cyber security Crossword Puzzles
Cyber Security Frameworks 2026-02-19
Across
- Information about policy date, author, publication
- Cyber........designed to address basic cyber threats
- was developed in 2014 in US
- core to NIST
- established organisation leadership to establish
Down
- Essentials plus requires an in-depth.........
- Adversere event analysisis is part of which NIST function
- ........protection- 4th key control
- the "I" in IAM
- guidelines to ensure standardisation and risk mitigation
- General Data Protection Regulation
11 Clues: core to NIST • the "I" in IAM • was developed in 2014 in US • General Data Protection Regulation • ........protection- 4th key control • Essentials plus requires an in-depth......... • established organisation leadership to establish • Information about policy date, author, publication • Cyber........designed to address basic cyber threats • ...
TMGT 7123 Review 2016-10-31
Across
- a network that connects head office with a branch office
- used by organizations to better manage their IT
- what is used in a relational database to uniquely identify a table
- an unstructured database such as Cassandra
- An example of a wireless technology similar to RFID
- cabling standard for building networks based on IEEE standard
- the predecessor to Enterprise Resource Planning systems
- the person in an organization that is responsible for creating an IT roadmap
- A research organization that produces findings like Magic Quadrants
- a network devices than connects two different networks together
- device or algorithms used by organizations to prevent cyber attacks
Down
- a system development methodology
- what organizations do to acquire software
- an example of a disruptive technology and is used by billions of users
- volatile memory used by computing devices
- the type of security that is of most concern to e-commerce companies
- waterfall is an example of this
- the successor to MRP
- an organization’s expectations for when it would be able to operate after a disaster
- Open System Interconnection
20 Clues: the successor to MRP • Open System Interconnection • waterfall is an example of this • a system development methodology • what organizations do to acquire software • volatile memory used by computing devices • an unstructured database such as Cassandra • used by organizations to better manage their IT • An example of a wireless technology similar to RFID • ...
CyberQuiz 2024-02-05
Across
- Software that detects and removes malicious programs on a computer
- Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
- System designed to mimic a vulnerable resource to attract and monitor cyber attacks
- Malware that encrypts user data, demanding payment for decryption
- Secret or hidden access point in a system, often used to bypass normal authentication
- Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
- Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
- Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
- Weakness or flaw in a system that could be exploited for unauthorized access
- A sequence of characters used for authentication to access a system or account
- Hidden part of the internet associated with illicit activities and anonymity
- Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
- Security system that monitors and controls network traffic
- Team Defensive cybersecurity team responsible for protecting a system or network.
- Network of compromised computers controlled by a single entity for malicious activities
15 Clues: Security system that monitors and controls network traffic • Malware that encrypts user data, demanding payment for decryption • Software that detects and removes malicious programs on a computer • Weakness or flaw in a system that could be exploited for unauthorized access • Hidden part of the internet associated with illicit activities and anonymity • ...
CYBER SECURITY-CROSSWORD PUZZLE 2025-09-25
Across
- Self Replicating malicious software
- Ignoring the request
- Too many mails at a time
- The potential for negative consequences
- A piece of code, or method that leverages a vulnerability) in H/W or S/W to gain unauthorized access or steal data.
- An attacker capturing and inspecting data packets as they travel across a network to steal sensitive information
- a criminal uses pre-compiled list of common words
- cybercriminal impersonates a trusted entity
- A broker who misuses data
Down
- Destroy the data or assets
- A malicious activity that seeks to damage/steal/gain unauthorized access to data
- Use people skills to steal information
- Weakness or security gaps in a system
- Attract you will some benefit for their benefit
- keep it as a secret
- known as a wordlist, to guess a user's password for a website or system.
16 Clues: keep it as a secret • Ignoring the request • Too many mails at a time • A broker who misuses data • Destroy the data or assets • Self Replicating malicious software • Weakness or security gaps in a system • Use people skills to steal information • The potential for negative consequences • cybercriminal impersonates a trusted entity • ...
Cyber Security - Chapter 1 2020-02-12
Across
- State Sponsored Hackers
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- is the collection of technologies that enable the connection of various devices to the Internet.
- is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
15 Clues: State Sponsored Hackers • This group of criminals breaks into computers or networks to gain access for various reasons. • is the collection of technologies that enable the connection of various devices to the Internet. • Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • ...
Reliability Compliance 2017-06-01
Across
- IF YOU DON'T KNOW, _____.
- CRITICAL INFRASTRUCTURE PROTECTION
- TIME ALLOWED TO REPORT A CYBER SECURITY INCIDENT
- REPORT SUSPICIOUS EVENTS TO THE _________ _______.
- _____________ NEEDS TO BE KEPT CURRENT.
Down
- REPEAT AND GET CONFIRMATION
- FOLLOW ALL _____________.
- RELIABILITY COMPLIANCE OFFICE
- ________ FIRST!
9 Clues: ________ FIRST! • IF YOU DON'T KNOW, _____. • FOLLOW ALL _____________. • REPEAT AND GET CONFIRMATION • RELIABILITY COMPLIANCE OFFICE • CRITICAL INFRASTRUCTURE PROTECTION • _____________ NEEDS TO BE KEPT CURRENT. • TIME ALLOWED TO REPORT A CYBER SECURITY INCIDENT • REPORT SUSPICIOUS EVENTS TO THE _________ _______.
online safety 2024-10-04
7 Clues: to keep you safe • another word for security • where you can get attacked • to keep your information safe • A software used to cyber attack • something to keep you away from viruses • something to do after you've been attacked
online safety 2024-10-04
7 Clues: to keep you safe • another word for security • where you can get attacked • to keep your information safe • A software used to cyber attack • something to keep you away from viruses • something to do after you've been attacked
Cyber Security Crossword 2017-09-19
Across
- Always use UTC's ______ access solution to connect to the UTC network when using an unsecure wireless network. This ensures that any data sent or received over the wireless network is encrypted and protected.
- 87% of what enter through email attachments and links and have cost companies upwards of $300,000,000? This is also the name for a computer program that is designed to gain access, replicate to peer computers, and do a specific task (like send spam), as well as many other malicious behaviors.
- Which department should you get approval from when downloading software?
- A red flag of a phishing email can be an unknown ____ address.
- What is a type of computer malware that typically infects a computer through a successful email phishing attempt? This can block access to files on the computer using encryption and attempts to spread to other systems on the network.
- How many characters should an ideal password have at the least?
Down
- When you receive a suspicious (spam/phishing) email you should click on the '_______ Phishing' button.
- Social _____________ is a scam where an attacker attempts to gain the trust of the target, typically over the phone but it could be in person or through email, with the goal of obtaining information.
- You cannot save company information on what kind of devices?
- Do not use the same ________ for everything.
- If you need to transfer a large file you should you your business unit’s ___ solution?
11 Clues: Do not use the same ________ for everything. • You cannot save company information on what kind of devices? • A red flag of a phishing email can be an unknown ____ address. • How many characters should an ideal password have at the least? • Which department should you get approval from when downloading software? • ...
cyber security crossword 2025-04-09
Across
- These emails try to get your credentials by creating a sense of urgency
- A great option for a password manager
- Secures account through text/email/etc. (abbreviation)
- One of the top cybersecurity companies you can trust
- Detects and removes harmful materials on your device
Down
- Malware that can harm your computer
- Regularly check for _______ on your computer or device
- It's good to have a password length of at lest ______
- A great to store your credentials would be using a ________ manager
- It's a good idea to _____ phishing or scam emails
- Good to empty every so often and recover deleted files in
11 Clues: Malware that can harm your computer • A great option for a password manager • It's a good idea to _____ phishing or scam emails • One of the top cybersecurity companies you can trust • Detects and removes harmful materials on your device • It's good to have a password length of at lest ______ • Regularly check for _______ on your computer or device • ...
Cyber Security 2017 2017-10-02
Across
- type of malware that has a reproductive capacity to transfer itself from one computer to another spreading infections between online devices.
- a type of malware installed on computers that collects information about users with out their knowledge; can collect internet surfing habits, user login and passwords, bank or credit account information and other date entered in to a computer.
- the process of adding geographical location, or label to photographs, videos, web sites, SMS messages, OR Codes or RSS feeds.
- Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set settings, preventing access by hackers and malicious software; often offered through computer operating systems.
- is the action of tracking the keys struck on a computer keyboard.
Down
- an alternative form of phishing that occurs via text or SMS message
- sending emails that attempt to fraudulently acquire personal information, such as user names, passwords, social security numbers and credit care numbers by masquerading as a trustworthy entity.
- type of malware that allows popup ads on a computer system, ultimately taking over a user's internet browsing.
- The conversion of digital information into a format unreadable t anyone except those processing a "key" through which the encrypted information is converted back to it's original form, making it readable again.
- Short for malicious software, software that disrupts or damages a computer's operation, gathers sensitive or private information , or gains access to private computer systems.
- A network of private computers, each of which is called a "bot" infected with malicious software and controlled as a group with out the owners 'knowledge for nefarious and often, criminal purposes; computers are typically infected when users open up an infected attachment of visit an infected website.
11 Clues: is the action of tracking the keys struck on a computer keyboard. • an alternative form of phishing that occurs via text or SMS message • type of malware that allows popup ads on a computer system, ultimately taking over a user's internet browsing. • ...
Cyber Security Vocab 2021-09-23
Across
- a form of extortion malware which steals data accompanied by the threat to publish such data unless a ransom is paid; sometimes referred to as doxware
- occurs when data is viewed or stolen by an unauthorised third party; sometimes referred to as data ‘compromise’, as distinct from an ‘incident’ where data disclosure is possible, but unconfirmed
- the use of the internet to control or disrupt remote physical objects or infrastructure
- internet-of-things, a rapidly growing network of physical devices, including but not limited to traditional computing devices, that are connected to the internet allowing for remote data transfer and operation
- contraction of ‘malicious software’; software designed to harm or damage a computer system or the interests of the user; includes viruses, worms, Trojans, spyware, ransomware, cryptomining software
- an overlay of the open internet using software and/or permissions to limit public access, it operates on a peer- to-peer or encrypted basis, where only trusted parties have access to content and communications; for this reason, it is preferred by criminal organisations and marketplaces where stolen and illicit content and data can be traded, though it has other uses including political discourse and whistleblowing
- an attack which takes advantage of a vulnerability or defect in a computer system giving unauthorised access or control to a third party
Down
- distributed denial of service attack, whereby many compromised computers simultaneous send data requests to a target machine for the purpose of overwhelming the system resources, thereby making the core functions unavailable to legitimate users
- spread generally by unsolicited email, attempts to trick a person into revealing identity credentials, login details or passwords for the purpose of fraud
- an unauthorised and unknown access point into a computer system through which a remote attacker can gain access or steal information
- separating sensitive or valuable systems or information sources from other parts of a network to reduce the chances of data loss or compromise
11 Clues: the use of the internet to control or disrupt remote physical objects or infrastructure • an unauthorised and unknown access point into a computer system through which a remote attacker can gain access or steal information • ...
