cyber security Crossword Puzzles

cybercrime 2024-11-09

cybercrime crossword puzzle
Across
  1. Virus or worm code hidden within a seemingly harmless program
  2. Theft Stealing another person’s identity to impersonate them online
  3. Fake messages asking for sensitive information
  4. Protection Protecting children from inappropriate online content
  5. Act of unauthorized copying or using someone's content
  6. Fake sites mimicking real ones to steal information
  7. Passwords, PINs, and fingerprints used for digital security
  8. Protecting data and systems from cyber attacks
  9. Software designed to harm or exploit computers
  10. Common scam emails that trick people into sharing private info
  11. Attacks aimed at disrupting or disabling a network
Down
  1. Financial theft through hacking or scams
  2. Law-breaking activities online
  3. The backbone of online communications targeted by cybercriminals
  4. Method of verifying identity online, often in two steps
  5. Tracking software that monitors user activity without consent
  6. Criminals who exploit security weaknesses online
  7. Testing Breaking into a system to test its defenses legally
  8. Program that spreads across computers, copying itself
  9. Illegal access to systems without permission

20 Clues: Law-breaking activities onlineFinancial theft through hacking or scamsIllegal access to systems without permissionFake messages asking for sensitive informationProtecting data and systems from cyber attacksSoftware designed to harm or exploit computersCriminals who exploit security weaknesses onlineAttacks aimed at disrupting or disabling a network...

Cyber Commons 2025-09-11

Cyber Commons crossword puzzle
Across
  1. Market incentive for cybersecurity investment
  2. IAD rule type defining who can participate
  3. An example of IAD tools
  4. Cybersecurity ecosystem with shared risk
  5. IAD outcome measuring long-term viability
  6. Framework used to analyze institutional governance
  7. Security standard for credit card data
  8. Commons resource used to authenticate websites
Down
  1. Commons resources are non-excludable but…?
  2. Rules governing daily decisions
  3. Social capital for AI models
  4. Example of Cyber Commons
  5. Threat information sharing institution
  6. Organization that manages CVEs
  7. Vulnerability Scoring System
  8. Property right in IAD
  9. An outcome analyzed by IAD
  10. Commons governance scholar who challenged Hardin
  11. Vulnerability identifier

19 Clues: Property right in IADAn example of IAD toolsExample of Cyber CommonsVulnerability identifierAn outcome analyzed by IADSocial capital for AI modelsVulnerability Scoring SystemOrganization that manages CVEsRules governing daily decisionsThreat information sharing institutionSecurity standard for credit card data...

networking concept and cyber ethics 2025-05-29

networking concept and cyber ethics crossword puzzle
Across
  1. Protects computers from hackers
  2. information Do not share this online
  3. A network without wires
  4. ethics Use of computers ethically and legally
  5. Keeping computer data safe
  6. Strong way to protect accounts
  7. Device that joins multiple computers
  8. Device that connects the network
  9. addresses Unique addresses for each device
  10. Type of network that covers a small area
  11. Wireless technology standard
  12. Connects LAN to Internet
Down
  1. Criminal activities using computers
  2. C Shortcut for copy
  3. Software to harm or damage a computer
  4. bullying Sending rude messages online
  5. Very large network of networks
  6. Act of accessing a system without permission
  7. Rules for communication in a network
  8. network Connects computers together

20 Clues: A network without wiresConnects LAN to InternetKeeping computer data safeWireless technology standardC Shortcut for copyVery large network of networksStrong way to protect accountsProtects computers from hackersDevice that connects the networkCriminal activities using computersDevice that joins multiple computers...

ggvv 2016-03-03

ggvv crossword puzzle
Across
  1. social
  2. extrot
  3. collect
  4. macbeh
  5. banq
  6. explore
  7. song- Art song
  8. theatron
  9. Germny
  10. mask
  11. incest
Down
  1. pucci
  2. recreation
  3. tional
  4. out out
  5. abduct
  6. Schubert- Franz
  7. reqqq
  8. rex- rex
  9. cyber

20 Clues: banqmaskpuccireqqqcybersocialtionalextrotmacbehabductGermnyincestcollectexploreout outtheatronrex- rexrecreationsong- Art songSchubert- Franz

jases crossword puzzel 2026-01-16

jases crossword puzzel crossword puzzle
Across
  1. Footprint its all the stuff you have every done
  2. like a phone or something
  3. interaction with others to get stuff
  4. chain
Down
  1. where something is not working
  2. security people that try to steal money
  3. durable equipment
  4. marketing uses online networks like social media
  5. application programming interface
  6. where people try to steal money from you

10 Clues: chaindurable equipmentlike a phone or somethingwhere something is not workingapplication programming interfaceinteraction with others to get stuffsecurity people that try to steal moneywhere people try to steal money from youFootprint its all the stuff you have every donemarketing uses online networks like social media

SynopTech No. 4: Cyber Risks in Central Banking 2022-10-28

SynopTech No. 4: Cyber Risks in Central Banking crossword puzzle
Across
  1. Central banks are adopting risk-based and _____-focused approach
  2. Phishing attacks involve the mass distribution of _____ e-mail messages with deceitful addresses
  3. _____ is one of the most common method of cyber attack
  4. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
  5. Financial institutions are now shifting to cloud adoption and increased _____ working
Down
  1. Phishing is an attempt to obtain sensitive _____
  2. Data breaches cam hamper _____ and accessibility
  3. Financial institutions should oversee _____ phishing simulations or exercises

8 Clues: Phishing is an attempt to obtain sensitive _____Data breaches cam hamper _____ and accessibility_____ is one of the most common method of cyber attackCentral banks are adopting risk-based and _____-focused approachFinancial institutions should oversee _____ phishing simulations or exercises...

Cyber Security Challenge - Crossword 2013-08-28

Cyber Security Challenge - Crossword crossword puzzle
Across
  1. A browser window that appears on top of another window, often to show advertisements
  2. A person who breaks into computers to view and possibly change information they shouldn't access
  3. Pool of private sector consultants approved by CESG to provide IA advice to government
  4. Solution that prevents recursive domain nameserver (DNS)
  5. Information security arm of GCHQ
  6. REMOTE CAPS approved encryption device part of AEP SCP solution
Down
  1. Service that helps private sector companies develop cryptographic products for use by HMG
  2. Technology protocol for securing IP communications
  3. Group of computers networked together over a public network - the internet
  4. Hack used to make pharmaceutical sales appear higher in the Google search results
  5. Program in which malicious or harmful code is contained within
  6. Government agencies use this AEP solution for CAPS approved data remote access
  7. Coordination of the internets naming system
  8. Secure Communications legacy protocol (hand out)
  9. The attackers masquerade as a trusted system to try to persuade you to send secret information to them

15 Clues: Information security arm of GCHQCoordination of the internets naming systemSecure Communications legacy protocol (hand out)Technology protocol for securing IP communicationsSolution that prevents recursive domain nameserver (DNS)Program in which malicious or harmful code is contained within...

Cyber Threats and Security 2025-02-04

Cyber Threats and Security crossword puzzle
Across
  1. Capturing data while it is being transmitted over a network.
  2. Overloading a server with excessive traffic to disrupt service.
  3. Redirecting users to fake websites to steal personal data.
  4. Deceptive attack tricking users into revealing sensitive information.
  5. Security method using physical traits like fingerprints or facial recognition.
  6. Restricting system access based on user roles.
  7. Extra security layer requiring two authentication factors.
  8. Software that detects and removes malicious programs.
Down
  1. Malware disguised as legitimate software to trick users.
  2. An intermediary server between users and websites for security and privacy.
  3. Secret string of characters used for authentication.
  4. System that filters and blocks unauthorized network traffic.
  5. Repeatedly guessing passwords to gain unauthorized access.
  6. Malware that secretly collects user information without consent.
  7. Manipulating people into giving away confidential information.

15 Clues: Restricting system access based on user roles.Secret string of characters used for authentication.Software that detects and removes malicious programs.Malware disguised as legitimate software to trick users.Redirecting users to fake websites to steal personal data.Repeatedly guessing passwords to gain unauthorized access....

Cyber Security Awareness Month 2024-10-28

Cyber Security Awareness Month crossword puzzle
Across
  1. An attempt to gain unauthorized access to data or systems.
  2. A device used to intercept and record network traffic.
  3. Secret combination used to secure your online accounts.
  4. A secret key generated from cryptographic processes for authentication.
  5. Software that protects a computer from unauthorized access via the internet.
  6. An attack that overloads a system to prevent legitimate access.
  7. A cyber-attack where a user is tricked into giving sensitive information.
  8. The process of verifying your identity before accessing an account.
  9. This security practice hides data so only authorized parties can read it.
Down
  1. The process of making a network secure from unauthorized access.
  2. Type of malware that demands payment to release control of your device.
  3. The act of guessing someone’s password by trying common words.
  4. Unwanted or junk email often containing phishing links.
  5. Network of infected computers controlled by an attacker.
  6. An individual who uses their skills to protect networks.

15 Clues: A device used to intercept and record network traffic.Secret combination used to secure your online accounts.Unwanted or junk email often containing phishing links.Network of infected computers controlled by an attacker.An individual who uses their skills to protect networks.An attempt to gain unauthorized access to data or systems....

Information and Cyber Security 2022-10-21

Information and Cyber Security crossword puzzle
Across
  1. 560,000 pieces of … are detected every day
  2. One of the biggest cybersecurity breaches so far
  3. An attack that uses text messaging or short message service (SMS)
  4. The combination of something you have, something you know, and something you are to gain access
  5. Be ...
  6. Anti- ...
  7. These attacks typically target a CEO, CFO, or any CXX
  8. UK cyber crime has … in the past 5 years
Down
  1. What type of attacks are on the rise
  2. What BHSF does to train colleagues to look out for phishing attacks
  3. The key to securing your accounts
  4. Time it takes a hacker to brute force a 6 character password
  5. The term used for a broad range of malicious activities accomplished through human interactions
  6. Virtual Private …
  7. Hackers demanded this company cancel the planned release of a film

15 Clues: Be ...Anti- ...Virtual Private …The key to securing your accountsWhat type of attacks are on the riseUK cyber crime has … in the past 5 years560,000 pieces of … are detected every dayOne of the biggest cybersecurity breaches so farThese attacks typically target a CEO, CFO, or any CXXTime it takes a hacker to brute force a 6 character password...

Cyber Security crossword puzzle 2025-03-12

Cyber Security crossword puzzle crossword puzzle
Across
  1. Harmful software like viruses or worms.
  2. Tricking users into revealing sensitive info.
  3. Verifying a user's identity.
  4. Hidden access to a system.
  5. Blocks unauthorized network access.
  6. Manipulating people to leak info.
  7. Converts data into an irreversible code.
Down
  1. Adds a second verification step.
  2. Converts data into a secure code.
  3. Secretly collects user data.
  4. Hacked computers used for attacks.
  5. Malware disguised as a normal file.
  6. Locks files and demands payment.
  7. Hides IP and encrypts internet traffic.
  8. Attack Guessing passwords repeatedly.

15 Clues: Hidden access to a system.Secretly collects user data.Verifying a user's identity.Adds a second verification step.Locks files and demands payment.Converts data into a secure code.Manipulating people to leak info.Hacked computers used for attacks.Malware disguised as a normal file.Blocks unauthorized network access....

cyber ethics and security 2025-06-06

cyber ethics and security crossword puzzle
Across
  1. It is a law under which the owners are granted certain exclusive rights to ensure that the creator's hardwork is safe and protected from unauthorized copying and piracy.
  2. It is a wireless technology used to interconnect mobile phones, computers and printers.
  3. It refers to an illegal intrusion into a computer system or network.
  4. It is a combination of two terms, net and etiquette.
  5. You purchased a single licensed copy of the software and load it into several computers contrary to the license's terms.
  6. It refers to unwanted bulk emails that come from unknown sources.
  7. It connects two or more computers located at distant places.
  8. It is the criminal practice of using social influences over the telephone system, most often using VoIP.
Down
  1. This device connects two different types of networks with each other.
  2. It refers to criminal activities that involve the use of computers, networks and the internet connection with the intent to cause harm to individuals or their digital devices.
  3. It refers to a computer network restricted to an organization.
  4. These are unethical people who are experts in breaking into systems to steal important data.
  5. It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc. are connected and communicate with each other.
  6. It refers to the act of using or imitating the language and thoughts of another person as one's original work.
  7. It enables you to connect your computer to the available internet connection over the existing telephone lines.

15 Clues: It is a combination of two terms, net and etiquette.It connects two or more computers located at distant places.It refers to a computer network restricted to an organization.It refers to unwanted bulk emails that come from unknown sources.It refers to an illegal intrusion into a computer system or network....

Cyber Attack Groups (Expert) 2023-06-01

Cyber Attack Groups (Expert) crossword puzzle
Across
  1. Bear Another Russian state-sponsored group, APT29 is known for its sophisticated and stealthy cyber espionage campaigns. They have targeted governments, think tanks, and diplomatic organizations.
  2. They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack.
  3. This Chinese cyber attack group operates both for personal gain and state interests. They engage in cyber espionage, financially motivated attacks, and supply chain compromises, targeting a wide range of industries globally.
  4. Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries.
  5. Originating from Vietnam, APT32 has been involved in cyber espionage campaigns targeting Southeast Asian countries, particularly focusing on political, media, and human rights organizations.
Down
  1. Linked to North Korea, Lazarus Group has conducted several notable cyber attacks, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware attack. They have targeted financial institutions, critical infrastructure, and cryptocurrency exchanges.
  2. This advanced persistent threat group targets individuals in the hospitality industry, mainly executives and high-profile business travelers, using sophisticated social engineering and zero-day exploits to gain access to their devices and networks.
  3. Widely believed to be associated with the United States' National Security Agency (NSA), Equation Group is known for developing and deploying highly sophisticated cyber weapons, including the Stuxnet worm and various advanced persistent threats (APTs).
  4. also known as FIN7 or Anunak, is a financially motivated cyber criminal group that has targeted banks, hospitality, and retail sectors. They are known for their sophisticated hacking techniques and large-scale data breaches.

