cyber security Crossword Puzzles
Cyber Security Awareness Month 2021-10-08
Across
- Results in the loss of contact details if it were stolen
- What does cybersecurity have in common with Halloween?
- _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
- What you will cause IT to have if you get a virus on your computer
- Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
- Hackers ____ their identity.
- This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
- A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
- What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
- This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
- You don't want to be the business with the most _____ network on the block.
- These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
- How your computer might act once infected by a virus.
- Happens on Halloween night
- If you click on a phishing email you might want to ____ your job
- For hackers, it’s all about the _____ and it’s their treat they succeed
- These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
- A bridge between two computer networks.
- In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
- The process of translating plaintext into ciphertext.
20 Clues: Happens on Halloween night • Hackers ____ their identity. • A bridge between two computer networks. • How your computer might act once infected by a virus. • The process of translating plaintext into ciphertext. • What does cybersecurity have in common with Halloween? • Results in the loss of contact details if it were stolen • ...
Ryne Cyber Security Puzzle 2023-09-11
Across
- Digital Signal on emails to confirm identities
- Information
- Protects you from third party claims, based on liability
- Concealing data is called
- Tells servers what to do when getting an email using your business domain, but looks suspicious
- Malware that requires a payment to remove
- Weaknesses in an information system
- Malware disguising as official businesses to ask users for sensitive information
Down
- Something that protects and gives safety
- Protects data for yours, employees and customers' data
- Typical scheme or fraud
- Motherboards, Keyboard, Mouse are examples of what?
- Verifying the identity of a user
- Two electronic devices that interconnect with one another to exchange data
- A phase that users must know to gain access to something
- Google chrome, Safari, Microsoft Edge are examples of what?
- No wires attached
- Malicious software
- Tells other servers which servers are allowed to send emails using your business domain name
- National Institute of Standards and Technology
20 Clues: Information • No wires attached • Malicious software • Typical scheme or fraud • Concealing data is called • Verifying the identity of a user • Weaknesses in an information system • Something that protects and gives safety • Malware that requires a payment to remove • Digital Signal on emails to confirm identities • National Institute of Standards and Technology • ...
chapter 3 cyber security 2023-10-25
Across
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- using reconnaissance to phish someone
- phishing but on messeges
- going threw your trash
- is any software intentionally designed to cause disruption to a computer
- following someone
- emails that are annoying
- phishing but on call
- fraud
- persuades the user to take a specific action based on fear
- a software that records what you type on your keyboard
- looking over your shoulder and gathers info like that
- the flash and shockwave plugins from adobe enable the development of cartoons
- a means of bypassing an organization's existing security systems.
- when hackers hack you and hold it until you give them what you want
- software that enables a criminal to obtain info about a users computer
- malicious program that uses a trigger to awaken the malicious cod
- a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
- can propagate or self-replicate from one computer to another without human activation
- following someone but its not piggybacking
- use emails, messege, or other social media to try and gather informastion on you
- impersonating a legitimate website
- overwelming the network
- completely non technical means for a criminal to gather info
- displays annoying pop-ups to generate revenue for its authors
- when an attacker calls a person and lies to them to gain privlages
- programs that claim to perform one function but actually do another, typically malicious
- a computer attack that tries to exploit software vulnerability that are unkown
- intercepting communications between computers to steal information
- keeping your system up to date
- an act intended to deceive or trick
- a program designed to detect and remove viruses
- phishing highpowered people
- an impersonation attack
- similar to eavesdropping
35 Clues: fraud • following someone • phishing but on call • going threw your trash • overwelming the network • an impersonation attack • phishing but on messeges • emails that are annoying • similar to eavesdropping • phishing highpowered people • keeping your system up to date • impersonating a legitimate website • an act intended to deceive or trick • using reconnaissance to phish someone • ...
Cyber Security Awareness Month 2024-10-04
Across
- A security vulnerability that is unknown to the vendor and has not been patched.
- Control Security techniques that regulate who or what can view or use resources in a computing environment.
- Software designed to harm or exploit any programmable device or network.
- A network security device that monitors and controls incoming and outgoing network traffic.
- An attack that overwhelms a system with traffic from multiple sources, causing service disruption.
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- The process of converting information into code to prevent unauthorized access.
- A weakness in a system that can be exploited to compromise its security.
- Any potential danger to information or systems.
Down
- A type of spyware that records keystrokes to capture sensitive information.
- The practice of collecting and analyzing digital evidence after a cybersecurity incident.
- Software that secretly monitors user activity and collects information.
- Engineering Manipulating people into divulging confidential information through deceptive means.
- Breach An incident where unauthorized access to sensitive data occurs.
- The process of verifying the identity of a user or device.
- A type of malware that locks or encrypts a user's files, demanding a ransom for access.
- A software update designed to fix vulnerabilities or bugs.
- An event that has an adverse effect on the security of an information system.
- A protocol for establishing a secure connection between a web server and a browser.
- A network of infected devices controlled by a hacker to perform automated tasks.
20 Clues: Any potential danger to information or systems. • The process of verifying the identity of a user or device. • A software update designed to fix vulnerabilities or bugs. • Breach An incident where unauthorized access to sensitive data occurs. • Software that secretly monitors user activity and collects information. • ...
Cyber Security CIS 120 2025-08-22
Across
- software fix
- pretend to be you
- deliberately mislead
- captures key strokes
- body part authentication
- attacker motivated by belief
- bullying on technology
- sell cyber content for fraud
- cause ideological panic
- software designed to protect you
- cannot use until fee is paid
Down
- practices to stay safe online
- pretends to be another program
- trick user for information
- personally identifiable information
- malicious software use
- person who creates cybersecurity
- code to entrance
- copy into another program
- data collection results in advertisements
20 Clues: software fix • code to entrance • pretend to be you • deliberately mislead • captures key strokes • malicious software use • bullying on technology • cause ideological panic • body part authentication • copy into another program • trick user for information • attacker motivated by belief • sell cyber content for fraud • cannot use until fee is paid • practices to stay safe online • ...
CIS120-Cyber Security Puzzle 2025-08-25
Across
- Stands for malicious & software
- falsifying identity.
- using body parts to access.
- a process a user has permission to.
- a program designed to copy itself into another program.
- strongly motivated by their own principles and beliefs.
- 2 types malware and social engineering.
- a +10 password.
Down
- protects your software.
- cause disruption and panic.
- a fix for software
- selling their knowledge of software vulnerabilities.
- an ever growing digital world.
- user must pay fee to restore
- sending or sharing negative or false info on the web.
- protects you from attackers.
- password or general.
- cyber related attacks for financial gain.
- serves as a key to unlock devices or open accts.
- a -(1) - (-10) password.
20 Clues: a +10 password. • a fix for software • falsifying identity. • password or general. • protects your software. • a -(1) - (-10) password. • cause disruption and panic. • using body parts to access. • user must pay fee to restore • protects you from attackers. • an ever growing digital world. • Stands for malicious & software • a process a user has permission to. • ...
cis212-in-seat-review-w4 2019-10-20
Across
- A logical computer network of zombies.
- Isolated environment use to test potential malware.
- Computer most closely resembles a desktop computer
- Technique to diminish risk level
- The necessary steps to protect a person or property from harm
- Only allows what in on this list.
- The first step in the Cyber Kill Chain
- Addresses general vulnerability
- Where web-based computers store its user files.
- Eliminating as many security risks as possible
- Addresses specific customer situation
- System use to collect attackers techniques
- Rules of conduct and communication
Down
- Microsoft transport protocol
- Another name for Add-on
- Purchasing security products from different vendors
- Unauthorized access through a Bluetooth connection
- Captures and store keystrokes
- Validating individuals credentials
- Enforces the location in which an app can function
- Managing and presenting by function without physical layout or location.
- A set of rules for how Microsoft Windows applications share information
- A large system with many capabilities.
- Designated to analysis network packets
- Impersonating another computer of device
25 Clues: Another name for Add-on • Microsoft transport protocol • Captures and store keystrokes • Addresses general vulnerability • Technique to diminish risk level • Only allows what in on this list. • Validating individuals credentials • Rules of conduct and communication • Addresses specific customer situation • A logical computer network of zombies. • ...
Test 31-03-2023 2023-03-31
Across
- Protocol Used to configure network devices to communicate on an IP network
- Provides encrypted connection over the internet from a device to a network
- Designed to continuously monitor a large number of areas for water leaks throughout a building
- A solution that helps organisations detect, analyze and respond to security threats before they harm business operations
- Evidence validated/reviewed for ensuring effectiveness of implemented control.
- Email Authentication protocol that provides domain level protection of the email channel
- Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
Down
- A document prepared for capturing controls implemented for meetina contractual requirement
- Translates human readable domain names to machine readable IP addresses
- It runs your code on high availability compute infrastructure and performs all the administration of your compute resources
- Group of experts responsible for the protection against detection of and response to an organisation's security incidents
- Continuously monitors end user devices to detect and respond to cyber threats
- Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
- Document for capturing all the contractual security requirements
- A system which warns people when smoke, fire, carbon monoxide or other fire related emergencies are detected
15 Clues: Document for capturing all the contractual security requirements • Translates human readable domain names to machine readable IP addresses • Protocol Used to configure network devices to communicate on an IP network • Provides encrypted connection over the internet from a device to a network • ...
