cyber security Crossword Puzzles

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. engineering manipulation
  2. infects computer
  3. data your private information
  4. generator attacks social media
  5. error an action wasnt intended
Down
  1. information
  2. found your information
  3. you learned it

8 Clues: informationyou learned itinfects computerfound your informationengineering manipulationdata your private informationgenerator attacks social mediaerror an action wasnt intended

Cyber security 2023-04-21

Cyber security crossword puzzle
Across
  1. verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
  2. facts provided or learned about something or someone.
  3. malware that replicates and transfers itself to other computers via a network
Down
  1. The authorization given to users that enables them to access specific resources on the network,
  2. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
  3. someone who hacks into your account
  4. information that has been translated into a form that is efficient for movement or processing
  5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

8 Clues: someone who hacks into your accountfacts provided or learned about something or someone.malware that replicates and transfers itself to other computers via a networkinformation that has been translated into a form that is efficient for movement or processing...

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. looking at private information
  2. separates malicious software from legitimate applications
  3. barrier on a computer
Down
  1. data personal information
  2. permission access granted to users to specific resources
  3. someone who hacks your account
  4. unprocessed information
  5. animal and computer virus

8 Clues: barrier on a computerunprocessed informationdata personal informationanimal and computer viruslooking at private informationsomeone who hacks your accountpermission access granted to users to specific resourcesseparates malicious software from legitimate applications

Cyber Security 2024-01-26

Cyber Security crossword puzzle
Across
  1. false information spread in order to deceive people
  2. the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
  3. cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
  1. an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
  2. the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
  3. behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
  4. warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
  5. the discovering of secrets, especially political or military information of another country or the industrial information of a business

8 Clues: false information spread in order to deceive peoplecataclysm resulting from a large-scale sabotage of all computerized networks, systems and activitiesan academic, non-binding study on how international law applies to cyber conflicts and cyber warfare....

Cyber Security 2025-03-20

Cyber Security crossword puzzle
Across
  1. Ensuring authorized access to a system or data
  2. An unauthorized entry into a system or network
  3. It's like turning your message into a puzzle that only the right person can solve
  4. Helps prevent unauthorized access and malicious attacks
Down
  1. Harmful software designed to disrupt or damage
  2. A digital trick to steal your personal information
  3. This could be someone wearing a "digital mask", either breaking in for mischief or to find vulnerabilities
  4. Imagine software that's like an invisible spy, quietly gathering your data without you noticing

8 Clues: Harmful software designed to disrupt or damageEnsuring authorized access to a system or dataAn unauthorized entry into a system or networkA digital trick to steal your personal informationHelps prevent unauthorized access and malicious attacksIt's like turning your message into a puzzle that only the right person can solve...

Sales Team 2024-07-15

Sales Team crossword puzzle
Across
  1. cyber security excellence award winner 2023
  2. 2
  3. statement you read after collecting payment information
  4. Wife, girlfriend, husband, boyfriend,significant partner
  5. 49.00 price
  6. legalshield headquarters
Down
  1. primerica identity plan is called
  2. PU app type
  3. Best overall legal service plan 2024, Forbes
  4. credit bureau used on 1b plans
  5. commerical driver legal plan
  6. Estate planning

12 Clues: 2PU app type49.00 priceEstate planninglegalshield headquarterscommerical driver legal plancredit bureau used on 1b plansprimerica identity plan is calledcyber security excellence award winner 2023Best overall legal service plan 2024, Forbesstatement you read after collecting payment information...

Unit 4 2019-12-06

Unit 4 crossword puzzle
Across
  1. 在经济上 adv
  2. 抛弃。拒绝
  3. 身份
  4. 独占的
  5. 安全
  6. bully 网络欺凌
Down
  1. 引人注目的
  2. 统治支配
  3. 调查,测量
  4. 现实

10 Clues: 现实身份安全独占的统治支配引人注目的调查,测量抛弃。拒绝在经济上 advbully 网络欺凌

Cyber Security Crossword 2020-03-11

Cyber Security Crossword crossword puzzle
Across
  1. an analysis of an applications source code
  2. a piece of code that takes advantage of a vulnerability
  3. software designed to cause harm
  4. a vulnerability that is currently unknown
  5. a technique used by hackers to gain sensitive information
  6. malware that holds your data hostage
Down
  1. collection of web or internet based pages
  2. when a system has false requests that causes it to crash
  3. impersonating another use or device on a network
  4. encoding software for authorized access only
  5. hardware or software that blocks viruses
  6. when a hacker gains access to files and network

12 Clues: software designed to cause harmmalware that holds your data hostagehardware or software that blocks virusescollection of web or internet based pagesa vulnerability that is currently unknownan analysis of an applications source codeencoding software for authorized access onlywhen a hacker gains access to files and network...

Cyber Security Crossword 2024-10-17

Cyber Security Crossword crossword puzzle
Across
  1. a popular DDOS tool
  2. Why a threat is performed
  3. A threat that happens due to mistakes
  4. A threat performed with malicious intent
  5. individuals who attack a system with inside knowledge
  6. an attack aimed to floor servers with traffic
Down
  1. Blocking access to a system
  2. an attack aimed to trick individuals
  3. Impact to a business due to insiders
  4. The aim behind an attack
  5. young personnel who perform server attacks.
  6. Possible aim of a script kiddie

12 Clues: a popular DDOS toolThe aim behind an attackWhy a threat is performedBlocking access to a systemPossible aim of a script kiddiean attack aimed to trick individualsImpact to a business due to insidersA threat that happens due to mistakesA threat performed with malicious intentyoung personnel who perform server attacks....

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A form of malware used by hackers to spy on you and your computer activities
  2. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  3. A malicious software designed to block access to a computer system until a sum of money is paid
  4. The process of identifying a user’s identity
  5. A method of connecting a series of computers and devices in a private encrypted network
  6. Something personal to you and should never be shared
  7. In addition to passwords; this ensures better security
  8. Unauthorized access to a network, information systems or application
  9. Threatening behavior facilitated through electronic means such as texting
Down
  1. Alert / Always on the lookout
  2. A fraudulent email purportedly from a reputable company attempting to get personal information
  3. A piece of hardware or software, used to keep intruders out
  4. When a hacker changes source of an email so that it seems to come from a trusted source
  5. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  6. The process of taking plain text and scrambling it into an unreadable format
  7. the address of a website; check its validity before clicking on it
  8. A sequence of words or text used to control access to a computer; similar to a password
  9. Facebook, Twitter, Instagram etc. (Two Words)

18 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityFacebook, Twitter, Instagram etc. (Two Words)Something personal to you and should never be sharedIn addition to passwords; this ensures better securityA piece of hardware or software, used to keep intruders outthe address of a website; check its validity before clicking on it...

Cyber security crossword- Basic 2014-10-14

Cyber security crossword- Basic crossword puzzle
Across
  1. A person who steals information from your system without you knowing about it.
  2. A computer _______ is a group of interconnected computers.
  3. The A in APT
  4. Always _____ your computer when you leave your desk
  5. It is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product
  6. Even when Antivirus _______ is installed and updated, your computer is never 100% safe
  7. The state of being free from danger or threat.
  8. Viruses, Worms and Trojans etc
  9. Be cyber savvy, be a ______ user.
Down
  1. An attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  2. Never turn off your ______ or else your computer and the company data will be at risk
  3. Hidden entrance into a system
  4. The chance you take when you download unknown content from the internet or leave your computer open
  5. A ____ is a web page address.
  6. A software that is designed to detect and destroy computer viruses.
  7. Never share your _______ with another person.
  8. An army of malware infected PCs
  9. A _______ is a program that allows a user to find view hear and interact with materials on the internet.

18 Clues: The A in APTHidden entrance into a systemA ____ is a web page address.Viruses, Worms and Trojans etcAn army of malware infected PCsBe cyber savvy, be a ______ user.Never share your _______ with another person.The state of being free from danger or threat.Always _____ your computer when you leave your desk...

Cyber security 2020-08-24

Cyber security crossword puzzle
Across
  1. estafa con el objetivo de obtener a través de internet datos privados de los usuarios
  2. programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales
  3. almacenan información sobre tí
  4. diseñado para infiltrarse en su dispositivo sin su conocimiento.
Down
  1. software que recopila información de un ordenador y después transmite esta información a una entidad externa
  2. sistema diseñado para evitar el acceso no autorizado a una red privada
  3. programas informáticos que tienen como objetivo alterar el funcionamiento del computador
  4. correo electrónico no solicitado que recibe una persona

8 Clues: almacenan información sobre tícorreo electrónico no solicitado que recibe una personadiseñado para infiltrarse en su dispositivo sin su conocimiento.sistema diseñado para evitar el acceso no autorizado a una red privadaestafa con el objetivo de obtener a través de internet datos privados de los usuarios...

Cyber Security 2020-08-25

Cyber Security crossword puzzle
Across
  1. retrieve from the internet
  2. you carry it around with you all day and it could be hacked
  3. a person trying to break into your computer systems
  4. a program built for a specific hole that has been found
  5. a free operating system
Down
  1. a weakness in your computer system
  2. protects your files from being read
  3. updates for your operating system

8 Clues: a free operating systemretrieve from the internetupdates for your operating systema weakness in your computer systemprotects your files from being reada person trying to break into your computer systemsa program built for a specific hole that has been foundyou carry it around with you all day and it could be hacked

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. Data that identifies a specific individual
  2. It is evaluating computer networks and systems vulnerabilities in securities.
  3. It is information security and the psychological manipulation of people.
Down
  1. An action that has been done but is not intended by the person.
  2. the collection of information
  3. When you obtain something by using persuasion
  4. It is when you show responsibility for your actions.
  5. facts provided about something/someone

8 Clues: the collection of informationfacts provided about something/someoneData that identifies a specific individualWhen you obtain something by using persuasionIt is when you show responsibility for your actions.An action that has been done but is not intended by the person.It is information security and the psychological manipulation of people....

cyber security 2020-02-10

cyber security crossword puzzle
Across
  1. someone who breaks into a computer system for mischief or malice
  2. a strong ______ have letters, numbers and symbols
  3. someone who breaks into a computer system using social engineering
  4. someone who test computer security by hacking into computer system
Down
  1. scammers get money from others by scaring them
  2. dont accept free _____ of games online
  3. people get scammed out of ______ from fake donation advertisments
  4. people get scammed because of their ____ of money

8 Clues: dont accept free _____ of games onlinescammers get money from others by scaring thema strong ______ have letters, numbers and symbolspeople get scammed because of their ____ of moneysomeone who breaks into a computer system for mischief or malicepeople get scammed out of ______ from fake donation advertisments...

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. The malicious software is called
  2. The one who hacks
  3. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  4. Most common social engineering technique
Down
  1. Common word for frauds
  2. The knowledge
  3. SMS+phishing
  4. Your secret key to online accounts

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.​
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data​
  3. someone who seeks and exploits weaknesses in a computer system or computer network.​
  4. written errors in someone's code or program.​
Down
  1. If lots of infected systems combine to form a network it is called botnet.​
  2. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker. ​
  3. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.​
  4. Unlike a computer virus, it does not need to attach itself to an existing program.

8 Clues: written errors in someone's code or program.​If lots of infected systems combine to form a network it is called botnet.​Unlike a computer virus, it does not need to attach itself to an existing program.someone who seeks and exploits weaknesses in a computer system or computer network.​...

