolicited emaila system weaknesscomputer infectionsecret access codeunauthorized accessdata protection methodSuccessful cyber attacknetwork security barrierharmful software programa software vulnerabilitysecure website connectionuser identity verificationphysical trait recognitionmalicious digital activityfraudulent email technique...

Cyber Ethics 2025-06-14

Cyber Ethics crossword puzzle
Across
  1. – Moral principles that govern behavior
  2. – Monitoring someone online without consent
  3. – Unwanted or junk email
  4. – Online profile that represents a person
  5. – A person who harasses others on the internet
  6. – Common language used in email virus scams
  7. – Special characters used to strengthen passwords
  8. – Legal right protecting original work
  9. – Making private information known
  10. – Code of polite behavior on the internet
  11. – Malware that locks data until payment is made
Down
  1. – Measures to protect data from cyber threats
  2. – Set of moral principles in digital conduct
  3. – State of being unknown or unidentifiable online
  4. – Copying someone else's work without credit
  5. – Portable devices vulnerable to cyber threats
  6. – A person who gains unauthorized access to systems
  7. – Fraudulent attempt to get sensitive info
  8. – Software designed to harm or exploit a computer
  9. – Popular platform where cyberbullying can occur

20 Clues: – Unwanted or junk email– Making private information known– Legal right protecting original work– Moral principles that govern behavior– Online profile that represents a person– Code of polite behavior on the internet– Fraudulent attempt to get sensitive info– Monitoring someone online without consent– Common language used in email virus scams...

CBL World 2023-05-05

CBL World crossword puzzle
Across
  1. Your Cyber Security Partner
  2. Kidnapped & hold for ransom
  3. Burning walls, keep intruders away
  4. Most critical element in CyberSecurity
  5. Locked with a key, for data security
Down
  1. Weakness that can be exploited
  2. Make it strong, complex, and change frequently
  3. Plug and play your Apps on the cloud
  4. Assessed, Validated, and Certified
  5. Rhymes with fishing
  6. Vaccine for your systems
  7. Weakest link in CyberSecurity (Human factor)

12 Clues: Rhymes with fishingVaccine for your systemsYour Cyber Security PartnerKidnapped & hold for ransomWeakness that can be exploitedAssessed, Validated, and CertifiedBurning walls, keep intruders awayPlug and play your Apps on the cloudLocked with a key, for data securityMost critical element in CyberSecurityWeakest link in CyberSecurity (Human factor)...

Security Awareness Crossword 2024-09-29

Security Awareness Crossword crossword puzzle
Across
  1. Playing games of chance for money
  2. Relates to people security
  3. Measures used to secure a site
  4. Part of the SHEQS function
  5. Relates to IT security
  6. Used to mark a boundary
Down
  1. Deliberate act of destruction
  2. Malicious software designed to block computer access
  3. Secret word or phrase used to gain access to somewhere
  4. state of being comfortable, healthy and happy

10 Clues: Relates to IT securityUsed to mark a boundaryRelates to people securityPart of the SHEQS functionDeliberate act of destructionMeasures used to secure a sitePlaying games of chance for moneystate of being comfortable, healthy and happyMalicious software designed to block computer accessSecret word or phrase used to gain access to somewhere

Generation & Suppliers Staff 2020-10-01

Generation & Suppliers Staff crossword puzzle
Across
  1. Hydrogen Generation
  2. Cyber Security
  3. Component Technical Issues
  4. Knows Access Code to Basement Door in White Flint
  5. Fuel Cycle Facilities
  6. DI&C
  7. Budget
  8. Dr. Casey’s Best Friend
  9. FOF Programs
  10. Reactor Oversight Process
  11. Helps Jerry with SAC; Marc with New Plants
  12. Suppliers
  13. Dry Used Fuel Storage
  14. Operator Licensing
  15. Accident Tolerant Fuels
  16. Physical Security Programs
  17. Engineering Processes and Programs
  18. Used Fuel Policy
  19. Fuel Supply and Trade
  20. Decommissioning
  21. FLEX
Down
  1. Research & Test Reactors
  2. Radiation Protection
  3. Codes and Standards
  4. Second License Renewal
  5. Sue's Go-to for Security Support
  6. Leader of the Pack
  7. Fire Protection
  8. NERC Issues
  9. Webinar Magician
  10. External Affairs
  11. Emergency Preparedness
  12. PHE Industry Coordination
  13. Part 53 Rulemaking
  14. New (matrix) addition to group
  15. Fitness for Duty
  16. Micro Reactors
  17. Flooding, Seismic and all acts of God
  18. PADS Oversight

39 Clues: DI&CFLEXBudgetSuppliersNERC IssuesFOF ProgramsCyber SecurityMicro ReactorsPADS OversightFire ProtectionDecommissioningWebinar MagicianExternal AffairsFitness for DutyUsed Fuel PolicyLeader of the PackPart 53 RulemakingOperator LicensingHydrogen GenerationCodes and StandardsRadiation ProtectionFuel Cycle FacilitiesDry Used Fuel Storage...

Security Awareness 2025 Crossword 2025-02-11

Security Awareness 2025 Crossword crossword puzzle
Across
  1. The purpose of this puzzle is to increase security______
  2. The loss of ID card, building access cards and compromise of passwords are examples of security _____ and must be reported
  3. Chief ____ Officer (CSO)
  4. Hacking is an example of a ____ attack
  5. Physical security focuses on the safeguarding of sensitive information/_______/facilities
  6. If a service contract contains a security _____, you must complete an SRCL
  7. The PGS contains eight security controls and three ____
  8. These emails are designed to deceive you into providing information
  9. It is important to regularly exercise your ______ continuity plans
  10. The current mandatory security awareness course, acronym
  11. Security in contracting refers to the procurement of goods or _____
  12. For reliability status, the screening process includes a ___ enforcement inquiry
  13. _____Information/assets have a potential for injury
  14. To be privy to certain information, you must have a ____ to know
Down
  1. Project/Security/ Contracting _____
  2. Malicious software designed to infiltrate or damage a computer system
  3. "I Luv Ch3eZ@L0T!" - for example
  4. Information categorized as ____ can only be processed in a high security zone
  5. All _____ must be issued temporary passes and escorted to access a GC site
  6. TBS' ____ on Government Security
  7. Security control #7, security event
  8. Reliability ____, the minimum security screening requirement within the Government of Canada
  9. Training hub for public servants, acronym
  10. By leaving the building during a Shelter-In-Place, you could put ______ in danger
  11. The Canadian telecommunications industry is an example of a ____function
  12. To email Protected B information, it must be_______
  13. One must ____ documents according to their level of sensitivity
  14. You must perform this evaluation to categorize your information/assets
  15. The A,B or C of information management security
  16. Reporting a security event helps mitigate_____
  17. A natural ____ is an example of a disruption to a critical function

31 Clues: Chief ____ Officer (CSO)"I Luv Ch3eZ@L0T!" - for exampleTBS' ____ on Government SecurityProject/Security/ Contracting _____Security control #7, security eventHacking is an example of a ____ attackTraining hub for public servants, acronymReporting a security event helps mitigate_____The A,B or C of information management security...

Cabinet Departments 2022-11-14

Cabinet Departments crossword puzzle
Across
  1. safety vehicles, roads, USDOT, ODOT
  2. all legal matters, FBI, DEA, prisons
  3. USDA, farming, food, crop sales/distribution, economic development
  4. fair housing, housing planning
  5. terrorism, disasters, cyber security, border control, immigration
  6. healthcare, benefits for veterans
  7. trade, economy, industrial standards, gather data
Down
  1. schools, loans/grants
  2. unemployment, workplace safety, wage standards, employee rights
  3. public health, family services, adoption/foster, drug prevention
  4. federal lands, conservation, Native American territories, National Parks
  5. international relations, foreign policies
  6. production of currency, public debt, tax laws
  7. waste disposal, energy production, nuclear weapons
  8. military, national security

15 Clues: schools, loans/grantsmilitary, national securityfair housing, housing planninghealthcare, benefits for veteranssafety vehicles, roads, USDOT, ODOTall legal matters, FBI, DEA, prisonsinternational relations, foreign policiesproduction of currency, public debt, tax lawstrade, economy, industrial standards, gather data...

CYBER Crossword 2025-10-21

CYBER Crossword crossword puzzle
Across
  1. : The process of granting or denying specific requests to use resources or information systems.
  2. : A security mechanism requiring two or more independent credentials for authentication.
  3. : Fraudulent attempt (often by email) to obtain sensitive information by posing as a trustworthy entity.
  4. : A hidden or undocumented entry point in software or a system to bypass normal security controls.
  5. : A weakness in a system, design, implementation, or configuration that can be exploited.
  6. : Copies of data held in separate storage, used so systems can recover from failures, errors or attacks such as ransomware.
  7. : A network security device or software that monitors and controls incoming and outgoing network traffic based on rules.
  8. : Malicious software designed to damage or do unwanted actions on a computer system.
  9. : Knowledge about threat actors, their tools, tactics, and procedures, used to inform defensive actions.
  10. : A list of approved items (users, applications, IPs) that are granted access; everything else is typically denied by default.
  11. : An attack that disrupts normal traffic by overwhelming a target with requests.
  12. : An individual, group or organisation that has the intent and capability to carry out harmful cyber actions.
Down
  1. : The confirmed exposure of protected or sensitive information to an unauthorised party.
  2. : The ability of an organisation to continue operating and recover during or after a cyber-attack or incident.
  3. : A network of internet-connected devices infected by malware and controlled as a group without the owners’ knowledge.
  4. : A highly sophisticated cyber attack, often by a well-resourced adversary, aiming to remain undetected for a long period.
  5. : A threat posed by someone within the organisation, e.g., an employee, who uses their access (intentionally or unintentionally) to harm the organisation.
  6. : Verifying the identity of a user, process or device.
  7. : A record of events (who did what, when) used to support security monitoring and investigation.
  8. : The approval or permission for someone or something to perform an action.
  9. : The process of converting plaintext into ciphertext to prevent unauthorized access.
  10. : A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause undesired behaviour.
  11. : A vulnerability or exploit that is unknown to the vendor and has no patch available at time of attack.

23 Clues: : Verifying the identity of a user, process or device.: The approval or permission for someone or something to perform an action.: An attack that disrupts normal traffic by overwhelming a target with requests.: Malicious software designed to damage or do unwanted actions on a computer system....

Data Privacy and Cybersecurity 2022-08-15

Data Privacy and Cybersecurity crossword puzzle
Across
  1. This 2020 ballot initiative amended 2 down
  2. This type of document guides an organization's response after a data privacy and security incident
  3. A law firm that guides an organization through a data privacy and security incident
  4. A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
  5. This European Union law served as the basis for the creation of 2 down
  6. Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
  7. A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
  8. An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
  1. Number of comprehensive consumer privacy laws in the United States
  2. The United States' first state-specific consumer privacy law
  3. A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
  4. Unauthorized activity on an organization’s digital network
  5. The Advisen 2022 "Cyber Law Firm of the Year"
  6. This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"

14 Clues: This 2020 ballot initiative amended 2 downThe Advisen 2022 "Cyber Law Firm of the Year"Unauthorized activity on an organization’s digital networkThe United States' first state-specific consumer privacy lawNumber of comprehensive consumer privacy laws in the United StatesThis year's Cybersecurity Awareness Month theme - "See ___ in Cyber"...

Plain Language Safety Code Alerts 2024-11-26

Plain Language Safety Code Alerts crossword puzzle
Across
  1. You found a suspicious package
  2. Person in cardiac/Respiratory arrest or needing medical assistance
  3. Disaster, incoming patient
  4. Security assistance needed for a hostage situation
  5. Severe Weather
  6. You observe fire or smoke
  7. A Cyber attack has occured on DCH's computer system
  8. Initiated to prevent combative or disruptive person from entering the building
  9. A Hazardous Arbonne Agent has been detected outside.
Down
  1. Only one unit needs to move patients out of their rooms into the hallway for safety.
  2. A Hazardous Material spill has occurred in the Hospital
  3. Missing person
  4. Security assistance needed for a violent person with a Gun
  5. Security Assistance Needed for a combative person
  6. Inpatient experiencing distress

15 Clues: Missing personSevere WeatherYou observe fire or smokeDisaster, incoming patientYou found a suspicious packageInpatient experiencing distressSecurity Assistance Needed for a combative personSecurity assistance needed for a hostage situationA Cyber attack has occured on DCH's computer systemA Hazardous Arbonne Agent has been detected outside....