Engineering/Cyber Security/Computer Science 2020-10-27
Across
- a type of software
- someone who analyzes things
- looks up stuff
- protection
- like a boss
- consumer of services
- help available when a problem arises
- tries things out
Down
- someone who develops
- information
- being of technology
- culture of computers and technology
- physical properties of something
- the equipment needed for this career cluster
- going through a series of steps
- a profession within many fields
16 Clues: protection • information • like a boss • looks up stuff • tries things out • a type of software • being of technology • someone who develops • consumer of services • someone who analyzes things • going through a series of steps • a profession within many fields • physical properties of something • culture of computers and technology • help available when a problem arises • ...
Cyber Security Threads 2024-10-01
Across
- An attack that floods a network with excessive traffic, disrupting services
- Ensures that data is accurate and has not been tampered with
- Falsifying data to deceive systems or users
- The ability of a system to recover quickly from disruptions or attacks
- Ensures that systems are accessible and functional when needed
Down
- Ensures that information is accessible only to those authorized to access it
- The process of converting information into a secret code
- A model that describes the stages of a cyberattack ( 2 words )
- A weakness in a system that can be exploited by attackers
- A type of malware disguised as legitimate software
- A potential danger or harmful event in cybersecurity
- A security system that monitors and controls network traffic
- An attempt to exploit a system or network
13 Clues: An attempt to exploit a system or network • Falsifying data to deceive systems or users • A type of malware disguised as legitimate software • A potential danger or harmful event in cybersecurity • The process of converting information into a secret code • A weakness in a system that can be exploited by attackers • ...
Cyber Security Crossword 2022-05-04
Across
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
- Social engineering where an attacker sends a fraudulent message designed to trick an end user.
- Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
- A regulation in EU law on data protection and privacy.
- A computer program used to prevent, detect, and remove malware.
- Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
- Technology that extends a private network across a public network
Down
- The process of giving someone permission to do or have something.
- A method that uses trial and error to crack passwords, login credentials, and encryption keys.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Facebook, twitter, instagram, etc. (two words)
- Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.
- The collection and analysis of data gathered from open sources to produce actionable intelligence.
13 Clues: Facebook, twitter, instagram, etc. (two words) • A regulation in EU law on data protection and privacy. • A computer program used to prevent, detect, and remove malware. • The process of giving someone permission to do or have something. • Technology that extends a private network across a public network • ...
Cyber Christmas Security 2025-12-19
Across
- A holiday cold that spreads from one toy-making elf to another.
- When the Grinch demands payment so you can get back the toys he took from you.
- "Open Sesame" or "Ho Ho Ho" might be the secret phrase required to enter the Santa's hidden workshop.
- Like getting a bunch of fruitcakes you never asked for.
- A quick fix for a hole in a Christmas stocking.
- You just found coal in your Christmas stocking and now it's all over your hands and clothes.
- Santa's naughty and nice list is magical - only he can read it.
- A secret entrance into the workshop that bypasses the main security elf.
Down
- A shiny present left under the tree that looks like a new toy but secretly contains a naughty spy camera.
- This digital "chimney" keeps the Grinch out while letting Santa’s approved traffic in.
- The process of using a special "Christmas Magic" to reveal the hidden message in a letter to Santa.
- A deceptive email disguised as a "Track Santa's Sleigh" link, hoping you'll give away your workshop password.
- Santa's uses a high-tech fingerprint scanner to unlock his sleigh.
13 Clues: A quick fix for a hole in a Christmas stocking. • Like getting a bunch of fruitcakes you never asked for. • A holiday cold that spreads from one toy-making elf to another. • Santa's naughty and nice list is magical - only he can read it. • Santa's uses a high-tech fingerprint scanner to unlock his sleigh. • ...
Edgescan Cybersecurity Crossword 2025-02-20
Across
- Attempt to breach security
- Verifying user identity
- Malware that encrypts files and demands payment
- Deceptive emails trying to steal information
- Relating to computers and networks
- Potential danger to a system
- Checking for vulnerabilities
- Self-replicating malicious code
- Person attempting unauthorized access
- Software update to fix vulnerabilities
- Taking advantage of a vulnerability
- Security event that may indicate a breach
- Review of security controls
- Information stored on a system
- Attack that disrupts service availability
- Restoring data after a loss
- Malware disguised as legitimate software
- Connected computers and devices
- Weakness that can be exploited
- Unsolicited bulk email
Down
- Copy of data for recovery
- Simulated attack to find weaknesses
- Ensuring systems are accessible
- Ensuring data accuracy
- Unauthorized access to data
- Software that hides malware on a system
- Scrambling data to make it unreadable
- Programs that run on a computer
- Software that secretly monitors user activity
- Keeping information secret
- Protecting systems and data
- Secret word for access
- Protecting personal information
- Measures to prevent attacks
- Network of infected computers
- Network security system controlling traffic
- Safeguard from harm
- Malicious software designed to harm systems
- Potential for loss or damage
39 Clues: Safeguard from harm • Ensuring data accuracy • Secret word for access • Unsolicited bulk email • Verifying user identity • Copy of data for recovery • Attempt to breach security • Keeping information secret • Unauthorized access to data • Protecting systems and data • Review of security controls • Measures to prevent attacks • Restoring data after a loss • Potential danger to a system • ...
Cyber Security Crossword 2022-05-05
Across
- The collection and analysis of data gathered from open sources to produce actionable intelligence.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
- Social engineering where an attacker sends a fraudulent message designed to trick an end user.
- A method that uses trial and error to crack passwords, login credentials, and encryption keys.
- Technology that extends a private network across a public network
Down
- Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
- The process of giving someone permission to do or have something.
- Facebook, twitter, instagram, etc. (two words)
- A computer program used to prevent, detect, and remove malware.
- A regulation in EU law on data protection and privacy.
- Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
- Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.
13 Clues: Facebook, twitter, instagram, etc. (two words) • A regulation in EU law on data protection and privacy. • A computer program used to prevent, detect, and remove malware. • The process of giving someone permission to do or have something. • Technology that extends a private network across a public network • ...
Cyber Security Crossword 2025-06-16
Across
- what you want your passwords and accounts to be
- an email scam containing a link to a lookalike site
- unwanted emails or messages, often annoying or fake
- a person who tries to break into computers or accounts
- a way to secure data when sending it online
- short for malicious software - harms or spies on your computer
Down
- what you do when you enter a username and password to use a site
- the name you choose to log into an account
- a bad program that can damage your computer or steal data
- always do this when you finish using an account on a shared computer
- using a strong one will make it harder for people to access your account
- protects a computer by blocking dangerous websites or connections
- a trick to steal your money or personal information online
13 Clues: the name you choose to log into an account • a way to secure data when sending it online • what you want your passwords and accounts to be • an email scam containing a link to a lookalike site • unwanted emails or messages, often annoying or fake • a person who tries to break into computers or accounts • a bad program that can damage your computer or steal data • ...
School Work 2025-01-24
Information Management 2025-09-23
Cyber Security Basics 2021-09-30
Across
- The UK's primary data protection law
- A hacker that is not ethical nor intentionally malicious
- someone who uses the internet to commit crimes
- malware that looks like a legitimate program
- a name for a hacker that acts maliciously
Down
- The most common form of social engineering commonly done through email
- Malware that is used to collect data and show ads to a user
- a hacker that hacks not to gain money or cause damage but to help improve security
- A type of malware that encrypts data and demands a fee
- The European Unions data protection law introduced in 2018
- the word for staying safe on the internet
- The UK's law against hacking
- A type of software that is used in malicious ways
13 Clues: The UK's law against hacking • The UK's primary data protection law • the word for staying safe on the internet • a name for a hacker that acts maliciously • malware that looks like a legitimate program • someone who uses the internet to commit crimes • A type of software that is used in malicious ways • A type of malware that encrypts data and demands a fee • ...
Cybersecurity Awareness R5 2025-06-21
Across
- Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
- method or code used to take advantage of that weakness
- A method transforming the original data into an unreadable format.
- Unauthorized access to confidential or sensitive data.
- System that prevents unauthorized access to or from a private network.
- Converting data into a secure format to prevent unauthorized access.
- A network of compromised computers controlled by attackers to launch cyber attacks.
Down
- Weakness in a system that can be exploited by threats.
- A malware that encrypts data and demands payment for decryption.
- A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
- Software update designed to fix security vulnerabilities
- A phishing attack that uses text messages to trick individual into divulging personal information.
- A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
- Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
- One of the frontline services of the DICT that ensures secure data Transactions.
- Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.
16 Clues: Weakness in a system that can be exploited by threats. • method or code used to take advantage of that weakness • Unauthorized access to confidential or sensitive data. • Software update designed to fix security vulnerabilities • A malware that encrypts data and demands payment for decryption. • A method transforming the original data into an unreadable format. • ...
cse 2025-04-23
CYBERSECURITY TOOLS AND TECHNIQUES 2025-01-03
Across
- A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
- Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
- A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
- Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
- Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
- A system that monitors network or system activities for signs of malicious activities or policy violations.
- Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
- Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
- Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
- A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.
10 Clues: Software designed to detect, prevent, and remove malicious software (malware) from a computer system. • A system that monitors network or system activities for signs of malicious activities or policy violations. • Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers. • ...
Zscaler Crossword puzzle 2023-07-17
Across
- (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
- Software update that fixes security vulnerabilities or improves the functionality of a program.
