cyber security Crossword Puzzles
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
cyber security 2022-11-28
Across
- - distributed denial of service.
- - a type of computer programme that modifys other computer programmes with its own code.
- - someone from the inside of a company who threatens to expose the passwords for the company.
- -once an email or message has been clicked the ransomer has all of your data and threatens to publish all of your data unless you pay a large sum of money.
Down
- - when someone just keeps on guessing a password or username until they get it right.
- - malicious software designed to harm.
- -a subset of the trojan horse malware that can clone itself again and again.
- -sending someone a random email with a link in that you want them to click.
8 Clues: - distributed denial of service. • - malicious software designed to harm. • -sending someone a random email with a link in that you want them to click. • -a subset of the trojan horse malware that can clone itself again and again. • - when someone just keeps on guessing a password or username until they get it right. • ...
Cyber Security 2022-10-12
Across
- The type of engineering which targets "bugs in the human hardware"
- The process by which an individual’s access to accounts and data is reviewed on a routine basis.
- Complete this phrase "Where to Store, What to _____"
- What you are if you complete this crossword by the end of the week.
Down
- A small file placed on a computer by a website assigning a unique ID to the device
- Permission entitled to an individual allowing them to use a system or view data.
- Recently published CHS notice relating to how CHS handles employees personal data.
- CHS approved Password Manager.
8 Clues: CHS approved Password Manager. • Complete this phrase "Where to Store, What to _____" • The type of engineering which targets "bugs in the human hardware" • What you are if you complete this crossword by the end of the week. • Permission entitled to an individual allowing them to use a system or view data. • ...
Cyber Security 2020-03-03
Across
- also called an ID
- a system of symbols such as letters and numbers to hide a meaning
- someone who secretly accesses your information
- uses clever advertisements to trick you into giving away information
Down
- copying a file such as a photo, video or game
- sneak into your computer to cause damage
- software that takes over a computer and kidnaps data
- a method of changing a method to conceal its meaning
8 Clues: also called an ID • sneak into your computer to cause damage • copying a file such as a photo, video or game • someone who secretly accesses your information • software that takes over a computer and kidnaps data • a method of changing a method to conceal its meaning • a system of symbols such as letters and numbers to hide a meaning • ...
Cyber Security 2021-02-12
Across
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- A word that people use to tell them that no one else knows
- or devices.
- Gathers information about how you use your computer
Down
- Short for malicious software, that gains access to your computer or device
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your person
8 Clues: or devices. • A malicious form of self replicating • Someone that tries to gain access to your person • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • ...
Cyber Security 2023-09-26
Across
- malware that changes or destroys information and is passed on to other systems
- a type of internet fraud that seeks to acquire a user's information by deception
- intelligence of machines
- malicious software
Down
- keeps intruders out digitally
- a group of applications that instruct a computer to carry out a task
- someone who attempts to gain unauthorized access
- unsolicited emails
8 Clues: unsolicited emails • malicious software • intelligence of machines • keeps intruders out digitally • someone who attempts to gain unauthorized access • a group of applications that instruct a computer to carry out a task • malware that changes or destroys information and is passed on to other systems • ...
Cyber Security 2024-11-28
Across
- Avoid creating _______ passwords
- Never click on a ________from an untrusted source
- Regularly update your ________ system
- Never write down your __________
Down
- Use _________ software
- Perform regular ________ of important data
- _________select the "Remember My Password
- Never give out your password to _____________
8 Clues: Use _________ software • Avoid creating _______ passwords • Never write down your __________ • Regularly update your ________ system • _________select the "Remember My Password • Perform regular ________ of important data • Never give out your password to _____________ • Never click on a ________from an untrusted source
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber Security 2022-02-13
Across
- attack in which the victim receives an email disguised to look as if it has come from a reputable source
- hackers who use tools downloaded from the internet
- created when that data has been processed and becomes meaningful
- set of methods used by cybercriminals to deceive individuals into handing over information
Down
- involves the attacker watching the victim while they provide sensitive information
- Gaining unauthorised access to or control of a computer system
- raw facts and figures
- an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money
8 Clues: raw facts and figures • hackers who use tools downloaded from the internet • Gaining unauthorised access to or control of a computer system • created when that data has been processed and becomes meaningful • involves the attacker watching the victim while they provide sensitive information • ...
Cyber Security! 2023-01-04
Across
- What most people use to login to their phone
- Another thing you can use to lock your phone
- A person who tries to hack systems to learn how to make them stronger
- You enter your email and _____ to login to things
Down
- Software or apps used to store passwords
- A stronger version of a password
- When a hacker tries to steal information through email
- A person who tries to steal your data or money digitally
8 Clues: A stronger version of a password • Software or apps used to store passwords • What most people use to login to their phone • Another thing you can use to lock your phone • You enter your email and _____ to login to things • When a hacker tries to steal information through email • A person who tries to steal your data or money digitally • ...
Cybersecurity Crossword 2023-01-26
Across
- altered video to spread disinformation
- unique string that identifies device
- helps protect system
- malware that transmits private data
- helps prevent unauthorized network access
- flood website/server until crash
- codes that protect data
- cybersecurity professionals
- designs data communications network
Down
- unauthorized access to sensitive info
- software designed to disrupt system
- plans and implements security
- remote encrypted network access
- helps prevent unauthorized access
- criminal hackers
- requests payment to unlock
- malware hidden inside legitimate file
- mimics legitimate websites/emails
- network of computers used for cyber attacks
19 Clues: criminal hackers • helps protect system • codes that protect data • requests payment to unlock • cybersecurity professionals • plans and implements security • remote encrypted network access • flood website/server until crash • helps prevent unauthorized access • mimics legitimate websites/emails • software designed to disrupt system • malware that transmits private data • ...
Cyber security risks 2017-07-13
Across
- this is a software to design to detect and destroy computer viruses
- a person who uses computers to gain unauthorized access to data
- a network of social interactions and personal relationships
- the action of keeping your device safe
- this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
- a piece of code which is capable of copying itself and can corrupts the system or destroying data
- this is a software that threatens to delete your data for a specific amount of money
- a person who gains unauthorised access to computer files or networks in order to further social or political ends
- fraudulent practice of sending emails pretending to be from reputable companies
- convert information or data into a code especially to prevent unauthorised access
- a computer program that records every keystroke made by a computer user
- a secret word or phrase that must be used to gain admission to a place
12 Clues: the action of keeping your device safe • a network of social interactions and personal relationships • a person who uses computers to gain unauthorized access to data • this is a software to design to detect and destroy computer viruses • a secret word or phrase that must be used to gain admission to a place • ...
Cyber Security Crossword 2024-01-16
Across
- A malicious program that infects computers without user knowledge or permission.
- Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
- Malicious party attacking a company.
- A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
- attack that affects availability of a resource.
- A botnet is a network of private computers infected with malicious software.
Down
- Secret expression required to gain access to a computing system.
- Attack type.
- Excessive push notifications leading to unwanted response.
- authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
- Data Leakage due to well-crafted AI prompt.
- Firewall type that protects Web-based Applications.
12 Clues: Attack type. • Malicious party attacking a company. • Data Leakage due to well-crafted AI prompt. • attack that affects availability of a resource. • Firewall type that protects Web-based Applications. • Excessive push notifications leading to unwanted response. • Secret expression required to gain access to a computing system. • ...
Cyber security crossword 2023-09-11
12 Clues: ads • password • Response • your data • compliance • Vulnerability • authentication • Layer Security • vulnerabilities • Keys Identified Mail • Sender Policy Framework • Message Authentication,Reporting & Conformance
cyber threat actors, attacks & motivations 2023-12-18
Across
- Where to report a a cybersecurity incident at RDA
- It's something RDA is known for, but in the social form
- Homophone of a much loved pass time
- Supported by a government
- Australian Government agency that houses the ACSC
- Cybercrime that involves encryption and blackmail
- The name of the cipher you may or may not have succeeded in solving
- Furtum identitatis
Down
- A brute force technique used by cybercriminals
- An important aspect of security as a capability that isn't cyber
- Morris distributed this via the internet in 1988
- Something you must protect in the digital age
- A characteristic of cybercriminal groups
- Cybercriminal motivated by ideology
- A leading motivator for cybercriminals
- Malicious software used to establish remote access
- It's everyone's responsibility
17 Clues: Furtum identitatis • Supported by a government • It's everyone's responsibility • Homophone of a much loved pass time • Cybercriminal motivated by ideology • A leading motivator for cybercriminals • A characteristic of cybercriminal groups • Something you must protect in the digital age • A brute force technique used by cybercriminals • ...
Laurea Davi 2025-09-18
Across
- Cyber
- Venezia→
- Il tuo Vero spitrito guida
- 3 vs Computer science
- Prossima fermata
- non si è unit* a te (non è A.L.)
- La tua presenza è garantita
- Alcuni dicono che non sia un vero lavoro
- Anniversario Taverna (gg/mes)
Down
- Nome caccia
- Da ottobre a marzo non può mai mancare
- Un arte per pochi
- Mamma
- non si possono cambiare le proprie origini
- seconda casa
- Un lupo che si traveste da...
- ha rifiutato ma non e la Alessia Lazzaro
- sai già che non cambierà mai
- Danger
19 Clues: Cyber • Mamma • Danger • Venezia→ • Nome caccia • seconda casa • Prossima fermata • Un arte per pochi • 3 vs Computer science • Il tuo Vero spitrito guida • La tua presenza è garantita • sai già che non cambierà mai • Un lupo che si traveste da... • Anniversario Taverna (gg/mes) • non si è unit* a te (non è A.L.) • Da ottobre a marzo non può mai mancare • ha rifiutato ma non e la Alessia Lazzaro • ...
