cyber security Crossword Puzzles

Cyber Security Awareness Month 2021-10-08

Cyber Security Awareness Month crossword puzzle
Across
  1. Results in the loss of contact details if it were stolen
  2. What does cybersecurity have in common with Halloween?
  3. _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
  4. What you will cause IT to have if you get a virus on your computer
  5. Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
  6. Hackers ____ their identity.
  7. This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
  8. A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
  9. What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
  1. This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
  2. You don't want to be the business with the most _____ network on the block.
  3. These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
  4. How your computer might act once infected by a virus.
  5. Happens on Halloween night
  6. If you click on a phishing email you might want to ____ your job
  7. For hackers, it’s all about the _____ and it’s their treat they succeed
  8. These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
  9. A bridge between two computer networks.
  10. In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
  11. The process of translating plaintext into ciphertext.

20 Clues: Happens on Halloween nightHackers ____ their identity.A bridge between two computer networks.How your computer might act once infected by a virus.The process of translating plaintext into ciphertext.What does cybersecurity have in common with Halloween?Results in the loss of contact details if it were stolen...

Ryne Cyber Security Puzzle 2023-09-11

Ryne Cyber Security Puzzle crossword puzzle
Across
  1. Digital Signal on emails to confirm identities
  2. Information
  3. Protects you from third party claims, based on liability
  4. Concealing data is called
  5. Tells servers what to do when getting an email using your business domain, but looks suspicious
  6. Malware that requires a payment to remove
  7. Weaknesses in an information system
  8. Malware disguising as official businesses to ask users for sensitive information
Down
  1. Something that protects and gives safety
  2. Protects data for yours, employees and customers' data
  3. Typical scheme or fraud
  4. Motherboards, Keyboard, Mouse are examples of what?
  5. Verifying the identity of a user
  6. Two electronic devices that interconnect with one another to exchange data
  7. A phase that users must know to gain access to something
  8. Google chrome, Safari, Microsoft Edge are examples of what?
  9. No wires attached
  10. Malicious software
  11. Tells other servers which servers are allowed to send emails using your business domain name
  12. National Institute of Standards and Technology

20 Clues: InformationNo wires attachedMalicious softwareTypical scheme or fraudConcealing data is calledVerifying the identity of a userWeaknesses in an information systemSomething that protects and gives safetyMalware that requires a payment to removeDigital Signal on emails to confirm identitiesNational Institute of Standards and Technology...

chapter 3 cyber security 2023-10-25

chapter 3 cyber security crossword puzzle
Across
  1. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  2. using reconnaissance to phish someone
  3. phishing but on messeges
  4. going threw your trash
  5. is any software intentionally designed to cause disruption to a computer
  6. following someone
  7. emails that are annoying
  8. phishing but on call
  9. fraud
  10. persuades the user to take a specific action based on fear
  11. a software that records what you type on your keyboard
  12. looking over your shoulder and gathers info like that
  13. the flash and shockwave plugins from adobe enable the development of cartoons
  14. a means of bypassing an organization's existing security systems.
  15. when hackers hack you and hold it until you give them what you want
  16. software that enables a criminal to obtain info about a users computer
  17. malicious program that uses a trigger to awaken the malicious cod
  18. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
  1. can propagate or self-replicate from one computer to another without human activation
  2. following someone but its not piggybacking
  3. use emails, messege, or other social media to try and gather informastion on you
  4. impersonating a legitimate website
  5. overwelming the network
  6. completely non technical means for a criminal to gather info
  7. displays annoying pop-ups to generate revenue for its authors
  8. when an attacker calls a person and lies to them to gain privlages
  9. programs that claim to perform one function but actually do another, typically malicious
  10. a computer attack that tries to exploit software vulnerability that are unkown
  11. intercepting communications between computers to steal information
  12. keeping your system up to date
  13. an act intended to deceive or trick
  14. a program designed to detect and remove viruses
  15. phishing highpowered people
  16. an impersonation attack
  17. similar to eavesdropping

35 Clues: fraudfollowing someonephishing but on callgoing threw your trashoverwelming the networkan impersonation attackphishing but on messegesemails that are annoyingsimilar to eavesdroppingphishing highpowered peoplekeeping your system up to dateimpersonating a legitimate websitean act intended to deceive or trickusing reconnaissance to phish someone...

Cyber Security Awareness Month 2024-10-04

Cyber Security Awareness Month crossword puzzle
Across
  1. A security vulnerability that is unknown to the vendor and has not been patched.
  2. Control Security techniques that regulate who or what can view or use resources in a computing environment.
  3. Software designed to harm or exploit any programmable device or network.
  4. A network security device that monitors and controls incoming and outgoing network traffic.
  5. An attack that overwhelms a system with traffic from multiple sources, causing service disruption.
  6. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  7. The process of converting information into code to prevent unauthorized access.
  8. A weakness in a system that can be exploited to compromise its security.
  9. Any potential danger to information or systems.
Down
  1. A type of spyware that records keystrokes to capture sensitive information.
  2. The practice of collecting and analyzing digital evidence after a cybersecurity incident.
  3. Software that secretly monitors user activity and collects information.
  4. Engineering Manipulating people into divulging confidential information through deceptive means.
  5. Breach An incident where unauthorized access to sensitive data occurs.
  6. The process of verifying the identity of a user or device.
  7. A type of malware that locks or encrypts a user's files, demanding a ransom for access.
  8. A software update designed to fix vulnerabilities or bugs.
  9. An event that has an adverse effect on the security of an information system.
  10. A protocol for establishing a secure connection between a web server and a browser.
  11. A network of infected devices controlled by a hacker to perform automated tasks.

20 Clues: Any potential danger to information or systems.The process of verifying the identity of a user or device.A software update designed to fix vulnerabilities or bugs.Breach An incident where unauthorized access to sensitive data occurs.Software that secretly monitors user activity and collects information....

Cyber Security CIS 120 2025-08-22

Cyber Security CIS 120 crossword puzzle
Across
  1. software fix
  2. pretend to be you
  3. deliberately mislead
  4. captures key strokes
  5. body part authentication
  6. attacker motivated by belief
  7. bullying on technology
  8. sell cyber content for fraud
  9. cause ideological panic
  10. software designed to protect you
  11. cannot use until fee is paid
Down
  1. practices to stay safe online
  2. pretends to be another program
  3. trick user for information
  4. personally identifiable information
  5. malicious software use
  6. person who creates cybersecurity
  7. code to entrance
  8. copy into another program
  9. data collection results in advertisements

20 Clues: software fixcode to entrancepretend to be youdeliberately misleadcaptures key strokesmalicious software usebullying on technologycause ideological panicbody part authenticationcopy into another programtrick user for informationattacker motivated by beliefsell cyber content for fraudcannot use until fee is paidpractices to stay safe online...

CIS120-Cyber Security Puzzle 2025-08-25

CIS120-Cyber Security Puzzle crossword puzzle
Across
  1. Stands for malicious & software
  2. falsifying identity.
  3. using body parts to access.
  4. a process a user has permission to.
  5. a program designed to copy itself into another program.
  6. strongly motivated by their own principles and beliefs.
  7. 2 types malware and social engineering.
  8. a +10 password.
Down
  1. protects your software.
  2. cause disruption and panic.
  3. a fix for software
  4. selling their knowledge of software vulnerabilities.
  5. an ever growing digital world.
  6. user must pay fee to restore
  7. sending or sharing negative or false info on the web.
  8. protects you from attackers.
  9. password or general.
  10. cyber related attacks for financial gain.
  11. serves as a key to unlock devices or open accts.
  12. a -(1) - (-10) password.

20 Clues: a +10 password.a fix for softwarefalsifying identity.password or general.protects your software.a -(1) - (-10) password.cause disruption and panic.using body parts to access.user must pay fee to restoreprotects you from attackers.an ever growing digital world.Stands for malicious & softwarea process a user has permission to....

cis212-in-seat-review-w4 2019-10-20

cis212-in-seat-review-w4 crossword puzzle
Across
  1. A logical computer network of zombies.
  2. Isolated environment use to test potential malware.
  3. Computer most closely resembles a desktop computer
  4. Technique to diminish risk level
  5. The necessary steps to protect a person or property from harm
  6. Only allows what in on this list.
  7. The first step in the Cyber Kill Chain
  8. Addresses general vulnerability
  9. Where web-based computers store its user files.
  10. Eliminating as many security risks as possible
  11. Addresses specific customer situation
  12. System use to collect attackers techniques
  13. Rules of conduct and communication
Down
  1. Microsoft transport protocol
  2. Another name for Add-on
  3. Purchasing security products from different vendors
  4. Unauthorized access through a Bluetooth connection
  5. Captures and store keystrokes
  6. Validating individuals credentials
  7. Enforces the location in which an app can function
  8. Managing and presenting by function without physical layout or location.
  9. A set of rules for how Microsoft Windows applications share information
  10. A large system with many capabilities.
  11. Designated to analysis network packets
  12. Impersonating another computer of device

25 Clues: Another name for Add-onMicrosoft transport protocolCaptures and store keystrokesAddresses general vulnerabilityTechnique to diminish risk levelOnly allows what in on this list.Validating individuals credentialsRules of conduct and communicationAddresses specific customer situationA logical computer network of zombies....

Test 31-03-2023 2023-03-31

Test 31-03-2023 crossword puzzle
Across
  1. Protocol Used to configure network devices to communicate on an IP network
  2. Provides encrypted connection over the internet from a device to a network
  3. Designed to continuously monitor a large number of areas for water leaks throughout a building
  4. A solution that helps organisations detect, analyze and respond to security threats before they harm business operations
  5. Evidence validated/reviewed for ensuring effectiveness of implemented control.
  6. Email Authentication protocol that provides domain level protection of the email channel
  7. Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
Down
  1. A document prepared for capturing controls implemented for meetina contractual requirement
  2. Translates human readable domain names to machine readable IP addresses
  3. It runs your code on high availability compute infrastructure and performs all the administration of your compute resources
  4. Group of experts responsible for the protection against detection of and response to an organisation's security incidents
  5. Continuously monitors end user devices to detect and respond to cyber threats
  6. Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
  7. Document for capturing all the contractual security requirements
  8. A system which warns people when smoke, fire, carbon monoxide or other fire related emergencies are detected

15 Clues: Document for capturing all the contractual security requirementsTranslates human readable domain names to machine readable IP addressesProtocol Used to configure network devices to communicate on an IP networkProvides encrypted connection over the internet from a device to a network...