CYBER SECURITY CHALLENGE 2024-11-21

CYBER SECURITY CHALLENGE crossword puzzle
Across
  1. Computer threat
  2. Secure data
  3. Programmer's language
  4. Network shield
  5. Data protection
  6. Internet platform
  7. Login requirement
  8. Computer connection
Down
  1. Protected data
  2. Virus remover
  3. Security symbol
  4. Harmful software
  5. Unauthorized access
  6. Computer information

14 Clues: Secure dataVirus removerProtected dataNetwork shieldComputer threatSecurity symbolData protectionHarmful softwareInternet platformLogin requirementUnauthorized accessComputer connectionComputer informationProgrammer's language

Crossword 2023-03-14

Crossword crossword puzzle
Across
  1. Acronym for chief information security officer
  2. A cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed
  3. Antigen ______ Defense
  4. _____ Response Consulting
  5. Your Antigen resource for your licensing needs
  6. Cyber Risk _______
Down
  1. Antigen Security's partner for insurance carriers
  2. Antigen Security's partner for insurance brokers
  3. Acronym for digital forensics & incident response
  4. The possibility of a malicious attempt to damage or disrupt a computer network or system.
  5. Managed ______ Providers

11 Clues: Cyber Risk _______Antigen ______ DefenseManaged ______ Providers_____ Response ConsultingAcronym for chief information security officerYour Antigen resource for your licensing needsAntigen Security's partner for insurance brokersAntigen Security's partner for insurance carriersAcronym for digital forensics & incident response...

KICT Crossword Puzzle 2022-07-20

KICT Crossword Puzzle crossword puzzle
Across
  1. / KICT Flagship
  2. / Undergraduate Student Societies
  3. / KICT was established in _____ 2001
  4. / Undergraduate Programme
  5. / Postgraduate Programme
  6. / Code to _____
  7. / A Department at KICT
Down
  1. / Centre of Excellence for Cyber Security
  2. / Postgraduate Student Societies
  3. Digital Education / KICT Flagship
  4. / KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
  5. / KICT Robe Colour
  6. Sejahtera / KICT Flagship
  7. / Postgraduate Programme
  8. / KICT International Journal

15 Clues: / KICT Flagship/ Code to _____/ KICT Robe Colour/ A Department at KICT/ Postgraduate Programme/ Postgraduate Programme/ Undergraduate ProgrammeSejahtera / KICT Flagship/ KICT International Journal/ Postgraduate Student Societies/ Undergraduate Student SocietiesDigital Education / KICT Flagship...

CYBER SECURITY CHALLENGE 2024-11-21

CYBER SECURITY CHALLENGE crossword puzzle
Across
  1. Network shield
  2. Virus remover
  3. Harmful software
  4. Programmer's language
  5. Data protection
  6. Login requirement
Down
  1. Protected data
  2. Secure data
  3. Security symbol
  4. Computer connection
  5. Computer threat
  6. Unauthorized access
  7. Internet platform
  8. Computer information

14 Clues: Secure dataVirus removerProtected dataNetwork shieldSecurity symbolComputer threatData protectionHarmful softwareInternet platformLogin requirementComputer connectionUnauthorized accessComputer informationProgrammer's language

Cyber Security 2022-06-08

Cyber Security crossword puzzle
Across
  1. A tool used to mask your online identity by redirecting and encrypting your data before it is sent
  2. An attack that aims to make a service or website unusable by 'flooding' it with malicious traffic
  3. Malware that locks data and encrypts it to commit fraud
  4. Malware that gathers information from a person or company by violating privacy
Down
  1. Gathers sensitive information that involves both social engineering and email
  2. Malware that infects devices with multiple, intrusive, ads
  3. Malware that infects and spreads with files and links together with social engineering
  4. Infects devices through suspicious files and links
  5. Works like a virus, but can infect devices on it's own and through software vulnerabilities

9 Clues: Infects devices through suspicious files and linksMalware that locks data and encrypts it to commit fraudMalware that infects devices with multiple, intrusive, adsGathers sensitive information that involves both social engineering and emailMalware that gathers information from a person or company by violating privacy...

Cyber Security 2021-03-30

Cyber Security crossword puzzle
Across
  1. Only for you
  2. Fake emails
  3. Uses vulnerabilities to get access
  4. An extra layer of protection
  5. Attached to a file
Down
  1. Private
  2. Needs to be downloaded
  3. A code that protects your account
  4. An illegal way of accessing your device

9 Clues: PrivateFake emailsOnly for youAttached to a fileNeeds to be downloadedAn extra layer of protectionA code that protects your accountUses vulnerabilities to get accessAn illegal way of accessing your device

Cyber Security 2023-10-27

Cyber Security crossword puzzle
Across
  1. A trail of data left behind online
  2. Having a duty to deal with something
  3. Browser
  4. How our online information should be
Down
  1. Saying hurtful things to someone online
  2. Helps protect your information
  3. Intended to be kept secret
  4. Machinery, computers and telecommunication
  5. What you connect to, to access online servers

9 Clues: BrowserIntended to be kept secretHelps protect your informationA trail of data left behind onlineHaving a duty to deal with somethingHow our online information should beSaying hurtful things to someone onlineMachinery, computers and telecommunicationWhat you connect to, to access online servers

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. Looking at someone's information over their shoulder.
  2. Stimuli that has meaningful context.
  3. software designed to interfere with a computer's normal functioning.
  4. Inventing a scenario to engage with victim.
  5. A person who breaks into computers to gain unauthorized access to information.
Down
  1. malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
  2. malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
  3. Information that relates to an individual.
  4. Efficient information that was translated.

9 Clues: Stimuli that has meaningful context.Information that relates to an individual.Efficient information that was translated.Inventing a scenario to engage with victim.Looking at someone's information over their shoulder.software designed to interfere with a computer's normal functioning....

Cyber Security 2025-04-29

Cyber Security crossword puzzle
Across
  1. Verdient man durchs arbeiten
  2. Schmiert man auf brot und schmeckt gut
  3. Dort mit fremden Nutzern austauschen
  4. Suchti
Down
  1. Wo findet alles statt?
  2. wenn man sich als andere person ausgibt um Leuten eine Falle zu stellen
  3. gibt es sehr viele
  4. Andere Leute ärgern und ausschließen
  5. Betrug

9 Clues: BetrugSuchtigibt es sehr vieleWo findet alles statt?Verdient man durchs arbeitenAndere Leute ärgern und ausschließenDort mit fremden Nutzern austauschenSchmiert man auf brot und schmeckt gutwenn man sich als andere person ausgibt um Leuten eine Falle zu stellen

Cyber Security Crossword 2021-02-12

Cyber Security Crossword crossword puzzle
Across
  1. and gathers information on a
  2. can be a worm virus or trojan
  3. a person how uses computers to get
  4. access to information and data.
  5. a specific type of computer virus that
  6. how they use their computer
Down
  1. malicious form of self-replicating software
  2. a type of virus and worm that carries
  3. a specific type of attack
  4. unwanted software that
  5. Set of symbols/numbers/letters which is
  6. information processed or stored by a
  7. to access an account
  8. you into downloading it onto your

14 Clues: to access an accountunwanted software thata specific type of attackhow they use their computerand gathers information on acan be a worm virus or trojanaccess to information and data.you into downloading it onto youra person how uses computers to getinformation processed or stored by aa type of virus and worm that carries...

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. IT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGE
  2. IT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWARE
  3. ITS A TYPE OF CREATURE THAT WRIGGLES
  4. RISKS IT IS EASILY ACCESSIBLE AND CAN BE A DANGEROUS PLACE WHERE THERE ARE PREDATORS,CYBER CRIMANALS AND BULLIES
Down
  1. IT IS SHORT FOR "MALICIOUS SOFTWARE"
  2. IS A PROGRAM OR A PIECE OF CODE THAT IS LOADED ONTO YOUR COMPUTER WITHOUT YOUR KNOWLEDGE
  3. BLOCKS ACCESS FROM THE VICTIMS DATA
  4. ATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE
  5. IT IS THE TERM USED BY THE ANCIENT GREEK STORY OF THE WOODEN HORSE THAT WAS USED TO HELP GREEK TROOPS

9 Clues: BLOCKS ACCESS FROM THE VICTIMS DATAIT IS SHORT FOR "MALICIOUS SOFTWARE"ITS A TYPE OF CREATURE THAT WRIGGLESIT IS INSTALLED ON A COMPUTER WITHOUT THE USERS KNOWLEDGEIT CAUSES SERIOUS HARM OR DANGER TO A COMPUTER OR SOFTWAREATTACK THIS IS AN ATTEMPT TO DAMAGE OR OBTAIN INFORMATON FROM A COMPUTER OR A SOFTWARE...

Cyber Security 2021-10-29

Cyber Security crossword puzzle
Across
  1. Malicious software that infects a user's computer and changes how is operates
  2. User's data is held hostage until a payment is made
  3. Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
  4. Hidden software that records a user's information secretly for a third-party
  5. The practice of protecting internet-connected systems from digital attacks
  6. A an email disguised as a legitimate source that tricks users into offering up personal information
Down
  1. Is protecting of information from malicious damage and unauthorized access
  2. A kind of software used to prevent, scan, detect and delete viruses from a computer
  3. A form of malware that is self-replicating infecting a computer and can spread across its network

9 Clues: User's data is held hostage until a payment is madeIs protecting of information from malicious damage and unauthorized accessThe practice of protecting internet-connected systems from digital attacksHidden software that records a user's information secretly for a third-party...

Cyber Security 2021-11-05

Cyber Security crossword puzzle
Across
  1. a secret word or phrase that must be used to gain admission to a place
  2. physical characteristics that can be used to identify individuals
  3. looking at someone's information over their shoulder
  4. a type of malicious code or program written to alter the way a computer operates
Down
  1. an identification used by a person with access to a computer, network, or online service
  2. randomly generated sequence of letters or numbers that appear as a distorted image, and a text box
  3. a type of malware that spreads copies of itself from computer to computer
  4. persuade someone in a clever or slightly dishonest way to allow you to do something or to give you something
  5. type of scam where criminals impersonate someone via email or messages

9 Clues: looking at someone's information over their shoulderphysical characteristics that can be used to identify individualsa secret word or phrase that must be used to gain admission to a placetype of scam where criminals impersonate someone via email or messagesa type of malware that spreads copies of itself from computer to computer...

Cyber Security 2024-02-05

Cyber Security crossword puzzle
Across
  1. The criminal makes a network resource unavailable to its intended users. This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.
  2. Gaining unauthorised access to or control of a computer system.
  3. An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder.
  4. An app or a social media post to combine a few pieces of information or complete a short quiz to produce a fun name.
  5. Makes it illegal to acquire access a computer without permission, and make changes to files on a computer without permission.
Down
  1. A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
  2. The victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
  3. This is a form of attack that makes multiple attempts to discover something (such as a password).
  4. This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for, usually money.

9 Clues: Gaining unauthorised access to or control of a computer system.This is a form of attack that makes multiple attempts to discover something (such as a password).An attack designed to steal a victim's password or other sensitive data by simply looking over their shoulder....

