cyber security Crossword Puzzles
cybercrime 2024-11-09
Across
- Virus or worm code hidden within a seemingly harmless program
- Theft Stealing another person’s identity to impersonate them online
- Fake messages asking for sensitive information
- Protection Protecting children from inappropriate online content
- Act of unauthorized copying or using someone's content
- Fake sites mimicking real ones to steal information
- Passwords, PINs, and fingerprints used for digital security
- Protecting data and systems from cyber attacks
- Software designed to harm or exploit computers
- Common scam emails that trick people into sharing private info
- Attacks aimed at disrupting or disabling a network
Down
- Financial theft through hacking or scams
- Law-breaking activities online
- The backbone of online communications targeted by cybercriminals
- Method of verifying identity online, often in two steps
- Tracking software that monitors user activity without consent
- Criminals who exploit security weaknesses online
- Testing Breaking into a system to test its defenses legally
- Program that spreads across computers, copying itself
- Illegal access to systems without permission
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Fake messages asking for sensitive information • Protecting data and systems from cyber attacks • Software designed to harm or exploit computers • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
Cyber Commons 2025-09-11
Across
- Market incentive for cybersecurity investment
- IAD rule type defining who can participate
- An example of IAD tools
- Cybersecurity ecosystem with shared risk
- IAD outcome measuring long-term viability
- Framework used to analyze institutional governance
- Security standard for credit card data
- Commons resource used to authenticate websites
Down
- Commons resources are non-excludable but…?
- Rules governing daily decisions
- Social capital for AI models
- Example of Cyber Commons
- Threat information sharing institution
- Organization that manages CVEs
- Vulnerability Scoring System
- Property right in IAD
- An outcome analyzed by IAD
- Commons governance scholar who challenged Hardin
- Vulnerability identifier
19 Clues: Property right in IAD • An example of IAD tools • Example of Cyber Commons • Vulnerability identifier • An outcome analyzed by IAD • Social capital for AI models • Vulnerability Scoring System • Organization that manages CVEs • Rules governing daily decisions • Threat information sharing institution • Security standard for credit card data • ...
networking concept and cyber ethics 2025-05-29
Across
- Protects computers from hackers
- information Do not share this online
- A network without wires
- ethics Use of computers ethically and legally
- Keeping computer data safe
- Strong way to protect accounts
- Device that joins multiple computers
- Device that connects the network
- addresses Unique addresses for each device
- Type of network that covers a small area
- Wireless technology standard
- Connects LAN to Internet
Down
- Criminal activities using computers
- C Shortcut for copy
- Software to harm or damage a computer
- bullying Sending rude messages online
- Very large network of networks
- Act of accessing a system without permission
- Rules for communication in a network
- network Connects computers together
20 Clues: A network without wires • Connects LAN to Internet • Keeping computer data safe • Wireless technology standard • C Shortcut for copy • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Device that connects the network • Criminal activities using computers • Device that joins multiple computers • ...
ggvv 2016-03-03
20 Clues: banq • mask • pucci • reqqq • cyber • social • tional • extrot • macbeh • abduct • Germny • incest • collect • explore • out out • theatron • rex- rex • recreation • song- Art song • Schubert- Franz
jases crossword puzzel 2026-01-16
Across
- Footprint its all the stuff you have every done
- like a phone or something
- interaction with others to get stuff
- chain
Down
- where something is not working
- security people that try to steal money
- durable equipment
- marketing uses online networks like social media
- application programming interface
- where people try to steal money from you
10 Clues: chain • durable equipment • like a phone or something • where something is not working • application programming interface • interaction with others to get stuff • security people that try to steal money • where people try to steal money from you • Footprint its all the stuff you have every done • marketing uses online networks like social media
SynopTech No. 4: Cyber Risks in Central Banking 2022-10-28
Across
- Central banks are adopting risk-based and _____-focused approach
- Phishing attacks involve the mass distribution of _____ e-mail messages with deceitful addresses
- _____ is one of the most common method of cyber attack
- Cyber security _____ is increasingly integrated into enterprise risk management frameworks
- Financial institutions are now shifting to cloud adoption and increased _____ working
Down
- Phishing is an attempt to obtain sensitive _____
- Data breaches cam hamper _____ and accessibility
- Financial institutions should oversee _____ phishing simulations or exercises
8 Clues: Phishing is an attempt to obtain sensitive _____ • Data breaches cam hamper _____ and accessibility • _____ is one of the most common method of cyber attack • Central banks are adopting risk-based and _____-focused approach • Financial institutions should oversee _____ phishing simulations or exercises • ...
Cyber Security Challenge - Crossword 2013-08-28
Across
- A browser window that appears on top of another window, often to show advertisements
- A person who breaks into computers to view and possibly change information they shouldn't access
- Pool of private sector consultants approved by CESG to provide IA advice to government
- Solution that prevents recursive domain nameserver (DNS)
- Information security arm of GCHQ
- REMOTE CAPS approved encryption device part of AEP SCP solution
Down
- Service that helps private sector companies develop cryptographic products for use by HMG
- Technology protocol for securing IP communications
- Group of computers networked together over a public network - the internet
- Hack used to make pharmaceutical sales appear higher in the Google search results
- Program in which malicious or harmful code is contained within
- Government agencies use this AEP solution for CAPS approved data remote access
- Coordination of the internets naming system
- Secure Communications legacy protocol (hand out)
- The attackers masquerade as a trusted system to try to persuade you to send secret information to them
15 Clues: Information security arm of GCHQ • Coordination of the internets naming system • Secure Communications legacy protocol (hand out) • Technology protocol for securing IP communications • Solution that prevents recursive domain nameserver (DNS) • Program in which malicious or harmful code is contained within • ...
Cyber Threats and Security 2025-02-04
Across
- Capturing data while it is being transmitted over a network.
- Overloading a server with excessive traffic to disrupt service.
- Redirecting users to fake websites to steal personal data.
- Deceptive attack tricking users into revealing sensitive information.
- Security method using physical traits like fingerprints or facial recognition.
- Restricting system access based on user roles.
- Extra security layer requiring two authentication factors.
- Software that detects and removes malicious programs.
Down
- Malware disguised as legitimate software to trick users.
- An intermediary server between users and websites for security and privacy.
- Secret string of characters used for authentication.
- System that filters and blocks unauthorized network traffic.
- Repeatedly guessing passwords to gain unauthorized access.
- Malware that secretly collects user information without consent.
- Manipulating people into giving away confidential information.
15 Clues: Restricting system access based on user roles. • Secret string of characters used for authentication. • Software that detects and removes malicious programs. • Malware disguised as legitimate software to trick users. • Redirecting users to fake websites to steal personal data. • Repeatedly guessing passwords to gain unauthorized access. • ...
Cyber Security Awareness Month 2024-10-28
Across
- An attempt to gain unauthorized access to data or systems.
- A device used to intercept and record network traffic.
- Secret combination used to secure your online accounts.
- A secret key generated from cryptographic processes for authentication.
- Software that protects a computer from unauthorized access via the internet.
- An attack that overloads a system to prevent legitimate access.
- A cyber-attack where a user is tricked into giving sensitive information.
- The process of verifying your identity before accessing an account.
- This security practice hides data so only authorized parties can read it.
Down
- The process of making a network secure from unauthorized access.
- Type of malware that demands payment to release control of your device.
- The act of guessing someone’s password by trying common words.
- Unwanted or junk email often containing phishing links.
- Network of infected computers controlled by an attacker.
- An individual who uses their skills to protect networks.
15 Clues: A device used to intercept and record network traffic. • Secret combination used to secure your online accounts. • Unwanted or junk email often containing phishing links. • Network of infected computers controlled by an attacker. • An individual who uses their skills to protect networks. • An attempt to gain unauthorized access to data or systems. • ...
Information and Cyber Security 2022-10-21
Across
- 560,000 pieces of … are detected every day
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Anti- ...
- These attacks typically target a CEO, CFO, or any CXX
- UK cyber crime has … in the past 5 years
Down
- What type of attacks are on the rise
- What BHSF does to train colleagues to look out for phishing attacks
- The key to securing your accounts
- Time it takes a hacker to brute force a 6 character password
- The term used for a broad range of malicious activities accomplished through human interactions
- Virtual Private …
- Hackers demanded this company cancel the planned release of a film
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
Cyber Security crossword puzzle 2025-03-12
Across
- Harmful software like viruses or worms.
- Tricking users into revealing sensitive info.
- Verifying a user's identity.
- Hidden access to a system.
- Blocks unauthorized network access.
- Manipulating people to leak info.
- Converts data into an irreversible code.
Down
- Adds a second verification step.
- Converts data into a secure code.
- Secretly collects user data.
- Hacked computers used for attacks.
- Malware disguised as a normal file.
- Locks files and demands payment.
- Hides IP and encrypts internet traffic.
- Attack Guessing passwords repeatedly.
15 Clues: Hidden access to a system. • Secretly collects user data. • Verifying a user's identity. • Adds a second verification step. • Locks files and demands payment. • Converts data into a secure code. • Manipulating people to leak info. • Hacked computers used for attacks. • Malware disguised as a normal file. • Blocks unauthorized network access. • ...
cyber ethics and security 2025-06-06
Across
- It is a law under which the owners are granted certain exclusive rights to ensure that the creator's hardwork is safe and protected from unauthorized copying and piracy.
- It is a wireless technology used to interconnect mobile phones, computers and printers.
- It refers to an illegal intrusion into a computer system or network.
- It is a combination of two terms, net and etiquette.
- You purchased a single licensed copy of the software and load it into several computers contrary to the license's terms.
- It refers to unwanted bulk emails that come from unknown sources.
- It connects two or more computers located at distant places.
- It is the criminal practice of using social influences over the telephone system, most often using VoIP.
Down
- This device connects two different types of networks with each other.
- It refers to criminal activities that involve the use of computers, networks and the internet connection with the intent to cause harm to individuals or their digital devices.
- It refers to a computer network restricted to an organization.
- These are unethical people who are experts in breaking into systems to steal important data.
- It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc. are connected and communicate with each other.
- It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
15 Clues: It is a combination of two terms, net and etiquette. • It connects two or more computers located at distant places. • It refers to a computer network restricted to an organization. • It refers to unwanted bulk emails that come from unknown sources. • It refers to an illegal intrusion into a computer system or network. • ...
Cyber Attack Groups (Expert) 2023-06-01
Across
- Bear Another Russian state-sponsored group, APT29 is known for its sophisticated and stealthy cyber espionage campaigns. They have targeted governments, think tanks, and diplomatic organizations.
- They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack.
- This Chinese cyber attack group operates both for personal gain and state interests. They engage in cyber espionage, financially motivated attacks, and supply chain compromises, targeting a wide range of industries globally.
- Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries.
- Originating from Vietnam, APT32 has been involved in cyber espionage campaigns targeting Southeast Asian countries, particularly focusing on political, media, and human rights organizations.
Down
- Linked to North Korea, Lazarus Group has conducted several notable cyber attacks, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware attack. They have targeted financial institutions, critical infrastructure, and cryptocurrency exchanges.