Cyber Security Awareness 2025-09-22
Across
- Software designed to detect, prevent, and remove malicious software.
- A broad term for malicious software designed to cause damage to a computer or network.
- Malware that secretly observes your activities without your permission.
- A person who uses technical skills to gain unauthorized access to computer systems.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- A type of social engineering attack using fraudulent messages, often by email, to trick people into revealing sensitive information.
Down
- A network security device that monitors and filters incoming and outgoing network traffic.
- A secret word or phrase used to prove your identity and gain access to a resource.
- The process of converting data into a code to prevent unauthorized access.
- A type of malware that can replicate itself and spread to other computers on a network.
- Malware that disguises itself as a legitimate file or program to trick you into installing it.
11 Clues: Software designed to detect, prevent, and remove malicious software. • Malware that secretly observes your activities without your permission. • The process of converting data into a code to prevent unauthorized access. • A secret word or phrase used to prove your identity and gain access to a resource. • ...
Adventskalender Cyber Security 2025-10-30
Across
- Person som prøver å bryte seg inn i datasystemer.
- Brukes når du forlater PC-en.
- Viktig å gjøre ofte for å tette sikkerhetshull.
- Det du bruker for å logge inn. Bør være langt og unikt.
- Det du kobler deg til – vær forsiktig med åpne versjoner.
Down
- Ekstra beskyttelse som krever både passord og bekreftelse.
- Hovedtemaet for hele kalenderen.
- En trygg kopi av viktige filer.
- Enheten mange bruker til både jobb og privat, må sikres.
- Det du skal gjøre hvis du oppdager noe mistenkelig.
- Forsøk på å lure deg til å gi fra deg informasjon via e-post.
11 Clues: Brukes når du forlater PC-en. • En trygg kopi av viktige filer. • Hovedtemaet for hele kalenderen. • Viktig å gjøre ofte for å tette sikkerhetshull. • Person som prøver å bryte seg inn i datasystemer. • Det du skal gjøre hvis du oppdager noe mistenkelig. • Det du bruker for å logge inn. Bør være langt og unikt. • Enheten mange bruker til både jobb og privat, må sikres. • ...
Cyber Security awareness crossword 2023-09-27
Across
- protects its users by encrypting their data and masking their IP addresses
- displays unwanted advertisements and pop-ups
- can record and steal consecutive keystrokes
- Are you a bot?
- A type of malware and a wooden horse
- attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
- Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
Down
- It is a small piece of information that a website stores on your computer
- Pay me for your data
- a form of malware that hides on your device, monitors your activity, and steals sensitive information
- shields your network from malicious or unnecessary network traffic
- a security mechanism that creates a virtual trap to lure attackers
- Process of verification
- send messages pretending to be a trusted person or entity
- Malware that self-replicates and infects other computers
- a system for malware detection that runs a suspicious object in an isolated environment
16 Clues: Are you a bot? • Pay me for your data • Process of verification • A type of malware and a wooden horse • can record and steal consecutive keystrokes • displays unwanted advertisements and pop-ups • Malware that self-replicates and infects other computers • send messages pretending to be a trusted person or entity • ...
Basic Concepts 2024-08-18
Across
- A weakness in a system that could be exploited to cause harm to the system
- The unintended loss of service of an information system
- A set of security goals in cyber security
- The unintended change of data belonging to an information system
- A quality of data which refers to how useful the data is
- A quality of data in which the owner or creator is correct
Down
- A countermeasure which prevents a threat from exploiting a vulnerability
- A quality of security in which data and services are accessable to the authorized parties
- Software, data, or commands which take advantage of a vulnerability to cause unintended behavior in a system
- The unintended release of confidential information
- A quality of security in which data is only modified by those authorized to do so, and in a way in which the data was intended to be modified
- A quality of security in which data is only viewable by authorized individuals
- Negative consequences of a threat
- A quality of data which states who physically controls the media on which data is stored
- A person or environmental actor that could cause hard to the system
15 Clues: Negative consequences of a threat • A set of security goals in cyber security • The unintended release of confidential information • The unintended loss of service of an information system • A quality of data which refers to how useful the data is • A quality of data in which the owner or creator is correct • ...
Cyber Security Day 2021 2021-11-10
Across
- Cyber security is _________'s responsibility
- Never, ever trust this type of wifi
- ____________ made OT systems vulnerable
Down
- Who's the target for cyber criminals?
- Automation means that _____ footage can be leaked
- When one factor is not enough (under "Learn how not to be the weakest link")
- An insurance company that made ransomware payments
7 Clues: Never, ever trust this type of wifi • Who's the target for cyber criminals? • ____________ made OT systems vulnerable • Cyber security is _________'s responsibility • Automation means that _____ footage can be leaked • An insurance company that made ransomware payments • When one factor is not enough (under "Learn how not to be the weakest link")
Wisik 2024-01-13
9 Clues: untuk internetan • lokal area network • pemancar sinyal wifi • mekanisme pertukaran data • tata kelola data (pengertian) • pembobol keamanan (cyber security) • salah satu cakupan tata kelola data • topologi jaringan yang umum digunakan • terstruktur dan berurutan dari awal sampai akhir
Cyber Security awareness crossword 2023-09-27
Across
- protects its users by encrypting their data and masking their IP addresses
- displays unwanted advertisements and pop-ups
- can record and steal consecutive keystrokes
- Are you a bot?
- A type of malware and a wooden horse
- attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
- Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
Down
- It is a small piece of information that a website stores on your computer
- Pay me for your data
- a form of malware that hides on your device, monitors your activity, and steals sensitive information
- shields your network from malicious or unnecessary network traffic
- a security mechanism that creates a virtual trap to lure attackers
- Process of verification
- send messages pretending to be a trusted person or entity
- Malware that self-replicates and infects other computers
- a system for malware detection that runs a suspicious object in an isolated environment
16 Clues: Are you a bot? • Pay me for your data • Process of verification • A type of malware and a wooden horse • can record and steal consecutive keystrokes • displays unwanted advertisements and pop-ups • Malware that self-replicates and infects other computers • send messages pretending to be a trusted person or entity • ...
Cyber Security Month 2023 2023-09-01
Across
- Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
- An important process that verifies a user is really who they are; many was this can be done
- An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
- An attack that hijacks your system and denies you access until you send money
- Characteristics used to identify a person
- The form of encryption that requires two different credentials
- Malware hidden as an attachment or free download
Down
- The state of being free from danger for threat
- Bullying that takes place online
- Type of cyber attack where a person is tricked into give information via a text message
- Digital currency, preference for hackers
- A person who tries to gain unauthorised access to a network or computer system.
- When a hacker successfully exploits a device and gains access to files and data
- An annoying malware that spams you with ads
- A fraudulent or deceptive act or operation
16 Clues: Bullying that takes place online • Digital currency, preference for hackers • Characteristics used to identify a person • A fraudulent or deceptive act or operation • An annoying malware that spams you with ads • The state of being free from danger for threat • Malware hidden as an attachment or free download • ...
Synoptech No. 4 - Cyber Risk in Central Banking 2022-10-26
Across
- Phishing attacks involve the mass distribution of _____ e-mail messages
- BSFIs should oversee _____ phishing simulations or exercises
- Cyber security _____ is increasingly integrated into enterprise risk management frameworks
- Data breaches compromise confidentiality, with_____ and reputational losses.
Down
- Beyond investments, central banks focus on developing concrete policy _____
- Phishing is an example of _____ engineering
- _____ is one of the most common method of cyber attack
- Phishing is an attempt to obtain sensitive _____
8 Clues: Phishing is an example of _____ engineering • Phishing is an attempt to obtain sensitive _____ • _____ is one of the most common method of cyber attack • BSFIs should oversee _____ phishing simulations or exercises • Phishing attacks involve the mass distribution of _____ e-mail messages • ...
Mrs Craigs - Cyber Security 2021-04-13
Across
- _______have made taking and sharing images so easy nowadays (2 words).
- Be careful when using public ____
- The name for a computer camera is a ______.
- There are ______laws in Australia that control what you can and can't send, say or share online.
- Passwords should be kept _____.
- Apps to share information between people online (2 words).
- When you are nasty to others online
- Your location settings should be turned ____.
Down
- Someone who breaks into a computer system to steal information.
- Your online payment details should never be _____.
- Your digital ______ is a permanent history of your online activity.
- When people access and use your personal information without your permission (2 words).
- Your privacy settings should never be set as _____.
- You need a persons ______ before you can share pictures of them online.
- Never list your phone number or home_______ under the contact information online.
- Protect your devices with a strong_____.
16 Clues: Passwords should be kept _____. • Be careful when using public ____ • When you are nasty to others online • Protect your devices with a strong_____. • The name for a computer camera is a ______. • Your location settings should be turned ____. • Your online payment details should never be _____. • Your privacy settings should never be set as _____. • ...
Cyber Security awareness crossword 2023-09-27
Across
- It is a small piece of information that a website stores on your computer
- Protects its users by encrypting their data and masking their IP addresses
- Displays unwanted advertisements and pop-ups
- Attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
- Sends messages pretending to be a trusted person or entity
- Malware that self-replicates and infects other computers
- A type of malware and a wooden horse
- Shields your network from malicious or unnecessary network traffic
- Developing audio, image, or video clip that has been edited and manipulated to appear real or believable
- Can record and steal consecutive keystrokes
Down
- System for malware detection that runs a suspicious object in an isolated environment
- Process of verification
- Are you a bot?
- Pay me for your data
- A form of malware that hides on your device, monitors your activity, and steals sensitive information
- A security mechanism that creates a virtual trap to lure attackers
16 Clues: Are you a bot? • Pay me for your data • Process of verification • A type of malware and a wooden horse • Can record and steal consecutive keystrokes • Displays unwanted advertisements and pop-ups • Malware that self-replicates and infects other computers • Sends messages pretending to be a trusted person or entity • ...
Cyber Security Puzzle 2024 2024-12-18
Across
- documents) which is stored somewhere else.
- A copy of the information held on a device (such as photos
- on a scam website.
- Information about you held on computers that you wouldn’t
- others (especially hackers) to get hold of.
- know your password.
- Software that can have a bad impact on your device
- A message that tries to trick you into doing something that
- accessing your accounts.
Down
- A message that tries to trick you into doing something that
- Getting into someone else’s computer or device without
- cause you harm, such as giving away information or
- on a scam website.