Cyber security 2022-09-07

Cyber security crossword puzzle
Across
  1. An annoying malware that spams you with ads
  2. a collection of malware infested computers that form a network to attack
  3. An important process that verifies a user is really who they are; many different ways this can be done
  4. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
  1. When raw data is put into context and has meaning, the data transforms into _____
  2. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  3. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
  4. I am not a robot

8 Clues: I am not a robotAn annoying malware that spams you with adsa collection of malware infested computers that form a network to attackWhen raw data is put into context and has meaning, the data transforms into _____Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing....

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

Cyber security 2022-11-28

Cyber security crossword puzzle
Across
  1. are a malicious form of self-replicating software.
  2. they replicate themselves but do not attach themselves to files as a virus does.
  3. an unwanted software that monitors and gathers information on a person and how they use their computer.
  4. this can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
Down
  1. a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions.
  2. This is a form of virus, as it is self-replicating.
  3. it is a large collection of malware-infected devices
  4. is a software that is designed to gain access to your computer with malicious intent.

8 Clues: are a malicious form of self-replicating software.This is a form of virus, as it is self-replicating.it is a large collection of malware-infected devicesthey replicate themselves but do not attach themselves to files as a virus does.is a software that is designed to gain access to your computer with malicious intent....

Cyber Security 2024-01-26

Cyber Security crossword puzzle
Across
  1. false information spread in order to deceive people
  2. the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
  3. cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
  1. an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
  2. the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
  3. behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
  4. warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
  5. the discovering of secrets, especially political or military information of another country or the industrial information of a business

8 Clues: false information spread in order to deceive peoplecataclysm resulting from a large-scale sabotage of all computerized networks, systems and activitiesan academic, non-binding study on how international law applies to cyber conflicts and cyber warfare....

cyber security 2024-10-22

cyber security crossword puzzle
Across
  1. Anonymously sending hurtful messages online
  2. Harassment or bullying that takes place over digital devices like computers and smartphones
  3. he act of spreading false information about someone online
  4. A person who uses digital means to harass others.
  5. The act of excluding someone from an online group or activity.
Down
  1. Using technology to intimidate or harm others
  2. Software designed to block or report harmful online behavior.
  3. media common platform where cyberbullying can occur, often used for social interaction.

8 Clues: Anonymously sending hurtful messages onlineUsing technology to intimidate or harm othersA person who uses digital means to harass others.he act of spreading false information about someone onlineSoftware designed to block or report harmful online behavior.The act of excluding someone from an online group or activity....

CYBER SECURITY 2025-10-15

CYBER SECURITY crossword puzzle
Across
  1. Pretending to be someone else to gain access or information
  2. A unique numerical label assigned to each device on a network
  3. The amount of time spent using digital devices
Down
  1. Authentication using physical characteristics like fingerprints or face
  2. A unique identifier used to log into a system
  3. A copy of data kept in case the original is lost or compromised
  4. An improvement or fix applied to software or systems
  5. A device that forwards data between computer networks

8 Clues: A unique identifier used to log into a systemThe amount of time spent using digital devicesAn improvement or fix applied to software or systemsA device that forwards data between computer networksPretending to be someone else to gain access or informationA unique numerical label assigned to each device on a network...

Internet Privacy 2014-05-29

Internet Privacy crossword puzzle
Across
  1. freedom from danger
  2. take hold of forcibly
  3. set of data that gives information about other data.
  4. domain located outside of the United States. The government cannot directly act on these domains.
  5. Federal Bureau of Investigation
  6. A person other than you and the website you visit
  7. Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
  8. shutdown of a website by the owners in form of a protest
  9. Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
  10. Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
  11. a legal document that explains how a website uses your private info
  12. the part of a network address that identifies it as belonging to a particular domain.
  13. threat a threat that can damage a network
Down
  1. close watch or intercepting information from an individual
  2. protection against unreasonable searches and seizures
  3. domain located within the United States. The government can directly act on these domains.
  4. National Security Agency
  5. An illegitimate imitation of an item.
  6. A work or invention.
  7. a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  8. Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
  9. Illegally shared content
  10. A draft of a proposed law presented to parliament for discussion.
  11. Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
  12. Internet Service Provider. A company that is in charge of your internet and providing you with internet service

25 Clues: freedom from dangerA work or invention.take hold of forciblyNational Security AgencyIllegally shared contentFederal Bureau of InvestigationAn illegitimate imitation of an item.threat a threat that can damage a networkA person other than you and the website you visitset of data that gives information about other data....

Internet Privacy 2014-05-29

Internet Privacy crossword puzzle
Across
  1. a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  2. domain located outside of the United States. The government cannot directly act on these domains.
  3. Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
  4. freedom from danger
  5. Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
  6. domain located within the United States. The government can directly act on these domains.
  7. Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
  8. shutdown of a website by the owners in form of a protest
  9. National Security Agency
  10. Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
Down
  1. A person other than you and the website you visit
  2. Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
  3. A draft of a proposed law presented to parliament for discussion.
  4. A work or invention.
  5. Federal Bureau of Investigation
  6. Illegally shared content
  7. threat a threat that can damage a network
  8. a legal document that explains how a website uses your private info
  9. protection against unreasonable searches and seizures
  10. An illegitimate imitation of an item.
  11. Internet Service Provider. A company that is in charge of your internet and providing you with internet service
  12. set of data that gives information about other data.
  13. close watch or intercepting information from an individual
  14. take hold of forcibly
  15. the part of a network address that identifies it as belonging to a particular domain.

25 Clues: freedom from dangerA work or invention.take hold of forciblyIllegally shared contentNational Security AgencyFederal Bureau of InvestigationAn illegitimate imitation of an item.threat a threat that can damage a networkA person other than you and the website you visitset of data that gives information about other data....

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. who interferes with normal computer functions
  2. records or transmits a user's keystrokes
  3. writing computer software code
  4. client-side code injection attack
  5. refers to any external entity who may have access to private data
  6. gain unauthorized access to a computer system
  7. network of maliciously installed bots
  8. destroying a hardware by delivering a high-voltage electrical surge
  9. cyber exploit directed at online card players
  10. security risk who cause the program to crash
  11. software tools used by a third party
Down
  1. unauthorized duplication or deletion of an organization's electronic information
  2. secure time-limited credential
  3. attack that originates from many different sources
  4. capable of being easily hurt
  5. designed to take advantage of a particular error
  6. possible source of harm
  7. security mechanism for separating running programs

18 Clues: possible source of harmcapable of being easily hurtsecure time-limited credentialwriting computer software codeclient-side code injection attacksoftware tools used by a third partynetwork of maliciously installed botsrecords or transmits a user's keystrokessecurity risk who cause the program to crashwho interferes with normal computer functions...

Compliance & Security Week Part 2! 2024-11-14

Compliance & Security Week Part 2! crossword puzzle
Across
  1. What are all DDID/AHS employees supposed to wear so it can be seen as a best practice of security?
  2. What is the term for the agreement between covered entities and business associates?
  3. What is the term for malicious software?
  4. The person that exploits vulnerabilities for malicious purposes
  5. Who is the DDID Security Officer?
  6. What is the process of converting data into a secure format?
  7. What confidential information does DDID protect?
  8. What color is the HIPAA Hippo?
Down
  1. What is the over the phone voice call type of scam?
  2. What is the term for a security incident that disrupts services?
  3. Who is the HR Reporting Officer?
  4. What is the process of verifying identity?
  5. This occurs when an unauthorized person gains access to sensitive or protected information
  6. What is the term for a legal requirement to protect data?
  7. The document that outlines security practices
  8. You are the first line of ____ in protection DDID and AHS
  9. What's an organization's overall ability to protect against, detect, respond to and recover from cyber threats? (It's like a straight back when you sit or stand)

17 Clues: What color is the HIPAA Hippo?Who is the HR Reporting Officer?Who is the DDID Security Officer?What is the term for malicious software?What is the process of verifying identity?The document that outlines security practicesWhat confidential information does DDID protect?What is the over the phone voice call type of scam?...

CISO Crossword Quiz - 1725 2025-03-11

CISO Crossword Quiz - 1725 crossword puzzle
Across
  1. A technique by which cyber criminals steal potentially sensitive user information by injecting malicious script code in various forms/pages of targeted website
  2. A cybersecurity strategy in which an organization only allows pre-approved or trusted users, entities, or actions to operate/access a system or network
  3. a cybercrime where fraudsters impersonate law enforcement officials to trick people into paying money or giving personal information by making them believe they have been digitally arrested or digitally detained
  4. A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency
  5. A type of cybercrime that involves using QR codes to trick people into visiting malicious websites or to make payment to unauthorized persons
  6. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  7. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
Down
  1. A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money
  2. A Security incident in which a malicious threat actor gains access to systems without authorization
  3. A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms
  4. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible

11 Clues: A Security incident in which a malicious threat actor gains access to systems without authorizationA cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiencyA type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money...

Cyber CYber 2024-10-07

Cyber CYber crossword puzzle
Across
  1. KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
  2. What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
  3. VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
  4. RECOVERY What term describes a strategy for recovering from a cyber incident?
  5. A security measure that helps prevent unauthorized access to a network?
  6. WEB What term refers to the part of the internet that is not indexed by traditional search engines?
  7. What type of software is potentially unwanted and often bundled with legitimate software?
  8. What type of malware allows remote access to a user's device?
  9. What term refers to a security incident where sensitive data is accessed without authorization?
  10. DETECTION A tool or process for detecting unauthorized access to a system?
  11. A type of cyber attack where the attacker impersonates a legitimate user?
  12. TESTING A systematic examination of a system for security weaknesses?
  13. What term describes malicious code that appears legitimate?
  14. What term is used for a password that is difficult to guess?
  15. Which type of attack sends a flood of traffic to overwhelm a network?
  16. THEFT The unauthorized use of someone's personal data is known as?
  17. FLOOD What type of DDoS attack exploits the TCP handshake process?
  18. What type of encryption uses two different keys for encryption and decryption?
  19. The practice of obtaining sensitive information by deception is known as?
  20. What type of cryptographic attack tries all possible combinations of keys?
Down
  1. A method used to authenticate users based on physical characteristics?
  2. What do you call a security measure that uses two or more methods to verify identity?
  3. A series of steps taken to ensure the security of information systems?
  4. The information that is collected to assess vulnerabilities?
  5. SCANNING What is a method for identifying weaknesses in a system’s security?
  6. What is the process of converting plaintext into ciphertext?
  7. What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
  8. A malicious user who seeks to exploit system vulnerabilities?
  9. The act of attempting to steal data through exploiting weak points?
  10. What refers to the principle of least privilege in cybersecurity?
  11. What technique uses social interactions to manipulate individuals into giving up confidential information?
  12. What type of malware can replicate itself and spread to other computers?
  13. The process of decoding information or data that has been encrypted?
  14. What is a security resource whose value lies in being probed, attacked, or compromised?
  15. A collection of related data that may be exposed during a breach is called?
  16. SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
  17. ATTACK A planned attack to capture sensitive information over a network?
  18. IDS What term refers to a system that captures and stores network traffic?
  19. TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
  20. A malicious email that pretends to be from a trustworthy source?

40 Clues: What term describes malicious code that appears legitimate?The information that is collected to assess vulnerabilities?What is the process of converting plaintext into ciphertext?What term is used for a password that is difficult to guess?A malicious user who seeks to exploit system vulnerabilities?...

Cyber Security Puzzle 2024-10-22

Cyber Security Puzzle crossword puzzle
Across
  1. The process of verifying the identity of a user
  2. A method of disguising data to protect it
  3. A device that helps protect networks by filtering traffic
  4. A breach where sensitive data is accessed unlawfully
  5. A malicious email designed to trick recipients
  6. A protocol used to send emails securely
Down
  1. A common form of malware that locks files
  2. A program that scans for vulnerabilities in systems
  3. A common cybersecurity measure that involves using complex passwords
  4. Software that detects and removes malware
  5. A type of attack where multiple systems are used to overwhelm a target
  6. A legal framework for data protection in the EU

12 Clues: A protocol used to send emails securelyA common form of malware that locks filesA method of disguising data to protect itSoftware that detects and removes malwareA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EU...