- (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
- Weakness or flaw in a system that can be exploited by attackers.
- Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
- Secret combination of characters used to authenticate and gain access to a system or account.
- Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
- Software designed to detect, prevent, and remove malicious software from a computer system.
- Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
- Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
- Manipulation of individuals to gain unauthorized access or sensitive information.
- Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
- Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- Creates a connection over a public network, allowing users to access private networks remotely.
- Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
- Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
- Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
- Acts as a barrier between a trusted internal network and an untrusted external network.
- Converts data into a format that can only be read or accessed with the correct decryption key.
- Broad term for malicious software designed to harm or exploit computer systems.
- Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
- Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
- Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.
23 Clues: Weakness or flaw in a system that can be exploited by attackers. • Broad term for malicious software designed to harm or exploit computer systems. • Manipulation of individuals to gain unauthorized access or sensitive information. • Acts as a barrier between a trusted internal network and an untrusted external network. • ...
Cyber Security Brain Teaser 2025-05-15
Across
- a person who uses computers to steal data
- how many characters should a strong password have
- a common scam where scamers impersonate loved ones
- a common email scam
- software that protects you online
- scams
- unaothorised people access sensitive information
- promises of high returns too good to be true
- a deceptive scheme or trick
- security that requires two or more forms of verification
- a copy of digital data kept to protect against data loss or corruption
Down
- a website to help you to recognise, report and
- caller presents to be from a company needing access to your computer
- software is designed to cause harm
- improved software that replaces a previous version
- electronic mail
- a string of characters to verify the user
- should be included in a password
- relating to computers
19 Clues: scams • electronic mail • a common email scam • relating to computers • a deceptive scheme or trick • should be included in a password • software that protects you online • software is designed to cause harm • a person who uses computers to steal data • a string of characters to verify the user • promises of high returns too good to be true • ...
Cybersecurity 2024-09-22
Across
- The highest level of access in a computer system
- Security technology that uses physical characteristics like fingerprints or facial recognition
- A security principle that ensures data has not been altered or tampered with
- A security threat that originates from within an organization
- The process of confirming the identity of a user or device
Down
- A hidden method of bypassing normal authentication to gain access to a system
- the science of encrypting and decrypting data
- is a key goal of cyber security
- The use of investigative techniques to examine digital crimes or security breaches
- one of the world's largest ransomware attacks in history
10 Clues: is a key goal of cyber security • the science of encrypting and decrypting data • The highest level of access in a computer system • one of the world's largest ransomware attacks in history • The process of confirming the identity of a user or device • A security threat that originates from within an organization • ...
Karens July Puzzle DS&C 2017-07-11
Across
- Digital Security and Verizon Cloud are also available as __________ products.
- Get ________ licenses and 25GB of Digital Security & Privacy for only $5.00/month.
- _______________ is available in 5GB, 25GB, 250GB and 1TB.
- Backing up data in a ______ location not only protects your files, it allows you to access them to easily share.
- Open the conversation by asking if a customer has ever had a data or security ______ in the past.
- Always lead with Multi-Device Security and Cloud Bundle __________ GB or higher.
- Digital Security and Cloud allows customers to manage security from one centralized _________ from their PC.
Down
- Existing Security & Privacy 1 PC customers can upgrade to Security & Privacy Multi-Device. True or False?
- Digital Security provides _________ updates with scheduled virus and spyware scans.
- ________________ provides anti-virus protection, firewall, anti-spam and password management for all of your computers, tablets and smartphones.
- Security & Privacy 1 PC license and Verizon Cloud 5GB is ________ at no charge with Verizon Fios and Business Internet connections but must be manually selected with all data purchases.
- 20% of cyber attacks targeting _______________ result in data loss.
- __________ back-up storage can be accessed by your devices, anytime, from just about anywhere.
- Security & Privacy Multi-Device is available for tablets and smartphones but excludes _____ iOS devices.
14 Clues: _______________ is available in 5GB, 25GB, 250GB and 1TB. • 20% of cyber attacks targeting _______________ result in data loss. • Digital Security and Verizon Cloud are also available as __________ products. • Always lead with Multi-Device Security and Cloud Bundle __________ GB or higher. • ...
IM Vocabulary 2025-09-23
Intro To Cybersecurity 2023-09-10
Across
- Regain information
- online theft to be someone else
- Access to the internet network device
- Digital currency that is decentralized
- Center of a attention
- Infected Software
- Codes are used to secure data.
- Impersonate someone else
- a thief
Down
- Mandatory
- safe and sound
- National Institute of Standards and Technology
- Spot something
- Connection without the need of physical wires
- Web hosting service provider
- Includes break or promotion
- External Service
- Wi-Fi security protocol that is strong
- Difficult to proceed with
- About electronics and the internet
20 Clues: a thief • Mandatory • safe and sound • Spot something • External Service • Infected Software • Regain information • Center of a attention • Impersonate someone else • Difficult to proceed with • Includes break or promotion • Web hosting service provider • Codes are used to secure data. • online theft to be someone else • About electronics and the internet • ...
Cyber Security Awareness Month 2025-10-15
Across
- Scary messages claiming your computer is infected and urging you to call a number.
- (MFA) Extra security step (like a code or app) on top of your password.
- phishing done by phone call
- When hackers break into a company’s system and steal customer data.
- Simple or reused passwords are easy to crack.
- When scammers trick you into giving away information or access by pretending to be someone you trust.
- Malware that locks your files and demands money to unlock them.
- Fake emails or texts designed to steal passwords, money, or personal info.
- highly targeted phishing attack aimed at a specific person or company.
Down
- Fake login pages that steal your usernames and passwords.
- Scammers fake the “From” address in emails to look legitimate.
- AI-generated fake videos, voices, or images made to mislead.
- Attackers trick people into buying and sending gift card codes.
- A program that secretly watches what you do on your computer or phone.
- The idea of “never trust, always verify.” Even trusted systems, emails, or people can be compromised.
- Malicious software (viruses, spyware, trojans) that damages devices or steals data.
- Phishing done by text message
- A program that looks safe but hides malware inside.
- Scammers send you packages you didn’t order to make fake reviews look real.
19 Clues: phishing done by phone call • Phishing done by text message • Simple or reused passwords are easy to crack. • A program that looks safe but hides malware inside. • Fake login pages that steal your usernames and passwords. • AI-generated fake videos, voices, or images made to mislead. • Scammers fake the “From” address in emails to look legitimate. • ...
Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15
Across
- Protection against malicious programs.
- Malicious cyber attackers.
- Data protection through cryptography.
- Deceptive malicious software.
- Network of compromised computers.
- Deceptive online identity theft.
- Covert information-gathering software.
- Ethical cybersecurity professionals.
- Attack Network flooding disruption technique.
- Synthetic media manipulation technique.
Down
- Security breach exposes data.
- Tools Software for secure password storage.
- Secret codes for data protection.
- Harmful computer software.
- Unpatched software vulnerability exploitation.
- Network traffic filtering safeguard.
- Deceptive click manipulation technique.
- Online harassment and intimidation.
- Secure remote network access.
- Files held hostage for payment.
20 Clues: Malicious cyber attackers. • Harmful computer software. • Security breach exposes data. • Deceptive malicious software. • Secure remote network access. • Files held hostage for payment. • Deceptive online identity theft. • Secret codes for data protection. • Network of compromised computers. • Online harassment and intimidation. • Network traffic filtering safeguard. • ...
GHS Stock Market Symbol Crossword 2024-10-09
Across
- Cyber security Company's symbol
- AAPL
- mmm
- Company with 2nd largest US Market CAP
- WMT
- BA
- Maker of Cybertruck
- HD
- Trash Removal
- NKE
- KO
- V
- DIS
- "your in good hands"
- AXP
- Stay the night here
Down
- You can ship with these guys
- CAT
- Maker of Kenworth Trucks
- Formally called Facebook
- Take a cruise
- VZ
- Has a duck maskot
- HON
- Need energy?
- AMZN
- AZO
- On-line Payments
- SBUX
- Get your food delivered
30 Clues: V • VZ • BA • HD • KO • CAT • mmm • WMT • HON • NKE • AZO • DIS • AXP • AAPL • AMZN • SBUX • Need energy? • Take a cruise • Trash Removal • On-line Payments • Has a duck maskot • Maker of Cybertruck • Stay the night here • "your in good hands" • Get your food delivered • Maker of Kenworth Trucks • Formally called Facebook • You can ship with these guys • Cyber security Company's symbol • Company with 2nd largest US Market CAP
FITCVocab.IFL 2013-05-17
Across
- A way of storing data.
- The act of turning out;production.
- Slots A connection in an computer to add more functions to the computer.
- A peripheral device used to point at things on a computer screen.
- National cyber security alliance.
- A computer that delivers information to other computers and networks.
Down
- Something that is entered.
- Port A widely used type of local are network.
- Data in a file.
- A network of computers that store information in a location other that where the user is working.
- The programs and other operating information used by an computer.
- Random accesses memory.
- Safety rules and behaviors to keep you safe and you computer.
- Visual display unit.
14 Clues: Data in a file. • Visual display unit. • A way of storing data. • Random accesses memory. • Something that is entered. • National cyber security alliance. • The act of turning out;production. • Port A widely used type of local are network. • Safety rules and behaviors to keep you safe and you computer. • ...