Year 8 Cyber security 2022-10-12
Across
- gathers information about you
- program that replicates itself
- transforming encrypted code to original format
- code which is designed to cause damage
- spying on the user to get personal info
- throws adverts on your screen
- social engineering to steal user information
- obtaining something by persuasion
- cyber attack intended to redirect web traffic
- mislead users of its true intention
Down
- simulated cyber attack
- use of internet based social media
- the code that transforms an encrypted message
- replace plain text with cipher text
- gaining unauthorised access to data or system
- malicious activities through humans
- malicious code designed to cause damage to device
- converting messages into secret code
18 Clues: simulated cyber attack • gathers information about you • throws adverts on your screen • program that replicates itself • obtaining something by persuasion • use of internet based social media • replace plain text with cipher text • malicious activities through humans • mislead users of its true intention • converting messages into secret code • ...
Cyber Security Crossword 2020-03-11
Across
- an analysis of an applications source code
- a piece of code that takes advantage of a vulnerability
- software designed to cause harm
- a vulnerability that is currently unknown
- a technique used by hackers to gain sensitive information
- malware that holds your data hostage
Down
- collection of web or internet based pages
- when a system has false requests that causes it to crash
- impersonating another use or device on a network
- encoding software for authorized access only
- hardware or software that blocks viruses
- when a hacker gains access to files and network
12 Clues: software designed to cause harm • malware that holds your data hostage • hardware or software that blocks viruses • collection of web or internet based pages • a vulnerability that is currently unknown • an analysis of an applications source code • encoding software for authorized access only • when a hacker gains access to files and network • ...
Cyber Security Crossword 2024-10-17
Across
- a popular DDOS tool
- Why a threat is performed
- A threat that happens due to mistakes
- A threat performed with malicious intent
- individuals who attack a system with inside knowledge
- an attack aimed to floor servers with traffic
Down
- Blocking access to a system
- an attack aimed to trick individuals
- Impact to a business due to insiders
- The aim behind an attack
- young personnel who perform server attacks.
- Possible aim of a script kiddie
12 Clues: a popular DDOS tool • The aim behind an attack • Why a threat is performed • Blocking access to a system • Possible aim of a script kiddie • an attack aimed to trick individuals • Impact to a business due to insiders • A threat that happens due to mistakes • A threat performed with malicious intent • young personnel who perform server attacks. • ...
Cyber Security Awareness 2018-06-05
Across
- Be careful connecting to public _____.
- is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- What month is National Cyber Security Awareness Month?
- True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- a secret word or expression used by authorized persons to prove their right to access, information, etc.
- when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user
12 Clues: Be careful connecting to public _____. • What month is National Cyber Security Awareness Month? • True/False: Call I.T. Service desk right away when you suspect a phishing email • techniques of protecting computers, networks, programs and data from unauthorized access or attacks • ...
Cyber Security Crossword 2021-09-26
Across
- Malicious computer program (not to be confused with Corona)
- A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
- A type of malicious software that locks your files until you pay up
- Unwanted but not malicious emails
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- Short name for MALicious softWARE
- Sending a fake email to try and personal or sensitive information
Down
- The creators of our anime cybersecurity traing videos
- A type of malware that functions by spying on user activity without their knowledge
- Secret word or phrase used to gain access to a system (the longer the better)
- The name of the cybersecurity drama series (no space)
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.
12 Clues: Unwanted but not malicious emails • Short name for MALicious softWARE • The creators of our anime cybersecurity traing videos • The name of the cybersecurity drama series (no space) • Malicious computer program (not to be confused with Corona) • Sending a fake email to try and personal or sensitive information • ...
History 2022-07-29
Across
- In 2014, the Cyber Security Operations Centre evolved to the next stage of Australia's cyber security capability.
- In 2018, ASD became independent as recommendations from the unclassified version of the 2017 Independent Intelligence Review was implemented.
- In 1988, the government decided that DSD should move to Defence headquarters at Russell Offices in this city, to facilitate a closer relationship with Defence.
- Established in Melbourne on 1 April 1947. Its role was to exploit foreign communications and be responsible for communications security in the armed services and government departments.
- DSD relocated from its temporary accommodation in Albert Park to a new purpose-built facility in this historic Melbourne location.
- In 2019, the Prime Minister announced the new Director-General of ASD.
Down
- in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security.
- Renamed as a result of an inquiry and made directly responsible to the Secretary of the Department of Defence.
- The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.
- in 1986, DSD acquired Australia's first supercomputer.
- Australian, American and British personnel worked together in this agency in Melbourne, attached to General MacArthur's headquarters.
11 Clues: in 1986, DSD acquired Australia's first supercomputer. • In 2019, the Prime Minister announced the new Director-General of ASD. • The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet. • in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security. • ...
Cyber security 2020-08-21
Across
- Es una estafa para poder obtener tus datos privados.
- software que busca información y después la trasmite sin tu conocimiento.
- Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.
- Programas informáticos con el objetivo de alterar el funcionamiento de tu computadora y infectar archivos.
- Correo electrónico que no solicitaste ni desates e igual recibiste.
Down
- Archivos de un sitio web que se guardan en tu computadora y guardan información sobre voz.
- Sistema que evita el acceso no autorizado a una red privada.
- Programa informático que detecta y elimina los virus y otros programas perjudiciales.
8 Clues: Es una estafa para poder obtener tus datos privados. • Sistema que evita el acceso no autorizado a una red privada. • Correo electrónico que no solicitaste ni desates e igual recibiste. • Software malicioso se infiltra en tu dispositivo sin que voz lo sepas. • software que busca información y después la trasmite sin tu conocimiento. • ...
Cyber security 2020-03-03
Across
- a method of changing a message to conceal its meaning
- software takes over a computer and kudnaps data
- also called an ID
- a system of symbols such as letters and numbers to hide a meaning
Down
- someone who secretly gets access to our information
- sneaks into your computer to cause damage
- what uses clever advertisements to trick you into giving away information
- copying a file such as a photo, video or game
8 Clues: also called an ID • sneaks into your computer to cause damage • copying a file such as a photo, video or game • software takes over a computer and kudnaps data • someone who secretly gets access to our information • a method of changing a message to conceal its meaning • a system of symbols such as letters and numbers to hide a meaning • ...
Cyber Security 2021-10-01
8 Clues: SMS+phishing • The knowledge • The one who hacks • Common word for frauds • The malicious software is called • Your secret key to online accounts • Most common social engineering technique • malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
Cyber Security 2021-10-06
Across
- bits of code embedded in programs by the programer (s) to quickly gain access at a later time.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- written errors in someone's code or program.
Down
- If lots of infected systems combine to form a network it is called botnet.
- a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker.
- any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.
- Unlike a computer virus, it does not need to attach itself to an existing program.
8 Clues: written errors in someone's code or program. • If lots of infected systems combine to form a network it is called botnet. • Unlike a computer virus, it does not need to attach itself to an existing program. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Cyber security 2021-11-05
Across
- someone sends a fake website to you
- type of malicious code or software that looks legitimate but can take control of your computer
- to a malicious program that replicates itself, automatically spreading through a network.
- looking over someone shoulder to obtain info
Down
- hacks your computer
- analysis of people's unique physical identity
- something to protect your computer
- a person trying to steal personal information
8 Clues: hacks your computer • something to protect your computer • someone sends a fake website to you • looking over someone shoulder to obtain info • analysis of people's unique physical identity • a person trying to steal personal information • to a malicious program that replicates itself, automatically spreading through a network. • ...
cyber security 2023-04-21
Across
- facts provided or learned about something or someone
- information about a person
- person who uses computers to gain unauthorized access to data.
- inadvertently doing other than what should have been done; a slip, lapse or mistake
Down
- looking over someone's shoulder
- an attack where people are asked to input data
- use of deception to manipulate individuals
- raw facts or figures
8 Clues: raw facts or figures • information about a person • looking over someone's shoulder • use of deception to manipulate individuals • an attack where people are asked to input data • facts provided or learned about something or someone • person who uses computers to gain unauthorized access to data. • ...
cyber security 2023-04-21
8 Clues: information • you learned it • infects computer • found your information • engineering manipulation • data your private information • generator attacks social media • error an action wasnt intended
Cyber security 2023-04-21
Across
- verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
- facts provided or learned about something or someone.
- malware that replicates and transfers itself to other computers via a network
Down
- The authorization given to users that enables them to access specific resources on the network,
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
- someone who hacks into your account
- information that has been translated into a form that is efficient for movement or processing
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
8 Clues: someone who hacks into your account • facts provided or learned about something or someone. • malware that replicates and transfers itself to other computers via a network • information that has been translated into a form that is efficient for movement or processing • ...
cyber security 2023-04-21
8 Clues: barrier on a computer • unprocessed information • data personal information • animal and computer virus • looking at private information • someone who hacks your account • permission access granted to users to specific resources • separates malicious software from legitimate applications
Cyber Security 2024-01-26
Across
- false information spread in order to deceive people
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
- an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
8 Clues: false information spread in order to deceive people • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities • an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare. • ...
