cyber security Crossword Puzzles

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

cyber security 2022-11-28

cyber security crossword puzzle
Across
  1. - distributed denial of service.
  2. - a type of computer programme that modifys other computer programmes with its own code.
  3. - someone from the inside of a company who threatens to expose the passwords for the company.
  4. -once an email or message has been clicked the ransomer has all of your data and threatens to publish all of your data unless you pay a large sum of money.
Down
  1. - when someone just keeps on guessing a password or username until they get it right.
  2. - malicious software designed to harm.
  3. -a subset of the trojan horse malware that can clone itself again and again.
  4. -sending someone a random email with a link in that you want them to click.

8 Clues: - distributed denial of service.- malicious software designed to harm.-sending someone a random email with a link in that you want them to click.-a subset of the trojan horse malware that can clone itself again and again.- when someone just keeps on guessing a password or username until they get it right....

Cyber Security 2022-10-12

Cyber Security crossword puzzle
Across
  1. The type of engineering which targets "bugs in the human hardware"
  2. The process by which an individual’s access to accounts and data is reviewed on a routine basis.
  3. Complete this phrase "Where to Store, What to _____"
  4. What you are if you complete this crossword by the end of the week.
Down
  1. A small file placed on a computer by a website assigning a unique ID to the device
  2. Permission entitled to an individual allowing them to use a system or view data.
  3. Recently published CHS notice relating to how CHS handles employees personal data.
  4. CHS approved Password Manager.

8 Clues: CHS approved Password Manager.Complete this phrase "Where to Store, What to _____"The type of engineering which targets "bugs in the human hardware"What you are if you complete this crossword by the end of the week.Permission entitled to an individual allowing them to use a system or view data....

Cyber Security 2020-03-03

Cyber Security crossword puzzle
Across
  1. also called an ID
  2. a system of symbols such as letters and numbers to hide a meaning
  3. someone who secretly accesses your information
  4. uses clever advertisements to trick you into giving away information
Down
  1. copying a file such as a photo, video or game
  2. sneak into your computer to cause damage
  3. software that takes over a computer and kidnaps data
  4. a method of changing a method to conceal its meaning

8 Clues: also called an IDsneak into your computer to cause damagecopying a file such as a photo, video or gamesomeone who secretly accesses your informationsoftware that takes over a computer and kidnaps dataa method of changing a method to conceal its meaninga system of symbols such as letters and numbers to hide a meaning...

Cyber Security 2021-02-12

Cyber Security crossword puzzle
Across
  1. are able to exploit vulnerabilities in the a computers operating system or a networks hardware
  2. A word that people use to tell them that no one else knows
  3. or devices.
  4. Gathers information about how you use your computer
Down
  1. Short for malicious software, that gains access to your computer or device
  2. A set of secret characters, that only you know, to keep your private information secure.
  3. A malicious form of self replicating
  4. Someone that tries to gain access to your person

8 Clues: or devices.A malicious form of self replicatingSomeone that tries to gain access to your personGathers information about how you use your computerA word that people use to tell them that no one else knowsShort for malicious software, that gains access to your computer or device...

Cyber Security 2023-09-26

Cyber Security crossword puzzle
Across
  1. malware that changes or destroys information and is passed on to other systems
  2. a type of internet fraud that seeks to acquire a user's information by deception
  3. intelligence of machines
  4. malicious software
Down
  1. keeps intruders out digitally
  2. a group of applications that instruct a computer to carry out a task
  3. someone who attempts to gain unauthorized access
  4. unsolicited emails

8 Clues: unsolicited emailsmalicious softwareintelligence of machineskeeps intruders out digitallysomeone who attempts to gain unauthorized accessa group of applications that instruct a computer to carry out a taskmalware that changes or destroys information and is passed on to other systems...

Cyber Security 2024-11-28

Cyber Security crossword puzzle
Across
  1. Avoid creating _______ passwords
  2. Never click on a ________from an untrusted source
  3. Regularly update your ________ system
  4. Never write down your __________
Down
  1. Use _________ software
  2. Perform regular ________ of important data
  3. _________select the "Remember My Password
  4. Never give out your password to _____________

8 Clues: Use _________ softwareAvoid creating _______ passwordsNever write down your __________Regularly update your ________ system_________select the "Remember My PasswordPerform regular ________ of important dataNever give out your password to _____________Never click on a ________from an untrusted source

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

Cyber Security 2022-02-13

Cyber Security crossword puzzle
Across
  1. attack in which the victim receives an email disguised to look as if it has come from a reputable source
  2. hackers who use tools downloaded from the internet
  3. created when that data has been processed and becomes meaningful
  4. set of methods used by cybercriminals to deceive individuals into handing over information
Down
  1. involves the attacker watching the victim while they provide sensitive information
  2. Gaining unauthorised access to or control of a computer system
  3. raw facts and figures
  4. an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money

8 Clues: raw facts and figureshackers who use tools downloaded from the internetGaining unauthorised access to or control of a computer systemcreated when that data has been processed and becomes meaningfulinvolves the attacker watching the victim while they provide sensitive information...

Cyber Security! 2023-01-04

Cyber Security! crossword puzzle
Across
  1. What most people use to login to their phone
  2. Another thing you can use to lock your phone
  3. A person who tries to hack systems to learn how to make them stronger
  4. You enter your email and _____ to login to things
Down
  1. Software or apps used to store passwords
  2. A stronger version of a password
  3. When a hacker tries to steal information through email
  4. A person who tries to steal your data or money digitally

8 Clues: A stronger version of a passwordSoftware or apps used to store passwordsWhat most people use to login to their phoneAnother thing you can use to lock your phoneYou enter your email and _____ to login to thingsWhen a hacker tries to steal information through emailA person who tries to steal your data or money digitally...

Cybersecurity Crossword 2023-01-26

Cybersecurity Crossword crossword puzzle
Across
  1. altered video to spread disinformation
  2. unique string that identifies device
  3. helps protect system
  4. malware that transmits private data
  5. helps prevent unauthorized network access
  6. flood website/server until crash
  7. codes that protect data
  8. cybersecurity professionals
  9. designs data communications network
Down
  1. unauthorized access to sensitive info
  2. software designed to disrupt system
  3. plans and implements security
  4. remote encrypted network access
  5. helps prevent unauthorized access
  6. criminal hackers
  7. requests payment to unlock
  8. malware hidden inside legitimate file
  9. mimics legitimate websites/emails
  10. network of computers used for cyber attacks

19 Clues: criminal hackershelps protect systemcodes that protect datarequests payment to unlockcybersecurity professionalsplans and implements securityremote encrypted network accessflood website/server until crashhelps prevent unauthorized accessmimics legitimate websites/emailssoftware designed to disrupt systemmalware that transmits private data...

Cyber security risks 2017-07-13

Cyber security risks crossword puzzle
Across
  1. this is a software to design to detect and destroy computer viruses
  2. a person who uses computers to gain unauthorized access to data
  3. a network of social interactions and personal relationships
  4. the action of keeping your device safe
  5. this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
  1. a piece of code which is capable of copying itself and can corrupts the system or destroying data
  2. this is a software that threatens to delete your data for a specific amount of money
  3. a person who gains unauthorised access to computer files or networks in order to further social or political ends
  4. fraudulent practice of sending emails pretending to be from reputable companies
  5. convert information or data into a code especially to prevent unauthorised access
  6. a computer program that records every keystroke made by a computer user
  7. a secret word or phrase that must be used to gain admission to a place

12 Clues: the action of keeping your device safea network of social interactions and personal relationshipsa person who uses computers to gain unauthorized access to datathis is a software to design to detect and destroy computer virusesa secret word or phrase that must be used to gain admission to a place...

Cyber Security Crossword 2024-01-16

Cyber Security Crossword crossword puzzle
Across
  1. A malicious program that infects computers without user knowledge or permission.
  2. Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
  3. Malicious party attacking a company.
  4. A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
  5. attack that affects availability of a resource.
  6. A botnet is a network of private computers infected with malicious software.
Down
  1. Secret expression required to gain access to a computing system.
  2. Attack type.
  3. Excessive push notifications leading to unwanted response.
  4. authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
  5. Data Leakage due to well-crafted AI prompt.
  6. Firewall type that protects Web-based Applications.

12 Clues: Attack type.Malicious party attacking a company.Data Leakage due to well-crafted AI prompt.attack that affects availability of a resource.Firewall type that protects Web-based Applications.Excessive push notifications leading to unwanted response.Secret expression required to gain access to a computing system....

Cyber security crossword 2023-09-11

Cyber security crossword crossword puzzle
Across
  1. password
  2. ads
  3. vulnerabilities
  4. authentication
  5. Layer Security
  6. Keys Identified Mail
Down
  1. Message Authentication,Reporting & Conformance
  2. Sender Policy Framework
  3. your data
  4. Response
  5. Vulnerability
  6. compliance

12 Clues: adspasswordResponseyour datacomplianceVulnerabilityauthenticationLayer SecurityvulnerabilitiesKeys Identified MailSender Policy FrameworkMessage Authentication,Reporting & Conformance

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

Laurea Davi 2025-09-18

Laurea Davi crossword puzzle
Across
  1. Cyber
  2. Venezia→
  3. Il tuo Vero spitrito guida
  4. 3 vs Computer science
  5. Prossima fermata
  6. non si è unit* a te (non è A.L.)
  7. La tua presenza è garantita
  8. Alcuni dicono che non sia un vero lavoro
  9. Anniversario Taverna (gg/mes)
Down
  1. Nome caccia
  2. Da ottobre a marzo non può mai mancare
  3. Un arte per pochi
  4. Mamma
  5. non si possono cambiare le proprie origini
  6. seconda casa
  7. Un lupo che si traveste da...
  8. ha rifiutato ma non e la Alessia Lazzaro
  9. sai già che non cambierà mai
  10. Danger

19 Clues: CyberMammaDangerVenezia→Nome cacciaseconda casaProssima fermataUn arte per pochi3 vs Computer scienceIl tuo Vero spitrito guidaLa tua presenza è garantitasai già che non cambierà maiUn lupo che si traveste da...Anniversario Taverna (gg/mes)non si è unit* a te (non è A.L.)Da ottobre a marzo non può mai mancareha rifiutato ma non e la Alessia Lazzaro...