9 Clues: They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack.Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries....

security+J 2024-04-25

security+J crossword puzzle
Across
  1. software and operating system (OS) updates that address security vulnerabilities within a program or product
  2. when cybercriminals breach a private network, steal valuable data and hold the information hostage
  3. put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
  4. sites that are not indexed and only accessible via specialized web browsers
  5. an important factor in the determination of the risk of a threat actor. Highly ___________ threat actors are more likely to be successful if an attack is launched. Less _________ attackers have a lower probability of an attack being successful should it be launched
  6. a sovereign territory with one group of individuals who share a common history
Down
  1. typically involves a cyber criminal stealing data from personal or corporate devices, such as computers and mobile phones, through various cyberattack methods
  2. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
  3. a person or test result that is incorrectly classified as positive (as for the presence of a health condition) because of imperfect testing methods or procedures
  4. a cybersecurity approach that uses existing infrastructure and controls to secure endpoints, rather than deploying people

10 Clues: sites that are not indexed and only accessible via specialized web browsersa sovereign territory with one group of individuals who share a common historywhen cybercriminals breach a private network, steal valuable data and hold the information hostage...

Ict internet security by kiesha 2023-03-28

Ict internet security by kiesha crossword puzzle
Across
  1. is a unique string of numbers that identifies a device connected to the internet
  2. malware that appears harmless but can perform malicious actions on an infected device once downloaded or opened
  3. software is designed to detect, prevent, and remove malware infections on computers and other devices
  4. Its aim is often to steal sensitive information or gain access to a computer system
  5. Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system
  6. A system or collection of systems operating under a consistent security policy that defines the classification, releasability and special handling caveats for data processed within the domain.
  7. The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.
  8. A computer that provides services to users or other systems. For example, a file server, email server or database server.
  9. when people who have been doing a skilled type of job are replaced by technology requiring operator with less skill, thereby saving the company money
  10. An agreed standard for secure communication between two or more entities to provide confidentiality, integrity, authentication and non-repudiation of data
  11. A sequence of characters used for authentication.
  12. A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and ICT equipment.
Down
  1. system-specific security documentation
  2. a type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  3. working fewer hour per week than people usually do
  4. The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of an adversary finding an exploitable security vulnerability.
  5. a type of malware that can collect and transmit private user information without the user’s knowledge or consent
  6. voice over internet protocol
  7. a type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
  8. when people change their job by learning the new skill necessary for another job

20 Clues: voice over internet protocolsystem-specific security documentationA sequence of characters used for authentication.working fewer hour per week than people usually dois a unique string of numbers that identifies a device connected to the internetwhen people change their job by learning the new skill necessary for another job...

Cybersecurity 2025-04-17

Cybersecurity crossword puzzle
Across
  1. Redirecting users to fake websites to steal personal information.
  2. programs disguised as legitimate software.
  3. A type of cyber attack tricking you into revealing personal information.
  4. The act of spying over someone's shoulder to steal information.
  5. Software that shows unwanted ads.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. A program that can replicate itself to spread.
  3. software that locks your files and demands payment.
  4. Security authentication using unique biological traits like fingerprints or facial recognition.
  5. Lying or deceiving to gain information online.
  6. A program that replicates itself to spread across computers without human interaction.
  7. software that secretly gathers user information.

12 Clues: Software that shows unwanted ads.programs disguised as legitimate software.A program that can replicate itself to spread.Lying or deceiving to gain information online.software that secretly gathers user information.software that locks your files and demands payment.The act of spying over someone's shoulder to steal information....

Cybersecurity Awarness - Security at Home 2025-10-08

Cybersecurity Awarness - Security at Home crossword puzzle
Across
  1. A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
  2. Security intended to protect devices like laptops, desktops, and mobile phones.
  3. Routine practices and steps users take to maintain system health and improve security.
  4. A Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
Down
  1. The process of identifying, evaluating, and prioritizing risks to organizational assets.
  2. Mechanisms that restrict access to systems, data, and resources.
  3. Manipulating people into divulging confidential information or performing actions that compromise security.
  4. A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
  5. A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
  6. Determines what an authenticated user is allowed to do within a system.

10 Clues: Mechanisms that restrict access to systems, data, and resources.Determines what an authenticated user is allowed to do within a system.Security intended to protect devices like laptops, desktops, and mobile phones.Routine practices and steps users take to maintain system health and improve security....

BrainRiddle 2025-02-05

BrainRiddle crossword puzzle
Across
  1. The process of verifying the identity of a user or system.
  2. The study of analyzing and breaking cryptographic algorithms.
  3. The process of removing software restrictions on a device to gain full control.
  4. The practice of updating software to fix security vulnerabilities.
  5. A security feature ensuring only trusted software runs during startup.
  6. The process of identifying, managing, and mitigating cybersecurity threats.
  7. The process of collecting and analyzing data to prevent cyber threats.
Down
  1. A cyberattack where an attacker secretly intercepts communication.
  2. A cryptographic technique used to verify the authenticity of data.
  3. The use of hacking techniques for political or social activism.
  4. A program or code that takes advantage of a vulnerability in a system.
  5. A hidden method of bypassing security controls to gain unauthorized access.
  6. Software embedded in hardware that controls low-level device operations.
  7. An advanced computing paradigm that can break classical encryption.
  8. A type of malware that records keystrokes to steal passwords and data.

15 Clues: The process of verifying the identity of a user or system.The study of analyzing and breaking cryptographic algorithms.The use of hacking techniques for political or social activism.A cyberattack where an attacker secretly intercepts communication.A cryptographic technique used to verify the authenticity of data....

TTS Seputar Komputer dan Masyarakat 2020-11-04

TTS Seputar Komputer dan Masyarakat crossword puzzle
Across
  1. Technology / Bahasa Inggris dari Teknologi Informasi.
  2. Draw / Aplikasi yang berguna dalam image creating.
  3. / Penggunaan jaringan komputer dalam menunjang system informasi membawa pengaruh terhadap hampir semua aspek dalam pengelolaan bisnis disebut dengan?
  4. / Sekelompok manusia yang terjalin erat karena sistem tertentu, tradisi tertentu, konvensi dan hukum tertentu yang sama, serta mengarah pada kehidupan kolektif.
  5. / Merupakan salah satu contoh data yang disebarkan dengan kejahatan Doxing yang lainnya.
  6. / Perangkat elektronik yang memanipulasi informasi atau data.
  7. / Salah satu jenis dari Cyber Bullying.
  8. Diri / Meyakinkan pada kemampuan dan penilaian (judgement) diri sendiri dalam melakukan tugas dan memilih pendekatan yang efektif.
  9. Merupakan bagian dari e-business, dimana cakupannya lebih luas daripada e-business.
Down
  1. / Singkatan dari Computer Security Incident Response Team.
  2. / Sosial Media.
  3. horse / Salah satu contoh dari Cyber Crime.
  4. Sosial / Sebuah gerakan kontemporer yang bertujuan mempengaruhi masyarakat luas guna mencapai suatu kesadaran tertentu merupakan arti dari?
  5. / Julukan dari artis pada sosial media Twitter.
  6. / Istilah Teknologi Informasi dalam bahasa Inggris yang mengacu kepada kelas tertinggi dari komputer yang terdiri dari komputer-komputer yang mampu melakukan banyak tugas komputasi yang rumit dalam waktu yang singkat.
  7. / Penyebaran informasi pribadi orang lain tanpa izin terutama di dunia maya merupakan definisi dari?
  8. / Sekelompok orang yang menggunakan keahliannya dalam hal komputer untuk melihat, menemukan dan memperbaiki kelemahan sistem keamanan dalam sebuah sistem komputer ataupun dalam sebuah software.
  9. / Merupakan salah satu contoh data yang disebarkan dengan kejahatan Doxing.
  10. Crime / Bentuk kejahatan baru yang menggunakan internet sebagai media untuk melakukan tindak kejahatan engan munculnya era internet.
  11. / Julukan dari artis pada sosial media Instagram.

20 Clues: / Sosial Media./ Salah satu jenis dari Cyber Bullying.horse / Salah satu contoh dari Cyber Crime./ Julukan dari artis pada sosial media Twitter./ Julukan dari artis pada sosial media Instagram.Draw / Aplikasi yang berguna dalam image creating.Technology / Bahasa Inggris dari Teknologi Informasi....

Infosec 2021-07-07

Infosec crossword puzzle
Across
  1. ____________allows continuity of business in terms of data availability in case of disaster
  2. In QualityKiosk, Emails should be used for _____ use only
  3. In QualityKiosk, password must be _____ characters
  4. What refers to the protection of information from unauthorized modification or destruction
  5. What A is CIA Triad
  6. _____ is the most common delivery method for viruses
  7. As per password policy, password should be changed within ______ days
  8. An _______ can be the result of unusual circumstances as well as the violation of existing policies and procedures of QualityKiosk
Down
  1. What consists of code developed by cyber attackers, designed to cause extensive damage to data and systems, or to gain unauthorized access to a network
  2. Social engineering is trick used by an attacker to access ______ information
  3. _______ is one of the social engineering attacks that targets victims computer
  4. ______ helps protect your computer against malware and viruses
  5. What is the highest level of information classification defined at QK?
  6. The first step in security awareness is being able to ______ a security threat
  7. Poor security can place information at ___

15 Clues: What A is CIA TriadPoor security can place information at ___In QualityKiosk, password must be _____ characters_____ is the most common delivery method for virusesIn QualityKiosk, Emails should be used for _____ use only______ helps protect your computer against malware and viruses...

Steve’s Scripted Disaster and My Forensics Fiasco! 2024-09-06

Steve’s Scripted Disaster and My Forensics Fiasco! crossword puzzle
Across
  1. The person who had to fix Steve’s mess
  2. The platform where customer profiles were compromised
  3. The security measure Steve failed to understand
  4. When you should ask for help
Down
  1. The type of cyber security incident Steve inadvertently made easier
  2. What should be followed to avoid such mistakes
  3. What Steve tried to write to change customer settings
  4. What Steve deleted to cover up his mistake
  5. A key mistake: skipping this before taking action

9 Clues: When you should ask for helpThe person who had to fix Steve’s messWhat Steve deleted to cover up his mistakeWhat should be followed to avoid such mistakesThe security measure Steve failed to understandA key mistake: skipping this before taking actionWhat Steve tried to write to change customer settings...

Cyber Security Crossword 2022-10-11

Cyber Security Crossword crossword puzzle
Across
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  2. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  3. A software that scans a device or a network to detect security threats
  4. A flaw or weakness that can be used to attack a system or organization
  5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. An audio or video clip that has been edited and manipulated to seem real or believable
  2. A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
  3. A secret word or phrase that is used to access a computer system or service
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
  5. An internet version of a home address for your computer

10 Clues: An internet version of a home address for your computerA software that scans a device or a network to detect security threatsA flaw or weakness that can be used to attack a system or organizationA secret word or phrase that is used to access a computer system or service...

cyber security crossword 2024-02-21

cyber security crossword crossword puzzle
Across
  1. America's cyber defense agency
  2. hackers want to things, data and
  3. attack with text messages
  4. look at this before clicking
  5. data, and delicious
  6. a fake video of someone
Down
  1. person hacker sometimes claims to be
  2. attack through malicious emails
  3. think before you do this
  4. African royalty

10 Clues: African royaltydata, and deliciousa fake video of someonethink before you do thisattack with text messageslook at this before clickingAmerica's cyber defense agencyattack through malicious emailshackers want to things, data andperson hacker sometimes claims to be

Cyber Security Puzzle 2025-06-30

Cyber Security Puzzle crossword puzzle
Across
  1. Extra copies of computer files that can be used to restore files that are lost or damaged.
  2. Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
  3. An unauthorized user who attempts to or gains access to an information system.
  4. Software designed to block malware from entering protected networks.
  5. A mechanism for creating a secure connection between a computing device and a computer network.
  6. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
  1. A string of characters used to authenticate and identity.
  2. A flaw or weakness in an information system that could be exploited.
  3. part of internet that is not indexed by search engines.
  4. A computer program that can block, detect and remove viruses and other malware.

10 Clues: part of internet that is not indexed by search engines.A string of characters used to authenticate and identity.A flaw or weakness in an information system that could be exploited.Software designed to block malware from entering protected networks.An unauthorized user who attempts to or gains access to an information system....

Cyber Security Puzzles 2025-02-27

Cyber Security Puzzles crossword puzzle
Across
  1. Information about yourself that bullies might use to hurt you
  2. Spreading untrue stories online to hurt someone
  3. What you should do with doubtful online information
  4. Sharing this online can help a cyberbully find you at home
Down
  1. Being a good friend online
  2. What a cyberbully is not
  3. A secret word that keeps bullies out of your accounts
  4. What you should tell a trusted adult about a bullying strange
  5. What cyberbullies do when they use your private info to hurt you
  6. What a bully tries to do

10 Clues: What a cyberbully is notWhat a bully tries to doBeing a good friend onlineSpreading untrue stories online to hurt someoneWhat you should do with doubtful online informationA secret word that keeps bullies out of your accountsSharing this online can help a cyberbully find you at homeInformation about yourself that bullies might use to hurt you...