Cyber Security 2025-03-20
Across
- Ensuring authorized access to a system or data
- An unauthorized entry into a system or network
- It's like turning your message into a puzzle that only the right person can solve
- Helps prevent unauthorized access and malicious attacks
Down
- Harmful software designed to disrupt or damage
- A digital trick to steal your personal information
- This could be someone wearing a "digital mask", either breaking in for mischief or to find vulnerabilities
- Imagine software that's like an invisible spy, quietly gathering your data without you noticing
8 Clues: Harmful software designed to disrupt or damage • Ensuring authorized access to a system or data • An unauthorized entry into a system or network • A digital trick to steal your personal information • Helps prevent unauthorized access and malicious attacks • It's like turning your message into a puzzle that only the right person can solve • ...
Sales Team 2024-07-15
Across
- cyber security excellence award winner 2023
- 2
- statement you read after collecting payment information
- Wife, girlfriend, husband, boyfriend,significant partner
- 49.00 price
- legalshield headquarters
Down
- primerica identity plan is called
- PU app type
- Best overall legal service plan 2024, Forbes
- credit bureau used on 1b plans
- commerical driver legal plan
- Estate planning
12 Clues: 2 • PU app type • 49.00 price • Estate planning • legalshield headquarters • commerical driver legal plan • credit bureau used on 1b plans • primerica identity plan is called • cyber security excellence award winner 2023 • Best overall legal service plan 2024, Forbes • statement you read after collecting payment information • ...
Unit 4 2019-12-06
Cyber security 2020-08-24
Across
- estafa con el objetivo de obtener a través de internet datos privados de los usuarios
- programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales
- almacenan información sobre tí
- diseñado para infiltrarse en su dispositivo sin su conocimiento.
Down
- software que recopila información de un ordenador y después transmite esta información a una entidad externa
- sistema diseñado para evitar el acceso no autorizado a una red privada
- programas informáticos que tienen como objetivo alterar el funcionamiento del computador
- correo electrónico no solicitado que recibe una persona
8 Clues: almacenan información sobre tí • correo electrónico no solicitado que recibe una persona • diseñado para infiltrarse en su dispositivo sin su conocimiento. • sistema diseñado para evitar el acceso no autorizado a una red privada • estafa con el objetivo de obtener a través de internet datos privados de los usuarios • ...
Cyber Security 2020-08-25
Across
- retrieve from the internet
- you carry it around with you all day and it could be hacked
- a person trying to break into your computer systems
- a program built for a specific hole that has been found
- a free operating system
Down
- a weakness in your computer system
- protects your files from being read
- updates for your operating system
8 Clues: a free operating system • retrieve from the internet • updates for your operating system • a weakness in your computer system • protects your files from being read • a person trying to break into your computer systems • a program built for a specific hole that has been found • you carry it around with you all day and it could be hacked
cyber security 2023-04-21
Across
- Data that identifies a specific individual
- It is evaluating computer networks and systems vulnerabilities in securities.
- It is information security and the psychological manipulation of people.
Down
- An action that has been done but is not intended by the person.
- the collection of information
- When you obtain something by using persuasion
- It is when you show responsibility for your actions.
- facts provided about something/someone
8 Clues: the collection of information • facts provided about something/someone • Data that identifies a specific individual • When you obtain something by using persuasion • It is when you show responsibility for your actions. • An action that has been done but is not intended by the person. • It is information security and the psychological manipulation of people. • ...
cyber security 2020-02-10
Across
- someone who breaks into a computer system for mischief or malice
- a strong ______ have letters, numbers and symbols
- someone who breaks into a computer system using social engineering
- someone who test computer security by hacking into computer system
Down
- scammers get money from others by scaring them
- dont accept free _____ of games online
- people get scammed out of ______ from fake donation advertisments
- people get scammed because of their ____ of money
8 Clues: dont accept free _____ of games online • scammers get money from others by scaring them • a strong ______ have letters, numbers and symbols • people get scammed because of their ____ of money • someone who breaks into a computer system for mischief or malice • people get scammed out of ______ from fake donation advertisments • ...
Cyber Security 2021-10-01
8 Clues: SMS+phishing • The knowledge • The one who hacks • Common word for frauds • The malicious software is called • Your secret key to online accounts • Most common social engineering technique • malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
Cyber Security 2021-10-06
Across
- bits of code embedded in programs by the programer (s) to quickly gain access at a later time.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- written errors in someone's code or program.
Down
- If lots of infected systems combine to form a network it is called botnet.
- a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker.
- any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.
- Unlike a computer virus, it does not need to attach itself to an existing program.
8 Clues: written errors in someone's code or program. • If lots of infected systems combine to form a network it is called botnet. • Unlike a computer virus, it does not need to attach itself to an existing program. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Cyber security 2022-09-07
Across
- An annoying malware that spams you with ads
- a collection of malware infested computers that form a network to attack
- An important process that verifies a user is really who they are; many different ways this can be done
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
- When raw data is put into context and has meaning, the data transforms into _____
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
- I am not a robot
8 Clues: I am not a robot • An annoying malware that spams you with ads • a collection of malware infested computers that form a network to attack • When raw data is put into context and has meaning, the data transforms into _____ • Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing. • ...
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
cyber security 2022-09-07
Across
- type of malware that functions by spying on user activity without their knowledge.
- group of computers, printers and devices that are interconnected and governed as a whole. --
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- set of programs that tell a computer to perform a task.
- that allows us to access our files and/or services through the internet from anywhere in the world.
- defensive technology designed to keep the bad guys out
8 Clues: defensive technology designed to keep the bad guys out • set of programs that tell a computer to perform a task. • type of malware that functions by spying on user activity without their knowledge. • group of computers, printers and devices that are interconnected and governed as a whole. -- • ...
Cyber security 2022-11-28
Across
- are a malicious form of self-replicating software.
- they replicate themselves but do not attach themselves to files as a virus does.
- an unwanted software that monitors and gathers information on a person and how they use their computer.
- this can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
Down
- a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions.
- This is a form of virus, as it is self-replicating.
- it is a large collection of malware-infected devices
- is a software that is designed to gain access to your computer with malicious intent.
8 Clues: are a malicious form of self-replicating software. • This is a form of virus, as it is self-replicating. • it is a large collection of malware-infected devices • they replicate themselves but do not attach themselves to files as a virus does. • is a software that is designed to gain access to your computer with malicious intent. • ...
Cyber Security 2024-01-26
Across
- false information spread in order to deceive people
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
- an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
8 Clues: false information spread in order to deceive people • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities • an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare. • ...
cyber security 2024-10-22
Across
- Anonymously sending hurtful messages online
- Harassment or bullying that takes place over digital devices like computers and smartphones
- he act of spreading false information about someone online
- A person who uses digital means to harass others.
- The act of excluding someone from an online group or activity.
Down
- Using technology to intimidate or harm others
- Software designed to block or report harmful online behavior.
- media common platform where cyberbullying can occur, often used for social interaction.
8 Clues: Anonymously sending hurtful messages online • Using technology to intimidate or harm others • A person who uses digital means to harass others. • he act of spreading false information about someone online • Software designed to block or report harmful online behavior. • The act of excluding someone from an online group or activity. • ...
CYBER SECURITY 2025-10-15
Across
- Pretending to be someone else to gain access or information
- A unique numerical label assigned to each device on a network
- The amount of time spent using digital devices
Down
- Authentication using physical characteristics like fingerprints or face
- A unique identifier used to log into a system
- A copy of data kept in case the original is lost or compromised
- An improvement or fix applied to software or systems
- A device that forwards data between computer networks
8 Clues: A unique identifier used to log into a system • The amount of time spent using digital devices • An improvement or fix applied to software or systems • A device that forwards data between computer networks • Pretending to be someone else to gain access or information • A unique numerical label assigned to each device on a network • ...
C for Cyber Security 2022-10-10
Across
- A form of malware used by hackers to spy on you and your computer activities
- A flaw or weakness in a computer system that could be exploited to violate the system’s security
- A malicious software designed to block access to a computer system until a sum of money is paid
- The process of identifying a user’s identity
- A method of connecting a series of computers and devices in a private encrypted network
- Something personal to you and should never be shared
- In addition to passwords; this ensures better security
- Unauthorized access to a network, information systems or application
- Threatening behavior facilitated through electronic means such as texting
Down
- Alert / Always on the lookout
- A fraudulent email purportedly from a reputable company attempting to get personal information
- A piece of hardware or software, used to keep intruders out
- When a hacker changes source of an email so that it seems to come from a trusted source
- harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
- The process of taking plain text and scrambling it into an unreadable format
- the address of a website; check its validity before clicking on it
- A sequence of words or text used to control access to a computer; similar to a password
- Facebook, Twitter, Instagram etc. (Two Words)
18 Clues: Alert / Always on the lookout • The process of identifying a user’s identity • Facebook, Twitter, Instagram etc. (Two Words) • Something personal to you and should never be shared • In addition to passwords; this ensures better security • A piece of hardware or software, used to keep intruders out • the address of a website; check its validity before clicking on it • ...
Cyber security crossword- Basic 2014-10-14
Across
- A person who steals information from your system without you knowing about it.
- A computer _______ is a group of interconnected computers.
- The A in APT
- Always _____ your computer when you leave your desk
- It is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product
- Even when Antivirus _______ is installed and updated, your computer is never 100% safe
- The state of being free from danger or threat.
- Viruses, Worms and Trojans etc
- Be cyber savvy, be a ______ user.