- cause you harm, such as giving away information or
- A way to stop hackers getting into your accounts, even if
- A sequence of characters (or words) used to stop criminals
- computer.
- permission.
- Unwanted emails or messages that usually try to sell you
19 Clues: computer. • permission. • on a scam website. • on a scam website. • know your password. • accessing your accounts. • documents) which is stored somewhere else. • others (especially hackers) to get hold of. • cause you harm, such as giving away information or • cause you harm, such as giving away information or • Software that can have a bad impact on your device • ...
IT 2024-05-21
Across
- what has a screen with no buttons
- charge you device without a wire
- example of a cyber security
- where do you collect money
- how you search thing up
Down
- example of data testing
- stick in into your device
- you watch movies on it
- keep data on it
- makes the computer work
- it has branches
- how you lose information
- is an example of an HCI
13 Clues: keep data on it • it has branches • you watch movies on it • example of data testing • makes the computer work • is an example of an HCI • how you search thing up • how you lose information • stick in into your device • where do you collect money • example of a cyber security • charge you device without a wire • what has a screen with no buttons
EYE OF MINDS 2019-04-26
Across
- The danger is
- Tanya wanted to jump off the
- is torn to pieces on the Path
- told michael to meet him in the alley
- Main character
- "his heart continued to thump away like a heavymetal drumbeat"
- important
- The 'Devils of Destruction' game is allegedly set during a war in what location
- tanya ripped her own
Down
- cyber terriost
- tried to commit suicide
- lead agent to stop kaine
- Who wrote the book
- The world is
- virtnet security system
- chapter 1 title
- system connecting virtual worlds
- michael girl bestfriend
18 Clues: important • The world is • The danger is • cyber terriost • Main character • chapter 1 title • Who wrote the book • tanya ripped her own • tried to commit suicide • virtnet security system • michael girl bestfriend • lead agent to stop kaine • Tanya wanted to jump off the • is torn to pieces on the Path • system connecting virtual worlds • told michael to meet him in the alley • ...
Cyber Security Day 2021 2021-11-10
Across
- Cyber security is _________'s responsibility
- Never, ever trust this type of wifi
- ____________ made OT systems vulnerable
Down
- Who's the target for cyber criminals?
- Automation means that _____ footage can be leaked
- When one factor is not enough (under "Learn how not to be the weakest link")
- An insurance company that made ransomware payments
7 Clues: Never, ever trust this type of wifi • Who's the target for cyber criminals? • ____________ made OT systems vulnerable • Cyber security is _________'s responsibility • Automation means that _____ footage can be leaked • An insurance company that made ransomware payments • When one factor is not enough (under "Learn how not to be the weakest link")
Cyber Intelligence (Medium) 2023-06-01
Across
- The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
- An individual or group that carries out cyber attacks for political or ideological reasons.
- A technique used to gather intelligence by infiltrating target networks or systems.
- A technique used to gather intelligence by monitoring and analyzing public sources of information.
- A covert technique used to gain unauthorized access to a computer system.
- A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
- The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
- The process of identifying and mapping potential vulnerabilities in a system or network.
- a centralized team responsible for monitoring and responding to security incidents.
- A software program that disguises itself as a legitimate program but performs malicious activities.
- The proactive search for indicators of compromise and potential threats within a network or system.
11 Clues: A covert technique used to gain unauthorized access to a computer system. • a centralized team responsible for monitoring and responding to security incidents. • A technique used to gather intelligence by infiltrating target networks or systems. • The process of identifying and mapping potential vulnerabilities in a system or network. • ...
Activity 1 2021-07-20
Across
- Common resold network equipment
- Everyone's Favorite color
- Provides O365 support, software and licenses
- Help for making your business work smarter
- Physical Items sold
- Professional Assistance provided
Down
- Providing Level 1 technical support
- Setting up hardware to customer standards
- Providing support and guidance on cyber threats
- Application needed to run on hardware
- Company selling OEM products
- What you need to use software
- Who you call for help
13 Clues: Physical Items sold • Who you call for help • Everyone's Favorite color • Company selling OEM products • What you need to use software • Common resold network equipment • Professional Assistance provided • Providing Level 1 technical support • Application needed to run on hardware • Setting up hardware to customer standards • Help for making your business work smarter • ...
Cyber-Mobbing 2023-11-14
Across
- § 111 StGB befasst sich mit übler ______________________ .
- Was kann einer der Auslöser für Cyber-Mobbing sein?
- Heimlich gemachte Nacktfotos laufen lt. §120a StGB unter ________________ Bildaufnahmen.
- Anbahnung von Sexualkontakten zu Unmündigen.
- Dabei werden gewalttätige oder „lustige“ Angriffe auf Personen mit dem Handy gefilmt und anschließend in den sozialen Medien verbreitet.
- Cyber-Mobbing kann Tag und Nacht fortgeführt werden und kennt somit keine räumlichen…?
- Die Person hinter dem Profil nicht die, die sie vorgibt zu sein. Es werden unwahre Angaben gemacht und geklaute Bilder als die eigenen ausgegeben.
- Erpressung mit Nacktfotos
- Missbräuchliche Verwendung persönlicher Daten.
Down
- funktioniert vor allem dort gut, wo es ein großes _______________ gibt, das entweder mitmacht oder aus anderen Gründen nichts unternimmt.
- Oft enden die Konflikte nicht mit dem Unterricht, sondern werden häufig _______________ fortgesetzt.
- Was fehlt Kindern und Jugendlichen oft um selbst aus problematischen Situationen herauszukommen?
- Wo findet Cyber-Mobbing vor allem statt?
- Name um die eine wahre Identität zu verbergen
- Wie bezeichnet man das absichtliche und über einen längeren Zeitraum anhaltende Beleidigen, Bedrohen, Bloßstellen, Belästigen oder Ausgrenzen anderer über digitale Medien?
- Die Datenverwendung in Gewinn- oder Schädigungsabsicht wird in welchem Gesetz geregelt?
- Während sich Cyber-Mobbing in der Regel in größeren Gruppen abspielt, findet Cyber-___________________ meist zwischen 2 Personen statt.
- Das Strafmaß für Cyber-Mobbing kann bis zu _________ Jahre Haft reichen.
- Wenn es um massive Beleidigungen wegen der Zugehörigkeit zu einer Gruppe geht spricht man von ____________________ .
19 Clues: Erpressung mit Nacktfotos • Wo findet Cyber-Mobbing vor allem statt? • Anbahnung von Sexualkontakten zu Unmündigen. • Name um die eine wahre Identität zu verbergen • Missbräuchliche Verwendung persönlicher Daten. • Was kann einer der Auslöser für Cyber-Mobbing sein? • § 111 StGB befasst sich mit übler ______________________ . • ...
SynopTech No. 4 - Cyber Risk in Central Banking 2022-10-26
Across
- Phishing attacks involve the mass distribution of _____ e-mail messages
- BSFIs should oversee _____ phishing simulations or exercises
- Beyond investments, central banks focus on developing concrete policy _____
- Phishing is an example of _____ engineering
- Cyber security _____ is increasingly integrated into enterprise risk management frameworks
Down
- Phishing is an attempt to obtain sensitive _____
- _____ is one of the most common method of cyber attack
- Data breaches compromise confidentiality, with financial and reputational _____
8 Clues: Phishing is an example of _____ engineering • Phishing is an attempt to obtain sensitive _____ • _____ is one of the most common method of cyber attack • BSFIs should oversee _____ phishing simulations or exercises • Phishing attacks involve the mass distribution of _____ e-mail messages • ...
Digital onboarding 2025-03-14
Across
- Fitur untuk menentukan durasi iklan yang diinginkan disebut...
- Integrity memiliki arti....
- Kegiatan jual beli yang dijalankan oleh dua belah pihak atau lebih dengan alat pembayaran yang sah disebut...
- Membangun kesadaran konsumen adalah cara kerja yang disebut...
- Iklan bertarget adalah bentuk periklanan...
- Sofware untuk me-manage lebih dari satu media sosial bisnis disebut...
- Konsep cyber security yang berperan memberi batasan akses data adalah...
- Application security dapat di proteksi oleh....
- Digital berasal dari bahasa Yunani yaitu...
Down
- Platform online yang memungkinkan pengguna untuk berinteraksi satu sama lain disebut...
- Ketersediaan adalah arti dari...
- Proses meningkatkan kinerja dan efektivitas yang dilakukan di berbagai platform media sosial disebut...
- Apa singkatan dari information security...
- Menjelaskan produk atau jasa yang dijual secara langsung dan menjawab pertanyaan audiens disebut...
- Tweets akan ditampilkan secara langsung di timeline pengguna atau yang telah ditargetkan merupakan cara beriklan di Twitter yang disebut...
- Dimana sejarah kemunculan dari digital onboarding berasal...
- Jenis transaksi yang memakai media internet dikenal dengan istilah...
- Perangkat lunak yang memungkinkan pengguna untuk menjadwalkan, menerbitkan,dan menganalisis konten media sosial di berbagai platform disebut...
- Iklan premium yang membutuhkan lebih banyak biaya,namun memperluas daerah iklan dalam Facebook disebut...
- Pemasaran melalui media sosial dapat menjangkau lebih banyak...
20 Clues: Integrity memiliki arti.... • Ketersediaan adalah arti dari... • Apa singkatan dari information security... • Iklan bertarget adalah bentuk periklanan... • Digital berasal dari bahasa Yunani yaitu... • Application security dapat di proteksi oleh.... • Dimana sejarah kemunculan dari digital onboarding berasal... • ...
Browsing safely 2025-06-19
Across
- hoaxing or misleading
- harming or harassing using information technology
- illegal entry in computer
- illegal method to get money
- security to prevent cybercrime
- disturbs normal functioning of computer
- act of stealing and misusing someone's personal information
- building a face friendship
- any information about a person can be found
- conduct a terrosism by computer
Down
- protects from virus
- any criminal activity intended to harm anyone using computer
- complaining against cybercrime
- that helps in preventing unauthorised access to your computer
- protects from cyber crime
15 Clues: protects from virus • hoaxing or misleading • illegal entry in computer • protects from cyber crime • building a face friendship • illegal method to get money • complaining against cybercrime • security to prevent cybercrime • conduct a terrosism by computer • disturbs normal functioning of computer • any information about a person can be found • ...
Browsing safely 2025-06-19
Across
- hoaxing or misleading
- harming or harassing using information technology
- illegal entry in computer
- illegal method to get money
- security to prevent cybercrime
- disturbs normal functioning of computer
- act of stealing and misusing someone's personal information
- building a face friendship
- any information about a person can be found
- conduct a terrosism by computer
Down
- protects from virus
- any criminal activity intended to harm anyone using computer
- complaining against cybercrime
- that helps in preventing unauthorised access to your computer
- protects from cyber crime
15 Clues: protects from virus • hoaxing or misleading • illegal entry in computer • protects from cyber crime • building a face friendship • illegal method to get money • complaining against cybercrime • security to prevent cybercrime • conduct a terrosism by computer • disturbs normal functioning of computer • any information about a person can be found • ...