Engineering/Cyber Security/Computer Science 2020-10-27

Engineering/Cyber Security/Computer Science crossword puzzle
Across
  1. a type of software
  2. someone who analyzes things
  3. looks up stuff
  4. protection
  5. like a boss
  6. consumer of services
  7. help available when a problem arises
  8. tries things out
Down
  1. someone who develops
  2. information
  3. being of technology
  4. culture of computers and technology
  5. physical properties of something
  6. the equipment needed for this career cluster
  7. going through a series of steps
  8. a profession within many fields

16 Clues: protectioninformationlike a bosslooks up stufftries things outa type of softwarebeing of technologysomeone who developsconsumer of servicessomeone who analyzes thingsgoing through a series of stepsa profession within many fieldsphysical properties of somethingculture of computers and technologyhelp available when a problem arises...

Cyber Security Threads 2024-10-01

Cyber Security Threads crossword puzzle
Across
  1. An attack that floods a network with excessive traffic, disrupting services
  2. Ensures that data is accurate and has not been tampered with
  3. Falsifying data to deceive systems or users
  4. The ability of a system to recover quickly from disruptions or attacks
  5. Ensures that systems are accessible and functional when needed
Down
  1. Ensures that information is accessible only to those authorized to access it
  2. The process of converting information into a secret code
  3. A model that describes the stages of a cyberattack ( 2 words )
  4. A weakness in a system that can be exploited by attackers
  5. A type of malware disguised as legitimate software
  6. A potential danger or harmful event in cybersecurity
  7. A security system that monitors and controls network traffic
  8. An attempt to exploit a system or network

13 Clues: An attempt to exploit a system or networkFalsifying data to deceive systems or usersA type of malware disguised as legitimate softwareA potential danger or harmful event in cybersecurityThe process of converting information into a secret codeA weakness in a system that can be exploited by attackers...

Cyber Security Crossword 2022-05-04

Cyber Security Crossword crossword puzzle
Across
  1. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
  2. Social engineering where an attacker sends a fraudulent message designed to trick an end user.
  3. Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
  4. A regulation in EU law on data protection and privacy.
  5. A computer program used to prevent, detect, and remove malware.
  6. Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
  7. Technology that extends a private network across a public network
Down
  1. The process of giving someone permission to do or have something.
  2. A method that uses trial and error to crack passwords, login credentials, and encryption keys.
  3. Hardware or software designed to prevent unauthorized access to or from a private network.
  4. Facebook, twitter, instagram, etc. (two words)
  5. Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.
  6. The collection and analysis of data gathered from open sources to produce actionable intelligence.

13 Clues: Facebook, twitter, instagram, etc. (two words)A regulation in EU law on data protection and privacy.A computer program used to prevent, detect, and remove malware.The process of giving someone permission to do or have something.Technology that extends a private network across a public network...

Cyber Christmas Security 2025-12-19

Cyber Christmas Security crossword puzzle
Across
  1. A holiday cold that spreads from one toy-making elf to another.
  2. When the Grinch demands payment so you can get back the toys he took from you.
  3. "Open Sesame" or "Ho Ho Ho" might be the secret phrase required to enter the Santa's hidden workshop.
  4. Like getting a bunch of fruitcakes you never asked for.
  5. A quick fix for a hole in a Christmas stocking.
  6. You just found coal in your Christmas stocking and now it's all over your hands and clothes.
  7. Santa's naughty and nice list is magical - only he can read it.
  8. A secret entrance into the workshop that bypasses the main security elf.
Down
  1. A shiny present left under the tree that looks like a new toy but secretly contains a naughty spy camera.
  2. This digital "chimney" keeps the Grinch out while letting Santa’s approved traffic in.
  3. The process of using a special "Christmas Magic" to reveal the hidden message in a letter to Santa.
  4. A deceptive email disguised as a "Track Santa's Sleigh" link, hoping you'll give away your workshop password.
  5. Santa's uses a high-tech fingerprint scanner to unlock his sleigh.

13 Clues: A quick fix for a hole in a Christmas stocking.Like getting a bunch of fruitcakes you never asked for.A holiday cold that spreads from one toy-making elf to another.Santa's naughty and nice list is magical - only he can read it.Santa's uses a high-tech fingerprint scanner to unlock his sleigh....

Edgescan Cybersecurity Crossword 2025-02-20

Edgescan Cybersecurity Crossword crossword puzzle
Across
  1. Attempt to breach security
  2. Verifying user identity
  3. Malware that encrypts files and demands payment
  4. Deceptive emails trying to steal information
  5. Relating to computers and networks
  6. Potential danger to a system
  7. Checking for vulnerabilities
  8. Self-replicating malicious code
  9. Person attempting unauthorized access
  10. Software update to fix vulnerabilities
  11. Taking advantage of a vulnerability
  12. Security event that may indicate a breach
  13. Review of security controls
  14. Information stored on a system
  15. Attack that disrupts service availability
  16. Restoring data after a loss
  17. Malware disguised as legitimate software
  18. Connected computers and devices
  19. Weakness that can be exploited
  20. Unsolicited bulk email
Down
  1. Copy of data for recovery
  2. Simulated attack to find weaknesses
  3. Ensuring systems are accessible
  4. Ensuring data accuracy
  5. Unauthorized access to data
  6. Software that hides malware on a system
  7. Scrambling data to make it unreadable
  8. Programs that run on a computer
  9. Software that secretly monitors user activity
  10. Keeping information secret
  11. Protecting systems and data
  12. Secret word for access
  13. Protecting personal information
  14. Measures to prevent attacks
  15. Network of infected computers
  16. Network security system controlling traffic
  17. Safeguard from harm
  18. Malicious software designed to harm systems
  19. Potential for loss or damage

39 Clues: Safeguard from harmEnsuring data accuracySecret word for accessUnsolicited bulk emailVerifying user identityCopy of data for recoveryAttempt to breach securityKeeping information secretUnauthorized access to dataProtecting systems and dataReview of security controlsMeasures to prevent attacksRestoring data after a lossPotential danger to a system...

Cyber Security Crossword 2022-05-05

Cyber Security Crossword crossword puzzle
Across
  1. The collection and analysis of data gathered from open sources to produce actionable intelligence.
  2. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
  4. Social engineering where an attacker sends a fraudulent message designed to trick an end user.
  5. A method that uses trial and error to crack passwords, login credentials, and encryption keys.
  6. Technology that extends a private network across a public network
Down
  1. Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
  2. The process of giving someone permission to do or have something.
  3. Facebook, twitter, instagram, etc. (two words)
  4. A computer program used to prevent, detect, and remove malware.
  5. A regulation in EU law on data protection and privacy.
  6. Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
  7. Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.

13 Clues: Facebook, twitter, instagram, etc. (two words)A regulation in EU law on data protection and privacy.A computer program used to prevent, detect, and remove malware.The process of giving someone permission to do or have something.Technology that extends a private network across a public network...

Cyber Security Crossword 2025-06-16

Cyber Security Crossword crossword puzzle
Across
  1. what you want your passwords and accounts to be
  2. an email scam containing a link to a lookalike site
  3. unwanted emails or messages, often annoying or fake
  4. a person who tries to break into computers or accounts
  5. a way to secure data when sending it online
  6. short for malicious software - harms or spies on your computer
Down
  1. what you do when you enter a username and password to use a site
  2. the name you choose to log into an account
  3. a bad program that can damage your computer or steal data
  4. always do this when you finish using an account on a shared computer
  5. using a strong one will make it harder for people to access your account
  6. protects a computer by blocking dangerous websites or connections
  7. a trick to steal your money or personal information online

13 Clues: the name you choose to log into an accounta way to secure data when sending it onlinewhat you want your passwords and accounts to bean email scam containing a link to a lookalike siteunwanted emails or messages, often annoying or fakea person who tries to break into computers or accountsa bad program that can damage your computer or steal data...

School Work 2025-01-24

School Work crossword puzzle
Across
  1. Management
  2. Computing
Down
  1. Safety
  2. Protection
  3. Security (Information Technology Security)
  4. Protection
  5. Management
  6. Defense

8 Clues: SafetyDefenseComputingProtectionProtectionManagementManagementSecurity (Information Technology Security)

Information Management 2025-09-23

Information Management crossword puzzle
Across
  1. Management
  2. Integrity
  3. Asset
  4. Information System (MIS)
Down
  1. Management
  2. Security
  3. Property
  4. Secret

8 Clues: AssetSecretSecurityPropertyIntegrityManagementManagementInformation System (MIS)

Cyber Security Basics 2021-09-30

Cyber Security Basics crossword puzzle
Across
  1. The UK's primary data protection law
  2. A hacker that is not ethical nor intentionally malicious
  3. someone who uses the internet to commit crimes
  4. malware that looks like a legitimate program
  5. a name for a hacker that acts maliciously
Down
  1. The most common form of social engineering commonly done through email
  2. Malware that is used to collect data and show ads to a user
  3. a hacker that hacks not to gain money or cause damage but to help improve security
  4. A type of malware that encrypts data and demands a fee
  5. The European Unions data protection law introduced in 2018
  6. the word for staying safe on the internet
  7. The UK's law against hacking
  8. A type of software that is used in malicious ways

13 Clues: The UK's law against hackingThe UK's primary data protection lawthe word for staying safe on the interneta name for a hacker that acts maliciouslymalware that looks like a legitimate programsomeone who uses the internet to commit crimesA type of software that is used in malicious waysA type of malware that encrypts data and demands a fee...

Cybersecurity Awareness R5 2025-06-21

Cybersecurity Awareness R5 crossword puzzle
Across
  1. Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
  2. method or code used to take advantage of that weakness
  3. A method transforming the original data into an unreadable format.
  4. Unauthorized access to confidential or sensitive data.
  5. System that prevents unauthorized access to or from a private network.
  6. Converting data into a secure format to prevent unauthorized access.
  7. A network of compromised computers controlled by attackers to launch cyber attacks.
Down
  1. Weakness in a system that can be exploited by threats.
  2. A malware that encrypts data and demands payment for decryption.
  3. A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
  4. Software update designed to fix security vulnerabilities
  5. A phishing attack that uses text messages to trick individual into divulging personal information.
  6. A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
  7. Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
  8. One of the frontline services of the DICT that ensures secure data Transactions.
  9. Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.

16 Clues: Weakness in a system that can be exploited by threats.method or code used to take advantage of that weaknessUnauthorized access to confidential or sensitive data.Software update designed to fix security vulnerabilitiesA malware that encrypts data and demands payment for decryption.A method transforming the original data into an unreadable format....

cse 2025-04-23

cse crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. india
  4. Man's best friend
Down
  1. learning
  2. security
  3. Large marsupial
  4. Likes to chase mice

8 Clues: indialearningsecurityHas a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

CYBERSECURITY TOOLS AND TECHNIQUES 2025-01-03

CYBERSECURITY TOOLS AND TECHNIQUES crossword puzzle
Across
  1. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
  2. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
  3. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
  4. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
  5. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
  1. A system that monitors network or system activities for signs of malicious activities or policy violations.
  2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
  3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
  4. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
  5. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.

10 Clues: Software designed to detect, prevent, and remove malicious software (malware) from a computer system.A system that monitors network or system activities for signs of malicious activities or policy violations.Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers....