GKCU Cyber Security 2025-10-21

GKCU Cyber Security crossword puzzle
Across
  1. What emails are labeled from outside the CU
  2. What scammers do when they send deceptive emails to trick users into clicking malicious links.
  3. When a bad actor makes an email look like it’s from a trusted source by changing the display name or headers
  4. One of our golden rules: “___ but Verify
  5. Always hover over this before you click to check where it really goes.
Down
  1. Phone call–based scams where attackers impersonate someone to get information or money.
  2. a short verb meaning to confirm
  3. What you often shouldn’t open without confirming the sender — it can carry malware.
  4. The action you should take when you suspect a message is a scam.
  5. SMS-based phishing — text messages that try to trick you into clicking a malicious link.

10 Clues: a short verb meaning to confirmOne of our golden rules: “___ but VerifyWhat emails are labeled from outside the CUThe action you should take when you suspect a message is a scam.Always hover over this before you click to check where it really goes.What you often shouldn’t open without confirming the sender — it can carry malware....

cyber security awareness 2025-10-29

cyber security awareness crossword puzzle
Across
  1. Keep your software __________ to stay safe
  2. Don't Share this number with strangers
  3. Protect your computer from viruses
  4. Don't share your ______information online
  5. A device used to connect to the internet
Down
  1. A harmful program that can damage files
  2. Stealing someone's personal information online
  3. A secret word used to login
  4. Network of network
  5. Unwanted or Junk mails

10 Clues: Network of networkUnwanted or Junk mailsA secret word used to loginProtect your computer from virusesDon't Share this number with strangersA harmful program that can damage filesA device used to connect to the internetDon't share your ______information onlineKeep your software __________ to stay safeStealing someone's personal information online

Information Security 2 - Test Review 2018-11-22

Information Security 2 - Test Review crossword puzzle
Across
  1. something different from what you expect; a problem
  2. a kind of malware that gathers information about what you do on your computer
  3. Websites get this to prove they are safe
  4. part of a CV where you talk about computer related skills you have (9/6)
  5. a person who designs and implements security systems (cyber security ____)
  6. to put a plan into action
Down
  1. a phishing scam which targets an executive or high level manager
  2. how much money you earn
  3. someone pretending to be someone else
  4. another name for this job is 'ethical hacker' (11/6)
  5. message authentication _______
  6. the criminal name for illegally downloading material from the internet
  7. make connections with other people

13 Clues: how much money you earnto put a plan into actionmessage authentication _______make connections with other peoplesomeone pretending to be someone elseWebsites get this to prove they are safesomething different from what you expect; a problemanother name for this job is 'ethical hacker' (11/6)...

Procurement Law Puzzlers! 2026-03-18

Procurement Law Puzzlers! crossword puzzle
Across
  1. CG’s risk threshold: “all _________ risk”
  2. New suite of construction delivery methods.
  3. Second measure of harm.
  4. Plain Language word for “Shall”
  5. Official Chocolate of the Office of the Chief Counsel
  6. Queen of all USACE Districts
  7. Current COFC PLA Precedent (short name)
  8. The “R” in RFO
Down
  1. GAO case on equitable tolling.
  2. ASBCA Discovery should be Relevant and ___________.
  3. Celebrity who used NAU toilet.
  4. New Cyber Security Requirements
  5. Procurement Incubator Authority
  6. The Formula for calculating legal risk.
  7. ASBCA Rule for Decision without a hearing (number)
  8. First measure of harm.
  9. USACE Dinosaur Name

17 Clues: The “R” in RFOUSACE Dinosaur NameFirst measure of harm.Second measure of harm.Queen of all USACE DistrictsGAO case on equitable tolling.Celebrity who used NAU toilet.New Cyber Security RequirementsPlain Language word for “Shall”Procurement Incubator AuthorityThe Formula for calculating legal risk.Current COFC PLA Precedent (short name)...

ICT Processes and Cybersecurity 2022-11-10

ICT Processes and Cybersecurity crossword puzzle
Across
  1. Makes systems access easier
  2. ERP module for logging all support tickets
  3. Verifying the identity of a user
  4. A type of social engineering
  5. Log ticket here without ERP credentials
Down
  1. Secret word or phrase
  2. Cyber security protects them
  3. Redirecting unresolved service request
  4. Type of priority of a service request
  5. Only for emergency service requests

10 Clues: Secret word or phraseMakes systems access easierCyber security protects themA type of social engineeringVerifying the identity of a userOnly for emergency service requestsType of priority of a service requestRedirecting unresolved service requestLog ticket here without ERP credentialsERP module for logging all support tickets

Cyber Security Crossword 2024-07-09

Cyber Security Crossword crossword puzzle
Across
  1. Software flaw
  2. Converts data into a coded form for security
  3. Unwanted email messages
  4. Malicious software disrupts, damages, or gains unauthorized access.
  5. Password guessing attack
Down
  1. Deceptive emails to steal information
  2. Controls traffic entering and leaving a network
  3. Self-replicating malware
  4. Network of infected computers
  5. overwhelms network with traffic
  6. Harmful software disrupts or steals data

11 Clues: Software flawUnwanted email messagesSelf-replicating malwarePassword guessing attackNetwork of infected computersoverwhelms network with trafficDeceptive emails to steal informationHarmful software disrupts or steals dataConverts data into a coded form for securityControls traffic entering and leaving a network...

DOT - Cyber Security 2022-06-15

DOT - Cyber Security crossword puzzle
Across
  1. Gathers sensitive information that involves both social engineering and email
  2. Malware that infects and spreads through files and links together with social engineering
  3. Malware that locks data and encrypts it to allowing hackers commit fraud
  4. Malware that works like a virus, but can infect devices on it's own and through software vulnerabilities
Down
  1. A text file stored on your device used for logging into websites, storing preferences, and viewing history
  2. An attack that aims to make a service, or website, unusable by 'flooding' it with malicious traffic
  3. Malware that gathers information from a person, or business, by violating privacy
  4. Malware that infects devices through suspicious files and links
  5. A tool used to mask your online identity by redirecting and encrypting your data before it is sent
  6. Malware that infects devices with multiple, intrusive, ads and slows overall performance

10 Clues: Malware that infects devices through suspicious files and linksMalware that locks data and encrypts it to allowing hackers commit fraudGathers sensitive information that involves both social engineering and emailMalware that gathers information from a person, or business, by violating privacy...

Cyber security crossword 2025-07-10

Cyber security crossword crossword puzzle
Across
  1. : Strengthening security configurations of systems
  2. : Approved list of trusted entities or applications
  3. : Formal examination of security policies and systems
  4. : Decoy network set up to detect unauthorized access
  5. : Using multiple backup systems to prevent failure
Down
  1. : Separating systems to prevent security breaches
  2. : Simulating software or hardware to test security
  3. : Making data intentionally difficult to interpret
  4. : Gaining higher privileges within a system
  5. : Ensuring data remains accurate and unaltered

10 Clues: : Gaining higher privileges within a system: Ensuring data remains accurate and unaltered: Separating systems to prevent security breaches: Strengthening security configurations of systems: Simulating software or hardware to test security: Making data intentionally difficult to interpret: Using multiple backup systems to prevent failure...

Cyber Security Crossword 2019-12-20

Cyber Security Crossword crossword puzzle
Across
  1. What allow a visited website to store its own information about a user on the user's computer?
  2. Key logger is a ........
  3. Phishing is a form of ..........
Down
  1. What describes programs that can run independently travel from system to system and disrupt computer communication?
  2. To hide information inside a picture, what technology is used?
  3. The first computer virus is ........
  4. What is the best keyword for taking advantage of a weakness in the security of an IT system?
  5. When a person is harassed repeatedly by being followed, called or be written to he/she is a target of .........
  6. A virus that migrates freely within a large population of unauthorized email user is called a ........
  7. A packet with no flags set is which type of scan?

10 Clues: Key logger is a ........Phishing is a form of ..........The first computer virus is ........A packet with no flags set is which type of scan?To hide information inside a picture, what technology is used?What is the best keyword for taking advantage of a weakness in the security of an IT system?...

Cyber Security Puzzle 2023-10-10

Cyber Security Puzzle crossword puzzle
Across
  1. Helps protect your computer from Malware
  2. The worst type of Horse
  3. The authenticator app is an example of?
  4. Technique to turn information into a secret form
  5. Phishing messages delivered by QR-Code
  6. Which month is cyber Awareness Month?
Down
  1. Malicious software that encrypts data without the user's permission
  2. Short for suspicious software
  3. Phishing messages delivered by SMS
  4. Who is the first defence against Cyber Attacks

10 Clues: The worst type of HorseShort for suspicious softwarePhishing messages delivered by SMSWhich month is cyber Awareness Month?Phishing messages delivered by QR-CodeThe authenticator app is an example of?Helps protect your computer from MalwareWho is the first defence against Cyber AttacksTechnique to turn information into a secret form...

cyber security awareness 2024-10-10

cyber security awareness crossword puzzle
Across
  1. A string of characters
  2. the term used for various pop-ups
  3. Create strong passwords
  4. the practice of sending fraudulent communications
  5. focus on protecting data
Down
  1. any intrusive software developed
  2. footprint the trail of data you leave using internet
  3. the ability of a person to determine for themselves practices Create strong passwords
  4. a special name given to a person
  5. threats Any circumstance event to threat a person potentialyonline practices being aware of the nature of the possible threats

10 Clues: A string of charactersCreate strong passwordsfocus on protecting dataany intrusive software developeda special name given to a personthe term used for various pop-upsthe practice of sending fraudulent communicationsfootprint the trail of data you leave using internet...

SLC cyber security 2025-04-30

SLC cyber security crossword puzzle
Across
  1. bully online
  2. avoid public
  3. important login setting
  4. to take from someone online
  5. username, then --
  6. don't click suspicious
Down
  1. program to protect a computer
  2. troy
  3. don't pay in gift----
  4. message on phone

10 Clues: troybully onlineavoid publicmessage on phoneusername, then --don't pay in gift----don't click suspiciousimportant login settingto take from someone onlineprogram to protect a computer

Science, Technology, and Innovation MRG 2022-05-06

Science, Technology, and Innovation MRG crossword puzzle
Across
  1. Tesla’s autonomous vehicles are an example of:
  2. Fukushima and Chernobyl
  3. International relations through phones
  4. Cambiamento del Clima
  5. Laws of rivers and dams
  6. People who attach a solution to a problem
Down
  1. Boston dynamics turned Terminator
  2. France and Ukraine rely upon it
  3. Microscopes in International Relations
  4. COVAX
  5. Hacker Protection

11 Clues: COVAXHacker ProtectionCambiamento del ClimaFukushima and ChernobylLaws of rivers and damsFrance and Ukraine rely upon itBoston dynamics turned TerminatorMicroscopes in International RelationsInternational relations through phonesPeople who attach a solution to a problemTesla’s autonomous vehicles are an example of:

CYBER CROSSWORD 2025-10-07

CYBER CROSSWORD crossword puzzle
Across
  1. Secret word to log in
  2. Entering credentials to access a computer
  3. Online remote storage space
  4. Person who breaks into computer systems
  5. Group or network of infected computers
  6. Malware that spies on users
  7. Install new version of software
  8. Malware named after a wooden horse
  9. User with top privileges
Down
  1. Online message or letter
  2. Barrier blocking cyber attacks
  3. Main computer that hosts websites
  4. Code used for login security
  5. Turns plain data or text into secret code
  6. Information stored on a computer
  7. Connected group of computers
  8. Unauthorised system break in
  9. Self-spreading computer bug
  10. Payment demanded by attackers
  11. Fix to repair or cover a software bug

20 Clues: Secret word to log inOnline message or letterUser with top privilegesOnline remote storage spaceMalware that spies on usersSelf-spreading computer bugCode used for login securityConnected group of computersUnauthorised system break inPayment demanded by attackersBarrier blocking cyber attacksInstall new version of software...

Cybersecurity in Schools 2025-10-19

Cybersecurity in Schools crossword puzzle
Across
  1. The goal of teaching students about online safety and responsible behavior.
  2. People who gain unauthorized access to computer systems.
  3. School and home connections that are often easy targets for hackers.
  4. What the article suggests should include cybersecurity education.
  5. The entity the article says should help implement cybersecurity education.
  6. What schools should develop to respond to cyber threats.
  7. The sector most affected by cyberattacks, according to Microsoft research.
  8. Working together between schools, families, and the government to fight cyber threats.
Down
  1. The online space where students face increasing security risks.
  2. A type of cyberattack that locks data until a payment is made.
  3. Harmful software used by cybercriminals to damage or steal data.
  4. The practice of protecting systems and data from digital attacks.
  5. A scam where hackers trick people into revealing personal information.
  6. What students are increasingly using in classrooms instead of pen and paper.
  7. What teachers need before they can effectively teach cybersecurity.
  8. The dangers posed by cyberattacks.
  9. Key partners who should collaborate on cybersecurity education efforts.
  10. Sensitive information that hackers often try to steal from schools.