Python 2023-03-24
9 Clues: fishing • going out • putting in • online security • a computer program • small device with LEDS • input into the computer • information collected by apps • obtaining information by using persuasion
SBI Puzzle 2024-01-29
Across
- The best digital market consultant
- Studio Moood graphic design
- Daj Darya creates unique art pieces
- Web hosting company
- Clever accessories for smart women
- Activewear clothes designer
- Daily Qi Gong teacher
- Cyber security for companies
- The art of embroidery
- Love food offers nutritional healing
Down
- Online decluttering sessions
- Online marketing and SEO
- Sam and Rivka Baum's winery
- Sun-safe swimwear for women
- Virtual assistants
- Freelance web programming
- Lecturer on Jewish heritage topics
- Hat designer
- ADHD coaching
- Worldwide tax services
20 Clues: Hat designer • ADHD coaching • Virtual assistants • Web hosting company • Daily Qi Gong teacher • The art of embroidery • Worldwide tax services • Online marketing and SEO • Freelance web programming • Sam and Rivka Baum's winery • Sun-safe swimwear for women • Studio Moood graphic design • Activewear clothes designer • Online decluttering sessions • Cyber security for companies • ...
Cybersecurity Crossword Puzzle 2024-06-07
Across
- Hint: Mends security holes.
- Hint: Blocks unauthorized access.
- Hint: Digital fingerprint.
- Hint: Protects data in transit.
- Hint: Dock for data transfer.
- Hint: Concealing information using codes.
- Hint: Echo request.
- Hint: Padlock for websites.
- Hint: Sounds like a sharp inhale.
- Hint: Base of a tree.
Down
- Hint: Neutral ground.
- Hint: Inbox clutter.
- Hint: Crawling through networks.
- Hint: Cyber mischief.
- Hint: Shields your identity.
- Hint: Infectious code.
- Hint: Minor glitch.
- Hint: Sounds like a fishing technique.
- Hint: Private internet highway.
- Hint: Automated program.
20 Clues: Hint: Minor glitch. • Hint: Echo request. • Hint: Inbox clutter. • Hint: Neutral ground. • Hint: Cyber mischief. • Hint: Base of a tree. • Hint: Infectious code. • Hint: Automated program. • Hint: Digital fingerprint. • Hint: Mends security holes. • Hint: Padlock for websites. • Hint: Shields your identity. • Hint: Dock for data transfer. • Hint: Protects data in transit. • ...
Information Security and CyberSecurity 2023-06-14
Across
- One of the common careers found in Cybersecurity and that is Cybersecurity ________.
- One of the words that was added in the CIA triad, The Usefulness fitness for a particular use.
- The CIA triad is a common model that forms the basis for the development of security systems.
- A security tool that monitors network traffic or system activities to identify and respond to potential unauthorized access or malicious behavior.
- Strategies, policies, and technologies implemented to prevent the unauthorized loss or exfiltration of sensitive or confidential data.
- It is a set of six elements of information security. It adds three additional attributes to the three classic security attributes of the CIA triad.
- The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- A security tool that monitors and actively blocks or prevents malicious activities or attacks on a network or system.
- The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- A security measure that requires users to provide two different forms of authentication, such as a password and a unique code sent to their mobile device, to access a system or account.
- It is the practice of safeguarding information from unauthorized access, use, or damage.
- Weaknesses or flaws in a system's design, implementation, or configuration that can be exploited by attackers to gain unauthorized access or compromise security.
- One of the three letters in the CIA Triad, and it involves making sure your data is trustworthy and free from tampering.
- The person who proposed the Parkerian Hexad in 1998.
- It is a popular Cybersecurity Company, and it delivers a high-performance network security solutions that protect your systems
- Cybersecurity and Information security have the same ______ security practices.
- It refers to the protection of computer systems, networks, and data from unauthorized access, attacks, and damage. It involves implementing measures to prevent, detect, and respond to cyber threats, such as hacking, malware, and data breaches.
Down
- An adverse event or occurrence that poses a risk to information security, such as a breach, unauthorized access, or system compromise.
- One of the words that was added in the CIA triad, The correct attribution of origin such as the authorship of an email message or the correct description of information such as a data field that is properly named.
- A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
- One of the three letters in the CIA Triad, it involves data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve.
- One of the words that was added in the CIA triad, The ownership or control of information, as distinct from confidentiality.
- An attack aimed at overwhelming a system, network, or service with a flood of traffic or requests, causing it to become unavailable to legitimate users.
- A form of cyber attack where attackers impersonate trustworthy entities through deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. Examples include viruses, worms, Trojans, and ransomware.
- A controlled process of simulating real-world attacks on a system or network to identify vulnerabilities and assess the effectiveness of security measures. ¬‿¬
- One of the three letters in the CIA Triad, and it involves the efforts of an organization to make sure data is kept secret or private.
- A documented set of guidelines, procedures, and rules that outline an organization's approach to information security, including roles and responsibilities, acceptable use policies, and incident response procedures.
- One of the common careers found in Information Security and that is Information Security ________.
- Unauthorized access, acquisition, or disclosure of sensitive or confidential information.
30 Clues: The person who proposed the Parkerian Hexad in 1998. • Cybersecurity and Information security have the same ______ security practices. • One of the common careers found in Cybersecurity and that is Cybersecurity ________. • It is the practice of safeguarding information from unauthorized access, use, or damage. • ...
CELA FY18 Plan 2017-05-04
Across
- source of rain and revenue
- plan component
- object of obsession
- what we run on
- economy threatening full employment
- kind of intelligence
- providing accommodation for a disability
- fee arrangement for OC
- right to control data
- goal of diversity and inclusion
Down
- business ___ compliance
- globally trusted technology provider
- government policy affecting worker mobility
- a transformation and a Geneva convention
- program meant to improve local opportunities
- sustainable energy source
- hacking security
17 Clues: plan component • what we run on • hacking security • object of obsession • kind of intelligence • right to control data • fee arrangement for OC • business ___ compliance • sustainable energy source • source of rain and revenue • goal of diversity and inclusion • economy threatening full employment • globally trusted technology provider • a transformation and a Geneva convention • ...
Clue Quest 2025-05-26
Across
- footprint, data left behind online
- area network
- email trick.
- intrusion
- lifting, Illegal software copying
- name of access point.
- computer in a network.
- for an individual person.
- crime, Criminal activites
Down
- passing of others' work
- harassment
- measure
- transmission speed is very fast.
- law, cyber law
- Topology,Set-up cost is low.
- bulk emails
- ethics,Rules of online behaviour
- infection.
- security,protecting data and resources.
19 Clues: measure • intrusion • harassment • infection. • bulk emails • area network • email trick. • law, cyber law • name of access point. • computer in a network. • passing of others' work • for an individual person. • crime, Criminal activites • Topology,Set-up cost is low. • transmission speed is very fast. • ethics,Rules of online behaviour • lifting, Illegal software copying • ...
Cyber Security Brain Teaser 2025-05-15
Across
- a person who uses computers to seal data
- how many characters should a strong password have
- a common scam where scamers impersonate loved ones
- a common email scam
- software that protects you online
- scams
- unaothorised people access sensitive information
- promises of high returns too good to be true
- a deceptive scheme or trick
- security that requires two or more forms of verification
- a copy of digital data kept to protect against data loss or corruption
Down
- a website to help you to recognise, report and
- caller presents to be from a company needing access to your computer
- software is designed to cause harm
- improved software that replaces a previous version
- electronic mail
- a string of characters to verify the user
- should be included in a password
- relating to computers
19 Clues: scams • electronic mail • a common email scam • relating to computers • a deceptive scheme or trick • should be included in a password • software that protects you online • software is designed to cause harm • a person who uses computers to seal data • a string of characters to verify the user • promises of high returns too good to be true • ...
cyber_puzzle 2024-10-17
Across
- The unauthorized transfer of data from a computer, usually by a malicious actor
- a hacker that violates computer security for personal gain or malice
- The unauthorized use of someone’s computer to mine cryptocurrency
- cyber attack that locks users out of their computer systems until they pay a ransom
- a trick to gain trust
- cyberattack where attackers impersonate legitimate entities to trick individuals
Down
- the process of identifying an Identity
- a tool developed to take advantage of a security flaw
- a security hazard
- a security mechanism against suspicious code
10 Clues: a security hazard • a trick to gain trust • the process of identifying an Identity • a security mechanism against suspicious code • a tool developed to take advantage of a security flaw • The unauthorized use of someone’s computer to mine cryptocurrency • a hacker that violates computer security for personal gain or malice • ...
Revision crossword 2021-01-30
Across
- state where the US Cyber Command is based
- group of terrorists devising something bad
- money demanded by criminals
- city where NATO is headquartered
- a criminal
- process of agreeing on the terms of something
- affected by malicious software
Down
- city where the Collective Security Treaty was signed in 1992
- software used to disrupt the work of your computer
- a Texas-based IT company whose software was used to conduct recent cyber-attack on the USA
- the state of being ordered to stay in so as to avoid a virus
- a mission to the Moon scheduled for 2021
- a sprint-like event for programmers
13 Clues: a criminal • money demanded by criminals • affected by malicious software • city where NATO is headquartered • a sprint-like event for programmers • a mission to the Moon scheduled for 2021 • state where the US Cyber Command is based • group of terrorists devising something bad • process of agreeing on the terms of something • ...