Zscaler Crossword puzzle 2023-07-17

Zscaler Crossword puzzle crossword puzzle
Across
  1. (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
  2. Software update that fixes security vulnerabilities or improves the functionality of a program.
  3. (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
  4. Weakness or flaw in a system that can be exploited by attackers.
  5. Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
  6. Secret combination of characters used to authenticate and gain access to a system or account.
  7. Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
  8. Software designed to detect, prevent, and remove malicious software from a computer system.
  9. Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
  10. Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
  11. Manipulation of individuals to gain unauthorized access or sensitive information.
  12. Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
  13. Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. Creates a connection over a public network, allowing users to access private networks remotely.
  2. Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
  3. Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
  4. Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
  5. Acts as a barrier between a trusted internal network and an untrusted external network.
  6. Converts data into a format that can only be read or accessed with the correct decryption key.
  7. Broad term for malicious software designed to harm or exploit computer systems.
  8. Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
  9. Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
  10. Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.

23 Clues: Weakness or flaw in a system that can be exploited by attackers.Broad term for malicious software designed to harm or exploit computer systems.Manipulation of individuals to gain unauthorized access or sensitive information.Acts as a barrier between a trusted internal network and an untrusted external network....

Cyber Security Brain Teaser 2025-05-15

Cyber Security Brain Teaser crossword puzzle
Across
  1. a person who uses computers to steal data
  2. how many characters should a strong password have
  3. a common scam where scamers impersonate loved ones
  4. a common email scam
  5. software that protects you online
  6. scams
  7. unaothorised people access sensitive information
  8. promises of high returns too good to be true
  9. a deceptive scheme or trick
  10. security that requires two or more forms of verification
  11. a copy of digital data kept to protect against data loss or corruption
Down
  1. a website to help you to recognise, report and
  2. caller presents to be from a company needing access to your computer
  3. software is designed to cause harm
  4. improved software that replaces a previous version
  5. electronic mail
  6. a string of characters to verify the user
  7. should be included in a password
  8. relating to computers

19 Clues: scamselectronic maila common email scamrelating to computersa deceptive scheme or trickshould be included in a passwordsoftware that protects you onlinesoftware is designed to cause harma person who uses computers to steal dataa string of characters to verify the userpromises of high returns too good to be true...

Cybersecurity 2024-09-22

Cybersecurity crossword puzzle
Across
  1. The highest level of access in a computer system
  2. Security technology that uses physical characteristics like fingerprints or facial recognition
  3. A security principle that ensures data has not been altered or tampered with
  4. A security threat that originates from within an organization
  5. The process of confirming the identity of a user or device
Down
  1. A hidden method of bypassing normal authentication to gain access to a system
  2. the science of encrypting and decrypting data
  3. is a key goal of cyber security
  4. The use of investigative techniques to examine digital crimes or security breaches
  5. one of the world's largest ransomware attacks in history

10 Clues: is a key goal of cyber securitythe science of encrypting and decrypting dataThe highest level of access in a computer systemone of the world's largest ransomware attacks in historyThe process of confirming the identity of a user or deviceA security threat that originates from within an organization...

Karens July Puzzle DS&C 2017-07-11

Karens July Puzzle DS&C crossword puzzle
Across
  1. Digital Security and Verizon Cloud are also available as __________ products.
  2. Get ________ licenses and 25GB of Digital Security & Privacy for only $5.00/month.
  3. _______________ is available in 5GB, 25GB, 250GB and 1TB.
  4. Backing up data in a ______ location not only protects your files, it allows you to access them to easily share.
  5. Open the conversation by asking if a customer has ever had a data or security ______ in the past.
  6. Always lead with Multi-Device Security and Cloud Bundle __________ GB or higher.
  7. Digital Security and Cloud allows customers to manage security from one centralized _________ from their PC.
Down
  1. Existing Security & Privacy 1 PC customers can upgrade to Security & Privacy Multi-Device. True or False?
  2. Digital Security provides _________ updates with scheduled virus and spyware scans.
  3. ________________ provides anti-virus protection, firewall, anti-spam and password management for all of your computers, tablets and smartphones.
  4. Security & Privacy 1 PC license and Verizon Cloud 5GB is ________ at no charge with Verizon Fios and Business Internet connections but must be manually selected with all data purchases.
  5. 20% of cyber attacks targeting _______________ result in data loss.
  6. __________ back-up storage can be accessed by your devices, anytime, from just about anywhere.
  7. Security & Privacy Multi-Device is available for tablets and smartphones but excludes _____ iOS devices.

14 Clues: _______________ is available in 5GB, 25GB, 250GB and 1TB.20% of cyber attacks targeting _______________ result in data loss.Digital Security and Verizon Cloud are also available as __________ products.Always lead with Multi-Device Security and Cloud Bundle __________ GB or higher....

IM Vocabulary 2025-09-23

IM Vocabulary crossword puzzle
Across
  1. Integrity
  2. Asset
  3. Security
  4. Secret
Down
  1. Property
  2. Information System (MIS)
  3. Management
  4. Management

8 Clues: AssetSecretPropertySecurityIntegrityManagementManagementInformation System (MIS)

Intro To Cybersecurity 2023-09-10

Intro To Cybersecurity crossword puzzle
Across
  1. Regain information
  2. online theft to be someone else
  3. Access to the internet network device
  4. Digital currency that is decentralized
  5. Center of a attention
  6. Infected Software
  7. Codes are used to secure data.
  8. Impersonate someone else
  9. a thief
Down
  1. Mandatory
  2. safe and sound
  3. National Institute of Standards and Technology
  4. Spot something
  5. Connection without the need of physical wires
  6. Web hosting service provider
  7. Includes break or promotion
  8. External Service
  9. Wi-Fi security protocol that is strong
  10. Difficult to proceed with
  11. About electronics and the internet

20 Clues: a thiefMandatorysafe and soundSpot somethingExternal ServiceInfected SoftwareRegain informationCenter of a attentionImpersonate someone elseDifficult to proceed withIncludes break or promotionWeb hosting service providerCodes are used to secure data.online theft to be someone elseAbout electronics and the internet...

Cyber Security Awareness Month 2025-10-15

Cyber Security Awareness Month crossword puzzle
Across
  1. Scary messages claiming your computer is infected and urging you to call a number.
  2. (MFA) Extra security step (like a code or app) on top of your password.
  3. phishing done by phone call
  4. When hackers break into a company’s system and steal customer data.
  5. Simple or reused passwords are easy to crack.
  6. When scammers trick you into giving away information or access by pretending to be someone you trust.
  7. Malware that locks your files and demands money to unlock them.
  8. Fake emails or texts designed to steal passwords, money, or personal info.
  9. highly targeted phishing attack aimed at a specific person or company.
Down
  1. Fake login pages that steal your usernames and passwords.
  2. Scammers fake the “From” address in emails to look legitimate.
  3. AI-generated fake videos, voices, or images made to mislead.
  4. Attackers trick people into buying and sending gift card codes.
  5. A program that secretly watches what you do on your computer or phone.
  6. The idea of “never trust, always verify.” Even trusted systems, emails, or people can be compromised.
  7. Malicious software (viruses, spyware, trojans) that damages devices or steals data.
  8. Phishing done by text message
  9. A program that looks safe but hides malware inside.
  10. Scammers send you packages you didn’t order to make fake reviews look real.

19 Clues: phishing done by phone callPhishing done by text messageSimple or reused passwords are easy to crack.A program that looks safe but hides malware inside.Fake login pages that steal your usernames and passwords.AI-generated fake videos, voices, or images made to mislead.Scammers fake the “From” address in emails to look legitimate....

Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15

Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms crossword puzzle
Across
  1. Protection against malicious programs.
  2. Malicious cyber attackers.
  3. Data protection through cryptography.
  4. Deceptive malicious software.
  5. Network of compromised computers.
  6. Deceptive online identity theft.
  7. Covert information-gathering software.
  8. Ethical cybersecurity professionals.
  9. Attack Network flooding disruption technique.
  10. Synthetic media manipulation technique.
Down
  1. Security breach exposes data.
  2. Tools Software for secure password storage.
  3. Secret codes for data protection.
  4. Harmful computer software.
  5. Unpatched software vulnerability exploitation.
  6. Network traffic filtering safeguard.
  7. Deceptive click manipulation technique.
  8. Online harassment and intimidation.
  9. Secure remote network access.
  10. Files held hostage for payment.

20 Clues: Malicious cyber attackers.Harmful computer software.Security breach exposes data.Deceptive malicious software.Secure remote network access.Files held hostage for payment.Deceptive online identity theft.Secret codes for data protection.Network of compromised computers.Online harassment and intimidation.Network traffic filtering safeguard....

GHS Stock Market Symbol Crossword 2024-10-09

GHS Stock Market Symbol Crossword crossword puzzle
Across
  1. Cyber security Company's symbol
  2. AAPL
  3. mmm
  4. Company with 2nd largest US Market CAP
  5. WMT
  6. BA
  7. Maker of Cybertruck
  8. HD
  9. Trash Removal
  10. NKE
  11. KO
  12. V
  13. DIS
  14. "your in good hands"
  15. AXP
  16. Stay the night here
Down
  1. You can ship with these guys
  2. CAT
  3. Maker of Kenworth Trucks
  4. Formally called Facebook
  5. Take a cruise
  6. VZ
  7. Has a duck maskot
  8. HON
  9. Need energy?
  10. AMZN
  11. AZO
  12. On-line Payments
  13. SBUX
  14. Get your food delivered

30 Clues: VVZBAHDKOCATmmmWMTHONNKEAZODISAXPAAPLAMZNSBUXNeed energy?Take a cruiseTrash RemovalOn-line PaymentsHas a duck maskotMaker of CybertruckStay the night here"your in good hands"Get your food deliveredMaker of Kenworth TrucksFormally called FacebookYou can ship with these guysCyber security Company's symbolCompany with 2nd largest US Market CAP

FITCVocab.IFL 2013-05-17

FITCVocab.IFL crossword puzzle
Across
  1. A way of storing data.
  2. The act of turning out;production.
  3. Slots A connection in an computer to add more functions to the computer.
  4. A peripheral device used to point at things on a computer screen.
  5. National cyber security alliance.
  6. A computer that delivers information to other computers and networks.
Down
  1. Something that is entered.
  2. Port A widely used type of local are network.
  3. Data in a file.
  4. A network of computers that store information in a location other that where the user is working.
  5. The programs and other operating information used by an computer.
  6. Random accesses memory.
  7. Safety rules and behaviors to keep you safe and you computer.
  8. Visual display unit.

14 Clues: Data in a file.Visual display unit.A way of storing data.Random accesses memory.Something that is entered.National cyber security alliance.The act of turning out;production.Port A widely used type of local are network.Safety rules and behaviors to keep you safe and you computer....