18 Clues: The dangers posed by cyberattacks.People who gain unauthorized access to computer systems.What schools should develop to respond to cyber threats.A type of cyberattack that locks data until a payment is made.The online space where students face increasing security risks.Harmful software used by cybercriminals to damage or steal data....

Winter Security Reminder Crossword 2025-11-14

Winter Security Reminder Crossword crossword puzzle
Across
  1. Deceptive email technique attackers use heavily during the holidays
  2. Abbreviation for layered login protection
  3. User ____ — don’t share them, even with “helpful” coworkers
  4. Something you shovel in winter — and what attackers try to bury clues under
  5. The season when people take time off — and attackers ramp up
  6. What systems can do when storage fills — or when employees forget updates
  7. What you lock before holiday leave — your computer included
  8. “____ actor” — an adversary attempting unauthorized access
  9. Essential item — don’t leave it in your car or desk
  10. Security mindset: think before you ___
Down
  1. Frozen form of precipitation and a reminder to be prepared for cyber ___
  2. Keep your data ____ by using strong multi-factor authentication
  3. The opposite of “hot,” also how users feel when security is ignored
  4. Frozen precipitation that also describes a flood of spam
  5. Ice forms here — and malware often hides here too (initials)
  6. Seasonal cue to refresh your passwords
  7. The second factor in “two factor authentication”
  8. A code you should never reuse

18 Clues: A code you should never reuseSeasonal cue to refresh your passwordsSecurity mindset: think before you ___Abbreviation for layered login protectionThe second factor in “two factor authentication”Essential item — don’t leave it in your car or deskFrozen precipitation that also describes a flood of spam...

#BeSecure Crossword 2023-10-20

#BeSecure Crossword crossword puzzle
Across
  1. Security tool that creates a secure, encrypted connection between the user and the internet
  2. Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
  3. A flaw or weakness in a computer system that could be exploited to violate the system security.
  4. Change it regularly! Don't store it in unsecure location and mix it up!
  5. Action you should take if you suspect you received a phishing email
  6. The most common cyberthreat you can encounter in the virtual world
  7. The process of taking plain text and scrambling it into an unreadable format
Down
  1. Verifying identity.
  2. Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
  3. An individual with computer skills who uses them to break into computer, systems and networks.
  4. A data privacy legal framework all European countries share.
  5. An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
  6. The address of a web page. Remember to check its validity before clicking on it!
  7. Strengthens login security by requiring an additional piece of information beyond your password

14 Clues: Verifying identity.A data privacy legal framework all European countries share.The most common cyberthreat you can encounter in the virtual worldAction you should take if you suspect you received a phishing emailChange it regularly! Don't store it in unsecure location and mix it up!...

Steve’s Scripted Disaster and My Forensics Fiasco! 2024-09-11

Steve’s Scripted Disaster and My Forensics Fiasco! crossword puzzle
Across
  1. The platform where customer profiles were compromised
  2. The person who had to fix Steve’s mess
  3. A key mistake: skipping this before taking action
  4. The security measure Steve failed to understand
Down
  1. What Steve tried to write to change customer settings
  2. The type of cyber security incident Steve inadvertently made easier
  3. What Steve deleted to cover up his mistake
  4. What should be followed to avoid such mistakes
  5. When you should ask for help

9 Clues: When you should ask for helpThe person who had to fix Steve’s messWhat Steve deleted to cover up his mistakeWhat should be followed to avoid such mistakesThe security measure Steve failed to understandA key mistake: skipping this before taking actionWhat Steve tried to write to change customer settings...

#BeSecure Crossword 2023-10-20

#BeSecure Crossword crossword puzzle
Across
  1. Security tool that creates a secure, encrypted connection between the user and the internet
  2. Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
  3. A flaw or weakness in a computer system that could be exploited to violate the system security.
  4. Change it regularly! Don't store it in unsecure location and mix it up!
  5. Action you should take if you suspect you received a phishing email
  6. The most common cyberthreat you can encounter in the virtual world
  7. The process of taking plain text and scrambling it into an unreadable format
Down
  1. Verifying identity.
  2. Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
  3. An individual with computer skills who uses them to break into computer, systems and networks.
  4. A data privacy legal framework all European countries share.
  5. An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
  6. The address of a web page. Remember to check its validity before clicking on it!
  7. Strengthens login security by requiring an additional piece of information beyond your password

14 Clues: Verifying identity.A data privacy legal framework all European countries share.The most common cyberthreat you can encounter in the virtual worldAction you should take if you suspect you received a phishing emailChange it regularly! Don't store it in unsecure location and mix it up!...

2022 Cyber Awareness Crossword Puzzle 2022-10-19

2022 Cyber Awareness Crossword Puzzle crossword puzzle
Across
  1. Use _______ thinking to discern disinformation
  2. What disinformation becomes when it gets spread by people who aren’t aware it’s fake
  3. According to nearly every study conducted over the last decade, _______________ is involved in the vast majority of cyber attacks. (Two Words)
  4. Our ongoing commitment to preventing unauthorized access, both externally and internally, to confidential information can be defined as ________
  5. Voice Phishing is called _______
  6. _____ save your login information when you’re using a web browser
  7. Security is only as strong as your weakest ________
Down
  1. Always ______ Enact’s security policies
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid; often starts with a phishing email
  3. Refers to the appropriate use of any data that is collected, stored, and transmitted
  4. Pay close attention to _____ especially on your mobile device where they may be hard to verify
  5. If something sounds too good to be true… there’s probably a _______ behind it
  6. Email classification for general business information shared with a customer
  7. Lost laptops, vishing phone calls, unbadged stranger in the building, are all examples of Security _________

14 Clues: Voice Phishing is called _______Always ______ Enact’s security policiesUse _______ thinking to discern disinformationSecurity is only as strong as your weakest _____________ save your login information when you’re using a web browserEmail classification for general business information shared with a customer...

Security Crossword 2025-10-29

Security Crossword crossword puzzle
Across
  1. the type of security you need to apply when on vacation
  2. the type of security when you're surfing the web
  3. Type of security that involves our buildings
  4. a document we put in place to force people to protect our research
  5. -An invisible helper that makes our lives better
Down
  1. A place where books are kept
  2. what you do when there's been an infraction

7 Clues: A place where books are keptwhat you do when there's been an infractionType of security that involves our buildingsthe type of security when you're surfing the web-An invisible helper that makes our lives betterthe type of security you need to apply when on vacationa document we put in place to force people to protect our research

Cyber Security Crossword 2022-08-22

Cyber Security Crossword crossword puzzle
Across
  1. You need to remediate these
  2. Never click on these links
  3. NEVER share this with anyone
  4. Software that locks your computer and you have to pay a fee to unlock it
Down
  1. a different type of system
  2. an operating system
  3. Always have this enabled
  4. This software is malicious
  5. the office you contact for anything cyber-security related
  6. You use this piece of technolocy to work

10 Clues: an operating systemAlways have this enableda different type of systemThis software is maliciousNever click on these linksYou need to remediate theseNEVER share this with anyoneYou use this piece of technolocy to workthe office you contact for anything cyber-security relatedSoftware that locks your computer and you have to pay a fee to unlock it

Cyber security HarryH 2022-11-21

Cyber security HarryH crossword puzzle
Across
  1. someone looks at your screen IRL
  2. It replicates itself and modifies programs
  3. A fake website that people enter important data into
  4. internet connected devices to steal data and send spam
  5. malware that threatens to leak your data
  6. connects the user’s device to a secure server, making the connection private.
Down
  1. malicious attempt to disrupt normal traffic
  2. message to trick someone to leaking information
  3. it checks incoming and outgoing traffic
  4. malware that misleads users of its true intent

10 Clues: someone looks at your screen IRLit checks incoming and outgoing trafficmalware that threatens to leak your dataIt replicates itself and modifies programsmalicious attempt to disrupt normal trafficmalware that misleads users of its true intentmessage to trick someone to leaking informationA fake website that people enter important data into...

Cyber Security Crossword 2021-02-12

Cyber Security Crossword crossword puzzle
Across
  1. A person who uses computers to gain unauthorized access to data
  2. Not having official permission or approval.
  3. Unwanted software that monitors and gathers information on a person and how they use their computer.
  4. A type of virus or worm that carries out a specific type of attack.
  5. Make sure or demonstrate that something is true, accurate, or justified.
Down
  1. Malware (malicious software) is software that is designed to gain access to your computer with malicious intent.
  2. A specific type of computer virus that tricks you into downloading it onto your computer.
  3. A set of numbers, letters and symbols to keep your devices and accounts locked.
  4. Adware can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  5. A malicious form of self replicating software.

10 Clues: Not having official permission or approval.A malicious form of self replicating software.A person who uses computers to gain unauthorized access to dataA type of virus or worm that carries out a specific type of attack.Make sure or demonstrate that something is true, accurate, or justified....

Cyber Security Crossword 2023-05-10

Cyber Security Crossword crossword puzzle
Across
  1. Pretending to be a Trusted Entity and Creating a Sense of Urgency
  2. A Code of Conduct on How to Behave Online
  3. References in a News Source to Confirm its Validity
  4. Family Parental Controls for Children
  5. A Layer of Protection For Device Usage
Down
  1. Checking Multiple Sources to Confirm Information
  2. Google Feature That Blocks Inappropriate Content
  3. Settings That Can Be Adjusted To Protect Personal Information
  4. A trap used to Deceive People into Giving Sensitive Information
  5. A Journalist's Perspective on a Fact

10 Clues: A Journalist's Perspective on a FactFamily Parental Controls for ChildrenA Layer of Protection For Device UsageA Code of Conduct on How to Behave OnlineChecking Multiple Sources to Confirm InformationGoogle Feature That Blocks Inappropriate ContentReferences in a News Source to Confirm its Validity...

Cyber Security (JW) 2023-04-21

Cyber Security (JW) crossword puzzle
Across
  1. Used to capture users information
  2. What information is made from
  3. _ of service
  4. A type of force attack
  5. An address used by computers
  6. A program written to cause damage to your computer
Down
  1. A tool used to block incoming threats from the internet
  2. A type of surfing to see someones password
  3. _ software in Malware
  4. A type of malware when bad code is hidden in what appears to be good program

10 Clues: _ of service_ software in MalwareA type of force attackAn address used by computersWhat information is made fromUsed to capture users informationA type of surfing to see someones passwordA program written to cause damage to your computerA tool used to block incoming threats from the internet...

Cyber Security Crossword 2022-10-11

Cyber Security Crossword crossword puzzle
Across
  1. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  2. A flaw or weakness that can be used to attack a system or organization
  3. A secret word or phrase that is used to access a computer system or service
  4. An internet version of a home address for your computer
  5. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  6. A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
  7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
Down
  1. A software that scans a device or a network to detect security threats
  2. An audio or video clip that has been edited and manipulated to seem real or believable
  3. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key

10 Clues: An internet version of a home address for your computerA software that scans a device or a network to detect security threatsA flaw or weakness that can be used to attack a system or organizationA secret word or phrase that is used to access a computer system or service...

Cyber Security Crossword 2023-05-10

Cyber Security Crossword crossword puzzle
Across
  1. Pretending to be a Trusted Entity and Creating a Sense of Urgency
  2. A Code of Conduct on How to Behave Online
  3. References in a News Source to Confirm its Validity
  4. Family Parental Controls for Children
  5. A Layer of Protection For Device Usage
Down
  1. Checking Multiple Sources to Confirm Information
  2. Google Feature That Blocks Inappropriate Content
  3. Settings That Can Be Adjusted To Protect Personal Information
  4. A trap used to Deceive People into Giving Sensitive Information
  5. A Journalist's Perspective on a Fact

10 Clues: A Journalist's Perspective on a FactFamily Parental Controls for ChildrenA Layer of Protection For Device UsageA Code of Conduct on How to Behave OnlineChecking Multiple Sources to Confirm InformationGoogle Feature That Blocks Inappropriate ContentReferences in a News Source to Confirm its Validity...

Cyber security crossword 2023-06-07

Cyber security crossword crossword puzzle
Across
  1. A self replicating computer program
  2. Rootkit is an example of this malware
  3. The do's and don'ts of online communication
  4. The meaning of latin word 'plagiarius' from which plagiarism was derived
  5. A set of related programs located at a network gateway server,that protects the resources of a private network from users of other networks
Down
  1. A type of software designed to protect against malware and other cyber threats.
  2. A type of malware that can spy on a computer user's activities
  3. Unwanted e-mail,generically
  4. Unauthorised use of software for temporary use
  5. a technological research and development Centre of Kerala Police Department conceived as a Cyber Centre of excellence

10 Clues: Unwanted e-mail,genericallyA self replicating computer programRootkit is an example of this malwareThe do's and don'ts of online communicationUnauthorised use of software for temporary useA type of malware that can spy on a computer user's activitiesThe meaning of latin word 'plagiarius' from which plagiarism was derived...

Cyber Security Week 2023-09-30

Cyber Security Week crossword puzzle
Across
  1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
  3. What is the process of converting information into a code to prevent unauthorized access?
  4. What is a secret combination of letters, numbers, and symbols used to access a system or account?
  5. What is the practice of protecting systems, networks, and programs from digital attacks?
  6. What is the practice of regularly updating software and systems to protect against known vulnerabilities?
  7. What type of software is designed to block unauthorized access while permitting authorized communication?
Down
  1. What is the act of pretending to be someone else to deceive or gain access to information?
  2. What is a deceptive email or website designed to trick individuals into revealing personal information?
  3. What is a set of security rules and policies that govern the use of an organization's information technology resources?