Cybersecurity Puzzle 2025-03-11

Cybersecurity Puzzle crossword puzzle
Across
  1. Self-replicating malicious software
  2. Fixes security vulnerabilities
  3. Acts as an intermediary server
  4. Fake emails to steal info
  5. Attack using trial and error
  6. Program that spreads and harms
  7. Remote storage and computing
  8. Harmful software for attacks
  9. Access to an account or system
  10. Device used for entering codes
  11. Payment demanded for files
  12. Secretly monitors user activity
Down
  1. Superuser access level
  2. Method for encrypting information
  3. Disguised harmful software
  4. Protection against cyber threats
  5. Secret entry point for attacks
  6. Permission to use a system
  7. Unauthorized access to systems
  8. Encrypts data for protection

20 Clues: Superuser access levelFake emails to steal infoDisguised harmful softwarePermission to use a systemPayment demanded for filesAttack using trial and errorRemote storage and computingHarmful software for attacksEncrypts data for protectionFixes security vulnerabilitiesActs as an intermediary serverProgram that spreads and harms...

Jaringan Komputer & Internet 2024-01-15

Jaringan Komputer & Internet crossword puzzle
Across
  1. jenis topologi yang menyerupai cincin?
  2. konsep cyber security berperan dalam menjaga kerahasiaan data ?
  3. proses pengiriman data dari sebuah perangkat ke perangkat tujuan melalui media transmisi?
  4. aspek teknis yang tujuannya ketepatan antara biaya?
  5. faktor keamanan jaringan yang mampu melindungi data dari berbagai serangan cyber?
Down
  1. jenis jaringan yang gabungan dari berbagai LAN dan WAN?
  2. tata kelola akses yang pengguna mengakses dan melakukan operasi database tertentu?
  3. jaringan komputer adalah perangkat komputer atau perangkat?
  4. model 7 lapis osi ?
  5. alat penghubung workstation,server(menggunakan kabel jaringan)

10 Clues: model 7 lapis osi ?jenis topologi yang menyerupai cincin?aspek teknis yang tujuannya ketepatan antara biaya?jenis jaringan yang gabungan dari berbagai LAN dan WAN?jaringan komputer adalah perangkat komputer atau perangkat?alat penghubung workstation,server(menggunakan kabel jaringan)konsep cyber security berperan dalam menjaga kerahasiaan data ?...

RU ITEC411- Crime and Security 2025-03-18

RU ITEC411- Crime and Security crossword puzzle
Across
  1. U.S. law that criminalizes unauthorized computer access.
  2. An attack that overloads and shuts down websites.
  3. Filing lawsuits in countries with stricter defamation laws.
  4. Using hacking to promote a political cause.
  5. Method of encoding data to prevent unauthorized access.
  6. Unauthorized access to computer systems.
  7. Records used to track cybercriminal activities.
  8. Hacking conducted by governments as a strategic weapon.
  9. Voice-based phishing scams.
  10. A system that filters out suspicious network activity.
  11. Crime involving the misuse of personal information.
Down
  1. Investigating digital crimes through data recovery.
  2. A 2013 cyber attack that compromised millions of credit cards.
  3. A decoy system used to attract and study hackers.
  4. Phishing via SMS text messages.
  5. sophisticated worm targeting industrial control systems.
  6. Manipulating people into revealing confidential information.
  7. Fraudulent emails attempting to steal personal data.
  8. Disclosing security flaws for ethical reasons.
  9. Security technology based on physical traits.

20 Clues: Voice-based phishing scams.Phishing via SMS text messages.Unauthorized access to computer systems.Using hacking to promote a political cause.Security technology based on physical traits.Disclosing security flaws for ethical reasons.Records used to track cybercriminal activities.A decoy system used to attract and study hackers....

Garda Times Summer Annual 2025 Crossword 2025-07-04

Garda Times Summer Annual 2025 Crossword crossword puzzle
Across
  1. Location of first ever Garda Band public performance on Easter Monday, 2 April 1923 (3,9,4)
  2. New Justice Minister Jim (10)
  3. National initiative to reduce speeding (4,4,3)
  4. Annual multinational cyber security exercise (6,7)
  5. Gardens where Annual Memorial takes place (4,4)
  6. Location of Garda College (10)
  7. In-organisation term for Garda Commissioner position (6,3)
  8. First DPP Eamonn (6)
  9. Horse-riding section of the force (7,4)
  10. Crime tackled by Offences Against the State Act (9)
  11. Animals used to detect bodies, not being used by State (7,4)
  12. Computer-aided dispatch system (9)
Down
  1. Name of new Office of the Police Ombudsman (6)
  2. State’s highest security prison (10)
  3. Unoffical title of the Policing, Security and Community Safety Act 2024 (5,6,3)
  4. Third Garda Commissioner, Eamon (4)
  5. Medal awarded for bravery to gardaí (5)
  6. First Garda Bandmaster, Superintendent DJ (7)
  7. DPP Catherine (6)
  8. Justice scheme to support victim reconciliation(11)
  9. Chair of the Independent Review Group, Mr Justice Michael (5)
  10. Chairperson of the Policing and Community Safety Authority, Elaine (5)
  11. Head of Office of Police Ombudsman, Emily (5)
  12. Child and Family Agency (5)

24 Clues: DPP Catherine (6)First DPP Eamonn (6)Child and Family Agency (5)New Justice Minister Jim (10)Location of Garda College (10)Computer-aided dispatch system (9)Third Garda Commissioner, Eamon (4)State’s highest security prison (10)Medal awarded for bravery to gardaí (5)Horse-riding section of the force (7,4)...

CYBER THREATS 2025-01-03

CYBER THREATS crossword puzzle
Across
  1. Attack A security breach where an attacker intercepts and potentially alters the communication between two parties without their knowledge.
  2. A technique where attackers impersonate another device, user, or website to deceive individuals or systems, often for malicious purposes.
  3. A cyber attack that redirects a website’s traffic to a fraudulent website, often to steal sensitive information like passwords and credit card numbers.
  4. Threat A security risk posed by individuals within an organization who misuse their access to harm the company or its data.
  5. Attack A cyber attack that occurs when a user unknowingly visits a compromised website that automatically downloads malicious software to their device.
Down
  1. Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.
  2. The act of taking advantage of a vulnerability in a system or software to gain unauthorized access or perform harmful actions.
  3. Scripting (XSS) A vulnerability that allows attackers to inject malicious scripts into web pages viewed by others, often to steal sensitive data.
  4. Attack A cyber attack that targets a vulnerability in software or hardware that is unknown to the vendor or security community, leaving no time for a fix or patch.
  5. Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information.

10 Clues: Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information....

Shirley Homes 2022-11-23

Shirley Homes crossword puzzle
Across
  1. pdf, exe, jpeg or gif
  2. Anna's boyfriend, to his friends
  3. put something on the internet
  4. show something is true
  5. Shirley's sandwich 1/2
  6. Who has Gucci shoes?
  7. Shirley's sandwich 2/2
  8. Shirley's other name
Down
  1. The Thames
  2. What is Shirley's last name?
  3. Sparkn'_____
  4. get something from the internet
  5. things that you do to keep a place, or a computer, safe
  6. the Chinese Bank
  7. the cyber thief

15 Clues: The ThamesSparkn'_____the cyber thiefthe Chinese BankWho has Gucci shoes?Shirley's other namepdf, exe, jpeg or gifshow something is trueShirley's sandwich 1/2Shirley's sandwich 2/2What is Shirley's last name?put something on the internetget something from the internetAnna's boyfriend, to his friends...

BST crossword 2024-01-19

BST crossword crossword puzzle
Across
  1. clap along if you feel like a room without a roof because I'm _ _ _ _ _
  2. pilots your body
  3. the closest star
  4. What do you feed seals?
  5. elephant with big ears
  6. Science and Technology
  7. opposite of blue
  8. a shooting star
Down
  1. 60+% of you body is made of this
  2. an elegant pen made from a feather
  3. a pig friends with a spider
  4. fifth planet
  5. Security
  6. handheld computer
  7. Both human and machine

15 Clues: Securityfifth planeta shooting starpilots your bodythe closest staropposite of bluehandheld computerelephant with big earsScience and TechnologyBoth human and machineWhat do you feed seals?a pig friends with a spider60+% of you body is made of thisan elegant pen made from a feather...

Techromatic CrossWord Challenge 2022-02-11

Techromatic CrossWord Challenge crossword puzzle
Across
  1. Pod 1 client
  2. Need to pay
  3. What Tracy wants to do
  4. Best MSP in the world
  5. A better way to do blank
Down
  1. A core Techromatic Value
  2. A core Techromatic Value
  3. New member of the team
  4. Paul's new favorite drink
  5. Method for identifying spam
  6. Blank Security
  7. What Waldemar likes to work on

12 Clues: Need to payPod 1 clientBlank SecurityBest MSP in the worldNew member of the teamWhat Tracy wants to doA core Techromatic ValueA core Techromatic ValueA better way to do blankPaul's new favorite drinkMethod for identifying spamWhat Waldemar likes to work on

PLP 160 Freshman Class - 2021 2021-10-04

PLP 160 Freshman Class - 2021 crossword puzzle
Across
  1. Pasadena Rose Parade volunteer
  2. Speaks fluent Arabic
  3. Papa Murphy's Supervisor
  4. CIS Major with Emphasis in Cyber Security
  5. Future Marine Biologist
  6. Captain of HS Varsity Baseball Team
  7. USA National Miss Colorado Teen 3032
  8. business owner
  9. Pueblo Police Department Explorer
  10. Future Veterinarian
Down
  1. HS Drum Major
  2. Youth Rep for Center for American Values
  3. HS Dance Team Captain
  4. Kane Scholarship Recipient
  5. Certified Barista
  6. HS IB Learner Profile Awardee for Knowledge
  7. Boys and Girls Club Youth of the Year Winner
  8. CSUP Woman's Swim Team member
  9. Upward Bound Student of the Year
  10. HS Student Body President

20 Clues: HS Drum Majorbusiness ownerCertified BaristaFuture VeterinarianSpeaks fluent ArabicHS Dance Team CaptainFuture Marine BiologistPapa Murphy's SupervisorHS Student Body PresidentKane Scholarship RecipientCSUP Woman's Swim Team memberPasadena Rose Parade volunteerUpward Bound Student of the YearPueblo Police Department Explorer...

A&F IT July Crossword 2022-07-05

A&F IT July Crossword crossword puzzle
Across
  1. Scary New England author
  2. Assistant SCIO
  3. Latest supreme court justice
  4. What Elon makes
  5. Winter's call8ng card
  6. Building where Boston state offices are
  7. Mandatory security training for tech folks
  8. SCIO
  9. Assistant SCIO
  10. Where MITC is located
  11. Where Charlie works
  12. Popular summer vacation destination
Down
  1. When leaves turn colors
  2. Gru's yellow friends
  3. Fenway boys
  4. "You're gonna need a bigger...."
  5. Microsoft's place to meet
  6. Doctor who rules the multiverse
  7. Bobby of hockey fame
  8. Famed New England Quarterback
  9. What gets signed in July
  10. The 16th president
  11. Prestigious Massachusetts University

23 Clues: SCIOFenway boysAssistant SCIOAssistant SCIOWhat Elon makesThe 16th presidentWhere Charlie worksGru's yellow friendsBobby of hockey fameWinter's call8ng cardWhere MITC is locatedWhen leaves turn colorsScary New England authorWhat gets signed in JulyMicrosoft's place to meetLatest supreme court justiceFamed New England Quarterback...