Year 8 Cyber security 2022-10-12

Year 8 Cyber security crossword puzzle
Across
  1. gathers information about you
  2. program that replicates itself
  3. transforming encrypted code to original format
  4. code which is designed to cause damage
  5. spying on the user to get personal info
  6. throws adverts on your screen
  7. social engineering to steal user information
  8. obtaining something by persuasion
  9. cyber attack intended to redirect web traffic
  10. mislead users of its true intention
Down
  1. simulated cyber attack
  2. use of internet based social media
  3. the code that transforms an encrypted message
  4. replace plain text with cipher text
  5. gaining unauthorised access to data or system
  6. malicious activities through humans
  7. malicious code designed to cause damage to device
  8. converting messages into secret code

18 Clues: simulated cyber attackgathers information about youthrows adverts on your screenprogram that replicates itselfobtaining something by persuasionuse of internet based social mediareplace plain text with cipher textmalicious activities through humansmislead users of its true intentionconverting messages into secret code...

Cyber Security Crossword 2020-03-11

Cyber Security Crossword crossword puzzle
Across
  1. an analysis of an applications source code
  2. a piece of code that takes advantage of a vulnerability
  3. software designed to cause harm
  4. a vulnerability that is currently unknown
  5. a technique used by hackers to gain sensitive information
  6. malware that holds your data hostage
Down
  1. collection of web or internet based pages
  2. when a system has false requests that causes it to crash
  3. impersonating another use or device on a network
  4. encoding software for authorized access only
  5. hardware or software that blocks viruses
  6. when a hacker gains access to files and network

12 Clues: software designed to cause harmmalware that holds your data hostagehardware or software that blocks virusescollection of web or internet based pagesa vulnerability that is currently unknownan analysis of an applications source codeencoding software for authorized access onlywhen a hacker gains access to files and network...

Cyber Security Crossword 2024-10-17

Cyber Security Crossword crossword puzzle
Across
  1. a popular DDOS tool
  2. Why a threat is performed
  3. A threat that happens due to mistakes
  4. A threat performed with malicious intent
  5. individuals who attack a system with inside knowledge
  6. an attack aimed to floor servers with traffic
Down
  1. Blocking access to a system
  2. an attack aimed to trick individuals
  3. Impact to a business due to insiders
  4. The aim behind an attack
  5. young personnel who perform server attacks.
  6. Possible aim of a script kiddie

12 Clues: a popular DDOS toolThe aim behind an attackWhy a threat is performedBlocking access to a systemPossible aim of a script kiddiean attack aimed to trick individualsImpact to a business due to insidersA threat that happens due to mistakesA threat performed with malicious intentyoung personnel who perform server attacks....

Cyber Security Awareness 2018-06-05

Cyber Security Awareness crossword puzzle
Across
  1. Be careful connecting to public _____.
  2. is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
  3. unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
  4. shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
  5. What month is National Cyber Security Awareness Month?
  6. True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
  1. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
  2. techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  3. a secret word or expression used by authorized persons to prove their right to access, information, etc.
  4. when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
  5. type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
  6. is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user

12 Clues: Be careful connecting to public _____.What month is National Cyber Security Awareness Month?True/False: Call I.T. Service desk right away when you suspect a phishing emailtechniques of protecting computers, networks, programs and data from unauthorized access or attacks...

Cyber Security Crossword 2021-09-26

Cyber Security Crossword crossword puzzle
Across
  1. Malicious computer program (not to be confused with Corona)
  2. A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
  3. A type of malicious software that locks your files until you pay up
  4. Unwanted but not malicious emails
  5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  6. Short name for MALicious softWARE
  7. Sending a fake email to try and personal or sensitive information
Down
  1. The creators of our anime cybersecurity traing videos
  2. A type of malware that functions by spying on user activity without their knowledge
  3. Secret word or phrase used to gain access to a system (the longer the better)
  4. The name of the cybersecurity drama series (no space)
  5. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.

12 Clues: Unwanted but not malicious emailsShort name for MALicious softWAREThe creators of our anime cybersecurity traing videosThe name of the cybersecurity drama series (no space)Malicious computer program (not to be confused with Corona)Sending a fake email to try and personal or sensitive information...

History 2022-07-29

History crossword puzzle
Across
  1. In 2014, the Cyber Security Operations Centre evolved to the next stage of Australia's cyber security capability.
  2. In 2018, ASD became independent as recommendations from the unclassified version of the 2017 Independent Intelligence Review was implemented.
  3. In 1988, the government decided that DSD should move to Defence headquarters at Russell Offices in this city, to facilitate a closer relationship with Defence.
  4. Established in Melbourne on 1 April 1947. Its role was to exploit foreign communications and be responsible for communications security in the armed services and government departments.
  5. DSD relocated from its temporary accommodation in Albert Park to a new purpose-built facility in this historic Melbourne location.
  6. In 2019, the Prime Minister announced the new Director-General of ASD.
Down
  1. in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security.
  2. Renamed as a result of an inquiry and made directly responsible to the Secretary of the Department of Defence.
  3. The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.
  4. in 1986, DSD acquired Australia's first supercomputer.
  5. Australian, American and British personnel worked together in this agency in Melbourne, attached to General MacArthur's headquarters.

11 Clues: in 1986, DSD acquired Australia's first supercomputer.In 2019, the Prime Minister announced the new Director-General of ASD.The joint Australian-American Fleet Radio Unit Melbourne supported the US Navy's 7th Fleet.in 2013, DSD was renamed to reflect its whole-of-government role in support of Australia's national security....

Cyber security 2020-08-21

Cyber security crossword puzzle
Across
  1. Es una estafa para poder obtener tus datos privados.
  2. software que busca información y después la trasmite sin tu conocimiento.
  3. Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.
  4. Programas informáticos con el objetivo de alterar el funcionamiento de tu computadora y infectar archivos.
  5. Correo electrónico que no solicitaste ni desates e igual recibiste.
Down
  1. Archivos de un sitio web que se guardan en tu computadora y guardan información sobre voz.
  2. Sistema que evita el acceso no autorizado a una red privada.
  3. Programa informático que detecta y elimina los virus y otros programas perjudiciales.

8 Clues: Es una estafa para poder obtener tus datos privados.Sistema que evita el acceso no autorizado a una red privada.Correo electrónico que no solicitaste ni desates e igual recibiste.Software malicioso se infiltra en tu dispositivo sin que voz lo sepas.software que busca información y después la trasmite sin tu conocimiento....

Cyber security 2020-03-03

Cyber security crossword puzzle
Across
  1. a method of changing a message to conceal its meaning
  2. software takes over a computer and kudnaps data
  3. also called an ID
  4. a system of symbols such as letters and numbers to hide a meaning
Down
  1. someone who secretly gets access to our information
  2. sneaks into your computer to cause damage
  3. what uses clever advertisements to trick you into giving away information
  4. copying a file such as a photo, video or game

8 Clues: also called an IDsneaks into your computer to cause damagecopying a file such as a photo, video or gamesoftware takes over a computer and kudnaps datasomeone who secretly gets access to our informationa method of changing a message to conceal its meaninga system of symbols such as letters and numbers to hide a meaning...

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. Most common social engineering technique
  2. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  3. SMS+phishing
  4. The knowledge
  5. The one who hacks
Down
  1. Common word for frauds
  2. Your secret key to online accounts
  3. The malicious software is called

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.​
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data​
  3. someone who seeks and exploits weaknesses in a computer system or computer network.​
  4. written errors in someone's code or program.​
Down
  1. If lots of infected systems combine to form a network it is called botnet.​
  2. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker. ​
  3. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.​
  4. Unlike a computer virus, it does not need to attach itself to an existing program.

8 Clues: written errors in someone's code or program.​If lots of infected systems combine to form a network it is called botnet.​Unlike a computer virus, it does not need to attach itself to an existing program.someone who seeks and exploits weaknesses in a computer system or computer network.​...

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. someone sends a fake website to you
  2. type of malicious code or software that looks legitimate but can take control of your computer
  3. to a malicious program that replicates itself, automatically spreading through a network.
  4. looking over someone shoulder to obtain info
Down
  1. hacks your computer
  2. analysis of people's unique physical identity
  3. something to protect your computer
  4. a person trying to steal personal information

8 Clues: hacks your computersomething to protect your computersomeone sends a fake website to youlooking over someone shoulder to obtain infoanalysis of people's unique physical identitya person trying to steal personal informationto a malicious program that replicates itself, automatically spreading through a network....

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. facts provided or learned about something or someone
  2. information about a person
  3. person who uses computers to gain unauthorized access to data.
  4. inadvertently doing other than what should have been done; a slip, lapse or mistake
Down
  1. looking over someone's shoulder
  2. an attack where people are asked to input data
  3. use of deception to manipulate individuals
  4. raw facts or figures

8 Clues: raw facts or figuresinformation about a personlooking over someone's shoulderuse of deception to manipulate individualsan attack where people are asked to input datafacts provided or learned about something or someoneperson who uses computers to gain unauthorized access to data....

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. engineering manipulation
  2. infects computer
  3. data your private information
  4. generator attacks social media
  5. error an action wasnt intended
Down
  1. information
  2. found your information
  3. you learned it

8 Clues: informationyou learned itinfects computerfound your informationengineering manipulationdata your private informationgenerator attacks social mediaerror an action wasnt intended

Cyber security 2023-04-21

Cyber security crossword puzzle
Across
  1. verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
  2. facts provided or learned about something or someone.
  3. malware that replicates and transfers itself to other computers via a network
Down
  1. The authorization given to users that enables them to access specific resources on the network,
  2. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
  3. someone who hacks into your account
  4. information that has been translated into a form that is efficient for movement or processing
  5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

8 Clues: someone who hacks into your accountfacts provided or learned about something or someone.malware that replicates and transfers itself to other computers via a networkinformation that has been translated into a form that is efficient for movement or processing...

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. looking at private information
  2. separates malicious software from legitimate applications
  3. barrier on a computer
Down
  1. data personal information
  2. permission access granted to users to specific resources
  3. someone who hacks your account
  4. unprocessed information
  5. animal and computer virus

8 Clues: barrier on a computerunprocessed informationdata personal informationanimal and computer viruslooking at private informationsomeone who hacks your accountpermission access granted to users to specific resourcesseparates malicious software from legitimate applications

Cyber Security 2024-01-26

Cyber Security crossword puzzle
Across
  1. false information spread in order to deceive people
  2. the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
  3. cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
  1. an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
  2. the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
  3. behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
  4. warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
  5. the discovering of secrets, especially political or military information of another country or the industrial information of a business

8 Clues: false information spread in order to deceive peoplecataclysm resulting from a large-scale sabotage of all computerized networks, systems and activitiesan academic, non-binding study on how international law applies to cyber conflicts and cyber warfare....