10 Clues: What is the practice of protecting systems, networks, and programs from digital attacks?What is the process of converting information into a code to prevent unauthorized access?What is the act of pretending to be someone else to deceive or gain access to information?...

Cyber Security Awareness 2024-06-15

Cyber Security Awareness crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. A network of private computers infected with malicious software and controlled as a group.
  3. Unauthorized access to or manipulation of a computer.
  4. A program designed to damage or do other unwanted actions on a computer.
  5. The process of verifying the identity of a person or device.
Down
  1. The practice of protecting information by transforming it into an unreadable format.
  2. Software designed to gather information about a person or organization without their knowledge.
  3. A type of malicious software that misleads users of its true intent.
  4. A type of cyberattack where the attacker impersonates someone else via email.
  5. Malicious software designed to block access to a computer until a sum of money is paid.

10 Clues: Unauthorized access to or manipulation of a computer.The process of verifying the identity of a person or device.A type of malicious software that misleads users of its true intent.A program designed to damage or do other unwanted actions on a computer.A type of cyberattack where the attacker impersonates someone else via email....

Cyber Security Quiz 2025-09-25

Cyber Security Quiz crossword puzzle
Across
  1. Your files are locked & the price to unlock them isn't cheap.
  2. You think you're visiting a safe site, but you're not.
  3. Someone's secretly listening between two trusted parties.
  4. Guessing passwords one by one until something cracks.
  5. A script sneaks into a webpage and messes with users.
Down
  1. An exploit that strikes before anyone knows it exists.
  2. A database gets manipulated when queries aren't properly sanitized.
  3. Reusing stolen logins across multiple sites—hoping for a match.
  4. Trickery in your inbox—looks legit, but it's bait.
  5. Too many requests—your server can't breathe.

10 Clues: Too many requests—your server can't breathe.Trickery in your inbox—looks legit, but it's bait.Guessing passwords one by one until something cracks.A script sneaks into a webpage and messes with users.An exploit that strikes before anyone knows it exists.You think you're visiting a safe site, but you're not....

ITS2210 Module 7 Crossword P 2019-04-12

ITS2210 Module 7 Crossword P crossword puzzle
Across
  1. This virus is an example of domestic cyber terrorism
  2. This type of loss is the most likely damage to occur in an act of cyber terrorism
  3. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  4. A political group that has used the internet for political intimidation
  5. This website has been a focus of identity theft criminals to gain access to personal data and pictures
  6. This conflict in 1990 had a cyber warfare component
  7. Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
  8. Hacking conducted for ideological purposes
  9. Accessed to find postings from or about your target
Down
  1. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
  2. This command shows any shared files that are open
  3. This type of "data" is data relevant to an investigation
  4. Using the Internet to terrorize someone or some group of individuals
  5. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  6. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
  7. This type of warfare often involves propaganda and disinformation campaigns
  8. The NSA and ______ have allegedly had one of their cyber spies caught
  9. Cyber criminals can use your personal information to guess these
  10. The most popular search engine used to gather personal information
  11. Linux stores these logs at the following location /var/log/mail.*

20 Clues: Hacking conducted for ideological purposesThis command shows any shared files that are openThis conflict in 1990 had a cyber warfare componentAccessed to find postings from or about your targetThis virus is an example of domestic cyber terrorismThis type of "data" is data relevant to an investigation...

Technologia 2025-10-26

Technologia crossword puzzle
Across
  1. Telepon pintar dengan OS mobile untuk komunikasi dan aplikasi produktivitas
  2. Teknologi nirkabel untuk konektivitas internet tanpa kabel
  3. Google ....,Lembar kerja untuk analisis data, formula, dan visualisasi informasi
  4. Google ....,Peta digital untuk navigasi dan menemukan lokasi secara real-time
  5. .... Security, Protection system dari cyber attack, hacking, dan data breach
  6. Perangkat gaming dedicated untuk experience immersive dengan graphics tinggi
  7. Google ....,Penyimpanan cloud aman untuk backup dan berbagi file digital
  8. Google ....,Aplikasi pengolah dokumen teks secara online dengan kolaborasi tim
  9. Perangkat layar sentuh portabel untuk hiburan, baca e-book, dan kerja ringan
  10. Bahasa pemrograman high-level untuk web development, data science, dan AI
Down
  1. .... Reality, Headset untuk experience immersive dalam lingkungan digital 3D interaktif
  2. Software malicious seperti virus, ransomware, dan spyware yang merusak sistem
  3. Koneksi jaringan kabel dengan kecepatan tinggi dan stability optimal
  4. Google ....,Aplikasi catatan cepat dengan reminder dan sinkronisasi cloud
  5. Jam tangan pintar dengan sensor kesehatan, notifikasi, dan fitness tracking
  6. ahli komputer yang mengeksplorasi atau membobol sistem
  7. Google ....,Tool presentasi dengan fitur kolaborasi real-time dan template profesional
  8. Seni menulis instruksi programming untuk membuat software dan aplikasi
  9. Google ....,Platform video conference dengan fitur screen sharing dan recording
  10. Komputer lipat portabel dengan performa untuk kerja dan kreativitas mobile

20 Clues: ahli komputer yang mengeksplorasi atau membobol sistemTeknologi nirkabel untuk konektivitas internet tanpa kabelKoneksi jaringan kabel dengan kecepatan tinggi dan stability optimalSeni menulis instruksi programming untuk membuat software dan aplikasiGoogle ....,Penyimpanan cloud aman untuk backup dan berbagi file digital...

what is cyber security? 2022-12-10

what is cyber security? crossword puzzle
Across
  1. is less
  2. party cookies
Down
  1. is security
  2. your data
  3. is a institute
  4. save your data

6 Clues: is lessyour datais securityparty cookiesis a institutesave your data

Cyber safety-Chloe lu 2016-06-07

Cyber safety-Chloe lu crossword puzzle
Across
  1. someone that takes care of you
  2. where you can look up what you need
  3. something that can be good
  4. sending over a phrase
  5. something you need to get from a parent or teacher
  6. blocks virus
  7. making sure your safe
  8. it can be inappropriate
  9. bullying bullying online
  10. rule a rule you should always keep
Down
  1. something that can help or not
  2. a form of words
  3. doing the right thing
  4. messages something that you need to always check
  5. usually a website
  6. only share with family or teachers
  7. admitting what you did wrong
  8. mess up you computer
  9. networks social group
  10. people that can sometimes get your personal information

20 Clues: blocks virusa form of wordsusually a websitemess up you computerdoing the right thingsending over a phrasemaking sure your safenetworks social groupit can be inappropriatebullying bullying onlinesomething that can be goodadmitting what you did wrongsomething that can help or notsomeone that takes care of youonly share with family or teachers...

Megan Strait Cyber Security Crossword 2023-04-20

Megan Strait Cyber Security Crossword crossword puzzle
Across
  1. locks computer until ransom is paid.
  2. “bring your own device”.
  3. network of computers for cyberattacks.
  4. “UI redress attack”.
  5. malware appears harmless - malicious actions.
  6. secures data on cloud infrastructure.
  7. fake email - provides sensitive information.
  8. built-in security feature operating systems.
  9. IT software - protects against threats.
  10. unknowingly transmits private user information.
  11. protects data during encryption process.
  12. scrambling data - authorized users can access.
Down
  1. malicious software - damage computer system.
  2. system protects against unauthorized access.
  3. attacks unknown vulnerability in software.
  4. users connect to wireless hotspots.
  5. Protects against violation of a network.
  6. distributed denial of service attack.
  7. cyber-physical systems for high-value environments.
  8. virtual private network.

20 Clues: “UI redress attack”.“bring your own device”.virtual private network.users connect to wireless hotspots.locks computer until ransom is paid.secures data on cloud infrastructure.distributed denial of service attack.network of computers for cyberattacks.IT software - protects against threats.Protects against violation of a network....

IT Newsletter WordSearch #2 2025-02-25

IT Newsletter WordSearch #2 crossword puzzle
Across
  1. A server that acts as an intermediary between a user and the internet.
  2. A popular web security and performance company protecting websites.
  3. The number of bits transmitted per second in a digital signal.
  4. The process of verifying a user's identity in security systems.
  5. A methodology combining software development and IT operations.
  6. A process of converting data into a fixed-length string for security.
  7. Gains unauthorized access to computer systems for various purposes.
  8. A value used to verify the integrity of data during transmission.
  9. A program that translates source code into machine code.
  10. Software embedded into hardware, often for low-level control functions.
  11. A facility that houses critical IT infrastructure, such as servers.
Down
  1. A cyber scam where attackers trick users into providing sensitive information.
  2. A malicious attempt to gain access to or damage computer systems.
  3. A program that initializes the operating system when a computer starts.
  4. A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
  5. A method of packaging software and dependencies for deployment.
  6. A wired networking technology for local area networks (LANs).
  7. A decentralized and tamper-proof digital ledger technology.
  8. Fake media created by the manipulation of real media by AI.
  9. An architectural approach where applications are built as small, independent services.

20 Clues: A program that translates source code into machine code.A decentralized and tamper-proof digital ledger technology.Fake media created by the manipulation of real media by AI.A wired networking technology for local area networks (LANs).The number of bits transmitted per second in a digital signal....

Eeskujud ja antieeskujud 2020-01-27

Eeskujud ja antieeskujud crossword puzzle
Across
  1. Valgemütsid ehk...
  2. Kes on Cyber Security Network asjutaja?
  3. Vene häkker, kes pettis välja passi ja pankade võltsingutega?
  4. Kes on infoturbe juht Xeroxis?
  5. Ristsõna autori perekonna nimi on...
  6. Mustad mütsid ehk...
  7. Hallimütsid ehk...
  8. Kes on tundtud nime all DynamicWebPaige?
Down
  1. Kes on esimese arvutiviiruse looja?
  2. Kes on endine CIA ja DIA töötaja?
  3. Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
  4. Kes on töödanud koos Steve Jobsiga?
  5. Kes on USA küberturbe uurija?
  6. Kes on Austraalia internetiaktivist ja ajakirjanik?
  7. Mille asutasid Steve Jobs ja Steve Wozniak?

15 Clues: Valgemütsid ehk...Hallimütsid ehk...Mustad mütsid ehk...Kes on USA küberturbe uurija?Kes on infoturbe juht Xeroxis?Kes on endine CIA ja DIA töötaja?Kes on esimese arvutiviiruse looja?Kes on töödanud koos Steve Jobsiga?Ristsõna autori perekonna nimi on...Kes on Cyber Security Network asjutaja?Kes on tundtud nime all DynamicWebPaige?...

Robotics vocab 2021-01-12

Robotics vocab crossword puzzle
Across
  1. such as eBay® or PayPal®
  2. the illegal obtaining, giving or selling of passwords
  3. a form of cybercrime where offensive letters are sent through e-mail
  4. stealing money or property using interstate wire communication; considered a federal crime
  5. software programs which spread from computer to computer and are malicious in nature
  6. refer to TV, radio or the Internet; means of communication
  7. Internet harassment
  8. take advantage of kids by using instant messaging, e-mail and social network sites
  9. This is used to protect our IP symbols
  10. designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  11. software installed discreetly which alters the usability of a computer
  12. security measure used on today’s Internet which insures the data is secure
  13. modifying electronics such as an Xbox®, cell phone, or iPod®
  14. Used to protect designed IP
  15. federal regulatory body which monitors and deals with identity theft
Down
  1. (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
  2. an individual who alters electronics legally
  3. involves fraudulent e-mails pretending to originate from banks or online O
  4. someone who illegally alters computer hardware or breaches computer systems
  5. when someone steals personal information to commit fraud or other crimes
  6. any crime involving computers
  7. Way to protect a written IP
  8. the illegal stealing, copying or spreading of media including software, movies and music
  9. (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime

24 Clues: Internet harassmentsuch as eBay® or PayPal®Way to protect a written IPUsed to protect designed IPany crime involving computersThis is used to protect our IP symbolsan individual who alters electronics legallythe illegal obtaining, giving or selling of passwordsrefer to TV, radio or the Internet; means of communication...

Password Cracking 2024-04-08

Password Cracking crossword puzzle
Across
  1. String of characters for authentication and log on computer, web app, software, files, network, etc
  2. OS in which John the ripper, and other Cyber security tools come pre-installed("-" in middle)
  3. Attack uses a list of commonly used passwords to try to gain unauthorized access
  4. Unique Identifier used before a password to Login, and not usually considered Confidential
  5. John the Ripper tool was initially built for which OS?
  6. Open source reporting and collaboration tool for Documentation and Reporting in Cyber Security projects
  7. What is the full form of Fi in Wifi
  8. "- the Ripper". In the name of this tool, who is the Ripper
  9. Evil Twin attack is a type of which attack? ("-" in middle)
  10. Commonly used set of utilities for analyzing networks for weaknesses.
Down
  1. World's most common alphabetic password in organizations usually for high-level access.(Lab password)
  2. Practice where thieves steal your personal data by spying over your shoulder as you use a laptop or ATM("-" in middle)
  3. Another name for web crawling
  4. More efficient version of a Brute Force Attack, when the attacker knows a pattern in the password.("-" in middle)
  5. The answer is in the name. This attack involved making assumptions on what the password might be
  6. This table is a hash function used in Cryptography for storing important data such as passwords
  7. Term for disguising passwords or other data using a reversible transformation
  8. What type of attack involves intercepting and analyzing network traffic to capture login credentials?
  9. Guessing possible combinations of a targetted password. Also known as Exhaustive search.("-" in middle)
  10. Process of guessing or recovering a password from stored data or transmission

20 Clues: Another name for web crawlingWhat is the full form of Fi in WifiJohn the Ripper tool was initially built for which OS?"- the Ripper". In the name of this tool, who is the RipperEvil Twin attack is a type of which attack? ("-" in middle)Commonly used set of utilities for analyzing networks for weaknesses....