- This advanced persistent threat group targets individuals in the hospitality industry, mainly executives and high-profile business travelers, using sophisticated social engineering and zero-day exploits to gain access to their devices and networks.
- Widely believed to be associated with the United States' National Security Agency (NSA), Equation Group is known for developing and deploying highly sophisticated cyber weapons, including the Stuxnet worm and various advanced persistent threats (APTs).
- also known as FIN7 or Anunak, is a financially motivated cyber criminal group that has targeted banks, hospitality, and retail sectors. They are known for their sophisticated hacking techniques and large-scale data breaches.
9 Clues: They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack. • Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries. • ...
security+J 2024-04-25
Across
- software and operating system (OS) updates that address security vulnerabilities within a program or product
- when cybercriminals breach a private network, steal valuable data and hold the information hostage
- put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
- sites that are not indexed and only accessible via specialized web browsers
- an important factor in the determination of the risk of a threat actor. Highly ___________ threat actors are more likely to be successful if an attack is launched. Less _________ attackers have a lower probability of an attack being successful should it be launched
- a sovereign territory with one group of individuals who share a common history
Down
- typically involves a cyber criminal stealing data from personal or corporate devices, such as computers and mobile phones, through various cyberattack methods
- a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
- a person or test result that is incorrectly classified as positive (as for the presence of a health condition) because of imperfect testing methods or procedures
- a cybersecurity approach that uses existing infrastructure and controls to secure endpoints, rather than deploying people
10 Clues: sites that are not indexed and only accessible via specialized web browsers • a sovereign territory with one group of individuals who share a common history • when cybercriminals breach a private network, steal valuable data and hold the information hostage • ...
Ict internet security by kiesha 2023-03-28
Across
- is a unique string of numbers that identifies a device connected to the internet
- malware that appears harmless but can perform malicious actions on an infected device once downloaded or opened
- software is designed to detect, prevent, and remove malware infections on computers and other devices
- Its aim is often to steal sensitive information or gain access to a computer system
- Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system
- A system or collection of systems operating under a consistent security policy that defines the classification, releasability and special handling caveats for data processed within the domain.
- The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.
- A computer that provides services to users or other systems. For example, a file server, email server or database server.
- when people who have been doing a skilled type of job are replaced by technology requiring operator with less skill, thereby saving the company money
- An agreed standard for secure communication between two or more entities to provide confidentiality, integrity, authentication and non-repudiation of data
- A sequence of characters used for authentication.
- A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and ICT equipment.
Down
- system-specific security documentation
- a type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- working fewer hour per week than people usually do
- The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of an adversary finding an exploitable security vulnerability.
- a type of malware that can collect and transmit private user information without the user’s knowledge or consent
- voice over internet protocol
- a type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
- when people change their job by learning the new skill necessary for another job
20 Clues: voice over internet protocol • system-specific security documentation • A sequence of characters used for authentication. • working fewer hour per week than people usually do • is a unique string of numbers that identifies a device connected to the internet • when people change their job by learning the new skill necessary for another job • ...
Cybersecurity 2025-04-17
Across
- Redirecting users to fake websites to steal personal information.
- programs disguised as legitimate software.
- A type of cyber attack tricking you into revealing personal information.
- The act of spying over someone's shoulder to steal information.
- Software that shows unwanted ads.
Down
- A network security system that monitors and controls incoming and outgoing network traffic.
- A program that can replicate itself to spread.
- software that locks your files and demands payment.
- Security authentication using unique biological traits like fingerprints or facial recognition.
- Lying or deceiving to gain information online.
- A program that replicates itself to spread across computers without human interaction.
- software that secretly gathers user information.
12 Clues: Software that shows unwanted ads. • programs disguised as legitimate software. • A program that can replicate itself to spread. • Lying or deceiving to gain information online. • software that secretly gathers user information. • software that locks your files and demands payment. • The act of spying over someone's shoulder to steal information. • ...
Cybersecurity Awarness - Security at Home 2025-10-08
Across
- A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- Security intended to protect devices like laptops, desktops, and mobile phones.
- Routine practices and steps users take to maintain system health and improve security.
- A Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
Down
- The process of identifying, evaluating, and prioritizing risks to organizational assets.
- Mechanisms that restrict access to systems, data, and resources.
- Manipulating people into divulging confidential information or performing actions that compromise security.
- A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
- A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- Determines what an authenticated user is allowed to do within a system.
10 Clues: Mechanisms that restrict access to systems, data, and resources. • Determines what an authenticated user is allowed to do within a system. • Security intended to protect devices like laptops, desktops, and mobile phones. • Routine practices and steps users take to maintain system health and improve security. • ...
BrainRiddle 2025-02-05
Across
- The process of verifying the identity of a user or system.
- The study of analyzing and breaking cryptographic algorithms.
- The process of removing software restrictions on a device to gain full control.
- The practice of updating software to fix security vulnerabilities.
- A security feature ensuring only trusted software runs during startup.
- The process of identifying, managing, and mitigating cybersecurity threats.
- The process of collecting and analyzing data to prevent cyber threats.
Down
- A cyberattack where an attacker secretly intercepts communication.
- A cryptographic technique used to verify the authenticity of data.
- The use of hacking techniques for political or social activism.
- A program or code that takes advantage of a vulnerability in a system.
- A hidden method of bypassing security controls to gain unauthorized access.
- Software embedded in hardware that controls low-level device operations.
- An advanced computing paradigm that can break classical encryption.
- A type of malware that records keystrokes to steal passwords and data.
15 Clues: The process of verifying the identity of a user or system. • The study of analyzing and breaking cryptographic algorithms. • The use of hacking techniques for political or social activism. • A cyberattack where an attacker secretly intercepts communication. • A cryptographic technique used to verify the authenticity of data. • ...
TTS Seputar Komputer dan Masyarakat 2020-11-04
Across
- Technology / Bahasa Inggris dari Teknologi Informasi.
- Draw / Aplikasi yang berguna dalam image creating.
- / Penggunaan jaringan komputer dalam menunjang system informasi membawa pengaruh terhadap hampir semua aspek dalam pengelolaan bisnis disebut dengan?
- / Sekelompok manusia yang terjalin erat karena sistem tertentu, tradisi tertentu, konvensi dan hukum tertentu yang sama, serta mengarah pada kehidupan kolektif.
- / Merupakan salah satu contoh data yang disebarkan dengan kejahatan Doxing yang lainnya.
- / Perangkat elektronik yang memanipulasi informasi atau data.
- / Salah satu jenis dari Cyber Bullying.
- Diri / Meyakinkan pada kemampuan dan penilaian (judgement) diri sendiri dalam melakukan tugas dan memilih pendekatan yang efektif.
- Merupakan bagian dari e-business, dimana cakupannya lebih luas daripada e-business.
Down
- / Singkatan dari Computer Security Incident Response Team.
- / Sosial Media.
- horse / Salah satu contoh dari Cyber Crime.
- Sosial / Sebuah gerakan kontemporer yang bertujuan mempengaruhi masyarakat luas guna mencapai suatu kesadaran tertentu merupakan arti dari?
- / Julukan dari artis pada sosial media Twitter.
- / Istilah Teknologi Informasi dalam bahasa Inggris yang mengacu kepada kelas tertinggi dari komputer yang terdiri dari komputer-komputer yang mampu melakukan banyak tugas komputasi yang rumit dalam waktu yang singkat.
- / Penyebaran informasi pribadi orang lain tanpa izin terutama di dunia maya merupakan definisi dari?
- / Sekelompok orang yang menggunakan keahliannya dalam hal komputer untuk melihat, menemukan dan memperbaiki kelemahan sistem keamanan dalam sebuah sistem komputer ataupun dalam sebuah software.
- / Merupakan salah satu contoh data yang disebarkan dengan kejahatan Doxing.
- Crime / Bentuk kejahatan baru yang menggunakan internet sebagai media untuk melakukan tindak kejahatan engan munculnya era internet.
- / Julukan dari artis pada sosial media Instagram.
20 Clues: / Sosial Media. • / Salah satu jenis dari Cyber Bullying. • horse / Salah satu contoh dari Cyber Crime. • / Julukan dari artis pada sosial media Twitter. • / Julukan dari artis pada sosial media Instagram. • Draw / Aplikasi yang berguna dalam image creating. • Technology / Bahasa Inggris dari Teknologi Informasi. • ...
Infosec 2021-07-07
Across
- ____________allows continuity of business in terms of data availability in case of disaster
- In QualityKiosk, Emails should be used for _____ use only
- In QualityKiosk, password must be _____ characters
- What refers to the protection of information from unauthorized modification or destruction
- What A is CIA Triad
- _____ is the most common delivery method for viruses
- As per password policy, password should be changed within ______ days
- An _______ can be the result of unusual circumstances as well as the violation of existing policies and procedures of QualityKiosk
Down
- What consists of code developed by cyber attackers, designed to cause extensive damage to data and systems, or to gain unauthorized access to a network
- Social engineering is trick used by an attacker to access ______ information
- _______ is one of the social engineering attacks that targets victims computer
- ______ helps protect your computer against malware and viruses
- What is the highest level of information classification defined at QK?
- The first step in security awareness is being able to ______ a security threat
- Poor security can place information at ___
15 Clues: What A is CIA Triad • Poor security can place information at ___ • In QualityKiosk, password must be _____ characters • _____ is the most common delivery method for viruses • In QualityKiosk, Emails should be used for _____ use only • ______ helps protect your computer against malware and viruses • ...
Steve’s Scripted Disaster and My Forensics Fiasco! 2024-09-06
Across
- The person who had to fix Steve’s mess
- The platform where customer profiles were compromised
- The security measure Steve failed to understand
- When you should ask for help
Down
- The type of cyber security incident Steve inadvertently made easier
- What should be followed to avoid such mistakes
- What Steve tried to write to change customer settings
- What Steve deleted to cover up his mistake
- A key mistake: skipping this before taking action
9 Clues: When you should ask for help • The person who had to fix Steve’s mess • What Steve deleted to cover up his mistake • What should be followed to avoid such mistakes • The security measure Steve failed to understand • A key mistake: skipping this before taking action • What Steve tried to write to change customer settings • ...
Cyber Security Crossword 2022-10-11
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- A software that scans a device or a network to detect security threats
- A flaw or weakness that can be used to attack a system or organization
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- An audio or video clip that has been edited and manipulated to seem real or believable
- A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
- A secret word or phrase that is used to access a computer system or service
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
- An internet version of a home address for your computer
10 Clues: An internet version of a home address for your computer • A software that scans a device or a network to detect security threats • A flaw or weakness that can be used to attack a system or organization • A secret word or phrase that is used to access a computer system or service • ...
cyber security crossword 2024-02-21
10 Clues: African royalty • data, and delicious • a fake video of someone • think before you do this • attack with text messages • look at this before clicking • America's cyber defense agency • attack through malicious emails • hackers want to things, data and • person hacker sometimes claims to be
Cyber Security Puzzle 2025-06-30
Across
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
- An unauthorized user who attempts to or gains access to an information system.
- Software designed to block malware from entering protected networks.
- A mechanism for creating a secure connection between a computing device and a computer network.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
- A string of characters used to authenticate and identity.