Security Networks .__. 2019-05-16
8 Clues: -you analyse it • - share resources • -internet protocol • -how to find someones house • -to make something authentic • - security online and on devices • -resilience against potential harm • -resilience against potential harm
Cyber Security Brain Teaser 2025-05-15
Across
- a person who uses computers to steal data
- how many characters should a strong password have
- a common scam where scamers impersonate loved ones
- a common email scam
- software that protects you online
- scams
- unaothorised people access sensitive information
- promises of high returns too good to be true
- a deceptive scheme or trick
- security that requires two or more forms of verification
- a copy of digital data kept to protect against data loss or corruption
Down
- a website to help you to recognise, report and
- caller presents to be from a company needing access to your computer
- software is designed to cause harm
- improved software that replaces a previous version
- electronic mail
- a string of characters to verify the user
- should be included in a password
- relating to computers
19 Clues: scams • electronic mail • a common email scam • relating to computers • a deceptive scheme or trick • should be included in a password • software that protects you online • software is designed to cause harm • a person who uses computers to steal data • a string of characters to verify the user • promises of high returns too good to be true • ...
Privacy Summit 2025 2025-01-06
Across
- Federal law governing information security management
- Hide one's IP address
- Unique code or number assigned to an individual
- Government watching
- Personal info stored online
- Cybersecurity sequence
- Measures to prevent hacking
- Threat of hacking or online attack or Reason to use strong passwords
- Code for secure messaging
- Alert to potential threat
- Not for public view
- Secure online account
Down
- Requirement of FOIA
- Secret information
- Method of identification using fingerprints or High-tech way to unlock your phone
- Protected from hacking
- Nameless online user
- Conceal online activity
- Personal info to be guarded
- Unauthorized access
- Right to keep info secret
- Shield from identity theft
- Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
- Document or file containing personal data
24 Clues: Secret information • Requirement of FOIA • Government watching • Unauthorized access • Not for public view • Nameless online user • Hide one's IP address • Secure online account • Protected from hacking • Cybersecurity sequence • Conceal online activity • Right to keep info secret • Code for secure messaging • Alert to potential threat • Shield from identity theft • ...
Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11
Across
- A bot-challenging security feature for online interactions.
- Code to fix or enhance software.
- Captures keystrokes to gather sensitive information.
- Security solution to analyze and detect threats in real-time from diverse data and events.
- Collaboration integrating security, automation, and shared responsibility in software development.
- Harmful software for gathering information without consent.
- A stealthy malware granting unauthorized system access while concealing actions.
- Network of devices used for malware distribution, and cyber-attacks.
Down
- Email attachments from unknown senders.
- A way to bypass authentication, used for unauthorized access or malicious intent.
- The most common word used for brute force.
- Safeguard sensitive files and communications.
- Isolated environment to analyze software behavior.
- A U.S. federal agency promoting cybersecurity standards and innovation.
14 Clues: Code to fix or enhance software. • Email attachments from unknown senders. • The most common word used for brute force. • Safeguard sensitive files and communications. • Isolated environment to analyze software behavior. • Captures keystrokes to gather sensitive information. • A bot-challenging security feature for online interactions. • ...
Computer Ethics and Security 2017-04-19
Across
- / Program that copies itself repeatedly
- / Type of cyber criminal
- / Trademark
- / Damage files and system software
- / Malicious code spread through network
- / Fast temporary storage
- / Network security system
- / Raw information
- / Safeguard against information theft
- / The code of acceptable behavior users should follow while on the internet .
- / Online crime
- / Protect against malicious code infection
- / Artistic
- / Patent
- / Decrease hardware performance and sometimes damage data
Down
- / Patent to be granted
- / Protector used to protect against electrical power variation
- / A small text file that web server stores on your computer
- / Physical access control
- / Exploitation of a vulnerability in DNS server software
- / Duplicate files and programs
- / Lock laptop
- / Cryptography
- / Monitor that is better than CRT
- / Process of identifying an individual
- / System failure
- / A scam using email to get personal info
- / Unauthorized software
- / Intruder attempts to gain unauthorized access to user's system or information by pretending to be user
- / Example of cryptography software
30 Clues: / Patent • / Artistic • / Trademark • / Lock laptop • / Cryptography • / Online crime • / System failure • / Raw information • / Patent to be granted • / Unauthorized software • / Type of cyber criminal • / Fast temporary storage • / Physical access control • / Network security system • / Duplicate files and programs • / Monitor that is better than CRT • / Damage files and system software • ...
Cybersecurity Awareness Puzzle 2023-09-29
Across
- A type of cyberattack in which an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access.
- A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.
- Malicious software designed to harm or gain unauthorized access to computer systems, including viruses, Trojans, and ransomware.
- A form of cyberattack in which attackers impersonate trusted entities to trick individuals into disclosing sensitive information or taking malicious actions.
- The world's greatest Flamingo
- Unauthorized interception and monitoring of network communications, typically for the purpose of gathering sensitive information.
- The potential for financial loss, reputation damage, or other adverse consequences resulting from cybersecurity threats,
- A decoy system or network intentionally set up to attract and deceive cyber attackers, allowing security professionals to observe and study their activities.
- A vulnerability or software flaw that is unknown to the software vendor and therefore has no available fix or patch, making it highly exploitable.
- A part of the internet that is intentionally hidden and only accessible using special software, where users can browse anonymously and engage in activities that often include illegal or illicit transactions.
- A software update or fix released by vendors to address security vulnerabilities and improve the functionality or stability of a program or system.
- Social ___ is when individuals manipulate or deceive others, often using psychological tactics, to gain unauthorized access to information, systems, or physical spaces or to influence their actions for malicious purposes.
- is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing
Down
- Contact the ___ ___ if you suspect malicious activity on your computer.
- The process of converting data into a secure, unreadable format to protect it from unauthorized access or interception.
- Malicious software that can replicate itself and infect other computer files, often causing harm by altering, corrupting, or deleting data and compromising the affected computer's operation.
- Malicious software that encrypts a victim's files or system and demands a ransom payment in exchange for the decryption key.
- Report Suspicious emails with the ___ ___ ___
- A secret combination of characters, typically known only to the authorized user
- A secure network connection that encrypts data traffic between a user's device and a remote server, providing privacy and anonymity, especially on public networks.
- A cyber crime that uses the phone to steal personal confidential information
- A network of interconnected physical devices, such as smart appliances and sensors, that can collect and exchange data over the internet.
- A malicious cyber tactic that attempts to distribute malware through online advertisements.
- Practicing cyber ___ is when you consistently follow best practices and take proactive measures to protect your digital devices, personal information, and online activities from cybersecurity threats and vulnerabilities.
- Software designed to detect, prevent, and remove computer viruses and other malware from a computer or network.
- Email ___ makes it seem that an email is coming from a legitimate or trusted source when, in reality, it may be sent by malicious actors with malicious intent.
26 Clues: The world's greatest Flamingo • Report Suspicious emails with the ___ ___ ___ • Contact the ___ ___ if you suspect malicious activity on your computer. • A cyber crime that uses the phone to steal personal confidential information • A secret combination of characters, typically known only to the authorized user • ...
Solutions Outreach Crossword 2024-05-16
Across
- ___ service is performed to review an organization's security vulnerabilities across application & infrastructure layers (4 characters)
- ______ is the model used for text generation using Natural Language Processing (NLP) (3 characters)
- _____ solution provides implementation services for ServiceNow, Archer etc taking regulatory risks into consideration (4 characters)
- This service line is notable for its solutions including ISTRA and has UIDAI among its list of clients (4 characters)
- Business focused framework by ISACA that defines a set of processes for the management of IT (5 characters)
- ___ technology is an advanced form of business automation involving robotics (3 characters)
- ___team monitors security incidents 24/7 (3 characters)
- ___ is a solution used for the validation of computer systems in the pharma industry (3 characters)
Down
- _____ is the solution for assisting clients to evaluate risks arising from vendors, suppliers and contractors (4 characters)
- _____ Service Line focuses on Intelligent Automation and visualization using analytical tools such as PowerBI (10 characters)
- ______ is the ISO standard that governs AI (8 characters)
- This SL provides services such as IoT security assessments and red team assessments (4 characters)
- Framework developed by Cyber Strategy & Governance based on a combination of standards such as NIST CSF, ISO and COBIT, to assess the organisation’s cyber maturity. (3 characters)
13 Clues: ___team monitors security incidents 24/7 (3 characters) • ______ is the ISO standard that governs AI (8 characters) • ___ technology is an advanced form of business automation involving robotics (3 characters) • This SL provides services such as IoT security assessments and red team assessments (4 characters) • ...
E BLOCK TECH Michael Rizza 2013-05-16
Across
- a little bit more memory then a byte
- Geting increased in you group
- the hardware that is in you keyboard
- the way you arrange your file
- The lowest storage unit
- how you act online
- The ability of putting something into something else
- a more advanced search engine
- Without wires
- Your sybol for you company
- National Cyber Security Alliance
- wired internet
- Copying someone elses item
- Screen
- A typed document
- an oath that the president has to say
- The ability of taking something out of something else
- Liquid crystal display
- Photo file
- zoomable online presitation program
- A typed document of your skills
Down
- Claiming something yours
- memory storage
- your saying for your company
- the act of being secure online
- the heart of the computer
- Wireless Internet
- Security online
- How you edit your format
- Display Unit
- a small box that shows you how your document looks
- A searching website
- Random memory
- comcast
- what font,text size,bold,etc.