Cyber Security 2025-03-20

Cyber Security crossword puzzle
Across
  1. Ensuring authorized access to a system or data
  2. An unauthorized entry into a system or network
  3. It's like turning your message into a puzzle that only the right person can solve
  4. Helps prevent unauthorized access and malicious attacks
Down
  1. Harmful software designed to disrupt or damage
  2. A digital trick to steal your personal information
  3. This could be someone wearing a "digital mask", either breaking in for mischief or to find vulnerabilities
  4. Imagine software that's like an invisible spy, quietly gathering your data without you noticing

8 Clues: Harmful software designed to disrupt or damageEnsuring authorized access to a system or dataAn unauthorized entry into a system or networkA digital trick to steal your personal informationHelps prevent unauthorized access and malicious attacksIt's like turning your message into a puzzle that only the right person can solve...

Sales Team 2024-07-15

Sales Team crossword puzzle
Across
  1. cyber security excellence award winner 2023
  2. 2
  3. statement you read after collecting payment information
  4. Wife, girlfriend, husband, boyfriend,significant partner
  5. 49.00 price
  6. legalshield headquarters
Down
  1. primerica identity plan is called
  2. PU app type
  3. Best overall legal service plan 2024, Forbes
  4. credit bureau used on 1b plans
  5. commerical driver legal plan
  6. Estate planning

12 Clues: 2PU app type49.00 priceEstate planninglegalshield headquarterscommerical driver legal plancredit bureau used on 1b plansprimerica identity plan is calledcyber security excellence award winner 2023Best overall legal service plan 2024, Forbesstatement you read after collecting payment information...

Unit 4 2019-12-06

Unit 4 crossword puzzle
Across
  1. 在经济上 adv
  2. 抛弃。拒绝
  3. 身份
  4. 独占的
  5. 安全
  6. bully 网络欺凌
Down
  1. 引人注目的
  2. 统治支配
  3. 调查,测量
  4. 现实

10 Clues: 现实身份安全独占的统治支配引人注目的调查,测量抛弃。拒绝在经济上 advbully 网络欺凌

Cyber security 2020-08-24

Cyber security crossword puzzle
Across
  1. estafa con el objetivo de obtener a través de internet datos privados de los usuarios
  2. programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales
  3. almacenan información sobre tí
  4. diseñado para infiltrarse en su dispositivo sin su conocimiento.
Down
  1. software que recopila información de un ordenador y después transmite esta información a una entidad externa
  2. sistema diseñado para evitar el acceso no autorizado a una red privada
  3. programas informáticos que tienen como objetivo alterar el funcionamiento del computador
  4. correo electrónico no solicitado que recibe una persona

8 Clues: almacenan información sobre tícorreo electrónico no solicitado que recibe una personadiseñado para infiltrarse en su dispositivo sin su conocimiento.sistema diseñado para evitar el acceso no autorizado a una red privadaestafa con el objetivo de obtener a través de internet datos privados de los usuarios...

Cyber Security 2020-08-25

Cyber Security crossword puzzle
Across
  1. retrieve from the internet
  2. you carry it around with you all day and it could be hacked
  3. a person trying to break into your computer systems
  4. a program built for a specific hole that has been found
  5. a free operating system
Down
  1. a weakness in your computer system
  2. protects your files from being read
  3. updates for your operating system

8 Clues: a free operating systemretrieve from the internetupdates for your operating systema weakness in your computer systemprotects your files from being reada person trying to break into your computer systemsa program built for a specific hole that has been foundyou carry it around with you all day and it could be hacked

cyber security 2023-04-21

cyber security crossword puzzle
Across
  1. Data that identifies a specific individual
  2. It is evaluating computer networks and systems vulnerabilities in securities.
  3. It is information security and the psychological manipulation of people.
Down
  1. An action that has been done but is not intended by the person.
  2. the collection of information
  3. When you obtain something by using persuasion
  4. It is when you show responsibility for your actions.
  5. facts provided about something/someone

8 Clues: the collection of informationfacts provided about something/someoneData that identifies a specific individualWhen you obtain something by using persuasionIt is when you show responsibility for your actions.An action that has been done but is not intended by the person.It is information security and the psychological manipulation of people....

cyber security 2020-02-10

cyber security crossword puzzle
Across
  1. someone who breaks into a computer system for mischief or malice
  2. a strong ______ have letters, numbers and symbols
  3. someone who breaks into a computer system using social engineering
  4. someone who test computer security by hacking into computer system
Down
  1. scammers get money from others by scaring them
  2. dont accept free _____ of games online
  3. people get scammed out of ______ from fake donation advertisments
  4. people get scammed because of their ____ of money

8 Clues: dont accept free _____ of games onlinescammers get money from others by scaring thema strong ______ have letters, numbers and symbolspeople get scammed because of their ____ of moneysomeone who breaks into a computer system for mischief or malicepeople get scammed out of ______ from fake donation advertisments...

Cyber Security 2021-10-01

Cyber Security crossword puzzle
Across
  1. The malicious software is called
  2. The one who hacks
  3. malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.
  4. Most common social engineering technique
Down
  1. Common word for frauds
  2. The knowledge
  3. SMS+phishing
  4. Your secret key to online accounts

8 Clues: SMS+phishingThe knowledgeThe one who hacksCommon word for fraudsThe malicious software is calledYour secret key to online accountsMost common social engineering techniquemalicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it.

Cyber Security 2021-10-06

Cyber Security crossword puzzle
Across
  1. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.​
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data​
  3. someone who seeks and exploits weaknesses in a computer system or computer network.​
  4. written errors in someone's code or program.​
Down
  1. If lots of infected systems combine to form a network it is called botnet.​
  2. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker. ​
  3. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.​
  4. Unlike a computer virus, it does not need to attach itself to an existing program.

8 Clues: written errors in someone's code or program.​If lots of infected systems combine to form a network it is called botnet.​Unlike a computer virus, it does not need to attach itself to an existing program.someone who seeks and exploits weaknesses in a computer system or computer network.​...

Cyber security 2022-09-07

Cyber security crossword puzzle
Across
  1. An annoying malware that spams you with ads
  2. a collection of malware infested computers that form a network to attack
  3. An important process that verifies a user is really who they are; many different ways this can be done
  4. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
  1. When raw data is put into context and has meaning, the data transforms into _____
  2. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  3. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
  4. I am not a robot

8 Clues: I am not a robotAn annoying malware that spams you with adsa collection of malware infested computers that form a network to attackWhen raw data is put into context and has meaning, the data transforms into _____Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing....

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

cyber security 2022-09-07

cyber security crossword puzzle
Across
  1. type of malware that functions by spying on user activity without their knowledge.
  2. group of computers, printers and devices that are interconnected and governed as a whole. --
  3. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. set of programs that tell a computer to perform a task.
  3. that allows us to access our files and/or services through the internet from anywhere in the world.
  4. defensive technology designed to keep the bad guys out

8 Clues: defensive technology designed to keep the bad guys outset of programs that tell a computer to perform a task.type of malware that functions by spying on user activity without their knowledge.group of computers, printers and devices that are interconnected and governed as a whole. --...

Cyber security 2022-11-28

Cyber security crossword puzzle
Across
  1. are a malicious form of self-replicating software.
  2. they replicate themselves but do not attach themselves to files as a virus does.
  3. an unwanted software that monitors and gathers information on a person and how they use their computer.
  4. this can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
Down
  1. a piece of software that appears to perform a useful function (such as a game) but unknown to the user it also performs malicious actions.
  2. This is a form of virus, as it is self-replicating.
  3. it is a large collection of malware-infected devices
  4. is a software that is designed to gain access to your computer with malicious intent.

8 Clues: are a malicious form of self-replicating software.This is a form of virus, as it is self-replicating.it is a large collection of malware-infected devicesthey replicate themselves but do not attach themselves to files as a virus does.is a software that is designed to gain access to your computer with malicious intent....

Cyber Security 2024-01-26

Cyber Security crossword puzzle
Across
  1. false information spread in order to deceive people
  2. the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
  3. cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities
Down
  1. an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare.
  2. the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment
  3. behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known
  4. warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
  5. the discovering of secrets, especially political or military information of another country or the industrial information of a business

8 Clues: false information spread in order to deceive peoplecataclysm resulting from a large-scale sabotage of all computerized networks, systems and activitiesan academic, non-binding study on how international law applies to cyber conflicts and cyber warfare....

cyber security 2024-10-22

cyber security crossword puzzle
Across
  1. Anonymously sending hurtful messages online
  2. Harassment or bullying that takes place over digital devices like computers and smartphones
  3. he act of spreading false information about someone online
  4. A person who uses digital means to harass others.
  5. The act of excluding someone from an online group or activity.
Down
  1. Using technology to intimidate or harm others
  2. Software designed to block or report harmful online behavior.
  3. media common platform where cyberbullying can occur, often used for social interaction.

8 Clues: Anonymously sending hurtful messages onlineUsing technology to intimidate or harm othersA person who uses digital means to harass others.he act of spreading false information about someone onlineSoftware designed to block or report harmful online behavior.The act of excluding someone from an online group or activity....

CYBER SECURITY 2025-10-15

CYBER SECURITY crossword puzzle
Across
  1. Pretending to be someone else to gain access or information
  2. A unique numerical label assigned to each device on a network
  3. The amount of time spent using digital devices
Down
  1. Authentication using physical characteristics like fingerprints or face
  2. A unique identifier used to log into a system
  3. A copy of data kept in case the original is lost or compromised
  4. An improvement or fix applied to software or systems
  5. A device that forwards data between computer networks

8 Clues: A unique identifier used to log into a systemThe amount of time spent using digital devicesAn improvement or fix applied to software or systemsA device that forwards data between computer networksPretending to be someone else to gain access or informationA unique numerical label assigned to each device on a network...

C for Cyber Security 2022-10-10

C for Cyber Security crossword puzzle
Across
  1. A form of malware used by hackers to spy on you and your computer activities
  2. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  3. A malicious software designed to block access to a computer system until a sum of money is paid
  4. The process of identifying a user’s identity
  5. A method of connecting a series of computers and devices in a private encrypted network
  6. Something personal to you and should never be shared
  7. In addition to passwords; this ensures better security
  8. Unauthorized access to a network, information systems or application
  9. Threatening behavior facilitated through electronic means such as texting
Down
  1. Alert / Always on the lookout
  2. A fraudulent email purportedly from a reputable company attempting to get personal information
  3. A piece of hardware or software, used to keep intruders out
  4. When a hacker changes source of an email so that it seems to come from a trusted source
  5. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  6. The process of taking plain text and scrambling it into an unreadable format
  7. the address of a website; check its validity before clicking on it
  8. A sequence of words or text used to control access to a computer; similar to a password
  9. Facebook, Twitter, Instagram etc. (Two Words)

18 Clues: Alert / Always on the lookoutThe process of identifying a user’s identityFacebook, Twitter, Instagram etc. (Two Words)Something personal to you and should never be sharedIn addition to passwords; this ensures better securityA piece of hardware or software, used to keep intruders outthe address of a website; check its validity before clicking on it...