- A flaw or weakness in an information system that could be exploited.
- part of internet that is not indexed by search engines.
- A computer program that can block, detect and remove viruses and other malware.
10 Clues: part of internet that is not indexed by search engines. • A string of characters used to authenticate and identity. • A flaw or weakness in an information system that could be exploited. • Software designed to block malware from entering protected networks. • An unauthorized user who attempts to or gains access to an information system. • ...
Cyber Security Puzzles 2025-02-27
Across
- Information about yourself that bullies might use to hurt you
- Spreading untrue stories online to hurt someone
- What you should do with doubtful online information
- Sharing this online can help a cyberbully find you at home
Down
- Being a good friend online
- What a cyberbully is not
- A secret word that keeps bullies out of your accounts
- What you should tell a trusted adult about a bullying strange
- What cyberbullies do when they use your private info to hurt you
- What a bully tries to do
10 Clues: What a cyberbully is not • What a bully tries to do • Being a good friend online • Spreading untrue stories online to hurt someone • What you should do with doubtful online information • A secret word that keeps bullies out of your accounts • Sharing this online can help a cyberbully find you at home • Information about yourself that bullies might use to hurt you • ...
GKCU Cyber Security 2025-10-21
Across
- What emails are labeled from outside the CU
- What scammers do when they send deceptive emails to trick users into clicking malicious links.
- When a bad actor makes an email look like it’s from a trusted source by changing the display name or headers
- One of our golden rules: “___ but Verify
- Always hover over this before you click to check where it really goes.
Down
- Phone call–based scams where attackers impersonate someone to get information or money.
- a short verb meaning to confirm
- What you often shouldn’t open without confirming the sender — it can carry malware.
- The action you should take when you suspect a message is a scam.
- SMS-based phishing — text messages that try to trick you into clicking a malicious link.
10 Clues: a short verb meaning to confirm • One of our golden rules: “___ but Verify • What emails are labeled from outside the CU • The action you should take when you suspect a message is a scam. • Always hover over this before you click to check where it really goes. • What you often shouldn’t open without confirming the sender — it can carry malware. • ...
cyber security awareness 2025-10-29
Across
- Keep your software __________ to stay safe
- Don't Share this number with strangers
- Protect your computer from viruses
- Don't share your ______information online
- A device used to connect to the internet
Down
- A harmful program that can damage files
- Stealing someone's personal information online
- A secret word used to login
- Network of network
- Unwanted or Junk mails
10 Clues: Network of network • Unwanted or Junk mails • A secret word used to login • Protect your computer from viruses • Don't Share this number with strangers • A harmful program that can damage files • A device used to connect to the internet • Don't share your ______information online • Keep your software __________ to stay safe • Stealing someone's personal information online
Information Security 2 - Test Review 2018-11-22
Across
- something different from what you expect; a problem
- a kind of malware that gathers information about what you do on your computer
- Websites get this to prove they are safe
- part of a CV where you talk about computer related skills you have (9/6)
- a person who designs and implements security systems (cyber security ____)
- to put a plan into action
Down
- a phishing scam which targets an executive or high level manager
- how much money you earn
- someone pretending to be someone else
- another name for this job is 'ethical hacker' (11/6)
- message authentication _______
- the criminal name for illegally downloading material from the internet
- make connections with other people
13 Clues: how much money you earn • to put a plan into action • message authentication _______ • make connections with other people • someone pretending to be someone else • Websites get this to prove they are safe • something different from what you expect; a problem • another name for this job is 'ethical hacker' (11/6) • ...
Procurement Law Puzzlers! 2026-03-18
Across
- CG’s risk threshold: “all _________ risk”
- New suite of construction delivery methods.
- Second measure of harm.
- Plain Language word for “Shall”
- Official Chocolate of the Office of the Chief Counsel
- Queen of all USACE Districts
- Current COFC PLA Precedent (short name)
- The “R” in RFO
Down
- GAO case on equitable tolling.
- ASBCA Discovery should be Relevant and ___________.
- Celebrity who used NAU toilet.
- New Cyber Security Requirements
- Procurement Incubator Authority
- The Formula for calculating legal risk.
- ASBCA Rule for Decision without a hearing (number)
- First measure of harm.
- USACE Dinosaur Name
17 Clues: The “R” in RFO • USACE Dinosaur Name • First measure of harm. • Second measure of harm. • Queen of all USACE Districts • GAO case on equitable tolling. • Celebrity who used NAU toilet. • New Cyber Security Requirements • Plain Language word for “Shall” • Procurement Incubator Authority • The Formula for calculating legal risk. • Current COFC PLA Precedent (short name) • ...
ICT Processes and Cybersecurity 2022-11-10
Across
- Makes systems access easier
- ERP module for logging all support tickets
- Verifying the identity of a user
- A type of social engineering
- Log ticket here without ERP credentials
Down
- Secret word or phrase
- Cyber security protects them
- Redirecting unresolved service request
- Type of priority of a service request
- Only for emergency service requests
10 Clues: Secret word or phrase • Makes systems access easier • Cyber security protects them • A type of social engineering • Verifying the identity of a user • Only for emergency service requests • Type of priority of a service request • Redirecting unresolved service request • Log ticket here without ERP credentials • ERP module for logging all support tickets
Cyber Security Crossword 2024-07-09
Across
- Software flaw
- Converts data into a coded form for security
- Unwanted email messages
- Malicious software disrupts, damages, or gains unauthorized access.
- Password guessing attack
Down
- Deceptive emails to steal information
- Controls traffic entering and leaving a network
- Self-replicating malware
- Network of infected computers
- overwhelms network with traffic
- Harmful software disrupts or steals data
11 Clues: Software flaw • Unwanted email messages • Self-replicating malware • Password guessing attack • Network of infected computers • overwhelms network with traffic • Deceptive emails to steal information • Harmful software disrupts or steals data • Converts data into a coded form for security • Controls traffic entering and leaving a network • ...
DOT - Cyber Security 2022-06-15
Across
- Gathers sensitive information that involves both social engineering and email
- Malware that infects and spreads through files and links together with social engineering
- Malware that locks data and encrypts it to allowing hackers commit fraud
- Malware that works like a virus, but can infect devices on it's own and through software vulnerabilities
Down
- A text file stored on your device used for logging into websites, storing preferences, and viewing history
- An attack that aims to make a service, or website, unusable by 'flooding' it with malicious traffic
- Malware that gathers information from a person, or business, by violating privacy
- Malware that infects devices through suspicious files and links
- A tool used to mask your online identity by redirecting and encrypting your data before it is sent
- Malware that infects devices with multiple, intrusive, ads and slows overall performance
10 Clues: Malware that infects devices through suspicious files and links • Malware that locks data and encrypts it to allowing hackers commit fraud • Gathers sensitive information that involves both social engineering and email • Malware that gathers information from a person, or business, by violating privacy • ...
Cyber security crossword 2025-07-10
Across
- : Strengthening security configurations of systems
- : Approved list of trusted entities or applications
- : Formal examination of security policies and systems
- : Decoy network set up to detect unauthorized access
- : Using multiple backup systems to prevent failure
Down
- : Separating systems to prevent security breaches
- : Simulating software or hardware to test security
- : Making data intentionally difficult to interpret
- : Gaining higher privileges within a system
- : Ensuring data remains accurate and unaltered
10 Clues: : Gaining higher privileges within a system • : Ensuring data remains accurate and unaltered • : Separating systems to prevent security breaches • : Strengthening security configurations of systems • : Simulating software or hardware to test security • : Making data intentionally difficult to interpret • : Using multiple backup systems to prevent failure • ...
Cyber Security Crossword 2019-12-20
Across
- What allow a visited website to store its own information about a user on the user's computer?
- Key logger is a ........
- Phishing is a form of ..........
Down
- What describes programs that can run independently travel from system to system and disrupt computer communication?
- To hide information inside a picture, what technology is used?
- The first computer virus is ........
- What is the best keyword for taking advantage of a weakness in the security of an IT system?
- When a person is harassed repeatedly by being followed, called or be written to he/she is a target of .........
- A virus that migrates freely within a large population of unauthorized email user is called a ........
- A packet with no flags set is which type of scan?
10 Clues: Key logger is a ........ • Phishing is a form of .......... • The first computer virus is ........ • A packet with no flags set is which type of scan? • To hide information inside a picture, what technology is used? • What is the best keyword for taking advantage of a weakness in the security of an IT system? • ...
Cyber Security Puzzle 2023-10-10
Across
- Helps protect your computer from Malware
- The worst type of Horse
- The authenticator app is an example of?
- Technique to turn information into a secret form
- Phishing messages delivered by QR-Code
- Which month is cyber Awareness Month?
Down
- Malicious software that encrypts data without the user's permission
- Short for suspicious software
- Phishing messages delivered by SMS
- Who is the first defence against Cyber Attacks
10 Clues: The worst type of Horse • Short for suspicious software • Phishing messages delivered by SMS • Which month is cyber Awareness Month? • Phishing messages delivered by QR-Code • The authenticator app is an example of? • Helps protect your computer from Malware • Who is the first defence against Cyber Attacks • Technique to turn information into a secret form • ...
cyber security awareness 2024-10-10
Across
- A string of characters
- the term used for various pop-ups
- Create strong passwords
- the practice of sending fraudulent communications
- focus on protecting data
Down
- any intrusive software developed
- footprint the trail of data you leave using internet
- the ability of a person to determine for themselves practices Create strong passwords
- a special name given to a person
- threats Any circumstance event to threat a person potentialyonline practices being aware of the nature of the possible threats
10 Clues: A string of characters • Create strong passwords • focus on protecting data • any intrusive software developed • a special name given to a person • the term used for various pop-ups • the practice of sending fraudulent communications • footprint the trail of data you leave using internet • ...
SLC cyber security 2025-04-30
10 Clues: troy • bully online • avoid public • message on phone • username, then -- • don't pay in gift---- • don't click suspicious • important login setting • to take from someone online • program to protect a computer
Science, Technology, and Innovation MRG 2022-05-06
Across
- Tesla’s autonomous vehicles are an example of:
- Fukushima and Chernobyl
- International relations through phones
- Cambiamento del Clima
- Laws of rivers and dams
- People who attach a solution to a problem
Down
- Boston dynamics turned Terminator
- France and Ukraine rely upon it
- Microscopes in International Relations
- COVAX
- Hacker Protection
11 Clues: COVAX • Hacker Protection • Cambiamento del Clima • Fukushima and Chernobyl • Laws of rivers and dams • France and Ukraine rely upon it • Boston dynamics turned Terminator • Microscopes in International Relations • International relations through phones • People who attach a solution to a problem • Tesla’s autonomous vehicles are an example of:
CYBER CROSSWORD 2025-10-07
Across
- Secret word to log in
- Entering credentials to access a computer
- Online remote storage space
- Person who breaks into computer systems
- Group or network of infected computers
- Malware that spies on users
- Install new version of software
- Malware named after a wooden horse
- User with top privileges
Down
- Online message or letter
- Barrier blocking cyber attacks
- Main computer that hosts websites
- Code used for login security
- Turns plain data or text into secret code
- Information stored on a computer
- Connected group of computers
- Unauthorised system break in
- Self-spreading computer bug
- Payment demanded by attackers
- Fix to repair or cover a software bug
20 Clues: Secret word to log in • Online message or letter • User with top privileges • Online remote storage space • Malware that spies on users • Self-spreading computer bug • Code used for login security • Connected group of computers • Unauthorised system break in • Payment demanded by attackers • Barrier blocking cyber attacks • Install new version of software • ...