Down
- An attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
- Never turn off your ______ or else your computer and the company data will be at risk
- Hidden entrance into a system
- The chance you take when you download unknown content from the internet or leave your computer open
- A ____ is a web page address.
- A software that is designed to detect and destroy computer viruses.
- Never share your _______ with another person.
- An army of malware infected PCs
- A _______ is a program that allows a user to find view hear and interact with materials on the internet.
18 Clues: The A in APT • Hidden entrance into a system • A ____ is a web page address. • Viruses, Worms and Trojans etc • An army of malware infected PCs • Be cyber savvy, be a ______ user. • Never share your _______ with another person. • The state of being free from danger or threat. • Always _____ your computer when you leave your desk • ...
CISO Crossword Quiz - 1725 2025-03-11
Across
- A technique by which cyber criminals steal potentially sensitive user information by injecting malicious script code in various forms/pages of targeted website
- A cybersecurity strategy in which an organization only allows pre-approved or trusted users, entities, or actions to operate/access a system or network
- a cybercrime where fraudsters impersonate law enforcement officials to trick people into paying money or giving personal information by making them believe they have been digitally arrested or digitally detained
- A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency
- A type of cybercrime that involves using QR codes to trick people into visiting malicious websites or to make payment to unauthorized persons
- Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
- A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
Down
- A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money
- A Security incident in which a malicious threat actor gains access to systems without authorization
- A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms
- A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
11 Clues: A Security incident in which a malicious threat actor gains access to systems without authorization • A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency • A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money • ...
Internet Privacy 2014-05-29
Across
- freedom from danger
- take hold of forcibly
- set of data that gives information about other data.
- domain located outside of the United States. The government cannot directly act on these domains.
- Federal Bureau of Investigation
- A person other than you and the website you visit
- Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
- shutdown of a website by the owners in form of a protest
- Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
- Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
- a legal document that explains how a website uses your private info
- the part of a network address that identifies it as belonging to a particular domain.
- threat a threat that can damage a network
Down
- close watch or intercepting information from an individual
- protection against unreasonable searches and seizures
- domain located within the United States. The government can directly act on these domains.
- National Security Agency
- An illegitimate imitation of an item.
- A work or invention.
- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
- Illegally shared content
- A draft of a proposed law presented to parliament for discussion.
- Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
- Internet Service Provider. A company that is in charge of your internet and providing you with internet service
25 Clues: freedom from danger • A work or invention. • take hold of forcibly • National Security Agency • Illegally shared content • Federal Bureau of Investigation • An illegitimate imitation of an item. • threat a threat that can damage a network • A person other than you and the website you visit • set of data that gives information about other data. • ...
Internet Privacy 2014-05-29
Across
- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- domain located outside of the United States. The government cannot directly act on these domains.
- Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
- freedom from danger
- Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
- domain located within the United States. The government can directly act on these domains.
- Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
- shutdown of a website by the owners in form of a protest
- National Security Agency
- Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
Down
- A person other than you and the website you visit
- Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
- A draft of a proposed law presented to parliament for discussion.
- A work or invention.
- Federal Bureau of Investigation
- Illegally shared content
- threat a threat that can damage a network
- a legal document that explains how a website uses your private info
- protection against unreasonable searches and seizures
- An illegitimate imitation of an item.
- Internet Service Provider. A company that is in charge of your internet and providing you with internet service
- set of data that gives information about other data.
- close watch or intercepting information from an individual
- take hold of forcibly
- the part of a network address that identifies it as belonging to a particular domain.
25 Clues: freedom from danger • A work or invention. • take hold of forcibly • Illegally shared content • National Security Agency • Federal Bureau of Investigation • An illegitimate imitation of an item. • threat a threat that can damage a network • A person other than you and the website you visit • set of data that gives information about other data. • ...
Cybersecurity 2025-11-10
Across
- who interferes with normal computer functions
- records or transmits a user's keystrokes
- writing computer software code
- client-side code injection attack
- refers to any external entity who may have access to private data
- gain unauthorized access to a computer system
- network of maliciously installed bots
- destroying a hardware by delivering a high-voltage electrical surge
- cyber exploit directed at online card players
- security risk who cause the program to crash
- software tools used by a third party
Down
- unauthorized duplication or deletion of an organization's electronic information
- secure time-limited credential
- attack that originates from many different sources
- capable of being easily hurt
- designed to take advantage of a particular error
- possible source of harm
- security mechanism for separating running programs
18 Clues: possible source of harm • capable of being easily hurt • secure time-limited credential • writing computer software code • client-side code injection attack • software tools used by a third party • network of maliciously installed bots • records or transmits a user's keystrokes • security risk who cause the program to crash • who interferes with normal computer functions • ...
Compliance & Security Week Part 2! 2024-11-14
Across
- What are all DDID/AHS employees supposed to wear so it can be seen as a best practice of security?
- What is the term for the agreement between covered entities and business associates?
- What is the term for malicious software?
- The person that exploits vulnerabilities for malicious purposes
- Who is the DDID Security Officer?
- What is the process of converting data into a secure format?
- What confidential information does DDID protect?
- What color is the HIPAA Hippo?
Down
- What is the over the phone voice call type of scam?
- What is the term for a security incident that disrupts services?
- Who is the HR Reporting Officer?
- What is the process of verifying identity?
- This occurs when an unauthorized person gains access to sensitive or protected information
- What is the term for a legal requirement to protect data?
- The document that outlines security practices
- You are the first line of ____ in protection DDID and AHS
- What's an organization's overall ability to protect against, detect, respond to and recover from cyber threats? (It's like a straight back when you sit or stand)
17 Clues: What color is the HIPAA Hippo? • Who is the HR Reporting Officer? • Who is the DDID Security Officer? • What is the term for malicious software? • What is the process of verifying identity? • The document that outlines security practices • What confidential information does DDID protect? • What is the over the phone voice call type of scam? • ...
Cyber Security Puzzle 2024-10-22
Across
- The process of verifying the identity of a user
- A method of disguising data to protect it
- A device that helps protect networks by filtering traffic
- A breach where sensitive data is accessed unlawfully
- A malicious email designed to trick recipients
- A protocol used to send emails securely
Down
- A common form of malware that locks files
- A program that scans for vulnerabilities in systems
- A common cybersecurity measure that involves using complex passwords
- Software that detects and removes malware
- A type of attack where multiple systems are used to overwhelm a target
- A legal framework for data protection in the EU
12 Clues: A protocol used to send emails securely • A common form of malware that locks files • A method of disguising data to protect it • Software that detects and removes malware • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • ...
Cyber CYber 2024-10-07
Across
- KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
- What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
- VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
- RECOVERY What term describes a strategy for recovering from a cyber incident?
- A security measure that helps prevent unauthorized access to a network?
- WEB What term refers to the part of the internet that is not indexed by traditional search engines?
- What type of software is potentially unwanted and often bundled with legitimate software?
- What type of malware allows remote access to a user's device?
- What term refers to a security incident where sensitive data is accessed without authorization?
- DETECTION A tool or process for detecting unauthorized access to a system?
- A type of cyber attack where the attacker impersonates a legitimate user?
- TESTING A systematic examination of a system for security weaknesses?
- What term describes malicious code that appears legitimate?
- What term is used for a password that is difficult to guess?
- Which type of attack sends a flood of traffic to overwhelm a network?
- THEFT The unauthorized use of someone's personal data is known as?
- FLOOD What type of DDoS attack exploits the TCP handshake process?
- What type of encryption uses two different keys for encryption and decryption?
- The practice of obtaining sensitive information by deception is known as?
- What type of cryptographic attack tries all possible combinations of keys?
Down
- A method used to authenticate users based on physical characteristics?
- What do you call a security measure that uses two or more methods to verify identity?
- A series of steps taken to ensure the security of information systems?
- The information that is collected to assess vulnerabilities?
- SCANNING What is a method for identifying weaknesses in a system’s security?
- What is the process of converting plaintext into ciphertext?
- What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
- A malicious user who seeks to exploit system vulnerabilities?
- The act of attempting to steal data through exploiting weak points?
- What refers to the principle of least privilege in cybersecurity?
- What technique uses social interactions to manipulate individuals into giving up confidential information?
- What type of malware can replicate itself and spread to other computers?
- The process of decoding information or data that has been encrypted?
- What is a security resource whose value lies in being probed, attacked, or compromised?
- A collection of related data that may be exposed during a breach is called?
- SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
- ATTACK A planned attack to capture sensitive information over a network?
- IDS What term refers to a system that captures and stores network traffic?
- TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
- A malicious email that pretends to be from a trustworthy source?
40 Clues: What term describes malicious code that appears legitimate? • The information that is collected to assess vulnerabilities? • What is the process of converting plaintext into ciphertext? • What term is used for a password that is difficult to guess? • A malicious user who seeks to exploit system vulnerabilities? • ...
Tech Crossword 2026-02-06
Across
- Software delivery model via internet
- Connected system of nodes
- Step-by-step problem-solving logic
- Relating to digital security
- Raw input for analytics
Down
- Development + operations methodology
- Digital foundation enabling ecosystems
- Industry driving digital transformation
- Ability to grow without efficiency loss
- On-demand computing infrastructure
- Internet of physical devices
- Unit in blockchain
- Machines simulating human intelligence
13 Clues: Unit in blockchain • Raw input for analytics • Connected system of nodes • Internet of physical devices • Relating to digital security • On-demand computing infrastructure • Step-by-step problem-solving logic • Development + operations methodology • Software delivery model via internet • Digital foundation enabling ecosystems • Machines simulating human intelligence • ...