Cybersecurity Terms 2023-07-24

Cybersecurity Terms crossword puzzle
Across
  1. trustable storage of sensitive information
  2. prevents attacks to computer
  3. debris from electronic devices
  4. voice, face, retina, fingerprint
  5. acronym for uninterruptible power supply
  6. providing validation for access
  7. changes device's address
  8. cyber attackers with no knowledge
Down
  1. emails designed for advertisement
  2. dangerous software that will duplicate
  3. believe they're doing right
  4. dangerous software that causes corruption
  5. theft "is not a joke Jim"
  6. threats to security
  7. result in loss or injury
  8. makes authentication more powerful
  9. another term: black hat hackers
  10. looks harmless, infects device
  11. searching data to uncover information
  12. how much cybersecurity costs annually

20 Clues: threats to securityresult in loss or injurychanges device's addresstheft "is not a joke Jim"believe they're doing rightprevents attacks to computerdebris from electronic deviceslooks harmless, infects deviceanother term: black hat hackersproviding validation for accessvoice, face, retina, fingerprintemails designed for advertisement...

Cyber Security CrossWord Puzzel 2021-03-02

Cyber Security CrossWord Puzzel crossword puzzle
Across
  1. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. _______________ is any crime perpetrated using computers and networks.
  3. A__________ monitored a network, blocking dangerous content such as viruses.
  4. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. Viruses, trojans and worms are examples of __________________________.
  6. An ethical hacker.
  7. Your favorite teacher.
  8. A statement of an intention to inflict harm or damage .
Down
  1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. Your favorite class.
  3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. The exposure to the possibility of the attacked or harmed.
  5. Actual action that causes harm or damage.
  6. A blend between an ethical hacker and a cracker.
  7. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. An action taken to counteract the threat.
  9. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.

17 Clues: An ethical hacker.Your favorite class.Your favorite teacher.Actual action that causes harm or damage.An action taken to counteract the threat.A blend between an ethical hacker and a cracker.A statement of an intention to inflict harm or damage .The exposure to the possibility of the attacked or harmed....

Cyber Security 2023-10-08

Cyber Security crossword puzzle
Across
  1. Ruang Di Mana Komunitas Saling Terhubung
  2. Tantangan Cyber Security
  3. Salah Satu Kejahatan Cyber
Down
  1. Salah Satu Solusi Untuk Mencegah Kejahatan Cyber
  2. Salah Satu Bentuk Malware

5 Clues: Tantangan Cyber SecuritySalah Satu Bentuk MalwareSalah Satu Kejahatan CyberRuang Di Mana Komunitas Saling TerhubungSalah Satu Solusi Untuk Mencegah Kejahatan Cyber

Ks3 - Threats and Preventions 2025-06-13

Ks3 - Threats and Preventions crossword puzzle
Across
  1. Malware that tricks you into downloading it by pretending to be something safe.​
  2. Software detecting cyber threats
  3. The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
  4. Attack security vulnerabilities
  5. Fake email for stealing data
  6. Malware which spreads by itself across computers and networks
  7. Malicious program holding data hostage
  8. Short for malicious software, harmful software installed on a computer without permission.
  9. Unauthorized access attempt
Down
  1. Secret key for authentication
  2. To trick people into illegally obtaining sensitive data.
  3. When a hacker tries lots of different passwords very quickly.
  4. Digital fingerprint identifier
  5. Scrambles data for security

14 Clues: Scrambles data for securityUnauthorized access attemptFake email for stealing dataSecret key for authenticationDigital fingerprint identifierAttack security vulnerabilitiesSoftware detecting cyber threatsMalicious program holding data hostageTo trick people into illegally obtaining sensitive data....

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. Congressional act that created the CFPB
  2. ALTA response to Dodd-Frank Act
  3. Part of Pillar 3
  4. One type of fraud which targets settlement agents
  5. Acronym for American Land Title Association
  6. Process of reporting unclaimed or aged funds to governmental authorities
  7. Examples include recording, trust, escrow, premium
  8. Popular settlement & accounting software program
  9. The______________of Compliance
  10. Accounting transaction that have not cleared the bank
Down
  1. Regulatory body that enforces RESPA rules
  2. Fraud detection tool offered by banks
  3. Part of Pillar 3
  4. Acronym for Third Party Signing Professionals
  5. One type of Third Party Signing Professional
  6. One component of a monthly 3-way reconciliation
  7. Discriminatory mortgage lending practice
  8. Secured method of transmitting NPI
  9. Required for employees with access to NPI
  10. Can be considered a trust account shortage
  11. One form of computer security
  12. Fined $100 million by CFPB in 2016
  13. Internal security policy regarding paper files & NPI
  14. Acronyn for Non-public Personal Information

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. Accounting transactions that have not cleared the bank
  2. Internal security policy regarding paper files & NPI
  3. Congressional act that created the CFPB
  4. One form of computer security
  5. Popular settlement & accounting software program
  6. Discriminatory mortgage lending practice
  7. Part of Pillar 3
  8. Fraud detection tool offered by banks
  9. Regulatory body that enforces RESPA rules
  10. Acronyn for Non-public Personal Information
  11. Fined $100 million by CFPB in 2016
  12. Can be considered a trust account shortage
  13. One type of fraud which targets settlement agents
  14. Part of Pillar 3
  15. Acronym for Third Party Signing Professionals
  16. Required for employees with access to NPI
Down
  1. ALTA response to Dodd-Frank Act
  2. Process of reporting unclaimed or aged funds to governmental authorities
  3. Secured method of transmitting NPI
  4. Examples include recording, trust, escrow, premium
  5. One component of a monthly 3-way reconciliation
  6. The______________of Compliance
  7. One type of Third Party Signing Professional
  8. Acronym for American Land Title Association

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. One form of computer security
  2. Congressional act that created the CFPB
  3. Secured method of transmitting NPI
  4. One component of a monthly 3-way reconciliation
  5. Regulatory body that enforces RESPA rules
  6. Part of Pillar 3
  7. Popular settlement & accounting software program
  8. Acronyn for Non-public Personal Information
  9. Acronym for Third Party Signing Professionals
  10. Part of Pillar 3
  11. Required for employees with access to NPI
  12. The______________of Compliance
  13. Internal security policy regarding paper files & NPI
Down
  1. ALTA response to Dodd-Frank Act
  2. Examples include recording, trust, escrow, premium
  3. Acronym for American Land Title Association
  4. Discriminatory mortgage lending practice
  5. Fraud detection tool offered by banks
  6. Can be considered a trust account shortage
  7. Fined $100 million by CFPB in 2016
  8. Accounting transaction that have not cleared the bank
  9. Process of reporting unclaimed or aged funds to governmental authorities
  10. One type of fraud which targets settlement agents
  11. One type of Third Party Signing Professional

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

Escape Room Crossword 2025-10-29

Escape Room Crossword crossword puzzle
Across
  1. What you do when there's been an infraction
  2. A place where books are kept
  3. You must keep you sensitive information ______-up!
Down
  1. Cyber ________, is what you need to stay safe online
  2. Type of security that involves our buildings
  3. Using a ________ will protect your data
  4. A code-powered thinker with answers at lightning speed
  5. The type of security you need to apply when on vacation

8 Clues: A place where books are keptUsing a ________ will protect your dataWhat you do when there's been an infractionType of security that involves our buildingsYou must keep you sensitive information ______-up!Cyber ________, is what you need to stay safe onlineA code-powered thinker with answers at lightning speed...

Cyber-security Awareness Month 2022-10-06

Cyber-security Awareness Month crossword puzzle
Across
  1. Do this before you click.
  2. Requires more than a password to access.
  3. You can use this to help remember passwords.
  4. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. You should do this when you walk away from your computer.
  6. abv. Personal Identifiable Information.
  7. The most common malware.
  8. Our cyber-security training tool.
Down
  1. When someone, without proper credentials, follows you into a restricted building or area.
  2. An email with malicious intent.
  3. How to send sensitive files via email.
  4. Must be strong to prevent unwanted access.
  5. The best time to run updates.
  6. abv. for Information Security Officer
  7. The first line of offense against malware.
  8. A piece of code capable of copying itself and corrupting systems and data.
  9. The best way to keep sensitive information.

17 Clues: The most common malware.Do this before you click.The best time to run updates.An email with malicious intent.Our cyber-security training tool.abv. for Information Security OfficerHow to send sensitive files via email.abv. Personal Identifiable Information.Requires more than a password to access.Must be strong to prevent unwanted access....

Module 3: Crossword Puzzle 2 2021-11-07

Module 3: Crossword Puzzle 2 crossword puzzle
Across
  1. Acronym for a group f people in an organization responsible to respond to cyber security incidents.
  2. ____ AI relies on training data to develop analysis capability, the threat actor may be able to submit tainted samples.
  3. Acronym for a powerful all-in-one tool that can perform incident response and threat hunting.
  4. Communication, notification, and reporting is crucial with internal and external _____
  5. Facilitator presents a scenario; does not involve a live system.
  6. _____ is the second item in the Cyber Kill Chain Attack Framework.
Down
  1. Responders demonstrate response actions during a ____
  2. Most network, OS, and security applications will have these, it is something you will want to review and audit. Can be automated or reviewed manually.
  3. Isolate suspected system for analysis in a sandbox.
  4. Acronym for a mechanism to identify if and when an attempt was made to extract files to an unauthorized medium.
  5. An acronym for responding and recovery planning for major incidents.

11 Clues: Isolate suspected system for analysis in a sandbox.Responders demonstrate response actions during a ____Facilitator presents a scenario; does not involve a live system._____ is the second item in the Cyber Kill Chain Attack Framework.An acronym for responding and recovery planning for major incidents....

crack the code 2024-04-30

crack the code crossword puzzle
Across
  1. A method of cyber attack that involves sending emails with malicious attachments or links (8 letters)
  2. A program designed to prevent, detect, and remove malware (10 letters)
  3. Testing The process of identifying and fixing security vulnerabilities in a computer system (10 letters) Penetration Testing
  4. A technique used to secure wireless networks (11 letters)
  5. Protects a computer system from unauthorized access (9 letters)
Down
  1. A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)
  2. Authentication A security measure that verifies the authenticity of a user attempting to log in (14 letters)
  3. Detection A security measure that tracks and analyzes network traffic to detect and prevent unauthorized access (9 letters)
  4. A method of protecting sensitive data by converting it into a code that can only be deciphered with a key (9 letters)
  5. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)

10 Clues: A technique used to secure wireless networks (11 letters)Protects a computer system from unauthorized access (9 letters)A program designed to prevent, detect, and remove malware (10 letters)A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)...

workshop 2021-04-10

workshop crossword puzzle
Across
  1. informations- och kommunikationsteknik
  2. ingenjörens viktigaste skicklighet
  3. titel som ska tas emot efter examen
  4. Nätverk ingenjör
  5. när du använder internet är du ansluten till detta
  6. tidigare programvarateknik
Down
  1. KVM, Hyper-V, VMWare, Virtualbox
  2. nuvarande 'cyber security'
  3. till exempel en 'Zoom' anslutning
  4. C++, C#, java och python
  5. ingår inte längre i IKT-studier
  6. det kan lösä problem
  7. dessa kan säkerställa programvarans funktionalitet

13 Clues: Nätverk ingenjördet kan lösä problemC++, C#, java och pythonnuvarande 'cyber security'tidigare programvarateknikingår inte längre i IKT-studierKVM, Hyper-V, VMWare, Virtualboxtill exempel en 'Zoom' anslutningingenjörens viktigaste skicklighettitel som ska tas emot efter exameninformations- och kommunikationsteknik...