Python 2023-03-24

Python crossword puzzle
Across
  1. online security
  2. input into the computer
  3. going out
  4. putting in
  5. fishing
Down
  1. small device with LEDS
  2. obtaining information by using persuasion
  3. information collected by apps
  4. a computer program

9 Clues: fishinggoing outputting inonline securitya computer programsmall device with LEDSinput into the computerinformation collected by appsobtaining information by using persuasion

SBI Puzzle 2024-01-29

SBI Puzzle crossword puzzle
Across
  1. The best digital market consultant
  2. Studio Moood graphic design
  3. Daj Darya creates unique art pieces
  4. Web hosting company
  5. Clever accessories for smart women
  6. Activewear clothes designer
  7. Daily Qi Gong teacher
  8. Cyber security for companies
  9. The art of embroidery
  10. Love food offers nutritional healing
Down
  1. Online decluttering sessions
  2. Online marketing and SEO
  3. Sam and Rivka Baum's winery
  4. Sun-safe swimwear for women
  5. Virtual assistants
  6. Freelance web programming
  7. Lecturer on Jewish heritage topics
  8. Hat designer
  9. ADHD coaching
  10. Worldwide tax services

20 Clues: Hat designerADHD coachingVirtual assistantsWeb hosting companyDaily Qi Gong teacherThe art of embroideryWorldwide tax servicesOnline marketing and SEOFreelance web programmingSam and Rivka Baum's winerySun-safe swimwear for womenStudio Moood graphic designActivewear clothes designerOnline decluttering sessionsCyber security for companies...

Cybersecurity Crossword Puzzle 2024-06-07

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Hint: Mends security holes.
  2. Hint: Blocks unauthorized access.
  3. Hint: Digital fingerprint.
  4. Hint: Protects data in transit.
  5. Hint: Dock for data transfer.
  6. Hint: Concealing information using codes.
  7. Hint: Echo request.
  8. Hint: Padlock for websites.
  9. Hint: Sounds like a sharp inhale.
  10. Hint: Base of a tree.
Down
  1. Hint: Neutral ground.
  2. Hint: Inbox clutter.
  3. Hint: Crawling through networks.
  4. Hint: Cyber mischief.
  5. Hint: Shields your identity.
  6. Hint: Infectious code.
  7. Hint: Minor glitch.
  8. Hint: Sounds like a fishing technique.
  9. Hint: Private internet highway.
  10. Hint: Automated program.

20 Clues: Hint: Minor glitch.Hint: Echo request.Hint: Inbox clutter.Hint: Neutral ground.Hint: Cyber mischief.Hint: Base of a tree.Hint: Infectious code.Hint: Automated program.Hint: Digital fingerprint.Hint: Mends security holes.Hint: Padlock for websites.Hint: Shields your identity.Hint: Dock for data transfer.Hint: Protects data in transit....

Information Security and CyberSecurity 2023-06-14

Information Security and CyberSecurity crossword puzzle
Across
  1. One of the common careers found in Cybersecurity and that is Cybersecurity ________.
  2. One of the words that was added in the CIA triad, The Usefulness fitness for a particular use.
  3. The CIA triad is a common model that forms the basis for the development of security systems.
  4. A security tool that monitors network traffic or system activities to identify and respond to potential unauthorized access or malicious behavior.
  5. Strategies, policies, and technologies implemented to prevent the unauthorized loss or exfiltration of sensitive or confidential data.
  6. It is a set of six elements of information security. It adds three additional attributes to the three classic security attributes of the CIA triad.
  7. The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
  8. A security tool that monitors and actively blocks or prevents malicious activities or attacks on a network or system.
  9. The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
  10. A security measure that requires users to provide two different forms of authentication, such as a password and a unique code sent to their mobile device, to access a system or account.
  11. It is the practice of safeguarding information from unauthorized access, use, or damage.
  12. Weaknesses or flaws in a system's design, implementation, or configuration that can be exploited by attackers to gain unauthorized access or compromise security.
  13. One of the three letters in the CIA Triad, and it involves making sure your data is trustworthy and free from tampering.
  14. The person who proposed the Parkerian Hexad in 1998.
  15. It is a popular Cybersecurity Company, and it delivers a high-performance network security solutions that protect your systems
  16. Cybersecurity and Information security have the same ______ security practices.
  17. It refers to the protection of computer systems, networks, and data from unauthorized access, attacks, and damage. It involves implementing measures to prevent, detect, and respond to cyber threats, such as hacking, malware, and data breaches.
Down
  1. An adverse event or occurrence that poses a risk to information security, such as a breach, unauthorized access, or system compromise.
  2. One of the words that was added in the CIA triad, The correct attribution of origin such as the authorship of an email message or the correct description of information such as a data field that is properly named.
  3. A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  4. One of the three letters in the CIA Triad, it involves data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve.
  5. One of the words that was added in the CIA triad, The ownership or control of information, as distinct from confidentiality.
  6. An attack aimed at overwhelming a system, network, or service with a flood of traffic or requests, causing it to become unavailable to legitimate users.
  7. A form of cyber attack where attackers impersonate trustworthy entities through deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
  8. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. Examples include viruses, worms, Trojans, and ransomware.
  9. A controlled process of simulating real-world attacks on a system or network to identify vulnerabilities and assess the effectiveness of security measures. ¬‿¬
  10. One of the three letters in the CIA Triad, and it involves the efforts of an organization to make sure data is kept secret or private.
  11. A documented set of guidelines, procedures, and rules that outline an organization's approach to information security, including roles and responsibilities, acceptable use policies, and incident response procedures.
  12. One of the common careers found in Information Security and that is Information Security ________.
  13. Unauthorized access, acquisition, or disclosure of sensitive or confidential information.

30 Clues: The person who proposed the Parkerian Hexad in 1998.Cybersecurity and Information security have the same ______ security practices.One of the common careers found in Cybersecurity and that is Cybersecurity ________.It is the practice of safeguarding information from unauthorized access, use, or damage....

CELA FY18 Plan 2017-05-04

CELA FY18 Plan crossword puzzle
Across
  1. source of rain and revenue
  2. plan component
  3. object of obsession
  4. what we run on
  5. economy threatening full employment
  6. kind of intelligence
  7. providing accommodation for a disability
  8. fee arrangement for OC
  9. right to control data
  10. goal of diversity and inclusion
Down
  1. business ___ compliance
  2. globally trusted technology provider
  3. government policy affecting worker mobility
  4. a transformation and a Geneva convention
  5. program meant to improve local opportunities
  6. sustainable energy source
  7. hacking security

17 Clues: plan componentwhat we run onhacking securityobject of obsessionkind of intelligenceright to control datafee arrangement for OCbusiness ___ compliancesustainable energy sourcesource of rain and revenuegoal of diversity and inclusioneconomy threatening full employmentglobally trusted technology providera transformation and a Geneva convention...

Clue Quest 2025-05-26

Clue Quest crossword puzzle
Across
  1. footprint, data left behind online
  2. area network
  3. email trick.
  4. intrusion
  5. lifting, Illegal software copying
  6. name of access point.
  7. computer in a network.
  8. for an individual person.
  9. crime, Criminal activites
Down
  1. passing of others' work
  2. harassment
  3. measure
  4. transmission speed is very fast.
  5. law, cyber law
  6. Topology,Set-up cost is low.
  7. bulk emails
  8. ethics,Rules of online behaviour
  9. infection.
  10. security,protecting data and resources.

19 Clues: measureintrusionharassmentinfection.bulk emailsarea networkemail trick.law, cyber lawname of access point.computer in a network.passing of others' workfor an individual person.crime, Criminal activitesTopology,Set-up cost is low.transmission speed is very fast.ethics,Rules of online behaviourlifting, Illegal software copying...

Cyber Security Brain Teaser 2025-05-15

Cyber Security Brain Teaser crossword puzzle
Across
  1. a person who uses computers to seal data
  2. how many characters should a strong password have
  3. a common scam where scamers impersonate loved ones
  4. a common email scam
  5. software that protects you online
  6. scams
  7. unaothorised people access sensitive information
  8. promises of high returns too good to be true
  9. a deceptive scheme or trick
  10. security that requires two or more forms of verification
  11. a copy of digital data kept to protect against data loss or corruption
Down
  1. a website to help you to recognise, report and
  2. caller presents to be from a company needing access to your computer
  3. software is designed to cause harm
  4. improved software that replaces a previous version
  5. electronic mail
  6. a string of characters to verify the user
  7. should be included in a password
  8. relating to computers

19 Clues: scamselectronic maila common email scamrelating to computersa deceptive scheme or trickshould be included in a passwordsoftware that protects you onlinesoftware is designed to cause harma person who uses computers to seal dataa string of characters to verify the userpromises of high returns too good to be true...

cyber_puzzle 2024-10-17

cyber_puzzle crossword puzzle
Across
  1. The unauthorized transfer of data from a computer, usually by a malicious actor
  2. a hacker that violates computer security for personal gain or malice
  3. The unauthorized use of someone’s computer to mine cryptocurrency
  4. cyber attack that locks users out of their computer systems until they pay a ransom
  5. a trick to gain trust
  6. cyberattack where attackers impersonate legitimate entities to trick individuals
Down
  1. the process of identifying an Identity
  2. a tool developed to take advantage of a security flaw
  3. a security hazard
  4. a security mechanism against suspicious code

10 Clues: a security hazarda trick to gain trustthe process of identifying an Identitya security mechanism against suspicious codea tool developed to take advantage of a security flawThe unauthorized use of someone’s computer to mine cryptocurrencya hacker that violates computer security for personal gain or malice...

Revision crossword 2021-01-30

Revision crossword crossword puzzle
Across
  1. state where the US Cyber Command is based
  2. group of terrorists devising something bad
  3. money demanded by criminals
  4. city where NATO is headquartered
  5. a criminal
  6. process of agreeing on the terms of something
  7. affected by malicious software
Down
  1. city where the Collective Security Treaty was signed in 1992
  2. software used to disrupt the work of your computer
  3. a Texas-based IT company whose software was used to conduct recent cyber-attack on the USA
  4. the state of being ordered to stay in so as to avoid a virus
  5. a mission to the Moon scheduled for 2021
  6. a sprint-like event for programmers

13 Clues: a criminalmoney demanded by criminalsaffected by malicious softwarecity where NATO is headquartereda sprint-like event for programmersa mission to the Moon scheduled for 2021state where the US Cyber Command is basedgroup of terrorists devising something badprocess of agreeing on the terms of something...