Future Prospects of Artificial Intelligence 2023-08-29
Cybersecurity 2024-11-26
Across
- A network security device that monitors and filters incoming and outgoing traffic.
- A method used to take advantage of vulnerabilities.
- Endpoint Detection and Response, tools for endpoint threat detection and response.
- Security Operations Center, a centralized team for monitoring and responding to security incidents.
- A one-way function to generate a fixed-size representation of data.
- Data Loss Prevention, tools to prevent data exfiltration.
- The likelihood of a threat exploiting a vulnerability with impact.
- Command and Control infrastructure used by attackers to communicate with compromised systems.
- A potential cause of an incident that could harm a system or organization.
- Open Source Intelligence, information gathered from publicly available sources.
- Mean Time to Detect, the average time to identify a security incident.
- A security event compromising the confidentiality, integrity, or availability of information.
- A record of events or actions on a system or network.
- Isolating suspicious files or programs to observe their behavior.
Down
- Mean Time to Respond, the average time to respond to and remediate an incident.
- Malicious software such as viruses, worms, or ransomware.
- Isolating suspicious files or processes to prevent harm to systems.
- Management The process of updating software and systems to address vulnerabilities.
- A vulnerability unknown to the vendor, exploited before a fix is available.
- Virtual Private Network, encrypting data over untrusted networks.
- The part of malware that performs the malicious action.
- Cloud Access Security Broker, tools that enforce security policies for cloud services.
- Tactics, Techniques, and Procedures used by threat actors.
- Remote Monitoring and Management, tools for remote administration of client systems.
- Advanced Persistent Threat, a sophisticated and long-term cyber attack.
- A social engineering attack to steal sensitive information via deceptive emails or websites.
- Indicator of Compromise, data points that signal malicious activity.
- Demilitarized Zone, a subnet adding security for external-facing services.
- A protocol for collecting and organizing log messages across a network.
- Security Information and Event Management, a tool for log aggregation and analysis.
30 Clues: A method used to take advantage of vulnerabilities. • A record of events or actions on a system or network. • The part of malware that performs the malicious action. • Malicious software such as viruses, worms, or ransomware. • Data Loss Prevention, tools to prevent data exfiltration. • Tactics, Techniques, and Procedures used by threat actors. • ...
CLD 2024-08-31
Across
- Software designed to hide malicious activities
- Impersonation of a device or user
- Code that takes advantage of a vulnerability
- Decoy system to lure attackers
- Isolated environment for running suspicious programs
- Security system that controls network traffic
- Method of guessing passwords using all possible combinations
- Extra layer of security using two forms of authentication
- Attack that overwhelms a system with traffic
- Malicious code that replicates itself
- Tool that records keystrokes
- Software update to fix vulnerabilities
- Malicious software designed to harm
- Malware that locks files for a ransom
Down
- Process of converting data into a secure format
- Targeted phishing attack
- Hidden entry point into a system
- Testing security by simulating an attack
- Type of malware disguised as legitimate software
- Software that detects and removes malware
- Group of interconnected devices
- Relating to computers and networks
- Network of infected devices under remote control
- Process of converting data into a fixed-size string
- Vulnerability unknown to the software maker
- Algorithm for performing encryption or decryption
- Network security system
- Self-replicating malware that spreads without human intervention
- Software that secretly gathers user information
- Fraudulent attempt to obtain sensitive information
30 Clues: Network security system • Targeted phishing attack • Tool that records keystrokes • Decoy system to lure attackers • Group of interconnected devices • Hidden entry point into a system • Impersonation of a device or user • Relating to computers and networks • Malicious software designed to harm • Malicious code that replicates itself • Malware that locks files for a ransom • ...
digital citizenship 2018-01-30
Across
- the electronic responsibility for actions.
- full electronic participation in society.
- for something to happen.
- the knowledge of maximizing the user's personal safety against security
- check or prove the accuracy of something
Down
- info used in information security and privacy laws.
- a trail of data you create while using the internet
- the use of electronics to bully someone
- website or app that enable users to create and share content.
- a verbal, written, or recorded communication.
- correct way of communicating on the internet
- a particular place or position.
12 Clues: for something to happen. • a particular place or position. • the use of electronics to bully someone • check or prove the accuracy of something • full electronic participation in society. • the electronic responsibility for actions. • correct way of communicating on the internet • a verbal, written, or recorded communication. • ...
FIT_Vocab.JT 2013-05-15
Across
- picture for a business
- internet service provider
- headphone port
- TB
- online presentation maker
- Wireless Fidelity
- flash drive, disc
- who is asking, what they asking, why are they asking
- Google Bing Yahoo
- flash drive plug in
- online protection
- GB
- smallest storage amount
- 3g 4g
- MG
Down
- light emitting diode
- speakers, printer
- cd drive
- computer screen
- Safari, iTunes, iMovie, App Store
- central circuit board
- main engine of computer
- central processing unit
- National Cyber Security Alliance
- online manners
- Random Access Memory
- KB
- eight bits
- liquid crystal display
29 Clues: TB • KB • GB • MG • 3g 4g • cd drive • eight bits • headphone port • online manners • computer screen • speakers, printer • Wireless Fidelity • flash drive, disc • Google Bing Yahoo • online protection • flash drive plug in • light emitting diode • Random Access Memory • central circuit board • picture for a business • liquid crystal display • main engine of computer • central processing unit • ...
Algebra Period 7 Holliday 2022-08-18
Across
- likes to help
- is interested in photography
- listens to many kinds of music
- wants to be a veterinarian
- likes scary movies
- wants to be a hardware engineer
- is interested in cosmotology
- is interested in being a barber
- is interested in driving trucks
Down
- wants to be a nurse
- likes to read horror books
- is interested in welding
- is interested in cyber security
- would like to learn architecture
- likes boxing
- wants to be in business
- is interested in acting and therapy
- likes to dance and sew
- is interested in being a lawyer
- is interested in being a mechanic
20 Clues: likes boxing • likes to help • likes scary movies • wants to be a nurse • likes to dance and sew • wants to be in business • is interested in welding • likes to read horror books • wants to be a veterinarian • is interested in photography • is interested in cosmotology • listens to many kinds of music • is interested in cyber security • wants to be a hardware engineer • ...
Cybersecurity Terms Crossword Puzzle 2024-02-28
Across
- Secure connection for private browsing
- Hostage-taking malware for files
- Vulnerability before the fix
- Identity verification for access
- Computer virus and harmful software
- Guard against harmful computer viruses
- Protecting digital systems and data
- Monitor for malicious activities
- Deceptive emails for sensitive data
Down
- Deliberate act to disrupt systems
- Malicious software's harmful action
- Secretly records keystrokes for theft
- System's exploitable weak point
- Network traffic gatekeeper and monitor
- Secret entry to bypass security
- Impersonation for unauthorized access
- Secure data with secret code
- Authorized entities' access list
- Flood of traffic to disrupt
- Software update to fix vulnerabilities
20 Clues: Flood of traffic to disrupt • Vulnerability before the fix • Secure data with secret code • System's exploitable weak point • Secret entry to bypass security • Hostage-taking malware for files • Identity verification for access • Authorized entities' access list • Monitor for malicious activities • Deliberate act to disrupt systems • Malicious software's harmful action • ...
Cybersecurity Terms 2024-08-07
Across
- an identity and access management security method that requires two forms of identification to access resources and data
- an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- software and operating system (OS) updates that address security vulnerabilities within a program or product
- the act of disguising a communication from an unknown source as being from a known, trusted source
- the process of converting information or data into a code, especially to prevent unauthorized access
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
- a typically covert method of bypassing normal authentication or encryption in a computer
- any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
- an ethical hacker whose job involves hacking into computer systems to detect security risks
- a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
- the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
- a program designed to breach the security of a computer system while ostensibly performing some innocuous function
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- a form of malware or hardware that keeps track of and records your keystrokes as you type
- a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
- an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
- a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
25 Clues: a typically covert method of bypassing normal authentication or encryption in a computer • a form of malware or hardware that keeps track of and records your keystrokes as you type • an ethical hacker whose job involves hacking into computer systems to detect security risks • ...
RU ITEC411-Chapter 5 Crime and Security 2025-10-22
Across
- Published false statement that damages someone's reputation
- Self replicating malicious software that spreads through networks automatically
- Highly sophisticated computer worm that targeted Iranian facilities
- Identity theft technique using text messages to obtain financial information
- Security system that monitors and filters network traffic from suspicious sources
- Security incident where unauthorized parties access protected systems or data
- International organization whose members agree on cross-border trade and service rules
- Unauthorized access to computer systems without permission
- Legal term describing unauthorized computer system entry
- Using computer techniques to promote political causes
- Converting data into coded format to protect stolen information from being useful
Down
- Authentication method using unique biological characteristics like fingerprints
- Scientific process of retrieving digital evidence from computers and storage devices
- Fraudulent emails disguised as legitimate communications to steal personal information
- Exposing security flaws or wrongdoing within an organization
- Verifying the identity of users or the legitimacy
- Decoy website set up to attract and study hacker behavior
- Cyber attack using false websites planted in domain name servers to collect data
- Federal law passed in 1984 making unauthorized computer access illegal
- Voice based fraud method where criminals call victims pretending to be legitimate businesses
20 Clues: Verifying the identity of users or the legitimacy • Using computer techniques to promote political causes • Legal term describing unauthorized computer system entry • Decoy website set up to attract and study hacker behavior • Unauthorized access to computer systems without permission • Published false statement that damages someone's reputation • ...
Cybersecurity Acronyms and Terms 2024-11-27
Across
- A protocol for collecting and organizing log messages across a network.
- The process of updating software and systems to address vulnerabilities.
- Indicator of Compromise, data points that signal malicious activity.
- The part of malware that performs the malicious action.
- A record of events or actions on a system or network.
- Remote Monitoring and Management, tools for remote administration of client systems.
- The likelihood of a threat exploiting a vulnerability with impact.
- Malicious software such as viruses, worms, or ransomware.
- A one-way function to generate a fixed-size representation of data.
- Isolating suspicious files or processes to prevent harm to systems.
- Mean Time to Detect, the average time to identify a security incident.
- Mean Time to Respond, the average time to respond to and remediate an incident.
- A vulnerability unknown to the vendor, exploited before a fix is available.
- A security event compromising the confidentiality, integrity, or availability of information.
Down
- Isolating suspicious files or programs to observe their behavior.