Cyber Security 2024-10-09

Cyber Security crossword puzzle
Across
  1. When data is transformed into a format that is unreadable without a decryption key
  2. Software designed to harm or exploit any programmable device, service, or network
  3. Someone who tests system security by trying to find vulnerabilities
  4. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
  5. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
  6. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
  1. A weak spot in a system’s security defenses
  2. Malicious software that locks a user’s files and demands a ransom to restore access
  3. A process used to verify a user’s identity, typically through passwords or biometrics

9 Clues: A weak spot in a system’s security defensesSomeone who tests system security by trying to find vulnerabilitiesSoftware designed to harm or exploit any programmable device, service, or networkWhen data is transformed into a format that is unreadable without a decryption key...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

Cyber Security 2023-04-04

Cyber Security crossword puzzle
Across
  1. malware that can encrypt your files and demand payment in exchange for the decryption key
  2. is often sent as an email to trick you into giving you your personal information.
  3. type of malware that can secretly gather information about your online activity
Down
  1. malware that disguises itself as a legitimate program or file, but it has a malicious purpose
  2. similar to a virus in that it can replicate and spread from one computer to another, but it doesn't need to attach itself to files or programs
  3. a program that monitors the traffic coming in and out of your device
  4. a program that protects your computer from malware
  5. can spread from one computer to another by attaching itself to files or programs
  6. malicious software designed to cause harm to your device

9 Clues: a program that protects your computer from malwaremalicious software designed to cause harm to your devicea program that monitors the traffic coming in and out of your devicetype of malware that can secretly gather information about your online activitycan spread from one computer to another by attaching itself to files or programs...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. migrate
  2. kidnapper
  3. james bond is
  4. trapdoor
  5. ladybug
Down
  1. ancient greek horse trick
  2. catching fish
  3. underground
  4. computer

9 Clues: migrateladybugcomputertrapdoorkidnapperundergroundjames bond iscatching fishancient greek horse trick

Cyber Security 2022-10-13

Cyber Security crossword puzzle
Across
  1. A cybercrime that uses the phone to steal confidential data.
  2. When you swipe your access card, beware of persons nearby who may try __________.
  3. protector This helps protect your screen from shoulder surfing.
  4. Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
  1. This network security device sits at the edge of your network and governs access.
  2. This software is installed on your computer to protect it from viruses and malware.
  3. A network of computers infected by malware and that are under the control of a single attacking party.
  4. A person who uses computers to gain unauthorized access to data.
  5. Computer software with malicious intent.

9 Clues: Computer software with malicious intent.A cybercrime that uses the phone to steal confidential data.protector This helps protect your screen from shoulder surfing.A person who uses computers to gain unauthorized access to data.This network security device sits at the edge of your network and governs access....

Cyber Security 2024-12-26

Cyber Security crossword puzzle
Across
  1. A sequence of characters or words to keep your account safe
  2. A program that detect and remove virus
  3. Nasty software that can have a bad impact on your device
  4. Unwanted emails or messages
Down
  1. A location on the internet where you can save your data
  2. The program you use to access the Internet like chrome or Firefox
  3. Getting into other's computer without their permission
  4. Legal Aid to fight against Cyber Crimes
  5. A copy of your data stored somewhere else.

9 Clues: Unwanted emails or messagesA program that detect and remove virusLegal Aid to fight against Cyber CrimesA copy of your data stored somewhere else.A location on the internet where you can save your dataNasty software that can have a bad impact on your deviceGetting into other's computer without their permission...

1 2025-03-01

1 crossword puzzle
Across
  1. Audio talk show
  2. Exercise and health
  3. Natural food label
  4. Fully present mentally
  5. New business venture
  6. Virtual world experience
  7. Rising prices
  8. Reduce waste
  9. Independent work style
  10. Online order arrival
  11. Secure digital ledger
  12. Healthy eating science
Down
  1. Security key
  2. Mysterious or puzzling
  3. Travel for leisure
  4. Watching online content
  5. Always traveling
  6. Internet-related
  7. Battery-powered cars
  8. Advanced computing field
  9. Relaxing getaway
  10. No cables needed
  11. Not naturally made
  12. Disease prevention shot
  13. Earth's weather patterns

25 Clues: Security keyReduce wasteRising pricesAudio talk showAlways travelingInternet-relatedRelaxing getawayNo cables neededTravel for leisureNatural food labelNot naturally madeExercise and healthNew business ventureBattery-powered carsOnline order arrivalSecure digital ledgerMysterious or puzzlingFully present mentallyIndependent work style...

FITAVocab.TC 2013-05-16

FITAVocab.TC crossword puzzle
Across
  1. programs that you can download
  2. ethical uses of or on a computer or the web
  3. circuit board
  4. something that shows off a a business and shows people what it is about
  5. crediting a persons work
  6. extra docking system
  7. the security of or on a computer
  8. a paid internet access
  9. central processing unit
  10. a companies "slogan"
  11. a type of layout
  12. a format of a program on your computer
  13. a combination of many search engines
  14. a program that allows you to create documents
  15. the thing at the top of the screen
  16. a port to get wifi
  17. storing space
  18. liquid crystal display
  19. an illegal way of taking credit for somebody's invention
  20. light emitting diode
  21. National Cyber Security Alliance
  22. what you have on you desktop already
Down
  1. a term that describes safety o the computer or on the web
  2. decision tool
  3. a place where you can virtually go and search on the web
  4. a system that allows you to connect to other peoples devices over wifi or cellular data
  5. cd port
  6. an adjective that describes cyber in a way that is someway pixel ly
  7. the old fashion watch "not digital"
  8. things that you can buy to play or enjoy on
  9. confusing
  10. a term that describes the web and computers
  11. a virtually folder where you can save your documents, files
  12. your work
  13. a user that is online
  14. a device that can go anywhere
  15. a thing of the computer that allows you to move around on the screen or click
  16. memory card

38 Clues: cd portconfusingyour workmemory carddecision toolcircuit boardstoring spacea type of layouta port to get wifiextra docking systema companies "slogan"light emitting diodea user that is onlinea paid internet accessliquid crystal displaycentral processing unitcrediting a persons worka device that can go anywhereprograms that you can download...

Digitech Cyber Security 2024-08-19

Digitech Cyber Security crossword puzzle
Across
  1. The practice and study of techniques for secure communication
  2. - A simple substitution cipher named after a Roman leader
  3. A cipher that uses symbols instead of letters
  4. - A harmful software program
  5. A one-way function used for integrity checks
  6. The result of encryption
  7. A type of encryption where two different keys are used
  8. A type of encryption where the same key is used
Down
  1. - Ensuring that information is only accessible to those authorized
  2. - The unencrypted message
  3. - A cipher that uses multiple substitution alphabets
  4. - A key kept secret in asymmetric encryption
  5. A famous WWII machine used for encryption
  6. An early cipher used by the Spartans

14 Clues: The result of encryption- The unencrypted message- A harmful software programAn early cipher used by the SpartansA famous WWII machine used for encryption- A key kept secret in asymmetric encryptionA one-way function used for integrity checksA cipher that uses symbols instead of lettersA type of encryption where the same key is used...

Cyber Security Revision 2024-09-19

Cyber Security Revision crossword puzzle
Across
  1. A small program designed to cause damage.
  2. A security method where a code is sent to a phone or email to verify someone's identity.
  3. Type of hacker who hacks illegally, usually to make money.
  4. Part of the Internet that is behind passwords, etc.
  5. Type of hacker who hacks legally.
  6. Software used to remove viruses.
  7. Type of hacker who hacks illegally but for the greater good.
Down
  1. A hacking method, often using email, that tricks people into entering details such as passwords.
  2. What hackers use to trick people into giving personal details.
  3. Using someone's personal details to pretend to be them, often to take out loans, etc.
  4. Part of the Internet accessed using a search engine.
  5. Part of the Internet that often contains illegal content.
  6. Software used to gain illegal access to a computer system.
  7. Unwanted email, often associated with phishing.

14 Clues: Software used to remove viruses.Type of hacker who hacks legally.A small program designed to cause damage.Unwanted email, often associated with phishing.Part of the Internet that is behind passwords, etc.Part of the Internet accessed using a search engine.Part of the Internet that often contains illegal content....

RU ITEC411: Crime and Security. 2024-11-25

RU ITEC411: Crime and Security. crossword puzzle
Across
  1. Traveling to sue under strict libel laws in certain countries.
  2. Malicious software designed to gather user information without consent.
  3. The process of encoding information to prevent unauthorized access.
  4. Denial-of-service attack that disrupts online services.
  5. The use of someone else's personal information for fraud
  6. A security tool used to filter and monitor network traffic.
  7. Using hacking to promote a political cause.
  8. Phishing attacks carried out via voice calls.
  9. Fraudulent attempts to obtain sensitive information via email.
  10. Hackers who improve system security by identifying vulnerabilities.
  11. A security tool to lure and study hackers.
Down
  1. Security measures using unique biological characteristics
  2. Measures taken to protect computer systems from cyber attacks.
  3. A sophisticated worm that targeted Iranian nuclear facilities
  4. Manipulating individuals to divulge confidential information.
  5. An organization that addresses trade agreements, including cross-border digital issues.
  6. Phishing attacks carried out via SMS.
  7. The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
  8. Unauthorized access to or manipulation of computer systems.
  9. Redirecting users to fraudulent websites to steal personal data.

20 Clues: Phishing attacks carried out via SMS.A security tool to lure and study hackers.Using hacking to promote a political cause.Phishing attacks carried out via voice calls.Denial-of-service attack that disrupts online services.The use of someone else's personal information for fraudSecurity measures using unique biological characteristics...

Security Awareness Crossword 2023-11-17

Security Awareness Crossword crossword puzzle
Across
  1. This item must be worn whilst on site or in the office
  2. Government checks carried out to confirm trustowrthiness
  3. The branch of security that protects online threats
  4. The branch of security that protects hardware
  5. This agency regulates our security arrangements.
  6. The branch of security concerning people
  7. A sign that something may be troubling a colleague
Down
  1. A technique for attempting to acquire information
  2. The information marking permitted on Cyclife servers
  3. legal substance that can affect decision making
  4. This briefing is given if you are visiting a country where the FIS operate
  5. You must do this to your screen when you walk away from your laptop
  6. Substances that can affect the way the body functions
  7. Person required when a visitor is on site
  8. The '_ _ _ _' to know principal should be applied when sharing sensitive information

15 Clues: The branch of security concerning peoplePerson required when a visitor is on siteThe branch of security that protects hardwarelegal substance that can affect decision makingThis agency regulates our security arrangements.A technique for attempting to acquire informationA sign that something may be troubling a colleague...

Cyber safety Evie Williams 2016-06-08

Cyber safety Evie Williams crossword puzzle
Across
  1. crime any internet
  2. something that stops people getting on your computer
  3. this word is the opposite of dangerous,
  4. A ringer on your computer when someone is trying to get on
  5. any software to prevent crimes online
  6. a type of bullying
  7. something that will stop viruses getting on your computer
  8. a code so people don't get on to your device
  9. mail that is not wanted
  10. a hostile strongly worded message that may contain obscene language
  11. the name a user selects to be identified on a computer or a network
  12. don't believe what someone says
  13. do not say rude words online,
Down
  1. a piece of information about your visit to a website that some websites record automatically on your computer,
  2. information about someone
  3. a computer cold
  4. something that should not be shared
  5. a person who takes over someone's device
  6. room a location online that allows multiple users to communicate electronically with each other in real time,
  7. a form of malicous displays unsolicited advertising on your computer
  8. a type of stalking
  9. at tracking feature of Internet browsers that shows all the recent websites visited
  10. Internet games that intensionly cause problems or cyber bullying other games
  11. tag the nickname the user has chosen to be identified by when playing internet games,
  12. to copy a file from one computer system
  13. a way to make money by deceiving people

26 Clues: a computer coldcrime any interneta type of stalkinga type of bullyingmail that is not wantedinformation about someonedo not say rude words online,don't believe what someone sayssomething that should not be sharedany software to prevent crimes onlinethis word is the opposite of dangerous,to copy a file from one computer system...

Security 2019-04-26

Security crossword puzzle
Across
  1. Country to which the taking of a Babcock IT Asset is prohibited
  2. A word or phrase used to access your PC / Phone
  3. A potential external threat either to an individual or Babcock
  4. A person closely following an employee into an area or through a barrier without showing a security pass
  5. Data ********* allows you to directly request access to shared folders
  6. A PED Zone Colours
  7. We all signed this as part of our contract Official ******* Act
  8. One of the mandatory Babcock training models ***** Security Awareness
Down
  1. Babcock IT system can be red, blue or white
  2. A loss or compromise of classified information will result in this being raised
  3. Complete the Designator (NNPPI) – Naval Nuclear ********** Programme Information
  4. A way to dispose of information securely
  5. Security Response Level displayed on the entrance gates
  6. Surname of the Submarine Business Unit Security BSM
  7. One of the recognised Classification Marking
  8. Method of ensuring good practice, governance adherence to procedures
  9. Email Scam stealing personal / business information
  10. A computer virus

18 Clues: A computer virusA PED Zone ColoursA way to dispose of information securelyBabcock IT system can be red, blue or whiteOne of the recognised Classification MarkingA word or phrase used to access your PC / PhoneSurname of the Submarine Business Unit Security BSMEmail Scam stealing personal / business information...