Security Networks .__. 2019-05-16

Security Networks .__. crossword puzzle
Across
  1. -you analyse it
  2. - security online and on devices
  3. - share resources
  4. -how to find someones house
  5. -internet protocol
Down
  1. -resilience against potential harm
  2. -to make something authentic
  3. -resilience against potential harm

8 Clues: -you analyse it- share resources-internet protocol-how to find someones house-to make something authentic- security online and on devices-resilience against potential harm-resilience against potential harm

Cyber Security Brain Teaser 2025-05-15

Cyber Security Brain Teaser crossword puzzle
Across
  1. a person who uses computers to steal data
  2. how many characters should a strong password have
  3. a common scam where scamers impersonate loved ones
  4. a common email scam
  5. software that protects you online
  6. scams
  7. unaothorised people access sensitive information
  8. promises of high returns too good to be true
  9. a deceptive scheme or trick
  10. security that requires two or more forms of verification
  11. a copy of digital data kept to protect against data loss or corruption
Down
  1. a website to help you to recognise, report and
  2. caller presents to be from a company needing access to your computer
  3. software is designed to cause harm
  4. improved software that replaces a previous version
  5. electronic mail
  6. a string of characters to verify the user
  7. should be included in a password
  8. relating to computers

19 Clues: scamselectronic maila common email scamrelating to computersa deceptive scheme or trickshould be included in a passwordsoftware that protects you onlinesoftware is designed to cause harma person who uses computers to steal dataa string of characters to verify the userpromises of high returns too good to be true...

Privacy Summit 2025 2025-01-06

Privacy Summit 2025 crossword puzzle
Across
  1. Federal law governing information security management
  2. Hide one's IP address
  3. Unique code or number assigned to an individual
  4. Government watching
  5. Personal info stored online
  6. Cybersecurity sequence
  7. Measures to prevent hacking
  8. Threat of hacking or online attack or Reason to use strong passwords
  9. Code for secure messaging
  10. Alert to potential threat
  11. Not for public view
  12. Secure online account
Down
  1. Requirement of FOIA
  2. Secret information
  3. Method of identification using fingerprints or High-tech way to unlock your phone
  4. Protected from hacking
  5. Nameless online user
  6. Conceal online activity
  7. Personal info to be guarded
  8. Unauthorized access
  9. Right to keep info secret
  10. Shield from identity theft
  11. Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
  12. Document or file containing personal data

24 Clues: Secret informationRequirement of FOIAGovernment watchingUnauthorized accessNot for public viewNameless online userHide one's IP addressSecure online accountProtected from hackingCybersecurity sequenceConceal online activityRight to keep info secretCode for secure messagingAlert to potential threatShield from identity theft...

Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11

Cybersecurity Awareness Crossword Puzzle Week 2 crossword puzzle
Across
  1. A bot-challenging security feature for online interactions.
  2. Code to fix or enhance software.
  3. Captures keystrokes to gather sensitive information.
  4. Security solution to analyze and detect threats in real-time from diverse data and events.
  5. Collaboration integrating security, automation, and shared responsibility in software development.
  6. Harmful software for gathering information without consent.
  7. A stealthy malware granting unauthorized system access while concealing actions.
  8. Network of devices used for malware distribution, and cyber-attacks.
Down
  1. Email attachments from unknown senders.
  2. A way to bypass authentication, used for unauthorized access or malicious intent.
  3. The most common word used for brute force.
  4. Safeguard sensitive files and communications.
  5. Isolated environment to analyze software behavior.
  6. A U.S. federal agency promoting cybersecurity standards and innovation.

14 Clues: Code to fix or enhance software.Email attachments from unknown senders.The most common word used for brute force.Safeguard sensitive files and communications.Isolated environment to analyze software behavior.Captures keystrokes to gather sensitive information.A bot-challenging security feature for online interactions....

Computer Ethics and Security 2017-04-19

Computer Ethics and Security crossword puzzle
Across
  1. / Program that copies itself repeatedly
  2. / Type of cyber criminal
  3. / Trademark
  4. / Damage files and system software
  5. / Malicious code spread through network
  6. / Fast temporary storage
  7. / Network security system
  8. / Raw information
  9. / Safeguard against information theft
  10. / The code of acceptable behavior users should follow while on the internet .
  11. / Online crime
  12. / Protect against malicious code infection
  13. / Artistic
  14. / Patent
  15. / Decrease hardware performance and sometimes damage data
Down
  1. / Patent to be granted
  2. / Protector used to protect against electrical power variation
  3. / A small text file that web server stores on your computer
  4. / Physical access control
  5. / Exploitation of a vulnerability in DNS server software
  6. / Duplicate files and programs
  7. / Lock laptop
  8. / Cryptography
  9. / Monitor that is better than CRT
  10. / Process of identifying an individual
  11. / System failure
  12. / A scam using email to get personal info
  13. / Unauthorized software
  14. / Intruder attempts to gain unauthorized access to user's system or information by pretending to be user
  15. / Example of cryptography software

30 Clues: / Patent/ Artistic/ Trademark/ Lock laptop/ Cryptography/ Online crime/ System failure/ Raw information/ Patent to be granted/ Unauthorized software/ Type of cyber criminal/ Fast temporary storage/ Physical access control/ Network security system/ Duplicate files and programs/ Monitor that is better than CRT/ Damage files and system software...

Cybersecurity Awareness Puzzle 2023-09-29

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A type of cyberattack in which an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access.
  2. A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.
  3. Malicious software designed to harm or gain unauthorized access to computer systems, including viruses, Trojans, and ransomware.
  4. A form of cyberattack in which attackers impersonate trusted entities to trick individuals into disclosing sensitive information or taking malicious actions.
  5. The world's greatest Flamingo
  6. Unauthorized interception and monitoring of network communications, typically for the purpose of gathering sensitive information.
  7. The potential for financial loss, reputation damage, or other adverse consequences resulting from cybersecurity threats,
  8. A decoy system or network intentionally set up to attract and deceive cyber attackers, allowing security professionals to observe and study their activities.
  9. A vulnerability or software flaw that is unknown to the software vendor and therefore has no available fix or patch, making it highly exploitable.
  10. A part of the internet that is intentionally hidden and only accessible using special software, where users can browse anonymously and engage in activities that often include illegal or illicit transactions.
  11. A software update or fix released by vendors to address security vulnerabilities and improve the functionality or stability of a program or system.
  12. Social ___ is when individuals manipulate or deceive others, often using psychological tactics, to gain unauthorized access to information, systems, or physical spaces or to influence their actions for malicious purposes.
  13. is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing
Down
  1. Contact the ___ ___ if you suspect malicious activity on your computer.
  2. The process of converting data into a secure, unreadable format to protect it from unauthorized access or interception.
  3. Malicious software that can replicate itself and infect other computer files, often causing harm by altering, corrupting, or deleting data and compromising the affected computer's operation.
  4. Malicious software that encrypts a victim's files or system and demands a ransom payment in exchange for the decryption key.
  5. Report Suspicious emails with the ___ ___ ___
  6. A secret combination of characters, typically known only to the authorized user
  7. A secure network connection that encrypts data traffic between a user's device and a remote server, providing privacy and anonymity, especially on public networks.
  8. A cyber crime that uses the phone to steal personal confidential information
  9. A network of interconnected physical devices, such as smart appliances and sensors, that can collect and exchange data over the internet.
  10. A malicious cyber tactic that attempts to distribute malware through online advertisements.
  11. Practicing cyber ___ is when you consistently follow best practices and take proactive measures to protect your digital devices, personal information, and online activities from cybersecurity threats and vulnerabilities.
  12. Software designed to detect, prevent, and remove computer viruses and other malware from a computer or network.
  13. Email ___ makes it seem that an email is coming from a legitimate or trusted source when, in reality, it may be sent by malicious actors with malicious intent.

26 Clues: The world's greatest FlamingoReport Suspicious emails with the ___ ___ ___Contact the ___ ___ if you suspect malicious activity on your computer.A cyber crime that uses the phone to steal personal confidential informationA secret combination of characters, typically known only to the authorized user...

Solutions Outreach Crossword 2024-05-16

Solutions Outreach Crossword crossword puzzle
Across
  1. ___ service is performed to review an organization's security vulnerabilities across application & infrastructure layers (4 characters)
  2. ______ is the model used for text generation using Natural Language Processing (NLP) (3 characters)
  3. _____ solution provides implementation services for ServiceNow, Archer etc taking regulatory risks into consideration (4 characters)
  4. This service line is notable for its solutions including ISTRA and has UIDAI among its list of clients (4 characters)
  5. Business focused framework by ISACA that defines a set of processes for the management of IT (5 characters)
  6. ___ technology is an advanced form of business automation involving robotics (3 characters)
  7. ___team monitors security incidents 24/7 (3 characters)
  8. ___ is a solution used for the validation of computer systems in the pharma industry (3 characters)
Down
  1. _____ is the solution for assisting clients to evaluate risks arising from vendors, suppliers and contractors (4 characters)
  2. _____ Service Line focuses on Intelligent Automation and visualization using analytical tools such as PowerBI (10 characters)
  3. ______ is the ISO standard that governs AI (8 characters)
  4. This SL provides services such as IoT security assessments and red team assessments (4 characters)
  5. Framework developed by Cyber Strategy & Governance based on a combination of standards such as NIST CSF, ISO and COBIT, to assess the organisation’s cyber maturity. (3 characters)

13 Clues: ___team monitors security incidents 24/7 (3 characters)______ is the ISO standard that governs AI (8 characters)___ technology is an advanced form of business automation involving robotics (3 characters)This SL provides services such as IoT security assessments and red team assessments (4 characters)...

E BLOCK TECH Michael Rizza 2013-05-16

E BLOCK TECH Michael Rizza crossword puzzle
Across
  1. a little bit more memory then a byte
  2. Geting increased in you group
  3. the hardware that is in you keyboard
  4. the way you arrange your file
  5. The lowest storage unit
  6. how you act online
  7. The ability of putting something into something else
  8. a more advanced search engine
  9. Without wires
  10. Your sybol for you company
  11. National Cyber Security Alliance
  12. wired internet
  13. Copying someone elses item
  14. Screen
  15. A typed document
  16. an oath that the president has to say
  17. The ability of taking something out of something else
  18. Liquid crystal display
  19. Photo file
  20. zoomable online presitation program
  21. A typed document of your skills
Down
  1. Claiming something yours
  2. memory storage
  3. your saying for your company
  4. the act of being secure online
  5. the heart of the computer
  6. Wireless Internet
  7. Security online
  8. How you edit your format
  9. Display Unit
  10. a small box that shows you how your document looks
  11. A searching website
  12. Random memory
  13. comcast
  14. what font,text size,bold,etc.
  15. Internet
  16. Largest unit of data
  17. TB
  18. the wiring in your computer
  19. A piece of folded paper that advertises something
  20. the theme you pick for you document
  21. to startup something
  22. a file that stores music
  23. Operating system
  24. A peripheral that controls your mouse

45 Clues: TBScreencomcastInternetPhoto fileDisplay UnitRandom memoryWithout wiresmemory storagewired internetSecurity onlineA typed documentOperating systemWireless Internethow you act onlineA searching websiteLargest unit of datato startup somethingLiquid crystal displayThe lowest storage unitClaiming something yoursHow you edit your format...

