cyber security Crossword Puzzles
Science, Technology, and Innovation MRG 2022-05-06
Across
- Tesla’s autonomous vehicles are an example of:
- Fukushima and Chernobyl
- International relations through phones
- Cambiamento del Clima
- Laws of rivers and dams
- People who attach a solution to a problem
Down
- Boston dynamics turned Terminator
- France and Ukraine rely upon it
- Microscopes in International Relations
- COVAX
- Hacker Protection
11 Clues: COVAX • Hacker Protection • Cambiamento del Clima • Fukushima and Chernobyl • Laws of rivers and dams • France and Ukraine rely upon it • Boston dynamics turned Terminator • Microscopes in International Relations • International relations through phones • People who attach a solution to a problem • Tesla’s autonomous vehicles are an example of:
Winter Security Reminder Crossword 2025-11-14
Across
- Deceptive email technique attackers use heavily during the holidays
- Abbreviation for layered login protection
- User ____ — don’t share them, even with “helpful” coworkers
- Something you shovel in winter — and what attackers try to bury clues under
- The season when people take time off — and attackers ramp up
- What systems can do when storage fills — or when employees forget updates
- What you lock before holiday leave — your computer included
- “____ actor” — an adversary attempting unauthorized access
- Essential item — don’t leave it in your car or desk
- Security mindset: think before you ___
Down
- Frozen form of precipitation and a reminder to be prepared for cyber ___
- Keep your data ____ by using strong multi-factor authentication
- The opposite of “hot,” also how users feel when security is ignored
- Frozen precipitation that also describes a flood of spam
- Ice forms here — and malware often hides here too (initials)
- Seasonal cue to refresh your passwords
- The second factor in “two factor authentication”
- A code you should never reuse
18 Clues: A code you should never reuse • Seasonal cue to refresh your passwords • Security mindset: think before you ___ • Abbreviation for layered login protection • The second factor in “two factor authentication” • Essential item — don’t leave it in your car or desk • Frozen precipitation that also describes a flood of spam • ...
Cybersecurity in Schools 2025-10-19
Across
- The goal of teaching students about online safety and responsible behavior.
- People who gain unauthorized access to computer systems.
- School and home connections that are often easy targets for hackers.
- What the article suggests should include cybersecurity education.
- The entity the article says should help implement cybersecurity education.
- What schools should develop to respond to cyber threats.
- The sector most affected by cyberattacks, according to Microsoft research.
- Working together between schools, families, and the government to fight cyber threats.
Down
- The online space where students face increasing security risks.
- A type of cyberattack that locks data until a payment is made.
- Harmful software used by cybercriminals to damage or steal data.
- The practice of protecting systems and data from digital attacks.
- A scam where hackers trick people into revealing personal information.
- What students are increasingly using in classrooms instead of pen and paper.
- What teachers need before they can effectively teach cybersecurity.
- The dangers posed by cyberattacks.
- Key partners who should collaborate on cybersecurity education efforts.
- Sensitive information that hackers often try to steal from schools.
18 Clues: The dangers posed by cyberattacks. • People who gain unauthorized access to computer systems. • What schools should develop to respond to cyber threats. • A type of cyberattack that locks data until a payment is made. • The online space where students face increasing security risks. • Harmful software used by cybercriminals to damage or steal data. • ...
Cyber Security Crossword 2024-07-09
Across
- Software flaw
- Converts data into a coded form for security
- Unwanted email messages
- Malicious software disrupts, damages, or gains unauthorized access.
- Password guessing attack
Down
- Deceptive emails to steal information
- Controls traffic entering and leaving a network
- Self-replicating malware
- Network of infected computers
- overwhelms network with traffic
- Harmful software disrupts or steals data
11 Clues: Software flaw • Unwanted email messages • Self-replicating malware • Password guessing attack • Network of infected computers • overwhelms network with traffic • Deceptive emails to steal information • Harmful software disrupts or steals data • Converts data into a coded form for security • Controls traffic entering and leaving a network • ...
DOT - Cyber Security 2022-06-15
Across
- Gathers sensitive information that involves both social engineering and email
- Malware that infects and spreads through files and links together with social engineering
- Malware that locks data and encrypts it to allowing hackers commit fraud
- Malware that works like a virus, but can infect devices on it's own and through software vulnerabilities
Down
- A text file stored on your device used for logging into websites, storing preferences, and viewing history
- An attack that aims to make a service, or website, unusable by 'flooding' it with malicious traffic
- Malware that gathers information from a person, or business, by violating privacy
- Malware that infects devices through suspicious files and links
- A tool used to mask your online identity by redirecting and encrypting your data before it is sent
- Malware that infects devices with multiple, intrusive, ads and slows overall performance
10 Clues: Malware that infects devices through suspicious files and links • Malware that locks data and encrypts it to allowing hackers commit fraud • Gathers sensitive information that involves both social engineering and email • Malware that gathers information from a person, or business, by violating privacy • ...
Cyber security crossword 2025-07-10
Across
- : Strengthening security configurations of systems
- : Approved list of trusted entities or applications
- : Formal examination of security policies and systems
- : Decoy network set up to detect unauthorized access
- : Using multiple backup systems to prevent failure
Down
- : Separating systems to prevent security breaches
- : Simulating software or hardware to test security
- : Making data intentionally difficult to interpret
- : Gaining higher privileges within a system
- : Ensuring data remains accurate and unaltered
10 Clues: : Gaining higher privileges within a system • : Ensuring data remains accurate and unaltered • : Separating systems to prevent security breaches • : Strengthening security configurations of systems • : Simulating software or hardware to test security • : Making data intentionally difficult to interpret • : Using multiple backup systems to prevent failure • ...
#BeSecure Crossword 2023-10-20
Across
- Security tool that creates a secure, encrypted connection between the user and the internet
- Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
- A flaw or weakness in a computer system that could be exploited to violate the system security.
- Change it regularly! Don't store it in unsecure location and mix it up!
- Action you should take if you suspect you received a phishing email
- The most common cyberthreat you can encounter in the virtual world
- The process of taking plain text and scrambling it into an unreadable format
Down
- Verifying identity.
- Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
- An individual with computer skills who uses them to break into computer, systems and networks.
- A data privacy legal framework all European countries share.
- An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
- The address of a web page. Remember to check its validity before clicking on it!
- Strengthens login security by requiring an additional piece of information beyond your password
14 Clues: Verifying identity. • A data privacy legal framework all European countries share. • The most common cyberthreat you can encounter in the virtual world • Action you should take if you suspect you received a phishing email • Change it regularly! Don't store it in unsecure location and mix it up! • ...
Security Crossword 2025-10-29
Across
- the type of security you need to apply when on vacation
- the type of security when you're surfing the web
- Type of security that involves our buildings
- a document we put in place to force people to protect our research
- -An invisible helper that makes our lives better
Down
- A place where books are kept
- what you do when there's been an infraction
7 Clues: A place where books are kept • what you do when there's been an infraction • Type of security that involves our buildings • the type of security when you're surfing the web • -An invisible helper that makes our lives better • the type of security you need to apply when on vacation • a document we put in place to force people to protect our research
Steve’s Scripted Disaster and My Forensics Fiasco! 2024-09-11
Across
- The platform where customer profiles were compromised
- The person who had to fix Steve’s mess
- A key mistake: skipping this before taking action
- The security measure Steve failed to understand
Down
- What Steve tried to write to change customer settings
- The type of cyber security incident Steve inadvertently made easier
- What Steve deleted to cover up his mistake
- What should be followed to avoid such mistakes
- When you should ask for help
9 Clues: When you should ask for help • The person who had to fix Steve’s mess • What Steve deleted to cover up his mistake • What should be followed to avoid such mistakes • The security measure Steve failed to understand • A key mistake: skipping this before taking action • What Steve tried to write to change customer settings • ...
#BeSecure Crossword 2023-10-20
Across
- Security tool that creates a secure, encrypted connection between the user and the internet
- Cyber Security Operation Centre. The team responsible for Confidentiality, Integrity and Availability of Vanguard Data.
- A flaw or weakness in a computer system that could be exploited to violate the system security.
- Change it regularly! Don't store it in unsecure location and mix it up!
- Action you should take if you suspect you received a phishing email
- The most common cyberthreat you can encounter in the virtual world
- The process of taking plain text and scrambling it into an unreadable format
Down
- Verifying identity.
- Facebook, LinkedIn, Twitter. Be careful what you share on them! (Two words)
- An individual with computer skills who uses them to break into computer, systems and networks.
- A data privacy legal framework all European countries share.
- An incident in which data, computer systems or network are accessed or affected in a non-authorized way.
- The address of a web page. Remember to check its validity before clicking on it!
- Strengthens login security by requiring an additional piece of information beyond your password
14 Clues: Verifying identity. • A data privacy legal framework all European countries share. • The most common cyberthreat you can encounter in the virtual world • Action you should take if you suspect you received a phishing email • Change it regularly! Don't store it in unsecure location and mix it up! • ...
ITS2210 Module 7 Crossword P 2019-04-12
Across
- This virus is an example of domestic cyber terrorism
- This type of loss is the most likely damage to occur in an act of cyber terrorism
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- A political group that has used the internet for political intimidation
- This website has been a focus of identity theft criminals to gain access to personal data and pictures
- This conflict in 1990 had a cyber warfare component
- Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- Hacking conducted for ideological purposes
- Accessed to find postings from or about your target
Down
- Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- This command shows any shared files that are open
- This type of "data" is data relevant to an investigation
- Using the Internet to terrorize someone or some group of individuals
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- This type of warfare often involves propaganda and disinformation campaigns
- The NSA and ______ have allegedly had one of their cyber spies caught
- Cyber criminals can use your personal information to guess these
- The most popular search engine used to gather personal information
- Linux stores these logs at the following location /var/log/mail.*
20 Clues: Hacking conducted for ideological purposes • This command shows any shared files that are open • This conflict in 1990 had a cyber warfare component • Accessed to find postings from or about your target • This virus is an example of domestic cyber terrorism • This type of "data" is data relevant to an investigation • ...