Cybersecurity Puzzle 2025-03-11
Across
- Self-replicating malicious software
- Fixes security vulnerabilities
- Acts as an intermediary server
- Fake emails to steal info
- Attack using trial and error
- Program that spreads and harms
- Remote storage and computing
- Harmful software for attacks
- Access to an account or system
- Device used for entering codes
- Payment demanded for files
- Secretly monitors user activity
Down
- Superuser access level
- Method for encrypting information
- Disguised harmful software
- Protection against cyber threats
- Secret entry point for attacks
- Permission to use a system
- Unauthorized access to systems
- Encrypts data for protection
20 Clues: Superuser access level • Fake emails to steal info • Disguised harmful software • Permission to use a system • Payment demanded for files • Attack using trial and error • Remote storage and computing • Harmful software for attacks • Encrypts data for protection • Fixes security vulnerabilities • Acts as an intermediary server • Program that spreads and harms • ...
Jaringan Komputer & Internet 2024-01-15
Across
- jenis topologi yang menyerupai cincin?
- konsep cyber security berperan dalam menjaga kerahasiaan data ?
- proses pengiriman data dari sebuah perangkat ke perangkat tujuan melalui media transmisi?
- aspek teknis yang tujuannya ketepatan antara biaya?
- faktor keamanan jaringan yang mampu melindungi data dari berbagai serangan cyber?
Down
- jenis jaringan yang gabungan dari berbagai LAN dan WAN?
- tata kelola akses yang pengguna mengakses dan melakukan operasi database tertentu?
- jaringan komputer adalah perangkat komputer atau perangkat?
- model 7 lapis osi ?
- alat penghubung workstation,server(menggunakan kabel jaringan)
10 Clues: model 7 lapis osi ? • jenis topologi yang menyerupai cincin? • aspek teknis yang tujuannya ketepatan antara biaya? • jenis jaringan yang gabungan dari berbagai LAN dan WAN? • jaringan komputer adalah perangkat komputer atau perangkat? • alat penghubung workstation,server(menggunakan kabel jaringan) • konsep cyber security berperan dalam menjaga kerahasiaan data ? • ...
CYBER THREATS 2025-01-03
Across
- Attack A security breach where an attacker intercepts and potentially alters the communication between two parties without their knowledge.
- A technique where attackers impersonate another device, user, or website to deceive individuals or systems, often for malicious purposes.
- A cyber attack that redirects a website’s traffic to a fraudulent website, often to steal sensitive information like passwords and credit card numbers.
- Threat A security risk posed by individuals within an organization who misuse their access to harm the company or its data.
- Attack A cyber attack that occurs when a user unknowingly visits a compromised website that automatically downloads malicious software to their device.
Down
- Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.
- The act of taking advantage of a vulnerability in a system or software to gain unauthorized access or perform harmful actions.
- Scripting (XSS) A vulnerability that allows attackers to inject malicious scripts into web pages viewed by others, often to steal sensitive data.
- Attack A cyber attack that targets a vulnerability in software or hardware that is unknown to the vendor or security community, leaving no time for a fix or patch.
- Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information.
10 Clues: Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database. • Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information. • ...
Garda Times Summer Annual 2025 Crossword 2025-07-04
Across
- Location of first ever Garda Band public performance on Easter Monday, 2 April 1923 (3,9,4)
- New Justice Minister Jim (10)
- National initiative to reduce speeding (4,4,3)
- Annual multinational cyber security exercise (6,7)
- Gardens where Annual Memorial takes place (4,4)
- Location of Garda College (10)
- In-organisation term for Garda Commissioner position (6,3)
- First DPP Eamonn (6)
- Horse-riding section of the force (7,4)
- Crime tackled by Offences Against the State Act (9)
- Animals used to detect bodies, not being used by State (7,4)
- Computer-aided dispatch system (9)
Down
- Name of new Office of the Police Ombudsman (6)
- State’s highest security prison (10)
- Unoffical title of the Policing, Security and Community Safety Act 2024 (5,6,3)
- Third Garda Commissioner, Eamon (4)
- Medal awarded for bravery to gardaí (5)
- First Garda Bandmaster, Superintendent DJ (7)
- DPP Catherine (6)
- Justice scheme to support victim reconciliation(11)
- Chair of the Independent Review Group, Mr Justice Michael (5)
- Chairperson of the Policing and Community Safety Authority, Elaine (5)
- Head of Office of Police Ombudsman, Emily (5)
- Child and Family Agency (5)
24 Clues: DPP Catherine (6) • First DPP Eamonn (6) • Child and Family Agency (5) • New Justice Minister Jim (10) • Location of Garda College (10) • Computer-aided dispatch system (9) • Third Garda Commissioner, Eamon (4) • State’s highest security prison (10) • Medal awarded for bravery to gardaí (5) • Horse-riding section of the force (7,4) • ...
Shirley Homes 2022-11-23
Across
- pdf, exe, jpeg or gif
- Anna's boyfriend, to his friends
- put something on the internet
- show something is true
- Shirley's sandwich 1/2
- Who has Gucci shoes?
- Shirley's sandwich 2/2
- Shirley's other name
Down
- The Thames
- What is Shirley's last name?
- Sparkn'_____
- get something from the internet
- things that you do to keep a place, or a computer, safe
- the Chinese Bank
- the cyber thief
15 Clues: The Thames • Sparkn'_____ • the cyber thief • the Chinese Bank • Who has Gucci shoes? • Shirley's other name • pdf, exe, jpeg or gif • show something is true • Shirley's sandwich 1/2 • Shirley's sandwich 2/2 • What is Shirley's last name? • put something on the internet • get something from the internet • Anna's boyfriend, to his friends • ...
RU ITEC411- Crime and Security 2025-03-18
Across
- U.S. law that criminalizes unauthorized computer access.
- An attack that overloads and shuts down websites.
- Filing lawsuits in countries with stricter defamation laws.
- Using hacking to promote a political cause.
- Method of encoding data to prevent unauthorized access.
- Unauthorized access to computer systems.
- Records used to track cybercriminal activities.
- Hacking conducted by governments as a strategic weapon.
- Voice-based phishing scams.
- A system that filters out suspicious network activity.
- Crime involving the misuse of personal information.
Down
- Investigating digital crimes through data recovery.
- A 2013 cyber attack that compromised millions of credit cards.
- A decoy system used to attract and study hackers.
- Phishing via SMS text messages.
- sophisticated worm targeting industrial control systems.
- Manipulating people into revealing confidential information.
- Fraudulent emails attempting to steal personal data.
- Disclosing security flaws for ethical reasons.
- Security technology based on physical traits.
20 Clues: Voice-based phishing scams. • Phishing via SMS text messages. • Unauthorized access to computer systems. • Using hacking to promote a political cause. • Security technology based on physical traits. • Disclosing security flaws for ethical reasons. • Records used to track cybercriminal activities. • A decoy system used to attract and study hackers. • ...
BST crossword 2024-01-19
Across
- clap along if you feel like a room without a roof because I'm _ _ _ _ _
- pilots your body
- the closest star
- What do you feed seals?
- elephant with big ears
- Science and Technology
- opposite of blue
- a shooting star
Down
- 60+% of you body is made of this
- an elegant pen made from a feather
- a pig friends with a spider
- fifth planet
- Security
- handheld computer
- Both human and machine
15 Clues: Security • fifth planet • a shooting star • pilots your body • the closest star • opposite of blue • handheld computer • elephant with big ears • Science and Technology • Both human and machine • What do you feed seals? • a pig friends with a spider • 60+% of you body is made of this • an elegant pen made from a feather • ...
Techromatic CrossWord Challenge 2022-02-11
12 Clues: Need to pay • Pod 1 client • Blank Security • Best MSP in the world • New member of the team • What Tracy wants to do • A core Techromatic Value • A core Techromatic Value • A better way to do blank • Paul's new favorite drink • Method for identifying spam • What Waldemar likes to work on
PLP 160 Freshman Class - 2021 2021-10-04
Across
- Pasadena Rose Parade volunteer
- Speaks fluent Arabic
- Papa Murphy's Supervisor
- CIS Major with Emphasis in Cyber Security
- Future Marine Biologist
- Captain of HS Varsity Baseball Team
- USA National Miss Colorado Teen 3032
- business owner
- Pueblo Police Department Explorer
- Future Veterinarian
Down
- HS Drum Major
- Youth Rep for Center for American Values
- HS Dance Team Captain
- Kane Scholarship Recipient
- Certified Barista
- HS IB Learner Profile Awardee for Knowledge
- Boys and Girls Club Youth of the Year Winner
- CSUP Woman's Swim Team member
- Upward Bound Student of the Year
- HS Student Body President
20 Clues: HS Drum Major • business owner • Certified Barista • Future Veterinarian • Speaks fluent Arabic • HS Dance Team Captain • Future Marine Biologist • Papa Murphy's Supervisor • HS Student Body President • Kane Scholarship Recipient • CSUP Woman's Swim Team member • Pasadena Rose Parade volunteer • Upward Bound Student of the Year • Pueblo Police Department Explorer • ...