Technology 2025-11-21

Technology crossword puzzle
Across
  1. Largest Unit of Storage
  2. Install New Version
  3. Clickable Website
  4. Smaller Unit of Storage
  5. Cyber security system
  6. Unit of Storage
  7. Bigger screen than Computer
  8. Where you search things up
  9. Dangerous Thing on Device
Down
  1. Drive 50 Gigabytes of Storage Space, Mr. Lubin recommends we use it
  2. Brain of the Computer
  3. Physical Part of Computer
  4. Massive Network
  5. Pointing Device
  6. Large but not largest unit of storage
  7. Protects you from a virus
  8. Type words
  9. Device you Carry
  10. Connects you to the Internet

19 Clues: Type wordsMassive NetworkPointing DeviceUnit of StorageDevice you CarryClickable WebsiteInstall New VersionBrain of the ComputerCyber security systemLargest Unit of StorageSmaller Unit of StoragePhysical Part of ComputerProtects you from a virusDangerous Thing on DeviceWhere you search things upBigger screen than Computer...

Auston's crossword puzzle 2021-01-29

Auston's crossword puzzle crossword puzzle
Across
  1. the real world
  2. info about you
  3. when someone steal someones identity
  4. making safe choices
  5. everything you do on the internet
  6. know where good info is held
Down
  1. the cyber world
  2. to stop someone from talking to you
  3. a group of people
  4. keeping your passwords safe
  5. private stuff about you
  6. protection your info

12 Clues: the real worldinfo about youthe cyber worlda group of peoplemaking safe choicesprotection your infoprivate stuff about youkeeping your passwords safeknow where good info is heldeverything you do on the internetto stop someone from talking to youwhen someone steal someones identity

How One Guy Became the Office’s Last Line of Defense 2024-09-11

How One Guy Became the Office’s Last Line of Defense crossword puzzle
Across
  1. Cyber criminals.
  2. Today's hero.
  3. Stops unauthorized access.
  4. Act of notifying suspicious activity.
  5. Group of interconnected computers.
Down
  1. Primary phishing tool.
  2. Program that runs on a computer.
  3. Deceptive email tactic.
  4. Measures to protect data.
  5. Notification of potential threat.

10 Clues: Today's hero.Cyber criminals.Primary phishing tool.Deceptive email tactic.Measures to protect data.Stops unauthorized access.Program that runs on a computer.Notification of potential threat.Group of interconnected computers.Act of notifying suspicious activity.

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Man's best friend
  3. Steals data and holds it for ransom
  4. Has a trunk
  5. Flying mammal
Down
  1. Large marsupial
  2. What are we here for?
  3. What is my name?

8 Clues: Has a trunkFlying mammalLarge marsupialWhat is my name?Man's best friendLikes to chase miceWhat are we here for?Steals data and holds it for ransom

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. Most common social engineering technique
  2. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  3. SMS+phishing
  4. The knowledge
  5. The one who hacks
Down
  1. Common word for frauds
  2. Your secret key to online accounts
  3. The malicious software is called

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

Cyber Security 2022-05-11

Cyber Security crossword puzzle
Across
  1. An individual who uses computer, networking or other skills to gain unauthorized access to data.
  2. A ransomware cryptoworm attack in 2017, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.
  3. A situation in which something becomes greater or more serious
  4. An attack that stops users accessing their data until a price is paid.
Down
  1. Counterattack
  2. Sufficient to cause death.
  3. An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.
  4. A malicious computer worm that targets supervisory control and data acquisition systems and is the first known cyber-weapon.

8 Clues: CounterattackSufficient to cause death.A situation in which something becomes greater or more seriousAn attack that stops users accessing their data until a price is paid.An individual who uses computer, networking or other skills to gain unauthorized access to data....

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

Cyber Security 2023-02-10

Cyber Security crossword puzzle
Across
  1. should be banned.
  2. is bad
  3. online is bad.
  4. should be reported.
Down
  1. are suppose to be private.
  2. should be private.
  3. rules should be followed to be safe.
  4. should be safe.

8 Clues: is badonline is bad.should be safe.should be banned.should be private.should be reported.are suppose to be private.rules should be followed to be safe.

Cyber security 2023-04-21

Cyber security crossword puzzle
Across
  1. protect (a network or system) from unauthorized access with a firewall.
  2. data information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
  3. facts provided or learned about something or someone.
  4. self-replicating malware that duplicates itself to spread to uninfected computers.
  5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. facts and statistics collected together for reference or analysis.
  3. a type of malicious software designed to block access to a computer system until a sum of money is paid.

8 Clues: facts provided or learned about something or someone.facts and statistics collected together for reference or analysis.protect (a network or system) from unauthorized access with a firewall.self-replicating malware that duplicates itself to spread to uninfected computers....

Cyber Security 2022-12-18

Cyber Security crossword puzzle
Across
  1. A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
  2. A threat that originates from outside an organization's network.
  3. A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
  4. A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
  2. A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
  3. The process of protecting computers, networks, and data from unauthorized access or attacks.
  4. Intending or likely to cause harm or mischief.

8 Clues: Intending or likely to cause harm or mischief.A threat that originates from outside an organization's network.The process of protecting computers, networks, and data from unauthorized access or attacks.A barrier that controls incoming and outgoing network traffic based on predetermined security rules....

Cyber Security 2025-02-04

Cyber Security crossword puzzle
Across
  1. A strong one includes letters, numbers, and symbols. (8 letters)
  2. A program that protects your device from malware. (8 letters)
  3. Unwanted emails, often trying to scam you. (4 letters)
  4. A fake website that steals your information. (8 letters)
  5. A person who gains unauthorized access to data. (6 letters)
Down
  1. Software designed to harm your computer. (7 letters)
  2. Theft A crime where personal information is stolen online. (9 letters)
  3. Keeping your software up-to-date helps with this. (8 letters)

8 Clues: Software designed to harm your computer. (7 letters)Unwanted emails, often trying to scam you. (4 letters)A fake website that steals your information. (8 letters)A person who gains unauthorized access to data. (6 letters)A program that protects your device from malware. (8 letters)Keeping your software up-to-date helps with this. (8 letters)...

Crossword Puzzle 2024-01-12

Crossword Puzzle crossword puzzle
Across
  1. Science and Technology
  2. the closest star
  3. a pig friends with a spider
  4. Both human and machine
  5. opposite of blue
Down
  1. a shooting star
  2. fifth planet
  3. handheld computer
  4. Security
  5. What do you feed seals?
  6. clap along if you feel like a room without a roof because I'm _ _ _ _ _
  7. elephant with big ears
  8. pilots you body
  9. 60+% of you body is made of this
  10. ink pencil

15 Clues: Securityink pencilfifth planeta shooting starpilots you bodythe closest staropposite of bluehandheld computerelephant with big earsScience and TechnologyBoth human and machineWhat do you feed seals?a pig friends with a spider60+% of you body is made of thisclap along if you feel like a room without a roof because I'm _ _ _ _ _

Browsing safely 2025-05-19

Browsing safely crossword puzzle
Across
  1. crime, cyber criminal, virus,
  2. spoofing , cyberbullying,
  3. frauds, cyber security, antivirus,
Down
  1. , cyber terrorism , digital footprint
  2. , phishing, hacking,identity theft,

5 Clues: spoofing , cyberbullying,crime, cyber criminal, virus,frauds, cyber security, antivirus,, phishing, hacking,identity theft,, cyber terrorism , digital footprint

Cyber Security Day 2021 2021-11-11

Cyber Security Day 2021 crossword puzzle
Across
  1. Avoid ____ or free wifi
  2. Who's the target for cyber criminals?
  3. ____________ made OT systems vulnerable
Down
  1. Always use a ________ password
  2. Cyber security is _________'s responsibility
  3. Never, ever trust this type of wifi
  4. Automation means that ____ footage can be leaked

7 Clues: Avoid ____ or free wifiAlways use a ________ passwordNever, ever trust this type of wifiWho's the target for cyber criminals?____________ made OT systems vulnerableCyber security is _________'s responsibilityAutomation means that ____ footage can be leaked

Cyber security risks 2017-07-13

Cyber security risks crossword puzzle
Across
  1. this is a software to design to detect and destroy computer viruses
  2. a person who uses computers to gain unauthorized access to data
  3. a network of social interactions and personal relationships
  4. the action of keeping your device safe
  5. this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
  1. a piece of code which is capable of copying itself and can corrupts the system or destroying data
  2. this is a software that threatens to delete your data for a specific amount of money
  3. a person who gains unauthorised access to computer files or networks in order to further social or political ends
  4. fraudulent practice of sending emails pretending to be from reputable companies
  5. convert information or data into a code especially to prevent unauthorised access
  6. a computer program that records every keystroke made by a computer user
  7. a secret word or phrase that must be used to gain admission to a place

12 Clues: the action of keeping your device safea network of social interactions and personal relationshipsa person who uses computers to gain unauthorized access to datathis is a software to design to detect and destroy computer virusesa secret word or phrase that must be used to gain admission to a place...

Cyber Security Crossword 2024-01-16

Cyber Security Crossword crossword puzzle
Across
  1. A malicious program that infects computers without user knowledge or permission.
  2. Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
  3. Malicious party attacking a company.
  4. A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
  5. attack that affects availability of a resource.
  6. A botnet is a network of private computers infected with malicious software.
Down
  1. Secret expression required to gain access to a computing system.
  2. Attack type.
  3. Excessive push notifications leading to unwanted response.
  4. authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
  5. Data Leakage due to well-crafted AI prompt.
  6. Firewall type that protects Web-based Applications.

12 Clues: Attack type.Malicious party attacking a company.Data Leakage due to well-crafted AI prompt.attack that affects availability of a resource.Firewall type that protects Web-based Applications.Excessive push notifications leading to unwanted response.Secret expression required to gain access to a computing system....

Cyber security crossword 2023-09-11

Cyber security crossword crossword puzzle
Across
  1. password
  2. ads
  3. vulnerabilities
  4. authentication
  5. Layer Security
  6. Keys Identified Mail
Down
  1. Message Authentication,Reporting & Conformance
  2. Sender Policy Framework
  3. your data
  4. Response
  5. Vulnerability
  6. compliance

12 Clues: adspasswordResponseyour datacomplianceVulnerabilityauthenticationLayer SecurityvulnerabilitiesKeys Identified MailSender Policy FrameworkMessage Authentication,Reporting & Conformance

CSAW 2025 2025-03-14

CSAW 2025 crossword puzzle
Across
  1. A set of instructions written in a programming language that a computer can understand and execute.
  2. Unwanted or unsolicited digital communication, often sent in bulk.
  3. Software that automatically displays or downloads advertising material.
  4. Virtual A service that encrypts your internet connection for privacy.
  5. State A country that engages in cyber activities, often for strategic, political, or economic purposes
  6. Software that enables unauthorized access to a computer while hiding its presence.
  7. A person who uses computers to gain unauthorized access to data.
  8. The mailbox you can send all your SETA inquiries to.
Down
  1. A type of synthetic media where an image, video, or audio recording is manipulated using artificial intelligence (AI).
  2. A secret word or phrase used to gain access to a computer system.
  3. A network of infected computers controlled by a hacker.
  4. Trust A security model that assumes no user or device is trusted by default.
  5. The frequency of which you must take Cyber Security Awareness Training
  6. A type of malware that disguises itself as a legitimate software.
  7. Unauthorized access or compromise of a system, network, or data
  8. Software that secretly monitors and collects information about users.