Cyber security crossword- Basic 2014-10-14

Cyber security crossword- Basic crossword puzzle
Across
  1. A person who steals information from your system without you knowing about it.
  2. A computer _______ is a group of interconnected computers.
  3. The A in APT
  4. Always _____ your computer when you leave your desk
  5. It is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product
  6. Even when Antivirus _______ is installed and updated, your computer is never 100% safe
  7. The state of being free from danger or threat.
  8. Viruses, Worms and Trojans etc
  9. Be cyber savvy, be a ______ user.
Down
  1. An attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  2. Never turn off your ______ or else your computer and the company data will be at risk
  3. Hidden entrance into a system
  4. The chance you take when you download unknown content from the internet or leave your computer open
  5. A ____ is a web page address.
  6. A software that is designed to detect and destroy computer viruses.
  7. Never share your _______ with another person.
  8. An army of malware infected PCs
  9. A _______ is a program that allows a user to find view hear and interact with materials on the internet.

18 Clues: The A in APTHidden entrance into a systemA ____ is a web page address.Viruses, Worms and Trojans etcAn army of malware infected PCsBe cyber savvy, be a ______ user.Never share your _______ with another person.The state of being free from danger or threat.Always _____ your computer when you leave your desk...

CISO Crossword Quiz - 1725 2025-03-11

CISO Crossword Quiz - 1725 crossword puzzle
Across
  1. A technique by which cyber criminals steal potentially sensitive user information by injecting malicious script code in various forms/pages of targeted website
  2. A cybersecurity strategy in which an organization only allows pre-approved or trusted users, entities, or actions to operate/access a system or network
  3. a cybercrime where fraudsters impersonate law enforcement officials to trick people into paying money or giving personal information by making them believe they have been digitally arrested or digitally detained
  4. A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency
  5. A type of cybercrime that involves using QR codes to trick people into visiting malicious websites or to make payment to unauthorized persons
  6. Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
  7. A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
Down
  1. A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money
  2. A Security incident in which a malicious threat actor gains access to systems without authorization
  3. A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms
  4. A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible

11 Clues: A Security incident in which a malicious threat actor gains access to systems without authorizationA cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiencyA type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money...

Internet Privacy 2014-05-29

Internet Privacy crossword puzzle
Across
  1. freedom from danger
  2. take hold of forcibly
  3. set of data that gives information about other data.
  4. domain located outside of the United States. The government cannot directly act on these domains.
  5. Federal Bureau of Investigation
  6. A person other than you and the website you visit
  7. Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
  8. shutdown of a website by the owners in form of a protest
  9. Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
  10. Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
  11. a legal document that explains how a website uses your private info
  12. the part of a network address that identifies it as belonging to a particular domain.
  13. threat a threat that can damage a network
Down
  1. close watch or intercepting information from an individual
  2. protection against unreasonable searches and seizures
  3. domain located within the United States. The government can directly act on these domains.
  4. National Security Agency
  5. An illegitimate imitation of an item.
  6. A work or invention.
  7. a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  8. Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
  9. Illegally shared content
  10. A draft of a proposed law presented to parliament for discussion.
  11. Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
  12. Internet Service Provider. A company that is in charge of your internet and providing you with internet service

25 Clues: freedom from dangerA work or invention.take hold of forciblyNational Security AgencyIllegally shared contentFederal Bureau of InvestigationAn illegitimate imitation of an item.threat a threat that can damage a networkA person other than you and the website you visitset of data that gives information about other data....

Internet Privacy 2014-05-29

Internet Privacy crossword puzzle
Across
  1. a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  2. domain located outside of the United States. The government cannot directly act on these domains.
  3. Stop Online Piracy Act. It is a bill introduced in the House of Representatives to restrict access to sites that facilitate the sharing of pirated content.
  4. freedom from danger
  5. Anti-Counterfeiting Trade Agreement. An agreement to establish international standards for intellectual property rights enforcement.
  6. domain located within the United States. The government can directly act on these domains.
  7. Protect IP Act. This bill was introduced in the Senate to restrict access to websites that hosts sales of counterfeit goods.
  8. shutdown of a website by the owners in form of a protest
  9. National Security Agency
  10. Electronics Communication Privacy Act. established standards for government access to private information that is transmitted and stored on the Internet
Down
  1. A person other than you and the website you visit
  2. Cyber Intelligence Sharing and Protection Act. Allows companies and government to share information in the event of a cyber attack.
  3. A draft of a proposed law presented to parliament for discussion.
  4. A work or invention.
  5. Federal Bureau of Investigation
  6. Illegally shared content
  7. threat a threat that can damage a network
  8. a legal document that explains how a website uses your private info
  9. protection against unreasonable searches and seizures
  10. An illegitimate imitation of an item.
  11. Internet Service Provider. A company that is in charge of your internet and providing you with internet service
  12. set of data that gives information about other data.
  13. close watch or intercepting information from an individual
  14. take hold of forcibly
  15. the part of a network address that identifies it as belonging to a particular domain.

25 Clues: freedom from dangerA work or invention.take hold of forciblyIllegally shared contentNational Security AgencyFederal Bureau of InvestigationAn illegitimate imitation of an item.threat a threat that can damage a networkA person other than you and the website you visitset of data that gives information about other data....

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. who interferes with normal computer functions
  2. records or transmits a user's keystrokes
  3. writing computer software code
  4. client-side code injection attack
  5. refers to any external entity who may have access to private data
  6. gain unauthorized access to a computer system
  7. network of maliciously installed bots
  8. destroying a hardware by delivering a high-voltage electrical surge
  9. cyber exploit directed at online card players
  10. security risk who cause the program to crash
  11. software tools used by a third party
Down
  1. unauthorized duplication or deletion of an organization's electronic information
  2. secure time-limited credential
  3. attack that originates from many different sources
  4. capable of being easily hurt
  5. designed to take advantage of a particular error
  6. possible source of harm
  7. security mechanism for separating running programs

18 Clues: possible source of harmcapable of being easily hurtsecure time-limited credentialwriting computer software codeclient-side code injection attacksoftware tools used by a third partynetwork of maliciously installed botsrecords or transmits a user's keystrokessecurity risk who cause the program to crashwho interferes with normal computer functions...

Compliance & Security Week Part 2! 2024-11-14

Compliance & Security Week Part 2! crossword puzzle
Across
  1. What are all DDID/AHS employees supposed to wear so it can be seen as a best practice of security?
  2. What is the term for the agreement between covered entities and business associates?
  3. What is the term for malicious software?
  4. The person that exploits vulnerabilities for malicious purposes
  5. Who is the DDID Security Officer?
  6. What is the process of converting data into a secure format?
  7. What confidential information does DDID protect?
  8. What color is the HIPAA Hippo?
Down
  1. What is the over the phone voice call type of scam?
  2. What is the term for a security incident that disrupts services?
  3. Who is the HR Reporting Officer?
  4. What is the process of verifying identity?
  5. This occurs when an unauthorized person gains access to sensitive or protected information
  6. What is the term for a legal requirement to protect data?
  7. The document that outlines security practices
  8. You are the first line of ____ in protection DDID and AHS
  9. What's an organization's overall ability to protect against, detect, respond to and recover from cyber threats? (It's like a straight back when you sit or stand)

17 Clues: What color is the HIPAA Hippo?Who is the HR Reporting Officer?Who is the DDID Security Officer?What is the term for malicious software?What is the process of verifying identity?The document that outlines security practicesWhat confidential information does DDID protect?What is the over the phone voice call type of scam?...

Cyber Security Puzzle 2024-10-22

Cyber Security Puzzle crossword puzzle
Across
  1. The process of verifying the identity of a user
  2. A method of disguising data to protect it
  3. A device that helps protect networks by filtering traffic
  4. A breach where sensitive data is accessed unlawfully
  5. A malicious email designed to trick recipients
  6. A protocol used to send emails securely
Down
  1. A common form of malware that locks files
  2. A program that scans for vulnerabilities in systems
  3. A common cybersecurity measure that involves using complex passwords
  4. Software that detects and removes malware
  5. A type of attack where multiple systems are used to overwhelm a target
  6. A legal framework for data protection in the EU

12 Clues: A protocol used to send emails securelyA common form of malware that locks filesA method of disguising data to protect itSoftware that detects and removes malwareA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EU...

Cyber CYber 2024-10-07

Cyber CYber crossword puzzle
Across
  1. KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
  2. What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
  3. VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
  4. RECOVERY What term describes a strategy for recovering from a cyber incident?
  5. A security measure that helps prevent unauthorized access to a network?
  6. WEB What term refers to the part of the internet that is not indexed by traditional search engines?
  7. What type of software is potentially unwanted and often bundled with legitimate software?
  8. What type of malware allows remote access to a user's device?
  9. What term refers to a security incident where sensitive data is accessed without authorization?
  10. DETECTION A tool or process for detecting unauthorized access to a system?
  11. A type of cyber attack where the attacker impersonates a legitimate user?
  12. TESTING A systematic examination of a system for security weaknesses?
  13. What term describes malicious code that appears legitimate?
  14. What term is used for a password that is difficult to guess?
  15. Which type of attack sends a flood of traffic to overwhelm a network?
  16. THEFT The unauthorized use of someone's personal data is known as?
  17. FLOOD What type of DDoS attack exploits the TCP handshake process?
  18. What type of encryption uses two different keys for encryption and decryption?
  19. The practice of obtaining sensitive information by deception is known as?
  20. What type of cryptographic attack tries all possible combinations of keys?
Down
  1. A method used to authenticate users based on physical characteristics?
  2. What do you call a security measure that uses two or more methods to verify identity?
  3. A series of steps taken to ensure the security of information systems?
  4. The information that is collected to assess vulnerabilities?
  5. SCANNING What is a method for identifying weaknesses in a system’s security?
  6. What is the process of converting plaintext into ciphertext?
  7. What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
  8. A malicious user who seeks to exploit system vulnerabilities?
  9. The act of attempting to steal data through exploiting weak points?
  10. What refers to the principle of least privilege in cybersecurity?
  11. What technique uses social interactions to manipulate individuals into giving up confidential information?
  12. What type of malware can replicate itself and spread to other computers?
  13. The process of decoding information or data that has been encrypted?
  14. What is a security resource whose value lies in being probed, attacked, or compromised?
  15. A collection of related data that may be exposed during a breach is called?
  16. SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
  17. ATTACK A planned attack to capture sensitive information over a network?
  18. IDS What term refers to a system that captures and stores network traffic?
  19. TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
  20. A malicious email that pretends to be from a trustworthy source?