KKM Himatif 2023-09-14

KKM Himatif crossword puzzle
Across
  1. Kepanjangan Dev dalam 'Devcom'
  2. IRC berfokus dalam bidang?
  3. Kepanjangan 'De' pada IdeA
  4. Cabang olahraga yang menjadi fokus IBC
  5. Huruf 'i' pada nama KKM IBT, IRC, dan IFC
  6. Huruf 'T' pada KKM IBT
  7. Huruf 'F' pada IFC
Down
  1. KKM yang mendalami bidang Software Engineering
  2. Komunitas yang berfokus dalam bidang cyber security
  3. Fokus olahraga pada KKM IBT
  4. KKM TI yang berfokus pada bidang design
  5. Jumlah total KKM yang ada di Himatif
  6. KKM yang bergerak dalam bidang olahraga futsal
  7. Jumlah KKM yang bergerak di bidang olahraga
  8. KKM yang bergerak di bidang Robotika?

15 Clues: Huruf 'F' pada IFCHuruf 'T' pada KKM IBTIRC berfokus dalam bidang?Kepanjangan 'De' pada IdeAFokus olahraga pada KKM IBTKepanjangan Dev dalam 'Devcom'Jumlah total KKM yang ada di HimatifKKM yang bergerak di bidang Robotika?Cabang olahraga yang menjadi fokus IBCKKM TI yang berfokus pada bidang designHuruf 'i' pada nama KKM IBT, IRC, dan IFC...

Eeskujud ja antieeskujud 2020-01-27

Eeskujud ja antieeskujud crossword puzzle
Across
  1. Mustad mütsid ehk...
  2. Kes on Austraalia internetiaktivist ja ajakirjanik?
  3. Kes on infoturbe juht Xeroxis?
  4. Vene häkker, kes pettis välja passi ja pankade võltsingutega?
  5. Valgemütsid ehk...
  6. Kes on endine CIA ja DIA töötaja?
  7. Hallimütsid ehk...
Down
  1. Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
  2. Kes on esimese arvutiviiruse looja?
  3. Mille asutasid Steve Jobs ja Steve Wozniak?
  4. Kes on USA küberturbe uurija?
  5. Kes on töödanud koos Steve Jobsiga?
  6. Kes on Cyber Security Network asjutaja?
  7. Kes on tundtud nime all DynamicWebPaige?
  8. Ristsõna autori perekonna nimi on...

15 Clues: Valgemütsid ehk...Hallimütsid ehk...Mustad mütsid ehk...Kes on USA küberturbe uurija?Kes on infoturbe juht Xeroxis?Kes on endine CIA ja DIA töötaja?Kes on esimese arvutiviiruse looja?Kes on töödanud koos Steve Jobsiga?Ristsõna autori perekonna nimi on...Kes on Cyber Security Network asjutaja?Kes on tundtud nime all DynamicWebPaige?...

IT Vocabulary KB 2024-04-24

IT Vocabulary KB crossword puzzle
Across
  1. The website creates new ideas.
  2. The city's earnings are above average.
  3. The restaurant serves many types of food.
  4. The manual explains clearly.
  5. The computer has a comfy typing surface.
  6. The project needs a large amount of financial support.
  7. Problems may happen unexpectedly.
Down
  1. Company leaders manage business.
  2. The boss gives a new plan.
  3. The CEO likes a prestigious name.
  4. The company checks information.
  5. New markets look promising.
  6. Security fights digital attacks.
  7. The organization runs daily operations constantly.
  8. The car fixes its machinery.

15 Clues: The boss gives a new plan.New markets look promising.The manual explains clearly.The car fixes its machinery.The website creates new ideas.The company checks information.Company leaders manage business.Security fights digital attacks.The CEO likes a prestigious name.Problems may happen unexpectedly.The city's earnings are above average....

Data Safety 2025-07-23

Data Safety crossword puzzle
Across
  1. Strength in numbers?
  2. cyber attack, often looking like trusted emails
  3. Information about a user
  4. tool to keep data safe
  5. User-activated malware that spreads
  6. training, on ethics of data, for example
  7. space that stores data (in the sky?)
  8. Act that protects student data, abr.
Down
  1. the quality of being private, as data should be
  2. Multi-factor authorization
  3. European law protecting internet security
  4. Person who reports unethical practices
  5. Must be gained before data is mined
  6. safe from loss or unauthorized use
  7. moral principles

15 Clues: moral principlesStrength in numbers?tool to keep data safeInformation about a userMulti-factor authorizationsafe from loss or unauthorized useMust be gained before data is minedUser-activated malware that spreadsspace that stores data (in the sky?)Act that protects student data, abr.Person who reports unethical practices...

Cybersecurity Crossword Puzzle 2023-05-16

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Weakness or flaw in a system that can be exploited by attackers.
  2. Science of secure communication using codes and ciphers.
  3. Isolated environment used for testing potentially malicious software.
  4. Authentication method that uses unique physical or behavioral characteristics.
  5. Software designed to harm or exploit computer systems.
  6. Process of verifying the identity of a user or s
  7. Virtual Private Network that provides secure and private communication over public networks.
  8. Decoy system designed to attract and monitor unauthorized access attempts.
  9. Network security device that monitors and filters incoming and outgoing network traffic.
  10. Measures taken to protect computer systems and data from unauthorized access or attacks.
  11. A secret word or phrase used for authentication and access control.
  12. Malicious code that replicates itself and infects computer systems.
Down
  1. Unauthorized access to computer systems or networks.
  2. Distributed Denial of Service attack that overwhelms a target system with traffic.
  3. Vulnerability or exploit that is unknown to software developers or security researchers.
  4. Cyber attack method that tricks users into revealing sensitive information.
  5. Process of converting information into a secret code to prevent unauthorized access.
  6. Malicious software that disguises itself as legitimate software.
  7. A hidden entry point into a system that bypasses normal security mechanisms.
  8. Criminal activities conducted over the internet.
  9. A person who uses their programming skills to gain unauthorized access to computer systems.
  10. Malicious software that encrypts files and demands a ransom for their release.
  11. Software update that fixes security vulnerabilities.

23 Clues: Criminal activities conducted over the internet.Process of verifying the identity of a user or sUnauthorized access to computer systems or networks.Software update that fixes security vulnerabilities.Software designed to harm or exploit computer systems.Science of secure communication using codes and ciphers....

CB1 2018-08-03

CB1 crossword puzzle
Across
  1. ____ security; protection of systems from theft or damage to hardware, software or electronic data
  2. new head honcho
  3. real-time settlement funds transfer system
  4. csp ____
  5. central securities depository; settles equities, munis, corporate bonds, etc.
  6. US govt debt, shortest maturity
  7. account balance is negative
Down
  1. contingency site
  2. fraudulent email designed to reveal information
  3. 9/10 arrangement
  4. first president; alternatively $100
  5. messaging system
  6. process whereby securities are delivered, usually against payment
  7. program to facilitate clearing & settlements
  8. system that provides connectivity to a range of swift services

15 Clues: csp ____new head honchocontingency site9/10 arrangementmessaging systemaccount balance is negativeUS govt debt, shortest maturityfirst president; alternatively $100real-time settlement funds transfer systemprogram to facilitate clearing & settlementsfraudulent email designed to reveal information...

IT Vocabulary KB 2024-04-24

IT Vocabulary KB crossword puzzle
Across
  1. The website creates new ideas.
  2. The city's earnings are above average.
  3. The restaurant serves many types of food.
  4. The manual explains clearly.
  5. The computer has a comfy typing surface.
  6. The project needs a large amount of financial support.
  7. Problems may happen unexpectedly.
Down
  1. Company leaders manage business.
  2. The boss gives a new plan.
  3. The CEO likes a prestigious name.
  4. The company checks information.
  5. New markets look promising.
  6. Security fights digital attacks.
  7. The organization runs daily operations constantly.
  8. The car fixes its machinery.

15 Clues: The boss gives a new plan.New markets look promising.The manual explains clearly.The car fixes its machinery.The website creates new ideas.The company checks information.Company leaders manage business.Security fights digital attacks.The CEO likes a prestigious name.Problems may happen unexpectedly.The city's earnings are above average....

Cybersecurity Awareness Month - 2024 2024-10-09

Cybersecurity Awareness Month - 2024 crossword puzzle
Across
  1. - When somebody sends an e-mail with a link to a bogus website it is called
  2. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
  3. - Protecting the data against unauthorized access or disclosure is
  4. - Its a type of malware that disguises itself as legitimate code.
  5. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
  6. - This can slow down your computer AND watch everywhere you go on the internet
  7. - Data that is used to Identify specific individual
  8. - Impact of Threat exploiting a vulnerability is known as
Down
  1. - The control that you have over your personal information and how that information is used
  2. - A globally accepted and recognized standard for cyber security is
  3. - Three principles of ISMS are Confidentiality, ____ and Availability
  4. - Critical security component that determines what resources a user can access and what actions they can perform
  5. - An event that impacts the organization and requires a response and recovery.
  6. -PII Bank information falls under which category of data classification.
  7. - Unique sets of characters used to authenticate user identity and protect personal data or system access.

15 Clues: - Data that is used to Identify specific individual- Impact of Threat exploiting a vulnerability is known as- Its a type of malware that disguises itself as legitimate code.- Protecting the data against unauthorized access or disclosure is- A globally accepted and recognized standard for cyber security is...

RU ITEC411 Crime and Security 2025-10-18

RU ITEC411 Crime and Security crossword puzzle
Across
  1. (2 words) a type of hacker who behaves destructively/unethically.
  2. The manipulation of people into violating security protocols.
  3. A cyber attack in which a server or service is overwhelmed with requests.
  4. (2 words) a type of hacker who behaves constructively, improving security and demonstrating vulnerabilities.
  5. Software allowing future access to a machine by bypassing security checks.
  6. Software that attaches to another program. Often replicates.
  7. (2 words) websites/servers meant to be attractive to hackers for study.
  8. Malware that holds your files cryptographically hostage pending payment.
  9. An organization created in response to the Internet Worm incident.
Down
  1. Malware that logs user activities and sends it to a server.
  2. Performing acts of technical expertise; has been used both positively and negatively over time.
  3. (2 words) Malware that appears benign but hides malicious behavior.
  4. Written defamation.
  5. The act of hacking for a political cause.
  6. Verbal defamation
  7. A group of computers with a virus allowing them to cooperate over a server.
  8. Luring users to fake sites for the collection of personal data.
  9. Sending mass messages attempting to steal information.
  10. An independent piece of software that attempts to replicate to nearby vulnerable systems.
  11. An act passed in the 1980s, made it illegal to read/copy federally-involved computer systems.

20 Clues: Verbal defamationWritten defamation.The act of hacking for a political cause.Sending mass messages attempting to steal information.Malware that logs user activities and sends it to a server.Software that attaches to another program. Often replicates.The manipulation of people into violating security protocols....

Test Crossword (Hexacorp) 2020-05-07

Test Crossword (Hexacorp) crossword puzzle
Across
  1. What you do when you open your mouth
  2. Bark is what I do
  3. I am an animal
  4. yay go to the
Down
  1. Crops
  2. Security
  3. This is a...

7 Clues: CropsSecurityThis is a...yay go to theI am an animalBark is what I doWhat you do when you open your mouth

Networking and Cyber Ethics Crossword Puzzle 2025-06-21

Networking and Cyber Ethics Crossword Puzzle crossword puzzle
Across
  1. Network confined to a small area
  2. Unwanted email
  3. File that records your browsing data
  4. Unsecured wireless network risk
  5. A global network of computers
  6. Data traveling on a network
  7. bullying Sending harmful or abusive messages online
  8. Address Your unique address on the Internet
  9. Set of rules for communication between devices
  10. Protects computers from unauthorized access
Down
  1. An act of gaining unauthorized access
  2. Malicious software
  3. Hacker Person who protects networks from attacks
  4. Ethics Ethical use of digital resources
  5. High-speed internet connection
  6. Keeping data safe and private
  7. Identity theft technique using fake websites
  8. Connecting two or more computers
  9. A device that connects multiple networks

19 Clues: Unwanted emailMalicious softwareData traveling on a networkKeeping data safe and privateA global network of computersHigh-speed internet connectionUnsecured wireless network riskNetwork confined to a small areaConnecting two or more computersFile that records your browsing dataAn act of gaining unauthorized access...