16 Clues: The mailbox you can send all your SETA inquiries to.A network of infected computers controlled by a hacker.Unauthorized access or compromise of a system, network, or dataA person who uses computers to gain unauthorized access to data.A secret word or phrase used to gain access to a computer system....

Cyber Security 2020-03-03

Cyber Security crossword puzzle
Across
  1. also called an ID
  2. a system of symbols such as letters and numbers to hide a meaning
  3. someone who secretly accesses your information
  4. uses clever advertisements to trick you into giving away information
Down
  1. copying a file such as a photo, video or game
  2. sneak into your computer to cause damage
  3. software that takes over a computer and kidnaps data
  4. a method of changing a method to conceal its meaning

8 Clues: also called an IDsneak into your computer to cause damagecopying a file such as a photo, video or gamesomeone who secretly accesses your informationsoftware that takes over a computer and kidnaps dataa method of changing a method to conceal its meaninga system of symbols such as letters and numbers to hide a meaning...

Cyber Security 2021-02-12

Cyber Security crossword puzzle
Across
  1. are able to exploit vulnerabilities in the a computers operating system or a networks hardware
  2. A word that people use to tell them that no one else knows
  3. or devices.
  4. Gathers information about how you use your computer
Down
  1. Short for malicious software, that gains access to your computer or device
  2. A set of secret characters, that only you know, to keep your private information secure.
  3. A malicious form of self replicating
  4. Someone that tries to gain access to your person

8 Clues: or devices.A malicious form of self replicatingSomeone that tries to gain access to your personGathers information about how you use your computerA word that people use to tell them that no one else knowsShort for malicious software, that gains access to your computer or device...

Cyber Security 2023-09-26

Cyber Security crossword puzzle
Across
  1. malware that changes or destroys information and is passed on to other systems
  2. a type of internet fraud that seeks to acquire a user's information by deception
  3. intelligence of machines
  4. malicious software
Down
  1. keeps intruders out digitally
  2. a group of applications that instruct a computer to carry out a task
  3. someone who attempts to gain unauthorized access
  4. unsolicited emails

8 Clues: unsolicited emailsmalicious softwareintelligence of machineskeeps intruders out digitallysomeone who attempts to gain unauthorized accessa group of applications that instruct a computer to carry out a taskmalware that changes or destroys information and is passed on to other systems...

Cyber Security 2024-11-28

Cyber Security crossword puzzle
Across
  1. Avoid creating _______ passwords
  2. Never click on a ________from an untrusted source
  3. Regularly update your ________ system
  4. Never write down your __________
Down
  1. Use _________ software
  2. Perform regular ________ of important data
  3. _________select the "Remember My Password
  4. Never give out your password to _____________

8 Clues: Use _________ softwareAvoid creating _______ passwordsNever write down your __________Regularly update your ________ system_________select the "Remember My PasswordPerform regular ________ of important dataNever give out your password to _____________Never click on a ________from an untrusted source

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

Cyber Security 2022-02-13

Cyber Security crossword puzzle
Across
  1. attack in which the victim receives an email disguised to look as if it has come from a reputable source
  2. hackers who use tools downloaded from the internet
  3. created when that data has been processed and becomes meaningful
  4. set of methods used by cybercriminals to deceive individuals into handing over information
Down
  1. involves the attacker watching the victim while they provide sensitive information
  2. Gaining unauthorised access to or control of a computer system
  3. raw facts and figures
  4. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money

8 Clues: raw facts and figureshackers who use tools downloaded from the internetGaining unauthorised access to or control of a computer systemcreated when that data has been processed and becomes meaningfulinvolves the attacker watching the victim while they provide sensitive information...

Cyber Security! 2023-01-04

Cyber Security! crossword puzzle
Across
  1. What most people use to login to their phone
  2. Another thing you can use to lock your phone
  3. A person who tries to hack systems to learn how to make them stronger
  4. You enter your email and _____ to login to things
Down
  1. Software or apps used to store passwords
  2. A stronger version of a password
  3. When a hacker tries to steal information through email
  4. A person who tries to steal your data or money digitally

8 Clues: A stronger version of a passwordSoftware or apps used to store passwordsWhat most people use to login to their phoneAnother thing you can use to lock your phoneYou enter your email and _____ to login to thingsWhen a hacker tries to steal information through emailA person who tries to steal your data or money digitally...

Cybersecurity Crossword 2023-01-26

Cybersecurity Crossword crossword puzzle
Across
  1. altered video to spread disinformation
  2. unique string that identifies device
  3. helps protect system
  4. malware that transmits private data
  5. helps prevent unauthorized network access
  6. flood website/server until crash
  7. codes that protect data
  8. cybersecurity professionals
  9. designs data communications network
Down
  1. unauthorized access to sensitive info
  2. software designed to disrupt system
  3. plans and implements security
  4. remote encrypted network access
  5. helps prevent unauthorized access
  6. criminal hackers
  7. requests payment to unlock
  8. malware hidden inside legitimate file
  9. mimics legitimate websites/emails
  10. network of computers used for cyber attacks

19 Clues: criminal hackershelps protect systemcodes that protect datarequests payment to unlockcybersecurity professionalsplans and implements securityremote encrypted network accessflood website/server until crashhelps prevent unauthorized accessmimics legitimate websites/emailssoftware designed to disrupt systemmalware that transmits private data...

Cyber Security 2021-02-12

Cyber Security crossword puzzle
Across
  1. are able to exploit vulnerabilities in the a computers operating system or a networks hardware
  2. A word that people use to tell them that no one else knows
  3. or devices.
  4. Gathers information about how you use your computer
Down
  1. Short for malicious software, that gains access to your computer or device
  2. A set of secret characters, that only you know, to keep your private information secure.
  3. A malicious form of self replicating
  4. Someone that tries to gain access to your person

8 Clues: or devices.A malicious form of self replicatingSomeone that tries to gain access to your personGathers information about how you use your computerA word that people use to tell them that no one else knowsShort for malicious software, that gains access to your computer or device...

Cyber Security 2020-08-21

Cyber Security crossword puzzle
Across
  1. Programa para encontrar y eliminar cualquier virus que quiera entrar a tu computadora
  2. es para evitar accesos no autorizados.
Down
  1. Estafa, a travez de internet, de datos personales del usuario
  2. son archivos de algunas paginas web que guardan información sobre ti
  3. cualquier tipo de software que se infiltra a computadora sin que vos sepas y tienen diferentes objetivos
  4. Correo electrónico no deseado.
  5. son programas informáticos que quieren roper tu computador el su sistema.
  6. Persona que intenta entrar a tu ordenador

8 Clues: Correo electrónico no deseado.es para evitar accesos no autorizados.Persona que intenta entrar a tu ordenadorEstafa, a travez de internet, de datos personales del usuarioson archivos de algunas paginas web que guardan información sobre tison programas informáticos que quieren roper tu computador el su sistema....

cyber security 2020-11-04

cyber security crossword puzzle
Across
  1. to allow access
  2. main user
  3. to make sure its you
  4. cant go under limit
  5. user limit
Down
  1. idk a clue tbh
  2. all access
  3. account

8 Clues: accountmain userall accessuser limitidk a clue tbhto allow accesscant go under limitto make sure its you

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. The malicious software is called
  2. The one who hacks
  3. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  4. Most common social engineering technique
Down
  1. Common word for frauds
  2. The knowledge
  3. SMS+phishing
  4. Your secret key to online accounts

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

CYBER-SECURITY 2018-07-12

CYBER-SECURITY crossword puzzle
Across
  1. a process to attempt to gain unauthorised access
  2. site
  3. a type of malware that prevents you from using your computer encryptions
  4. warfare
Down
  1. often a string of characters used for user authentication/access
  2. a type of software that replicates itself by changing other programs
  3. a field of protection used to protect you and your data
  4. a type of malware that is often disguised as legitimate software

8 Clues: sitewarfarea process to attempt to gain unauthorised accessa field of protection used to protect you and your dataoften a string of characters used for user authentication/accessa type of malware that is often disguised as legitimate softwarea type of software that replicates itself by changing other programs...

CYBER-SECURITY 2018-07-12

CYBER-SECURITY crossword puzzle
Across
  1. a string of characters to secure any data
  2. someone who uses a computer to illegally access other computers or networks to show that they want a say
  3. a field of protection used to protect you or your data
Down
  1. a process that attempts to gain unauthorised access
  2. a type of malware that prevents you from using your computer files unless you pay a ransom
  3. site
  4. warfare
  5. a type of malware that is often disguised as legitimate software

8 Clues: sitewarfarea string of characters to secure any dataa process that attempts to gain unauthorised accessa field of protection used to protect you or your dataa type of malware that is often disguised as legitimate softwarea type of malware that prevents you from using your computer files unless you pay a ransom...

Cyber-Security 2019-11-08

Cyber-Security crossword puzzle
Across
  1. Garden Tool
  2. Fake news
  3. Online posts
  4. Pictures shared
Down
  1. Tweet Tweet
  2. TMI
  3. Fake Vine
  4. Boo

8 Clues: TMIBooFake VineFake newsTweet TweetGarden ToolOnline postsPictures shared

Cyber Security 2024-01-26

Cyber Security crossword puzzle
Across
  1. false information spread in order to deceive people
  2. the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
  3. cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
  1. an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
  2. the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
  3. behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
  4. warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
  5. the discovering of secrets, especially political or military information of another country or the industrial information of a business

8 Clues: false information spread in order to deceive peoplecataclysm resulting from a large-scale sabotage of all computerized networks, systems and activitiesan academic, non-binding study on how international law applies to cyber conflicts and cyber warfare....

CYBER SECURITY 2024-04-11

CYBER SECURITY crossword puzzle
Across
  1. You need a strong one to protect your accounts. (8 letters)
  2. Don't be this kind of "fish" that scammers look for. (5 letters)
  3. This should be unique and not easy to guess for each of your accounts. (8 letters)
  4. This keeps your computer safe from viruses. (9 letters)
Down
  1. A safe way to explore the internet is to stay within these boundaries. (5 letters)
  2. Someone who writes code to harm computers or steal data. (6 letters)
  3. What kind of information should you keep private online? (8 letters)
  4. This person can help you if you have trouble with your computer at school. (5 letters)

8 Clues: This keeps your computer safe from viruses. (9 letters)You need a strong one to protect your accounts. (8 letters)Don't be this kind of "fish" that scammers look for. (5 letters)Someone who writes code to harm computers or steal data. (6 letters)What kind of information should you keep private online? (8 letters)...