2022 Cyber Awareness Crossword Puzzle 2022-10-19
Across
- Use _______ thinking to discern disinformation
- What disinformation becomes when it gets spread by people who aren’t aware it’s fake
- According to nearly every study conducted over the last decade, _______________ is involved in the vast majority of cyber attacks. (Two Words)
- Our ongoing commitment to preventing unauthorized access, both externally and internally, to confidential information can be defined as ________
- Voice Phishing is called _______
- _____ save your login information when you’re using a web browser
- Security is only as strong as your weakest ________
Down
- Always ______ Enact’s security policies
- A type of malicious software designed to block access to a computer system until a sum of money is paid; often starts with a phishing email
- Refers to the appropriate use of any data that is collected, stored, and transmitted
- Pay close attention to _____ especially on your mobile device where they may be hard to verify
- If something sounds too good to be true… there’s probably a _______ behind it
- Email classification for general business information shared with a customer
- Lost laptops, vishing phone calls, unbadged stranger in the building, are all examples of Security _________
14 Clues: Voice Phishing is called _______ • Always ______ Enact’s security policies • Use _______ thinking to discern disinformation • Security is only as strong as your weakest ________ • _____ save your login information when you’re using a web browser • Email classification for general business information shared with a customer • ...
Cyber Security Crossword 2022-08-22
Across
- You need to remediate these
- Never click on these links
- NEVER share this with anyone
- Software that locks your computer and you have to pay a fee to unlock it
Down
- a different type of system
- an operating system
- Always have this enabled
- This software is malicious
- the office you contact for anything cyber-security related
- You use this piece of technolocy to work
10 Clues: an operating system • Always have this enabled • a different type of system • This software is malicious • Never click on these links • You need to remediate these • NEVER share this with anyone • You use this piece of technolocy to work • the office you contact for anything cyber-security related • Software that locks your computer and you have to pay a fee to unlock it
Cyber security HarryH 2022-11-21
Across
- someone looks at your screen IRL
- It replicates itself and modifies programs
- A fake website that people enter important data into
- internet connected devices to steal data and send spam
- malware that threatens to leak your data
- connects the user’s device to a secure server, making the connection private.
Down
- malicious attempt to disrupt normal traffic
- message to trick someone to leaking information
- it checks incoming and outgoing traffic
- malware that misleads users of its true intent
10 Clues: someone looks at your screen IRL • it checks incoming and outgoing traffic • malware that threatens to leak your data • It replicates itself and modifies programs • malicious attempt to disrupt normal traffic • malware that misleads users of its true intent • message to trick someone to leaking information • A fake website that people enter important data into • ...
Cyber Security Crossword 2021-02-12
Across
- A person who uses computers to gain unauthorized access to data
- Not having official permission or approval.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A type of virus or worm that carries out a specific type of attack.
- Make sure or demonstrate that something is true, accurate, or justified.
Down
- Malware (malicious software) is software that is designed to gain access to your computer with malicious intent.
- A specific type of computer virus that tricks you into downloading it onto your computer.
- A set of numbers, letters and symbols to keep your devices and accounts locked.
- Adware can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- A malicious form of self replicating software.
10 Clues: Not having official permission or approval. • A malicious form of self replicating software. • A person who uses computers to gain unauthorized access to data • A type of virus or worm that carries out a specific type of attack. • Make sure or demonstrate that something is true, accurate, or justified. • ...
Cyber Security Crossword 2023-05-10
Across
- Pretending to be a Trusted Entity and Creating a Sense of Urgency
- A Code of Conduct on How to Behave Online
- References in a News Source to Confirm its Validity
- Family Parental Controls for Children
- A Layer of Protection For Device Usage
Down
- Checking Multiple Sources to Confirm Information
- Google Feature That Blocks Inappropriate Content
- Settings That Can Be Adjusted To Protect Personal Information
- A trap used to Deceive People into Giving Sensitive Information
- A Journalist's Perspective on a Fact
10 Clues: A Journalist's Perspective on a Fact • Family Parental Controls for Children • A Layer of Protection For Device Usage • A Code of Conduct on How to Behave Online • Checking Multiple Sources to Confirm Information • Google Feature That Blocks Inappropriate Content • References in a News Source to Confirm its Validity • ...
what is cyber security? 2022-12-10
IT Newsletter WordSearch #2 2025-02-25
Across
- A server that acts as an intermediary between a user and the internet.
- A popular web security and performance company protecting websites.
- The number of bits transmitted per second in a digital signal.
- The process of verifying a user's identity in security systems.
- A methodology combining software development and IT operations.
- A process of converting data into a fixed-length string for security.
- Gains unauthorized access to computer systems for various purposes.
- A value used to verify the integrity of data during transmission.
- A program that translates source code into machine code.
- Software embedded into hardware, often for low-level control functions.
- A facility that houses critical IT infrastructure, such as servers.
Down
- A cyber scam where attackers trick users into providing sensitive information.
- A malicious attempt to gain access to or damage computer systems.
- A program that initializes the operating system when a computer starts.
- A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
- A method of packaging software and dependencies for deployment.
- A wired networking technology for local area networks (LANs).
- A decentralized and tamper-proof digital ledger technology.
- Fake media created by the manipulation of real media by AI.
- An architectural approach where applications are built as small, independent services.
20 Clues: A program that translates source code into machine code. • A decentralized and tamper-proof digital ledger technology. • Fake media created by the manipulation of real media by AI. • A wired networking technology for local area networks (LANs). • The number of bits transmitted per second in a digital signal. • ...
Technologia 2025-10-26
Across
- Telepon pintar dengan OS mobile untuk komunikasi dan aplikasi produktivitas
- Teknologi nirkabel untuk konektivitas internet tanpa kabel
- Google ....,Lembar kerja untuk analisis data, formula, dan visualisasi informasi
- Google ....,Peta digital untuk navigasi dan menemukan lokasi secara real-time
- .... Security, Protection system dari cyber attack, hacking, dan data breach
- Perangkat gaming dedicated untuk experience immersive dengan graphics tinggi
- Google ....,Penyimpanan cloud aman untuk backup dan berbagi file digital
- Google ....,Aplikasi pengolah dokumen teks secara online dengan kolaborasi tim
- Perangkat layar sentuh portabel untuk hiburan, baca e-book, dan kerja ringan
- Bahasa pemrograman high-level untuk web development, data science, dan AI
Down
- .... Reality, Headset untuk experience immersive dalam lingkungan digital 3D interaktif
- Software malicious seperti virus, ransomware, dan spyware yang merusak sistem
- Koneksi jaringan kabel dengan kecepatan tinggi dan stability optimal
- Google ....,Aplikasi catatan cepat dengan reminder dan sinkronisasi cloud
- Jam tangan pintar dengan sensor kesehatan, notifikasi, dan fitness tracking
- ahli komputer yang mengeksplorasi atau membobol sistem
- Google ....,Tool presentasi dengan fitur kolaborasi real-time dan template profesional
- Seni menulis instruksi programming untuk membuat software dan aplikasi
- Google ....,Platform video conference dengan fitur screen sharing dan recording
- Komputer lipat portabel dengan performa untuk kerja dan kreativitas mobile
20 Clues: ahli komputer yang mengeksplorasi atau membobol sistem • Teknologi nirkabel untuk konektivitas internet tanpa kabel • Koneksi jaringan kabel dengan kecepatan tinggi dan stability optimal • Seni menulis instruksi programming untuk membuat software dan aplikasi • Google ....,Penyimpanan cloud aman untuk backup dan berbagi file digital • ...
Cyber Security (JW) 2023-04-21
Across
- Used to capture users information
- What information is made from
- _ of service
- A type of force attack
- An address used by computers
- A program written to cause damage to your computer
Down
- A tool used to block incoming threats from the internet
- A type of surfing to see someones password
- _ software in Malware
- A type of malware when bad code is hidden in what appears to be good program
10 Clues: _ of service • _ software in Malware • A type of force attack • An address used by computers • What information is made from • Used to capture users information • A type of surfing to see someones password • A program written to cause damage to your computer • A tool used to block incoming threats from the internet • ...
Cyber Security Crossword 2022-10-11
Across
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- A flaw or weakness that can be used to attack a system or organization
- A secret word or phrase that is used to access a computer system or service
- An internet version of a home address for your computer
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
Down
- A software that scans a device or a network to detect security threats
- An audio or video clip that has been edited and manipulated to seem real or believable
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
10 Clues: An internet version of a home address for your computer • A software that scans a device or a network to detect security threats • A flaw or weakness that can be used to attack a system or organization • A secret word or phrase that is used to access a computer system or service • ...
Cyber Security Crossword 2023-05-10
Across
- Pretending to be a Trusted Entity and Creating a Sense of Urgency
- A Code of Conduct on How to Behave Online
- References in a News Source to Confirm its Validity
- Family Parental Controls for Children
- A Layer of Protection For Device Usage
Down
- Checking Multiple Sources to Confirm Information
- Google Feature That Blocks Inappropriate Content
- Settings That Can Be Adjusted To Protect Personal Information
- A trap used to Deceive People into Giving Sensitive Information
- A Journalist's Perspective on a Fact
10 Clues: A Journalist's Perspective on a Fact • Family Parental Controls for Children • A Layer of Protection For Device Usage • A Code of Conduct on How to Behave Online • Checking Multiple Sources to Confirm Information • Google Feature That Blocks Inappropriate Content • References in a News Source to Confirm its Validity • ...
Cyber security crossword 2023-06-07
Across
- A self replicating computer program
- Rootkit is an example of this malware
- The do's and don'ts of online communication
- The meaning of latin word 'plagiarius' from which plagiarism was derived
- A set of related programs located at a network gateway server,that protects the resources of a private network from users of other networks
Down
- A type of software designed to protect against malware and other cyber threats.
- A type of malware that can spy on a computer user's activities
- Unwanted e-mail,generically
- Unauthorised use of software for temporary use
- a technological research and development Centre of Kerala Police Department conceived as a Cyber Centre of excellence
10 Clues: Unwanted e-mail,generically • A self replicating computer program • Rootkit is an example of this malware • The do's and don'ts of online communication • Unauthorised use of software for temporary use • A type of malware that can spy on a computer user's activities • The meaning of latin word 'plagiarius' from which plagiarism was derived • ...
Cyber Security Week 2023-09-30
Across
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
- What is the process of converting information into a code to prevent unauthorized access?