Cybersecurity in Schools 2025-10-19
Across
- The goal of teaching students about online safety and responsible behavior.
- People who gain unauthorized access to computer systems.
- School and home connections that are often easy targets for hackers.
- What the article suggests should include cybersecurity education.
- The entity the article says should help implement cybersecurity education.
- What schools should develop to respond to cyber threats.
- The sector most affected by cyberattacks, according to Microsoft research.
- Working together between schools, families, and the government to fight cyber threats.
Down
- The online space where students face increasing security risks.
- A type of cyberattack that locks data until a payment is made.
- Harmful software used by cybercriminals to damage or steal data.
- The practice of protecting systems and data from digital attacks.
- A scam where hackers trick people into revealing personal information.
- What students are increasingly using in classrooms instead of pen and paper.
- What teachers need before they can effectively teach cybersecurity.
- The dangers posed by cyberattacks.
- Key partners who should collaborate on cybersecurity education efforts.
- Sensitive information that hackers often try to steal from schools.
18 Clues: The dangers posed by cyberattacks. • People who gain unauthorized access to computer systems. • What schools should develop to respond to cyber threats. • A type of cyberattack that locks data until a payment is made. • The online space where students face increasing security risks. • Harmful software used by cybercriminals to damage or steal data. • ...
Winter Security Reminder Crossword 2025-11-14
Across
- Deceptive email technique attackers use heavily during the holidays
- Abbreviation for layered login protection
- User ____ — don’t share them, even with “helpful” coworkers
- Something you shovel in winter — and what attackers try to bury clues under
- The season when people take time off — and attackers ramp up
- What systems can do when storage fills — or when employees forget updates
- What you lock before holiday leave — your computer included
- “____ actor” — an adversary attempting unauthorized access
- Essential item — don’t leave it in your car or desk
- Security mindset: think before you ___
Down
- Frozen form of precipitation and a reminder to be prepared for cyber ___
- Keep your data ____ by using strong multi-factor authentication
- The opposite of “hot,” also how users feel when security is ignored
- Frozen precipitation that also describes a flood of spam
- Ice forms here — and malware often hides here too (initials)
- Seasonal cue to refresh your passwords
- The second factor in “two factor authentication”
- A code you should never reuse
18 Clues: A code you should never reuse • Seasonal cue to refresh your passwords • Security mindset: think before you ___ • Abbreviation for layered login protection • The second factor in “two factor authentication” • Essential item — don’t leave it in your car or desk • Frozen precipitation that also describes a flood of spam • ...
#BeSecure Crossword 2023-10-20
Across
- Security tool that creates a secure, encrypted connection between the user and the internet
- Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
- A flaw or weakness in a computer system that could be exploited to violate the system security.
- Change it regularly! Don't store it in unsecure location and mix it up!
- Action you should take if you suspect you received a phishing email
- The most common cyberthreat you can encounter in the virtual world
- The process of taking plain text and scrambling it into an unreadable format
Down
- Verifying identity.
- Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
- An individual with computer skills who uses them to break into computer, systems and networks.
- A data privacy legal framework all European countries share.
- An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
- The address of a web page. Remember to check its validity before clicking on it!
- Strengthens login security by requiring an additional piece of information beyond your password
14 Clues: Verifying identity. • A data privacy legal framework all European countries share. • The most common cyberthreat you can encounter in the virtual world • Action you should take if you suspect you received a phishing email • Change it regularly! Don't store it in unsecure location and mix it up! • ...
Steve’s Scripted Disaster and My Forensics Fiasco! 2024-09-11
Across
- The platform where customer profiles were compromised
- The person who had to fix Steve’s mess
- A key mistake: skipping this before taking action
- The security measure Steve failed to understand
Down
- What Steve tried to write to change customer settings
- The type of cyber security incident Steve inadvertently made easier
- What Steve deleted to cover up his mistake
- What should be followed to avoid such mistakes
- When you should ask for help
9 Clues: When you should ask for help • The person who had to fix Steve’s mess • What Steve deleted to cover up his mistake • What should be followed to avoid such mistakes • The security measure Steve failed to understand • A key mistake: skipping this before taking action • What Steve tried to write to change customer settings • ...
#BeSecure Crossword 2023-10-20
Across
- Security tool that creates a secure, encrypted connection between the user and the internet
- Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
- A flaw or weakness in a computer system that could be exploited to violate the system security.
- Change it regularly! Don't store it in unsecure location and mix it up!
- Action you should take if you suspect you received a phishing email
- The most common cyberthreat you can encounter in the virtual world
- The process of taking plain text and scrambling it into an unreadable format
Down
- Verifying identity.
- Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
- An individual with computer skills who uses them to break into computer, systems and networks.
- A data privacy legal framework all European countries share.
- An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
- The address of a web page. Remember to check its validity before clicking on it!
- Strengthens login security by requiring an additional piece of information beyond your password
14 Clues: Verifying identity. • A data privacy legal framework all European countries share. • The most common cyberthreat you can encounter in the virtual world • Action you should take if you suspect you received a phishing email • Change it regularly! Don't store it in unsecure location and mix it up! • ...
2022 Cyber Awareness Crossword Puzzle 2022-10-19
Across
- Use _______ thinking to discern disinformation
- What disinformation becomes when it gets spread by people who aren’t aware it’s fake
- According to nearly every study conducted over the last decade, _______________ is involved in the vast majority of cyber attacks. (Two Words)
- Our ongoing commitment to preventing unauthorized access, both externally and internally, to confidential information can be defined as ________
- Voice Phishing is called _______
- _____ save your login information when you’re using a web browser
- Security is only as strong as your weakest ________
Down
- Always ______ Enact’s security policies
- A type of malicious software designed to block access to a computer system until a sum of money is paid; often starts with a phishing email
- Refers to the appropriate use of any data that is collected, stored, and transmitted
- Pay close attention to _____ especially on your mobile device where they may be hard to verify
- If something sounds too good to be true… there’s probably a _______ behind it
- Email classification for general business information shared with a customer
- Lost laptops, vishing phone calls, unbadged stranger in the building, are all examples of Security _________
14 Clues: Voice Phishing is called _______ • Always ______ Enact’s security policies • Use _______ thinking to discern disinformation • Security is only as strong as your weakest ________ • _____ save your login information when you’re using a web browser • Email classification for general business information shared with a customer • ...
Security Crossword 2025-10-29
Across
- the type of security you need to apply when on vacation
- the type of security when you're surfing the web
- Type of security that involves our buildings
- a document we put in place to force people to protect our research
- -An invisible helper that makes our lives better
Down
- A place where books are kept
- what you do when there's been an infraction
7 Clues: A place where books are kept • what you do when there's been an infraction • Type of security that involves our buildings • the type of security when you're surfing the web • -An invisible helper that makes our lives better • the type of security you need to apply when on vacation • a document we put in place to force people to protect our research
Cyber Security Crossword 2022-08-22
Across
- You need to remediate these
- Never click on these links
- NEVER share this with anyone
- Software that locks your computer and you have to pay a fee to unlock it
Down
- a different type of system
- an operating system
- Always have this enabled
- This software is malicious
- the office you contact for anything cyber-security related
- You use this piece of technolocy to work
10 Clues: an operating system • Always have this enabled • a different type of system • This software is malicious • Never click on these links • You need to remediate these • NEVER share this with anyone • You use this piece of technolocy to work • the office you contact for anything cyber-security related • Software that locks your computer and you have to pay a fee to unlock it
Cyber security HarryH 2022-11-21
Across
- someone looks at your screen IRL
- It replicates itself and modifies programs
- A fake website that people enter important data into
- internet connected devices to steal data and send spam
- malware that threatens to leak your data
- connects the user’s device to a secure server, making the connection private.
Down
- malicious attempt to disrupt normal traffic
- message to trick someone to leaking information
- it checks incoming and outgoing traffic
- malware that misleads users of its true intent
10 Clues: someone looks at your screen IRL • it checks incoming and outgoing traffic • malware that threatens to leak your data • It replicates itself and modifies programs • malicious attempt to disrupt normal traffic • malware that misleads users of its true intent • message to trick someone to leaking information • A fake website that people enter important data into • ...
Cyber Security Crossword 2021-02-12
Across
- A person who uses computers to gain unauthorized access to data
- Not having official permission or approval.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A type of virus or worm that carries out a specific type of attack.
- Make sure or demonstrate that something is true, accurate, or justified.
Down
- Malware (malicious software) is software that is designed to gain access to your computer with malicious intent.
- A specific type of computer virus that tricks you into downloading it onto your computer.
- A set of numbers, letters and symbols to keep your devices and accounts locked.
- Adware can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- A malicious form of self replicating software.
10 Clues: Not having official permission or approval. • A malicious form of self replicating software. • A person who uses computers to gain unauthorized access to data • A type of virus or worm that carries out a specific type of attack. • Make sure or demonstrate that something is true, accurate, or justified. • ...
Cyber Security Crossword 2023-05-10
Across
- Pretending to be a Trusted Entity and Creating a Sense of Urgency
- A Code of Conduct on How to Behave Online
- References in a News Source to Confirm its Validity
- Family Parental Controls for Children
- A Layer of Protection For Device Usage
Down
- Checking Multiple Sources to Confirm Information
- Google Feature That Blocks Inappropriate Content
- Settings That Can Be Adjusted To Protect Personal Information
- A trap used to Deceive People into Giving Sensitive Information
- A Journalist's Perspective on a Fact
10 Clues: A Journalist's Perspective on a Fact • Family Parental Controls for Children • A Layer of Protection For Device Usage • A Code of Conduct on How to Behave Online • Checking Multiple Sources to Confirm Information • Google Feature That Blocks Inappropriate Content • References in a News Source to Confirm its Validity • ...
Cyber Security (JW) 2023-04-21
Across
- Used to capture users information
- What information is made from
- _ of service
- A type of force attack
- An address used by computers
- A program written to cause damage to your computer
Down
- A tool used to block incoming threats from the internet
- A type of surfing to see someones password
- _ software in Malware
- A type of malware when bad code is hidden in what appears to be good program
10 Clues: _ of service • _ software in Malware • A type of force attack • An address used by computers • What information is made from • Used to capture users information • A type of surfing to see someones password • A program written to cause damage to your computer • A tool used to block incoming threats from the internet • ...
Cyber Security Crossword 2022-10-11
Across
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- A flaw or weakness that can be used to attack a system or organization
- A secret word or phrase that is used to access a computer system or service
- An internet version of a home address for your computer
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
Down
- A software that scans a device or a network to detect security threats
- An audio or video clip that has been edited and manipulated to seem real or believable
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
10 Clues: An internet version of a home address for your computer • A software that scans a device or a network to detect security threats • A flaw or weakness that can be used to attack a system or organization • A secret word or phrase that is used to access a computer system or service • ...