- Command and Control infrastructure used by attackers to communicate with compromised systems.
- Security Operations Center, a centralized team for monitoring and responding to security incidents.
- A network security device that monitors and filters incoming and outgoing traffic.
- A social engineering attack to steal sensitive information via deceptive emails or websites.
- Data Loss Prevention, tools to prevent data exfiltration.
- A potential cause of an incident that could harm a system or organization.
- Endpoint Detection and Response, tools for endpoint threat detection and response.
- Virtual Private Network, encrypting data over untrusted networks.
- Security Information and Event Management, a tool for log aggregation and analysis.
- Advanced Persistent Threat, a sophisticated and long-term cyber attack.
- Tactics, Techniques, and Procedures used by threat actors.
- Demilitarized Zone, a subnet adding security for external-facing services.
- A method used to take advantage of vulnerabilities.
- Open Source Intelligence, information gathered from publicly available sources.
- Cloud Access Security Broker, tools that enforce security policies for cloud services.
30 Clues: A method used to take advantage of vulnerabilities. • A record of events or actions on a system or network. • The part of malware that performs the malicious action. • Data Loss Prevention, tools to prevent data exfiltration. • Malicious software such as viruses, worms, or ransomware. • Tactics, Techniques, and Procedures used by threat actors. • ...
Future of Artificial Intelligence 2023-07-31
Across
- Artificial Intelligence in Education
- Artificial Intelligence in Smart Cities
- Artificial Intelligence in Pharmacy
- Artificial Intelligence in Healthcare
Down
- Artificial Intelligence in Smart Home
- Artificial Intelligence in Banking
- Artificial Intelligence in Smart Highways
- Artificial Intelligence in Transport
- Artificial Intelligence in Traffic Management
- Artificial Intelligence in Cyber security
10 Clues: Artificial Intelligence in Banking • Artificial Intelligence in Pharmacy • Artificial Intelligence in Education • Artificial Intelligence in Transport • Artificial Intelligence in Smart Home • Artificial Intelligence in Healthcare • Artificial Intelligence in Smart Cities • Artificial Intelligence in Smart Highways • Artificial Intelligence in Cyber security • ...
SAMSAT Crossword 2025-09-24
Across
- Look up!
- Student voice, student _____!
- The Wright brothers flew the first one.
- _____ Security protects our computers.
- 3D___ is a type of additive manufacturing.
Down
- Nikola ____ invented the ____ Coils.
- ____ Johnson was a mathematician for U.S.A's first space trip.
- ____ can do STEM!
- STEM is found ____!
- Machines that can do actions.
10 Clues: Look up! • ____ can do STEM! • STEM is found ____! • Student voice, student _____! • Machines that can do actions. • Nikola ____ invented the ____ Coils. • _____ Security protects our computers. • The Wright brothers flew the first one. • 3D___ is a type of additive manufacturing. • ____ Johnson was a mathematician for U.S.A's first space trip.
Les Technologies du Futur 2024-09-29
20 Clues: IT • save • clone • erase • theory • laptop • online • tablet • download • genetics • research • discovery • experience • cyberspace • technology • innovative • smartphone • revolutionary • cyberdissidence • cyber-harassment
Cybersecurity Awareness 2023-09-06
Across
- Method of secure communication (12 letters).
- Malware that demands payment to restore access (10 letters).
- Software that collects information without consent (7 letters).
- A group of interconnected devices (7 letters).
- A potential danger or risk (6 letters).
- Software that can infect your computer. (5 letters).
- Information stored on a computer (4 letters).
- Unauthorized access to a computer system (7 letters).
Down
- Process of converting data into a code (11 letters).
- A fraudulent scheme to deceive people (4 letters).
- The practice of using two different authentication methods (10 letters).
- A person who creates software.
- Weakness in a system that can be exploited (13 letters).
- Measures taken to protect against cyber threats (8 letters).
- A person interacting with a computer system (4 letters).
- A network security software. (8 letters).
- A common email-based attack (8 letters).
- Software to protect against malware (9 letters).
18 Clues: A person who creates software. • A potential danger or risk (6 letters). • A common email-based attack (8 letters). • A network security software. (8 letters). • Method of secure communication (12 letters). • Information stored on a computer (4 letters). • A group of interconnected devices (7 letters). • Software to protect against malware (9 letters). • ...
Cyber Security 2021-11-05
7 Clues: Malware • Tricks you • it protects from viruses • It protects your computer • Looking at someone's password • Something you and your computer can get • Something that protects you and you made
Cyber Security 2021-02-12
Across
- A malicious form of self replicating
- Gathers information about how you use your computer
- A set of secret characters, that only you know, to keep your private information secure.
- Someone that tries to gain access to your personal information or devices.
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Short for malicious software, that gains access to your computer or device
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • Someone that tries to gain access to your personal information or devices. • ...
Cyber Security 2020-09-08
Across
- programa achvos que son malos para las coputadoras.
- mata a todos lo virus el la coputadora.
- es un sistema de la computadora que tiene fuego y serve para evitar todos los achivos que no esten autorizados.
- es el crreo electrico no slicitado que recibe una persona.
Down
- galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador.
- cuando estafan en mercados libre.
- son herues para las personas trabajan activamente segido en contacto de los intereses de las personas atacada.
7 Clues: cuando estafan en mercados libre. • mata a todos lo virus el la coputadora. • programa achvos que son malos para las coputadoras. • es el crreo electrico no slicitado que recibe una persona. • galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador. • ...
Cyber Security 2024-09-25
Cyber Security 2025-02-22
Across
- Malicious software to damage systems.
- The global system that connects computers worldwide
- A measure used to ensure the privacy and security of information.
- Cyber attack gaining unauthorized access.
- method of converting data to prevent access.
Down
- Technique for verifying user identity.
- unauthorized copying or use of software or data
7 Clues: Malicious software to damage systems. • Technique for verifying user identity. • Cyber attack gaining unauthorized access. • method of converting data to prevent access. • unauthorized copying or use of software or data • The global system that connects computers worldwide • A measure used to ensure the privacy and security of information.
Cyber Security 2024-10-22
Across
- malicious software designed to replicate and spread across computers
- individual who witnesses an online incident without intervening
- aggressive behavior that involves intimidating or mistreating others
Down
- persistent unwanted behavior that causes distress or intimidation
- fraudulent attempt to obtain sensitive information via deceptive emails
- harassment or intimidation carried out via digital platforms
- condition of being protected from harm or danger
7 Clues: condition of being protected from harm or danger • harassment or intimidation carried out via digital platforms • individual who witnesses an online incident without intervening • persistent unwanted behavior that causes distress or intimidation • malicious software designed to replicate and spread across computers • ...
Cyber Security 2026-02-09
7 Clues: harmful software • keeps bad actors out • unwanted email messages • a harmful computer program • data that tracks what you do online • secret word to protect your account • keeps your device safe when you leave
Public Sector Cybersecurity Acronym Crossword 2024-06-07
Across
- The World’s Identity Company
- Third-party company that manages an organization's IT infrastructure and end-user systems
- U.S. DoD combat support agency
- A "smart" card that is the standard identification for government employees used to enable physical access to buildings and access to DoD computers
- System to manage identity authorization for external parties
- An authentication method that allows users to securely authenticate with multiple applications by using one set of credentials
Down
- Amazon Web Services
- Multi-step account login process
- Team of IT security professionals that protect the organization by monitoring and investigating cyber threats.
- Program provides federal agencies with a suite of capabilities that enable network security officials to continuously monitor cybersecurity risks in real-time
- The national coordinator for critical infrastructure security and resilience
- Security and business discipline to help the right people access the right assets at the right time while keeping unauthorized access and fraud at bay
12 Clues: Amazon Web Services • The World’s Identity Company • U.S. DoD combat support agency • Multi-step account login process • System to manage identity authorization for external parties • The national coordinator for critical infrastructure security and resilience • Third-party company that manages an organization's IT infrastructure and end-user systems • ...
3.6 Fundamentals of Networks Part 2 2021-11-22
Across
- When organisations employ specialists to simulate potential attacks on their system. It is used to identify possible weaknesses in their cyber security.
- Uses parts of a person to identify them and allow them access.
- When hackers send emails or texts to people claiming to be from a well-known business.
- Can see what a user is doing and sends that info back to the hacker.
- When someone pretends to be someone else to persuade the victim to share information.
- Sends an email to verify a users identity.
- What term is used for protecting networks, data, programs and computers against damage cyber attacks and unauthorised access.
- Simulates an external cyber attack. The person carrying out the attack will not be given any credentials, but they will have to carry out the attack in any way they can.
- A method of hacking where a user is directed to a fake version of a website.
Down
- The term used when data is transferred into a code that cannot be hacked.
- Watching over someones shoulder.
- Engineering Using people to gain private information or access to networks.
- Simulates a malicious insider who has knowledge of the system.
- USB drive or SD card
- Common way of preventing hackers accessing information.
- Simulates a person who has access to the target.
16 Clues: USB drive or SD card • Watching over someones shoulder. • Sends an email to verify a users identity. • Simulates a person who has access to the target. • Common way of preventing hackers accessing information. • Uses parts of a person to identify them and allow them access. • Simulates a malicious insider who has knowledge of the system. • ...
cybersecurity 2023-05-25
Across
- A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
- The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
- Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
- A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
- A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
- A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
- The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
- A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.
9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network. • Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content. • ...
HarcZagadki 2020-04-05
20 Clues: RUDY • WATRA • KIHAM • CYBER • PRAWO • ŚLEDŹ • NOWIK • HUFIEC • PŁASKI • CZOŁEM • POLARNA • BROWNSEA • BISZKOPT • JAMBOREE • PODKŁADKA • KANADYJKA • NACZELNIK • TROPICIELKA • NIEDŹWIEDZIE • PODHARCMISTRZ
The Eye Of Minds 2015-03-03
8 Clues: Main Character • Michael's nanny • Author of the book • The virtnet cyber terrorist • Michael's smart lady friend • Security that watches over virtnet • Michael's naïve adventurous friend • Setting where all the action happens
cyber security 2021-11-05
Across
- is a network that monitors incoming and outcoming network
- a type of malware that spreads across computers
- to look over at someone's personal information
Down
- a software that is downloaded onto someone's device without their knowledge
- a number of characters used to verify someone's account
- to persuade someone in a clever way or dishonest to allow you to do or get something
- is to create a fake email to scam someone
7 Clues: is to create a fake email to scam someone • to look over at someone's personal information • a type of malware that spreads across computers • a number of characters used to verify someone's account • is a network that monitors incoming and outcoming network • a software that is downloaded onto someone's device without their knowledge • ...
Cyber Security 2017-05-12
Across
- software that is designed to protect a computer system/network.