- Internet
- Largest unit of data
- TB
- the wiring in your computer
- A piece of folded paper that advertises something
- the theme you pick for you document
- to startup something
- a file that stores music
- Operating system
- A peripheral that controls your mouse
45 Clues: TB • Screen • comcast • Internet • Photo file • Display Unit • Random memory • Without wires • memory storage • wired internet • Security online • A typed document • Operating system • Wireless Internet • how you act online • A searching website • Largest unit of data • to startup something • Liquid crystal display • The lowest storage unit • Claiming something yours • How you edit your format • ...
Technology 2025-11-21
Across
- Largest Unit of Storage
- Install New Version
- Clickable Website
- Smaller Unit of Storage
- Cyber security system
- Unit of Storage
- Bigger screen than Computer
- Where you search things up
- Dangerous Thing on Device
Down
- Drive 50 Gigabytes of Storage Space, Mr. Lubin recommends we use it
- Brain of the Computer
- Physical Part of Computer
- Massive Network
- Pointing Device
- Large but not largest unit of storage
- Protects you from a virus
- Type words
- Device you Carry
- Connects you to the Internet
19 Clues: Type words • Massive Network • Pointing Device • Unit of Storage • Device you Carry • Clickable Website • Install New Version • Brain of the Computer • Cyber security system • Largest Unit of Storage • Smaller Unit of Storage • Physical Part of Computer • Protects you from a virus • Dangerous Thing on Device • Where you search things up • Bigger screen than Computer • ...
Auston's crossword puzzle 2021-01-29
12 Clues: the real world • info about you • the cyber world • a group of people • making safe choices • protection your info • private stuff about you • keeping your passwords safe • know where good info is held • everything you do on the internet • to stop someone from talking to you • when someone steal someones identity
How One Guy Became the Office’s Last Line of Defense 2024-09-11
10 Clues: Today's hero. • Cyber criminals. • Primary phishing tool. • Deceptive email tactic. • Measures to protect data. • Stops unauthorized access. • Program that runs on a computer. • Notification of potential threat. • Group of interconnected computers. • Act of notifying suspicious activity.
Cyber Security 2016-05-24
8 Clues: Has a trunk • Flying mammal • Large marsupial • What is my name? • Man's best friend • Likes to chase mice • What are we here for? • Steals data and holds it for ransom
Cyber Security 2021-10-01
8 Clues: SMS+phishing • The knowledge • The one who hacks • Common word for frauds • The malicious software is called • Your secret key to online accounts • Most common social engineering technique • malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
Cyber Security 2022-05-11
Across
- An individual who uses computer, networking or other skills to gain unauthorized access to data.
- A ransomware cryptoworm attack in 2017, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.
- A situation in which something becomes greater or more serious
- An attack that stops users accessing their data until a price is paid.
Down
- Counterattack
- Sufficient to cause death.
- An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.
- A malicious computer worm that targets supervisory control and data acquisition systems and is the first known cyber-weapon.
8 Clues: Counterattack • Sufficient to cause death. • A situation in which something becomes greater or more serious • An attack that stops users accessing their data until a price is paid. • An individual who uses computer, networking or other skills to gain unauthorized access to data. • ...
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2023-02-10
8 Clues: is bad • online is bad. • should be safe. • should be banned. • should be private. • should be reported. • are suppose to be private. • rules should be followed to be safe.
Cyber security 2023-04-21
Across
- protect (a network or system) from unauthorized access with a firewall.
- data information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
- facts provided or learned about something or someone.
- self-replicating malware that duplicates itself to spread to uninfected computers.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- facts and statistics collected together for reference or analysis.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
8 Clues: facts provided or learned about something or someone. • facts and statistics collected together for reference or analysis. • protect (a network or system) from unauthorized access with a firewall. • self-replicating malware that duplicates itself to spread to uninfected computers. • ...
Cyber Security 2022-12-18
Across
- A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
- A threat that originates from outside an organization's network.
- A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
- A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
- Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
- A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
- The process of protecting computers, networks, and data from unauthorized access or attacks.
- Intending or likely to cause harm or mischief.
8 Clues: Intending or likely to cause harm or mischief. • A threat that originates from outside an organization's network. • The process of protecting computers, networks, and data from unauthorized access or attacks. • A barrier that controls incoming and outgoing network traffic based on predetermined security rules. • ...
Cyber Security 2025-02-04
Across
- A strong one includes letters, numbers, and symbols. (8 letters)
- A program that protects your device from malware. (8 letters)
- Unwanted emails, often trying to scam you. (4 letters)
- A fake website that steals your information. (8 letters)
- A person who gains unauthorized access to data. (6 letters)
Down
- Software designed to harm your computer. (7 letters)
- Theft A crime where personal information is stolen online. (9 letters)
- Keeping your software up-to-date helps with this. (8 letters)
8 Clues: Software designed to harm your computer. (7 letters) • Unwanted emails, often trying to scam you. (4 letters) • A fake website that steals your information. (8 letters) • A person who gains unauthorized access to data. (6 letters) • A program that protects your device from malware. (8 letters) • Keeping your software up-to-date helps with this. (8 letters) • ...
Crossword Puzzle 2024-01-12
Across
- Science and Technology
- the closest star
- a pig friends with a spider
- Both human and machine
- opposite of blue
Down
- a shooting star
- fifth planet
- handheld computer
- Security
- What do you feed seals?
- clap along if you feel like a room without a roof because I'm _ _ _ _ _
- elephant with big ears
- pilots you body
- 60+% of you body is made of this
- ink pencil
15 Clues: Security • ink pencil • fifth planet • a shooting star • pilots you body • the closest star • opposite of blue • handheld computer • elephant with big ears • Science and Technology • Both human and machine • What do you feed seals? • a pig friends with a spider • 60+% of you body is made of this • clap along if you feel like a room without a roof because I'm _ _ _ _ _
Browsing safely 2025-05-19
5 Clues: spoofing , cyberbullying, • crime, cyber criminal, virus, • frauds, cyber security, antivirus, • , phishing, hacking,identity theft, • , cyber terrorism , digital footprint
Cyber Security Day 2021 2021-11-11
7 Clues: Avoid ____ or free wifi • Always use a ________ password • Never, ever trust this type of wifi • Who's the target for cyber criminals? • ____________ made OT systems vulnerable • Cyber security is _________'s responsibility • Automation means that ____ footage can be leaked
Cyber security risks 2017-07-13
Across
- this is a software to design to detect and destroy computer viruses
- a person who uses computers to gain unauthorized access to data
- a network of social interactions and personal relationships
- the action of keeping your device safe
- this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
- a piece of code which is capable of copying itself and can corrupts the system or destroying data
- this is a software that threatens to delete your data for a specific amount of money
- a person who gains unauthorised access to computer files or networks in order to further social or political ends
- fraudulent practice of sending emails pretending to be from reputable companies
- convert information or data into a code especially to prevent unauthorised access
- a computer program that records every keystroke made by a computer user
- a secret word or phrase that must be used to gain admission to a place
12 Clues: the action of keeping your device safe • a network of social interactions and personal relationships • a person who uses computers to gain unauthorized access to data • this is a software to design to detect and destroy computer viruses • a secret word or phrase that must be used to gain admission to a place • ...
Cyber Security Crossword 2024-01-16
Across
- A malicious program that infects computers without user knowledge or permission.
- Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
- Malicious party attacking a company.
- A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
- attack that affects availability of a resource.
- A botnet is a network of private computers infected with malicious software.
Down
- Secret expression required to gain access to a computing system.
- Attack type.
- Excessive push notifications leading to unwanted response.
- authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
- Data Leakage due to well-crafted AI prompt.
- Firewall type that protects Web-based Applications.
12 Clues: Attack type. • Malicious party attacking a company. • Data Leakage due to well-crafted AI prompt. • attack that affects availability of a resource. • Firewall type that protects Web-based Applications. • Excessive push notifications leading to unwanted response. • Secret expression required to gain access to a computing system. • ...
Cyber security crossword 2023-09-11
12 Clues: ads • password • Response • your data • compliance • Vulnerability • authentication • Layer Security • vulnerabilities • Keys Identified Mail • Sender Policy Framework • Message Authentication,Reporting & Conformance
CSAW 2025 2025-03-14
Across
- A set of instructions written in a programming language that a computer can understand and execute.
- Unwanted or unsolicited digital communication, often sent in bulk.
- Software that automatically displays or downloads advertising material.
- Virtual A service that encrypts your internet connection for privacy.
- State A country that engages in cyber activities, often for strategic, political, or economic purposes
- Software that enables unauthorized access to a computer while hiding its presence.
- A person who uses computers to gain unauthorized access to data.
- The mailbox you can send all your SETA inquiries to.
Down
- A type of synthetic media where an image, video, or audio recording is manipulated using artificial intelligence (AI).
- A secret word or phrase used to gain access to a computer system.
- A network of infected computers controlled by a hacker.
- Trust A security model that assumes no user or device is trusted by default.
- The frequency of which you must take Cyber Security Awareness Training
- A type of malware that disguises itself as a legitimate software.
- Unauthorized access or compromise of a system, network, or data
- Software that secretly monitors and collects information about users.