Robotics vocab 2021-01-12

Robotics vocab crossword puzzle
Across
  1. such as eBay® or PayPal®
  2. the illegal obtaining, giving or selling of passwords
  3. a form of cybercrime where offensive letters are sent through e-mail
  4. stealing money or property using interstate wire communication; considered a federal crime
  5. software programs which spread from computer to computer and are malicious in nature
  6. refer to TV, radio or the Internet; means of communication
  7. Internet harassment
  8. take advantage of kids by using instant messaging, e-mail and social network sites
  9. This is used to protect our IP symbols
  10. designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  11. software installed discreetly which alters the usability of a computer
  12. security measure used on today’s Internet which insures the data is secure
  13. modifying electronics such as an Xbox®, cell phone, or iPod®
  14. Used to protect designed IP
  15. federal regulatory body which monitors and deals with identity theft
Down
  1. (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
  2. an individual who alters electronics legally
  3. involves fraudulent e-mails pretending to originate from banks or online O
  4. someone who illegally alters computer hardware or breaches computer systems
  5. when someone steals personal information to commit fraud or other crimes
  6. any crime involving computers
  7. Way to protect a written IP
  8. the illegal stealing, copying or spreading of media including software, movies and music
  9. (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime

24 Clues: Internet harassmentsuch as eBay® or PayPal®Way to protect a written IPUsed to protect designed IPany crime involving computersThis is used to protect our IP symbolsan individual who alters electronics legallythe illegal obtaining, giving or selling of passwordsrefer to TV, radio or the Internet; means of communication...

E-Ethics 2021-01-12

E-Ethics crossword puzzle
Across
  1. cyber crime
  2. the illegal obtaining, giving or selling of passwords
  3. Used to protect designed (say an invention or a door knob) IP
  4. - someone who illegally alters computer hardware or breaches computer
  5. take advantage of kids by using instant messaging, e-mail and social network sites
  6. federal regulatory body which monitors and deals with identity theft
  7. involves fraudulent e-mails pretending to originate from banks or online O
  8. any crime involving computers
  9. This is used to protect our IP symbols
  10. when someone steals personal information to commit fraud or other crimes
  11. security measure used on today’s Internet which insures the data is secure
  12. can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening Harassment
  13. stealing money or property using interstate wire communication; considered a federal crime
  14. software installed discreetly which alters the usability of a computer
Down
  1. a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
  2. modifying electronics such as an Xbox®, cell phone, or iPod®
  3. nature
  4. Internet harassment
  5. Way to protect a written IP
  6. a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints
  7. to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
  8. an individual who alters electronics legally
  9. the illegal stealing, copying or spreading of media including software, movies and music
  10. such as eBay® or PayPal®
  11. a form of cybercrime where offensive letters are sent through e-mail
  12. software programs which spread from computer to computer and are malicious

26 Clues: naturecyber crimeInternet harassmentsuch as eBay® or PayPal®Way to protect a written IPany crime involving computersThis is used to protect our IP symbolsan individual who alters electronics legallythe illegal obtaining, giving or selling of passwordsmodifying electronics such as an Xbox®, cell phone, or iPod®...

ITS2210 Module 7 Crossword 2019-04-12

ITS2210 Module 7 Crossword crossword puzzle
Across
  1. This type of loss is the most likely damage to occur in an act of cyber terrorism
  2. Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
  3. Hacking conducted for ideological purposes
  4. Using the Internet to terrorize someone or some group of individuals
  5. Accessed to find postings from or about your target
  6. The most popular search engine used to gather personal information
  7. Cyber criminals can use your personal information to guess these
  8. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
  9. Linux stores these logs at the following location /var/log/mail.*
Down
  1. This virus is an example of domestic cyber terrorism
  2. This command shows any shared files that are open
  3. This type of warfare often involves propaganda and disinformation campaigns
  4. This website has been a focus of identity theft criminals to gain access to personal data and pictures
  5. This type of "data" is data relevant to an investigation
  6. The process of finding names, addresses, and phone numbers using popular websites like Yahoo
  7. A political group that has used the internet for political intimidation
  8. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
  9. Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
  10. This conflict in 1990 had a cyber warfare component
  11. The NSA and ______ have allegedly had one of their cyber spies caught

20 Clues: Hacking conducted for ideological purposesThis command shows any shared files that are openAccessed to find postings from or about your targetThis conflict in 1990 had a cyber warfare componentThis virus is an example of domestic cyber terrorismThis type of "data" is data relevant to an investigation...

Cyber Security Month Crossword 2022-09-23

Cyber Security Month Crossword crossword puzzle
Across
  1. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  2. A digital form of social engineering to deceive individuals into providing sensitive information.
  3. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  4. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  5. Facebook, Twitter, Instagram, etc. (Two words)
  6. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
  7. Software that compromises the operation of a system by performing an unauthorized function or process.
Down
  1. Widely used in-home network technololy that allows for wireless connection.
  2. A security tool that creates a secure, encrypted connection between you and the internet
  3. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
  4. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  5. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  6. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  8. An unauthorized user who attempts to or gains access to an information system.

15 Clues: Facebook, Twitter, Instagram, etc. (Two words)Widely used in-home network technololy that allows for wireless connection.An unauthorized user who attempts to or gains access to an information system.A security tool that creates a secure, encrypted connection between you and the internet...

Types of threats 2019-01-09

Types of threats crossword puzzle
Across
  1. surfing atching an authorized user enter a security code on a keypad.
  2. A destructive computer program that bores its way through a computer's files
  3. A piece of code that is capable of copying itself
  4. A type of Malware that locates
  5. prevents the program from running as expected
  6. n attacker entering a secured building by following an authorized employee
  7. When someone deceives by pretending to be someone else
  8. a cyber-security attacker to take control
Down
  1. Advertising-supported software
  2. data that ransome gets paid to remove
  3. An attack that sends an email or displays a Web announcement that falsely claims
  4. pro quo Criminals promise a service in exchange for details
  5. Program that hides in a computer
  6. Collection of captured bot computers
  7. Criminals make a promise of goods in return for details

15 Clues: Advertising-supported softwareA type of Malware that locatesProgram that hides in a computerCollection of captured bot computersdata that ransome gets paid to removea cyber-security attacker to take controlprevents the program from running as expectedA piece of code that is capable of copying itself...

Cyber Security Words and Terms 2022-09-15

Cyber Security Words and Terms crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. Text that can be read by the human eye, like this article!
  3. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  4. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  5. A simple form of code for software that can be written in word editors.
  6. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  8. The deliberate use of someone else's identity, typically for financial gain.
  9. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  10. A cyber attacker who uses software and social engineering methods to steal data and information.
  11. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  12. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  13. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
  1. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  2. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
  3. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  4. The programs and other operating systems used by a computer.
  5. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  6. Software that has their code listed as free to use, share, and modify.
  7. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.

20 Clues: Text that can be read by the human eye, like this article!The programs and other operating systems used by a computer.Software that has their code listed as free to use, share, and modify.A simple form of code for software that can be written in word editors.A secret word or phrase that is used to access a computer system or service....

IT Networking / Cyber Security term 2025-03-29

IT Networking / Cyber Security term crossword puzzle
Across
  1. – Fraudulent attempt to steal.
  2. (Domain Name System) – Translates domains into IP.
  3. – Wired network connection standard.
  4. Authentication (2FA) – Extra security verification step.
  5. – Small unit of data.
  6. (Service Set Identifier) – Wi-Fi network name.
  7. – Converts data into code.
  8. Server – Acts as intermediary gateway.
  9. – Malicious software program.
  10. (Dynamic Host Configuration Protocol) – Assigns IP automatically.
  11. (Distributed Denial of Service) – Overloads network with requests.
Down
  1. – Checks network connectivity.
  2. – Secures data using cryptography.
  3. (Virtual Private Network) – Secure network over internet.
  4. – Filters unauthorized network traffic.
  5. – Connects different network segments.
  6. Detection System (IDS) – Monitors suspicious network activity.
  7. Mask – Defines IP address range.
  8. – Directs data to devices.
  9. Trust – Never trust, always verify.
  10. – Internet's fundamental communication protocol.
  11. Address – Unique hardware device identifier.
  12. – Delay in data transmission.
  13. Address – Identifies devices on network.
  14. – Maximum data transfer rate.

25 Clues: – Small unit of data.– Directs data to devices.– Converts data into code.– Delay in data transmission.– Maximum data transfer rate.– Malicious software program.– Checks network connectivity.– Fraudulent attempt to steal.Mask – Defines IP address range.– Secures data using cryptography.Trust – Never trust, always verify....

Foundations of Cyber Security I 2025-02-13

Foundations of Cyber Security I crossword puzzle
Across
  1. The act of making sure every individual working with an information system has specific responsibilities for information assurance.
  2. A process that gives a user permission to do certain things.
  3. A three-pronged system of cybersecurity.
  4. Ciphers that break down information into fixed-size blocks before encrypting it.
  5. Software that displays unwanted advertising while running an application on your computer.
  6. A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
  7. A guarantee of reliable access to information.
  8. A device that helps join two separate computer networks together to allow for communication.
  9. A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
  1. A security technique used to regulate who or what can utilize the resources of a computer system.
  2. Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
  3. A process that measures how much information has been accessed or the amount of time spent on a session.
  4. The governance, development, and maintenance of computer programs.
  5. A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
  6. The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
  7. One that is physically isolated from the internet and only able to pass data along via removable media.
  8. A process or set of rules.
  9. The use of human characteristics to distinctly identify individuals as themselves.
  10. A process that keeps a system secure by physically isolating it from all unsecured networks.
  11. An orderly search for nonvolatile data storage to load the OS.

20 Clues: A process or set of rules.A three-pronged system of cybersecurity.A guarantee of reliable access to information.A process that gives a user permission to do certain things.An orderly search for nonvolatile data storage to load the OS.The governance, development, and maintenance of computer programs....

Cyber Security 2 Chapter 4 2025-10-13

Cyber Security 2 Chapter 4 crossword puzzle
Across
  1. The 'I' in the CIA Triad, ensuring that data is not altered or destroyed in an unauthorized manner.
  2. A software update that fixes a vulnerability.
  3. An algorithm used to encrypt and decrypt data.
  4. The raw text or data before it is encrypted.
  5. The art of writing and solving codes.
  6. The standard for secure, encrypted communication on the internet, replacing SSL. (abbreviation)
  7. A file maintained by a server that contains information about all the activities that have occurred on that server.
  8. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  9. Software that secretly monitors a user's online activity.
  10. A secret key used in cryptography.
  11. A flaw or weakness in a program.
  12. A network that uses public telecommunication infrastructure, such as the internet, to provide remote offices with secure access to their organization's network (abbreviation).
  13. A network of connected devices within a specific geographic area. (abbreviation)
  14. The process of converting encrypted data back into its original, readable form.
Down
  1. The result of encrypting plaintext.
  2. A small program that can be embedded in a website or document.
  3. A program that replicates itself over a network.
  4. A type of malicious software that collects information about a person or organization without their knowledge.
  5. A mathematical scheme for demonstrating the authenticity of a digital message or document. (2 words)
  6. A technique used by attackers to make their network traffic look like it came from a legitimate source.
  7. A digital document used to prove the ownership of a public key. (2 words)
  8. The main circuit board of the computer.
  9. A physical object, such as a token or smart card, used to authenticate a user.

23 Clues: A flaw or weakness in a program.A secret key used in cryptography.The result of encrypting plaintext.The art of writing and solving codes.The main circuit board of the computer.The raw text or data before it is encrypted.A software update that fixes a vulnerability.An algorithm used to encrypt and decrypt data....

FY2025 Cyber Security Training 2024-11-05

FY2025 Cyber Security Training crossword puzzle
Across
  1. Don't click without _____.
  2. The number of principles the GDPR requires companies to adhere to.
  3. A piece of evidence a user must produce to verify they are an account’s true owner.
  4. BEC means Business ____ Compromise.
  5. On average Parker blocks 32 ____ attempts to access Parker Networks.
  6. _____, unique passwords are best practice.
Down
  1. This is voice phishing.
  2. This is something you are, including fingerprints or facial recognition.
  3. _____ Data means any data relating to a living individual who is or can be identified from the data itself.
  4. Before leaving your workstation, you should always do this to the area.
  5. Text message phishing.
  6. Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
  7. CEO fraud is one of the most common forms of this.
  8. Designed to damage devices or exploit them for sensitive information and access.

14 Clues: Text message phishing.This is voice phishing.Don't click without _____.BEC means Business ____ Compromise._____, unique passwords are best practice.CEO fraud is one of the most common forms of this.The number of principles the GDPR requires companies to adhere to.On average Parker blocks 32 ____ attempts to access Parker Networks....

Crossword 2024-05-28

Crossword crossword puzzle
Across
  1. Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  2. The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
  3. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  4. A method of trying to gather personal information using deceptive e-mails and websites.
  5. A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
  6. A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
  7. A device or software application that monitors a network or systems for malicious activity or policy violations.
  8. A cyber attack that occurs on the same day a vulnerability is discovered in software.
  9. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  10. A service that encrypts your internet traffic and protects your online identity.
Down
  1. Malicious software designed to harm, exploit, or otherwise compromise a computer system.
  2. An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
  3. A trial-and-error method used to decode encrypted data such as passwords.
  4. An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
  5. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  6. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  7. A code injection technique that might destroy your database.
  8. The process of converting information or data into a code, especially to prevent unauthorized access.
  9. management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
  10. A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.

20 Clues: A code injection technique that might destroy your database.A trial-and-error method used to decode encrypted data such as passwords.A service that encrypts your internet traffic and protects your online identity.A cyber attack that occurs on the same day a vulnerability is discovered in software....