- A cyber attack that where you send so much traffic that it slows the system or eventually crash it.
- decoy servers or computer systems that are set up to gather information on intruders or attackers of computer system/network.
- protects data from unauthorized modification.
Down
- a method that is used to test the security of the software
- this is a security method for separating running programs on a computer system or network. it is often used to run untested code or programs from unknown sources such as suppliers, untrusted users, and websites.
- malicious software which is capable of copying itself and corrupting computer systems and networks or destroying data.
7 Clues: protects data from unauthorized modification. • a method that is used to test the security of the software • software that is designed to protect a computer system/network. • A cyber attack that where you send so much traffic that it slows the system or eventually crash it. • ...
Cyber Security 2022-07-07
Across
- The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- A cyber attack intended to redirect a website's traffic to another, fake site.
- A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- Observing a person's private information over their shoulder eg cashpoint machine PINs.
- A computer program or system intended to distinguish human from machine input
- A form of identification and authentication which relies on comparing scans of e.g. your face
7 Clues: A computer program or system intended to distinguish human from machine input • A cyber attack intended to redirect a website's traffic to another, fake site. • Observing a person's private information over their shoulder eg cashpoint machine PINs. • A form of identification and authentication which relies on comparing scans of e.g. your face • ...
Cyber Security 2022-11-28
Across
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
- is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system
- he fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- file, program, or piece of code that appears to be legitimate and safe, but is actually malware. Trojans are packaged and delivered inside legitimate software (hence their name), and they're often designed to spy on victims or steal data.
- is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
- involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
7 Clues: software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam. • ...
Cyber Security 2021-02-12
Across
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your personal information or devices.
- Short for malicious software, that gains access to your computer or device
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Gathers information about how you use your computer
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Someone that tries to gain access to your personal information or devices. • Short for malicious software, that gains access to your computer or device • ...
CYBER SECURITY 2020-10-09
Across
- viruses: a piece of code which is capable of copying itself and typically has as detrimental effect, such as corrupting the system and destroying data
- Distributed denial of service: an attempt to make a computer or network system unavailable to its users.
- malicous software
Down
- a type of cyber attack that redirects a user from a genuine website to a fake one.
- hat hacker: gains access to a computer system with malicious intent
- hat hacker: a hacker that hacks for fun or in order to troll someone
- hat hacker: a hacker that is given permission to hack a system
7 Clues: malicous software • hat hacker: a hacker that is given permission to hack a system • hat hacker: gains access to a computer system with malicious intent • hat hacker: a hacker that hacks for fun or in order to troll someone • a type of cyber attack that redirects a user from a genuine website to a fake one. • ...
Cyber Security 2020-09-08
Across
- programa achvos que son malos para las coputadoras.
- mata a todos lo virus el la coputadora.
- es un sistema de la computadora que tiene fuego y serve para evitar todos los achivos que no esten autorizados.
- es el crreo electrico no slicitado que recibe una persona.
Down
- galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador.
- cuando estafan en mercados libre.
- son herues para las personas trabajan activamente segido en contacto de los intereses de las personas atacada.
7 Clues: cuando estafan en mercados libre. • mata a todos lo virus el la coputadora. • programa achvos que son malos para las coputadoras. • es el crreo electrico no slicitado que recibe una persona. • galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador. • ...
cyber security 2021-11-05
Across
- a number of characters used to verify someone's account
- a software that is downloaded onto someone's device without their knowledge
- is a network that monitors incoming and outcoming network
- to persuade someone in a clever way or dishonest to allow you to do or get something
Down
- a type of malware that spreads across computers
- to look over at someone's personal information
- is to create a fake email to scam someone
7 Clues: is to create a fake email to scam someone • to look over at someone's personal information • a type of malware that spreads across computers • a number of characters used to verify someone's account • is a network that monitors incoming and outcoming network • a software that is downloaded onto someone's device without their knowledge • ...
cyber security 2021-11-05
Across
- is a network that monitors incoming and outcoming network
- to persuade someone in a clever way or dishonest to allow you to do or get something
- a software that is downloaded onto someone's device without their knowledge
- a type of malware that spreads across computers
- is to create a fake email to scam someone
Down
- to look over at someone's personal information
- a number of characters used to verify someone's account
7 Clues: is to create a fake email to scam someone • to look over at someone's personal information • a type of malware that spreads across computers • a number of characters used to verify someone's account • is a network that monitors incoming and outcoming network • a software that is downloaded onto someone's device without their knowledge • ...
cyber security 2021-11-05
Across
- a number of characters used to verify someone's account
- a software that is downloaded onto someone's device without their knowledge
- is a network that monitors incoming and outcoming network
- to persuade someone in a clever way or dishonest to allow you to do or get something
Down
- a type of malware that spreads across computers
- to look over at someone's personal information
- is to create a fake email to scam someone
7 Clues: is to create a fake email to scam someone • to look over at someone's personal information • a type of malware that spreads across computers • a number of characters used to verify someone's account • is a network that monitors incoming and outcoming network • a software that is downloaded onto someone's device without their knowledge • ...
Cyber Security 2026-01-15
Across
- When somebody watches your device from behind to gain information
- the act of manipulating humans so that they give up their private information or money
Down
- Tempting somebody with an offer which hides the true intentions
- An attacker will offer something, like a favour, in exchange for access.
- The creation of a fake website which impersonates a trusted one
- An attacker that disguises themself as a trusted person or organisation to gain private information
- A pre-made scenario to make the victim give up private information
7 Clues: Tempting somebody with an offer which hides the true intentions • The creation of a fake website which impersonates a trusted one • When somebody watches your device from behind to gain information • A pre-made scenario to make the victim give up private information • An attacker will offer something, like a favour, in exchange for access. • ...
Wordplay 2025-05-24
Across
- works similar to a hub
- transforming data into unreadable code
- Network Card most commonly used network card
- unwanted bulk emails
- violation of IPR
- group of computers and peripheral devices
- can be physically connected with wires
- security system
Down
- combination of net and etiquette
- Topology has a backbone for the network
- crime criminal activities on digital devices
- combination of letters,symbols and numbers
- hacking hacking done for a good cause
- layout of various components
- each computer in a network
- connect computers at a distant place
16 Clues: security system • violation of IPR • unwanted bulk emails • works similar to a hub • each computer in a network • layout of various components • combination of net and etiquette • connect computers at a distant place • hacking hacking done for a good cause • transforming data into unreadable code • can be physically connected with wires • Topology has a backbone for the network • ...
Data Privacy 2018-01-30
Across
- facts and statistics for reference or analysis.
- protected
- secret word or phrase that must be used to gain admission to something
- state of being free from danger or threat
- software updates for pirates?
- relating to a nation
- controlled by or connected to another computer or to a network
- a union
- relating to computers
Down
- software that is intended to damage
- software to obtain covert information
- action of protecting something
- sending a fraudulent email to induce personal information disclosure
- Takes advantage of vulnerabilities
- freedom from unauthorized intrusion
- chip manufacturer
16 Clues: a union • protected • chip manufacturer • relating to a nation • relating to computers • software updates for pirates? • action of protecting something • Takes advantage of vulnerabilities • software that is intended to damage • freedom from unauthorized intrusion • software to obtain covert information • state of being free from danger or threat • ...
Wordplay 2025-05-24
Across
- works similar to a hub
- transforming data into unreadable code
- Network Card most commonly used network card
- unwanted bulk emails
- violation of IPR
- group of computers and peripheral devices
- can be physically connected with wires
- security system
Down
- combination of net and etiquette
- Topology has a backbone for the network
- crime criminal activities on digital devices
- combination of letters,symbols and numbers
- hacking hacking done for a good cause
- layout of various components
- each computer in a network
- connect computers at a distant place
16 Clues: security system • violation of IPR • unwanted bulk emails • works similar to a hub • each computer in a network • layout of various components • combination of net and etiquette • connect computers at a distant place • hacking hacking done for a good cause • transforming data into unreadable code • can be physically connected with wires • Topology has a backbone for the network • ...
networking concept and cyber ethics 2025-05-29
Across
- Connects computers together
- A network without wires
- Wireless technology standard
- Unique addresses for each device
- Shortcut for copy
- Keeping computer data safe
- Software to harm or damage a computer
- Connects LAN to Internet
- Device that connects the network
Down
- Rules for communication in a network
- Criminal activities using computers
- information Do not share this online
- Very large network of networks
- Device that joins multiple computers
- Protects computers from hackers
- Act of accessing a system without permission
- Strong way to protect accounts
- ethics Use of computers ethically and legally
- bullying Sending rude messages online
- Type of network that covers a small area
20 Clues: Shortcut for copy • A network without wires • Connects LAN to Internet • Keeping computer data safe • Connects computers together • Wireless technology standard • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Unique addresses for each device • Device that connects the network • Criminal activities using computers • ...
Cyber-Mobbing 2015-01-20
Across
- Wie heißen Mobber?
- Nenne eine Form von Cyber-Mobbing
- Wie wird das Zivilrecht noch genannt?
- Cyber-Mobbing kann auf vielen verschiedenen ... durchgeführt werden.
- Wie handeln Täter,wenn sie von niemanden erkannt werden wollen?
- Man sollte aufpassen,was man von sich preis gibt,denn das Internet ... nichts
- Ursachen von Mobbing
Down
- Was ist die schlimmste folge von Cyber-Mobbing?
- Man sollte den Mobber...
- Welchen anderen Namen hat Cyber-Mobbing?
- Cyber-Mobbing betrifft,das Zivilrecht oder das ...
- An wen kann ein Opfer sich wenden?
- Wie oft findet Cyber-Mobbing statt?
- Hinter welchen Namen können sich Mobber "verstecken"?
- Der zweite Zivilrechtliche Schritt ist förmlicher.Man verschickt eine ...
15 Clues: Wie heißen Mobber? • Ursachen von Mobbing • Man sollte den Mobber... • Nenne eine Form von Cyber-Mobbing • An wen kann ein Opfer sich wenden? • Wie oft findet Cyber-Mobbing statt? • Wie wird das Zivilrecht noch genannt? • Welchen anderen Namen hat Cyber-Mobbing? • Was ist die schlimmste folge von Cyber-Mobbing? • Cyber-Mobbing betrifft,das Zivilrecht oder das ... • ...
CIS120 2024-03-11
Across
- A software update intended to fix vulnerabilities or improve security within a computer program.
- The protection of endpoints (devices such as computers, smartphones, and tablets) from various cyber threats.
- The use of unique biological traits, such as fingerprints or facial recognition, to verify a user's identity.
- A technology service that creates a secure and encrypted internet connection.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of managing and mitigating the impact of a cybersecurity incident, including investigating and responding to security breaches.