3°4 jobs 2025-2026 2025-11-25

3°4 jobs 2025-2026 crossword puzzle
Across
  1. a person who installs and repairs air-conditioning systems.
  2. a person who helps patients with daily care in hospitals.
  3. a person who sells and arranges flowers.
  4. a person who repairs cars and engines.
  5. a person who builds or repairs houses.
  6. a person who helps with young children in a nursery.
  7. a person who welcomes people in a company or office.
  8. a person who gives medical care to patients.
  9. a person who cuts and styles hair.
  10. a person who fixes and looks after buildings.
Down
  1. a person who cares for skin, nails and beauty treatments.
  2. a person who takes care of children at home.
  3. a person who helps customers in a shop.
  4. a person who designs and takes care of gardens.
  5. a person who protects computers from cyber attacks.
  6. a person who prepares meals.

16 Clues: a person who prepares meals.a person who cuts and styles hair.a person who repairs cars and engines.a person who builds or repairs houses.a person who helps customers in a shop.a person who sells and arranges flowers.a person who takes care of children at home.a person who gives medical care to patients.a person who fixes and looks after buildings....

Prestige Cybersecurity Awareness Month 2025-10-16

Prestige Cybersecurity Awareness Month crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. A type of cyber attack that tricks users into revealing personal information
  3. The principle of ensuring data is not altered or tampered with
  4. A software update that fixes security vulnerabilities
  5. Malware that locks data and demands payment for release
  6. A file or program that appears harmless but contains malicious code
  7. Software designed to disrupt, damage, or gain unauthorized access
  8. The process of converting data into a coded form to prevent unauthorized access
Down
  1. The practice of hiding messages so only the intended recipient can read them
  2. Software that secretly gathers user information
  3. A person who gains unauthorized access to systems for malicious purposes
  4. An extra layer of security requiring two forms of identification
  5. A secret word or phrase used to gain access
  6. A fake website or email designed to look legitimate
  7. A service that encrypts your internet connection for privacy

15 Clues: A secret word or phrase used to gain accessSoftware that secretly gathers user informationA fake website or email designed to look legitimateA software update that fixes security vulnerabilitiesMalware that locks data and demands payment for releaseA service that encrypts your internet connection for privacy...

IVGM 2022-11-26

IVGM crossword puzzle
Across
  1. Foundations of Cyber Security
  2. Information Society Principles: towards e-Governance
  3. E-Governance Technologies and Services Master's Project
  4. Introduction to IT and eGov Technologies
  5. Introduction to Development in Cloud
  6. Enterprise Architecture and BPM
  7. Governing in the Digital Era
  8. Creating Innovation Capacities in Government
Down
  1. Basics of e-Health
  2. Impact and Measurement of e-Governance
  3. IT Solutions of e-government
  4. Information Systems Programming
  5. Legal Framework of e-Governance
  6. International Entrepreneurship
  7. Estonian Language and Culture

15 Clues: Basics of e-HealthIT Solutions of e-governmentGoverning in the Digital EraFoundations of Cyber SecurityEstonian Language and CultureInternational EntrepreneurshipInformation Systems ProgrammingLegal Framework of e-GovernanceEnterprise Architecture and BPMIntroduction to Development in CloudImpact and Measurement of e-Governance...

IEM's October Social Media Crossword Puzzle 2021-10-21

IEM's October Social Media Crossword Puzzle crossword puzzle
Across
  1. Wash your hands with _____ and water
  2. October is ________ Awareness Month
  3. IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
  4. Important tool to protect your family during a fire emergency
  5. Theme of hurricane preparedness tip
  6. IEMer moderating FEAM Forum Panel at IAEM (last name)
  7. Sites opening across Virginia
  8. International Day for Disaster ______
Down
  1. Great Shake Out Drill
  2. Cyber attack
  3. FEMA Administrator (last name)
  4. 246th Birthday
  5. Committed to stabilizing ______ security
  6. NEMA 2021 Annual Forum
  7. ______ Week
  8. Annual Conference in Grand Rapids, MI
  9. Conferences are an opportunity to…

17 Clues: ______ WeekCyber attack246th BirthdayGreat Shake Out DrillNEMA 2021 Annual ForumSites opening across VirginiaFEMA Administrator (last name)Conferences are an opportunity to…October is ________ Awareness MonthTheme of hurricane preparedness tipWash your hands with _____ and waterAnnual Conference in Grand Rapids, MI...

KN - TACOHAI - G8 - 2ND TERM - FINAL REVIEW 1 - 240424 2024-04-24

KN - TACOHAI - G8 - 2ND TERM - FINAL REVIEW 1 - 240424 crossword puzzle
Across
  1. V đánh giá
  2. N | Adj (N) dòng điện | (Adj) thuộc về điện
  3. V | N ấn nhẹ, gõ nhẹ, búng nhẹ | (N) cú ấn nhẹ, cái gõ nhẹ, cái đập nhẹ (eg. with the ... of a switch)
  4. N điện lực, điện (nói chung)
  5. N sự cháy điện
  6. V phát minh
  7. N tín hiệu giao thông
  8. N khí nhà kính
  9. combining form mạng (eg. cyberbully, cyber-security,..)
  10. N sự phát minh
Down
  1. V giật điện, giết (bằng dòng điện)
  2. N mức năng lượng của tác giả
  3. N sự giật điện, sự bị điện giật chết
  4. N đa truyền thông (sự kết hợp cả âm thanh, hình ảnh, chữ viết.. trên màn hình hiển thị)
  5. Adj đầy năng lượng, năng nổ, giàu năng lượng (eg. an ... Supporter)
  6. N phương tiện truyền thông
  7. N bão lớn Thái Bình Dương <a violent tropical storm with very strong winds> (Hurricane: bão lớn Đại Tây Dương)
  8. Adj (= imaginative) đầy sáng tạo, có óc sáng tạo, giảu trí tưởng tượng
  9. Adj bằng lời nói, bằng miệng (>< nonverbal, written)
  10. V truy cập

20 Clues: V đánh giáV truy cậpV phát minhN sự cháy điệnN khí nhà kínhN sự phát minhN tín hiệu giao thôngN phương tiện truyền thôngN mức năng lượng của tác giảN điện lực, điện (nói chung)V giật điện, giết (bằng dòng điện)N sự giật điện, sự bị điện giật chếtN | Adj (N) dòng điện | (Adj) thuộc về điệnAdj bằng lời nói, bằng miệng (>< nonverbal, written)...

Workforce or College 2023-05-25

Workforce or College crossword puzzle
Across
  1. 2 year degree
  2. career from 2 year degree
  3. training from an apprenticeship
  4. 4 year degree
  5. career from 4 year degree
Down
  1. less than a year
  2. working for your future employer
  3. security of the web for military
  4. serving our country
  5. career from technical certificate

10 Clues: 2 year degree4 year degreeless than a yearserving our countrycareer from 2 year degreecareer from 4 year degreetraining from an apprenticeshipworking for your future employersecurity of the web for militarycareer from technical certificate

Netiquette 2023-09-14

Netiquette crossword puzzle
Across
  1. always having capslock on
  2. A strong opinion directed at someone else
  3. When Online use proper_________
  4. A lot of Junk Emails
  5. When Online Treat others how You want to be_________
  6. _______ security
Down
  1. _______info is not to be freely distributed
  2. Remember the ____________
  3. Network Etiquette
  4. Respect others _________

10 Clues: _______ securityNetwork EtiquetteA lot of Junk EmailsRespect others _________Remember the ____________always having capslock onWhen Online use proper_________A strong opinion directed at someone else_______info is not to be freely distributedWhen Online Treat others how You want to be_________

Cyber Security quiz 2022-12-19

Cyber Security quiz crossword puzzle
Across
  1. minus 273.15 degrees is
  2. What school?
  3. The white what?
  4. What resource?
  5. Michael Knights car
Down
  1. His profession
  2. Who's the good?
  3. Main characters first name
  4. Main characters callsign
  5. Busting what?
  6. Creative imaginary work

11 Clues: What school?Busting what?His professionWhat resource?Who's the good?The white what?Michael Knights carminus 273.15 degrees isCreative imaginary workMain characters callsignMain characters first name

Cyber Security Revision 2024-10-10

Cyber Security Revision crossword puzzle
Across
  1. Part of the Internet that can be accessed using a search engine.
  2. A way of convincing people to give up personal information.
  3. A way of strengthening logins by sending a code to a phone or email.
  4. A simple (and very old) method of encryption where the alphabet is shifted.
Down
  1. Part of the Internet that is unmonitored and often contains illegal content.
  2. A way of jumbling up data so it is unreadable.
  3. Type of hacker that commits illegal actions.
  4. A small piece of software designed to cause damage.
  5. Type of hacker who commits illegal actions but for the greater good.
  6. Part of the Internet hidden behind logins, etc.
  7. Type of hacker who legally hacks, often to test networks.

11 Clues: Type of hacker that commits illegal actions.A way of jumbling up data so it is unreadable.Part of the Internet hidden behind logins, etc.A small piece of software designed to cause damage.Type of hacker who legally hacks, often to test networks.A way of convincing people to give up personal information....

CYBER SECURITY CROSSWORD 2025-09-24

CYBER SECURITY CROSSWORD crossword puzzle
Across
  1. A way to lock your data so only the right person can read it.
  2. Keeping your personal information safe and not sharing it without permission.
  3. A security step where you need two things (like a password and a code) to log in.
  4. A machine that cuts paper into tiny pieces so no one can read it.
  5. Malicious software that can damage your computer or steal your data.
  6. A secret word or code you use to log in and keep your accounts safe.
Down
  1. A program that finds and removes harmful software from your device.
  2. A tool that protects your computer by blocking unwanted internet traffic.
  3. A sneaky program that watches what you do on your computer without you knowing.
  4. A small update that fixes problems or security holes in software.
  5. A trick where someone pretends to be trustworthy to steal your personal info.

11 Clues: A way to lock your data so only the right person can read it.A small update that fixes problems or security holes in software.A machine that cuts paper into tiny pieces so no one can read it.A program that finds and removes harmful software from your device.Malicious software that can damage your computer or steal your data....

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. gain unauthorized access to a computer system
  2. capable of being easily hurt
  3. refers to any external entity who may have access to private data
  4. security risk who cause the program to crash
  5. network of maliciously installed bots
  6. records or transmits a user's keystrokes
Down
  1. cyber exploit directed at online card players
  2. unauthorized duplication or deletion of an organization's electronic information
  3. security mechanism for separating running programs
  4. software tools used by a third party

10 Clues: capable of being easily hurtsoftware tools used by a third partynetwork of maliciously installed botsrecords or transmits a user's keystrokessecurity risk who cause the program to crashcyber exploit directed at online card playersgain unauthorized access to a computer systemsecurity mechanism for separating running programs...

soal 4.0 2023-10-24

soal 4.0 crossword puzzle
Across
  1. salah satu teknologi di industri 4.0 yang sangat berguna saat ini
  2. Alat Iot yang kegunaanya memudahkan dirumah
  3. Teknologi inti dari Industri 4.0
  4. Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
  5. Data besar yang kompleks yang dianalisis dalam industri 4.0
  6. Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
  1. Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
  2. Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
  3. Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
  4. Revolusi industri saat ini

10 Clues: Revolusi industri saat iniTeknologi inti dari Industri 4.0Alat Iot yang kegunaanya memudahkan dirumahData besar yang kompleks yang dianalisis dalam industri 4.0salah satu teknologi di industri 4.0 yang sangat berguna saat iniAlat atau kebijakan yang berguna untuk melindungi lingkungan cyber...