A&F IT July Crossword 2022-07-05
Across
- Scary New England author
- Assistant SCIO
- Latest supreme court justice
- What Elon makes
- Winter's call8ng card
- Building where Boston state offices are
- Mandatory security training for tech folks
- SCIO
- Assistant SCIO
- Where MITC is located
- Where Charlie works
- Popular summer vacation destination
Down
- When leaves turn colors
- Gru's yellow friends
- Fenway boys
- "You're gonna need a bigger...."
- Microsoft's place to meet
- Doctor who rules the multiverse
- Bobby of hockey fame
- Famed New England Quarterback
- What gets signed in July
- The 16th president
- Prestigious Massachusetts University
23 Clues: SCIO • Fenway boys • Assistant SCIO • Assistant SCIO • What Elon makes • The 16th president • Where Charlie works • Gru's yellow friends • Bobby of hockey fame • Winter's call8ng card • Where MITC is located • When leaves turn colors • Scary New England author • What gets signed in July • Microsoft's place to meet • Latest supreme court justice • Famed New England Quarterback • ...
Cybersecurity Terms 2023-07-24
Across
- trustable storage of sensitive information
- prevents attacks to computer
- debris from electronic devices
- voice, face, retina, fingerprint
- acronym for uninterruptible power supply
- providing validation for access
- changes device's address
- cyber attackers with no knowledge
Down
- emails designed for advertisement
- dangerous software that will duplicate
- believe they're doing right
- dangerous software that causes corruption
- theft "is not a joke Jim"
- threats to security
- result in loss or injury
- makes authentication more powerful
- another term: black hat hackers
- looks harmless, infects device
- searching data to uncover information
- how much cybersecurity costs annually
20 Clues: threats to security • result in loss or injury • changes device's address • theft "is not a joke Jim" • believe they're doing right • prevents attacks to computer • debris from electronic devices • looks harmless, infects device • another term: black hat hackers • providing validation for access • voice, face, retina, fingerprint • emails designed for advertisement • ...
AI-Driven Cybersecurity 2026-04-04
Across
- Fake email based cyber attack
- Controls user permissions
- Harmful software in systems
- AI program that interacts with users
- Locks data and demands money
- Detects unusual system behavior
- User identity verification process
- Login using fingerprint or face
- Secures data using coding
- AI based security protection system
Down
- Safeguarding sensitive data
- Protects network from threats
- Software that secretly collects data
- Unauthorized system entry attempt
- Digital attack on systems
- Machine learning based model
- Advanced neural learning method
- AI based threat detection process
- AI system used for predictions
- Protecting computer networks
20 Clues: Controls user permissions • Digital attack on systems • Secures data using coding • Safeguarding sensitive data • Harmful software in systems • Machine learning based model • Locks data and demands money • Protecting computer networks • Protects network from threats • Fake email based cyber attack • AI system used for predictions • Advanced neural learning method • ...
AI-Driven Cybersecurity 2026-04-04
Across
- AI based security protection system
- Software that secretly collects data
- AI system used for predictions
- Controls user permissions
- Protecting computer networks
- Advanced neural learning method
- User identity verification process
- Unauthorized system entry attempt
- Protects network from threats
Down
- AI based threat detection process
- Safeguarding sensitive data
- Detects unusual system behavior
- Machine learning based model
- Digital attack on systems
- Locks data and demands money
- Secures data using coding
- AI program that interacts with users
- Fake email based cyber attack
- Login using fingerprint or face
- Harmful software in systems
20 Clues: Digital attack on systems • Controls user permissions • Secures data using coding • Safeguarding sensitive data • Harmful software in systems • Machine learning based model • Locks data and demands money • Protecting computer networks • Fake email based cyber attack • Protects network from threats • AI system used for predictions • Detects unusual system behavior • ...
Cyber Security CrossWord Puzzel 2021-03-02
Across
- Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
- _______________ is any crime perpetrated using computers and networks.
- A__________ monitored a network, blocking dangerous content such as viruses.
- _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
- Viruses, trojans and worms are examples of __________________________.
- An ethical hacker.
- Your favorite teacher.
- A statement of an intention to inflict harm or damage .
Down
- Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- Your favorite class.
- __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
- The exposure to the possibility of the attacked or harmed.
- Actual action that causes harm or damage.
- A blend between an ethical hacker and a cracker.
- __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- An action taken to counteract the threat.
- ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.
17 Clues: An ethical hacker. • Your favorite class. • Your favorite teacher. • Actual action that causes harm or damage. • An action taken to counteract the threat. • A blend between an ethical hacker and a cracker. • A statement of an intention to inflict harm or damage . • The exposure to the possibility of the attacked or harmed. • ...
Cyber Security 2023-10-08
5 Clues: Tantangan Cyber Security • Salah Satu Bentuk Malware • Salah Satu Kejahatan Cyber • Ruang Di Mana Komunitas Saling Terhubung • Salah Satu Solusi Untuk Mencegah Kejahatan Cyber
BEST PRACTICES COMPLIANCE 2017 2017-04-24
Across
- Congressional act that created the CFPB
- ALTA response to Dodd-Frank Act
- Part of Pillar 3
- One type of fraud which targets settlement agents
- Acronym for American Land Title Association
- Process of reporting unclaimed or aged funds to governmental authorities
- Examples include recording, trust, escrow, premium
- Popular settlement & accounting software program
- The______________of Compliance
- Accounting transaction that have not cleared the bank
Down
- Regulatory body that enforces RESPA rules
- Fraud detection tool offered by banks
- Part of Pillar 3
- Acronym for Third Party Signing Professionals
- One type of Third Party Signing Professional
- One component of a monthly 3-way reconciliation
- Discriminatory mortgage lending practice
- Secured method of transmitting NPI
- Required for employees with access to NPI
- Can be considered a trust account shortage
- One form of computer security
- Fined $100 million by CFPB in 2016
- Internal security policy regarding paper files & NPI
- Acronyn for Non-public Personal Information
24 Clues: Part of Pillar 3 • Part of Pillar 3 • One form of computer security • The______________of Compliance • ALTA response to Dodd-Frank Act • Secured method of transmitting NPI • Fined $100 million by CFPB in 2016 • Fraud detection tool offered by banks • Congressional act that created the CFPB • Discriminatory mortgage lending practice • Regulatory body that enforces RESPA rules • ...
Ks3 - Threats and Preventions 2025-06-13
Across
- Malware that tricks you into downloading it by pretending to be something safe.
- Software detecting cyber threats
- The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
- Attack security vulnerabilities
- Fake email for stealing data
- Malware which spreads by itself across computers and networks
- Malicious program holding data hostage
- Short for malicious software, harmful software installed on a computer without permission.
- Unauthorized access attempt
Down
- Secret key for authentication
- To trick people into illegally obtaining sensitive data.
- When a hacker tries lots of different passwords very quickly.
- Digital fingerprint identifier
- Scrambles data for security
14 Clues: Scrambles data for security • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Digital fingerprint identifier • Attack security vulnerabilities • Software detecting cyber threats • Malicious program holding data hostage • To trick people into illegally obtaining sensitive data. • ...
BEST PRACTICES COMPLIANCE 2017 2017-04-24
Across
- Accounting transactions that have not cleared the bank
- Internal security policy regarding paper files & NPI
- Congressional act that created the CFPB
- One form of computer security
- Popular settlement & accounting software program
- Discriminatory mortgage lending practice
- Part of Pillar 3
- Fraud detection tool offered by banks
- Regulatory body that enforces RESPA rules
- Acronyn for Non-public Personal Information
- Fined $100 million by CFPB in 2016
- Can be considered a trust account shortage
- One type of fraud which targets settlement agents
- Part of Pillar 3
- Acronym for Third Party Signing Professionals
- Required for employees with access to NPI
Down
- ALTA response to Dodd-Frank Act
- Process of reporting unclaimed or aged funds to governmental authorities
- Secured method of transmitting NPI
- Examples include recording, trust, escrow, premium
- One component of a monthly 3-way reconciliation
- The______________of Compliance
- One type of Third Party Signing Professional
- Acronym for American Land Title Association
24 Clues: Part of Pillar 3 • Part of Pillar 3 • One form of computer security • The______________of Compliance • ALTA response to Dodd-Frank Act • Secured method of transmitting NPI • Fined $100 million by CFPB in 2016 • Fraud detection tool offered by banks • Congressional act that created the CFPB • Discriminatory mortgage lending practice • Regulatory body that enforces RESPA rules • ...
BEST PRACTICES COMPLIANCE 2017 2017-04-24
Across
- One form of computer security
- Congressional act that created the CFPB
- Secured method of transmitting NPI
- One component of a monthly 3-way reconciliation
- Regulatory body that enforces RESPA rules
- Part of Pillar 3
- Popular settlement & accounting software program
- Acronyn for Non-public Personal Information
- Acronym for Third Party Signing Professionals
- Part of Pillar 3
- Required for employees with access to NPI
- The______________of Compliance
- Internal security policy regarding paper files & NPI
Down
- ALTA response to Dodd-Frank Act
- Examples include recording, trust, escrow, premium
- Acronym for American Land Title Association
- Discriminatory mortgage lending practice
- Fraud detection tool offered by banks
- Can be considered a trust account shortage
- Fined $100 million by CFPB in 2016
- Accounting transaction that have not cleared the bank
- Process of reporting unclaimed or aged funds to governmental authorities
- One type of fraud which targets settlement agents
- One type of Third Party Signing Professional
24 Clues: Part of Pillar 3 • Part of Pillar 3 • One form of computer security • The______________of Compliance • ALTA response to Dodd-Frank Act • Secured method of transmitting NPI • Fined $100 million by CFPB in 2016 • Fraud detection tool offered by banks • Congressional act that created the CFPB • Discriminatory mortgage lending practice • Regulatory body that enforces RESPA rules • ...