- What is a secret combination of letters, numbers, and symbols used to access a system or account?
- What is the practice of protecting systems, networks, and programs from digital attacks?
- What is the practice of regularly updating software and systems to protect against known vulnerabilities?
- What type of software is designed to block unauthorized access while permitting authorized communication?
Down
- What is the act of pretending to be someone else to deceive or gain access to information?
- What is a deceptive email or website designed to trick individuals into revealing personal information?
- What is a set of security rules and policies that govern the use of an organization's information technology resources?
10 Clues: What is the practice of protecting systems, networks, and programs from digital attacks? • What is the process of converting information into a code to prevent unauthorized access? • What is the act of pretending to be someone else to deceive or gain access to information? • ...
Cyber Security Awareness 2024-06-15
Across
- A network security system that monitors and controls incoming and outgoing network traffic.
- A network of private computers infected with malicious software and controlled as a group.
- Unauthorized access to or manipulation of a computer.
- A program designed to damage or do other unwanted actions on a computer.
- The process of verifying the identity of a person or device.
Down
- The practice of protecting information by transforming it into an unreadable format.
- Software designed to gather information about a person or organization without their knowledge.
- A type of malicious software that misleads users of its true intent.
- A type of cyberattack where the attacker impersonates someone else via email.
- Malicious software designed to block access to a computer until a sum of money is paid.
10 Clues: Unauthorized access to or manipulation of a computer. • The process of verifying the identity of a person or device. • A type of malicious software that misleads users of its true intent. • A program designed to damage or do other unwanted actions on a computer. • A type of cyberattack where the attacker impersonates someone else via email. • ...
Cyber Security Quiz 2025-09-25
Across
- Your files are locked & the price to unlock them isn't cheap.
- You think you're visiting a safe site, but you're not.
- Someone's secretly listening between two trusted parties.
- Guessing passwords one by one until something cracks.
- A script sneaks into a webpage and messes with users.
Down
- An exploit that strikes before anyone knows it exists.
- A database gets manipulated when queries aren't properly sanitized.
- Reusing stolen logins across multiple sites—hoping for a match.
- Trickery in your inbox—looks legit, but it's bait.
- Too many requests—your server can't breathe.
10 Clues: Too many requests—your server can't breathe. • Trickery in your inbox—looks legit, but it's bait. • Guessing passwords one by one until something cracks. • A script sneaks into a webpage and messes with users. • An exploit that strikes before anyone knows it exists. • You think you're visiting a safe site, but you're not. • ...
Cyber safety-Chloe lu 2016-06-07
Across
- someone that takes care of you
- where you can look up what you need
- something that can be good
- sending over a phrase
- something you need to get from a parent or teacher
- blocks virus
- making sure your safe
- it can be inappropriate
- bullying bullying online
- rule a rule you should always keep
Down
- something that can help or not
- a form of words
- doing the right thing
- messages something that you need to always check
- usually a website
- only share with family or teachers
- admitting what you did wrong
- mess up you computer
- networks social group
- people that can sometimes get your personal information
20 Clues: blocks virus • a form of words • usually a website • mess up you computer • doing the right thing • sending over a phrase • making sure your safe • networks social group • it can be inappropriate • bullying bullying online • something that can be good • admitting what you did wrong • something that can help or not • someone that takes care of you • only share with family or teachers • ...
Megan Strait Cyber Security Crossword 2023-04-20
Across
- locks computer until ransom is paid.
- “bring your own device”.
- network of computers for cyberattacks.
- “UI redress attack”.
- malware appears harmless - malicious actions.
- secures data on cloud infrastructure.
- fake email - provides sensitive information.
- built-in security feature operating systems.
- IT software - protects against threats.
- unknowingly transmits private user information.
- protects data during encryption process.
- scrambling data - authorized users can access.
Down
- malicious software - damage computer system.
- system protects against unauthorized access.
- attacks unknown vulnerability in software.
- users connect to wireless hotspots.
- Protects against violation of a network.
- distributed denial of service attack.
- cyber-physical systems for high-value environments.
- virtual private network.
20 Clues: “UI redress attack”. • “bring your own device”. • virtual private network. • users connect to wireless hotspots. • locks computer until ransom is paid. • secures data on cloud infrastructure. • distributed denial of service attack. • network of computers for cyberattacks. • IT software - protects against threats. • Protects against violation of a network. • ...
Robotics vocab 2021-01-12
Across
- such as eBay® or PayPal®
- the illegal obtaining, giving or selling of passwords
- a form of cybercrime where offensive letters are sent through e-mail
- stealing money or property using interstate wire communication; considered a federal crime
- software programs which spread from computer to computer and are malicious in nature
- refer to TV, radio or the Internet; means of communication
- Internet harassment
- take advantage of kids by using instant messaging, e-mail and social network sites
- This is used to protect our IP symbols
- designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- software installed discreetly which alters the usability of a computer
- security measure used on today’s Internet which insures the data is secure
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Used to protect designed IP
- federal regulatory body which monitors and deals with identity theft
Down
- (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- an individual who alters electronics legally
- involves fraudulent e-mails pretending to originate from banks or online O
- someone who illegally alters computer hardware or breaches computer systems
- when someone steals personal information to commit fraud or other crimes
- any crime involving computers
- Way to protect a written IP
- the illegal stealing, copying or spreading of media including software, movies and music
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
24 Clues: Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • Used to protect designed IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • refer to TV, radio or the Internet; means of communication • ...
Password Cracking 2024-04-08
Across
- String of characters for authentication and log on computer, web app, software, files, network, etc
- OS in which John the ripper, and other Cyber security tools come pre-installed("-" in middle)
- Attack uses a list of commonly used passwords to try to gain unauthorized access
- Unique Identifier used before a password to Login, and not usually considered Confidential
- John the Ripper tool was initially built for which OS?
- Open source reporting and collaboration tool for Documentation and Reporting in Cyber Security projects
- What is the full form of Fi in Wifi
- "- the Ripper". In the name of this tool, who is the Ripper
- Evil Twin attack is a type of which attack? ("-" in middle)
- Commonly used set of utilities for analyzing networks for weaknesses.
Down
- World's most common alphabetic password in organizations usually for high-level access.(Lab password)
- Practice where thieves steal your personal data by spying over your shoulder as you use a laptop or ATM("-" in middle)
- Another name for web crawling
- More efficient version of a Brute Force Attack, when the attacker knows a pattern in the password.("-" in middle)
- The answer is in the name. This attack involved making assumptions on what the password might be
- This table is a hash function used in Cryptography for storing important data such as passwords
- Term for disguising passwords or other data using a reversible transformation
- What type of attack involves intercepting and analyzing network traffic to capture login credentials?
- Guessing possible combinations of a targetted password. Also known as Exhaustive search.("-" in middle)
- Process of guessing or recovering a password from stored data or transmission
20 Clues: Another name for web crawling • What is the full form of Fi in Wifi • John the Ripper tool was initially built for which OS? • "- the Ripper". In the name of this tool, who is the Ripper • Evil Twin attack is a type of which attack? ("-" in middle) • Commonly used set of utilities for analyzing networks for weaknesses. • ...
Eeskujud ja antieeskujud 2020-01-27
Across
- Valgemütsid ehk...
- Kes on Cyber Security Network asjutaja?
- Vene häkker, kes pettis välja passi ja pankade võltsingutega?
- Kes on infoturbe juht Xeroxis?
- Ristsõna autori perekonna nimi on...
- Mustad mütsid ehk...
- Hallimütsid ehk...
- Kes on tundtud nime all DynamicWebPaige?
Down
- Kes on esimese arvutiviiruse looja?
- Kes on endine CIA ja DIA töötaja?
- Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
- Kes on töödanud koos Steve Jobsiga?
- Kes on USA küberturbe uurija?
- Kes on Austraalia internetiaktivist ja ajakirjanik?
- Mille asutasid Steve Jobs ja Steve Wozniak?
15 Clues: Valgemütsid ehk... • Hallimütsid ehk... • Mustad mütsid ehk... • Kes on USA küberturbe uurija? • Kes on infoturbe juht Xeroxis? • Kes on endine CIA ja DIA töötaja? • Kes on esimese arvutiviiruse looja? • Kes on töödanud koos Steve Jobsiga? • Ristsõna autori perekonna nimi on... • Kes on Cyber Security Network asjutaja? • Kes on tundtud nime all DynamicWebPaige? • ...
KKM Himatif 2023-09-14
Across
- Kepanjangan Dev dalam 'Devcom'
- IRC berfokus dalam bidang?
- Kepanjangan 'De' pada IdeA
- Cabang olahraga yang menjadi fokus IBC
- Huruf 'i' pada nama KKM IBT, IRC, dan IFC
- Huruf 'T' pada KKM IBT
- Huruf 'F' pada IFC
Down
- KKM yang mendalami bidang Software Engineering
- Komunitas yang berfokus dalam bidang cyber security
- Fokus olahraga pada KKM IBT
- KKM TI yang berfokus pada bidang design
- Jumlah total KKM yang ada di Himatif
- KKM yang bergerak dalam bidang olahraga futsal
- Jumlah KKM yang bergerak di bidang olahraga
- KKM yang bergerak di bidang Robotika?
15 Clues: Huruf 'F' pada IFC • Huruf 'T' pada KKM IBT • IRC berfokus dalam bidang? • Kepanjangan 'De' pada IdeA • Fokus olahraga pada KKM IBT • Kepanjangan Dev dalam 'Devcom' • Jumlah total KKM yang ada di Himatif • KKM yang bergerak di bidang Robotika? • Cabang olahraga yang menjadi fokus IBC • KKM TI yang berfokus pada bidang design • Huruf 'i' pada nama KKM IBT, IRC, dan IFC • ...
Cybersecurity Crossword Puzzle 2023-05-16
Across
- Weakness or flaw in a system that can be exploited by attackers.
- Science of secure communication using codes and ciphers.
- Isolated environment used for testing potentially malicious software.
- Authentication method that uses unique physical or behavioral characteristics.
- Software designed to harm or exploit computer systems.
- Process of verifying the identity of a user or s
- Virtual Private Network that provides secure and private communication over public networks.
- Decoy system designed to attract and monitor unauthorized access attempts.