Cyber Security 2023-07-11

Cyber Security crossword puzzle
Across
  1. Another word for malware, named after diseases
  2. Malware that demands payment
  3. A way to encode files
  4. A way to decode files
Down
  1. Software that blocks incoming malware
  2. Malware that disguises itself as something else
  3. Another word for malware, named after an animal
  4. Pretending to be someone to steal information

8 Clues: A way to encode filesA way to decode filesMalware that demands paymentSoftware that blocks incoming malwarePretending to be someone to steal informationAnother word for malware, named after diseasesMalware that disguises itself as something elseAnother word for malware, named after an animal

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

cyber security 2022-11-28

cyber security crossword puzzle
Across
  1. - distributed denial of service.
  2. - a type of computer programme that modifys other computer programmes with its own code.
  3. - someone from the inside of a company who threatens to expose the passwords for the company.
  4. -once an email or message has been clicked the ransomer has all of your data and threatens to publish all of your data unless you pay a large sum of money.
Down
  1. - when someone just keeps on guessing a password or username until they get it right.
  2. - malicious software designed to harm.
  3. -a subset of the trojan horse malware that can clone itself again and again.
  4. -sending someone a random email with a link in that you want them to click.

8 Clues: - distributed denial of service.- malicious software designed to harm.-sending someone a random email with a link in that you want them to click.-a subset of the trojan horse malware that can clone itself again and again.- when someone just keeps on guessing a password or username until they get it right....

Cyber Security 2022-10-12

Cyber Security crossword puzzle
Across
  1. The type of engineering which targets "bugs in the human hardware"
  2. The process by which an individual’s access to accounts and data is reviewed on a routine basis.
  3. Complete this phrase "Where to Store, What to _____"
  4. What you are if you complete this crossword by the end of the week.
Down
  1. A small file placed on a computer by a website assigning a unique ID to the device
  2. Permission entitled to an individual allowing them to use a system or view data.
  3. Recently published CHS notice relating to how CHS handles employees personal data.
  4. CHS approved Password Manager.

8 Clues: CHS approved Password Manager.Complete this phrase "Where to Store, What to _____"The type of engineering which targets "bugs in the human hardware"What you are if you complete this crossword by the end of the week.Permission entitled to an individual allowing them to use a system or view data....

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

Laurea Davi 2025-09-18

Laurea Davi crossword puzzle
Across
  1. Cyber
  2. Venezia→
  3. Il tuo Vero spitrito guida
  4. 3 vs Computer science
  5. Prossima fermata
  6. non si è unit* a te (non è A.L.)
  7. La tua presenza è garantita
  8. Alcuni dicono che non sia un vero lavoro
  9. Anniversario Taverna (gg/mes)
Down
  1. Nome caccia
  2. Da ottobre a marzo non può mai mancare
  3. Un arte per pochi
  4. Mamma
  5. non si possono cambiare le proprie origini
  6. seconda casa
  7. Un lupo che si traveste da...
  8. ha rifiutato ma non e la Alessia Lazzaro
  9. sai già che non cambierà mai
  10. Danger

19 Clues: CyberMammaDangerVenezia→Nome cacciaseconda casaProssima fermataUn arte per pochi3 vs Computer scienceIl tuo Vero spitrito guidaLa tua presenza è garantitasai già che non cambierà maiUn lupo che si traveste da...Anniversario Taverna (gg/mes)non si è unit* a te (non è A.L.)Da ottobre a marzo non può mai mancareha rifiutato ma non e la Alessia Lazzaro...

Year 8 Cyber security 2022-10-12

Year 8 Cyber security crossword puzzle
Across
  1. gathers information about you
  2. program that replicates itself
  3. transforming encrypted code to original format
  4. code which is designed to cause damage
  5. spying on the user to get personal info
  6. throws adverts on your screen
  7. social engineering to steal user information
  8. obtaining something by persuasion
  9. cyber attack intended to redirect web traffic
  10. mislead users of its true intention
Down
  1. simulated cyber attack
  2. use of internet based social media
  3. the code that transforms an encrypted message
  4. replace plain text with cipher text
  5. gaining unauthorised access to data or system
  6. malicious activities through humans
  7. malicious code designed to cause damage to device
  8. converting messages into secret code

18 Clues: simulated cyber attackgathers information about youthrows adverts on your screenprogram that replicates itselfobtaining something by persuasionuse of internet based social mediareplace plain text with cipher textmalicious activities through humansmislead users of its true intentionconverting messages into secret code...

History 2022-07-29

History crossword puzzle
Across
  1. In 2014, the Cyber Security Operations Centre evolved to the next stage of Australia's cyber security capability.
  2. In 2018, ASD became independent as recommendations from the unclassified version of the 2017 Independent Intelligence Review was implemented.
  3. In 1988, the government decided that DSD should move to Defence headquarters at Russell Offices in this city, to facilitate a closer relationship with Defence.
  4. Established in Melbourne on 1 April 1947. Its role was to exploit foreign communications and be responsible for communications security in the armed services and government departments.
  5. DSD relocated from its temporary accommodation in Albert Park to a new purpose-built facility in this historic Melbourne location.
  6. In 2019, the Prime Minister announced the new Director-General of ASD.
Down
  1. in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security.
  2. Renamed as a result of an inquiry and made directly responsible to the Secretary of the Department of Defence.
  3. The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.
  4. in 1986, DSD acquired Australia's first supercomputer.
  5. Australian, American and British personnel worked together in this agency in Melbourne, attached to General MacArthur's headquarters.

11 Clues: in 1986, DSD acquired Australia's first supercomputer.In 2019, the Prime Minister announced the new Director-General of ASD.The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security....

Cyber Security Awareness 2018-06-05

Cyber Security Awareness crossword puzzle
Across
  1. Be careful connecting to public _____.
  2. is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
  3. unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
  4. shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
  5. What month is National Cyber Security Awareness Month?
  6. True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
  1. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
  2. techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  3. a secret word or expression used by authorized persons to prove their right to access, information, etc.
  4. when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
  5. type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
  6. is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user

12 Clues: Be careful connecting to public _____.What month is National Cyber Security Awareness Month?True/False: Call I.T. Service desk right away when you suspect a phishing emailtechniques of protecting computers, networks, programs and data from unauthorized access or attacks...

Cyber Security Crossword 2021-09-26

Cyber Security Crossword crossword puzzle
Across
  1. Malicious computer program (not to be confused with Corona)
  2. A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
  3. A type of malicious software that locks your files until you pay up
  4. Unwanted but not malicious emails
  5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  6. Short name for MALicious softWARE
  7. Sending a fake email to try and personal or sensitive information
Down
  1. The creators of our anime cybersecurity traing videos
  2. A type of malware that functions by spying on user activity without their knowledge
  3. Secret word or phrase used to gain access to a system (the longer the better)
  4. The name of the cybersecurity drama series (no space)
  5. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.

12 Clues: Unwanted but not malicious emailsShort name for MALicious softWAREThe creators of our anime cybersecurity traing videosThe name of the cybersecurity drama series (no space)Malicious computer program (not to be confused with Corona)Sending a fake email to try and personal or sensitive information...

Cyber security 2020-08-21

Cyber security crossword puzzle
Across
  1. Es una estafa para poder obtener tus datos privados.
  2. software que busca información y después la trasmite sin tu conocimiento.
  3. Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.
  4. Programas informáticos con el objetivo de alterar el funcionamiento de tu computadora y infectar archivos.
  5. Correo electrónico que no solicitaste ni desates e igual recibiste.
Down
  1. Archivos de un sitio web que se guardan en tu computadora y guardan información sobre voz.
  2. Sistema que evita el acceso no autorizado a una red privada.
  3. Programa informático que detecta y elimina los virus y otros programas perjudiciales.

8 Clues: Es una estafa para poder obtener tus datos privados.Sistema que evita el acceso no autorizado a una red privada.Correo electrónico que no solicitaste ni desates e igual recibiste.Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.software que busca información y después la trasmite sin tu conocimiento....

Cyber security 2020-03-03

Cyber security crossword puzzle
Across
  1. a method of changing a message to conceal its meaning
  2. software takes over a computer and kudnaps data
  3. also called an ID
  4. a system of symbols such as letters and numbers to hide a meaning
Down
  1. someone who secretly gets access to our information
  2. sneaks into your computer to cause damage
  3. what uses clever advertisements to trick you into giving away information
  4. copying a file such as a photo, video or game

8 Clues: also called an IDsneaks into your computer to cause damagecopying a file such as a photo, video or gamesoftware takes over a computer and kudnaps datasomeone who secretly gets access to our informationa method of changing a message to conceal its meaninga system of symbols such as letters and numbers to hide a meaning...

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. Most common social engineering technique
  2. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  3. SMS+phishing
  4. The knowledge
  5. The one who hacks
Down
  1. Common word for frauds
  2. Your secret key to online accounts
  3. The malicious software is called

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.​
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data​
  3. someone who seeks and exploits weaknesses in a computer system or computer network.​
  4. written errors in someone's code or program.​
Down
  1. If lots of infected systems combine to form a network it is called botnet.​
  2. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker. ​
  3. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.​
  4. Unlike a computer virus, it does not need to attach itself to an existing program.

8 Clues: written errors in someone's code or program.​If lots of infected systems combine to form a network it is called botnet.​Unlike a computer virus, it does not need to attach itself to an existing program.someone who seeks and exploits weaknesses in a computer system or computer network.​...

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. someone sends a fake website to you
  2. type of malicious code or software that looks legitimate but can take control of your computer
  3. to a malicious program that replicates itself, automatically spreading through a network.
  4. looking over someone shoulder to obtain info
Down
  1. hacks your computer
  2. analysis of people's unique physical identity
  3. something to protect your computer
  4. a person trying to steal personal information

8 Clues: hacks your computersomething to protect your computersomeone sends a fake website to youlooking over someone shoulder to obtain infoanalysis of people's unique physical identitya person trying to steal personal informationto a malicious program that replicates itself, automatically spreading through a network....

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. facts provided or learned about something or someone
  2. information about a person
  3. person who uses computers to gain unauthorized access to data.
  4. inadvertently doing other than what should have been done; a slip, lapse or mistake
Down
  1. looking over someone's shoulder
  2. an attack where people are asked to input data
  3. use of deception to manipulate individuals
  4. raw facts or figures

8 Clues: raw facts or figuresinformation about a personlooking over someone's shoulderuse of deception to manipulate individualsan attack where people are asked to input datafacts provided or learned about something or someoneperson who uses computers to gain unauthorized access to data....