Cyber Security 2022-09-14

Cyber Security crossword puzzle
Across
  1. software that is in a constant state of updating. intended to be convenient to the user and meant to disrupt hackers
  2. hacking with malicious intent. typically to gain access to a computer and steal as much data as possible
  3. software that automatically displays material when a user offline
  4. an attack that disrupts the service to waste time, effort, and money
  5. hacking that is meant to do minimal damage and is usually done out of curiosity
Down
  1. an internet traffic filter meant to stop unauthorized incoming and outgoing traffic
  2. the core of a computer's operating system that houses the most essential functions of the computer
  3. the physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
  4. creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception

9 Clues: software that automatically displays material when a user offlinean attack that disrupts the service to waste time, effort, and moneyhacking that is meant to do minimal damage and is usually done out of curiosityan internet traffic filter meant to stop unauthorized incoming and outgoing traffic...

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. computer
  2. james bond is
  3. trapdoor
  4. migrate
Down
  1. kidnapper
  2. ancient Greek horse trick
  3. catching fish
  4. ​underground
  5. ladybug

9 Clues: ladybugmigratecomputertrapdoorkidnapper​undergroundjames bond iscatching fishancient Greek horse trick

Cyber Security 2023-06-13

Cyber Security crossword puzzle
Across
  1. Verifying the identity of a user, process or device before allowing access to resources in a system.
  2. The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
  3. Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
  4. engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
  5. A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
  6. A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
  1. A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
  2. Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
  3. A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).

9 Clues: Verifying the identity of a user, process or device before allowing access to resources in a system.Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.engineering The methods used to manipulate people into carrying out specific actions, or divulging information....

cyber security 2024-10-09

cyber security crossword puzzle
Across
  1. a communication method that uses electronic devices to deliver messages across computer networks
  2. never share your private
  3. always have a secure
  4. a symbol, word, or words legally registered or established by use as representing a company or product.
  5. a website or app almost always has access to your personal
  6. a person who uses computers to gain unauthorized access to data
Down
  1. never use somebody elses legal right to print, publish, perform, film, or record literary, artistic, or musical material,or you will be
  2. the information about a particular person that exists on the internet as a result of their online activity
  3. never click on sketchy
  4. when creating username never use your real

10 Clues: always have a securenever click on sketchynever share your privatewhen creating username never use your reala website or app almost always has access to your personala person who uses computers to gain unauthorized access to dataa communication method that uses electronic devices to deliver messages across computer networks...

KICT Crossword Puzzle 2022-07-20

KICT Crossword Puzzle crossword puzzle
Across
  1. Undergraduate Programme
  2. Postgraduate Programme
  3. KULLIYYAH OF _____ AND COMMUNICATION TECHNOLOGY
  4. KICT International Journal
  5. KICT Flagship
  6. A Department at KICT
  7. KICT Flagship
Down
  1. KICT Flagship
  2. Postgraduate Programme
  3. KICT Robe Colour
  4. KICT was established in _____ 2001
  5. Code to _____
  6. Undergraduate Student Societies
  7. Postgraduate Student Societies
  8. Centre of Excellence for Cyber Security

15 Clues: KICT FlagshipCode to _____KICT FlagshipKICT FlagshipKICT Robe ColourA Department at KICTPostgraduate ProgrammePostgraduate ProgrammeUndergraduate ProgrammeKICT International JournalPostgraduate Student SocietiesUndergraduate Student SocietiesKICT was established in _____ 2001Centre of Excellence for Cyber Security...

Information Security Crossword Puzzle 2023-04-28

Information Security Crossword Puzzle crossword puzzle
Across
  1. ILoveYou123, 123456, and P@ssw0rd are all this.
  2. Keeps out most attacks and is both human and machine.
  3. The amount of systems that should have the same username and password.
  4. The most effective tool to thwart cyber attacks.
  5. These employees are part of the information security team.
  6. It is 100% secure.
  7. When anything seems strange.
  8. What to do with sensitive information before sending.
Down
  1. Software that is designed to do terrible things.
  2. Weakest link in the security chain.
  3. Anything suspicious raises these.
  4. You should only use our computers for this.
  5. An attempt to get you to let an attacker do their thing.
  6. A legal source of information that has private material.
  7. The first step in information security awareness is being about to do this with security threats.
  8. It's okay to trust, but you should also do this.

16 Clues: It is 100% secure.When anything seems strange.Anything suspicious raises these.Weakest link in the security chain.You should only use our computers for this.ILoveYou123, 123456, and P@ssw0rd are all this.Software that is designed to do terrible things.The most effective tool to thwart cyber attacks.It's okay to trust, but you should also do this....

Cybersecurity Crossword Puzzle 2023-09-11

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. - Refers to a revision or improvement made to a software program or system in order to fix bugs, enhance features, or patch security vulnerabilities.
  2. - The prefix "cyber" relates to computers, digital technology, and the internet. It frequently appears in contexts related to cybersecurity and cyber-related terms.
  3. - Ensuring its safety and protecting it from threats, risks, or vulnerabilities. In the realm of cybersecurity, it often entails safeguarding assets and data.
  4. - In cybersecurity, the term "spoofed" is used to describe the act of fabricating or deceiving information or the origin of data.
  5. - Short for advertisements, are messages or content created to promote products, services, or ideas.
  6. - DomainKeys Identified Mail (DKIM) is another method of email authentication. It allows recipients to verify if an email was genuinely sent from the claimed domain and authorized by it.
  7. - The process of converting information or data into code to prevent access or protect it from being read by anyone without the decryption key.
  8. - Verification.
  9. - To restore.
Down
  1. - A password is a combination of letters, numbers, and symbols that grants access to a computer system, account, or digital resource.
  2. - A type of coverage that businesses obtain to protect themselves against losses and liabilities resulting from cyberattacks and data breaches.
  3. - Sender Policy Framework is an email authentication protocol that helps prevent email spoofing by verifying if the sending mail server has permission to send emails on behalf of a domain.
  4. - An organized method or collection of recommendations for implementing security measures and protocols aimed at safeguarding an organization's assets.
  5. - Which stands for Domain-based Message Authentication, Reporting, and Conformance, is a protocol used for email authentication and reporting. Its primary purpose is to assist organizations in safeguarding their email domains against misuse in email spoofing attacks.
  6. - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry.
  7. - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.
  8. - Email is a used method of exchanging messages over the internet. It serves as a communication tool for both business purposes.
  9. DRIVE - A portable device used for storing and transferring data between computers. It relies on flash memory technology.
  10. - Refers to a fraudulent scheme intended to deceive individuals or organizations into providing money, personal information, or other valuable assets.
  11. - When a computer or device is infected, it means that it has been compromised by malware or a virus. This can disrupt its functioning and lead to data theft.

20 Clues: - To restore.- Verification.- Short for advertisements, are messages or content created to promote products, services, or ideas.- Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.- The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry....

cyber security 2022-10-21

cyber security crossword puzzle
Across
  1. ladybug
  2. ancient greek horse trick
  3. migrate
  4. underground
Down
  1. catching fish
  2. computer
  3. trapdoor
  4. james bond is
  5. kidnapper

9 Clues: ladybugmigratecomputertrapdoorkidnapperundergroundcatching fishjames bond isancient greek horse trick

Cyber security 2022-11-28

Cyber security crossword puzzle
Across
  1. - replicate themselves but do not attach themselves to files as a virus does.
  2. engineering - another word for phishing
  3. - locks a computer, encrypts files, and therefore prevents the user from being able to access the data
  4. - unwanted software that monitors and gathers information on a person and how they use their computer
Down
  1. - software that is designed to gain access to your computer with malicious intent
  2. - a large collection of malware-infected devices
  3. - will replicate itself by maliciously modifying other computer programs and inserting code
  4. - a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions
  5. - any device connected to a network

9 Clues: - any device connected to a networkengineering - another word for phishing- a large collection of malware-infected devices- replicate themselves but do not attach themselves to files as a virus does.- software that is designed to gain access to your computer with malicious intent...

Cyber Security 2023-09-14

Cyber Security crossword puzzle
Across
  1. Disrupt, damage, or gain unauthorized access to a computer system
  2. Fake rental properties posted online
  3. Negative behavior inflicted online
  4. Victims fall for recruiting emails and receive a bogus bank check, which they deposit and use for "mystery" shopping
Down
  1. The Recipient has not granted or verified permission for a message to be sent
  2. Data left behind on the internet
  3. A combination of uppercase letters, lowercase letters, numbers, and symbols
  4. Public area offering WIFI access
  5. Watch for spelling mistakes, and email addresses as they can easily be misrepresented

9 Clues: Data left behind on the internetPublic area offering WIFI accessNegative behavior inflicted onlineFake rental properties posted onlineDisrupt, damage, or gain unauthorized access to a computer systemA combination of uppercase letters, lowercase letters, numbers, and symbols...

CYBER SECURITY 2024-05-11

CYBER  SECURITY crossword puzzle
Across
  1. hh
  2. aa
  3. gg
  4. ee
  5. ff
Down
  1. cc
  2. dd
  3. ii
  4. bb

9 Clues: ccddhhaaiiggbbeeff

CYBER SECURITY 2024-05-11

CYBER  SECURITY crossword puzzle
Across
  1. _____ emel adalah emel yang tidak diingini yang sering masuk ke peti masuk e-mel anda, sering kali mengganggu dan tidak diundang
  2. Teknik penipuan dalam talian yang menggunakan e-mel atau laman web palsu untuk mendapatkan maklumat peribadi dari mangsanya
  3. Salah satu perisian berbahaya yang mengunci akses kepada data mangsa dan meminta tebusan untuk membebaskannya
  4. Salah satu jenayah siber berkait rapat dengan media sosial
  5. _____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digital
  6. salah satu bentuk penipuan atas talian
Down
  1. Program berbahaya yang diselitkan ke dalam sistem komputer tanpa izin, bertujuan untuk mencuri data
  2. Perlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer
  3. Salah satu jenayah siber yang menggunakan kecerdasan buatan (AI) untuk mencipta video palsu yang sukar dibezakan dari yang sebenar

9 Clues: salah satu bentuk penipuan atas talianSalah satu jenayah siber berkait rapat dengan media sosial_____ diperlukan untuk memastikan akses yang sah ke sesuatu akaun atau sistem digitalPerlindungan digital yang membatasi akses ke dalam atau keluar dari rangkaian komputer...

Cyber Security 2024-10-09

Cyber Security crossword puzzle
Across
  1. When data is transformed into a format that is unreadable without a decryption key
  2. Software designed to harm or exploit any programmable device, service, or network
  3. Someone who tests system security by trying to find vulnerabilities
  4. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
  5. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
  6. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
  1. A weak spot in a system’s security defenses
  2. Malicious software that locks a user’s files and demands a ransom to restore access
  3. A process used to verify a user’s identity, typically through passwords or biometrics

9 Clues: A weak spot in a system’s security defensesSomeone who tests system security by trying to find vulnerabilitiesSoftware designed to harm or exploit any programmable device, service, or networkWhen data is transformed into a format that is unreadable without a decryption key...

Cyber Security 2024-11-13

Cyber Security crossword puzzle
Across
  1. An unauthorised user who attempts to or gain access to a network
  2. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
  3. Securing your online accounts with an extra layer of protection is called ____________________ authentication
  4. Computer programs that can block, detect, and remove viruses and other malware
Down
  1. A mechanism to create a secure connection between a computer and the network
  2. The unauthorised disclosure or unwanted exposure of confidential information
  3. The protection of digital information, as well as the integrity of the infrastructure
  4. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
  5. Faking the sender’s email address to gain access to a secure network

9 Clues: An unauthorised user who attempts to or gain access to a networkFaking the sender’s email address to gain access to a secure networkA mechanism to create a secure connection between a computer and the networkThe unauthorised disclosure or unwanted exposure of confidential information...