16 Clues: The mailbox you can send all your SETA inquiries to. • A network of infected computers controlled by a hacker. • Unauthorized access or compromise of a system, network, or data • A person who uses computers to gain unauthorized access to data. • A secret word or phrase used to gain access to a computer system. • ...
Cyber Security 2020-03-03
Across
- also called an ID
- a system of symbols such as letters and numbers to hide a meaning
- someone who secretly accesses your information
- uses clever advertisements to trick you into giving away information
Down
- copying a file such as a photo, video or game
- sneak into your computer to cause damage
- software that takes over a computer and kidnaps data
- a method of changing a method to conceal its meaning
8 Clues: also called an ID • sneak into your computer to cause damage • copying a file such as a photo, video or game • someone who secretly accesses your information • software that takes over a computer and kidnaps data • a method of changing a method to conceal its meaning • a system of symbols such as letters and numbers to hide a meaning • ...
Cyber Security 2021-02-12
Across
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- A word that people use to tell them that no one else knows
- or devices.
- Gathers information about how you use your computer
Down
- Short for malicious software, that gains access to your computer or device
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your person
8 Clues: or devices. • A malicious form of self replicating • Someone that tries to gain access to your person • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • ...
Cyber Security 2023-09-26
Across
- malware that changes or destroys information and is passed on to other systems
- a type of internet fraud that seeks to acquire a user's information by deception
- intelligence of machines
- malicious software
Down
- keeps intruders out digitally
- a group of applications that instruct a computer to carry out a task
- someone who attempts to gain unauthorized access
- unsolicited emails
8 Clues: unsolicited emails • malicious software • intelligence of machines • keeps intruders out digitally • someone who attempts to gain unauthorized access • a group of applications that instruct a computer to carry out a task • malware that changes or destroys information and is passed on to other systems • ...
Cyber Security 2024-11-28
Across
- Avoid creating _______ passwords
- Never click on a ________from an untrusted source
- Regularly update your ________ system
- Never write down your __________
Down
- Use _________ software
- Perform regular ________ of important data
- _________select the "Remember My Password
- Never give out your password to _____________
8 Clues: Use _________ software • Avoid creating _______ passwords • Never write down your __________ • Regularly update your ________ system • _________select the "Remember My Password • Perform regular ________ of important data • Never give out your password to _____________ • Never click on a ________from an untrusted source
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2022-02-13
Across
- attack in which the victim receives an email disguised to look as if it has come from a reputable source
- hackers who use tools downloaded from the internet
- created when that data has been processed and becomes meaningful
- set of methods used by cybercriminals to deceive individuals into handing over information
Down
- involves the attacker watching the victim while they provide sensitive information
- Gaining unauthorised access to or control of a computer system
- raw facts and figures
- an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money
8 Clues: raw facts and figures • hackers who use tools downloaded from the internet • Gaining unauthorised access to or control of a computer system • created when that data has been processed and becomes meaningful • involves the attacker watching the victim while they provide sensitive information • ...
Cyber Security! 2023-01-04
Across
- What most people use to login to their phone
- Another thing you can use to lock your phone
- A person who tries to hack systems to learn how to make them stronger
- You enter your email and _____ to login to things
Down
- Software or apps used to store passwords
- A stronger version of a password
- When a hacker tries to steal information through email
- A person who tries to steal your data or money digitally
8 Clues: A stronger version of a password • Software or apps used to store passwords • What most people use to login to their phone • Another thing you can use to lock your phone • You enter your email and _____ to login to things • When a hacker tries to steal information through email • A person who tries to steal your data or money digitally • ...
Cybersecurity Crossword 2023-01-26
Across
- altered video to spread disinformation
- unique string that identifies device
- helps protect system
- malware that transmits private data
- helps prevent unauthorized network access
- flood website/server until crash
- codes that protect data
- cybersecurity professionals
- designs data communications network
Down
- unauthorized access to sensitive info
- software designed to disrupt system
- plans and implements security
- remote encrypted network access
- helps prevent unauthorized access
- criminal hackers
- requests payment to unlock
- malware hidden inside legitimate file
- mimics legitimate websites/emails
- network of computers used for cyber attacks
19 Clues: criminal hackers • helps protect system • codes that protect data • requests payment to unlock • cybersecurity professionals • plans and implements security • remote encrypted network access • flood website/server until crash • helps prevent unauthorized access • mimics legitimate websites/emails • software designed to disrupt system • malware that transmits private data • ...
Cyber Security 2021-02-12
Across
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- A word that people use to tell them that no one else knows
- or devices.
- Gathers information about how you use your computer
Down
- Short for malicious software, that gains access to your computer or device
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your person
8 Clues: or devices. • A malicious form of self replicating • Someone that tries to gain access to your person • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • ...
Cyber Security 2020-08-21
Across
- Programa para encontrar y eliminar cualquier virus que quiera entrar a tu computadora
- es para evitar accesos no autorizados.
Down
- Estafa, a travez de internet, de datos personales del usuario
- son archivos de algunas paginas web que guardan información sobre ti
- cualquier tipo de software que se infiltra a computadora sin que vos sepas y tienen diferentes objetivos
- Correo electrónico no deseado.
- son programas informáticos que quieren roper tu computador el su sistema.
- Persona que intenta entrar a tu ordenador
8 Clues: Correo electrónico no deseado. • es para evitar accesos no autorizados. • Persona que intenta entrar a tu ordenador • Estafa, a travez de internet, de datos personales del usuario • son archivos de algunas paginas web que guardan información sobre ti • son programas informáticos que quieren roper tu computador el su sistema. • ...
cyber security 2020-11-04
Cyber Security 2021-10-01
8 Clues: SMS+phishing • The knowledge • The one who hacks • Common word for frauds • The malicious software is called • Your secret key to online accounts • Most common social engineering technique • malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
CYBER-SECURITY 2018-07-12
Across
- a process to attempt to gain unauthorised access
- site
- a type of malware that prevents you from using your computer encryptions
- warfare
Down
- often a string of characters used for user authentication/access
- a type of software that replicates itself by changing other programs
- a field of protection used to protect you and your data
- a type of malware that is often disguised as legitimate software
8 Clues: site • warfare • a process to attempt to gain unauthorised access • a field of protection used to protect you and your data • often a string of characters used for user authentication/access • a type of malware that is often disguised as legitimate software • a type of software that replicates itself by changing other programs • ...
CYBER-SECURITY 2018-07-12
Across
- a string of characters to secure any data
- someone who uses a computer to illegally access other computers or networks to show that they want a say
- a field of protection used to protect you or your data
Down
- a process that attempts to gain unauthorised access
- a type of malware that prevents you from using your computer files unless you pay a ransom
- site
- warfare
- a type of malware that is often disguised as legitimate software
8 Clues: site • warfare • a string of characters to secure any data • a process that attempts to gain unauthorised access • a field of protection used to protect you or your data • a type of malware that is often disguised as legitimate software • a type of malware that prevents you from using your computer files unless you pay a ransom • ...
Cyber-Security 2019-11-08
Cyber Security 2024-01-26
Across
- false information spread in order to deceive people
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
- an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
8 Clues: false information spread in order to deceive people • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities • an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare. • ...
CYBER SECURITY 2024-04-11
Across
- You need a strong one to protect your accounts. (8 letters)
- Don't be this kind of "fish" that scammers look for. (5 letters)
- This should be unique and not easy to guess for each of your accounts. (8 letters)
- This keeps your computer safe from viruses. (9 letters)
Down
- A safe way to explore the internet is to stay within these boundaries. (5 letters)
- Someone who writes code to harm computers or steal data. (6 letters)
- What kind of information should you keep private online? (8 letters)
- This person can help you if you have trouble with your computer at school. (5 letters)
8 Clues: This keeps your computer safe from viruses. (9 letters) • You need a strong one to protect your accounts. (8 letters) • Don't be this kind of "fish" that scammers look for. (5 letters) • Someone who writes code to harm computers or steal data. (6 letters) • What kind of information should you keep private online? (8 letters) • ...
Cyber Security 2023-07-11
Across
- Another word for malware, named after diseases
- Malware that demands payment
- A way to encode files
- A way to decode files
Down
- Software that blocks incoming malware
- Malware that disguises itself as something else
- Another word for malware, named after an animal
- Pretending to be someone to steal information
8 Clues: A way to encode files • A way to decode files • Malware that demands payment • Software that blocks incoming malware • Pretending to be someone to steal information • Another word for malware, named after diseases • Malware that disguises itself as something else • Another word for malware, named after an animal
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
cyber security 2022-11-28
Across
- - distributed denial of service.
- - a type of computer programme that modifys other computer programmes with its own code.
- - someone from the inside of a company who threatens to expose the passwords for the company.
- -once an email or message has been clicked the ransomer has all of your data and threatens to publish all of your data unless you pay a large sum of money.
Down
- - when someone just keeps on guessing a password or username until they get it right.
- - malicious software designed to harm.
- -a subset of the trojan horse malware that can clone itself again and again.
- -sending someone a random email with a link in that you want them to click.
8 Clues: - distributed denial of service. • - malicious software designed to harm. • -sending someone a random email with a link in that you want them to click. • -a subset of the trojan horse malware that can clone itself again and again. • - when someone just keeps on guessing a password or username until they get it right. • ...
Cyber Security 2022-10-12
Across
- The type of engineering which targets "bugs in the human hardware"
- The process by which an individual’s access to accounts and data is reviewed on a routine basis.