Cyber Security Crossword 2023-05-10
Across
- Pretending to be a Trusted Entity and Creating a Sense of Urgency
- A Code of Conduct on How to Behave Online
- References in a News Source to Confirm its Validity
- Family Parental Controls for Children
- A Layer of Protection For Device Usage
Down
- Checking Multiple Sources to Confirm Information
- Google Feature That Blocks Inappropriate Content
- Settings That Can Be Adjusted To Protect Personal Information
- A trap used to Deceive People into Giving Sensitive Information
- A Journalist's Perspective on a Fact
10 Clues: A Journalist's Perspective on a Fact • Family Parental Controls for Children • A Layer of Protection For Device Usage • A Code of Conduct on How to Behave Online • Checking Multiple Sources to Confirm Information • Google Feature That Blocks Inappropriate Content • References in a News Source to Confirm its Validity • ...
Cyber security crossword 2023-06-07
Across
- A self replicating computer program
- Rootkit is an example of this malware
- The do's and don'ts of online communication
- The meaning of latin word 'plagiarius' from which plagiarism was derived
- A set of related programs located at a network gateway server,that protects the resources of a private network from users of other networks
Down
- A type of software designed to protect against malware and other cyber threats.
- A type of malware that can spy on a computer user's activities
- Unwanted e-mail,generically
- Unauthorised use of software for temporary use
- a technological research and development Centre of Kerala Police Department conceived as a Cyber Centre of excellence
10 Clues: Unwanted e-mail,generically • A self replicating computer program • Rootkit is an example of this malware • The do's and don'ts of online communication • Unauthorised use of software for temporary use • A type of malware that can spy on a computer user's activities • The meaning of latin word 'plagiarius' from which plagiarism was derived • ...
Cyber Security Week 2023-09-30
Across
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
- What is the process of converting information into a code to prevent unauthorized access?
- What is a secret combination of letters, numbers, and symbols used to access a system or account?
- What is the practice of protecting systems, networks, and programs from digital attacks?
- What is the practice of regularly updating software and systems to protect against known vulnerabilities?
- What type of software is designed to block unauthorized access while permitting authorized communication?
Down
- What is the act of pretending to be someone else to deceive or gain access to information?
- What is a deceptive email or website designed to trick individuals into revealing personal information?
- What is a set of security rules and policies that govern the use of an organization's information technology resources?
10 Clues: What is the practice of protecting systems, networks, and programs from digital attacks? • What is the process of converting information into a code to prevent unauthorized access? • What is the act of pretending to be someone else to deceive or gain access to information? • ...
Cyber Security Awareness 2024-06-15
Across
- A network security system that monitors and controls incoming and outgoing network traffic.
- A network of private computers infected with malicious software and controlled as a group.
- Unauthorized access to or manipulation of a computer.
- A program designed to damage or do other unwanted actions on a computer.
- The process of verifying the identity of a person or device.
Down
- The practice of protecting information by transforming it into an unreadable format.
- Software designed to gather information about a person or organization without their knowledge.
- A type of malicious software that misleads users of its true intent.
- A type of cyberattack where the attacker impersonates someone else via email.
- Malicious software designed to block access to a computer until a sum of money is paid.
10 Clues: Unauthorized access to or manipulation of a computer. • The process of verifying the identity of a person or device. • A type of malicious software that misleads users of its true intent. • A program designed to damage or do other unwanted actions on a computer. • A type of cyberattack where the attacker impersonates someone else via email. • ...
Cyber Security Quiz 2025-09-25
Across
- Your files are locked & the price to unlock them isn't cheap.
- You think you're visiting a safe site, but you're not.
- Someone's secretly listening between two trusted parties.
- Guessing passwords one by one until something cracks.
- A script sneaks into a webpage and messes with users.
Down
- An exploit that strikes before anyone knows it exists.
- A database gets manipulated when queries aren't properly sanitized.
- Reusing stolen logins across multiple sites—hoping for a match.
- Trickery in your inbox—looks legit, but it's bait.
- Too many requests—your server can't breathe.
10 Clues: Too many requests—your server can't breathe. • Trickery in your inbox—looks legit, but it's bait. • Guessing passwords one by one until something cracks. • A script sneaks into a webpage and messes with users. • An exploit that strikes before anyone knows it exists. • You think you're visiting a safe site, but you're not. • ...
ITS2210 Module 7 Crossword P 2019-04-12
Across
- This virus is an example of domestic cyber terrorism
- This type of loss is the most likely damage to occur in an act of cyber terrorism
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- A political group that has used the internet for political intimidation
- This website has been a focus of identity theft criminals to gain access to personal data and pictures
- This conflict in 1990 had a cyber warfare component
- Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- Hacking conducted for ideological purposes
- Accessed to find postings from or about your target
Down
- Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- This command shows any shared files that are open
- This type of "data" is data relevant to an investigation
- Using the Internet to terrorize someone or some group of individuals
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- This type of warfare often involves propaganda and disinformation campaigns
- The NSA and ______ have allegedly had one of their cyber spies caught
- Cyber criminals can use your personal information to guess these
- The most popular search engine used to gather personal information
- Linux stores these logs at the following location /var/log/mail.*
20 Clues: Hacking conducted for ideological purposes • This command shows any shared files that are open • This conflict in 1990 had a cyber warfare component • Accessed to find postings from or about your target • This virus is an example of domestic cyber terrorism • This type of "data" is data relevant to an investigation • ...
Technologia 2025-10-26
Across
- Telepon pintar dengan OS mobile untuk komunikasi dan aplikasi produktivitas
- Teknologi nirkabel untuk konektivitas internet tanpa kabel
- Google ....,Lembar kerja untuk analisis data, formula, dan visualisasi informasi
- Google ....,Peta digital untuk navigasi dan menemukan lokasi secara real-time
- .... Security, Protection system dari cyber attack, hacking, dan data breach
- Perangkat gaming dedicated untuk experience immersive dengan graphics tinggi
- Google ....,Penyimpanan cloud aman untuk backup dan berbagi file digital
- Google ....,Aplikasi pengolah dokumen teks secara online dengan kolaborasi tim
- Perangkat layar sentuh portabel untuk hiburan, baca e-book, dan kerja ringan
- Bahasa pemrograman high-level untuk web development, data science, dan AI
Down
- .... Reality, Headset untuk experience immersive dalam lingkungan digital 3D interaktif
- Software malicious seperti virus, ransomware, dan spyware yang merusak sistem
- Koneksi jaringan kabel dengan kecepatan tinggi dan stability optimal
- Google ....,Aplikasi catatan cepat dengan reminder dan sinkronisasi cloud
- Jam tangan pintar dengan sensor kesehatan, notifikasi, dan fitness tracking
- ahli komputer yang mengeksplorasi atau membobol sistem
- Google ....,Tool presentasi dengan fitur kolaborasi real-time dan template profesional
- Seni menulis instruksi programming untuk membuat software dan aplikasi
- Google ....,Platform video conference dengan fitur screen sharing dan recording
- Komputer lipat portabel dengan performa untuk kerja dan kreativitas mobile
20 Clues: ahli komputer yang mengeksplorasi atau membobol sistem • Teknologi nirkabel untuk konektivitas internet tanpa kabel • Koneksi jaringan kabel dengan kecepatan tinggi dan stability optimal • Seni menulis instruksi programming untuk membuat software dan aplikasi • Google ....,Penyimpanan cloud aman untuk backup dan berbagi file digital • ...
what is cyber security? 2022-12-10
Cyber safety-Chloe lu 2016-06-07
Across
- someone that takes care of you
- where you can look up what you need
- something that can be good
- sending over a phrase
- something you need to get from a parent or teacher
- blocks virus
- making sure your safe
- it can be inappropriate
- bullying bullying online
- rule a rule you should always keep
Down
- something that can help or not
- a form of words
- doing the right thing
- messages something that you need to always check
- usually a website
- only share with family or teachers
- admitting what you did wrong
- mess up you computer
- networks social group
- people that can sometimes get your personal information
20 Clues: blocks virus • a form of words • usually a website • mess up you computer • doing the right thing • sending over a phrase • making sure your safe • networks social group • it can be inappropriate • bullying bullying online • something that can be good • admitting what you did wrong • something that can help or not • someone that takes care of you • only share with family or teachers • ...
Megan Strait Cyber Security Crossword 2023-04-20
Across
- locks computer until ransom is paid.
- “bring your own device”.
- network of computers for cyberattacks.
- “UI redress attack”.
- malware appears harmless - malicious actions.
- secures data on cloud infrastructure.
- fake email - provides sensitive information.
- built-in security feature operating systems.
- IT software - protects against threats.
- unknowingly transmits private user information.
- protects data during encryption process.
- scrambling data - authorized users can access.
Down
- malicious software - damage computer system.
- system protects against unauthorized access.
- attacks unknown vulnerability in software.
- users connect to wireless hotspots.
- Protects against violation of a network.
- distributed denial of service attack.
- cyber-physical systems for high-value environments.
- virtual private network.
20 Clues: “UI redress attack”. • “bring your own device”. • virtual private network. • users connect to wireless hotspots. • locks computer until ransom is paid. • secures data on cloud infrastructure. • distributed denial of service attack. • network of computers for cyberattacks. • IT software - protects against threats. • Protects against violation of a network. • ...
IT Newsletter WordSearch #2 2025-02-25
Across
- A server that acts as an intermediary between a user and the internet.
- A popular web security and performance company protecting websites.
- The number of bits transmitted per second in a digital signal.
- The process of verifying a user's identity in security systems.
- A methodology combining software development and IT operations.
- A process of converting data into a fixed-length string for security.
- Gains unauthorized access to computer systems for various purposes.
- A value used to verify the integrity of data during transmission.
- A program that translates source code into machine code.
- Software embedded into hardware, often for low-level control functions.
- A facility that houses critical IT infrastructure, such as servers.
Down
- A cyber scam where attackers trick users into providing sensitive information.
- A malicious attempt to gain access to or damage computer systems.
- A program that initializes the operating system when a computer starts.
- A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
- A method of packaging software and dependencies for deployment.
- A wired networking technology for local area networks (LANs).
- A decentralized and tamper-proof digital ledger technology.
- Fake media created by the manipulation of real media by AI.
- An architectural approach where applications are built as small, independent services.
20 Clues: A program that translates source code into machine code. • A decentralized and tamper-proof digital ledger technology. • Fake media created by the manipulation of real media by AI. • A wired networking technology for local area networks (LANs). • The number of bits transmitted per second in a digital signal. • ...
Eeskujud ja antieeskujud 2020-01-27
Across
- Valgemütsid ehk...
- Kes on Cyber Security Network asjutaja?
- Vene häkker, kes pettis välja passi ja pankade võltsingutega?
- Kes on infoturbe juht Xeroxis?
- Ristsõna autori perekonna nimi on...
- Mustad mütsid ehk...
- Hallimütsid ehk...
- Kes on tundtud nime all DynamicWebPaige?
Down
- Kes on esimese arvutiviiruse looja?