CISO Crossword Quiz - 2225 2025-08-02

CISO Crossword Quiz - 2225 crossword puzzle
Across
  1. Which secured number is not required for receiving money through UPI?
  2. What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
  3. What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
  4. What disguised link leads to a malicious webpage?
Down
  1. What method uses a QR code to lead users to fake webpage/payment sites?
  2. What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
  3. What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
  4. What should be strong and unique to protect your online accounts?
  5. What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
  6. What attack tricks people into clicking something different than they think?

10 Clues: What disguised link leads to a malicious webpage?What should be strong and unique to protect your online accounts?Which secured number is not required for receiving money through UPI?What method uses a QR code to lead users to fake webpage/payment sites?What attack tricks people into clicking something different than they think?...

RCAL Cipher Challenge August 2024-08-19

RCAL Cipher Challenge August crossword puzzle
Across
  1. nvjkxrkv (where do we meet)
  2. tpsvi
  3. zewfidrkzfe
  4. jvtlizkp
  5. urkr
Down
  1. vekvigizjv
  2. wzmvkyzikp (when do we meet)
  3. uvjzxe
  4. ivutvcc (what club is this)

9 Clues: urkrtpsviuvjzxejvtlizkpvekvigizjvzewfidrkzfenvjkxrkv (where do we meet)ivutvcc (what club is this)wzmvkyzikp (when do we meet)

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. Before an application goes live, it needs to go through a security ___.
  3. Process of updating to address security vulnerabilities.
  4. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. SIEM tool from IBM.
Down
  1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. We are all cyber ___.
  3. Used in cryptography to prove authenticity of a device, server, or user.
  4. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. Linux distro used for ethical hacking.

10 Clues: SIEM tool from IBM.We are all cyber ___.Linux distro used for ethical hacking.Process of updating to address security vulnerabilities.Before an application goes live, it needs to go through a security ___.Used in cryptography to prove authenticity of a device, server, or user....

Compliance Crossword 2022-08-29

Compliance Crossword crossword puzzle
Across
  1. Accessing PHI without a _______ business reason is a HIPAA violation.
  2. Type of email used to send sensitive information
  3. All IPMG employee-owners have an ________ to report HIPAA violations
  4. Number of PHI direct identifiers
  5. The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
  6. Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
  7. When should a HIPAA violation be reported?
  8. Required when connecting device to a public network
  9. Malicious emails used to trick people into sharing login information
  10. Type of disposal of paper records that is a HIPAA violation
Down
  1. Staff can report compliance concerns without fear of _________.
  2. Where I can search for documents and other useful information related to compliance
  3. IPMG Manual to review cyber security requirements
  4. The company with six titles of Best Places to Work in Indiana
  5. You should always lock this when leaving unattended
  6. The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
  7. The name of the Corporate Compliance Manager
  8. Who to report HIPAA violations to, aside from the Corporate Compliance Manager
  9. The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
  10. Only ______ applications can be used to conduct IPMG business

20 Clues: Number of PHI direct identifiersWhen should a HIPAA violation be reported?The name of the Corporate Compliance ManagerType of email used to send sensitive informationIPMG Manual to review cyber security requirementsYou should always lock this when leaving unattendedRequired when connecting device to a public network...

Cyber Security word search 2022-09-12

Cyber Security word search crossword puzzle
Across
  1. any kind of software designed to damage, or enable unauthorized access, to computer systems.
  2. a form of electronic cash
  3. A malicious threat to a group or organization that comes from someone within
  4. A secret word or phrase that is used to access a computer system or service.
  5. An internet traffic filter meant to stop unauthorized incoming.
  6. A language used to create and control the content on a website
  7. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  8. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  9. it allows you to create a secure connection to another network using the internet.
  10. A cyber attacker who uses software and social engineering methods to steal data and information.
  11. Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
  12. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
  1. Code that is embedded into the hardware of a computer.
  2. A form of malicious software that disguises itself as a harmless computer program
  3. The core of a computer’s operating system that houses the most essential functions of the computer.
  4. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  5. Confirmation of someone's identity, either using a password or a fingerprint.
  6. Creating a fake identity on a social network account
  7. An error, flaw, failure in a computer program
  8. is the string of numbers used to identify each computer using the internet on a network.
  9. Customizable additions to software for extra functionality.

21 Clues: a form of electronic cashAn error, flaw, failure in a computer programCreating a fake identity on a social network accountCode that is embedded into the hardware of a computer.Customizable additions to software for extra functionality.A language used to create and control the content on a website...

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A fraudulent email purportedly from a reputable company attempting to get personal information
  2. Something personal to you and should never be shared
  3. A malicious software designed to block access to a computer system until a sum of money is paid
  4. The process of identifying a user’s identity
  5. The process of taking plain text and scrambling it into an unreadable format
  6. A combination of the words “robot” and “network”
  7. A piece of software or application that displays advertisements on your computer
  8. A piece of hardware or software, used to keep intruders out
  9. An icon displayed along a web browser URL; indicates a secure mode
  10. the address of a website; check its validity before clicking on it
  11. Unauthorized access to a network, information systems or application
  12. Alert / Always on the lookout
Down
  1. A sequence of words or text used to control access to a computer; similar to a password
  2. A form of malware used by hackers to spy on you and your computer activities
  3. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  4. Threatening behavior facilitated through electronic means such as texting
  5. In addition to passwords; provides better security
  6. Facebook, Twitter, Instagram etc. (Two Words)
  7. When a hacker changes source of an email so that it seems to come from a trusted source
  8. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer

20 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityFacebook, Twitter, Instagram etc. (Two Words)A combination of the words “robot” and “network”In addition to passwords; provides better securitySomething personal to you and should never be sharedA piece of hardware or software, used to keep intruders out...

Cyber Security Crossword Puzzle 2023-09-09

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. information
  2. used to navigate through the web
  3. verifies that the severs address matches the "from" address you see
  4. the action of verifying the identity of a user
  5. a device that sends packets to a computers network
  6. An encrypted connection over the internet from a device to a network
  7. tells other servers which servers are allowed to send emails using your business's domain name
  8. puts a digital signature on outgoing mail so servers can verify that an email from your domain actually was sent from your organization’s servers
  9. software designed to block access to a computer system until a sum of money is paid
  10. a piece of code cable of copying itself and spreading through a computer system
Down
  1. software that is designed to disrupt or damage anything in a computer system
  2. when software or data can be access through unauthorized personnel
  3. restricted access to something
  4. protect information by turning it into code
  5. A persons whos job is to sell things for the company
  6. the programs and operating information used by a computer
  7. To imitate something or trick someone
  8. usually in the form of emails, it is used to gain personal information by posing as well known companies
  9. interactive parts that work together to exchange information
  10. software designed to destroy computer viruses

20 Clues: informationrestricted access to somethingused to navigate through the webTo imitate something or trick someoneprotect information by turning it into codesoftware designed to destroy computer virusesthe action of verifying the identity of a usera device that sends packets to a computers networkA persons whos job is to sell things for the company...

Introduction to Cyber Security 2023-09-10

Introduction to Cyber Security crossword puzzle
Across
  1. A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
  2. A component of a computer system that prevents unauthorized data access.
  3. a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
  4. A software update or repair published by developers to correct security flaws or enhance system performance.
  5. When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
  6. unwanted email messages
  7. Computer program that is used to provide customized adverts
  8. a field in which computers and networks are employed
  9. An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
  1. To imitate a character, users exploit internet platforms to acquire access or personal information.
  2. Manipulation used to obtain unauthorized access to a computer system
  3. software that is secretly installed on a user's device in order to acquire confidential information
  4. a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
  5. A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
  6. An unauthorized effort to gain access to a computer
  7. Malware that prevents an organization from accessing a file system.
  8. avoiding an organization's existing security mechanisms
  9. software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
  10. The process of protecting digital information over its full life cycle.
  11. A collection of personal computers used to infect malicious software.

20 Clues: unwanted email messagesAn unauthorized effort to gain access to a computera field in which computers and networks are employedavoiding an organization's existing security mechanismsComputer program that is used to provide customized advertsMalware that prevents an organization from accessing a file system....

Cyber Security Participation puzzle 2023-03-17

Cyber Security Participation puzzle crossword puzzle
Across
  1. attacks seeking out personal information
  2. malware that reproduces itself
  3. multiple steps to log in
  4. software that displays ads
  5. a mischeivious hacker
  6. lots of attackers preventing legitimate users
  7. scrambling data so it cant be read
  8. happens when a hacker is successful
  9. devices controlled by malware
  10. shield for data
  11. media changed to look authentic
Down
  1. software that checks for malware
  2. software that tracks you
  3. apps that give computers instructions
  4. network pro learning hacking techniques
  5. software that is harmful
  6. malware that makes you pay
  7. tricks users into clicking on harmful links
  8. malware pretending to be useful
  9. internet access at starbucks

20 Clues: shield for dataa mischeivious hackersoftware that tracks yousoftware that is harmfulmultiple steps to log insoftware that displays adsmalware that makes you payinternet access at starbucksdevices controlled by malwaremalware that reproduces itselfmalware pretending to be usefulmedia changed to look authenticsoftware that checks for malware...

MGregori's Cyber Security Crossword 2025-03-13

MGregori's Cyber Security Crossword crossword puzzle
Across
  1. Investigates cybercrime evidence
  2. Captures network traffic data
  3. Physically isolated network security
  4. Converts data into code
  5. Overloads system with traffic
  6. Malicious software or programs
  7. Encrypts files, demands payment
  8. Blocks unauthorized network access
  9. Isolates untrusted code execution
  10. – Repeated password guessing attack
Down
  1. Fraudulent email for credentials
  2. Steals active user session
  3. web Hidden, encrypted online network
  4. Targets vendor software security
  5. Gains unauthorized higher access
  6. Takes advantage of vulnerabilities
  7. Disguised as legitimate software
  8. Malicious code triggers conditionally
  9. Network of infected computers
  10. Unknown software vulnerability

20 Clues: Converts data into codeSteals active user sessionCaptures network traffic dataOverloads system with trafficNetwork of infected computersMalicious software or programsUnknown software vulnerabilityEncrypts files, demands paymentFraudulent email for credentialsInvestigates cybercrime evidenceTargets vendor software security...

Cyber Safety and Security 2025-06-13

Cyber Safety and Security crossword puzzle
Across
  1. A crime where someone steals your personal information and uses it to commit fraud in your name.
  2. A type of cybercrime that uses the internet and technology to harass or stalk an individual, causing fear.
  3. A recommended security measure involving a combination of letters, numbers, and symbols that are difficult to guess.
  4. Creations of the human mind, such as inventions or artistic works, that are legally protected.
  5. Focuses on your right to control your personal information, including who collects it and how it's used.
  6. Protecting digital data from unauthorized access, use, or disclosure.
  7. The act of presenting someone else's work or ideas as one's own without proper citation.
  8. Attacks that aim to disrupt the normal functioning of a website or server by overwhelming it with traffic (Abbr.).
  9. A recognizable sign, design, or expression that identifies a specific product or service and distinguishes it from others.
  10. A deceptive tactic where attackers forge the sender address in an email message to make it appear legitimate.
Down
  1. The trace of data you create as you navigate the online world, also called a "digital shadow".
  2. Any illegal activity facilitated by electronic devices and the internet.
  3. The use of electronic means to bully or harass another person, often through negative or false content.
  4. Data deliberately provided by an individual through online activities, such as information submitted on forms.
  5. Occurs when unauthorized individuals gain access to sensitive or confidential information.
  6. Gaining unauthorized access to a computer system or network, which can be malicious or ethical.
  7. Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle.
  8. Encoding data so it can only be decrypted and read by authorized parties.
  9. Data collected automatically without intentional participation, like browsing history, often through cookies.
  10. Deceptive cybercrime involving tricking people into providing sensitive information by posing as a trustworthy source.
  11. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
  12. Ensuring data is accessible only to authorized individuals or systems.
  13. A legal right protecting original works of authorship like books, music, or computer programs.
  14. Software used to detect and remove malicious programs from computer systems.
  15. Malicious software used to harm or exploit a computer system, server, or network.
  16. A legal right granted to an inventor for their new, useful, and non-obvious invention for a limited time.