AI Cyberspace 2024-10-15
Across
- Political factors influencing behavior in cybersecurity
- Measures to protect against cyber threats.
- AI enabling systems to learn from data.
- Total points vulnerable to cyber attacks.
Down
- Actions in cyberspace for security or attack.
- Actions to exploit vulnerabilities in systems.
- Intelligence Machines simulating human intelligence processes.
7 Clues: AI enabling systems to learn from data. • Total points vulnerable to cyber attacks. • Measures to protect against cyber threats. • Actions in cyberspace for security or attack. • Actions to exploit vulnerabilities in systems. • Political factors influencing behavior in cybersecurity • Intelligence Machines simulating human intelligence processes.
Cyber-security Awareness Month 2022-10-06
Across
- Do this before you click.
- Requires more than a password to access.
- You can use this to help remember passwords.
- Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- You should do this when you walk away from your computer.
- abv. Personal Identifiable Information.
- The most common malware.
- Our cyber-security training tool.
Down
- When someone, without proper credentials, follows you into a restricted building or area.
- An email with malicious intent.
- How to send sensitive files via email.
- Must be strong to prevent unwanted access.
- The best time to run updates.
- abv. for Information Security Officer
- The first line of offense against malware.
- A piece of code capable of copying itself and corrupting systems and data.
- The best way to keep sensitive information.
17 Clues: The most common malware. • Do this before you click. • The best time to run updates. • An email with malicious intent. • Our cyber-security training tool. • abv. for Information Security Officer • How to send sensitive files via email. • abv. Personal Identifiable Information. • Requires more than a password to access. • Must be strong to prevent unwanted access. • ...
Escape Room Crossword 2025-10-29
Across
- What you do when there's been an infraction
- A place where books are kept
- You must keep you sensitive information ______-up!
Down
- Cyber ________, is what you need to stay safe online
- Type of security that involves our buildings
- Using a ________ will protect your data
- A code-powered thinker with answers at lightning speed
- The type of security you need to apply when on vacation
8 Clues: A place where books are kept • Using a ________ will protect your data • What you do when there's been an infraction • Type of security that involves our buildings • You must keep you sensitive information ______-up! • Cyber ________, is what you need to stay safe online • A code-powered thinker with answers at lightning speed • ...
Module 3: Crossword Puzzle 2 2021-11-07
Across
- Acronym for a group f people in an organization responsible to respond to cyber security incidents.
- ____ AI relies on training data to develop analysis capability, the threat actor may be able to submit tainted samples.
- Acronym for a powerful all-in-one tool that can perform incident response and threat hunting.
- Communication, notification, and reporting is crucial with internal and external _____
- Facilitator presents a scenario; does not involve a live system.
- _____ is the second item in the Cyber Kill Chain Attack Framework.
Down
- Responders demonstrate response actions during a ____
- Most network, OS, and security applications will have these, it is something you will want to review and audit. Can be automated or reviewed manually.
- Isolate suspected system for analysis in a sandbox.
- Acronym for a mechanism to identify if and when an attempt was made to extract files to an unauthorized medium.
- An acronym for responding and recovery planning for major incidents.
11 Clues: Isolate suspected system for analysis in a sandbox. • Responders demonstrate response actions during a ____ • Facilitator presents a scenario; does not involve a live system. • _____ is the second item in the Cyber Kill Chain Attack Framework. • An acronym for responding and recovery planning for major incidents. • ...
crack the code 2024-04-30
Across
- A method of cyber attack that involves sending emails with malicious attachments or links (8 letters)
- A program designed to prevent, detect, and remove malware (10 letters)
- Testing The process of identifying and fixing security vulnerabilities in a computer system (10 letters) Penetration Testing
- A technique used to secure wireless networks (11 letters)
- Protects a computer system from unauthorized access (9 letters)
Down
- A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)
- Authentication A security measure that verifies the authenticity of a user attempting to log in (14 letters)
- Detection A security measure that tracks and analyzes network traffic to detect and prevent unauthorized access (9 letters)
- A method of protecting sensitive data by converting it into a code that can only be deciphered with a key (9 letters)
- Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
10 Clues: A technique used to secure wireless networks (11 letters) • Protects a computer system from unauthorized access (9 letters) • A program designed to prevent, detect, and remove malware (10 letters) • A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters) • ...
CyberSecuriCrazy! 2026-03-07
Across
- A weakness in a system.
- Malware that encrypts victim's files.
- A fake email scam.
- Information used in cyber threats.
- A secret word.
- Disguised software to trick users.
- A network of compromised computers.
- Converting data into a secret code.
Down
- Security risk posed by employees.
- Unauthorized access to computer systems.
- Data is accessed or stolen.
- Controls incoming and outgoing traffic.
- Pretend trusted entity.
- Detects and removes viruses.
- Verifying a user's identity.
- Fixing update in software.
- Unknown, exploited software vulnerability.
- Attack that overwhelms a system.
- Requires two forms of verification.
19 Clues: A secret word. • A fake email scam. • A weakness in a system. • Pretend trusted entity. • Fixing update in software. • Data is accessed or stolen. • Detects and removes viruses. • Verifying a user's identity. • Attack that overwhelms a system. • Security risk posed by employees. • Information used in cyber threats. • Disguised software to trick users. • ...
3°4 jobs 2025-2026 2025-11-25
Across
- a person who installs and repairs air-conditioning systems.
- a person who helps patients with daily care in hospitals.
- a person who sells and arranges flowers.
- a person who repairs cars and engines.
- a person who builds or repairs houses.
- a person who helps with young children in a nursery.
- a person who welcomes people in a company or office.
- a person who gives medical care to patients.
- a person who cuts and styles hair.
- a person who fixes and looks after buildings.
Down
- a person who cares for skin, nails and beauty treatments.
- a person who takes care of children at home.
- a person who helps customers in a shop.
- a person who designs and takes care of gardens.
- a person who protects computers from cyber attacks.
- a person who prepares meals.
16 Clues: a person who prepares meals. • a person who cuts and styles hair. • a person who repairs cars and engines. • a person who builds or repairs houses. • a person who helps customers in a shop. • a person who sells and arranges flowers. • a person who takes care of children at home. • a person who gives medical care to patients. • a person who fixes and looks after buildings. • ...
workshop 2021-04-10
Across
- informations- och kommunikationsteknik
- ingenjörens viktigaste skicklighet
- titel som ska tas emot efter examen
- Nätverk ingenjör
- när du använder internet är du ansluten till detta
- tidigare programvarateknik
Down
- KVM, Hyper-V, VMWare, Virtualbox
- nuvarande 'cyber security'
- till exempel en 'Zoom' anslutning
- C++, C#, java och python
- ingår inte längre i IKT-studier
- det kan lösä problem
- dessa kan säkerställa programvarans funktionalitet
13 Clues: Nätverk ingenjör • det kan lösä problem • C++, C#, java och python • nuvarande 'cyber security' • tidigare programvarateknik • ingår inte längre i IKT-studier • KVM, Hyper-V, VMWare, Virtualbox • till exempel en 'Zoom' anslutning • ingenjörens viktigaste skicklighet • titel som ska tas emot efter examen • informations- och kommunikationsteknik • ...
Prestige Cybersecurity Awareness Month 2025-10-16
Across
- A network security system that monitors and controls incoming and outgoing traffic
- A type of cyber attack that tricks users into revealing personal information
- The principle of ensuring data is not altered or tampered with
- A software update that fixes security vulnerabilities
- Malware that locks data and demands payment for release
- A file or program that appears harmless but contains malicious code
- Software designed to disrupt, damage, or gain unauthorized access
- The process of converting data into a coded form to prevent unauthorized access
Down
- The practice of hiding messages so only the intended recipient can read them
- Software that secretly gathers user information
- A person who gains unauthorized access to systems for malicious purposes
- An extra layer of security requiring two forms of identification
- A secret word or phrase used to gain access
- A fake website or email designed to look legitimate
- A service that encrypts your internet connection for privacy
15 Clues: A secret word or phrase used to gain access • Software that secretly gathers user information • A fake website or email designed to look legitimate • A software update that fixes security vulnerabilities • Malware that locks data and demands payment for release • A service that encrypts your internet connection for privacy • ...
IVGM 2022-11-26
Across
- Foundations of Cyber Security
- Information Society Principles: towards e-Governance
- E-Governance Technologies and Services Master's Project
- Introduction to IT and eGov Technologies
- Introduction to Development in Cloud
- Enterprise Architecture and BPM
- Governing in the Digital Era
- Creating Innovation Capacities in Government
Down
- Basics of e-Health
- Impact and Measurement of e-Governance
- IT Solutions of e-government
- Information Systems Programming
- Legal Framework of e-Governance
- International Entrepreneurship
- Estonian Language and Culture
15 Clues: Basics of e-Health • IT Solutions of e-government • Governing in the Digital Era • Foundations of Cyber Security • Estonian Language and Culture • International Entrepreneurship • Information Systems Programming • Legal Framework of e-Governance • Enterprise Architecture and BPM • Introduction to Development in Cloud • Impact and Measurement of e-Governance • ...