Cyber Security Juniors 2020-11-10

Cyber Security Juniors crossword puzzle
Across
  1. virus software, programs that scan your computer
  2. system of computers and devices
  3. method of changing a message to conceal meaning
  4. secret word or phrase
  5. information, personal facts about you
  6. system of symbols usually letters and numbers
Down
  1. person who secretly gets access to computer info
  2. a system of rules that explains correct steps
  3. word or phrase entered into devises
  4. unwanted emails
  5. copying a file from one computer to another

11 Clues: unwanted emailssecret word or phrasesystem of computers and devicesword or phrase entered into devisesinformation, personal facts about youcopying a file from one computer to anothera system of rules that explains correct stepssystem of symbols usually letters and numbersmethod of changing a message to conceal meaning...

Cyber security revision 2021-11-05

Cyber security revision crossword puzzle
Across
  1. a wall on fire
  2. sounds like capture
  3. Covid-19
  4. a insect that wriggles around
  5. my anti has a virus
Down
  1. a big horse
  2. unique to you
  3. something you need to login to a device
  4. looking at someone password over their shoulder
  5. fishing
  6. always check

11 Clues: fishingCovid-19a big horsealways checkunique to youa wall on firesounds like capturemy anti has a virusa insect that wriggles aroundsomething you need to login to a devicelooking at someone password over their shoulder

CyberQuiz 2024-02-05

CyberQuiz crossword puzzle
Across
  1. Software that detects and removes malicious programs on a computer
  2. Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
  3. System designed to mimic a vulnerable resource to attract and monitor cyber attacks
  4. Malware that encrypts user data, demanding payment for decryption
  5. Secret or hidden access point in a system, often used to bypass normal authentication
  6. Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
  1. Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
  2. Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
  3. Weakness or flaw in a system that could be exploited for unauthorized access
  4. A sequence of characters used for authentication to access a system or account
  5. Hidden part of the internet associated with illicit activities and anonymity
  6. Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
  7. Security system that monitors and controls network traffic
  8. Team Defensive cybersecurity team responsible for protecting a system or network.
  9. Network of compromised computers controlled by a single entity for malicious activities

15 Clues: Security system that monitors and controls network trafficMalware that encrypts user data, demanding payment for decryptionSoftware that detects and removes malicious programs on a computerWeakness or flaw in a system that could be exploited for unauthorized accessHidden part of the internet associated with illicit activities and anonymity...

Cyber Security Juniors 2020-11-13

Cyber Security Juniors crossword puzzle
Across
  1. a secret word or phrase
  2. programs that scan your computer
  3. a sysytem of rules that explain correct steps
  4. a system of rules that explains correct steps
  5. person who secretly gets access to computer info
  6. method of changing a message to conceal meaning
Down
  1. unwanted emails
  2. personal facts about you
  3. copying a file from one computer to another
  4. system of computers and devices
  5. a word or phrase entered into a device

11 Clues: unwanted emailsa secret word or phrasepersonal facts about yousystem of computers and devicesprograms that scan your computera word or phrase entered into a devicecopying a file from one computer to anothera sysytem of rules that explain correct stepsa system of rules that explains correct stepsmethod of changing a message to conceal meaning...

cyber security crossword 2022-11-28

cyber security crossword crossword puzzle
Across
  1. is any software that installs itself on your computer and starts covertly monitoring your online behaviour without your knowledge or permission.
  2. is any malware that misleads users of its true intent.
  3. manipulation technique that exploits human error to gain private information, access, or valuables.
Down
  1. Distributed denial of service attack
  2. is a malware designed to deny a user or organization access to files on their computer
  3. is a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
  4. is unwanted software designed to throw advertisements up on your screen, most often within a web browser.
  5. As software designed to interfere with a computer's normal functioning
  6. spreads across a network
  7. a set of computers infected by bots.
  8. a piece of code which is capable of copying itself e.g. corrupting the system or destroying data.

11 Clues: spreads across a networkDistributed denial of service attacka set of computers infected by bots.is any malware that misleads users of its true intent.As software designed to interfere with a computer's normal functioningis a malware designed to deny a user or organization access to files on their computer...

Reliability Compliance 2017-06-01

Reliability Compliance crossword puzzle
Across
  1. IF YOU DON'T KNOW, _____.
  2. CRITICAL INFRASTRUCTURE PROTECTION
  3. TIME ALLOWED TO REPORT A CYBER SECURITY INCIDENT
  4. REPORT SUSPICIOUS EVENTS TO THE _________ _______.
  5. _____________ NEEDS TO BE KEPT CURRENT.
Down
  1. REPEAT AND GET CONFIRMATION
  2. FOLLOW ALL _____________.
  3. RELIABILITY COMPLIANCE OFFICE
  4. ________ FIRST!

9 Clues: ________ FIRST!IF YOU DON'T KNOW, _____.FOLLOW ALL _____________.REPEAT AND GET CONFIRMATIONRELIABILITY COMPLIANCE OFFICECRITICAL INFRASTRUCTURE PROTECTION_____________ NEEDS TO BE KEPT CURRENT.TIME ALLOWED TO REPORT A CYBER SECURITY INCIDENTREPORT SUSPICIOUS EVENTS TO THE _________ _______.

CYBER SECURITY-CROSSWORD PUZZLE 2025-09-25

CYBER SECURITY-CROSSWORD PUZZLE crossword puzzle
Across
  1. Self Replicating malicious software
  2. Ignoring the request
  3. Too many mails at a time
  4. The potential for negative consequences
  5. A piece of code, or method that leverages a vulnerability) in H/W or S/W to gain unauthorized access or steal data.
  6. An attacker capturing and inspecting data packets as they travel across a network to steal sensitive information
  7. a criminal uses pre-compiled list of common words
  8. cybercriminal impersonates a trusted entity
  9. A broker who misuses data
Down
  1. Destroy the data or assets
  2. A malicious activity that seeks to damage/steal/gain unauthorized access to data
  3. Use people skills to steal information
  4. Weakness or security gaps in a system
  5. Attract you will some benefit for their benefit
  6. keep it as a secret
  7. known as a wordlist, to guess a user's password for a website or system.

16 Clues: keep it as a secretIgnoring the requestToo many mails at a timeA broker who misuses dataDestroy the data or assetsSelf Replicating malicious softwareWeakness or security gaps in a systemUse people skills to steal informationThe potential for negative consequencescybercriminal impersonates a trusted entity...

TMGT 7123 Review 2016-10-31

TMGT 7123 Review crossword puzzle
Across
  1. a network that connects head office with a branch office
  2. used by organizations to better manage their IT
  3. what is used in a relational database to uniquely identify a table
  4. an unstructured database such as Cassandra
  5. An example of a wireless technology similar to RFID
  6. cabling standard for building networks based on IEEE standard
  7. the predecessor to Enterprise Resource Planning systems
  8. the person in an organization that is responsible for creating an IT roadmap
  9. A research organization that produces findings like Magic Quadrants
  10. a network devices than connects two different networks together
  11. device or algorithms used by organizations to prevent cyber attacks
Down
  1. a system development methodology
  2. what organizations do to acquire software
  3. an example of a disruptive technology and is used by billions of users
  4. volatile memory used by computing devices
  5. the type of security that is of most concern to e-commerce companies
  6. waterfall is an example of this
  7. the successor to MRP
  8. an organization’s expectations for when it would be able to operate after a disaster
  9. Open System Interconnection

20 Clues: the successor to MRPOpen System Interconnectionwaterfall is an example of thisa system development methodologywhat organizations do to acquire softwarevolatile memory used by computing devicesan unstructured database such as Cassandraused by organizations to better manage their ITAn example of a wireless technology similar to RFID...

online safety 2024-10-04

online safety crossword puzzle
Across
  1. something to do after you've been attacked
  2. to keep you safe
  3. where you can get attacked
  4. A software used to cyber attack
Down
  1. something to keep you away from viruses
  2. another word for security
  3. to keep your information safe

7 Clues: to keep you safeanother word for securitywhere you can get attackedto keep your information safeA software used to cyber attacksomething to keep you away from virusessomething to do after you've been attacked

online safety 2024-10-04

online safety crossword puzzle
Across
  1. something to do after you've been attacked
  2. to keep you safe
  3. where you can get attacked
  4. A software used to cyber attack
Down
  1. something to keep you away from viruses
  2. another word for security
  3. to keep your information safe

7 Clues: to keep you safeanother word for securitywhere you can get attackedto keep your information safeA software used to cyber attacksomething to keep you away from virusessomething to do after you've been attacked

Cyber Security - Chapter 1 2020-02-12

Cyber Security - Chapter 1 crossword puzzle
Across
  1. State Sponsored Hackers
  2. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
  4. The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
  5. The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
  6. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  7. is the collection of technologies that enable the connection of various devices to the Internet.
  8. is the result of data sets that are large and complex, making traditional data processing applications inadequate.
  9. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
  10. Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
  1. Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
  2. Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  3. This group of criminals breaks into computers or networks to gain access for various reasons.
  4. The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
  5. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.

15 Clues: State Sponsored HackersThis group of criminals breaks into computers or networks to gain access for various reasons.is the collection of technologies that enable the connection of various devices to the Internet.Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards....

Cyber Security Crossword 2017-09-19

Cyber Security Crossword crossword puzzle
Across
  1. Always use UTC's ______ access solution to connect to the UTC network when using an unsecure wireless network. This ensures that any data sent or received over the wireless network is encrypted and protected.
  2. 87% of what enter through email attachments and links and have cost companies upwards of $300,000,000? This is also the name for a computer program that is designed to gain access, replicate to peer computers, and do a specific task (like send spam), as well as many other malicious behaviors.
  3. Which department should you get approval from when downloading software?
  4. A red flag of a phishing email can be an unknown ____ address.
  5. What is a type of computer malware that typically infects a computer through a successful email phishing attempt? This can block access to files on the computer using encryption and attempts to spread to other systems on the network.
  6. How many characters should an ideal password have at the least?
Down
  1. When you receive a suspicious (spam/phishing) email you should click on the '_______ Phishing' button.
  2. Social _____________ is a scam where an attacker attempts to gain the trust of the target, typically over the phone but it could be in person or through email, with the goal of obtaining information.
  3. You cannot save company information on what kind of devices?
  4. Do not use the same ________ for everything.
  5. If you need to transfer a large file you should you your business unit’s ___ solution?

11 Clues: Do not use the same ________ for everything.You cannot save company information on what kind of devices?A red flag of a phishing email can be an unknown ____ address.How many characters should an ideal password have at the least?Which department should you get approval from when downloading software?...

cyber security crossword 2025-04-09

cyber security crossword crossword puzzle
Across
  1. These emails try to get your credentials by creating a sense of urgency
  2. A great option for a password manager
  3. Secures account through text/email/etc. (abbreviation)
  4. One of the top cybersecurity companies you can trust
  5. Detects and removes harmful materials on your device
Down
  1. Malware that can harm your computer
  2. Regularly check for _______ on your computer or device
  3. It's good to have a password length of at lest ______
  4. A great to store your credentials would be using a ________ manager
  5. It's a good idea to _____ phishing or scam emails
  6. Good to empty every so often and recover deleted files in

11 Clues: Malware that can harm your computerA great option for a password managerIt's a good idea to _____ phishing or scam emailsOne of the top cybersecurity companies you can trustDetects and removes harmful materials on your deviceIt's good to have a password length of at lest ______Regularly check for _______ on your computer or device...