- Network security device that monitors and filters incoming and outgoing network traffic.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- A secret word or phrase used for authentication and access control.
- Malicious code that replicates itself and infects computer systems.
Down
- Unauthorized access to computer systems or networks.
- Distributed Denial of Service attack that overwhelms a target system with traffic.
- Vulnerability or exploit that is unknown to software developers or security researchers.
- Cyber attack method that tricks users into revealing sensitive information.
- Process of converting information into a secret code to prevent unauthorized access.
- Malicious software that disguises itself as legitimate software.
- A hidden entry point into a system that bypasses normal security mechanisms.
- Criminal activities conducted over the internet.
- A person who uses their programming skills to gain unauthorized access to computer systems.
- Malicious software that encrypts files and demands a ransom for their release.
- Software update that fixes security vulnerabilities.
23 Clues: Criminal activities conducted over the internet. • Process of verifying the identity of a user or s • Unauthorized access to computer systems or networks. • Software update that fixes security vulnerabilities. • Software designed to harm or exploit computer systems. • Science of secure communication using codes and ciphers. • ...
Eeskujud ja antieeskujud 2020-01-27
Across
- Mustad mütsid ehk...
- Kes on Austraalia internetiaktivist ja ajakirjanik?
- Kes on infoturbe juht Xeroxis?
- Vene häkker, kes pettis välja passi ja pankade võltsingutega?
- Valgemütsid ehk...
- Kes on endine CIA ja DIA töötaja?
- Hallimütsid ehk...
Down
- Kes sündis 6.augustil 1963 ja tegi kuulsaks IT-süsteemidega seonduvate inimeste ründamise?
- Kes on esimese arvutiviiruse looja?
- Mille asutasid Steve Jobs ja Steve Wozniak?
- Kes on USA küberturbe uurija?
- Kes on töödanud koos Steve Jobsiga?
- Kes on Cyber Security Network asjutaja?
- Kes on tundtud nime all DynamicWebPaige?
- Ristsõna autori perekonna nimi on...
15 Clues: Valgemütsid ehk... • Hallimütsid ehk... • Mustad mütsid ehk... • Kes on USA küberturbe uurija? • Kes on infoturbe juht Xeroxis? • Kes on endine CIA ja DIA töötaja? • Kes on esimese arvutiviiruse looja? • Kes on töödanud koos Steve Jobsiga? • Ristsõna autori perekonna nimi on... • Kes on Cyber Security Network asjutaja? • Kes on tundtud nime all DynamicWebPaige? • ...
IT Vocabulary KB 2024-04-24
Across
- The website creates new ideas.
- The city's earnings are above average.
- The restaurant serves many types of food.
- The manual explains clearly.
- The computer has a comfy typing surface.
- The project needs a large amount of financial support.
- Problems may happen unexpectedly.
Down
- Company leaders manage business.
- The boss gives a new plan.
- The CEO likes a prestigious name.
- The company checks information.
- New markets look promising.
- Security fights digital attacks.
- The organization runs daily operations constantly.
- The car fixes its machinery.
15 Clues: The boss gives a new plan. • New markets look promising. • The manual explains clearly. • The car fixes its machinery. • The website creates new ideas. • The company checks information. • Company leaders manage business. • Security fights digital attacks. • The CEO likes a prestigious name. • Problems may happen unexpectedly. • The city's earnings are above average. • ...
Data Safety 2025-07-23
Across
- Strength in numbers?
- cyber attack, often looking like trusted emails
- Information about a user
- tool to keep data safe
- User-activated malware that spreads
- training, on ethics of data, for example
- space that stores data (in the sky?)
- Act that protects student data, abr.
Down
- the quality of being private, as data should be
- Multi-factor authorization
- European law protecting internet security
- Person who reports unethical practices
- Must be gained before data is mined
- safe from loss or unauthorized use
- moral principles
15 Clues: moral principles • Strength in numbers? • tool to keep data safe • Information about a user • Multi-factor authorization • safe from loss or unauthorized use • Must be gained before data is mined • User-activated malware that spreads • space that stores data (in the sky?) • Act that protects student data, abr. • Person who reports unethical practices • ...
Test Crossword (Hexacorp) 2020-05-07
CB1 2018-08-03
Across
- ____ security; protection of systems from theft or damage to hardware, software or electronic data
- new head honcho
- real-time settlement funds transfer system
- csp ____
- central securities depository; settles equities, munis, corporate bonds, etc.
- US govt debt, shortest maturity
- account balance is negative
Down
- contingency site
- fraudulent email designed to reveal information
- 9/10 arrangement
- first president; alternatively $100
- messaging system
- process whereby securities are delivered, usually against payment
- program to facilitate clearing & settlements
- system that provides connectivity to a range of swift services
15 Clues: csp ____ • new head honcho • contingency site • 9/10 arrangement • messaging system • account balance is negative • US govt debt, shortest maturity • first president; alternatively $100 • real-time settlement funds transfer system • program to facilitate clearing & settlements • fraudulent email designed to reveal information • ...
IT Vocabulary KB 2024-04-24
Across
- The website creates new ideas.
- The city's earnings are above average.
- The restaurant serves many types of food.
- The manual explains clearly.
- The computer has a comfy typing surface.
- The project needs a large amount of financial support.
- Problems may happen unexpectedly.
Down
- Company leaders manage business.
- The boss gives a new plan.
- The CEO likes a prestigious name.
- The company checks information.
- New markets look promising.
- Security fights digital attacks.
- The organization runs daily operations constantly.
- The car fixes its machinery.
15 Clues: The boss gives a new plan. • New markets look promising. • The manual explains clearly. • The car fixes its machinery. • The website creates new ideas. • The company checks information. • Company leaders manage business. • Security fights digital attacks. • The CEO likes a prestigious name. • Problems may happen unexpectedly. • The city's earnings are above average. • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
RU ITEC411 Crime and Security 2025-10-18
Across
- (2 words) a type of hacker who behaves destructively/unethically.
- The manipulation of people into violating security protocols.
- A cyber attack in which a server or service is overwhelmed with requests.
- (2 words) a type of hacker who behaves constructively, improving security and demonstrating vulnerabilities.
- Software allowing future access to a machine by bypassing security checks.
- Software that attaches to another program. Often replicates.
- (2 words) websites/servers meant to be attractive to hackers for study.
- Malware that holds your files cryptographically hostage pending payment.
- An organization created in response to the Internet Worm incident.
Down
- Malware that logs user activities and sends it to a server.
- Performing acts of technical expertise; has been used both positively and negatively over time.
- (2 words) Malware that appears benign but hides malicious behavior.
- Written defamation.
- The act of hacking for a political cause.
- Verbal defamation
- A group of computers with a virus allowing them to cooperate over a server.
- Luring users to fake sites for the collection of personal data.
- Sending mass messages attempting to steal information.
- An independent piece of software that attempts to replicate to nearby vulnerable systems.
- An act passed in the 1980s, made it illegal to read/copy federally-involved computer systems.
20 Clues: Verbal defamation • Written defamation. • The act of hacking for a political cause. • Sending mass messages attempting to steal information. • Malware that logs user activities and sends it to a server. • Software that attaches to another program. Often replicates. • The manipulation of people into violating security protocols. • ...
Networking and Cyber Ethics Crossword Puzzle 2025-06-21
Across
- Network confined to a small area
- Unwanted email
- File that records your browsing data
- Unsecured wireless network risk
- A global network of computers
- Data traveling on a network
- bullying Sending harmful or abusive messages online
- Address Your unique address on the Internet
- Set of rules for communication between devices
- Protects computers from unauthorized access
Down
- An act of gaining unauthorized access
- Malicious software
- Hacker Person who protects networks from attacks
- Ethics Ethical use of digital resources
- High-speed internet connection
- Keeping data safe and private
- Identity theft technique using fake websites
- Connecting two or more computers
- A device that connects multiple networks
19 Clues: Unwanted email • Malicious software • Data traveling on a network • Keeping data safe and private • A global network of computers • High-speed internet connection • Unsecured wireless network risk • Network confined to a small area • Connecting two or more computers • File that records your browsing data • An act of gaining unauthorized access • ...
Robotics vocab 2021-01-12
Across
- such as eBay® or PayPal®
- the illegal obtaining, giving or selling of passwords
- a form of cybercrime where offensive letters are sent through e-mail
- stealing money or property using interstate wire communication; considered a federal crime
- software programs which spread from computer to computer and are malicious in nature
- refer to TV, radio or the Internet; means of communication
- Internet harassment
- take advantage of kids by using instant messaging, e-mail and social network sites
- This is used to protect our IP symbols
- designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- software installed discreetly which alters the usability of a computer
- security measure used on today’s Internet which insures the data is secure
- modifying electronics such as an Xbox®, cell phone, or iPod®
- Used to protect designed IP
- federal regulatory body which monitors and deals with identity theft
Down
- (USCERT) a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- an individual who alters electronics legally
- involves fraudulent e-mails pretending to originate from banks or online O
- someone who illegally alters computer hardware or breaches computer systems
- when someone steals personal information to commit fraud or other crimes
- any crime involving computers
- Way to protect a written IP
- the illegal stealing, copying or spreading of media including software, movies and music
- (Internet Crime Complaint Center) - a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime
24 Clues: Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • Used to protect designed IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • refer to TV, radio or the Internet; means of communication • ...
Types of threats 2019-01-09
Across
- surfing atching an authorized user enter a security code on a keypad.
- A destructive computer program that bores its way through a computer's files
- A piece of code that is capable of copying itself
- A type of Malware that locates
- prevents the program from running as expected
- n attacker entering a secured building by following an authorized employee
- When someone deceives by pretending to be someone else
- a cyber-security attacker to take control
Down
- Advertising-supported software
- data that ransome gets paid to remove
- An attack that sends an email or displays a Web announcement that falsely claims
- pro quo Criminals promise a service in exchange for details
- Program that hides in a computer
- Collection of captured bot computers
- Criminals make a promise of goods in return for details
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
ITS2210 Module 7 Crossword 2019-04-12
Across
- This type of loss is the most likely damage to occur in an act of cyber terrorism
- Of the websites in listed in Chapter 13, this one is the most useful in obtaining the address and phone numbers of those folks living outside the U.S.