40 Clues: What term describes malicious code that appears legitimate?The information that is collected to assess vulnerabilities?What is the process of converting plaintext into ciphertext?What term is used for a password that is difficult to guess?A malicious user who seeks to exploit system vulnerabilities?...

Tech Crossword 2026-02-06

Tech Crossword crossword puzzle
Across
  1. Software delivery model via internet
  2. Connected system of nodes
  3. Step-by-step problem-solving logic
  4. Relating to digital security
  5. Raw input for analytics
Down
  1. Development + operations methodology
  2. Digital foundation enabling ecosystems
  3. Industry driving digital transformation
  4. Ability to grow without efficiency loss
  5. On-demand computing infrastructure
  6. Internet of physical devices
  7. Unit in blockchain
  8. Machines simulating human intelligence

13 Clues: Unit in blockchainRaw input for analyticsConnected system of nodesInternet of physical devicesRelating to digital securityOn-demand computing infrastructureStep-by-step problem-solving logicDevelopment + operations methodologySoftware delivery model via internetDigital foundation enabling ecosystemsMachines simulating human intelligence...

Cybersecurity Puzzle 2025-03-11

Cybersecurity Puzzle crossword puzzle
Across
  1. Self-replicating malicious software
  2. Fixes security vulnerabilities
  3. Acts as an intermediary server
  4. Fake emails to steal info
  5. Attack using trial and error
  6. Program that spreads and harms
  7. Remote storage and computing
  8. Harmful software for attacks
  9. Access to an account or system
  10. Device used for entering codes
  11. Payment demanded for files
  12. Secretly monitors user activity
Down
  1. Superuser access level
  2. Method for encrypting information
  3. Disguised harmful software
  4. Protection against cyber threats
  5. Secret entry point for attacks
  6. Permission to use a system
  7. Unauthorized access to systems
  8. Encrypts data for protection

20 Clues: Superuser access levelFake emails to steal infoDisguised harmful softwarePermission to use a systemPayment demanded for filesAttack using trial and errorRemote storage and computingHarmful software for attacksEncrypts data for protectionFixes security vulnerabilitiesActs as an intermediary serverProgram that spreads and harms...

Jaringan Komputer & Internet 2024-01-15

Jaringan Komputer & Internet crossword puzzle
Across
  1. jenis topologi yang menyerupai cincin?
  2. konsep cyber security berperan dalam menjaga kerahasiaan data ?
  3. proses pengiriman data dari sebuah perangkat ke perangkat tujuan melalui media transmisi?
  4. aspek teknis yang tujuannya ketepatan antara biaya?
  5. faktor keamanan jaringan yang mampu melindungi data dari berbagai serangan cyber?
Down
  1. jenis jaringan yang gabungan dari berbagai LAN dan WAN?
  2. tata kelola akses yang pengguna mengakses dan melakukan operasi database tertentu?
  3. jaringan komputer adalah perangkat komputer atau perangkat?
  4. model 7 lapis osi ?
  5. alat penghubung workstation,server(menggunakan kabel jaringan)

10 Clues: model 7 lapis osi ?jenis topologi yang menyerupai cincin?aspek teknis yang tujuannya ketepatan antara biaya?jenis jaringan yang gabungan dari berbagai LAN dan WAN?jaringan komputer adalah perangkat komputer atau perangkat?alat penghubung workstation,server(menggunakan kabel jaringan)konsep cyber security berperan dalam menjaga kerahasiaan data ?...

CYBER THREATS 2025-01-03

CYBER THREATS crossword puzzle
Across
  1. Attack A security breach where an attacker intercepts and potentially alters the communication between two parties without their knowledge.
  2. A technique where attackers impersonate another device, user, or website to deceive individuals or systems, often for malicious purposes.
  3. A cyber attack that redirects a website’s traffic to a fraudulent website, often to steal sensitive information like passwords and credit card numbers.
  4. Threat A security risk posed by individuals within an organization who misuse their access to harm the company or its data.
  5. Attack A cyber attack that occurs when a user unknowingly visits a compromised website that automatically downloads malicious software to their device.
Down
  1. Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.
  2. The act of taking advantage of a vulnerability in a system or software to gain unauthorized access or perform harmful actions.
  3. Scripting (XSS) A vulnerability that allows attackers to inject malicious scripts into web pages viewed by others, often to steal sensitive data.
  4. Attack A cyber attack that targets a vulnerability in software or hardware that is unknown to the vendor or security community, leaving no time for a fix or patch.
  5. Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information.

10 Clues: Injection A type of attack where malicious code is inserted into an SQL query to manipulate or access a database.Engineering A manipulation technique used by attackers to deceive individuals into divulging confidential information....

Garda Times Summer Annual 2025 Crossword 2025-07-04

Garda Times Summer Annual 2025 Crossword crossword puzzle
Across
  1. Location of first ever Garda Band public performance on Easter Monday, 2 April 1923 (3,9,4)
  2. New Justice Minister Jim (10)
  3. National initiative to reduce speeding (4,4,3)
  4. Annual multinational cyber security exercise (6,7)
  5. Gardens where Annual Memorial takes place (4,4)
  6. Location of Garda College (10)
  7. In-organisation term for Garda Commissioner position (6,3)
  8. First DPP Eamonn (6)
  9. Horse-riding section of the force (7,4)
  10. Crime tackled by Offences Against the State Act (9)
  11. Animals used to detect bodies, not being used by State (7,4)
  12. Computer-aided dispatch system (9)
Down
  1. Name of new Office of the Police Ombudsman (6)
  2. State’s highest security prison (10)
  3. Unoffical title of the Policing, Security and Community Safety Act 2024 (5,6,3)
  4. Third Garda Commissioner, Eamon (4)
  5. Medal awarded for bravery to gardaí (5)
  6. First Garda Bandmaster, Superintendent DJ (7)
  7. DPP Catherine (6)
  8. Justice scheme to support victim reconciliation(11)
  9. Chair of the Independent Review Group, Mr Justice Michael (5)
  10. Chairperson of the Policing and Community Safety Authority, Elaine (5)
  11. Head of Office of Police Ombudsman, Emily (5)
  12. Child and Family Agency (5)

24 Clues: DPP Catherine (6)First DPP Eamonn (6)Child and Family Agency (5)New Justice Minister Jim (10)Location of Garda College (10)Computer-aided dispatch system (9)Third Garda Commissioner, Eamon (4)State’s highest security prison (10)Medal awarded for bravery to gardaí (5)Horse-riding section of the force (7,4)...

Shirley Homes 2022-11-23

Shirley Homes crossword puzzle
Across
  1. pdf, exe, jpeg or gif
  2. Anna's boyfriend, to his friends
  3. put something on the internet
  4. show something is true
  5. Shirley's sandwich 1/2
  6. Who has Gucci shoes?
  7. Shirley's sandwich 2/2
  8. Shirley's other name
Down
  1. The Thames
  2. What is Shirley's last name?
  3. Sparkn'_____
  4. get something from the internet
  5. things that you do to keep a place, or a computer, safe
  6. the Chinese Bank
  7. the cyber thief

15 Clues: The ThamesSparkn'_____the cyber thiefthe Chinese BankWho has Gucci shoes?Shirley's other namepdf, exe, jpeg or gifshow something is trueShirley's sandwich 1/2Shirley's sandwich 2/2What is Shirley's last name?put something on the internetget something from the internetAnna's boyfriend, to his friends...

RU ITEC411- Crime and Security 2025-03-18

RU ITEC411- Crime and Security crossword puzzle
Across
  1. U.S. law that criminalizes unauthorized computer access.
  2. An attack that overloads and shuts down websites.
  3. Filing lawsuits in countries with stricter defamation laws.
  4. Using hacking to promote a political cause.
  5. Method of encoding data to prevent unauthorized access.
  6. Unauthorized access to computer systems.
  7. Records used to track cybercriminal activities.
  8. Hacking conducted by governments as a strategic weapon.
  9. Voice-based phishing scams.
  10. A system that filters out suspicious network activity.
  11. Crime involving the misuse of personal information.
Down
  1. Investigating digital crimes through data recovery.
  2. A 2013 cyber attack that compromised millions of credit cards.
  3. A decoy system used to attract and study hackers.
  4. Phishing via SMS text messages.
  5. sophisticated worm targeting industrial control systems.
  6. Manipulating people into revealing confidential information.
  7. Fraudulent emails attempting to steal personal data.
  8. Disclosing security flaws for ethical reasons.
  9. Security technology based on physical traits.

20 Clues: Voice-based phishing scams.Phishing via SMS text messages.Unauthorized access to computer systems.Using hacking to promote a political cause.Security technology based on physical traits.Disclosing security flaws for ethical reasons.Records used to track cybercriminal activities.A decoy system used to attract and study hackers....

BST crossword 2024-01-19

BST crossword crossword puzzle
Across
  1. clap along if you feel like a room without a roof because I'm _ _ _ _ _
  2. pilots your body
  3. the closest star
  4. What do you feed seals?
  5. elephant with big ears
  6. Science and Technology
  7. opposite of blue
  8. a shooting star
Down
  1. 60+% of you body is made of this
  2. an elegant pen made from a feather
  3. a pig friends with a spider
  4. fifth planet
  5. Security
  6. handheld computer
  7. Both human and machine

15 Clues: Securityfifth planeta shooting starpilots your bodythe closest staropposite of bluehandheld computerelephant with big earsScience and TechnologyBoth human and machineWhat do you feed seals?a pig friends with a spider60+% of you body is made of thisan elegant pen made from a feather...

Techromatic CrossWord Challenge 2022-02-11

Techromatic CrossWord Challenge crossword puzzle
Across
  1. Pod 1 client
  2. Need to pay
  3. What Tracy wants to do
  4. Best MSP in the world
  5. A better way to do blank
Down
  1. A core Techromatic Value
  2. A core Techromatic Value
  3. New member of the team
  4. Paul's new favorite drink
  5. Method for identifying spam
  6. Blank Security
  7. What Waldemar likes to work on

12 Clues: Need to payPod 1 clientBlank SecurityBest MSP in the worldNew member of the teamWhat Tracy wants to doA core Techromatic ValueA core Techromatic ValueA better way to do blankPaul's new favorite drinkMethod for identifying spamWhat Waldemar likes to work on

PLP 160 Freshman Class - 2021 2021-10-04

PLP 160 Freshman Class - 2021 crossword puzzle
Across
  1. Pasadena Rose Parade volunteer
  2. Speaks fluent Arabic
  3. Papa Murphy's Supervisor
  4. CIS Major with Emphasis in Cyber Security
  5. Future Marine Biologist
  6. Captain of HS Varsity Baseball Team
  7. USA National Miss Colorado Teen 3032
  8. business owner
  9. Pueblo Police Department Explorer
  10. Future Veterinarian
Down
  1. HS Drum Major
  2. Youth Rep for Center for American Values
  3. HS Dance Team Captain
  4. Kane Scholarship Recipient
  5. Certified Barista
  6. HS IB Learner Profile Awardee for Knowledge
  7. Boys and Girls Club Youth of the Year Winner
  8. CSUP Woman's Swim Team member
  9. Upward Bound Student of the Year
  10. HS Student Body President

20 Clues: HS Drum Majorbusiness ownerCertified BaristaFuture VeterinarianSpeaks fluent ArabicHS Dance Team CaptainFuture Marine BiologistPapa Murphy's SupervisorHS Student Body PresidentKane Scholarship RecipientCSUP Woman's Swim Team memberPasadena Rose Parade volunteerUpward Bound Student of the YearPueblo Police Department Explorer...