Cyber Security 2017 2017-10-02

Cyber Security 2017 crossword puzzle
Across
  1. type of malware that has a reproductive capacity to transfer itself from one computer to another spreading infections between online devices.
  2. a type of malware installed on computers that collects information about users with out their knowledge; can collect internet surfing habits, user login and passwords, bank or credit account information and other date entered in to a computer.
  3. the process of adding geographical location, or label to photographs, videos, web sites, SMS messages, OR Codes or RSS feeds.
  4. Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set settings, preventing access by hackers and malicious software; often offered through computer operating systems.
  5. is the action of tracking the keys struck on a computer keyboard.
Down
  1. an alternative form of phishing that occurs via text or SMS message
  2. sending emails that attempt to fraudulently acquire personal information, such as user names, passwords, social security numbers and credit care numbers by masquerading as a trustworthy entity.
  3. type of malware that allows popup ads on a computer system, ultimately taking over a user's internet browsing.
  4. The conversion of digital information into a format unreadable t anyone except those processing a "key" through which the encrypted information is converted back to it's original form, making it readable again.
  5. Short for malicious software, software that disrupts or damages a computer's operation, gathers sensitive or private information , or gains access to private computer systems.
  6. A network of private computers, each of which is called a "bot" infected with malicious software and controlled as a group with out the owners 'knowledge for nefarious and often, criminal purposes; computers are typically infected when users open up an infected attachment of visit an infected website.

11 Clues: is the action of tracking the keys struck on a computer keyboard.an alternative form of phishing that occurs via text or SMS messagetype of malware that allows popup ads on a computer system, ultimately taking over a user's internet browsing....

Cyber Security Vocab 2021-09-23

Cyber Security Vocab crossword puzzle
Across
  1. a form of extortion malware which steals data accompanied by the threat to publish such data unless a ransom is paid; sometimes referred to as doxware
  2. occurs when data is viewed or stolen by an unauthorised third party; sometimes referred to as data ‘compromise’, as distinct from an ‘incident’ where data disclosure is possible, but unconfirmed
  3. the use of the internet to control or disrupt remote physical objects or infrastructure
  4. internet-of-things, a rapidly growing network of physical devices, including but not limited to traditional computing devices, that are connected to the internet allowing for remote data transfer and operation
  5. contraction of ‘malicious software’; software designed to harm or damage a computer system or the interests of the user; includes viruses, worms, Trojans, spyware, ransomware, cryptomining software
  6. an overlay of the open internet using software and/or permissions to limit public access, it operates on a peer- to-peer or encrypted basis, where only trusted parties have access to content and communications; for this reason, it is preferred by criminal organisations and marketplaces where stolen and illicit content and data can be traded, though it has other uses including political discourse and whistleblowing
  7. an attack which takes advantage of a vulnerability or defect in a computer system giving unauthorised access or control to a third party
Down
  1. distributed denial of service attack, whereby many compromised computers simultaneous send data requests to a target machine for the purpose of overwhelming the system resources, thereby making the core functions unavailable to legitimate users
  2. spread generally by unsolicited email, attempts to trick a person into revealing identity credentials, login details or passwords for the purpose of fraud
  3. an unauthorised and unknown access point into a computer system through which a remote attacker can gain access or steal information
  4. separating sensitive or valuable systems or information sources from other parts of a network to reduce the chances of data loss or compromise

11 Clues: the use of the internet to control or disrupt remote physical objects or infrastructurean unauthorised and unknown access point into a computer system through which a remote attacker can gain access or steal information...

Cyber Security Awareness 2025-09-22

Cyber Security Awareness crossword puzzle
Across
  1. Software designed to detect, prevent, and remove malicious software.
  2. A broad term for malicious software designed to cause damage to a computer or network.
  3. Malware that secretly observes your activities without your permission.
  4. A person who uses technical skills to gain unauthorized access to computer systems.
  5. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  6. A type of social engineering attack using fraudulent messages, often by email, to trick people into revealing sensitive information.
Down
  1. A network security device that monitors and filters incoming and outgoing network traffic.
  2. A secret word or phrase used to prove your identity and gain access to a resource.
  3. The process of converting data into a code to prevent unauthorized access.
  4. A type of malware that can replicate itself and spread to other computers on a network.
  5. Malware that disguises itself as a legitimate file or program to trick you into installing it.

11 Clues: Software designed to detect, prevent, and remove malicious software.Malware that secretly observes your activities without your permission.The process of converting data into a code to prevent unauthorized access.A secret word or phrase used to prove your identity and gain access to a resource....

Adventskalender Cyber Security 2025-10-30

Adventskalender Cyber Security crossword puzzle
Across
  1. Person som prøver å bryte seg inn i datasystemer.
  2. Brukes når du forlater PC-en.
  3. Viktig å gjøre ofte for å tette sikkerhetshull.
  4. Det du bruker for å logge inn. Bør være langt og unikt.
  5. Det du kobler deg til – vær forsiktig med åpne versjoner.
Down
  1. Ekstra beskyttelse som krever både passord og bekreftelse.
  2. Hovedtemaet for hele kalenderen.
  3. En trygg kopi av viktige filer.
  4. Enheten mange bruker til både jobb og privat, må sikres.
  5. Det du skal gjøre hvis du oppdager noe mistenkelig.
  6. Forsøk på å lure deg til å gi fra deg informasjon via e-post.

11 Clues: Brukes når du forlater PC-en.En trygg kopi av viktige filer.Hovedtemaet for hele kalenderen.Viktig å gjøre ofte for å tette sikkerhetshull.Person som prøver å bryte seg inn i datasystemer.Det du skal gjøre hvis du oppdager noe mistenkelig.Det du bruker for å logge inn. Bør være langt og unikt.Enheten mange bruker til både jobb og privat, må sikres....

Cyber Security awareness crossword 2023-09-27

Cyber Security awareness crossword crossword puzzle
Across
  1. protects its users by encrypting their data and masking their IP addresses
  2. displays unwanted advertisements and pop-ups
  3. can record and steal consecutive keystrokes
  4. Are you a bot?
  5. A type of malware and a wooden horse
  6. attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
  7. Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
Down
  1. It is a small piece of information that a website stores on your computer
  2. Pay me for your data
  3. a form of malware that hides on your device, monitors your activity, and steals sensitive information
  4. shields your network from malicious or unnecessary network traffic
  5. a security mechanism that creates a virtual trap to lure attackers
  6. Process of verification
  7. send messages pretending to be a trusted person or entity
  8. Malware that self-replicates and infects other computers
  9. a system for malware detection that runs a suspicious object in an isolated environment

16 Clues: Are you a bot?Pay me for your dataProcess of verificationA type of malware and a wooden horsecan record and steal consecutive keystrokesdisplays unwanted advertisements and pop-upsMalware that self-replicates and infects other computerssend messages pretending to be a trusted person or entity...

Basic Concepts 2024-08-18

Basic Concepts crossword puzzle
Across
  1. A weakness in a system that could be exploited to cause harm to the system
  2. The unintended loss of service of an information system
  3. A set of security goals in cyber security
  4. The unintended change of data belonging to an information system
  5. A quality of data which refers to how useful the data is
  6. A quality of data in which the owner or creator is correct
Down
  1. A countermeasure which prevents a threat from exploiting a vulnerability
  2. A quality of security in which data and services are accessable to the authorized parties
  3. Software, data, or commands which take advantage of a vulnerability to cause unintended behavior in a system
  4. The unintended release of confidential information
  5. A quality of security in which data is only modified by those authorized to do so, and in a way in which the data was intended to be modified
  6. A quality of security in which data is only viewable by authorized individuals
  7. Negative consequences of a threat
  8. A quality of data which states who physically controls the media on which data is stored
  9. A person or environmental actor that could cause hard to the system

15 Clues: Negative consequences of a threatA set of security goals in cyber securityThe unintended release of confidential informationThe unintended loss of service of an information systemA quality of data which refers to how useful the data isA quality of data in which the owner or creator is correct...

Cyber Security Day 2021 2021-11-10

Cyber Security Day 2021 crossword puzzle
Across
  1. Cyber security is _________'s responsibility
  2. Never, ever trust this type of wifi
  3. ____________ made OT systems vulnerable
Down
  1. Who's the target for cyber criminals?
  2. Automation means that _____ footage can be leaked
  3. When one factor is not enough (under "Learn how not to be the weakest link")
  4. An insurance company that made ransomware payments

7 Clues: Never, ever trust this type of wifiWho's the target for cyber criminals?____________ made OT systems vulnerableCyber security is _________'s responsibilityAutomation means that _____ footage can be leakedAn insurance company that made ransomware paymentsWhen one factor is not enough (under "Learn how not to be the weakest link")

Wisik 2024-01-13

Wisik crossword puzzle
Across
  1. topologi jaringan yang umum digunakan
  2. terstruktur dan berurutan dari awal sampai akhir
  3. mekanisme pertukaran data
  4. pembobol keamanan (cyber security)
  5. lokal area network
Down
  1. salah satu cakupan tata kelola data
  2. pemancar sinyal wifi
  3. tata kelola data (pengertian)
  4. untuk internetan

9 Clues: untuk internetanlokal area networkpemancar sinyal wifimekanisme pertukaran datatata kelola data (pengertian)pembobol keamanan (cyber security)salah satu cakupan tata kelola datatopologi jaringan yang umum digunakanterstruktur dan berurutan dari awal sampai akhir

EYE OF MINDS 2019-04-26

EYE OF MINDS crossword puzzle
Across
  1. The danger is
  2. Tanya wanted to jump off the
  3. is torn to pieces on the Path
  4. told michael to meet him in the alley
  5. Main character
  6. "his heart continued to thump away like a heavymetal drumbeat"
  7. important
  8. The 'Devils of Destruction' game is allegedly set during a war in what location
  9. tanya ripped her own
Down
  1. cyber terriost
  2. tried to commit suicide
  3. lead agent to stop kaine
  4. Who wrote the book
  5. The world is
  6. virtnet security system
  7. chapter 1 title
  8. system connecting virtual worlds
  9. michael girl bestfriend

18 Clues: importantThe world isThe danger iscyber terriostMain characterchapter 1 titleWho wrote the booktanya ripped her owntried to commit suicidevirtnet security systemmichael girl bestfriendlead agent to stop kaineTanya wanted to jump off theis torn to pieces on the Pathsystem connecting virtual worldstold michael to meet him in the alley...

Cyber Intelligence (Medium) 2023-06-01

Cyber Intelligence (Medium) crossword puzzle
Across
  1. The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
  2. An individual or group that carries out cyber attacks for political or ideological reasons.
  3. A technique used to gather intelligence by infiltrating target networks or systems.
  4. A technique used to gather intelligence by monitoring and analyzing public sources of information.
  5. A covert technique used to gain unauthorized access to a computer system.
  6. A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
  7. The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
  1. The process of identifying and mapping potential vulnerabilities in a system or network.
  2. a centralized team responsible for monitoring and responding to security incidents.
  3. A software program that disguises itself as a legitimate program but performs malicious activities.
  4. The proactive search for indicators of compromise and potential threats within a network or system.

11 Clues: A covert technique used to gain unauthorized access to a computer system.a centralized team responsible for monitoring and responding to security incidents.A technique used to gather intelligence by infiltrating target networks or systems.The process of identifying and mapping potential vulnerabilities in a system or network....