- Hacking conducted for ideological purposes
- Using the Internet to terrorize someone or some group of individuals
- Accessed to find postings from or about your target
- The most popular search engine used to gather personal information
- Cyber criminals can use your personal information to guess these
- Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- Linux stores these logs at the following location /var/log/mail.*
Down
- This virus is an example of domestic cyber terrorism
- This command shows any shared files that are open
- This type of warfare often involves propaganda and disinformation campaigns
- This website has been a focus of identity theft criminals to gain access to personal data and pictures
- This type of "data" is data relevant to an investigation
- The process of finding names, addresses, and phone numbers using popular websites like Yahoo
- A political group that has used the internet for political intimidation
- According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- Standard Linux command that is also available as a Windows application that can be used to create bitstream images and make a forensic copy
- This conflict in 1990 had a cyber warfare component
- The NSA and ______ have allegedly had one of their cyber spies caught
20 Clues: Hacking conducted for ideological purposes • This command shows any shared files that are open • Accessed to find postings from or about your target • This conflict in 1990 had a cyber warfare component • This virus is an example of domestic cyber terrorism • This type of "data" is data relevant to an investigation • ...
E-Ethics 2021-01-12
Across
- cyber crime
- the illegal obtaining, giving or selling of passwords
- Used to protect designed (say an invention or a door knob) IP
- - someone who illegally alters computer hardware or breaches computer
- take advantage of kids by using instant messaging, e-mail and social network sites
- federal regulatory body which monitors and deals with identity theft
- involves fraudulent e-mails pretending to originate from banks or online O
- any crime involving computers
- This is used to protect our IP symbols
- when someone steals personal information to commit fraud or other crimes
- security measure used on today’s Internet which insures the data is secure
- can happen when e-mails are abusive; also comes about if talk in online forums becomes threatening Harassment
- stealing money or property using interstate wire communication; considered a federal crime
- software installed discreetly which alters the usability of a computer
Down
- a partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks
- modifying electronics such as an Xbox®, cell phone, or iPod®
- nature
- Internet harassment
- Way to protect a written IP
- a partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints
- to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers
- an individual who alters electronics legally
- the illegal stealing, copying or spreading of media including software, movies and music
- such as eBay® or PayPal®
- a form of cybercrime where offensive letters are sent through e-mail
- software programs which spread from computer to computer and are malicious
26 Clues: nature • cyber crime • Internet harassment • such as eBay® or PayPal® • Way to protect a written IP • any crime involving computers • This is used to protect our IP symbols • an individual who alters electronics legally • the illegal obtaining, giving or selling of passwords • modifying electronics such as an Xbox®, cell phone, or iPod® • ...
Cyber Security Words and Terms 2022-09-15
Across
- A secret word or phrase that is used to access a computer system or service.
- Text that can be read by the human eye, like this article!
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A simple form of code for software that can be written in word editors.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- The deliberate use of someone else's identity, typically for financial gain.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The programs and other operating systems used by a computer.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Software that has their code listed as free to use, share, and modify.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
20 Clues: Text that can be read by the human eye, like this article! • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service. • ...
IT Networking / Cyber Security term 2025-03-29
Across
- – Fraudulent attempt to steal.
- (Domain Name System) – Translates domains into IP.
- – Wired network connection standard.
- Authentication (2FA) – Extra security verification step.
- – Small unit of data.
- (Service Set Identifier) – Wi-Fi network name.
- – Converts data into code.
- Server – Acts as intermediary gateway.
- – Malicious software program.
- (Dynamic Host Configuration Protocol) – Assigns IP automatically.
- (Distributed Denial of Service) – Overloads network with requests.
Down
- – Checks network connectivity.
- – Secures data using cryptography.
- (Virtual Private Network) – Secure network over internet.
- – Filters unauthorized network traffic.
- – Connects different network segments.
- Detection System (IDS) – Monitors suspicious network activity.
- Mask – Defines IP address range.
- – Directs data to devices.
- Trust – Never trust, always verify.
- – Internet's fundamental communication protocol.
- Address – Unique hardware device identifier.
- – Delay in data transmission.
- Address – Identifies devices on network.
- – Maximum data transfer rate.
25 Clues: – Small unit of data. • – Directs data to devices. • – Converts data into code. • – Delay in data transmission. • – Maximum data transfer rate. • – Malicious software program. • – Checks network connectivity. • – Fraudulent attempt to steal. • Mask – Defines IP address range. • – Secures data using cryptography. • Trust – Never trust, always verify. • ...
Foundations of Cyber Security I 2025-02-13
Across
- The act of making sure every individual working with an information system has specific responsibilities for information assurance.
- A process that gives a user permission to do certain things.
- A three-pronged system of cybersecurity.
- Ciphers that break down information into fixed-size blocks before encrypting it.
- Software that displays unwanted advertising while running an application on your computer.
- A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
- A guarantee of reliable access to information.
- A device that helps join two separate computer networks together to allow for communication.
- A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
- A security technique used to regulate who or what can utilize the resources of a computer system.
- Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
- A process that measures how much information has been accessed or the amount of time spent on a session.
- The governance, development, and maintenance of computer programs.
- A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
- The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
- One that is physically isolated from the internet and only able to pass data along via removable media.
- A process or set of rules.
- The use of human characteristics to distinctly identify individuals as themselves.
- A process that keeps a system secure by physically isolating it from all unsecured networks.
- An orderly search for nonvolatile data storage to load the OS.
20 Clues: A process or set of rules. • A three-pronged system of cybersecurity. • A guarantee of reliable access to information. • A process that gives a user permission to do certain things. • An orderly search for nonvolatile data storage to load the OS. • The governance, development, and maintenance of computer programs. • ...
Cyber Security 2 Chapter 4 2025-10-13
Across
- The 'I' in the CIA Triad, ensuring that data is not altered or destroyed in an unauthorized manner.
- A software update that fixes a vulnerability.
- An algorithm used to encrypt and decrypt data.
- The raw text or data before it is encrypted.
- The art of writing and solving codes.
- The standard for secure, encrypted communication on the internet, replacing SSL. (abbreviation)
- A file maintained by a server that contains information about all the activities that have occurred on that server.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Software that secretly monitors a user's online activity.
- A secret key used in cryptography.
- A flaw or weakness in a program.
- A network that uses public telecommunication infrastructure, such as the internet, to provide remote offices with secure access to their organization's network (abbreviation).
- A network of connected devices within a specific geographic area. (abbreviation)
- The process of converting encrypted data back into its original, readable form.
Down
- The result of encrypting plaintext.
- A small program that can be embedded in a website or document.
- A program that replicates itself over a network.
- A type of malicious software that collects information about a person or organization without their knowledge.
- A mathematical scheme for demonstrating the authenticity of a digital message or document. (2 words)
- A technique used by attackers to make their network traffic look like it came from a legitimate source.
- A digital document used to prove the ownership of a public key. (2 words)
- The main circuit board of the computer.
- A physical object, such as a token or smart card, used to authenticate a user.
23 Clues: A flaw or weakness in a program. • A secret key used in cryptography. • The result of encrypting plaintext. • The art of writing and solving codes. • The main circuit board of the computer. • The raw text or data before it is encrypted. • A software update that fixes a vulnerability. • An algorithm used to encrypt and decrypt data. • ...
Crossword 2024-05-28
Across
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- A method of trying to gather personal information using deceptive e-mails and websites.
- A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
- A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
- A device or software application that monitors a network or systems for malicious activity or policy violations.
- A cyber attack that occurs on the same day a vulnerability is discovered in software.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A service that encrypts your internet traffic and protects your online identity.
Down
- Malicious software designed to harm, exploit, or otherwise compromise a computer system.
- An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
- A trial-and-error method used to decode encrypted data such as passwords.
- An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A code injection technique that might destroy your database.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
- A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
20 Clues: A code injection technique that might destroy your database. • A trial-and-error method used to decode encrypted data such as passwords. • A service that encrypts your internet traffic and protects your online identity. • A cyber attack that occurs on the same day a vulnerability is discovered in software. • ...
FY2025 Cyber Security Training 2024-11-05
Across
- Don't click without _____.
- The number of principles the GDPR requires companies to adhere to.
- A piece of evidence a user must produce to verify they are an account’s true owner.
- BEC means Business ____ Compromise.
- On average Parker blocks 32 ____ attempts to access Parker Networks.
- _____, unique passwords are best practice.
Down
- This is voice phishing.
- This is something you are, including fingerprints or facial recognition.
- _____ Data means any data relating to a living individual who is or can be identified from the data itself.
- Before leaving your workstation, you should always do this to the area.
- Text message phishing.
- Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
- CEO fraud is one of the most common forms of this.
- Designed to damage devices or exploit them for sensitive information and access.
14 Clues: Text message phishing. • This is voice phishing. • Don't click without _____. • BEC means Business ____ Compromise. • _____, unique passwords are best practice. • CEO fraud is one of the most common forms of this. • The number of principles the GDPR requires companies to adhere to. • On average Parker blocks 32 ____ attempts to access Parker Networks. • ...
Cyber Security Month Crossword 2022-09-23
Across
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- A digital form of social engineering to deceive individuals into providing sensitive information.
- A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- Facebook, Twitter, Instagram, etc. (Two words)
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- Software that compromises the operation of a system by performing an unauthorized function or process.
Down
- Widely used in-home network technololy that allows for wireless connection.
- A security tool that creates a secure, encrypted connection between you and the internet
- A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
- The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- An unauthorized user who attempts to or gains access to an information system.
15 Clues: Facebook, Twitter, Instagram, etc. (Two words) • Widely used in-home network technololy that allows for wireless connection. • An unauthorized user who attempts to or gains access to an information system. • A security tool that creates a secure, encrypted connection between you and the internet • ...
Cyber Ethics 2025-06-16
Across
- hacking hacking done for a good cause
- crime criminal activities
- malicious software
- set of programs that disrupts the functioning
- combination of voice and phishing
Down
- bombing sending bulk emails till the server gets full
- a security system that prevents unauthorised access
- unwanted bulk emails
- simplest way of preventing plagiarism
- Law legal rules on online users
10 Clues: malicious software • unwanted bulk emails • crime criminal activities • Law legal rules on online users • combination of voice and phishing • hacking hacking done for a good cause • simplest way of preventing plagiarism • set of programs that disrupts the functioning • a security system that prevents unauthorised access • bombing sending bulk emails till the server gets full
Inari Medical Cyber Security Crossword 2023-05-12
Across
- If you get a suspicious email, do not _____ it to your coworkers.