- An attack that takes advantage of a security vulnerability on the same day it becomes publicly known.
- A security process in which a user provides multiple identification factors to verify their identity.
- A piece of software designed to update or fix problems with a computer program.
- Unauthorized interception of network traffic to capture and analyze data, often used for malicious purposes.
- A fraudulent attempt to obtain sensitive information, by disguising as a trustworthy entity.
Down
- The practice and study of techniques for securing communication and data through the use of codes and ciphers.
- Ethical hackers who use their skills to identify and fix security vulnerabilities rather than exploiting them for malicious purposes.
- A security mechanism that monitors network activities for signs of malicious behavior.
- A simulated cyberattack on a computer system or network to assess its vulnerabilities and weaknesses.
- Malicious software designed to harm or exploit computer systems.
- A network of compromised computers (bots) controlled by a single entity, often used for malicious activities such as spam or DDoS attacks.
- The use of psychological manipulation to trick individuals into divulging confidential information.
- An attempt to make a computer or network resource unavailable to its intended users by overwhelming it with a flood of illegitimate requests.
- The process of converting information into a code to prevent unauthorized access.
20 Clues: Malicious software designed to harm or exploit computer systems. • A technology service that creates a secure and encrypted internet connection. • A piece of software designed to update or fix problems with a computer program. • The process of converting information into a code to prevent unauthorized access. • ...
Yubi Crossword Challenge 2023-10-11
Across
- Yubi's policy that defines the principles and responsibilities for securely managing user authentication and access permissions.
- Yubi's structured process of classifying, labeling, and protecting data based on its sensitivity and importance.
- A software vulnerability that allows an attacker to execute arbitrary code.
- The practice of allowing only authorized users to access certain resources.
- The practice of granting the minimum access necessary for users to perform their tasks.
- The process of converting plaintext into unreadable, scrambled data for security.
- A method for simulating real-world attacks to test security defences
- A cryptographic technique used to prove knowledge of a secret without revealing the secret.
- A cryptographic technique that involves hiding data within other data.
- A software vulnerability that is unknown to the software vendor.
- Yubi's framework for quickly recovering from cyber incidents and ensuring minimal disruption to operations.
Down
- The unauthorized access and theft of confidential information.
- Type of attack where an attacker monitors and captures data in transit.
- Yubi's systematic practice of disguising or obfuscating sensitive data to protect it from unauthorized access.
- A security incident where a user receives fraudulent emails attempting to trick them.
- A malicious software that demands a ransom from the victim.
- A network security device that filters incoming and outgoing network traffic
- A type of attack where an attacker pretends to be someone else to gain unauthorized access.
- A security measure that ensures data is not altered during transmission.
- A system's ability to resist unauthorized access and protect against cyberattacks.
- A security model that assumes no trust, even within the network.
- Yubi's strategic choice to safeguard data within its own borders.
- A process of analyzing network traffic patterns for anomalies.
- A technique for identifying and managing security risks.
- A system or network designed to attract attackers to collect threat intelligence.
25 Clues: A technique for identifying and managing security risks. • A malicious software that demands a ransom from the victim. • The unauthorized access and theft of confidential information. • A process of analyzing network traffic patterns for anomalies. • A security model that assumes no trust, even within the network. • ...
Cyber Security Incident Management 2021-01-15
Across
- An alert that incorrectly indicates that malicious activity is occurring (two words)
- A weakness in a system, application, or network that is subject to exploitation or misuse
- Measuring the characteristics of expected activity so that changes to it can be more easily identified
- An attempt to trick someone into revealing information (eg, a password) that can be used to attack systems or networks (two words)
- A sign that an incident may have occurred or may be currently occurring
- Monitoring resources to determine typical utilization patterns so that significant deviations can be detected
Down
- A recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system
- A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
- The mitigation of violations of security policies and recommended practices (two words)
- Software that automates the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents
- The potential source of an adverse event
- A capability set up for the purpose of assisting in responding to computer security-related incidents
- A sign that an attacker may be preparing to cause an incident
- A virus, worm, Trojan horse, or other code-based malicious entity that successfully infects a host
- Any observable occurrence in a network or system
15 Clues: The potential source of an adverse event • Any observable occurrence in a network or system • A sign that an attacker may be preparing to cause an incident • A sign that an incident may have occurred or may be currently occurring • An alert that incorrectly indicates that malicious activity is occurring (two words) • ...
CryptoMaze 2024-12-06
Across
- Network of interconnected devices communicating over the internet, often requiring security protocols.
- Secure hardware solution for managing keys and sensitive operations in a virtual environment.
- Historical encryption technique involving letter substitution based on a fixed shift.
- Secure hardware device for managing and storing cryptographic keys safely.
- Secure hardware module designed to protect transaction processing and sensitive data.
- Password hashing algorithm that uses salt to enhance security against brute-force attacks.
- Security model allowing users to control their own encryption keys.
- Process of converting encoded data back into its original readable format.
- Replacing sensitive data with non-sensitive equivalents to enhance security.
- Model combining on-premises infrastructure with cloud resources for flexibility.
- Encryption method utilizing a pair of keys for secure data transmission.
- Study of techniques for securing communication through encoding methods.
Down
- Combining different software systems to enhance functionality and security.
- Innovator known for a key exchange method that enables secure communication.
- Protocol ensuring secure communication over networks, protecting data in transit.
- Mathematical operation used in cryptographic algorithms for key generation.
- Technique for disguising information to prevent unauthorized access.
- Request made to obtain a digital certificate for secure communications.
- Method of converting plain text into a secure format to protect information.
- Distributed ledger technology ensuring transparency and security in transactions.
- Relating to the digital realm, often associated with security threats and defenses.
- Next-generation computing approach that could revolutionize encryption methods.
- Process of digitally signing software to ensure authenticity and integrity in encryption.
- Unique value used once to prevent replay attacks in secure communications.
- - Framework that manages digital certificates and public-key encryption for secure communications.
- Function that generates a fixed-size output from variable input for data integrity.
- Unique attributes that define a user or entity in digital environments.
27 Clues: Security model allowing users to control their own encryption keys. • Technique for disguising information to prevent unauthorized access. • Request made to obtain a digital certificate for secure communications. • Unique attributes that define a user or entity in digital environments. • Encryption method utilizing a pair of keys for secure data transmission. • ...
Cyber Security 2022-11-28
Across
- network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- file, program, or piece of code that appears to be legitimate and safe, but is actually malware they are packaged and delivered inside legitimate software (hence their name), and they're often designed to spy on victims or steal data.
- is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system
Down
- is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
- involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
7 Clues: software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam. • ...
Cyber Security 2020-09-08
Across
- programa achvos que son malos para las coputadoras.
- mata a todos lo virus el la coputadora.
- es un sistema de la computadora que tiene fuego y serve para evitar todos los achivos que no esten autorizados.
- es el crreo electrico no slicitado que recibe una persona.
Down
- galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador.
- cuando estafan en mercados libre.
- son herues para las personas trabajan activamente segido en contacto de los intereses de las personas atacada.
7 Clues: cuando estafan en mercados libre. • mata a todos lo virus el la coputadora. • programa achvos que son malos para las coputadoras. • es el crreo electrico no slicitado que recibe una persona. • galletas que serven para guardar achvos pequeños que algunos de sitios web guardan en ordenador. • ...
Cyber security 2021-02-12
7 Clues: something that is not known • Something to protect your data • something that spies on what you do • something that damages your computer • doing something illegal on a computer • a person that does illegal stuff on a computer • to keep something less vulnerable is to keep it..
Cyber Security 2023-06-19
CYBER SECURITY 2023-09-14
Across
- GETTING MONEY ONLINE BY DECEIVING PEOPLE.
- USING FAKE EMAIL MESSAGES TO GET PERSONAL INFORMATION.
- UNAUTHORISED USE OF SOMEONE'S COMPUTER TO MINE CRYPTO CURRENCY.
- STEALING YOUR PERSONAL DATA
Down
- A SOFTWARE THAT INFECTS YOUR COMPUTER,CAN BE VIRUS,WORM ETC.
- ILLEGAL ACCESS TO GOVERNMENT SITES
- TRACK,LURE OR HARESS OTHER PEOPLE
7 Clues: STEALING YOUR PERSONAL DATA • TRACK,LURE OR HARESS OTHER PEOPLE • ILLEGAL ACCESS TO GOVERNMENT SITES • GETTING MONEY ONLINE BY DECEIVING PEOPLE. • USING FAKE EMAIL MESSAGES TO GET PERSONAL INFORMATION. • A SOFTWARE THAT INFECTS YOUR COMPUTER,CAN BE VIRUS,WORM ETC. • UNAUTHORISED USE OF SOMEONE'S COMPUTER TO MINE CRYPTO CURRENCY.
Cyber Security 2025-01-08
Across
- A method of tricking people into revealing sensitive information
- - The process of converting data into a secure format.
- - Malicious software that harms or exploits systems.
Down
- Software that secretly monitors and collects your personal data without consent.
- A secret word or phrase used for authentication to access systems or accounts.
- - A system designed to block unauthorized access to a network.
- A program designed to detect and remove malicious software from a computer.
7 Clues: - Malicious software that harms or exploits systems. • - The process of converting data into a secure format. • - A system designed to block unauthorized access to a network. • A method of tricking people into revealing sensitive information • A program designed to detect and remove malicious software from a computer. • ...
Team - AllSafe 2022-03-27
Across
- Data that can identify a specific individual
- What's common between Aetnaand cyber security? (Clue: Important to save money)
- Compliance standard to safeguard health information
- An off-site attack surface (Clud: Most SaaS platforms use this service)
- a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
- A social engineering attack
- Risk assessment of vendors, suppliers, partners, contractors, or service providers
- Head of information security program
- Method to reduce human error
- Electronically-stored health information
10 Clues: A social engineering attack • Method to reduce human error • Head of information security program • Electronically-stored health information • Data that can identify a specific individual • Compliance standard to safeguard health information • An off-site attack surface (Clud: Most SaaS platforms use this service) • ...
Cyber-Mobbing 2015-01-20
Across
- Cyber-Mobbing kann auf vielen verschiedenen ... durchgeführt werden.
- Der zweite Zivilrechtliche Schritt ist förmlicher.Man verschickt eine ...
- Wie wird das Zivilrecht noch genannt?
- Cyber-Mobbing betrifft,das Zivilrecht oder das ...
- Man sollte aufpassen,was man von sich preis gibt,denn das Internet ... nichts
- Wie heißen Mobber?
- Man sollte den Mobber...
- Hinter welchen Namen können sich Mobber "verstecken"?
Down
- Wie oft findet Cyber-Mobbing statt?
- Welchen anderen Namen hat Cyber-Mobbing?