- Kes on endine CIA ja DIA töötaja?
- Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
- Kes on töödanud koos Steve Jobsiga?
- Kes on USA küberturbe uurija?
- Kes on Austraalia internetiaktivist ja ajakirjanik?
- Mille asutasid Steve Jobs ja Steve Wozniak?
15 Clues: Valgemütsid ehk... • Hallimütsid ehk... • Mustad mütsid ehk... • Kes on USA küberturbe uurija? • Kes on infoturbe juht Xeroxis? • Kes on endine CIA ja DIA töötaja? • Kes on esimese arvutiviiruse looja? • Kes on töödanud koos Steve Jobsiga? • Ristsõna autori perekonna nimi on... • Kes on Cyber Security Network asjutaja? • Kes on tundtud nime all DynamicWebPaige? • ...
Robotics vocab 2021-01-12
Across
- such as eBay® or PayPal®
- the illegal obtaining, giving or selling of passwords
- a form of cybercrime where offensive letters are sent through e-mail
- stealing money or property using interstate wire communication; considered a federal crime
- software programs which spread from computer to computer and are malicious in nature
- refer to TV, radio or the Internet; means of communication
- Internet harassment
- take advantage of kids by using instant messaging, e-mail and social network sites
- This is used to protect our IP symbols
- designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- software installed discreetly which alters the usability of a computer
- security measure used on today’s Internet which insures the data is secure
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Used to protect designed IP
- federal regulatory body which monitors and deals with identity theft
Down
- (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- an individual who alters electronics legally
- involves fraudulent e-mails pretending to originate from banks or online O
- someone who illegally alters computer hardware or breaches computer systems
- when someone steals personal information to commit fraud or other crimes
- any crime involving computers
- Way to protect a written IP
- the illegal stealing, copying or spreading of media including software, movies and music
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
24 Clues: Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • Used to protect designed IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • refer to TV, radio or the Internet; means of communication • ...
Password Cracking 2024-04-08
Across
- String of characters for authentication and log on computer, web app, software, files, network, etc
- OS in which John the ripper, and other Cyber security tools come pre-installed("-" in middle)
- Attack uses a list of commonly used passwords to try to gain unauthorized access
- Unique Identifier used before a password to Login, and not usually considered Confidential
- John the Ripper tool was initially built for which OS?
- Open source reporting and collaboration tool for Documentation and Reporting in Cyber Security projects
- What is the full form of Fi in Wifi
- "- the Ripper". In the name of this tool, who is the Ripper
- Evil Twin attack is a type of which attack? ("-" in middle)
- Commonly used set of utilities for analyzing networks for weaknesses.
Down
- World's most common alphabetic password in organizations usually for high-level access.(Lab password)
- Practice where thieves steal your personal data by spying over your shoulder as you use a laptop or ATM("-" in middle)
- Another name for web crawling
- More efficient version of a Brute Force Attack, when the attacker knows a pattern in the password.("-" in middle)
- The answer is in the name. This attack involved making assumptions on what the password might be
- This table is a hash function used in Cryptography for storing important data such as passwords
- Term for disguising passwords or other data using a reversible transformation
- What type of attack involves intercepting and analyzing network traffic to capture login credentials?
- Guessing possible combinations of a targetted password. Also known as Exhaustive search.("-" in middle)
- Process of guessing or recovering a password from stored data or transmission
20 Clues: Another name for web crawling • What is the full form of Fi in Wifi • John the Ripper tool was initially built for which OS? • "- the Ripper". In the name of this tool, who is the Ripper • Evil Twin attack is a type of which attack? ("-" in middle) • Commonly used set of utilities for analyzing networks for weaknesses. • ...
KKM Himatif 2023-09-14
Across
- Kepanjangan Dev dalam 'Devcom'
- IRC berfokus dalam bidang?
- Kepanjangan 'De' pada IdeA
- Cabang olahraga yang menjadi fokus IBC
- Huruf 'i' pada nama KKM IBT, IRC, dan IFC
- Huruf 'T' pada KKM IBT
- Huruf 'F' pada IFC
Down
- KKM yang mendalami bidang Software Engineering
- Komunitas yang berfokus dalam bidang cyber security
- Fokus olahraga pada KKM IBT
- KKM TI yang berfokus pada bidang design
- Jumlah total KKM yang ada di Himatif
- KKM yang bergerak dalam bidang olahraga futsal
- Jumlah KKM yang bergerak di bidang olahraga
- KKM yang bergerak di bidang Robotika?
15 Clues: Huruf 'F' pada IFC • Huruf 'T' pada KKM IBT • IRC berfokus dalam bidang? • Kepanjangan 'De' pada IdeA • Fokus olahraga pada KKM IBT • Kepanjangan Dev dalam 'Devcom' • Jumlah total KKM yang ada di Himatif • KKM yang bergerak di bidang Robotika? • Cabang olahraga yang menjadi fokus IBC • KKM TI yang berfokus pada bidang design • Huruf 'i' pada nama KKM IBT, IRC, dan IFC • ...
Eeskujud ja antieeskujud 2020-01-27
Across
- Mustad mütsid ehk...
- Kes on Austraalia internetiaktivist ja ajakirjanik?
- Kes on infoturbe juht Xeroxis?
- Vene häkker, kes pettis välja passi ja pankade võltsingutega?
- Valgemütsid ehk...
- Kes on endine CIA ja DIA töötaja?
- Hallimütsid ehk...
Down
- Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
- Kes on esimese arvutiviiruse looja?
- Mille asutasid Steve Jobs ja Steve Wozniak?
- Kes on USA küberturbe uurija?
- Kes on töödanud koos Steve Jobsiga?
- Kes on Cyber Security Network asjutaja?
- Kes on tundtud nime all DynamicWebPaige?
- Ristsõna autori perekonna nimi on...
15 Clues: Valgemütsid ehk... • Hallimütsid ehk... • Mustad mütsid ehk... • Kes on USA küberturbe uurija? • Kes on infoturbe juht Xeroxis? • Kes on endine CIA ja DIA töötaja? • Kes on esimese arvutiviiruse looja? • Kes on töödanud koos Steve Jobsiga? • Ristsõna autori perekonna nimi on... • Kes on Cyber Security Network asjutaja? • Kes on tundtud nime all DynamicWebPaige? • ...
IT Vocabulary KB 2024-04-24
Across
- The website creates new ideas.
- The city's earnings are above average.
- The restaurant serves many types of food.
- The manual explains clearly.
- The computer has a comfy typing surface.
- The project needs a large amount of financial support.
- Problems may happen unexpectedly.
Down
- Company leaders manage business.
- The boss gives a new plan.
- The CEO likes a prestigious name.
- The company checks information.
- New markets look promising.
- Security fights digital attacks.
- The organization runs daily operations constantly.
- The car fixes its machinery.
15 Clues: The boss gives a new plan. • New markets look promising. • The manual explains clearly. • The car fixes its machinery. • The website creates new ideas. • The company checks information. • Company leaders manage business. • Security fights digital attacks. • The CEO likes a prestigious name. • Problems may happen unexpectedly. • The city's earnings are above average. • ...
Data Safety 2025-07-23
Across
- Strength in numbers?
- cyber attack, often looking like trusted emails
- Information about a user
- tool to keep data safe
- User-activated malware that spreads
- training, on ethics of data, for example
- space that stores data (in the sky?)
- Act that protects student data, abr.
Down
- the quality of being private, as data should be
- Multi-factor authorization
- European law protecting internet security
- Person who reports unethical practices
- Must be gained before data is mined
- safe from loss or unauthorized use
- moral principles
15 Clues: moral principles • Strength in numbers? • tool to keep data safe • Information about a user • Multi-factor authorization • safe from loss or unauthorized use • Must be gained before data is mined • User-activated malware that spreads • space that stores data (in the sky?) • Act that protects student data, abr. • Person who reports unethical practices • ...
Cybersecurity Crossword Puzzle 2023-05-16
Across
- Weakness or flaw in a system that can be exploited by attackers.
- Science of secure communication using codes and ciphers.
- Isolated environment used for testing potentially malicious software.
- Authentication method that uses unique physical or behavioral characteristics.
- Software designed to harm or exploit computer systems.
- Process of verifying the identity of a user or s
- Virtual Private Network that provides secure and private communication over public networks.
- Decoy system designed to attract and monitor unauthorized access attempts.
- Network security device that monitors and filters incoming and outgoing network traffic.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- A secret word or phrase used for authentication and access control.
- Malicious code that replicates itself and infects computer systems.
Down
- Unauthorized access to computer systems or networks.
- Distributed Denial of Service attack that overwhelms a target system with traffic.
- Vulnerability or exploit that is unknown to software developers or security researchers.
- Cyber attack method that tricks users into revealing sensitive information.
- Process of converting information into a secret code to prevent unauthorized access.
- Malicious software that disguises itself as legitimate software.
- A hidden entry point into a system that bypasses normal security mechanisms.
- Criminal activities conducted over the internet.
- A person who uses their programming skills to gain unauthorized access to computer systems.
- Malicious software that encrypts files and demands a ransom for their release.
- Software update that fixes security vulnerabilities.
23 Clues: Criminal activities conducted over the internet. • Process of verifying the identity of a user or s • Unauthorized access to computer systems or networks. • Software update that fixes security vulnerabilities. • Software designed to harm or exploit computer systems. • Science of secure communication using codes and ciphers. • ...
CB1 2018-08-03
Across
- ____ security; protection of systems from theft or damage to hardware, software or electronic data
- new head honcho
- real-time settlement funds transfer system
- csp ____
- central securities depository; settles equities, munis, corporate bonds, etc.
- US govt debt, shortest maturity
- account balance is negative
Down
- contingency site
- fraudulent email designed to reveal information
- 9/10 arrangement
- first president; alternatively $100
- messaging system
- process whereby securities are delivered, usually against payment
- program to facilitate clearing & settlements
- system that provides connectivity to a range of swift services
15 Clues: csp ____ • new head honcho • contingency site • 9/10 arrangement • messaging system • account balance is negative • US govt debt, shortest maturity • first president; alternatively $100 • real-time settlement funds transfer system • program to facilitate clearing & settlements • fraudulent email designed to reveal information • ...
IT Vocabulary KB 2024-04-24
Across
- The website creates new ideas.
- The city's earnings are above average.
- The restaurant serves many types of food.
- The manual explains clearly.
- The computer has a comfy typing surface.
- The project needs a large amount of financial support.
- Problems may happen unexpectedly.
Down
- Company leaders manage business.
- The boss gives a new plan.
- The CEO likes a prestigious name.
- The company checks information.
- New markets look promising.
- Security fights digital attacks.
- The organization runs daily operations constantly.
- The car fixes its machinery.
15 Clues: The boss gives a new plan. • New markets look promising. • The manual explains clearly. • The car fixes its machinery. • The website creates new ideas. • The company checks information. • Company leaders manage business. • Security fights digital attacks. • The CEO likes a prestigious name. • Problems may happen unexpectedly. • The city's earnings are above average. • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
RU ITEC411 Crime and Security 2025-10-18
Across
- (2 words) a type of hacker who behaves destructively/unethically.
- The manipulation of people into violating security protocols.