- Don't _____ your credentials with anyone!
- Only install apps/software from _____ sources (Apple App Store, Google Play).
- Use Multi-Factor _____ (MFA) whenever possible.
- Use the _____ Alert Button in your Outlook client to report phishy emails.
- Lock your _____ when you walk away by using the Windows + L keys on your keyboard.
- Use a _____, unique password for all of your accounts.
- Throw sensitive/confidential documents in the designated _____ bins to keep your information safe.
- Report any _____ activity or security incidents to your IT department ASAP.
- Keep your computer and software __-__-____.
Down
- If you _____ something, say something.
- Don't store _____ information in non-secure places.
- Don't write your _____ on post-it notes!
- Keep your passwords _____.
- Be a _____ firewall!
- Don't click on links or download _____ from unknown senders.
- Use a VPN connection when using public _____ networks.
- Think before you _____.
- Don't _____ to phishy emails. Just delete them instead.
- Phishing attempts can also be sent via _____ message.
- Be careful not to share your _____ information on social media.
21 Clues: Be a _____ firewall! • Think before you _____. • Keep your passwords _____. • If you _____ something, say something. • Don't write your _____ on post-it notes! • Don't _____ your credentials with anyone! • Keep your computer and software __-__-____. • Use Multi-Factor _____ (MFA) whenever possible. • Don't store _____ information in non-secure places. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Risks of Emerging Technology 2025-10-03
Across
- Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
- Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
- Automation errors, lack of human oversight, cyber vulnerabilities
- Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
- Security of virtual environments, fraud in immersive platforms, and privacy issues
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
- Potential to break current cryptographic systems which may lead to data breaches and fraud
9 Clues: Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Positions ideal for individuals with more than five years of experience
- A trail of data intentionally left behind by a user
- Store information across pages within the site
- Crime that involves a computer and/or a network
- Describes the digital environment in which computer networks communicate
- Software that automatically displays or downloads advertising material
- A type of malicious software
- Links two or more devices
- Someone who uses the internet to cause harm to a victim
- Online harassment that uses electronic communication
- Web browser feature
Down
- Someone who uses a computer to gain access to systems or networks
- Internet connection that encrypts traffic from a device to a private network
- A standalone self-replicating software application that invades and destroys computers
- Do not share ____________ across multiple sites
- Software that allows an attacker to obtain information on another computer
- Personally identifiable information
- Malicious attempts by hackers to damage, steal, or destroy a computer
- ___________ engineering is when an attacker manipulates someone into revealing information
- Attacker sends fraudulent emails to deceive someone into revealing information
- Software designed to disrupt, damage, or gain unauthorized access to a computer
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Do not share ____________ across multiple sites • Crime that involves a computer and/or a network • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
Malware and cyber security 2023-11-22
Across
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- a malicious form of self-replicating software.
- Providing customer service online
- a large collection of malware-infected devices
- a piece of software that appears to perform a useful function but actually performs malicious actions.
- software that is designed to gain access to your computer with malicious intent.
- record every keystroke made by a user.
- Bots are automated programs that perform tasks repeatedly.
- An email that is disguised in order to trick them into givingup valuable data.
Down
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- software that monitors and gathers information on a person and how they use their computer.
- attacker watching the victim while they provide sensitive information.
- spread through the network and use the system’s resources.
- Monitoring the prices of items to find the best deal
14 Clues: Providing customer service online • record every keystroke made by a user. • a malicious form of self-replicating software. • a large collection of malware-infected devices • Monitoring the prices of items to find the best deal • spread through the network and use the system’s resources. • Bots are automated programs that perform tasks repeatedly. • ...
FITE 2013-05-16
Across
- stores info. on internet servers
- central processing unit/speed of computer
- 1000 gigabytes
- cyber security
- two things that can be used together
- a document having a present format, used as a starting point
- the close up or preview of a template
- 1000 terabytes
- input
- output
- something you attach to your computer
- smallest unit of data
- internet connection
- printed circuit that is the foundation of a computer
- domain
- a port formed by IBM connecting a mouse or keyboard to a PC
- protection of anyones work
- computer screen
- search internet for specific info.
- programs given to a computer to do a direct operation
- internet and online world
Down
- arrangement of graphic matters
- slogan
- quoting a reference to an athourity
- specific, easier
- processing of powering up your computer
- cyber safety
- connects to the internet
- internet service/Comcast
- program that lets you interact with your computer
- random access memory
- search engine that checks all search engines
- a socket in a microcomputer that will accept a plug-in circuit board
- wired internet
- programs designed for a special need or purpose
- hardware connection
- provides data to other computers
- the way you behave online
- logo
- main storage media device that permanently stores all data on computer
- provides a variety of channels of data over a single communication medium
- series of instructions given to a computer to do a certain task
- 1000 petabytes
- a brief account of ones profession
- the wiring making up a computer system
- SSID
- 1000 kilobytes
47 Clues: logo • SSID • input • slogan • output • domain • cyber safety • 1000 gigabytes • cyber security • 1000 terabytes • wired internet • 1000 petabytes • 1000 kilobytes • computer screen • specific, easier • hardware connection • internet connection • random access memory • smallest unit of data • connects to the internet • internet service/Comcast • the way you behave online • internet and online world • ...
tast 2023-02-03
Types of threats 2019-01-09
Across
- A piece of code that is capable of copying itself
- Program that hides in a computer
- surfing atching an authorized user enter a security code on a keypad.
- n attacker entering a secured building by following an authorized employee
- a cyber-security attacker to take control
Down
- data that ransome gets paid to remove
- When someone deceives by pretending to be someone else
- Advertising-supported software
- A destructive computer program that bores its way through a computer's files
- Criminals make a promise of goods in return for details
- An attack that sends an email or displays a Web announcement that falsely claims
- A type of Malware that locates
- pro quo Criminals promise a service in exchange for details
- prevents the program from running as expected
- Collection of captured bot computers
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
Reportable Information 2025-04-24
Across
- A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.
- __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
- A potential risk indicator for person living above his means
- An employee who hates his job to the point of aggression
- A security compromise, infraction, or violation
Down
- Security incidents are categorized as either a security infraction or a security ______
- _____ security is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
- The ability and opportunity to gain knowledge of classified information.
- Denies adversaries information about friendly capabilities, activities, limitations, and intentions that adversaries need to make competent operational decisions. (Acronym)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
10 Clues: A security compromise, infraction, or violation • An employee who hates his job to the point of aggression • A potential risk indicator for person living above his means • The ability and opportunity to gain knowledge of classified information. • Security incidents are categorized as either a security infraction or a security ______ • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- A security system that monitors and controls incoming and outgoing network traffic
- hygiene The routine practices and steps taken to maintain good digital security.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
- A malicious program disguised as legitimate software.
- breach An incident where sensitive information is accessed or disclosed without authorization.
- Malicious software designed to damage or gain unauthorized access to systems.
- Determines what an authenticated user is allowed to do
Down
- A type of malware that locks your data and demands payment to unlock it.
- A method of converting data into a secret code to prevent unauthorized access.
- The process of verifying the identity of a user or device
- A software update that fixes security vulnerabilities or bugs.
- Software designed to detect and remove malicious programs from your computer.
- Protecting data from being altered or tampered with
14 Clues: Protecting data from being altered or tampered with • A malicious program disguised as legitimate software. • Determines what an authenticated user is allowed to do • The process of verifying the identity of a user or device • A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • ...
Types of threats 2019-01-09
Across
- Collection of captured bot computers
- A destructive computer program that bores its way through a computer's files
- surfing atching an authorized user enter a security code on a keypad.
- data that ransome gets paid to remove
- When someone deceives by pretending to be someone else
- An attack that sends an email or displays a Web announcement that falsely claims
- Criminals make a promise of goods in return for details
Down
- a cyber-security attacker to take control
- n attacker entering a secured building by following an authorized employee
- Advertising-supported software
- Program that hides in a computer
- A type of Malware that locates
- A piece of code that is capable of copying itself
- prevents the program from running as expected
- pro quo Criminals promise a service in exchange for details
15 Clues: Advertising-supported software • A type of Malware that locates • Program that hides in a computer • Collection of captured bot computers • data that ransome gets paid to remove • a cyber-security attacker to take control • prevents the program from running as expected • A piece of code that is capable of copying itself • ...
Cyber Security Cross Word RForseth2 2023-01-27
Across
- Microsoft 365 App type
- Address that takes you to somewhere else
- What your device runs on
- Commercial Business Domain
- Most popular web browser 2022
- First Page on Browser
- Connects to networks together
- Connection to internet through wires
- Network Security system
- Page posted on the internet
- Microsoft 365 Email App
- Takes digital formats to paper
Down
- Holding site hostage
- Identifies your device on the network
- Apps downloaded onto computer
- Connection using multiple routers
- File Transfer Protocol
- Keeps your device running
- Converting data into code for privacy
- The access to websites
20 Clues: Holding site hostage • First Page on Browser • Microsoft 365 App type • File Transfer Protocol • The access to websites • Network Security system • Microsoft 365 Email App • What your device runs on • Keeps your device running • Commercial Business Domain • Page posted on the internet • Apps downloaded onto computer • Most popular web browser 2022 • Connects to networks together • ...
Cyber Security Keywords (for revision) 2023-11-16
Across
- The most basic way of protecting your data.
- An old method of encoding data. Very easy to break.
- Describes fooling people into giving away personal information.
- A way of protecting an account by requiring the user to enter a code sent to an email address or mobile phone.
- Using online services to send nasty messages to people.
- Turning data into an unreadable form, often using a key, so others can't understand it.
- Word to describe using manipulation and other skills to fool people into believing you're someone you say you are.
- Describes unwanted emails, often sent to many people.
- Type of website that pretends to be from another company.
- WERXEGPEYW has been encoded using Caesar Cipher by moving between 2 and 5 places.
- A type of hacker who commits illegal activity.
- Sending so many requests to a server, it stops other people accessing it.
- Software used to restrict access to a network.
Down
- Collecting personal data in order to pretend to be someone else.