A&F IT July Crossword 2022-07-05

A&F IT July Crossword crossword puzzle
Across
  1. Scary New England author
  2. Assistant SCIO
  3. Latest supreme court justice
  4. What Elon makes
  5. Winter's call8ng card
  6. Building where Boston state offices are
  7. Mandatory security training for tech folks
  8. SCIO
  9. Assistant SCIO
  10. Where MITC is located
  11. Where Charlie works
  12. Popular summer vacation destination
Down
  1. When leaves turn colors
  2. Gru's yellow friends
  3. Fenway boys
  4. "You're gonna need a bigger...."
  5. Microsoft's place to meet
  6. Doctor who rules the multiverse
  7. Bobby of hockey fame
  8. Famed New England Quarterback
  9. What gets signed in July
  10. The 16th president
  11. Prestigious Massachusetts University

23 Clues: SCIOFenway boysAssistant SCIOAssistant SCIOWhat Elon makesThe 16th presidentWhere Charlie worksGru's yellow friendsBobby of hockey fameWinter's call8ng cardWhere MITC is locatedWhen leaves turn colorsScary New England authorWhat gets signed in JulyMicrosoft's place to meetLatest supreme court justiceFamed New England Quarterback...

Cybersecurity Terms 2023-07-24

Cybersecurity Terms crossword puzzle
Across
  1. trustable storage of sensitive information
  2. prevents attacks to computer
  3. debris from electronic devices
  4. voice, face, retina, fingerprint
  5. acronym for uninterruptible power supply
  6. providing validation for access
  7. changes device's address
  8. cyber attackers with no knowledge
Down
  1. emails designed for advertisement
  2. dangerous software that will duplicate
  3. believe they're doing right
  4. dangerous software that causes corruption
  5. theft "is not a joke Jim"
  6. threats to security
  7. result in loss or injury
  8. makes authentication more powerful
  9. another term: black hat hackers
  10. looks harmless, infects device
  11. searching data to uncover information
  12. how much cybersecurity costs annually

20 Clues: threats to securityresult in loss or injurychanges device's addresstheft "is not a joke Jim"believe they're doing rightprevents attacks to computerdebris from electronic deviceslooks harmless, infects deviceanother term: black hat hackersproviding validation for accessvoice, face, retina, fingerprintemails designed for advertisement...

AI-Driven Cybersecurity 2026-04-04

AI-Driven Cybersecurity crossword puzzle
Across
  1. Fake email based cyber attack
  2. Controls user permissions
  3. Harmful software in systems
  4. AI program that interacts with users
  5. Locks data and demands money
  6. Detects unusual system behavior
  7. User identity verification process
  8. Login using fingerprint or face
  9. Secures data using coding
  10. AI based security protection system
Down
  1. Safeguarding sensitive data
  2. Protects network from threats
  3. Software that secretly collects data
  4. Unauthorized system entry attempt
  5. Digital attack on systems
  6. Machine learning based model
  7. Advanced neural learning method
  8. AI based threat detection process
  9. AI system used for predictions
  10. Protecting computer networks

20 Clues: Controls user permissionsDigital attack on systemsSecures data using codingSafeguarding sensitive dataHarmful software in systemsMachine learning based modelLocks data and demands moneyProtecting computer networksProtects network from threatsFake email based cyber attackAI system used for predictionsAdvanced neural learning method...

AI-Driven Cybersecurity 2026-04-04

AI-Driven Cybersecurity crossword puzzle
Across
  1. AI based security protection system
  2. Software that secretly collects data
  3. AI system used for predictions
  4. Controls user permissions
  5. Protecting computer networks
  6. Advanced neural learning method
  7. User identity verification process
  8. Unauthorized system entry attempt
  9. Protects network from threats
Down
  1. AI based threat detection process
  2. Safeguarding sensitive data
  3. Detects unusual system behavior
  4. Machine learning based model
  5. Digital attack on systems
  6. Locks data and demands money
  7. Secures data using coding
  8. AI program that interacts with users
  9. Fake email based cyber attack
  10. Login using fingerprint or face
  11. Harmful software in systems

20 Clues: Digital attack on systemsControls user permissionsSecures data using codingSafeguarding sensitive dataHarmful software in systemsMachine learning based modelLocks data and demands moneyProtecting computer networksFake email based cyber attackProtects network from threatsAI system used for predictionsDetects unusual system behavior...

Cyber Security CrossWord Puzzel 2021-03-02

Cyber Security CrossWord Puzzel crossword puzzle
Across
  1. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. _______________ is any crime perpetrated using computers and networks.
  3. A__________ monitored a network, blocking dangerous content such as viruses.
  4. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. Viruses, trojans and worms are examples of __________________________.
  6. An ethical hacker.
  7. Your favorite teacher.
  8. A statement of an intention to inflict harm or damage .
Down
  1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. Your favorite class.
  3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. The exposure to the possibility of the attacked or harmed.
  5. Actual action that causes harm or damage.
  6. A blend between an ethical hacker and a cracker.
  7. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. An action taken to counteract the threat.
  9. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.

17 Clues: An ethical hacker.Your favorite class.Your favorite teacher.Actual action that causes harm or damage.An action taken to counteract the threat.A blend between an ethical hacker and a cracker.A statement of an intention to inflict harm or damage .The exposure to the possibility of the attacked or harmed....

Cyber Security 2023-10-08

Cyber Security crossword puzzle
Across
  1. Ruang Di Mana Komunitas Saling Terhubung
  2. Tantangan Cyber Security
  3. Salah Satu Kejahatan Cyber
Down
  1. Salah Satu Solusi Untuk Mencegah Kejahatan Cyber
  2. Salah Satu Bentuk Malware

5 Clues: Tantangan Cyber SecuritySalah Satu Bentuk MalwareSalah Satu Kejahatan CyberRuang Di Mana Komunitas Saling TerhubungSalah Satu Solusi Untuk Mencegah Kejahatan Cyber

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. Congressional act that created the CFPB
  2. ALTA response to Dodd-Frank Act
  3. Part of Pillar 3
  4. One type of fraud which targets settlement agents
  5. Acronym for American Land Title Association
  6. Process of reporting unclaimed or aged funds to governmental authorities
  7. Examples include recording, trust, escrow, premium
  8. Popular settlement & accounting software program
  9. The______________of Compliance
  10. Accounting transaction that have not cleared the bank
Down
  1. Regulatory body that enforces RESPA rules
  2. Fraud detection tool offered by banks
  3. Part of Pillar 3
  4. Acronym for Third Party Signing Professionals
  5. One type of Third Party Signing Professional
  6. One component of a monthly 3-way reconciliation
  7. Discriminatory mortgage lending practice
  8. Secured method of transmitting NPI
  9. Required for employees with access to NPI
  10. Can be considered a trust account shortage
  11. One form of computer security
  12. Fined $100 million by CFPB in 2016
  13. Internal security policy regarding paper files & NPI
  14. Acronyn for Non-public Personal Information

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

Ks3 - Threats and Preventions 2025-06-13

Ks3 - Threats and Preventions crossword puzzle
Across
  1. Malware that tricks you into downloading it by pretending to be something safe.​
  2. Software detecting cyber threats
  3. The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
  4. Attack security vulnerabilities
  5. Fake email for stealing data
  6. Malware which spreads by itself across computers and networks
  7. Malicious program holding data hostage
  8. Short for malicious software, harmful software installed on a computer without permission.
  9. Unauthorized access attempt
Down
  1. Secret key for authentication
  2. To trick people into illegally obtaining sensitive data.
  3. When a hacker tries lots of different passwords very quickly.
  4. Digital fingerprint identifier
  5. Scrambles data for security

14 Clues: Scrambles data for securityUnauthorized access attemptFake email for stealing dataSecret key for authenticationDigital fingerprint identifierAttack security vulnerabilitiesSoftware detecting cyber threatsMalicious program holding data hostageTo trick people into illegally obtaining sensitive data....

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. Accounting transactions that have not cleared the bank
  2. Internal security policy regarding paper files & NPI
  3. Congressional act that created the CFPB
  4. One form of computer security
  5. Popular settlement & accounting software program
  6. Discriminatory mortgage lending practice
  7. Part of Pillar 3
  8. Fraud detection tool offered by banks
  9. Regulatory body that enforces RESPA rules
  10. Acronyn for Non-public Personal Information
  11. Fined $100 million by CFPB in 2016
  12. Can be considered a trust account shortage
  13. One type of fraud which targets settlement agents
  14. Part of Pillar 3
  15. Acronym for Third Party Signing Professionals
  16. Required for employees with access to NPI
Down
  1. ALTA response to Dodd-Frank Act
  2. Process of reporting unclaimed or aged funds to governmental authorities
  3. Secured method of transmitting NPI
  4. Examples include recording, trust, escrow, premium
  5. One component of a monthly 3-way reconciliation
  6. The______________of Compliance
  7. One type of Third Party Signing Professional
  8. Acronym for American Land Title Association

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

BEST PRACTICES COMPLIANCE 2017 2017-04-24

BEST PRACTICES COMPLIANCE 2017 crossword puzzle
Across
  1. One form of computer security
  2. Congressional act that created the CFPB
  3. Secured method of transmitting NPI
  4. One component of a monthly 3-way reconciliation
  5. Regulatory body that enforces RESPA rules
  6. Part of Pillar 3
  7. Popular settlement & accounting software program
  8. Acronyn for Non-public Personal Information
  9. Acronym for Third Party Signing Professionals
  10. Part of Pillar 3
  11. Required for employees with access to NPI
  12. The______________of Compliance
  13. Internal security policy regarding paper files & NPI
Down
  1. ALTA response to Dodd-Frank Act
  2. Examples include recording, trust, escrow, premium
  3. Acronym for American Land Title Association
  4. Discriminatory mortgage lending practice
  5. Fraud detection tool offered by banks
  6. Can be considered a trust account shortage
  7. Fined $100 million by CFPB in 2016
  8. Accounting transaction that have not cleared the bank
  9. Process of reporting unclaimed or aged funds to governmental authorities
  10. One type of fraud which targets settlement agents
  11. One type of Third Party Signing Professional

24 Clues: Part of Pillar 3Part of Pillar 3One form of computer securityThe______________of ComplianceALTA response to Dodd-Frank ActSecured method of transmitting NPIFined $100 million by CFPB in 2016Fraud detection tool offered by banksCongressional act that created the CFPBDiscriminatory mortgage lending practiceRegulatory body that enforces RESPA rules...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

Cyber-security Awareness Month 2022-10-06

Cyber-security Awareness Month crossword puzzle
Across
  1. Do this before you click.
  2. Requires more than a password to access.
  3. You can use this to help remember passwords.
  4. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. You should do this when you walk away from your computer.
  6. abv. Personal Identifiable Information.
  7. The most common malware.
  8. Our cyber-security training tool.
Down
  1. When someone, without proper credentials, follows you into a restricted building or area.
  2. An email with malicious intent.
  3. How to send sensitive files via email.
  4. Must be strong to prevent unwanted access.
  5. The best time to run updates.
  6. abv. for Information Security Officer
  7. The first line of offense against malware.
  8. A piece of code capable of copying itself and corrupting systems and data.
  9. The best way to keep sensitive information.