26 Clues: Protecting digital data from unauthorized access, use, or disclosure.Ensuring data is accessible only to authorized individuals or systems.Any illegal activity facilitated by electronic devices and the internet.Encoding data so it can only be decrypted and read by authorized parties....

Cyber Cross word 2025-03-09

Cyber Cross word crossword puzzle
Across
  1. sensitive information
  2. space
  3. cyber
Down
  1. learning in person and online
  2. theft
  3. invasion of privacy

6 Clues: theftspacecyberinvasion of privacysensitive informationlearning in person and online

Cyber 2023-12-04

Cyber crossword puzzle
Across
  1. Email scam tactic
  2. Network protection
  3. Private browsing tunnel
  4. Unique authentication method
  5. Data security
  6. Vulnerability exploitation tactic
Down
  1. Fake website redirection
  2. Isolated software testing environment
  3. Data encryption extortion
  4. Cyber threats

10 Clues: Data securityCyber threatsEmail scam tacticNetwork protectionPrivate browsing tunnelFake website redirectionData encryption extortionUnique authentication methodVulnerability exploitation tacticIsolated software testing environment

Cloud (Data Centre) Controls and Cyber Controls 2020-10-15

Cloud (Data Centre) Controls and Cyber Controls crossword puzzle
Across
  1. Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
  2. BCP Tests and Wallet Cards are examples of business ___________ management documentation
  3. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
  4. IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
  5. All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
  6. Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
  7. Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
  8. Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
  1. Information assets are ________ for vulnerabilities and reported for remediation
  2. Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
  3. _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
  4. Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
  5. To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
  6. Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
  7. IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed

15 Clues: Information assets are ________ for vulnerabilities and reported for remediationBCP Tests and Wallet Cards are examples of business ___________ management documentationCyber incidents are __________, prioritised, escalated and recorded as per incident response plans...

FIT E Final Quiz Vocab 2013-05-17

FIT E Final Quiz Vocab crossword puzzle
Across
  1. What you can download like Pages, Word, Outlook
  2. Pertaining to a computer
  3. Short Term Memory for Your Computer
  4. Like a waiter for your computer
  5. National Cyber Security Tool
Down
  1. Where you plug in your flash drive
  2. A peripheral, click click
  3. Google, Yahoo, Bing, etc.

8 Clues: Pertaining to a computerA peripheral, click clickGoogle, Yahoo, Bing, etc.National Cyber Security ToolLike a waiter for your computerWhere you plug in your flash driveShort Term Memory for Your ComputerWhat you can download like Pages, Word, Outlook

crossword puzzle 2022-12-31

crossword puzzle crossword puzzle
Across
  1. cyber security international exam
  2. an open source operating system
  3. a notebook computer
  4. our country
  5. computer language
  6. brain of the computer
  7. popular search engine
  8. microsoft browser
Down
  1. that we learning now
  2. social media platform
  3. we can't touch that in computer
  4. institute of network hardware software
  5. software which configure the hardware
  6. a developer platform

14 Clues: our countrycomputer languagemicrosoft browsera notebook computerthat we learning nowa developer platformsocial media platformbrain of the computerpopular search enginewe can't touch that in computeran open source operating systemcyber security international examsoftware which configure the hardwareinstitute of network hardware software

Security homes and Security 2024-05-06

Security homes and Security crossword puzzle
Across
  1. Weak points in a system's security that may be exploited by cybercriminals in smart home devices.
  2. Popular voice-controlled smart assistant which raises privacy concerns regarding the data it collects.
  3. Security technique used to encode data sent between smart devices to prevent unauthorized access.
  4. A deceptive method often used to steal user credentials by mimicking legitimate requests or notifications, increasingly targeted at smart device users.
  5. A line of smart home products known for integrating security features but still poses risks if not properly managed.
Down
  1. A device often connected to smart home networks that can be manipulated remotely, highlighting the need for secure configurations.
  2. Unauthorized gathering of private information through electronic means in a connected home.
  3. Residences equipped with interconnected devices that can be managed remotely but may expose owners to cyber threats
  4. A type of malware that converts networked devices into controlled 'bots', often used in large-scale network attacks, including those on IoT devices.
  5. Measures and protocols implemented to protect smart home devices from cyber threats.
  6. Individuals who seek unauthorized access to networked devices, often targeting poorly secured smart home systems.

11 Clues: Measures and protocols implemented to protect smart home devices from cyber threats.Unauthorized gathering of private information through electronic means in a connected home.Weak points in a system's security that may be exploited by cybercriminals in smart home devices....

Intro to Cyber Security 2023-09-07

Intro to Cyber Security crossword puzzle
Across
  1. the possibility of being attacked or harmed
  2. difficult
  3. the opposite of virus
  4. people who don't have access to
  5. malware denying users access to files in their own computer.
  6. information stolen without the owner's knowing
  7. coding a message
  8. forwards data between computer networks
  9. Adopt,develop
  10. find,identify,catch
Down
  1. converting to largely automatic operation
  2. quick to react
  3. a word or something that is used when logging in along with the username
  4. practice of sending fradulent emails
  5. supplier of equipment or a trader
  6. a person who commits scamming
  7. windows8,windows10,linux
  8. attack online
  9. copy of file kept for potential disasters
  10. designed to provide communications security of a computer network

20 Clues: difficultattack onlineAdopt,developquick to reactcoding a messagefind,identify,catchthe opposite of viruswindows8,windows10,linuxa person who commits scammingpeople who don't have access tosupplier of equipment or a traderpractice of sending fradulent emailsforwards data between computer networksconverting to largely automatic operation...

Cyber Security Crossword Fun 2023-07-05

Cyber Security Crossword Fun crossword puzzle
Across
  1. Collects sensitive information without consent
  2. Malicious software spread through networks
  3. Protects against malicious activity
  4. Intrudes remotely on a device
  5. Hidden internet used for criminal activity
  6. Malicious software disguised as a legitimate program
  7. Bullying that happens online
  8. stealing someone's identity
  9. Users are tricked into pressing something that is
  10. Internet that can't be accessed through standard search engines
Down
  1. Malicious software that encrypts until a ransom is paid
  2. White hat hacking
  3. access sensitive information
  4. Virus spread through infected email attachments
  5. Keeps track of computer keys pressed
  6. Displays unwanted advertisements
  7. tricking people on the internet
  8. Encrypted connection between 2 devices
  9. Networks being controlled with malicious software
  10. Malicious code that is triggered by something
  11. Measurement or analysis of individuals

21 Clues: White hat hackingstealing someone's identityaccess sensitive informationBullying that happens onlineIntrudes remotely on a devicetricking people on the internetDisplays unwanted advertisementsProtects against malicious activityKeeps track of computer keys pressedEncrypted connection between 2 devicesMeasurement or analysis of individuals...

Cyber Security Awareness Quiz 2024-09-20

Cyber Security Awareness Quiz crossword puzzle
Across
  1. 10
  2. 15
  3. 17
  4. 7
  5. 16
  6. 12
  7. 9
  8. 11
  9. 8
  10. 14
  11. 4
  12. 3
Down
  1. 1
  2. 19
  3. 5
  4. 13
  5. 20
  6. 18
  7. 2
  8. 6

20 Clues: 1579286431019151713162018121114

Cyber Security Awareness Month 2025-08-07

Cyber Security Awareness Month crossword puzzle
Across
  1. A software that is designed to cause damage to a computer, server, or network.
  2. A program that secretly tracks your online activity and collects personal information.
  3. The act of stealing and using another person's personal information without their permission.
  4. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
  5. Using social media to gather personal information about a target to gain their trust.
  6. A type of denial-of-service attack that floods a server with a massive amount of traffic, making it unavailable to users.
  7. A digital signature that verifies the identity of a website or user.
  8. A code that restricts access to your phone or computer.
  9. The "lock" icon you see in your browser when a website is secure, ensuring a private connection.
  10. A person who breaks into computer systems, often for illegal purposes.
  11. A person who uses hacking to promote a political or social cause.
  12. course! Here are the clues and answers in the format you requested, with the answer first, followed by a space, and then the clue.
  13. The use of a fake email address to trick a recipient into believing the email is from a different sender.
  14. Clues
  15. A service that encrypts your internet traffic and hides your IP address, protecting your online privacy.
  16. me know if you would like me to create more clues or if you need the puzzle in a different format!
  17. A type of malicious software that tricks users into downloading or buying fake antivirus software by displaying fake warnings.
  18. A set of rules and procedures for communicating data between computer systems.
Down
  1. A type of malware that secretly records your keystrokes to steal your login credentials and other sensitive information.
  2. Clues
  3. The practice of protecting your data and systems from digital attacks.
  4. A secret word or phrase used to prove your identity to gain access to a computer or other account.
  5. A network that is not secure and can be accessed by anyone, making it a target for hackers.
  6. The process of converting plain text into an unreadable code to prevent unauthorized access.
  7. A type of malicious software that can replicate itself and spread to other computers.
  8. A deceptive link that tricks you into clicking it, often leading to a malicious website or download.
  9. Clues
  10. A fake website designed to deceive you and steal your information.
  11. A type of scam where a criminal pretends to be a legitimate person or organization to steal personal information.
  12. A security vulnerability that is exploited by attackers before a patch or fix is available.
  13. What you should do with your password on a regular basis.
  14. An intrusion prevention system that monitors a network for malicious activity and takes action to block it.
  15. An authentication method that requires two or more forms of verification to gain access to a resource.
  16. A network security system that monitors and controls incoming and outgoing network traffic.
  17. A type of malware that gives an attacker full administrative control over a system, often without the user's knowledge.

35 Clues: CluesCluesCluesA code that restricts access to your phone or computer.What you should do with your password on a regular basis.A person who uses hacking to promote a political or social cause.A fake website designed to deceive you and steal your information.A digital signature that verifies the identity of a website or user....

CIS120-Cyber Security Puzzle 2025-08-25

CIS120-Cyber Security Puzzle crossword puzzle
Across
  1. cyberattacks for financial gain.
  2. an ever growing digital world.
  3. Key code to unlock or open .
  4. protects your software.
  5. a fix for software
  6. a +10 password.
  7. Falsifying negative comments on web.
  8. using body parts to access.
  9. strongly motivated by their beliefs.
Down
  1. user must pay fee to restore.
  2. cause disruption and panic.
  3. password or general.
  4. process a user has permission.
  5. Stands for malicious & software.
  6. falsifying identity.
  7. malware and social engineering.
  8. (-1) - (-10) password.
  9. protects you from attackers.
  10. copying itself into another program.
  11. selling their knowledge of vulnerabilities.

20 Clues: a +10 password.a fix for softwarepassword or general.falsifying identity.(-1) - (-10) password.protects your software.cause disruption and panic.using body parts to access.Key code to unlock or open .protects you from attackers.user must pay fee to restore.an ever growing digital world.process a user has permission.malware and social engineering....

cyber security crossword puzzle 2021-03-17

cyber security crossword puzzle crossword puzzle
Across
  1. a vulnerability hackers will take advantage of
  2. if someone gave u a ps5 for Christmas but you open the box and its socks
  3. canned meat but also annoying emails
  4. what we deal with trying to watch pirated movies
  5. purposely put on your computer to steal your information
  6. tik tok instagram facebook snapchat are all examples of...
  7. slimy little animal that lives in the dirt and will ruin your computer
  8. the one thing you don't want on your computer
  9. after 10pm you can probably find me in a discord...
  10. you could say the zodiac killer put an ... on his letters to the police
Down
  1. where organized information is stored
  2. can be compared to finding dory
  3. we use one to complete our security labs
  4. seems okay but contains malware
  5. advertisements displayed by software
  6. our teachers send us way too many of these
  7. using social tactics to get information
  8. what comes with phishing emails
  9. tree diagram of the processes that a product goes through
  10. when the internet is down we turn this off and turn it back on

20 Clues: can be compared to finding doryseems okay but contains malwarewhat comes with phishing emailsadvertisements displayed by softwarecanned meat but also annoying emailswhere organized information is storedusing social tactics to get informationwe use one to complete our security labsour teachers send us way too many of these...