- A type of hacker who hacks illegally but for greater good.
- Informal term to describe something that is trying to steal from you.
- A type of hacker who legally hacks.
- Following someone online for a period of time, often posting messages in order to upset them.
- Someone who gains access to a network by using a range of tools and weaknesses.
- Type of software that can be used to avoid viruses.
- Describes being on the look out for cyber security risks.
- Someone who spends so long playing games it affects their well-being might be suffering from this.
- Software used to cause damage or to allow a hacker to gain access to a system.
- Type of software that can be used to avoid malware.
24 Clues: A type of hacker who legally hacks. • The most basic way of protecting your data. • A type of hacker who commits illegal activity. • Software used to restrict access to a network. • Type of software that can be used to avoid viruses. • Type of software that can be used to avoid malware. • An old method of encoding data. Very easy to break. • ...
Jasper's CJR Cyber Security Terms 2024-08-02
Across
- ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
- ___ is the name commonly given to unsolicited emails.
- ____ is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm.
- ____ is a general term for any type of intrusive computer software with malicious intent against the user.
- ___ ___ is the deliberate theft of sensitive data by nefarious actors.
- Bring Your Own Device (abbreviation)
- A ___ is a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.
- ____ is malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus
- _____ relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked.
- Breach A __ ___ is the event of a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- _____ is the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.
- A ___ is a program that automates actions on behalf of an agent for some other program or person and is used to carry out routine tasks.
- A ____ is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- ____ is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
Down
- _____ is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- A ____ is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal.
- ____ is software that is secretly installed on a user’s device to gather sensitive data.
- _____ is the process of verifying the identity of a user or piece of information and the veracity of the information provided.
- Force Attack This is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- The __ __ is encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- _____ is the process of decoding cipher text to plain text so that it is readable by humans. It is the reverse of encryption
- A ___ is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- ___ solutions integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
- ____ ____ are features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children.
24 Clues: Bring Your Own Device (abbreviation) • ___ is the name commonly given to unsolicited emails. • ___ ___ is the deliberate theft of sensitive data by nefarious actors. • ____ is software that is secretly installed on a user’s device to gather sensitive data. • ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience. • ...
The President's Cabinet 2023-10-04
Across
- This department oversees laws regarding the workplace
- the department responsible for the country's armed services and related military matters.
- This department ensures that we have the safest, most efficient vehicles and roadways.
- The CIA is overseen by this cabinet director
- This department is responsible for border security, cyber security, counterterrorism and our immigration laws.
- Vice President of the U.S.
Down
- the number of cabinet departments today
- the IRS (Internal Revenue Service) is part of this department
- This department oversees education in the U.S.
- This department oversees the National Park Service
- Who appoints the cabinet members?
- this department carries out policies ranging from nuclear power to fossil fuels to alternative energy sources.
- attorney general of the U.S.
- 4th in line to take over the Presidency
14 Clues: Vice President of the U.S. • attorney general of the U.S. • Who appoints the cabinet members? • the number of cabinet departments today • 4th in line to take over the Presidency • The CIA is overseen by this cabinet director • This department oversees education in the U.S. • This department oversees the National Park Service • ...
BrainRiddle 2025-02-05
Across
- A cryptographic function that converts data into a fixed-size string.
- A vulnerability in software that is exploited before the developer fixes it.
- A type of malware that secretly gathers information from a user’s device.
- The process of securing data by converting it into an unreadable format.
- A cyber-attack where attackers trick users into revealing sensitive information.
- A type of malware that disguises itself as legitimate software.
- A hidden part of the internet where anonymous activities take place.
- A network of infected computers controlled remotely by hackers.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- A type of software designed to harm or exploit devices and networks.
- A hacking method that tries multiple password combinations to gain access.
- The act of manipulating people into revealing confidential
- A cyber attack that manipulates databases through malicious SQL queries.
- Malicious software that locks files and demands payment to restore access.
- A set of tools that allow hackers to maintain access to a system unnoticed.
15 Clues: The act of manipulating people into revealing confidential • A type of malware that disguises itself as legitimate software. • A network of infected computers controlled remotely by hackers. • A type of software designed to harm or exploit devices and networks. • A hidden part of the internet where anonymous activities take place. • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
JB OX 2025-08-03
7 Clues: $45 replacement • Qualified tradesmen • Upgrade at any time • 6TB for the whole family • Food spoilage reimbursement • 12, 24,36 month payment plans • Cyber security specialists with 5 years of experience
IoT and smart devices 2024-11-13
Across
- assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
- devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
- home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
- The use of technology to perform tasks without human intervention.
- technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
- The right to control personal information and protect it from unauthorized access.
Down
- of Things A network of devices that are connected and can exchange data over the internet.
- Devices that detect and measure physical properties like temperature, motion, or pressure.
- measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
- breach A security incident in which sensitive information is accessed or disclosed without authorization.
- A software application that allows users to interact with smart devices or services on their smartphones or tablets.
11 Clues: The use of technology to perform tasks without human intervention. • The right to control personal information and protect it from unauthorized access. • Devices that detect and measure physical properties like temperature, motion, or pressure. • of Things A network of devices that are connected and can exchange data over the internet. • ...
Crossword Puzzle no 0123 2023-01-03
Across
- An update in an operating system or application to fix bud & improve performance or security
- Emails sent to trick users to reveal their sensitive information.
- Phishing Techniques used to target CEO,CFO etc.
- Scrambling of text in order to ensure the security of data/ information
- Existence of weakness in a system or network
Down
- Socially or politically motivated hackers
- Sending bulk messages by abusing electronic messaging system
- Just going behind an authorized person into a secured area
- Technique of Hiding data behind a photo
- Hackers with main motive to gain financial profit by doing cyber crimes
- Unauthorized softwares installed on computer to gather sensitive information
- Software designed to help the user's computer detect viruses & avoid them
12 Clues: Technique of Hiding data behind a photo • Socially or politically motivated hackers • Existence of weakness in a system or network • Phishing Techniques used to target CEO,CFO etc. • Just going behind an authorized person into a secured area • Sending bulk messages by abusing electronic messaging system • ...
Computer Virus 2024-09-09
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
RU ITEC411 2025-03-19
Across
- – Deception to gain money or access data illegally.
- – Protecting computers, networks, and data from attacks.
- – Tricking people into visiting fake websites to steal data.
- – Phishing through fake phone calls pretending to be legit.
- Overloading a website or server so it crashes.
- – A super sophisticated cyber weapon that targeted Iran’s nuclear program.
- – A U.S. law that expanded government surveillance after 9/11.
- – Fake systems set up to bait and track hackers.
- – Investigating cybercrimes and tracking down hackers.
- – legal power a country has over online activities.
Down
- – Hacking done for political or social causes.
- – An entity blocking or controlling what people can see online.
- – Any digital assault meant to steal data or cause harm.
- – laws protecting individuals from false information that damages the victim’s reputation.
- – Content that's restricted online for being offensive.
- – Breaking into computer systems, whether for good or bad.
- – Using fingerprints, and other physical traits for security.
- – Tricking people into giving up personal info through fake emails.
- – Phishing but through text messages instead of email.
- – Personal data that cybercriminals want to steal.
20 Clues: – Hacking done for political or social causes. • Overloading a website or server so it crashes. • – Fake systems set up to bait and track hackers. • – Personal data that cybercriminals want to steal. • – Deception to gain money or access data illegally. • – legal power a country has over online activities. • – Phishing but through text messages instead of email. • ...
Cybersecurity Crossword 2025-09-02
Across
- – A type of malware that replicates itself by infecting other programs.
- – A secure tunnel for internet traffic, stands for Virtual Private Network.
- – A network security system that monitors and controls traffic.
- – A scam using fake emails or messages to trick people into revealing information.
- Factor – Authentication requiring more than one form of verification.
- – A hidden method of bypassing normal authentication.
- – Malware that locks files and demands payment.
- – Software that detects and removes malicious programs.
- Attack – An attempt to damage, steal, or disrupt digital systems.
- – The practice of protecting systems, networks, and programs from attacks.
- – The process of converting data into a secure code.
- – A clickable reference to another webpage or document.
Down
- – Manipulating people into revealing confidential information. _____ engineering.
- – A secret string of characters used for authentication.
- – Software designed to harm or exploit systems.
- – A well-known security awareness training platform.
- Horse – Malicious software disguised as legitimate software.
- – Phishing conducted through SMS text messages.
- – Technology simulating human intelligence, used in modern cybersecurity.
- – The process of verifying identity before granting access.
20 Clues: – Software designed to harm or exploit systems. • – Phishing conducted through SMS text messages. • – Malware that locks files and demands payment. • – A well-known security awareness training platform. • – The process of converting data into a secure code. • – A hidden method of bypassing normal authentication. • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- hygiene The routine practices and steps taken to maintain good digital security.
- Software designed to detect and remove malicious programs from your computer.
- Malicious software designed to damage or gain unauthorized access to systems.
- breach An incident where sensitive information is accessed or disclosed without autorization.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
Down
- A type of malware that locks your data and demands payment to unlock it.
- Engineering Manipulating people into giving up confidential information.
- A security system that monitors and controls incoming and outgoing network traffic
- A method of converting data into a secret code to prevent unauthorized access.
- A software update that fixes security vulnerabilities or bugs.
11 Clues: A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • Engineering Manipulating people into giving up confidential information. • Software designed to detect and remove malicious programs from your computer. • ...