Workforce or College 2023-05-25
10 Clues: 2 year degree • 4 year degree • less than a year • serving our country • career from 2 year degree • career from 4 year degree • training from an apprenticeship • working for your future employer • security of the web for military • career from technical certificate
Netiquette 2023-09-14
Across
- always having capslock on
- A strong opinion directed at someone else
- When Online use proper_________
- A lot of Junk Emails
- When Online Treat others how You want to be_________
- _______ security
Down
- _______info is not to be freely distributed
- Remember the ____________
- Network Etiquette
- Respect others _________
10 Clues: _______ security • Network Etiquette • A lot of Junk Emails • Respect others _________ • Remember the ____________ • always having capslock on • When Online use proper_________ • A strong opinion directed at someone else • _______info is not to be freely distributed • When Online Treat others how You want to be_________
KN - TACOHAI - G8 - 2ND TERM - FINAL REVIEW 1 - 240424 2024-04-24
Across
- V đánh giá
- N | Adj (N) dòng điện | (Adj) thuộc về điện
- V | N ấn nhẹ, gõ nhẹ, búng nhẹ | (N) cú ấn nhẹ, cái gõ nhẹ, cái đập nhẹ (eg. with the ... of a switch)
- N điện lực, điện (nói chung)
- N sự cháy điện
- V phát minh
- N tín hiệu giao thông
- N khí nhà kính
- combining form mạng (eg. cyberbully, cyber-security,..)
- N sự phát minh
Down
- V giật điện, giết (bằng dòng điện)
- N mức năng lượng của tác giả
- N sự giật điện, sự bị điện giật chết
- N đa truyền thông (sự kết hợp cả âm thanh, hình ảnh, chữ viết.. trên màn hình hiển thị)
- Adj đầy năng lượng, năng nổ, giàu năng lượng (eg. an ... Supporter)
- N phương tiện truyền thông
- N bão lớn Thái Bình Dương <a violent tropical storm with very strong winds> (Hurricane: bão lớn Đại Tây Dương)
- Adj (= imaginative) đầy sáng tạo, có óc sáng tạo, giảu trí tưởng tượng
- Adj bằng lời nói, bằng miệng (>< nonverbal, written)
- V truy cập
20 Clues: V đánh giá • V truy cập • V phát minh • N sự cháy điện • N khí nhà kính • N sự phát minh • N tín hiệu giao thông • N phương tiện truyền thông • N mức năng lượng của tác giả • N điện lực, điện (nói chung) • V giật điện, giết (bằng dòng điện) • N sự giật điện, sự bị điện giật chết • N | Adj (N) dòng điện | (Adj) thuộc về điện • Adj bằng lời nói, bằng miệng (>< nonverbal, written) • ...
IEM's October Social Media Crossword Puzzle 2021-10-21
Across
- Wash your hands with _____ and water
- October is ________ Awareness Month
- IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
- Important tool to protect your family during a fire emergency
- Theme of hurricane preparedness tip
- IEMer moderating FEAM Forum Panel at IAEM (last name)
- Sites opening across Virginia
- International Day for Disaster ______
Down
- Great Shake Out Drill
- Cyber attack
- FEMA Administrator (last name)
- 246th Birthday
- Committed to stabilizing ______ security
- NEMA 2021 Annual Forum
- ______ Week
- Annual Conference in Grand Rapids, MI
- Conferences are an opportunity to…
17 Clues: ______ Week • Cyber attack • 246th Birthday • Great Shake Out Drill • NEMA 2021 Annual Forum • Sites opening across Virginia • FEMA Administrator (last name) • Conferences are an opportunity to… • October is ________ Awareness Month • Theme of hurricane preparedness tip • Wash your hands with _____ and water • Annual Conference in Grand Rapids, MI • ...
Cybersecurity 2025-11-10
Across
- gain unauthorized access to a computer system
- capable of being easily hurt
- refers to any external entity who may have access to private data
- security risk who cause the program to crash
- network of maliciously installed bots
- records or transmits a user's keystrokes
Down
- cyber exploit directed at online card players
- unauthorized duplication or deletion of an organization's electronic information
- security mechanism for separating running programs
- software tools used by a third party
10 Clues: capable of being easily hurt • software tools used by a third party • network of maliciously installed bots • records or transmits a user's keystrokes • security risk who cause the program to crash • cyber exploit directed at online card players • gain unauthorized access to a computer system • security mechanism for separating running programs • ...
Cyber Security quiz 2022-12-19
11 Clues: What school? • Busting what? • His profession • What resource? • Who's the good? • The white what? • Michael Knights car • minus 273.15 degrees is • Creative imaginary work • Main characters callsign • Main characters first name
Cyber Security Revision 2024-10-10
Across
- Part of the Internet that can be accessed using a search engine.
- A way of convincing people to give up personal information.
- A way of strengthening logins by sending a code to a phone or email.
- A simple (and very old) method of encryption where the alphabet is shifted.
Down
- Part of the Internet that is unmonitored and often contains illegal content.
- A way of jumbling up data so it is unreadable.
- Type of hacker that commits illegal actions.
- A small piece of software designed to cause damage.
- Type of hacker who commits illegal actions but for the greater good.
- Part of the Internet hidden behind logins, etc.
- Type of hacker who legally hacks, often to test networks.
11 Clues: Type of hacker that commits illegal actions. • A way of jumbling up data so it is unreadable. • Part of the Internet hidden behind logins, etc. • A small piece of software designed to cause damage. • Type of hacker who legally hacks, often to test networks. • A way of convincing people to give up personal information. • ...
CYBER SECURITY CROSSWORD 2025-09-24
Across
- A way to lock your data so only the right person can read it.
- Keeping your personal information safe and not sharing it without permission.
- A security step where you need two things (like a password and a code) to log in.
- A machine that cuts paper into tiny pieces so no one can read it.
- Malicious software that can damage your computer or steal your data.
- A secret word or code you use to log in and keep your accounts safe.
Down
- A program that finds and removes harmful software from your device.
- A tool that protects your computer by blocking unwanted internet traffic.
- A sneaky program that watches what you do on your computer without you knowing.
- A small update that fixes problems or security holes in software.
- A trick where someone pretends to be trustworthy to steal your personal info.
11 Clues: A way to lock your data so only the right person can read it. • A small update that fixes problems or security holes in software. • A machine that cuts paper into tiny pieces so no one can read it. • A program that finds and removes harmful software from your device. • Malicious software that can damage your computer or steal your data. • ...
soal 4.0 2023-10-24
Across
- salah satu teknologi di industri 4.0 yang sangat berguna saat ini
- Alat Iot yang kegunaanya memudahkan dirumah
- Teknologi inti dari Industri 4.0
- Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
- Data besar yang kompleks yang dianalisis dalam industri 4.0
- Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
- Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
- Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
- Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
- Revolusi industri saat ini
10 Clues: Revolusi industri saat ini • Teknologi inti dari Industri 4.0 • Alat Iot yang kegunaanya memudahkan dirumah • Data besar yang kompleks yang dianalisis dalam industri 4.0 • salah satu teknologi di industri 4.0 yang sangat berguna saat ini • Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber • ...
Cyber Security Juniors 2020-11-13
Across
- a secret word or phrase
- programs that scan your computer
- a sysytem of rules that explain correct steps
- a system of rules that explains correct steps
- person who secretly gets access to computer info
- method of changing a message to conceal meaning
Down
- unwanted emails
- personal facts about you
- copying a file from one computer to another
- system of computers and devices
- a word or phrase entered into a device
11 Clues: unwanted emails • a secret word or phrase • personal facts about you • system of computers and devices • programs that scan your computer • a word or phrase entered into a device • copying a file from one computer to another • a sysytem of rules that explain correct steps • a system of rules that explains correct steps • method of changing a message to conceal meaning • ...
cyber security crossword 2022-11-28
Across
- is any software that installs itself on your computer and starts covertly monitoring your online behaviour without your knowledge or permission.
- is any malware that misleads users of its true intent.
- manipulation technique that exploits human error to gain private information, access, or valuables.
Down
- Distributed denial of service attack
- is a malware designed to deny a user or organization access to files on their computer
- is a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
- is unwanted software designed to throw advertisements up on your screen, most often within a web browser.
- As software designed to interfere with a computer's normal functioning
- spreads across a network
- a set of computers infected by bots.
- a piece of code which is capable of copying itself e.g. corrupting the system or destroying data.
11 Clues: spreads across a network • Distributed denial of service attack • a set of computers infected by bots. • is any malware that misleads users of its true intent. • As software designed to interfere with a computer's normal functioning • is a malware designed to deny a user or organization access to files on their computer • ...
Cyber Security Juniors 2020-11-10
Across
- virus software, programs that scan your computer
- system of computers and devices
- method of changing a message to conceal meaning
- secret word or phrase
- information, personal facts about you
- system of symbols usually letters and numbers
Down
- person who secretly gets access to computer info
- a system of rules that explains correct steps
- word or phrase entered into devises
- unwanted emails
- copying a file from one computer to another
11 Clues: unwanted emails • secret word or phrase • system of computers and devices • word or phrase entered into devises • information, personal facts about you • copying a file from one computer to another • a system of rules that explains correct steps • system of symbols usually letters and numbers • method of changing a message to conceal meaning • ...
Cyber security revision 2021-11-05
11 Clues: fishing • Covid-19 • a big horse • always check • unique to you • a wall on fire • sounds like capture • my anti has a virus • a insect that wriggles around • something you need to login to a device • looking at someone password over their shoulder