Cyber Ethics 2025-06-16

Cyber Ethics crossword puzzle
Across
  1. hacking hacking done for a good cause
  2. crime criminal activities
  3. malicious software
  4. set of programs that disrupts the functioning
  5. combination of voice and phishing
Down
  1. bombing sending bulk emails till the server gets full
  2. a security system that prevents unauthorised access
  3. unwanted bulk emails
  4. simplest way of preventing plagiarism
  5. Law legal rules on online users

10 Clues: malicious softwareunwanted bulk emailscrime criminal activitiesLaw legal rules on online userscombination of voice and phishinghacking hacking done for a good causesimplest way of preventing plagiarismset of programs that disrupts the functioninga security system that prevents unauthorised accessbombing sending bulk emails till the server gets full

AE MODULE 7 - CYBER SECURITY 2024-01-29

AE MODULE 7 - CYBER SECURITY crossword puzzle
Across
  1. Positions ideal for individuals with more than five years of experience
  2. A trail of data intentionally left behind by a user
  3. Store information across pages within the site
  4. Crime that involves a computer and/or a network
  5. Describes the digital environment in which computer networks communicate
  6. Software that automatically displays or downloads advertising material
  7. A type of malicious software
  8. Links two or more devices
  9. Someone who uses the internet to cause harm to a victim
  10. Online harassment that uses electronic communication
  11. Web browser feature
Down
  1. Someone who uses a computer to gain access to systems or networks
  2. Internet connection that encrypts traffic from a device to a private network
  3. A standalone self-replicating software application that invades and destroys computers
  4. Do not share ____________ across multiple sites
  5. Software that allows an attacker to obtain information on another computer
  6. Personally identifiable information
  7. Malicious attempts by hackers to damage, steal, or destroy a computer
  8. ___________ engineering is when an attacker manipulates someone into revealing information
  9. Attacker sends fraudulent emails to deceive someone into revealing information
  10. Software designed to disrupt, damage, or gain unauthorized access to a computer
  11. Descriptive data that contains information about other data
  12. In 1988, Robert __________ unleashed a malicious computer program

23 Clues: Web browser featureLinks two or more devicesA type of malicious softwarePersonally identifiable informationStore information across pages within the siteDo not share ____________ across multiple sitesCrime that involves a computer and/or a networkA trail of data intentionally left behind by a userOnline harassment that uses electronic communication...

Cyber Security Words and Terms 2022-09-15

Cyber Security Words and Terms crossword puzzle
Across
  1. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  2. An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
  3. Text that can be read by the human eye, like this article!
  4. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  5. The programs and other operating systems used by a computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  8. A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
  9. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
  10. The deliberate use of someone else's identity, typically for financial gain.
  11. The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
  1. Also known as a VPN, it allows you to create a secure connection to another network using the internet.
  2. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
  4. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. Software that has their code listed as free to use, share, and modify.
  6. Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
  7. A simple form of code for software that can be written in word editors.
  8. Customizable additions to software for extra functionality.
  9. Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
  10. A secret word or phrase that is used to access a computer system or service.

21 Clues: Text that can be read by the human eye, like this article!Customizable additions to software for extra functionality.The programs and other operating systems used by a computer.Software that has their code listed as free to use, share, and modify.A simple form of code for software that can be written in word editors....

Inari Medical Cyber Security Crossword 2023-05-12

Inari Medical Cyber Security Crossword crossword puzzle
Across
  1. If you get a suspicious email, do not _____ it to your coworkers.
  2. Don't _____ your credentials with anyone!
  3. Only install apps/software from _____ sources (Apple App Store, Google Play).
  4. Use Multi-Factor _____ (MFA) whenever possible.
  5. Use the _____ Alert Button in your Outlook client to report phishy emails.
  6. Lock your _____ when you walk away by using the Windows + L keys on your keyboard.
  7. Use a _____, unique password for all of your accounts.
  8. Throw sensitive/confidential documents in the designated _____ bins to keep your information safe.
  9. Report any _____ activity or security incidents to your IT department ASAP.
  10. Keep your computer and software __-__-____.
Down
  1. If you _____ something, say something.
  2. Don't store _____ information in non-secure places.
  3. Don't write your _____ on post-it notes!
  4. Keep your passwords _____.
  5. Be a _____ firewall!
  6. Don't click on links or download _____ from unknown senders.
  7. Use a VPN connection when using public _____ networks.
  8. Think before you _____.
  9. Don't _____ to phishy emails. Just delete them instead.
  10. Phishing attempts can also be sent via _____ message.
  11. Be careful not to share your _____ information on social media.

21 Clues: Be a _____ firewall!Think before you _____.Keep your passwords _____.If you _____ something, say something.Don't write your _____ on post-it notes!Don't _____ your credentials with anyone!Keep your computer and software __-__-____.Use Multi-Factor _____ (MFA) whenever possible.Don't store _____ information in non-secure places....

AE MODULE 7 - CYBER SECURITY 2024-01-29

AE MODULE 7 - CYBER SECURITY crossword puzzle
Across
  1. Crime that involves a computer and/or a network
  2. Someone who uses a computer to gain access to systems or networks
  3. Malicious attempts by hackers to damage, steal, or destroy a computer
  4. Software that allows an attacker to obtain information on another computer
  5. Links two or more devices
  6. Descriptive data that contains information about other data
  7. In 1988, Robert __________ unleashed a malicious computer program
  8. Positions ideal for individuals with more than five years of experience
  9. Web browser feature
  10. Do not share ____________ across multiple sites
  11. Internet connection that encrypts traffic from a device to a private network
  12. software designed to disrupt, damage, or gain unauthorized access to a computer
Down
  1. Online harassment that uses electronic communication
  2. Attacker sends fraudulent emails to deceive someone into revealing information
  3. , Describes the digital environment in which computer networks communicate
  4. A type of malicious software
  5. Someone who uses the internet to cause harm to a victim
  6. ___________ engineering is when an attacker manipulates someone into revealing information
  7. Software that automatically displays or downloads advertising material
  8. Store information across pages within the site
  9. A trail of data intentionally left behind by a user
  10. Personally identifiable information
  11. A standalone self-replicating software application that invades and destroys computers

23 Clues: Web browser featureLinks two or more devicesA type of malicious softwarePersonally identifiable informationStore information across pages within the siteCrime that involves a computer and/or a networkDo not share ____________ across multiple sitesA trail of data intentionally left behind by a userOnline harassment that uses electronic communication...

CSAT Cyber Security Checkpoint 2026 2026-03-16

CSAT Cyber Security Checkpoint 2026 crossword puzzle
Across
  1. Check your texts closely
  2. Verifying Identity
  3. Your computer is sick
  4. Longer is Stronger
  5. Not the kind from the ocean
  6. Interconnected web of computers
  7. Cyber vigilance
  8. Scrambled for security
  9. Virtual storage in the sky
  10. Your data is stolen
  11. An SMS text phish
  12. What you should do when you suspect a phish
  13. AI-generated deception
  14. DTCC password manager
  15. DTCC Technology launching in July
Down
  1. Voice trickery that sounds fishy
  2. A malicious QR Code
  3. Retina scans and fingerprints
  4. Don't use unsecured public ______
  5. Spyware-ransomware-viruses
  6. Malicious software holding data hostage
  7. Wears a black hat
  8. The new DTCC MFA process
  9. Triggers to make you click
  10. A fence provides this
  11. You entered your login info in a fake site
  12. What you should do with all links
  13. Blocks malicious connections
  14. Used to be called SATEC
  15. Last name of our CISO

30 Clues: Cyber vigilanceWears a black hatAn SMS text phishVerifying IdentityLonger is StrongerA malicious QR CodeYour data is stolenYour computer is sickA fence provides thisLast name of our CISODTCC password managerScrambled for securityAI-generated deceptionUsed to be called SATECCheck your texts closelyThe new DTCC MFA processSpyware-ransomware-viruses...

Risks of Emerging Technology 2025-10-03

Risks of Emerging Technology crossword puzzle
Across
  1. Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
  2. Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
  3. Automation errors, lack of human oversight, cyber vulnerabilities
  4. Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
  1. Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
  2. Security of virtual environments, fraud in immersive platforms, and privacy issues
  3. Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
  4. Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
  5. Potential to break current cryptographic systems which may lead to data breaches and fraud

9 Clues: Automation errors, lack of human oversight, cyber vulnerabilitiesPrivacy concerns, data theft, spoofing attacks and regulatory scrutinyAlgorithmic bias, model errors, data privacy and misuse in fraud/cyberattacksRegulatory uncertainty, scalability challenges, smart contract vulnerabilities....

Malware and cyber security 2023-11-22

Malware and cyber security crossword puzzle
Across
  1. locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. a malicious form of self-replicating software.
  3. Providing customer service online
  4. a large collection of malware-infected devices
  5. a piece of software that appears to perform a useful function but actually performs malicious actions.
  6. software that is designed to gain access to your computer with malicious intent.
  7. record every keystroke made by a user.
  8. Bots are automated programs that perform tasks repeatedly.
  9. An email that is disguised in order to trick them into givingup valuable data.
Down
  1. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  2. software that monitors and gathers information on a person and how they use their computer.
  3. attacker watching the victim while they provide sensitive information.
  4. spread through the network and use the system’s resources.
  5. Monitoring the prices of items to find the best deal

14 Clues: Providing customer service onlinerecord every keystroke made by a user.a malicious form of self-replicating software.a large collection of malware-infected devicesMonitoring the prices of items to find the best dealspread through the network and use the system’s resources.Bots are automated programs that perform tasks repeatedly....

Types of threats 2019-01-09

Types of threats crossword puzzle
Across
  1. A piece of code that is capable of copying itself
  2. Program that hides in a computer
  3. surfing atching an authorized user enter a security code on a keypad.
  4. n attacker entering a secured building by following an authorized employee
  5. a cyber-security attacker to take control
Down
  1. data that ransome gets paid to remove
  2. When someone deceives by pretending to be someone else
  3. Advertising-supported software
  4. A destructive computer program that bores its way through a computer's files
  5. Criminals make a promise of goods in return for details
  6. An attack that sends an email or displays a Web announcement that falsely claims
  7. A type of Malware that locates
  8. pro quo Criminals promise a service in exchange for details
  9. prevents the program from running as expected
  10. Collection of captured bot computers

15 Clues: Advertising-supported softwareA type of Malware that locatesProgram that hides in a computerCollection of captured bot computersdata that ransome gets paid to removea cyber-security attacker to take controlprevents the program from running as expectedA piece of code that is capable of copying itself...

DIPLOMACY AND FOREIGN POLICY 2026-03-15

DIPLOMACY AND FOREIGN POLICY crossword puzzle
Across
  1. make sth with skill
  2. to choose to follow a strategy
  3. to increase the amount of sth
  4. protection of data from digital attacks
  5. a belief that is incorrect
Down
  1. covering a wide area
  2. to demand a requirement in a contract
  3. to change to suit different conditions
  4. to carry out an action
  5. to try to find sth

10 Clues: to try to find sthmake sth with skillcovering a wide areato carry out an actiona belief that is incorrectto increase the amount of sthto choose to follow a strategyto demand a requirement in a contractto change to suit different conditionsprotection of data from digital attacks

FITE 2013-05-16

FITE crossword puzzle
Across
  1. stores info. on internet servers
  2. central processing unit/speed of computer
  3. 1000 gigabytes
  4. cyber security
  5. two things that can be used together
  6. a document having a present format, used as a starting point
  7. the close up or preview of a template
  8. 1000 terabytes
  9. input
  10. output
  11. something you attach to your computer
  12. smallest unit of data
  13. internet connection
  14. printed circuit that is the foundation of a computer
  15. domain
  16. a port formed by IBM connecting a mouse or keyboard to a PC
  17. protection of anyones work
  18. computer screen
  19. search internet for specific info.
  20. programs given to a computer to do a direct operation
  21. internet and online world
Down
  1. arrangement of graphic matters
  2. slogan
  3. quoting a reference to an athourity
  4. specific, easier
  5. processing of powering up your computer
  6. cyber safety
  7. connects to the internet
  8. internet service/Comcast
  9. program that lets you interact with your computer
  10. random access memory
  11. search engine that checks all search engines
  12. a socket in a microcomputer that will accept a plug-in circuit board
  13. wired internet
  14. programs designed for a special need or purpose
  15. hardware connection
  16. provides data to other computers
  17. the way you behave online
  18. logo
  19. main storage media device that permanently stores all data on computer
  20. provides a variety of channels of data over a single communication medium
  21. series of instructions given to a computer to do a certain task
  22. 1000 petabytes
  23. a brief account of ones profession
  24. the wiring making up a computer system
  25. SSID
  26. 1000 kilobytes

47 Clues: logoSSIDinputsloganoutputdomaincyber safety1000 gigabytescyber security1000 terabyteswired internet1000 petabytes1000 kilobytescomputer screenspecific, easierhardware connectioninternet connectionrandom access memorysmallest unit of dataconnects to the internetinternet service/Comcastthe way you behave onlineinternet and online world...

Reportable Information 2025-04-24

Reportable Information crossword puzzle
Across
  1. A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.
  2. __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
  3. A potential risk indicator for person living above his means
  4. An employee who hates his job to the point of aggression
  5. A security compromise, infraction, or violation
Down
  1. Security incidents are categorized as either a security infraction or a security ______
  2. _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
  3. The ability and opportunity to gain knowledge of classified information.
  4. Denies adversaries information about friendly capabilities, activities, limitations, and intentions that adversaries need to make competent operational decisions. (Acronym)
  5. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)

10 Clues: A security compromise, infraction, or violationAn employee who hates his job to the point of aggressionA potential risk indicator for person living above his meansThe ability and opportunity to gain knowledge of classified information.Security incidents are categorized as either a security infraction or a security ______...