- Complete this phrase "Where to Store, What to _____"
- What you are if you complete this crossword by the end of the week.
Down
- A small file placed on a computer by a website assigning a unique ID to the device
- Permission entitled to an individual allowing them to use a system or view data.
- Recently published CHS notice relating to how CHS handles employees personal data.
- CHS approved Password Manager.
8 Clues: CHS approved Password Manager. • Complete this phrase "Where to Store, What to _____" • The type of engineering which targets "bugs in the human hardware" • What you are if you complete this crossword by the end of the week. • Permission entitled to an individual allowing them to use a system or view data. • ...
cyber threat actors, attacks & motivations 2023-12-18
Across
- Where to report a a cybersecurity incident at RDA
- It's something RDA is known for, but in the social form
- Homophone of a much loved pass time
- Supported by a government
- Australian Government agency that houses the ACSC
- Cybercrime that involves encryption and blackmail
- The name of the cipher you may or may not have succeeded in solving
- Furtum identitatis
Down
- A brute force technique used by cybercriminals
- An important aspect of security as a capability that isn't cyber
- Morris distributed this via the internet in 1988
- Something you must protect in the digital age
- A characteristic of cybercriminal groups
- Cybercriminal motivated by ideology
- A leading motivator for cybercriminals
- Malicious software used to establish remote access
- It's everyone's responsibility
17 Clues: Furtum identitatis • Supported by a government • It's everyone's responsibility • Homophone of a much loved pass time • Cybercriminal motivated by ideology • A leading motivator for cybercriminals • A characteristic of cybercriminal groups • Something you must protect in the digital age • A brute force technique used by cybercriminals • ...
Laurea Davi 2025-09-18
Across
- Cyber
- Venezia→
- Il tuo Vero spitrito guida
- 3 vs Computer science
- Prossima fermata
- non si è unit* a te (non è A.L.)
- La tua presenza è garantita
- Alcuni dicono che non sia un vero lavoro
- Anniversario Taverna (gg/mes)
Down
- Nome caccia
- Da ottobre a marzo non può mai mancare
- Un arte per pochi
- Mamma
- non si possono cambiare le proprie origini
- seconda casa
- Un lupo che si traveste da...
- ha rifiutato ma non e la Alessia Lazzaro
- sai già che non cambierà mai
- Danger
19 Clues: Cyber • Mamma • Danger • Venezia→ • Nome caccia • seconda casa • Prossima fermata • Un arte per pochi • 3 vs Computer science • Il tuo Vero spitrito guida • La tua presenza è garantita • sai già che non cambierà mai • Un lupo che si traveste da... • Anniversario Taverna (gg/mes) • non si è unit* a te (non è A.L.) • Da ottobre a marzo non può mai mancare • ha rifiutato ma non e la Alessia Lazzaro • ...
Year 8 Cyber security 2022-10-12
Across
- gathers information about you
- program that replicates itself
- transforming encrypted code to original format
- code which is designed to cause damage
- spying on the user to get personal info
- throws adverts on your screen
- social engineering to steal user information
- obtaining something by persuasion
- cyber attack intended to redirect web traffic
- mislead users of its true intention
Down
- simulated cyber attack
- use of internet based social media
- the code that transforms an encrypted message
- replace plain text with cipher text
- gaining unauthorised access to data or system
- malicious activities through humans
- malicious code designed to cause damage to device
- converting messages into secret code
18 Clues: simulated cyber attack • gathers information about you • throws adverts on your screen • program that replicates itself • obtaining something by persuasion • use of internet based social media • replace plain text with cipher text • malicious activities through humans • mislead users of its true intention • converting messages into secret code • ...
History 2022-07-29
Across
- In 2014, the Cyber Security Operations Centre evolved to the next stage of Australia's cyber security capability.
- In 2018, ASD became independent as recommendations from the unclassified version of the 2017 Independent Intelligence Review was implemented.
- In 1988, the government decided that DSD should move to Defence headquarters at Russell Offices in this city, to facilitate a closer relationship with Defence.
- Established in Melbourne on 1 April 1947. Its role was to exploit foreign communications and be responsible for communications security in the armed services and government departments.
- DSD relocated from its temporary accommodation in Albert Park to a new purpose-built facility in this historic Melbourne location.
- In 2019, the Prime Minister announced the new Director-General of ASD.
Down
- in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security.
- Renamed as a result of an inquiry and made directly responsible to the Secretary of the Department of Defence.
- The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.
- in 1986, DSD acquired Australia's first supercomputer.
- Australian, American and British personnel worked together in this agency in Melbourne, attached to General MacArthur's headquarters.
11 Clues: in 1986, DSD acquired Australia's first supercomputer. • In 2019, the Prime Minister announced the new Director-General of ASD. • The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet. • in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security. • ...
Cyber Security Awareness 2018-06-05
Across
- Be careful connecting to public _____.
- is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- What month is National Cyber Security Awareness Month?
- True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- a secret word or expression used by authorized persons to prove their right to access, information, etc.
- when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user
12 Clues: Be careful connecting to public _____. • What month is National Cyber Security Awareness Month? • True/False: Call I.T. Service desk right away when you suspect a phishing email • techniques of protecting computers, networks, programs and data from unauthorized access or attacks • ...
Cyber Security Crossword 2021-09-26
Across
- Malicious computer program (not to be confused with Corona)
- A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
- A type of malicious software that locks your files until you pay up
- Unwanted but not malicious emails
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- Short name for MALicious softWARE
- Sending a fake email to try and personal or sensitive information
Down
- The creators of our anime cybersecurity traing videos
- A type of malware that functions by spying on user activity without their knowledge
- Secret word or phrase used to gain access to a system (the longer the better)
- The name of the cybersecurity drama series (no space)
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.
12 Clues: Unwanted but not malicious emails • Short name for MALicious softWARE • The creators of our anime cybersecurity traing videos • The name of the cybersecurity drama series (no space) • Malicious computer program (not to be confused with Corona) • Sending a fake email to try and personal or sensitive information • ...
Cyber security 2020-08-21
Across
- Es una estafa para poder obtener tus datos privados.
- software que busca información y después la trasmite sin tu conocimiento.
- Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.
- Programas informáticos con el objetivo de alterar el funcionamiento de tu computadora y infectar archivos.
- Correo electrónico que no solicitaste ni desates e igual recibiste.
Down
- Archivos de un sitio web que se guardan en tu computadora y guardan información sobre voz.
- Sistema que evita el acceso no autorizado a una red privada.
- Programa informático que detecta y elimina los virus y otros programas perjudiciales.
8 Clues: Es una estafa para poder obtener tus datos privados. • Sistema que evita el acceso no autorizado a una red privada. • Correo electrónico que no solicitaste ni desates e igual recibiste. • Software malicioso se infiltra en tu dispositivo sin que voz lo sepas. • software que busca información y después la trasmite sin tu conocimiento. • ...
Cyber security 2020-03-03
Across
- a method of changing a message to conceal its meaning
- software takes over a computer and kudnaps data
- also called an ID
- a system of symbols such as letters and numbers to hide a meaning
Down
- someone who secretly gets access to our information
- sneaks into your computer to cause damage
- what uses clever advertisements to trick you into giving away information
- copying a file such as a photo, video or game
8 Clues: also called an ID • sneaks into your computer to cause damage • copying a file such as a photo, video or game • software takes over a computer and kudnaps data • someone who secretly gets access to our information • a method of changing a message to conceal its meaning • a system of symbols such as letters and numbers to hide a meaning • ...
Cyber Security 2021-10-01
8 Clues: SMS+phishing • The knowledge • The one who hacks • Common word for frauds • The malicious software is called • Your secret key to online accounts • Most common social engineering technique • malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
Cyber Security 2021-10-06
Across
- bits of code embedded in programs by the programer (s) to quickly gain access at a later time.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- written errors in someone's code or program.
Down
- If lots of infected systems combine to form a network it is called botnet.
- a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker.
- any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.
- Unlike a computer virus, it does not need to attach itself to an existing program.
8 Clues: written errors in someone's code or program. • If lots of infected systems combine to form a network it is called botnet. • Unlike a computer virus, it does not need to attach itself to an existing program. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Cyber security 2021-11-05
Across
- someone sends a fake website to you
- type of malicious code or software that looks legitimate but can take control of your computer
- to a malicious program that replicates itself, automatically spreading through a network.
- looking over someone shoulder to obtain info
Down
- hacks your computer
- analysis of people's unique physical identity
- something to protect your computer
- a person trying to steal personal information
8 Clues: hacks your computer • something to protect your computer • someone sends a fake website to you • looking over someone shoulder to obtain info • analysis of people's unique physical identity • a person trying to steal personal information • to a malicious program that replicates itself, automatically spreading through a network. • ...
cyber security 2023-04-21
Across
- facts provided or learned about something or someone
- information about a person
- person who uses computers to gain unauthorized access to data.
- inadvertently doing other than what should have been done; a slip, lapse or mistake
Down
- looking over someone's shoulder
- an attack where people are asked to input data
- use of deception to manipulate individuals
- raw facts or figures
8 Clues: raw facts or figures • information about a person • looking over someone's shoulder • use of deception to manipulate individuals • an attack where people are asked to input data • facts provided or learned about something or someone • person who uses computers to gain unauthorized access to data. • ...