17 Clues: The most common malware.Do this before you click.The best time to run updates.An email with malicious intent.Our cyber-security training tool.abv. for Information Security OfficerHow to send sensitive files via email.abv. Personal Identifiable Information.Requires more than a password to access.Must be strong to prevent unwanted access....

Escape Room Crossword 2025-10-29

Escape Room Crossword crossword puzzle
Across
  1. What you do when there's been an infraction
  2. A place where books are kept
  3. You must keep you sensitive information ______-up!
Down
  1. Cyber ________, is what you need to stay safe online
  2. Type of security that involves our buildings
  3. Using a ________ will protect your data
  4. A code-powered thinker with answers at lightning speed
  5. The type of security you need to apply when on vacation

8 Clues: A place where books are keptUsing a ________ will protect your dataWhat you do when there's been an infractionType of security that involves our buildingsYou must keep you sensitive information ______-up!Cyber ________, is what you need to stay safe onlineA code-powered thinker with answers at lightning speed...

Module 3: Crossword Puzzle 2 2021-11-07

Module 3: Crossword Puzzle 2 crossword puzzle
Across
  1. Acronym for a group f people in an organization responsible to respond to cyber security incidents.
  2. ____ AI relies on training data to develop analysis capability, the threat actor may be able to submit tainted samples.
  3. Acronym for a powerful all-in-one tool that can perform incident response and threat hunting.
  4. Communication, notification, and reporting is crucial with internal and external _____
  5. Facilitator presents a scenario; does not involve a live system.
  6. _____ is the second item in the Cyber Kill Chain Attack Framework.
Down
  1. Responders demonstrate response actions during a ____
  2. Most network, OS, and security applications will have these, it is something you will want to review and audit. Can be automated or reviewed manually.
  3. Isolate suspected system for analysis in a sandbox.
  4. Acronym for a mechanism to identify if and when an attempt was made to extract files to an unauthorized medium.
  5. An acronym for responding and recovery planning for major incidents.

11 Clues: Isolate suspected system for analysis in a sandbox.Responders demonstrate response actions during a ____Facilitator presents a scenario; does not involve a live system._____ is the second item in the Cyber Kill Chain Attack Framework.An acronym for responding and recovery planning for major incidents....

crack the code 2024-04-30

crack the code crossword puzzle
Across
  1. A method of cyber attack that involves sending emails with malicious attachments or links (8 letters)
  2. A program designed to prevent, detect, and remove malware (10 letters)
  3. Testing The process of identifying and fixing security vulnerabilities in a computer system (10 letters) Penetration Testing
  4. A technique used to secure wireless networks (11 letters)
  5. Protects a computer system from unauthorized access (9 letters)
Down
  1. A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)
  2. Authentication A security measure that verifies the authenticity of a user attempting to log in (14 letters)
  3. Detection A security measure that tracks and analyzes network traffic to detect and prevent unauthorized access (9 letters)
  4. A method of protecting sensitive data by converting it into a code that can only be deciphered with a key (9 letters)
  5. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)

10 Clues: A technique used to secure wireless networks (11 letters)Protects a computer system from unauthorized access (9 letters)A program designed to prevent, detect, and remove malware (10 letters)A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)...

CyberSecuriCrazy! 2026-03-07

CyberSecuriCrazy! crossword puzzle
Across
  1. A weakness in a system.
  2. Malware that encrypts victim's files.
  3. A fake email scam.
  4. Information used in cyber threats.
  5. A secret word.
  6. Disguised software to trick users.
  7. A network of compromised computers.
  8. Converting data into a secret code.
Down
  1. Security risk posed by employees.
  2. Unauthorized access to computer systems.
  3. Data is accessed or stolen.
  4. Controls incoming and outgoing traffic.
  5. Pretend trusted entity.
  6. Detects and removes viruses.
  7. Verifying a user's identity.
  8. Fixing update in software.
  9. Unknown, exploited software vulnerability.
  10. Attack that overwhelms a system.
  11. Requires two forms of verification.

19 Clues: A secret word.A fake email scam.A weakness in a system.Pretend trusted entity.Fixing update in software.Data is accessed or stolen.Detects and removes viruses.Verifying a user's identity.Attack that overwhelms a system.Security risk posed by employees.Information used in cyber threats.Disguised software to trick users....

3°4 jobs 2025-2026 2025-11-25

3°4 jobs 2025-2026 crossword puzzle
Across
  1. a person who installs and repairs air-conditioning systems.
  2. a person who helps patients with daily care in hospitals.
  3. a person who sells and arranges flowers.
  4. a person who repairs cars and engines.
  5. a person who builds or repairs houses.
  6. a person who helps with young children in a nursery.
  7. a person who welcomes people in a company or office.
  8. a person who gives medical care to patients.
  9. a person who cuts and styles hair.
  10. a person who fixes and looks after buildings.
Down
  1. a person who cares for skin, nails and beauty treatments.
  2. a person who takes care of children at home.
  3. a person who helps customers in a shop.
  4. a person who designs and takes care of gardens.
  5. a person who protects computers from cyber attacks.
  6. a person who prepares meals.

16 Clues: a person who prepares meals.a person who cuts and styles hair.a person who repairs cars and engines.a person who builds or repairs houses.a person who helps customers in a shop.a person who sells and arranges flowers.a person who takes care of children at home.a person who gives medical care to patients.a person who fixes and looks after buildings....

workshop 2021-04-10

workshop crossword puzzle
Across
  1. informations- och kommunikationsteknik
  2. ingenjörens viktigaste skicklighet
  3. titel som ska tas emot efter examen
  4. Nätverk ingenjör
  5. när du använder internet är du ansluten till detta
  6. tidigare programvarateknik
Down
  1. KVM, Hyper-V, VMWare, Virtualbox
  2. nuvarande 'cyber security'
  3. till exempel en 'Zoom' anslutning
  4. C++, C#, java och python
  5. ingår inte längre i IKT-studier
  6. det kan lösä problem
  7. dessa kan säkerställa programvarans funktionalitet

13 Clues: Nätverk ingenjördet kan lösä problemC++, C#, java och pythonnuvarande 'cyber security'tidigare programvarateknikingår inte längre i IKT-studierKVM, Hyper-V, VMWare, Virtualboxtill exempel en 'Zoom' anslutningingenjörens viktigaste skicklighettitel som ska tas emot efter exameninformations- och kommunikationsteknik...

Prestige Cybersecurity Awareness Month 2025-10-16

Prestige Cybersecurity Awareness Month crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. A type of cyber attack that tricks users into revealing personal information
  3. The principle of ensuring data is not altered or tampered with
  4. A software update that fixes security vulnerabilities
  5. Malware that locks data and demands payment for release
  6. A file or program that appears harmless but contains malicious code
  7. Software designed to disrupt, damage, or gain unauthorized access
  8. The process of converting data into a coded form to prevent unauthorized access
Down
  1. The practice of hiding messages so only the intended recipient can read them
  2. Software that secretly gathers user information
  3. A person who gains unauthorized access to systems for malicious purposes
  4. An extra layer of security requiring two forms of identification
  5. A secret word or phrase used to gain access
  6. A fake website or email designed to look legitimate
  7. A service that encrypts your internet connection for privacy

15 Clues: A secret word or phrase used to gain accessSoftware that secretly gathers user informationA fake website or email designed to look legitimateA software update that fixes security vulnerabilitiesMalware that locks data and demands payment for releaseA service that encrypts your internet connection for privacy...

IVGM 2022-11-26

IVGM crossword puzzle
Across
  1. Foundations of Cyber Security
  2. Information Society Principles: towards e-Governance
  3. E-Governance Technologies and Services Master's Project
  4. Introduction to IT and eGov Technologies
  5. Introduction to Development in Cloud
  6. Enterprise Architecture and BPM
  7. Governing in the Digital Era
  8. Creating Innovation Capacities in Government
Down
  1. Basics of e-Health
  2. Impact and Measurement of e-Governance
  3. IT Solutions of e-government
  4. Information Systems Programming
  5. Legal Framework of e-Governance
  6. International Entrepreneurship
  7. Estonian Language and Culture

15 Clues: Basics of e-HealthIT Solutions of e-governmentGoverning in the Digital EraFoundations of Cyber SecurityEstonian Language and CultureInternational EntrepreneurshipInformation Systems ProgrammingLegal Framework of e-GovernanceEnterprise Architecture and BPMIntroduction to Development in CloudImpact and Measurement of e-Governance...