Cyber Security Awareness Month 2021-10-15

Cyber Security Awareness Month crossword puzzle
Across
  1. Hard to detect both by Users.
  2. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
  3. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
  4. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
  5. An attack focusing on people rather than technology.
  6. A form of malware that monitors user activities and reports them to an external their party.
  7. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
  8. Something that shows up in an email.
  9. Threats Malware is defined as any device.
Down
  1. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
  2. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
  3. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
  4. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
  5. a dishonest scheme; a fraud.
  6. Alerts used as a warning of danger.
  7. The ultimate call control center that gives customers full control of all scam protection options.
  8. The act of falsifying the identity of the source of a communication or interaction.
  9. Identity and Privacy Protection.
  10. Someone attempting to create Identity fraud.
  11. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
  12. An attempt by hackers to damage or destroy a computer network or system.
  13. A security tool, which may be a hardware or software solution that is used to filter network traffic.

22 Clues: a dishonest scheme; a fraud.Hard to detect both by Users.Identity and Privacy Protection.Alerts used as a warning of danger.Something that shows up in an email.Threats Malware is defined as any device.Someone attempting to create Identity fraud.An attack focusing on people rather than technology....

Basics of Cyber Security 2021-06-29

Basics of Cyber Security crossword puzzle
Across
  1. threatening behavior facilitated through electronic means such as texting.
  2. a wireless technology standard used over short distances using short-wavelength UHF radio waves.
  3. hardware or software designed to prevent unauthorized access to or from a private network.
  4. should be constructed of upper and lower case letters, numbers, and special characters.
  5. fraudulent email purportedly from a reputable company attempting to get personal information.
  6. A sequence of words or text used to control access to a computer; similar to a password.
  7. The address of a webpage. Check the validity of it before clicking on it.
  8. the process of taking plain text and scrambling it into an unreadable format.
  9. a flaw or weakness in a computer system that could be exploited to violate the system’s security.
  10. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  11. fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. facebook, Twitter, Instagram, etc. (Two words)
  4. The “I” in the C-I-A Triad; protection from unauthorized changes.
  5. verifying identity.
  6. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  7. security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Unauthorized access to a network, information systems, or application.
  9. the “A” in the C-I-A Triad. It ensures authorized users have access.

20 Clues: verifying identity.facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.the “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cyber Security Awareness 2022 2022-07-19

Cyber Security Awareness 2022 crossword puzzle
Across
  1. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
  2. A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
  3. The recovery of data following computer failure or loss
  4. Another kind of malware that allows cybercriminals to remotely control your computer
  5. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
  6. Malware that passes information about a computer user’s activities to an external party
  7. Obtaining services by using someone else’s resources
  8. A device or software designed to prevent unauthorized access to a computer or network
  9. A term related to the malicious concept of a botnet
  10. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  11. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
  12. high-speed internet access
Down
  1. A flaw or weakness that can be used to attack a system or organization
  2. Computer that provides data or services to other computers over a network
  3. An app on your phone that generates a code to add an extra level of security to a password
  4. The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
  5. A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
  6. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
  7. Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
  8. Method used by criminals to obtain financial or other confidential information
  9. It's not really a _____, it's just someone else's computer
  10. This should be at least 8 characters long
  11. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
  12. Something of value to a person, business, or organization
  13. Something that could cause an organization not to meet one of its objectives
  14. Malware that replicates itself so it can spread to infiltrate other computers

26 Clues: high-speed internet accessThis should be at least 8 characters longA term related to the malicious concept of a botnetObtaining services by using someone else’s resourcesThe recovery of data following computer failure or lossSomething of value to a person, business, or organizationIt's not really a _____, it's just someone else's computer...

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A form of malware used by hackers to spy on you and your computer activities
  2. Unauthorized access to a network, information systems or application
  3. A piece of software or application that displays advertisements on your computer
  4. When a hacker changes source of an email so that it seems to come from a trusted source
  5. A sequence of words or text used to control access to a computer; similar to a password
  6. The process of taking plain text and scrambling it into an unreadable format
  7. A piece of hardware or software, used to keep intruders out
  8. Threatening behavior facilitated through electronic means such as texting
  9. In addition to passwords; provides better security
  10. A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
  1. Something personal to you and should never be shared
  2. A malicious software designed to block access to a computer system until a sum of money is paid
  3. media Facebook, Twitter, Instagram etc. (Two Words)
  4. The process of identifying a user’s identity
  5. A combination of the words “robot” and “network”
  6. the address of a website; check its validity before clicking on it
  7. A fraudulent email purportedly from a reputable company attempting to get personal information
  8. Alert / Always on the lookout
  9. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  10. An icon displayed along a web browser URL - indicates a secure mode

20 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityA combination of the words “robot” and “network”In addition to passwords; provides better securitymedia Facebook, Twitter, Instagram etc. (Two Words)Something personal to you and should never be sharedA piece of hardware or software, used to keep intruders out...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

25 Cyber Security Facts 2023-08-30

25 Cyber Security Facts crossword puzzle
Across
  1. is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. communications standard that enables application programs and computing devices to exchange messages over a network.
  3. the capacity at which a network can transmit data.
  4. a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
  5. is a malware designed to deny a user or organization access to files on their computer.
  6. the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
  7. a computer network security system that restricts internet traffic in, out, or within a private network.
  8. storage mode of computer data storage in which digital data is stored on servers in off-site locations.
  9. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
  10. a system of signals or symbols for communication.
  11. refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
  12. malware designed to collect online banking credentials and other sensitive information from infected machines
Down
  1. technique used by fraudsters to get control of your phone number.
  2. the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  3. software used by cybercriminals to gain control over a target computer or network.
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
  5. is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
  6. is a type of security measure known as challenge-response authentication.
  7. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  8. information that has been translated into a form that is efficient for movement or processing
  9. the method by which information is converted into secret code that hides the information's true meaning.
  10. he hidden collective of internet sites only accessible by a specialized web browser.
  11. a formal request to an authority for something
  12. an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
  13. The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

25 Clues: a formal request to an authority for somethinga system of signals or symbols for communication.the capacity at which a network can transmit data.technique used by fraudsters to get control of your phone number.is a type of security measure known as challenge-response authentication....

Cyber Security Crossword Puzzle 2025-03-12

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. viruses, worms, and ransomware
  2. security system that monitors traffic
  3. records keystrokes to steal passwords
  4. manipulate people to give data
  5. encrypts internet connections
  6. delivery of computing services
  7. convert data into coded format
  8. fixes vulnerabilities or improves security
  9. secretly gathers user information
  10. network of infected computers
  11. encrypts a victims data
  12. verifying the identity of user
Down
  1. analyze business data for decisions
  2. collection and analysis of data
  3. bypassing normal authentication
  4. process store distribute information
  5. impersonate a trustworthy entity
  6. overwhelms a network with excessiveness
  7. confidential information is stolen
  8. determine whats allowed for access

20 Clues: encrypts a victims dataencrypts internet connectionsnetwork of infected computersviruses, worms, and ransomwaremanipulate people to give datadelivery of computing servicesconvert data into coded formatverifying the identity of usercollection and analysis of databypassing normal authenticationimpersonate a trustworthy entity...

Integrity & Compliance Week Crossword 2024-04-29

Integrity & Compliance Week Crossword crossword puzzle
Across
  1. Corporate adherence to laws and ethics
  2. Cloud service's stamp of security approval from Uncle Sam (abbr.)
  3. Golden State's guard of personal digital space (abbr.)
  4. Core value of honesty and strong moral principles
  5. Global benchmark for quality and safety (abbr.)
  6. Point Security Cyber defense where your network meets the world
  7. Expert in construction cost data and procurement efficiency
  8. Diversified industrial growth company with a knack for innovation
Down
  1. Assurance report for service organizations (abbr.)
  2. U.S. regulation keeping defense-related tech secure (abbr.)
  3. Countries Nations where trade is a no-go
  4. Protector of your medical secrets (abbr.)
  5. Non-citizens with potential access to controlled tech
  6. Credit card's shield against data theft (abbr.)
  7. California's updated privacy rights legislation, effective 2023 (abbr.)
  8. Controls exports for national security (abbr.)
  9. Compliance Ensuring cross-border business respects international rules
  10. Framework safeguarding personal data across the pond (abbr.)

18 Clues: Corporate adherence to laws and ethicsCountries Nations where trade is a no-goProtector of your medical secrets (abbr.)Controls exports for national security (abbr.)Credit card's shield against data theft (abbr.)Global benchmark for quality and safety (abbr.)Core value of honesty and strong moral principles...

Christmas Cyber Security 2022-11-23

Christmas Cyber Security crossword puzzle
Across
  1. Malicious Text Messages
  2. Illness in an email
  3. Malicious Software
  4. A threat from within
  5. Harmless Junk Email
  6. Responsible for reporting
  7. The Grinch's first name
Down
  1. Malicious Spam
  2. The P in ODPO
  3. The main man at Xmas
  4. Information with no context
  5. A red nosed reindeer
  6. A false website

13 Clues: The P in ODPOMalicious SpamA false websiteMalicious SoftwareIllness in an emailHarmless Junk EmailThe main man at XmasA threat from withinA red nosed reindeerMalicious Text MessagesThe Grinch's first nameResponsible for reportingInformation with no context

Vishing Puzzle 2022-04-05

Vishing Puzzle crossword puzzle
Across
  1. disclose
  2. authenticate
  3. share
Down
  1. security
  2. steal
  3. attention
  4. hashtag

7 Clues: stealsharehashtagsecuritydiscloseattentionauthenticate

Basics of Cyber Security 2021-06-29

Basics of Cyber Security crossword puzzle
Across
  1. a wireless technology standard used over short distances using short-wavelength UHF radio waves.
  2. verifying identity.
  3. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. hardware or software designed to prevent unauthorized access to or from a private network.
  5. the “A” in the C-I-A Triad. It ensures authorized users have access.
  6. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  7. fraudulent email purportedly from a reputable company attempting to get personal information.
  8. a flaw or weakness in a computer system that could be exploited to violate the system’s security.
  9. fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. Unauthorized access to a network, information systems, or application.
  2. the process of taking plain text and scrambling it into an unreadable format.
  3. facebook, Twitter, Instagram, etc. (Two words)
  4. threatening behavior facilitated through electronic means such as texting.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  7. A sequence of words or text used to control access to a computer; similar to a password.
  8. harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  9. The “I” in the C-I-A Triad; protection from unauthorized changes.
  10. should be constructed of upper and lower case letters, numbers, and special characters.
  11. security tool that creates a secure, encrypted connection between you and the Internet (acronym).

20 Clues: verifying identity.facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.the “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

BIOMETRICS and CYBER SECURITY 2023-05-25

BIOMETRICS and CYBER SECURITY crossword puzzle
Across
  1. are no longer needed in home security because of biometric security systems
  2. a bank that uses heartrate to confirm a customer
  3. a type of recognition
  4. the type of biometrics that walking, speaking and typing habit
  5. a type of recognition
  6. the type of biometrics that uses the structure of your body
  7. a college that is developing a camera that can scan irises of people from 10 meters away
  8. the type of biometrics that uses DNA and blood
  9. the unique pattern in a person finger is used in vein recognition
  10. banks use these as part of there biometric security systems
  11. used in airport security
  12. a person’s walking style is used, because everyone walks a bit differently
Down
  1. a type of recognition
  2. a security used to authorize transaction in financial and money
  3. uses the distinctive frequencies, pitch and tone of a person’s voice
  4. they worry that biometric violate personal privacy
  5. has a digital photograph, fingerprint or Iris
  6. an airport where they are using 80 camera
  7. is used by the US as an electronic passport
  8. the most common type of biometrics used in the healthcare profession
  9. uses facial anatomy to ID someone
  10. it is one of the most extensively used biometric verficiation systems
  11. a bank that uses speech recognition
  12. used in law enforcement for criminal ID
  13. a type of recognition

25 Clues: a type of recognitiona type of recognitiona type of recognitiona type of recognitionused in airport securityuses facial anatomy to ID someonea bank that uses speech recognitionused in law enforcement for criminal IDan airport where they are using 80 camerais used by the US as an electronic passporthas a digital photograph, fingerprint or Iris...