- A cyber attack in which a server or service is overwhelmed with requests.
- (2 words) a type of hacker who behaves constructively, improving security and demonstrating vulnerabilities.
- Software allowing future access to a machine by bypassing security checks.
- Software that attaches to another program. Often replicates.
- (2 words) websites/servers meant to be attractive to hackers for study.
- Malware that holds your files cryptographically hostage pending payment.
- An organization created in response to the Internet Worm incident.
Down
- Malware that logs user activities and sends it to a server.
- Performing acts of technical expertise; has been used both positively and negatively over time.
- (2 words) Malware that appears benign but hides malicious behavior.
- Written defamation.
- The act of hacking for a political cause.
- Verbal defamation
- A group of computers with a virus allowing them to cooperate over a server.
- Luring users to fake sites for the collection of personal data.
- Sending mass messages attempting to steal information.
- An independent piece of software that attempts to replicate to nearby vulnerable systems.
- An act passed in the 1980s, made it illegal to read/copy federally-involved computer systems.
20 Clues: Verbal defamation • Written defamation. • The act of hacking for a political cause. • Sending mass messages attempting to steal information. • Malware that logs user activities and sends it to a server. • Software that attaches to another program. Often replicates. • The manipulation of people into violating security protocols. • ...
Test Crossword (Hexacorp) 2020-05-07
Networking and Cyber Ethics Crossword Puzzle 2025-06-21
Across
- Network confined to a small area
- Unwanted email
- File that records your browsing data
- Unsecured wireless network risk
- A global network of computers
- Data traveling on a network
- bullying Sending harmful or abusive messages online
- Address Your unique address on the Internet
- Set of rules for communication between devices
- Protects computers from unauthorized access
Down
- An act of gaining unauthorized access
- Malicious software
- Hacker Person who protects networks from attacks
- Ethics Ethical use of digital resources
- High-speed internet connection
- Keeping data safe and private
- Identity theft technique using fake websites
- Connecting two or more computers
- A device that connects multiple networks
19 Clues: Unwanted email • Malicious software • Data traveling on a network • Keeping data safe and private • A global network of computers • High-speed internet connection • Unsecured wireless network risk • Network confined to a small area • Connecting two or more computers • File that records your browsing data • An act of gaining unauthorized access • ...
Robotics vocab 2021-01-12
Across
- such as eBay® or PayPal®
- the illegal obtaining, giving or selling of passwords
- a form of cybercrime where offensive letters are sent through e-mail
- stealing money or property using interstate wire communication; considered a federal crime
- software programs which spread from computer to computer and are malicious in nature
- refer to TV, radio or the Internet; means of communication
- Internet harassment
- take advantage of kids by using instant messaging, e-mail and social network sites
- This is used to protect our IP symbols
- designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- software installed discreetly which alters the usability of a computer
- security measure used on today’s Internet which insures the data is secure
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Used to protect designed IP
- federal regulatory body which monitors and deals with identity theft
Down
- (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- an individual who alters electronics legally
- involves fraudulent e-mails pretending to originate from banks or online O
- someone who illegally alters computer hardware or breaches computer systems
- when someone steals personal information to commit fraud or other crimes
- any crime involving computers
- Way to protect a written IP
- the illegal stealing, copying or spreading of media including software, movies and music
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
24 Clues: Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • Used to protect designed IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • refer to TV, radio or the Internet; means of communication • ...
E-Ethics 2021-01-12
Across
- cyber crime
- the illegal obtaining, giving or selling of passwords
- Used to protect designed (say an invention or a door knob) IP
- - someone who illegally alters computer hardware or breaches computer
- take advantage of kids by using instant messaging, e-mail and social network sites
- federal regulatory body which monitors and deals with identity theft
- involves fraudulent e-mails pretending to originate from banks or online O
- any crime involving computers
- This is used to protect our IP symbols
- when someone steals personal information to commit fraud or other crimes
- security measure used on today’s Internet which insures the data is secure
- can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening Harassment
- stealing money or property using interstate wire communication; considered a federal crime
- software installed discreetly which alters the usability of a computer
Down
- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- modifying electronics such as an Xbox®, cell phone, or iPod®
- nature
- Internet harassment
- Way to protect a written IP
- a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints
- to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- an individual who alters electronics legally
- the illegal stealing, copying or spreading of media including software, movies and music
- such as eBay® or PayPal®
- a form of cybercrime where offensive letters are sent through e-mail
- software programs which spread from computer to computer and are malicious
26 Clues: nature • cyber crime • Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • modifying electronics such as an Xbox®, cell phone, or iPod® • ...
ITS2210 Module 7 Crossword 2019-04-12
Across
- This type of loss is the most likely damage to occur in an act of cyber terrorism
- Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- Hacking conducted for ideological purposes
- Using the Internet to terrorize someone or some group of individuals
- Accessed to find postings from or about your target
- The most popular search engine used to gather personal information
- Cyber criminals can use your personal information to guess these
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- Linux stores these logs at the following location /var/log/mail.*
Down
- This virus is an example of domestic cyber terrorism
- This command shows any shared files that are open
- This type of warfare often involves propaganda and disinformation campaigns
- This website has been a focus of identity theft criminals to gain access to personal data and pictures
- This type of "data" is data relevant to an investigation
- The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- A political group that has used the internet for political intimidation
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- This conflict in 1990 had a cyber warfare component
- The NSA and ______ have allegedly had one of their cyber spies caught
20 Clues: Hacking conducted for ideological purposes • This command shows any shared files that are open • Accessed to find postings from or about your target • This conflict in 1990 had a cyber warfare component • This virus is an example of domestic cyber terrorism • This type of "data" is data relevant to an investigation • ...
Cyber Security Month Crossword 2022-09-23
Across
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- A digital form of social engineering to deceive individuals into providing sensitive information.
- A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- Facebook, Twitter, Instagram, etc. (Two words)
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- Software that compromises the operation of a system by performing an unauthorized function or process.
Down
- Widely used in-home network technololy that allows for wireless connection.
- A security tool that creates a secure, encrypted connection between you and the internet
- A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
- The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- An unauthorized user who attempts to or gains access to an information system.
15 Clues: Facebook, Twitter, Instagram, etc. (Two words) • Widely used in-home network technololy that allows for wireless connection. • An unauthorized user who attempts to or gains access to an information system. • A security tool that creates a secure, encrypted connection between you and the internet • ...
Types of threats 2019-01-09
Across
- surfing atching an authorized user enter a security code on a keypad.
- A destructive computer program that bores its way through a computer's files
- A piece of code that is capable of copying itself
- A type of Malware that locates
- prevents the program from running as expected
- n attacker entering a secured building by following an authorized employee
- When someone deceives by pretending to be someone else
- a cyber-security attacker to take control
Down
- Advertising-supported software
- data that ransome gets paid to remove
- An attack that sends an email or displays a Web announcement that falsely claims
- pro quo Criminals promise a service in exchange for details
- Program that hides in a computer
- Collection of captured bot computers
- Criminals make a promise of goods in return for details
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
Cyber Security Words and Terms 2022-09-15
Across
- A secret word or phrase that is used to access a computer system or service.
- Text that can be read by the human eye, like this article!
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A simple form of code for software that can be written in word editors.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- The deliberate use of someone else's identity, typically for financial gain.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The programs and other operating systems used by a computer.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Software that has their code listed as free to use, share, and modify.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
20 Clues: Text that can be read by the human eye, like this article! • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service. • ...
IT Networking / Cyber Security term 2025-03-29
Across
- – Fraudulent attempt to steal.
- (Domain Name System) – Translates domains into IP.
- – Wired network connection standard.
- Authentication (2FA) – Extra security verification step.
- – Small unit of data.
- (Service Set Identifier) – Wi-Fi network name.
- – Converts data into code.
- Server – Acts as intermediary gateway.
- – Malicious software program.
- (Dynamic Host Configuration Protocol) – Assigns IP automatically.
- (Distributed Denial of Service) – Overloads network with requests.
Down
- – Checks network connectivity.
- – Secures data using cryptography.
- (Virtual Private Network) – Secure network over internet.
- – Filters unauthorized network traffic.
- – Connects different network segments.
- Detection System (IDS) – Monitors suspicious network activity.
- Mask – Defines IP address range.
- – Directs data to devices.
- Trust – Never trust, always verify.
- – Internet's fundamental communication protocol.
- Address – Unique hardware device identifier.
- – Delay in data transmission.
- Address – Identifies devices on network.
- – Maximum data transfer rate.
25 Clues: – Small unit of data. • – Directs data to devices. • – Converts data into code. • – Delay in data transmission. • – Maximum data transfer rate. • – Malicious software program. • – Checks network connectivity. • – Fraudulent attempt to steal. • Mask – Defines IP address range. • – Secures data using cryptography. • Trust – Never trust, always verify. • ...
Foundations of Cyber Security I 2025-02-13
Across
- The act of making sure every individual working with an information system has specific responsibilities for information assurance.
- A process that gives a user permission to do certain things.
- A three-pronged system of cybersecurity.
- Ciphers that break down information into fixed-size blocks before encrypting it.
- Software that displays unwanted advertising while running an application on your computer.
- A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
- A guarantee of reliable access to information.
- A device that helps join two separate computer networks together to allow for communication.
- A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
- A security technique used to regulate who or what can utilize the resources of a computer system.
- Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
- A process that measures how much information has been accessed or the amount of time spent on a session.
- The governance, development, and maintenance of computer programs.
- A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
- The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
- One that is physically isolated from the internet and only able to pass data along via removable media.
- A process or set of rules.
- The use of human characteristics to distinctly identify individuals as themselves.
- A process that keeps a system secure by physically isolating it from all unsecured networks.
- An orderly search for nonvolatile data storage to load the OS.
20 Clues: A process or set of rules. • A three-pronged system of cybersecurity. • A guarantee of reliable access to information. • A process that gives a user permission to do certain things. • An orderly search for nonvolatile data storage to load the OS. • The governance, development, and maintenance of computer programs. • ...
Cyber Security 2 Chapter 4 2025-10-13
Across
- The 'I' in the CIA Triad, ensuring that data is not altered or destroyed in an unauthorized manner.
- A software update that fixes a vulnerability.
- An algorithm used to encrypt and decrypt data.
- The raw text or data before it is encrypted.
- The art of writing and solving codes.
- The standard for secure, encrypted communication on the internet, replacing SSL. (abbreviation)
- A file maintained by a server that contains information about all the activities that have occurred on that server.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Software that secretly monitors a user's online activity.
- A secret key used in cryptography.
- A flaw or weakness in a program.
- A network that uses public telecommunication infrastructure, such as the internet, to provide remote offices with secure access to their organization's network (abbreviation).
- A network of connected devices within a specific geographic area. (abbreviation)
- The process of converting encrypted data back into its original, readable form.
Down
- The result of encrypting plaintext.
- A small program that can be embedded in a website or document.
- A program that replicates itself over a network.
- A type of malicious software that collects information about a person or organization without their knowledge.
- A mathematical scheme for demonstrating the authenticity of a digital message or document. (2 words)
- A technique used by attackers to make their network traffic look like it came from a legitimate source.