Workforce or College 2023-05-25

Workforce or College crossword puzzle
Across
  1. 2 year degree
  2. career from 2 year degree
  3. training from an apprenticeship
  4. 4 year degree
  5. career from 4 year degree
Down
  1. less than a year
  2. working for your future employer
  3. security of the web for military
  4. serving our country
  5. career from technical certificate

10 Clues: 2 year degree4 year degreeless than a yearserving our countrycareer from 2 year degreecareer from 4 year degreetraining from an apprenticeshipworking for your future employersecurity of the web for militarycareer from technical certificate

Netiquette 2023-09-14

Netiquette crossword puzzle
Across
  1. always having capslock on
  2. A strong opinion directed at someone else
  3. When Online use proper_________
  4. A lot of Junk Emails
  5. When Online Treat others how You want to be_________
  6. _______ security
Down
  1. _______info is not to be freely distributed
  2. Remember the ____________
  3. Network Etiquette
  4. Respect others _________

10 Clues: _______ securityNetwork EtiquetteA lot of Junk EmailsRespect others _________Remember the ____________always having capslock onWhen Online use proper_________A strong opinion directed at someone else_______info is not to be freely distributedWhen Online Treat others how You want to be_________

KN - TACOHAI - G8 - 2ND TERM - FINAL REVIEW 1 - 240424 2024-04-24

KN - TACOHAI - G8 - 2ND TERM - FINAL REVIEW 1 - 240424 crossword puzzle
Across
  1. V đánh giá
  2. N | Adj (N) dòng điện | (Adj) thuộc về điện
  3. V | N ấn nhẹ, gõ nhẹ, búng nhẹ | (N) cú ấn nhẹ, cái gõ nhẹ, cái đập nhẹ (eg. with the ... of a switch)
  4. N điện lực, điện (nói chung)
  5. N sự cháy điện
  6. V phát minh
  7. N tín hiệu giao thông
  8. N khí nhà kính
  9. combining form mạng (eg. cyberbully, cyber-security,..)
  10. N sự phát minh
Down
  1. V giật điện, giết (bằng dòng điện)
  2. N mức năng lượng của tác giả
  3. N sự giật điện, sự bị điện giật chết
  4. N đa truyền thông (sự kết hợp cả âm thanh, hình ảnh, chữ viết.. trên màn hình hiển thị)
  5. Adj đầy năng lượng, năng nổ, giàu năng lượng (eg. an ... Supporter)
  6. N phương tiện truyền thông
  7. N bão lớn Thái Bình Dương <a violent tropical storm with very strong winds> (Hurricane: bão lớn Đại Tây Dương)
  8. Adj (= imaginative) đầy sáng tạo, có óc sáng tạo, giảu trí tưởng tượng
  9. Adj bằng lời nói, bằng miệng (>< nonverbal, written)
  10. V truy cập

20 Clues: V đánh giáV truy cậpV phát minhN sự cháy điệnN khí nhà kínhN sự phát minhN tín hiệu giao thôngN phương tiện truyền thôngN mức năng lượng của tác giảN điện lực, điện (nói chung)V giật điện, giết (bằng dòng điện)N sự giật điện, sự bị điện giật chếtN | Adj (N) dòng điện | (Adj) thuộc về điệnAdj bằng lời nói, bằng miệng (>< nonverbal, written)...

IEM's October Social Media Crossword Puzzle 2021-10-21

IEM's October Social Media Crossword Puzzle crossword puzzle
Across
  1. Wash your hands with _____ and water
  2. October is ________ Awareness Month
  3. IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
  4. Important tool to protect your family during a fire emergency
  5. Theme of hurricane preparedness tip
  6. IEMer moderating FEAM Forum Panel at IAEM (last name)
  7. Sites opening across Virginia
  8. International Day for Disaster ______
Down
  1. Great Shake Out Drill
  2. Cyber attack
  3. FEMA Administrator (last name)
  4. 246th Birthday
  5. Committed to stabilizing ______ security
  6. NEMA 2021 Annual Forum
  7. ______ Week
  8. Annual Conference in Grand Rapids, MI
  9. Conferences are an opportunity to…

17 Clues: ______ WeekCyber attack246th BirthdayGreat Shake Out DrillNEMA 2021 Annual ForumSites opening across VirginiaFEMA Administrator (last name)Conferences are an opportunity to…October is ________ Awareness MonthTheme of hurricane preparedness tipWash your hands with _____ and waterAnnual Conference in Grand Rapids, MI...

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. gain unauthorized access to a computer system
  2. capable of being easily hurt
  3. refers to any external entity who may have access to private data
  4. security risk who cause the program to crash
  5. network of maliciously installed bots
  6. records or transmits a user's keystrokes
Down
  1. cyber exploit directed at online card players
  2. unauthorized duplication or deletion of an organization's electronic information
  3. security mechanism for separating running programs
  4. software tools used by a third party

10 Clues: capable of being easily hurtsoftware tools used by a third partynetwork of maliciously installed botsrecords or transmits a user's keystrokessecurity risk who cause the program to crashcyber exploit directed at online card playersgain unauthorized access to a computer systemsecurity mechanism for separating running programs...

Cyber Security quiz 2022-12-19

Cyber Security quiz crossword puzzle
Across
  1. minus 273.15 degrees is
  2. What school?
  3. The white what?
  4. What resource?
  5. Michael Knights car
Down
  1. His profession
  2. Who's the good?
  3. Main characters first name
  4. Main characters callsign
  5. Busting what?
  6. Creative imaginary work

11 Clues: What school?Busting what?His professionWhat resource?Who's the good?The white what?Michael Knights carminus 273.15 degrees isCreative imaginary workMain characters callsignMain characters first name

Cyber Security Revision 2024-10-10

Cyber Security Revision crossword puzzle
Across
  1. Part of the Internet that can be accessed using a search engine.
  2. A way of convincing people to give up personal information.
  3. A way of strengthening logins by sending a code to a phone or email.
  4. A simple (and very old) method of encryption where the alphabet is shifted.
Down
  1. Part of the Internet that is unmonitored and often contains illegal content.
  2. A way of jumbling up data so it is unreadable.
  3. Type of hacker that commits illegal actions.
  4. A small piece of software designed to cause damage.
  5. Type of hacker who commits illegal actions but for the greater good.
  6. Part of the Internet hidden behind logins, etc.
  7. Type of hacker who legally hacks, often to test networks.

11 Clues: Type of hacker that commits illegal actions.A way of jumbling up data so it is unreadable.Part of the Internet hidden behind logins, etc.A small piece of software designed to cause damage.Type of hacker who legally hacks, often to test networks.A way of convincing people to give up personal information....

CYBER SECURITY CROSSWORD 2025-09-24

CYBER SECURITY CROSSWORD crossword puzzle
Across
  1. A way to lock your data so only the right person can read it.
  2. Keeping your personal information safe and not sharing it without permission.
  3. A security step where you need two things (like a password and a code) to log in.
  4. A machine that cuts paper into tiny pieces so no one can read it.
  5. Malicious software that can damage your computer or steal your data.
  6. A secret word or code you use to log in and keep your accounts safe.
Down
  1. A program that finds and removes harmful software from your device.
  2. A tool that protects your computer by blocking unwanted internet traffic.
  3. A sneaky program that watches what you do on your computer without you knowing.
  4. A small update that fixes problems or security holes in software.
  5. A trick where someone pretends to be trustworthy to steal your personal info.

11 Clues: A way to lock your data so only the right person can read it.A small update that fixes problems or security holes in software.A machine that cuts paper into tiny pieces so no one can read it.A program that finds and removes harmful software from your device.Malicious software that can damage your computer or steal your data....

soal 4.0 2023-10-24

soal 4.0 crossword puzzle
Across
  1. salah satu teknologi di industri 4.0 yang sangat berguna saat ini
  2. Alat Iot yang kegunaanya memudahkan dirumah
  3. Teknologi inti dari Industri 4.0
  4. Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
  5. Data besar yang kompleks yang dianalisis dalam industri 4.0
  6. Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
  1. Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
  2. Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
  3. Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
  4. Revolusi industri saat ini

10 Clues: Revolusi industri saat iniTeknologi inti dari Industri 4.0Alat Iot yang kegunaanya memudahkan dirumahData besar yang kompleks yang dianalisis dalam industri 4.0salah satu teknologi di industri 4.0 yang sangat berguna saat iniAlat atau kebijakan yang berguna untuk melindungi lingkungan cyber...

Cyber Security Juniors 2020-11-13

Cyber Security Juniors crossword puzzle
Across
  1. a secret word or phrase
  2. programs that scan your computer
  3. a sysytem of rules that explain correct steps
  4. a system of rules that explains correct steps
  5. person who secretly gets access to computer info
  6. method of changing a message to conceal meaning
Down
  1. unwanted emails
  2. personal facts about you
  3. copying a file from one computer to another
  4. system of computers and devices
  5. a word or phrase entered into a device

11 Clues: unwanted emailsa secret word or phrasepersonal facts about yousystem of computers and devicesprograms that scan your computera word or phrase entered into a devicecopying a file from one computer to anothera sysytem of rules that explain correct stepsa system of rules that explains correct stepsmethod of changing a message to conceal meaning...

cyber security crossword 2022-11-28

cyber security crossword crossword puzzle
Across
  1. is any software that installs itself on your computer and starts covertly monitoring your online behaviour without your knowledge or permission.
  2. is any malware that misleads users of its true intent.
  3. manipulation technique that exploits human error to gain private information, access, or valuables.
Down
  1. Distributed denial of service attack
  2. is a malware designed to deny a user or organization access to files on their computer
  3. is a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
  4. is unwanted software designed to throw advertisements up on your screen, most often within a web browser.
  5. As software designed to interfere with a computer's normal functioning
  6. spreads across a network
  7. a set of computers infected by bots.
  8. a piece of code which is capable of copying itself e.g. corrupting the system or destroying data.

11 Clues: spreads across a networkDistributed denial of service attacka set of computers infected by bots.is any malware that misleads users of its true intent.As software designed to interfere with a computer's normal functioningis a malware designed to deny a user or organization access to files on their computer...

Cyber Security Juniors 2020-11-10

Cyber Security Juniors crossword puzzle
Across
  1. virus software, programs that scan your computer
  2. system of computers and devices
  3. method of changing a message to conceal meaning
  4. secret word or phrase
  5. information, personal facts about you
  6. system of symbols usually letters and numbers
Down
  1. person who secretly gets access to computer info
  2. a system of rules that explains correct steps
  3. word or phrase entered into devises
  4. unwanted emails
  5. copying a file from one computer to another

11 Clues: unwanted emailssecret word or phrasesystem of computers and devicesword or phrase entered into devisesinformation, personal facts about youcopying a file from one computer to anothera system of rules that explains correct stepssystem of symbols usually letters and numbersmethod of changing a message to conceal meaning...

Cyber security revision 2021-11-05

Cyber security revision crossword puzzle
Across
  1. a wall on fire
  2. sounds like capture
  3. Covid-19
  4. a insect that wriggles around
  5. my anti has a virus
Down
  1. a big horse
  2. unique to you
  3. something you need to login to a device
  4. looking at someone password over their shoulder
  5. fishing
  6. always check

11 Clues: fishingCovid-19a big horsealways checkunique to youa wall on firesounds like capturemy anti has a virusa insect that wriggles aroundsomething you need to login to a devicelooking at someone password over their shoulder