Cyber Security awareness crossword 2023-09-27

Cyber Security awareness crossword crossword puzzle
Across
  1. protects its users by encrypting their data and masking their IP addresses
  2. displays unwanted advertisements and pop-ups
  3. can record and steal consecutive keystrokes
  4. Are you a bot?
  5. A type of malware and a wooden horse
  6. attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
  7. Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
Down
  1. It is a small piece of information that a website stores on your computer
  2. Pay me for your data
  3. a form of malware that hides on your device, monitors your activity, and steals sensitive information
  4. shields your network from malicious or unnecessary network traffic
  5. a security mechanism that creates a virtual trap to lure attackers
  6. Process of verification
  7. send messages pretending to be a trusted person or entity
  8. Malware that self-replicates and infects other computers
  9. a system for malware detection that runs a suspicious object in an isolated environment

16 Clues: Are you a bot?Pay me for your dataProcess of verificationA type of malware and a wooden horsecan record and steal consecutive keystrokesdisplays unwanted advertisements and pop-upsMalware that self-replicates and infects other computerssend messages pretending to be a trusted person or entity...

Cyber Security Month 2023 2023-09-01

Cyber Security Month 2023 crossword puzzle
Across
  1. Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
  3. An important process that verifies a user is really who they are; many was this can be done
  4. An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
  5. An attack that hijacks your system and denies you access until you send money
  6. Characteristics used to identify a person
  7. The form of encryption that requires two different credentials
  8. Malware hidden as an attachment or free download
Down
  1. The state of being free from danger for threat
  2. Bullying that takes place online
  3. Type of cyber attack where a person is tricked into give information via a text message
  4. Digital currency, preference for hackers
  5. A person who tries to gain unauthorised access to a network or computer system.
  6. When a hacker successfully exploits a device and gains access to files and data
  7. An annoying malware that spams you with ads
  8. A fraudulent or deceptive act or operation

16 Clues: Bullying that takes place onlineDigital currency, preference for hackersCharacteristics used to identify a personA fraudulent or deceptive act or operationAn annoying malware that spams you with adsThe state of being free from danger for threatMalware hidden as an attachment or free download...

Synoptech No. 4 - Cyber Risk in Central Banking 2022-10-26

Synoptech No. 4 - Cyber Risk in Central Banking crossword puzzle
Across
  1. Phishing attacks involve the mass distribution of _____ e-mail messages
  2. BSFIs should oversee _____ phishing simulations or exercises
  3. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
  4. Data breaches compromise confidentiality, with_____ and reputational losses.
Down
  1. Beyond investments, central banks focus on developing concrete policy _____
  2. Phishing is an example of _____ engineering
  3. _____ is one of the most common method of cyber attack
  4. Phishing is an attempt to obtain sensitive _____

8 Clues: Phishing is an example of _____ engineeringPhishing is an attempt to obtain sensitive __________ is one of the most common method of cyber attackBSFIs should oversee _____ phishing simulations or exercisesPhishing attacks involve the mass distribution of _____ e-mail messages...

Cyber Security Day 2021 2021-11-10

Cyber Security Day 2021 crossword puzzle
Across
  1. Cyber security is _________'s responsibility
  2. Never, ever trust this type of wifi
  3. ____________ made OT systems vulnerable
Down
  1. Who's the target for cyber criminals?
  2. Automation means that _____ footage can be leaked
  3. When one factor is not enough (under "Learn how not to be the weakest link")
  4. An insurance company that made ransomware payments

7 Clues: Never, ever trust this type of wifiWho's the target for cyber criminals?____________ made OT systems vulnerableCyber security is _________'s responsibilityAutomation means that _____ footage can be leakedAn insurance company that made ransomware paymentsWhen one factor is not enough (under "Learn how not to be the weakest link")

IT 2024-05-21

IT crossword puzzle
Across
  1. what has a screen with no buttons
  2. charge you device without a wire
  3. example of a cyber security
  4. where do you collect money
  5. how you search thing up
Down
  1. example of data testing
  2. stick in into your device
  3. you watch movies on it
  4. keep data on it
  5. makes the computer work
  6. it has branches
  7. how you lose information
  8. is an example of an HCI

13 Clues: keep data on itit has branchesyou watch movies on itexample of data testingmakes the computer workis an example of an HCIhow you search thing uphow you lose informationstick in into your devicewhere do you collect moneyexample of a cyber securitycharge you device without a wirewhat has a screen with no buttons

Cyber-Mobbing 2023-11-14

Cyber-Mobbing crossword puzzle
Across
  1. § 111 StGB befasst sich mit übler ______________________ .
  2. Was kann einer der Auslöser für Cyber-Mobbing sein?
  3. Heimlich gemachte Nacktfotos laufen lt. §120a StGB unter ________________ Bildaufnahmen.
  4. Anbahnung von Sexualkontakten zu Unmündigen.
  5. Dabei werden gewalttätige oder „lustige“ Angriffe auf Personen mit dem Handy gefilmt und anschließend in den sozialen Medien verbreitet.
  6. Cyber-Mobbing kann Tag und Nacht fortgeführt werden und kennt somit keine räumlichen…?
  7. Die Person hinter dem Profil nicht die, die sie vorgibt zu sein. Es werden unwahre Angaben gemacht und geklaute Bilder als die eigenen ausgegeben.
  8. Erpressung mit Nacktfotos
  9. Missbräuchliche Verwendung persönlicher Daten.
Down
  1. funktioniert vor allem dort gut, wo es ein großes _______________ gibt, das entweder mitmacht oder aus anderen Gründen nichts unternimmt.
  2. Oft enden die Konflikte nicht mit dem Unterricht, sondern werden häufig _______________ fortgesetzt.
  3. Was fehlt Kindern und Jugendlichen oft um selbst aus problematischen Situationen herauszukommen?
  4. Wo findet Cyber-Mobbing vor allem statt?
  5. Name um die eine wahre Identität zu verbergen
  6. Wie bezeichnet man das absichtliche und über einen längeren Zeitraum anhaltende Beleidigen, Bedrohen, Bloßstellen, Belästigen oder Ausgrenzen anderer über digitale Medien?
  7. Die Datenverwendung in Gewinn- oder Schädigungsabsicht wird in welchem Gesetz geregelt?
  8. Während sich Cyber-Mobbing in der Regel in größeren Gruppen abspielt, findet Cyber-___________________ meist zwischen 2 Personen statt.
  9. Das Strafmaß für Cyber-Mobbing kann bis zu _________ Jahre Haft reichen.
  10. Wenn es um massive Beleidigungen wegen der Zugehörigkeit zu einer Gruppe geht spricht man von ____________________ .

19 Clues: Erpressung mit NacktfotosWo findet Cyber-Mobbing vor allem statt?Anbahnung von Sexualkontakten zu Unmündigen.Name um die eine wahre Identität zu verbergenMissbräuchliche Verwendung persönlicher Daten.Was kann einer der Auslöser für Cyber-Mobbing sein?§ 111 StGB befasst sich mit übler ______________________ ....

SynopTech No. 4 - Cyber Risk in Central Banking 2022-10-26

SynopTech No. 4 - Cyber Risk in Central Banking crossword puzzle
Across
  1. Phishing attacks involve the mass distribution of _____ e-mail messages
  2. BSFIs should oversee _____ phishing simulations or exercises
  3. Beyond investments, central banks focus on developing concrete policy _____
  4. Phishing is an example of _____ engineering
  5. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
Down
  1. Phishing is an attempt to obtain sensitive _____
  2. _____ is one of the most common method of cyber attack
  3. Data breaches compromise confidentiality, with financial and reputational _____

8 Clues: Phishing is an example of _____ engineeringPhishing is an attempt to obtain sensitive __________ is one of the most common method of cyber attackBSFIs should oversee _____ phishing simulations or exercisesPhishing attacks involve the mass distribution of _____ e-mail messages...

Mrs Craigs - Cyber Security 2021-04-13

Mrs Craigs - Cyber Security crossword puzzle
Across
  1. _______have made taking and sharing images so easy nowadays (2 words).
  2. Be careful when using public ____
  3. The name for a computer camera is a ______.
  4. There are ______laws in Australia that control what you can and can't send, say or share online.
  5. Passwords should be kept _____.
  6. Apps to share information between people online (2 words).
  7. When you are nasty to others online
  8. Your location settings should be turned ____.
Down
  1. Someone who breaks into a computer system to steal information.
  2. Your online payment details should never be _____.
  3. Your digital ______ is a permanent history of your online activity.
  4. When people access and use your personal information without your permission (2 words).
  5. Your privacy settings should never be set as _____.
  6. You need a persons ______ before you can share pictures of them online.
  7. Never list your phone number or home_______ under the contact information online.
  8. Protect your devices with a strong_____.

16 Clues: Passwords should be kept _____.Be careful when using public ____When you are nasty to others onlineProtect your devices with a strong_____.The name for a computer camera is a ______.Your location settings should be turned ____.Your online payment details should never be _____.Your privacy settings should never be set as _____....

Cyber Security awareness crossword 2023-09-27

Cyber Security awareness crossword crossword puzzle
Across
  1. It is a small piece of information that a website stores on your computer
  2. Protects its users by encrypting their data and masking their IP addresses
  3. Displays unwanted advertisements and pop-ups
  4. Attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
  5. Sends messages pretending to be a trusted person or entity
  6. Malware that self-replicates and infects other computers
  7. A type of malware and a wooden horse
  8. Shields your network from malicious or unnecessary network traffic
  9. Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
  10. Can record and steal consecutive keystrokes
Down
  1. System for malware detection that runs a suspicious object in an isolated environment
  2. Process of verification
  3. Are you a bot?
  4. Pay me for your data
  5. A form of malware that hides on your device, monitors your activity, and steals sensitive information
  6. A security mechanism that creates a virtual trap to lure attackers

16 Clues: Are you a bot?Pay me for your dataProcess of verificationA type of malware and a wooden horseCan record and steal consecutive keystrokesDisplays unwanted advertisements and pop-upsMalware that self-replicates and infects other computersSends messages pretending to be a trusted person or entity...

Cyber Security Puzzle 2024 2024-12-18

Cyber Security Puzzle 2024 crossword puzzle
Across
  1. documents) which is stored somewhere else.
  2. A copy of the information held on a device (such as photos
  3. on a scam website.
  4. Information about you held on computers that you wouldn’t
  5. others (especially hackers) to get hold of.
  6. know your password.
  7. Software that can have a bad impact on your device
  8. A message that tries to trick you into doing something that
  9. accessing your accounts.
Down
  1. A message that tries to trick you into doing something that
  2. Getting into someone else’s computer or device without
  3. cause you harm, such as giving away information or
  4. on a scam website.
  5. cause you harm, such as giving away information or
  6. A way to stop hackers getting into your accounts, even if
  7. A sequence of characters (or words) used to stop criminals
  8. computer.
  9. permission.
  10. Unwanted emails or messages that usually try to sell you

19 Clues: computer.permission.on a scam website.on a scam website.know your password.accessing your accounts.documents) which is stored somewhere else.others (especially hackers) to get hold of.cause you harm, such as giving away information orcause you harm, such as giving away information orSoftware that can have a bad impact on your device...

Activity 1 2021-07-20

Activity 1 crossword puzzle
Across
  1. Common resold network equipment
  2. Everyone's Favorite color
  3. Provides O365 support, software and licenses
  4. Help for making your business work smarter
  5. Physical Items sold
  6. Professional Assistance provided
Down
  1. Providing Level 1 technical support
  2. Setting up hardware to customer standards
  3. Providing support and guidance on cyber threats
  4. Application needed to run on hardware
  5. Company selling OEM products
  6. What you need to use software
  7. Who you call for help

13 Clues: Physical Items soldWho you call for helpEveryone's Favorite colorCompany selling OEM productsWhat you need to use softwareCommon resold network equipmentProfessional Assistance providedProviding Level 1 technical supportApplication needed to run on hardwareSetting up hardware to customer standardsHelp for making your business work smarter...