Cyber Security Term Puzzle 2023-09-10

Cyber Security Term Puzzle crossword puzzle
Across
  1. "Protecting partnerships from cyber threats."
  2. "Unwanted inbox clutter."
  3. "Digital explorer of systems."
  4. "Malicious software causing harm."
  5. Theft "Stealing your digital identity."
  6. "Digital identity impersonation."
  7. "Proving your identity securely."
  8. "Software fix for vulnerabilities."
  9. "Private internet tunnel."
  10. "Unauthorized data escape."
  11. "Email authenticity verifier."
  12. "Secure data transmission protocols."
Down
  1. "Online home for your website."
  2. "Your gateway to the online world."
  3. "Data hostage situation”
  4. "Data lock with secret code."
  5. "Email authentication guardian."
  6. “Locking doors to data”
  7. "Deceptive emails, beware!"
  8. "Guardian against digital infections."

20 Clues: “Locking doors to data”"Data hostage situation”"Unwanted inbox clutter.""Private internet tunnel.""Deceptive emails, beware!""Unauthorized data escape.""Data lock with secret code.""Digital explorer of systems.""Email authenticity verifier.""Online home for your website.""Email authentication guardian.""Digital identity impersonation."...

Algorithms, Programming & Cyber Security 2025-12-08

Algorithms, Programming & Cyber Security crossword puzzle
Across
  1. When someone tries to break into computers (2 words)
  2. Changing a value from one type to another, like number to text
  3. A way to make the computer choose what to do if something is true
  4. Looking through a list one by one until you find it (2 words)
  5. A password that is hard for someone else to guess (2 words)
  6. A name that stores a piece of information like a number or word
  7. A whole number without decimals
  8. A method to put a list of items in order by comparing each pair (2 words)
  9. Finds the remainder when one number is divided by another (2 words)
  10. What the computer does if nothing else is true
  11. Checks another condition if the first one was false
  12. Used to compare two values like bigger or smaller (2 words)
  13. Adding one to a number
  14. Software that is designed to harm a computer
Down
  1. Text made up of letters, numbers, or symbols
  2. Tricking people to get information or access (2 words)
  3. Repeats actions a set number of times
  4. A loop inside another loop (2 words)
  5. Subtracting one from a number
  6. Repeats actions until a condition is no longer true
  7. The kind of information something is, like number or text (2 words)
  8. Searching a sorted list by repeatedly splitting it in half (2 words)
  9. Finds the remainder after division
  10. A method to sort a list by splitting and combining it (2 words)
  11. A number that has a decimal point
  12. A type that can only be True or False
  13. Checks if at least one condition is true
  14. Text or numbers typed by the person using the program (2 words)
  15. Checks if two conditions are both true

29 Clues: Adding one to a numberSubtracting one from a numberA whole number without decimalsA number that has a decimal pointFinds the remainder after divisionA loop inside another loop (2 words)Repeats actions a set number of timesA type that can only be True or FalseChecks if two conditions are both trueChecks if at least one condition is true...

In the World of IT: Crime and Security 2024-11-19

In the World of IT: Crime and Security crossword puzzle
Across
  1. exclusive legal right.
  2. Ensures that information is accessible to authorize persons when required without delay.
  3. Action derived from intelligent threats to violate the security of the system
  4. Security hole.
  5. Ensures that that the computer users or those who access information are who they claim to be.
  6. Both sending and collecting of information from unsuspecting people.
  7. An action that has the potential to compromise and/or violate security.
  8. Work on its own without attaching itself to file or programs.
  9. Pointing you to a malicious and illegitimate website by redirecting the legitimate URL.
  10. This involves actions that supplement the precautionary measures.
Down
  1. One of the layers of security that protects personnel, hardware, programs, networks, and data from physical threat.
  2. Term used for actions taken by someone to gain unauthorizes access to a computer.
  3. A person who breaks into computer systems.
  4. Sending emails purporting to be from reputable companies to gain personal information.
  5. Characteristics of the culture of computers, information, technology, and virtual reality.
  6. Often sent as email attachment or download with the intent of infecting the computer.
  7. Excessive gaming behavior.
  8. Action take in advance to protect the system against threats.
  9. Infects your computer (viruses, worms, spyware.
  10. One of the layers of security that allows the system to set security rules to determine what is displayed to which user.

20 Clues: Security hole.exclusive legal right.Excessive gaming behavior.A person who breaks into computer systems.Infects your computer (viruses, worms, spyware.Action take in advance to protect the system against threats.Work on its own without attaching itself to file or programs.This involves actions that supplement the precautionary measures....

Vishing Puzzle 2022-04-05

Vishing Puzzle crossword puzzle
Across
  1. hashtag
  2. attention
  3. advise
  4. authenticate
Down
  1. steal
  2. security
  3. share

7 Clues: stealshareadvisehashtagsecurityattentionauthenticate

CTF-CW-7 2025-11-17

CTF-CW-7 crossword puzzle
Across
  1. Making scrambled data readable again
  2. Actively searching for cyber attackers
  3. Assessment by outside professionals
  4. API documentation and tryout platform at Tekion.
  5. Automated remote data collection
  6. Technique hiding original data with modified content
  7. Record of all valuable items
  8. Web application firewall by Akamai that protects Tekion�s websites.
  9. Evaluation or court case
  10. Technique making data unclear while preserving its utility
Down
  1. Using technology to perform security tasks automatically
  2. Security model: never trust, always verify
  3. Gaining higher access than intended
  4. Immediate patch for a critical bug
  5. Documentation of all personal data processing activities
  6. Learning sessions for staff
  7. Smart procurement tool used by Tekion for purchasing.
  8. European Union's comprehensive artificial intelligence regulation
  9. Updating code to fix holes�again
  10. A set of documented IT procedures

20 Clues: Evaluation or court caseLearning sessions for staffRecord of all valuable itemsAutomated remote data collectionUpdating code to fix holes�againA set of documented IT proceduresImmediate patch for a critical bugGaining higher access than intendedAssessment by outside professionalsMaking scrambled data readable again...

BROWSING SAFELY 2025-06-07

BROWSING SAFELY crossword puzzle
Across
  1. ILLEGAL ENTRY
  2. CRIMINAL ACTIVITY
  3. PREVENT FROM UNAUTHORISED ACCES
  4. HARASSING PEOPLE
  5. SPOOFING HOAXING OR MISLEADING
  6. THEFT STEALING IDENTITY
Down
  1. BEFRIENDING
  2. SECURITY PRECAUTIONS FROM CYBER ATTACK
  3. SENDING AN E-MAIL;MISLEADING;TRUSTED PERSON
  4. UNETHICAL HACKER
  5. ANOTHER NAME OF VITAL;UNDER
  6. FRAUD ILLEGAL METHOD;BELONG TO BANK

12 Clues: BEFRIENDINGILLEGAL ENTRYUNETHICAL HACKERHARASSING PEOPLECRIMINAL ACTIVITYANOTHER NAME OF VITAL;UNDERPREVENT FROM UNAUTHORISED ACCESTHEFT STEALING IDENTITYSPOOFING HOAXING OR MISLEADINGSENDING AN E-MAIL;MISLEADING;TRUSTED PERSONFRAUD ILLEGAL METHOD;BELONG TO BANKSECURITY PRECAUTIONS FROM CYBER ATTACK

Iroquois Cyber Security Crossword 2022-09-15

Iroquois Cyber Security Crossword crossword puzzle
Across
  1. Multi Factor Authentication
  2. When you are unsure a URL is real
  3. What not to do for unknown texts
  4. What to do to numbers of unwanted texts
  5. A classic in person attack
  6. Phone based social engineering
  7. malicious software
  8. A way to harvest data
  9. Subtle signs of danger
  10. Bypassing physical access controls
  11. Phishing that targets users
  12. How Colonial Pipeline was attacked
  13. Email based social engineering
Down
  1. Social Media used to gather info
  2. Used to separate parts of a URL
  3. The art of deceiving
  4. Scrambles data in a computer
  5. What you hover over in an email
  6. Text based Social Engineering
  7. Button in Outlook to report emails
  8. A website address
  9. Who does cybercrime target?
  10. Type of drive used to store data
  11. Used for Man in the middle attacks

24 Clues: A website addressmalicious softwareThe art of deceivingA way to harvest dataSubtle signs of dangerA classic in person attackMulti Factor AuthenticationPhishing that targets usersWho does cybercrime target?Scrambles data in a computerText based Social EngineeringPhone based social engineeringEmail based social engineering...

Cyber Security Terminology Puzzle 2023-01-25

Cyber Security Terminology Puzzle crossword puzzle
Across
  1. any type of harmful software
  2. software that shields against viruses
  3. used to signin and protect accounts
  4. creates secure connection
  5. data scrambled for safe sending
  6. unique string of numbers
  7. free wifi used in public
  8. hacker that hacks for profit
  9. malware locks user until payment
  10. infects systems
Down
  1. being mean online
  2. online storage
  3. malware pretending to be useful
  4. secure identification of ones account
  5. malware that uses clicks
  6. overloading a network
  7. attacks seeking out personal information
  8. malware that tracks you
  9. shields unauthorized access of data
  10. using personal devices in workplace
  11. malware software that uses ads

21 Clues: online storageinfects systemsbeing mean onlineoverloading a networkmalware that tracks youmalware that uses clicksunique string of numbersfree wifi used in publiccreates secure connectionany type of harmful softwarehacker that hacks for profitmalware software that uses adsmalware pretending to be usefuldata scrambled for safe sending...

Cyber-Security Amanda Peart 2020-10-21

Cyber-Security Amanda Peart crossword puzzle
Across
  1. C of the CIA triad
  2. computer operating system for Apple Computer's MacIntosh line of personal computers and workstations
  3. the physical components that a computer system requires to function
  4. a bit of data, which is sent by a sender, to a recipient
  5. the software that supports a computer's basic functions
  6. a person who uses computers to gain unauthorized access to data
  7. I if the CIA Triad
  8. to decode (a message) with or without previous knowledge of its key
  9. encompasses measures taken to improve the security of an application
  10. a file that exists of cells in rows and columns and can help arrange, calculate and sort data
  11. a legal instrument governing the use or redistribution of software
  12. heads the national effort to investigate and prosecute internet crimes, including "cyber-based terrorism, espionage, computer intrusions, and major cyber fraud"
  13. the programs and other operating information used by a computer
  14. A fo the CIA Triad
Down
  1. allows the user to interact with the computer by typing in commands
  2. caused 1 billion user accounts may have been comprised
  3. nothing to do with a certain well-recognized US intelligence agency
  4. the field of work in which someone manages one or more systems
  5. convert (information or data) into a cipher or code, especially to prevent unauthorized access
  6. each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet
  7. the art of writing or solving codes
  8. the study of codes, or the art of writing and solving them
  9. a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword
  10. A piece of software that prevents pop-up advertisements from being displayed
  11. a hardware or software component that stores data
  12. activity that either targets or uses a computer, a computer network or a networked device
  13. a software program that runs on your computer
  14. job is to protect online data from being compromised
  15. developed by Microsoft Corporation to run personal computers
  16. a way for software developers to fine-tune a product to make it the best it can be

30 Clues: C of the CIA triadI if the CIA TriadA fo the CIA Triadthe art of writing or solving codesa software program that runs on your computera hardware or software component that stores datajob is to protect online data from being compromisedcaused 1 billion user accounts may have been comprisedthe software that supports a computer's basic functions...

Cyber Security Awareness Month 2021-10-08

Cyber Security Awareness Month crossword puzzle
Across
  1. Results in the loss of contact details if it were stolen
  2. What does cybersecurity have in common with Halloween?
  3. _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
  4. What you will cause IT to have if you get a virus on your computer
  5. Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
  6. Hackers ____ their identity.
  7. This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
  8. A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
  9. What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
  1. This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
  2. You don't want to be the business with the most _____ network on the block.
  3. These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
  4. How your computer might act once infected by a virus.
  5. Happens on Halloween night
  6. If you click on a phishing email you might want to ____ your job
  7. For hackers, it’s all about the _____ and it’s their treat they succeed
  8. These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
  9. A bridge between two computer networks.
  10. In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
  11. The process of translating plaintext into ciphertext.

20 Clues: Happens on Halloween nightHackers ____ their identity.A bridge between two computer networks.How your computer might act once infected by a virus.The process of translating plaintext into ciphertext.What does cybersecurity have in common with Halloween?Results in the loss of contact details if it were stolen...