- A digital document used to prove the ownership of a public key. (2 words)
- The main circuit board of the computer.
- A physical object, such as a token or smart card, used to authenticate a user.
23 Clues: A flaw or weakness in a program. • A secret key used in cryptography. • The result of encrypting plaintext. • The art of writing and solving codes. • The main circuit board of the computer. • The raw text or data before it is encrypted. • A software update that fixes a vulnerability. • An algorithm used to encrypt and decrypt data. • ...
FY2025 Cyber Security Training 2024-11-05
Across
- Don't click without _____.
- The number of principles the GDPR requires companies to adhere to.
- A piece of evidence a user must produce to verify they are an account’s true owner.
- BEC means Business ____ Compromise.
- On average Parker blocks 32 ____ attempts to access Parker Networks.
- _____, unique passwords are best practice.
Down
- This is voice phishing.
- This is something you are, including fingerprints or facial recognition.
- _____ Data means any data relating to a living individual who is or can be identified from the data itself.
- Before leaving your workstation, you should always do this to the area.
- Text message phishing.
- Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
- CEO fraud is one of the most common forms of this.
- Designed to damage devices or exploit them for sensitive information and access.
14 Clues: Text message phishing. • This is voice phishing. • Don't click without _____. • BEC means Business ____ Compromise. • _____, unique passwords are best practice. • CEO fraud is one of the most common forms of this. • The number of principles the GDPR requires companies to adhere to. • On average Parker blocks 32 ____ attempts to access Parker Networks. • ...
Crossword 2024-05-28
Across
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- A method of trying to gather personal information using deceptive e-mails and websites.
- A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
- A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
- A device or software application that monitors a network or systems for malicious activity or policy violations.
- A cyber attack that occurs on the same day a vulnerability is discovered in software.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A service that encrypts your internet traffic and protects your online identity.
Down
- Malicious software designed to harm, exploit, or otherwise compromise a computer system.
- An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
- A trial-and-error method used to decode encrypted data such as passwords.
- An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A code injection technique that might destroy your database.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
- A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
20 Clues: A code injection technique that might destroy your database. • A trial-and-error method used to decode encrypted data such as passwords. • A service that encrypts your internet traffic and protects your online identity. • A cyber attack that occurs on the same day a vulnerability is discovered in software. • ...
Cyber Ethics 2025-06-16
Across
- hacking hacking done for a good cause
- crime criminal activities
- malicious software
- set of programs that disrupts the functioning
- combination of voice and phishing
Down
- bombing sending bulk emails till the server gets full
- a security system that prevents unauthorised access
- unwanted bulk emails
- simplest way of preventing plagiarism
- Law legal rules on online users
10 Clues: malicious software • unwanted bulk emails • crime criminal activities • Law legal rules on online users • combination of voice and phishing • hacking hacking done for a good cause • simplest way of preventing plagiarism • set of programs that disrupts the functioning • a security system that prevents unauthorised access • bombing sending bulk emails till the server gets full
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Positions ideal for individuals with more than five years of experience
- A trail of data intentionally left behind by a user
- Store information across pages within the site
- Crime that involves a computer and/or a network
- Describes the digital environment in which computer networks communicate
- Software that automatically displays or downloads advertising material
- A type of malicious software
- Links two or more devices
- Someone who uses the internet to cause harm to a victim
- Online harassment that uses electronic communication
- Web browser feature
Down
- Someone who uses a computer to gain access to systems or networks
- Internet connection that encrypts traffic from a device to a private network
- A standalone self-replicating software application that invades and destroys computers
- Do not share ____________ across multiple sites
- Software that allows an attacker to obtain information on another computer
- Personally identifiable information
- Malicious attempts by hackers to damage, steal, or destroy a computer
- ___________ engineering is when an attacker manipulates someone into revealing information
- Attacker sends fraudulent emails to deceive someone into revealing information
- Software designed to disrupt, damage, or gain unauthorized access to a computer
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Do not share ____________ across multiple sites • Crime that involves a computer and/or a network • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
Inari Medical Cyber Security Crossword 2023-05-12
Across
- If you get a suspicious email, do not _____ it to your coworkers.
- Don't _____ your credentials with anyone!
- Only install apps/software from _____ sources (Apple App Store, Google Play).
- Use Multi-Factor _____ (MFA) whenever possible.
- Use the _____ Alert Button in your Outlook client to report phishy emails.
- Lock your _____ when you walk away by using the Windows + L keys on your keyboard.
- Use a _____, unique password for all of your accounts.
- Throw sensitive/confidential documents in the designated _____ bins to keep your information safe.
- Report any _____ activity or security incidents to your IT department ASAP.
- Keep your computer and software __-__-____.
Down
- If you _____ something, say something.
- Don't store _____ information in non-secure places.
- Don't write your _____ on post-it notes!
- Keep your passwords _____.
- Be a _____ firewall!
- Don't click on links or download _____ from unknown senders.
- Use a VPN connection when using public _____ networks.
- Think before you _____.
- Don't _____ to phishy emails. Just delete them instead.
- Phishing attempts can also be sent via _____ message.
- Be careful not to share your _____ information on social media.
21 Clues: Be a _____ firewall! • Think before you _____. • Keep your passwords _____. • If you _____ something, say something. • Don't write your _____ on post-it notes! • Don't _____ your credentials with anyone! • Keep your computer and software __-__-____. • Use Multi-Factor _____ (MFA) whenever possible. • Don't store _____ information in non-secure places. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
CSAT Cyber Security Checkpoint 2026 2026-03-16
Across
- Check your texts closely
- Verifying Identity
- Your computer is sick
- Longer is Stronger
- Not the kind from the ocean
- Interconnected web of computers
- Cyber vigilance
- Scrambled for security
- Virtual storage in the sky
- Your data is stolen
- An SMS text phish
- What you should do when you suspect a phish
- AI-generated deception
- DTCC password manager
- DTCC Technology launching in July
Down
- Voice trickery that sounds fishy
- A malicious QR Code
- Retina scans and fingerprints
- Don't use unsecured public ______
- Spyware-ransomware-viruses
- Malicious software holding data hostage
- Wears a black hat
- The new DTCC MFA process
- Triggers to make you click
- A fence provides this
- You entered your login info in a fake site
- What you should do with all links
- Blocks malicious connections
- Used to be called SATEC
- Last name of our CISO
30 Clues: Cyber vigilance • Wears a black hat • An SMS text phish • Verifying Identity • Longer is Stronger • A malicious QR Code • Your data is stolen • Your computer is sick • A fence provides this • Last name of our CISO • DTCC password manager • Scrambled for security • AI-generated deception • Used to be called SATEC • Check your texts closely • The new DTCC MFA process • Spyware-ransomware-viruses • ...
Risks of Emerging Technology 2025-10-03
Across
- Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
- Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
- Automation errors, lack of human oversight, cyber vulnerabilities
- Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
- Security of virtual environments, fraud in immersive platforms, and privacy issues
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
- Potential to break current cryptographic systems which may lead to data breaches and fraud
9 Clues: Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities. • ...
Malware and cyber security 2023-11-22
Across
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- a malicious form of self-replicating software.
- Providing customer service online
- a large collection of malware-infected devices
- a piece of software that appears to perform a useful function but actually performs malicious actions.
- software that is designed to gain access to your computer with malicious intent.
- record every keystroke made by a user.
- Bots are automated programs that perform tasks repeatedly.
- An email that is disguised in order to trick them into givingup valuable data.
Down
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- software that monitors and gathers information on a person and how they use their computer.
- attacker watching the victim while they provide sensitive information.
- spread through the network and use the system’s resources.
- Monitoring the prices of items to find the best deal
14 Clues: Providing customer service online • record every keystroke made by a user. • a malicious form of self-replicating software. • a large collection of malware-infected devices • Monitoring the prices of items to find the best deal • spread through the network and use the system’s resources. • Bots are automated programs that perform tasks repeatedly. • ...
Types of threats 2019-01-09
Across
- A piece of code that is capable of copying itself
- Program that hides in a computer
- surfing atching an authorized user enter a security code on a keypad.
- n attacker entering a secured building by following an authorized employee
- a cyber-security attacker to take control
Down
- data that ransome gets paid to remove
- When someone deceives by pretending to be someone else
- Advertising-supported software
- A destructive computer program that bores its way through a computer's files
- Criminals make a promise of goods in return for details
- An attack that sends an email or displays a Web announcement that falsely claims
- A type of Malware that locates
- pro quo Criminals promise a service in exchange for details
- prevents the program from running as expected
- Collection of captured bot computers
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
DIPLOMACY AND FOREIGN POLICY 2026-03-15
10 Clues: to try to find sth • make sth with skill • covering a wide area • to carry out an action • a belief that is incorrect • to increase the amount of sth • to choose to follow a strategy • to demand a requirement in a contract • to change to suit different conditions • protection of data from digital attacks
FITE 2013-05-16
Across
- stores info. on internet servers
- central processing unit/speed of computer
- 1000 gigabytes
- cyber security
- two things that can be used together
- a document having a present format, used as a starting point
- the close up or preview of a template
- 1000 terabytes
- input
- output
- something you attach to your computer
- smallest unit of data
- internet connection
- printed circuit that is the foundation of a computer
- domain
- a port formed by IBM connecting a mouse or keyboard to a PC
- protection of anyones work
- computer screen
- search internet for specific info.
- programs given to a computer to do a direct operation
- internet and online world
Down
- arrangement of graphic matters
- slogan
- quoting a reference to an athourity
- specific, easier
- processing of powering up your computer
- cyber safety
- connects to the internet
- internet service/Comcast
- program that lets you interact with your computer
- random access memory
- search engine that checks all search engines
- a socket in a microcomputer that will accept a plug-in circuit board
- wired internet
- programs designed for a special need or purpose
- hardware connection
- provides data to other computers
- the way you behave online
- logo
- main storage media device that permanently stores all data on computer
- provides a variety of channels of data over a single communication medium
- series of instructions given to a computer to do a certain task
- 1000 petabytes
- a brief account of ones profession
- the wiring making up a computer system
- SSID
- 1000 kilobytes
47 Clues: logo • SSID • input • slogan • output • domain • cyber safety • 1000 gigabytes • cyber security • 1000 terabytes • wired internet • 1000 petabytes • 1000 kilobytes • computer screen • specific, easier • hardware connection • internet connection • random access memory • smallest unit of data • connects to the internet • internet service/Comcast • the way you behave online • internet and online world • ...
Reportable Information 2025-04-24
Across
- A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.
- __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
- A potential risk indicator for person living above his means
- An employee who hates his job to the point of aggression
- A security compromise, infraction, or violation
Down
- Security incidents are categorized as either a security infraction or a security ______
- _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
- The ability and opportunity to gain knowledge of classified information.
- Denies adversaries information about friendly capabilities, activities, limitations, and intentions that adversaries need to make competent operational decisions. (Acronym)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
10 Clues: A security compromise, infraction, or violation • An employee who hates his job to the point of aggression • A potential risk indicator for person living above his means • The ability and opportunity to gain knowledge of classified information. • Security incidents are categorized as either a security infraction or a security ______ • ...