- Nenne eine Form von Cyber-Mobbing
- An wen kann ein Opfer sich wenden?
- Ursachen von Mobbing
- Was ist die schlimmste folge von Cyber-Mobbing?
- Wie handeln Täter,wenn sie von niemanden erkannt werden wollen?
15 Clues: Wie heißen Mobber? • Ursachen von Mobbing • Man sollte den Mobber... • Nenne eine Form von Cyber-Mobbing • An wen kann ein Opfer sich wenden? • Wie oft findet Cyber-Mobbing statt? • Wie wird das Zivilrecht noch genannt? • Welchen anderen Namen hat Cyber-Mobbing? • Was ist die schlimmste folge von Cyber-Mobbing? • Cyber-Mobbing betrifft,das Zivilrecht oder das ... • ...
CYBER SECURITY 2020-08-20
Across
- es un software que tiene por objetivo alterar el funcionamiento normal de cualquier tipo de dispositivo
- ciberacoso psicológico entre los menores usando los canales sociales y de mensajería.
- INDIVIDUO QUE TIENE MUCHO CONOCIMIENTO DE COMPUTADORAS Y VIOLA SISTEMAS DE SEGURIDAD
- Código secreto que se introduce en una máquina para acceder a ciertas funciones informáticas o correos
Down
- obtención de datos personales a través de web ficticias con el fin de realizar hacking sobre alguna persona.
- Conjunto de acciones ofensivas contra sistemas de información
- acciones emprendidas por un adulto para ganarse la confianza de un menor y tratar de conseguir una cita
7 Clues: Conjunto de acciones ofensivas contra sistemas de información • INDIVIDUO QUE TIENE MUCHO CONOCIMIENTO DE COMPUTADORAS Y VIOLA SISTEMAS DE SEGURIDAD • ciberacoso psicológico entre los menores usando los canales sociales y de mensajería. • es un software que tiene por objetivo alterar el funcionamiento normal de cualquier tipo de dispositivo • ...
Cyber Security 2013-06-13
Across
- event that interupts or prevents the correct operation of system services.
- ensures that resources are only granted to those users who are entitled to them.
- a logical or physical discontinuity of a network to prevent unauthorized access.
Down
- allowing others to follow you into a secured area without clearence.
- when someone listens to a conversation trying to steal information.
- encrypted form of message being sent.
- a generic term for a number of different types of malicious code.
7 Clues: encrypted form of message being sent. • a generic term for a number of different types of malicious code. • when someone listens to a conversation trying to steal information. • allowing others to follow you into a secured area without clearence. • event that interupts or prevents the correct operation of system services. • ...
Cyber Security 2016-05-24
7 Clues: What is my name? • What are we here for? • virtual private network • email that has no meaning • strong authenticater for access • Steals data and holds it for ransom • pesky thing that goofs up my computer
Cyber Security! 2023-10-20
Across
- Viruses, Spyware, Malicious Softwares
- encoding data, by converting the original representation of the information
- Cybercriminals sending malicious emails.
Down
- results in confidential, sensitive information being exposed
- a string of characters that allows access to a computer system or service which is usually of short length
- protection from malicious attacks
- attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid
7 Clues: protection from malicious attacks • Viruses, Spyware, Malicious Softwares • Cybercriminals sending malicious emails. • results in confidential, sensitive information being exposed • encoding data, by converting the original representation of the information • attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid • ...
CISO Crossword Quiz - 0924 2024-07-25
Across
- Cyber Attackers intercept communication illegally and steal sensitive data in transit
- The computer system that is a host to the malware agent of the botnet or to the malware agent itself
- A Security incident in which a malicious threat actor gains access to systems without authorization
- The process of monitoring and capturing all data packets passing through a given network
- The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
- A software program designed to take advantage of a flaw in a network, typically for malicious purposes
- The action or process of spoiling the appearance of a website in a cyber attack
Down
- A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
- Related to information security, confidentiality is the opposite to _______
- A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network
10 Clues: Related to information security, confidentiality is the opposite to _______ • The action or process of spoiling the appearance of a website in a cyber attack • Cyber Attackers intercept communication illegally and steal sensitive data in transit • The process of monitoring and capturing all data packets passing through a given network • ...
Cyber-Mobbing 2015-01-20
Across
- Cyber-Mobbing kann auf vielen verschiedenen ... durchgeführt werden.
- Wie wird das Zivilrecht noch genannt?
- Man sollte den Mobber...
- Welchen anderen Namen hat Cyber-Mobbing?
- Hinter welchen Namen können sich Mobber "verstecken"?
- Nenne eine Form von Cyber-Mobbing
- Cyber-Mobbing betrifft,das Zivilrecht oder das ...
- Wie handeln Täter,wenn sie von niemanden erkannt werden wollen?
Down
- Man sollte aufpassen,was man von sich preis gibt,denn das Internet ... nichts
- An wen kann ein Opfer sich wenden?
- Ursachen von Mobbing
- Wie heißen Mobber?
- Wie oft findet Cyber-Mobbing statt?
- Was ist die schlimmste folge von Cyber-Mobbing?
- Der zweite Zivilrechtliche Schritt ist förmlicher.Man verschickt eine ...
15 Clues: Wie heißen Mobber? • Ursachen von Mobbing • Man sollte den Mobber... • Nenne eine Form von Cyber-Mobbing • An wen kann ein Opfer sich wenden? • Wie oft findet Cyber-Mobbing statt? • Wie wird das Zivilrecht noch genannt? • Welchen anderen Namen hat Cyber-Mobbing? • Was ist die schlimmste folge von Cyber-Mobbing? • Cyber-Mobbing betrifft,das Zivilrecht oder das ... • ...
Information and Cyber Security 2022-10-21
Across
- Hackers demanded this company cancel the planned release of a film
- The key to securing your accounts
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Virtual Private …
Down
- The term used for a broad range of malicious activities accomplished through human interactions
- Anti- ...
- What BHSF does to train colleagues to look out for phishing attacks
- What type of attacks are on the rise
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- These attacks typically target a CEO, CFO, or any CXX
- 560,000 pieces of … are detected every day
- UK cyber crime has … in the past 5 years
- Time it takes a hacker to brute force a 6 character password
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
CTF-CW2 2025-11-14
Across
- That “uh-oh” moment for security teams
- Tekion’s stealthy in-app bodyguard, always on duty at runtime.
- The “Ctrl+S” for disaster
- Collecting details into a big pool to spot patterns
- Proving you’re not a robot to the robot
- The bouncer that kicks your data out before it can party
- Business’s comeback routine
- When you outsource your cyber-guard dog
- Rule: Don’t keep information longer than you actually need it
- At Tekion, this smart tool is like having an AI on bug patrol—no flaw escapes its auto-fixing spotlight!
Down
- VIP pass for your data palace
- The “how to un-break it” list
- Where your company files its “uh-oh!” moments
- Where the red team at Tekion goes bug hunting for fun.
- The hacker’s recipe book
- The software snake that slithers everywhere
- “Yes, I agree” – you give this for your info to be used
- Canada’s broad privacy rulebook for businesses
- Work that flows like a river
- Global referees in the rules of security
20 Clues: The hacker’s recipe book • The “Ctrl+S” for disaster • Business’s comeback routine • Work that flows like a river • VIP pass for your data palace • The “how to un-break it” list • That “uh-oh” moment for security teams • Proving you’re not a robot to the robot • When you outsource your cyber-guard dog • Global referees in the rules of security • ...
networking concept and cyber ethics 2025-05-29
Across
- Protects computers from hackers
- information Do not share this online
- A network without wires
- ethics Use of computers ethically and legally
- Keeping computer data safe
- Strong way to protect accounts
- Device that joins multiple computers
- Device that connects the network
- addresses Unique addresses for each device
- Type of network that covers a small area
- Wireless technology standard
- Connects LAN to Internet
Down
- Criminal activities using computers
- C Shortcut for copy
- Software to harm or damage a computer
- bullying Sending rude messages online
- Very large network of networks
- Act of accessing a system without permission
- Rules for communication in a network
- network Connects computers together
20 Clues: A network without wires • Connects LAN to Internet • Keeping computer data safe • Wireless technology standard • C Shortcut for copy • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Device that connects the network • Criminal activities using computers • Device that joins multiple computers • ...
cyber security 2022-09-03
Stats Perform Festive Puzzle 2023-11-10
Across
- ---365
- Festive Exhibition!
- Both a sport and a day
- Reindeer and Elton John classic 'Tiny ------'
- One of our newest, innovative collaboration partners
- The reindeer with a cold!
- Spanish city where Stats Perform scooped the Product of the Year Award
- Surname of our Chief Revenue Officer
- ----------- Security, keeping cyber-criminals away!
- Making a bang at Christmas and Diwali
- Our Morehouse College Course - AI in ----------
Down
- Global charity partner appointed in 2023
- The most festive of all fellows!
- The 'brains' behind AI
- Keeping the sport world honest
- Nickname of one of the WWC 2023 host nations
- Our award-winning social media brand
- HAPPY --------!
- Previous name of EA FC24 Video Game
- ------ Tennis Association, newly extended partnership
- The American term for 'football'
- Home of our Engineering Centre of Excellence
- The largest of Stats Perform locations (no. of people)
- Acronym of the organisation we partner to help increase gender diversity
- The name of our L&D Platform
- Santa's Ferrell Helper
26 Clues: ---365 • HAPPY --------! • Festive Exhibition! • The 'brains' behind AI • Both a sport and a day • Santa's Ferrell Helper • The reindeer with a cold! • The name of our L&D Platform • Keeping the sport world honest • The most festive of all fellows! • The American term for 'football' • Previous name of EA FC24 Video Game • Our award-winning social media brand • ...
cybercrime 2024-11-09
Across
- Testing Breaking into a system to test its defenses legally
- Attacks aimed at disrupting or disabling a network
- Financial theft through hacking or scams
- Protecting data and systems from cyber attacks
- Virus or worm code hidden within a seemingly harmless program
- Common scam emails that trick people into sharing private info
- Passwords, PINs, and fingerprints used for digital security
- Illegal access to systems without permission
- Fake sites mimicking real ones to steal information
Down
- Software designed to harm or exploit computers
- Law-breaking activities online
- Tracking software that monitors user activity without consent
- Protecting children from inappropriate online content
- Method of verifying identity online, often in two steps
- Theft Stealing another person’s identity to impersonate them online
- The backbone of online communications targeted by cybercriminals
- Program that spreads across computers, copying itself
- Fake messages asking for sensitive information
- Act of unauthorized copying or using someone's content
- Criminals who exploit security weaknesses online
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Software designed to harm or exploit computers • Protecting data and systems from cyber attacks • Fake messages asking for sensitive information • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