CYBURR SAFETEEE 2014-04-06
Across
- WHEN YOU GET NAKED ONLINE
- CYBER B______
- PROBLEMS AND THE STUFF THAT BLOCKS YOU IN LIFE
- BEING ONLINE WITH FRIENDS
- THE SOCIAL STATUS OF WHAT PEOPLE HAVE
- PEOPLE WHO ASSIST YOU IN BACK TIMES
- A DEFENSE AGAINST SOMETHING
- THE GROUP OF PEOPLE WHO GOVERN A COUNTRY
- YOUR OWN STUFF
- _____SAFETY
- SOMETHING THAT IS NOT LEGAL
Down
- PEOPLE OF A PLACE OR COUNTRY
- ADJECTIVE OF WHAT YOU CAN BE ONLINE
- THE ONLY PLACE WHERE IT IS BOTH A COUNTRY AND A CONTINENT
- THE NAME WHAT IS GIVEN TO PEOPLE WHO INTENTIONALLY CAUSE DISTRESS
- A VERY SMART MACHINE
- DATA
- THEFT WHEN PEOPLE STEAL YOUR IDENTITY TO USE YOUR MONEY TO PURCHASE THINGS
- PEOPLE WHO WILL GET INVOLVED IN CYBER BULLYING
- A PERSONAL WEBSTE WHERE YOU CAN SHARE YOUR FEELINGS
- THE WEB
- WHEN YOU ARE NOT ONLINE
- STUFF
- WHEN YOU ARE NOT OFFLINE
- CYBER _______
25 Clues: DATA • STUFF • THE WEB • _____SAFETY • CYBER B______ • CYBER _______ • YOUR OWN STUFF • A VERY SMART MACHINE • WHEN YOU ARE NOT ONLINE • WHEN YOU ARE NOT OFFLINE • WHEN YOU GET NAKED ONLINE • BEING ONLINE WITH FRIENDS • A DEFENSE AGAINST SOMETHING • SOMETHING THAT IS NOT LEGAL • PEOPLE OF A PLACE OR COUNTRY • ADJECTIVE OF WHAT YOU CAN BE ONLINE • PEOPLE WHO ASSIST YOU IN BACK TIMES • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Never write these down on a sticky note or a whiteboard.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- Lock your _____ and your mobile phone anytime they are not in use.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
- _____ is when an unauthorized person follows you into a secure location.
- Report all possible cyber _____ to the IT Service Desk.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- An unauthorized person that tries to gain access to your computer.
- Stay _____ and be on the lookout for security threats or incidents.
- Always keep a _____ workspace that is free of confidential information.
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
CYBER 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- ARPAnet was used by __
- __ disagrees with cyber libertarians.
- Process of converting information into a digital format
Down
- Components of digital economy.
- Refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools.
- Act legal framework for regulation of internet in India
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Allow multiple computers to be hooked up to one cable modem allowing several devices to be directly connected through a single modem.
- Author of declaration of Independence of cyber rights
10 Clues: ARPAnet was used by __ • Components of digital economy. • __ disagrees with cyber libertarians. • Author of declaration of Independence of cyber rights • Process of converting information into a digital format • Act legal framework for regulation of internet in India • ...
8/13/2024 2024-08-13
6 Clues: EDR • Measure of severity • Pentest certification • Cyber Security conference • Low level coding language • Program that runs as a background proccess
Cyber Crossword Puzzle 2023-10-05
Across
- Stay _____ and be on the lookout for security threats or incidents.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- Never write these down on a sticky note or a whiteboard.
Down
- An unauthorized person that tries to gain access to your computer.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- _____ is when an unauthorized person follows you into a secure location.
- Lock your _____ and your mobile phone anytime they are not in use.
- Report all possible cyber _____ to the IT Service Desk.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Always keep a _____ workspace that is free of confidential information.
- Alway install updates to your computer or mobile phone. Don't click "Remind me later."
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
9-1-1 Management Authority 2025-02-19
Across
- Title for 988 calltakers
- A type of clinic utilized by 988
- 911 Management Authority IT Coordinator
- State Training Coordinator
- Crisis specialist goal for someone in crisis
- 911 Management Authority Cyber Security Specialist
- Company used to handle 988 calls in Oklahoma
- State 911 Coordinator
- Utilizing 988 can help reduce the burden to ______
Down
- Term often used for 911 Centers
- Team that can be sent to someone in crisis
- 911 Management Authority Grants Officer
- Organization best known for writing standards for 911
- 911 Management Authority Programs Coordinator
- State 911/988 Liaison
- Name of State's training platform
- Resource for improving technology in PSAP
- 988 has access to many of these
18 Clues: State 911/988 Liaison • State 911 Coordinator • Title for 988 calltakers • State Training Coordinator • Term often used for 911 Centers • 988 has access to many of these • A type of clinic utilized by 988 • Name of State's training platform • 911 Management Authority Grants Officer • 911 Management Authority IT Coordinator • Resource for improving technology in PSAP • ...
Computer Virus 2024-07-01
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
Hard Level 2021-09-11
Across
- A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.
- Strongest wireless security.
- ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
Down
- ________ is an act that violates cyber-security.
- existence of weakness in a system or network is called _______.
- Least strong security encryption standard.
6 Clues: Strongest wireless security. • Least strong security encryption standard. • ________ is an act that violates cyber-security. • existence of weakness in a system or network is called _______. • A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing. • ...
27-54 Vocab 2023-02-22
Across
- Recognizes how a person signs
- Good when determining a match
- stores handwriting samples in a database
- Everyone's handwriting is unique
- Maximum prison term for forgery
- Handwriting is difficult to forge
- Many tactics to complicate currency
- Altering an aspect of a document
- Directly altering a check
- checks for the authenticity of documents
- written marks whose source is uncertain
- Checks, Employment records, legal agreements
- Specialty practice area of accounting
- Checks, Certificates, Wills
- Finding security flaws
Down
- Computer system used to mimic targets of cyber attacks
- When false documents are used for the purpose of deception
- The agency that investigates forgery cases
- Dollar amount that is illegitimate checks every day
- covering original writing to make it unreadable
- Many tactics to use to prevent forgery
- Forgery for material gain
- first case where handwriting was used
- currency, food vouchers
- Year us court of appeals validated handwriting
- Height and width of the letters
- Examination and comparison of questioned documents
27 Clues: Finding security flaws • currency, food vouchers • Forgery for material gain • Directly altering a check • Checks, Certificates, Wills • Recognizes how a person signs • Good when determining a match • Maximum prison term for forgery • Height and width of the letters • Everyone's handwriting is unique • Altering an aspect of a document • Handwriting is difficult to forge • ...
AC3 2021-01-02
Across
- 2020, we worked from home due to _ 19
- Ways of being, B_ it
- Ways of being, O_ it
- AC3 is on which level
- _ Security
- Internal home page
- AC3 CEO
- Family Christmas party, Centennial _
- _ Crawford
- Previous AC3 company
- Nearest train station
- Recruitment team, _ Management
- Current location, _ St
- Previous location near Redfern
- Director of Sales
- CEO’s family comes from ?
- Wireless internet
- Ways of being, B_ it
Down
- First point of customer contact
- Previous AC3 company at Margaret St
- CEO’s Executive Assistant
- Office Manager
- _ Couzi
- Make a copy of data
- _ Georgescu
- _ Desk
- Head of Product & Tech
- _ Saad
- _ Seymour
- Head of Marketing
- Head of Corporate Services
- Ways of being, E_ it
- _ & Culture
33 Clues: _ Desk • _ Saad • _ Couzi • AC3 CEO • _ Seymour • _ Security • _ Crawford • _ Georgescu • _ & Culture • Office Manager • Head of Marketing • Director of Sales • Wireless internet • Internal home page • Make a copy of data • Ways of being, B_ it • Ways of being, O_ it • Previous AC3 company • Ways of being, E_ it • Ways of being, B_ it • AC3 is on which level • Nearest train station • Head of Product & Tech • ...
Computer English Course 2024-11-26
Across
- Embedded electronic circuit of computers
- The connection between entities
- Your major
- A portable computer
- The technology of deep learning
- Browse it!
- Remote virtual machines
- The opposite of output
- The opposite of input
- Changing for better
- You use it every day
- Software application
- Hosting service
- Where you store information
- Connecting the computers
Down
- The interface exposed to programmers
- information
- The code!
- cellphone
- The brain of the computer
- Python and Java
- The procedure and logic behind an application
- The I in AI
- A portable device, bigger than a mobile phone
- What dances with Tiktok?
- Your major
- What is VR?
- graphical interface
- The network used by everyone
- safety for the cyber world
30 Clues: The code! • cellphone • Your major • Browse it! • Your major • information • The I in AI • What is VR? • Python and Java • Hosting service • A portable computer • Changing for better • graphical interface • You use it every day • Software application • The opposite of input • The opposite of output • Remote virtual machines • What dances with Tiktok? • Connecting the computers • The brain of the computer • ...
CYBER AWARENESS 2023-01-27
Across
- wide area network
- type of phishing attack that targets specific individuals or organizations typically through malicious emails
- networking hardware that connects devices on a computer network by using packet switching
- type of cyber-attack
- designed to harm or exploit a computer system
- A number (0-9) and/or symbol (such as !, #, or %)
- metropolitan area network
- is a software or program that generates various ads from different websites
- type of malware
- is a node that broadcasts data to every computer or Ethernet-based device connected to it
- safeguarding personal data from unauthorized access, use, or disclosure
- an essential component for any Wi-Fi network
Down
- the process of converting information or data into a code, especially to prevent unauthorized access
- type of malware
- virtual private network
- a phishing cyber-attack targeting CEOs
- is an identity and access management security method that requires two forms of identification to access resources and data
- can be used to identify an individual, such as name, address, phone number, email address, and financial information
- local area network
- type of malware
- involves flooding a website or network with traffic to make it unavailable to users
- networks of hijacked computer devices used to carry out various scams and cyberattacks
- of software that is designed to replicate itself and spread from one computer to another
23 Clues: type of malware • type of malware • type of malware • wide area network • local area network • type of cyber-attack • virtual private network • metropolitan area network • a phishing cyber-attack targeting CEOs • an essential component for any Wi-Fi network • designed to harm or exploit a computer system • A number (0-9) and/or symbol (such as !, #, or %) • ...
TUGAS-JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Manfaat jaringan komputer berguna untuk komunikasi lebih
- Device komputer pengguna yang ada di sebuah gedung atau workgroup dapat saling berkoneksi dengan jaringan LAN
- Jaringan yang mencakup area kecil
- Salah satu fitur konfigurasi keamanan jaringan
- protokol komunikasi untuk segala jenis
- Salah satu topologi yang mirip bintang
Down
- Fungsi cyber security
- jaringan
- Tata kelola data merupakan sebuah
- INTERCHANGE Nama lain pertukaran data
10 Clues: jaringan • Fungsi cyber security • Jaringan yang mencakup area kecil • Tata kelola data merupakan sebuah • INTERCHANGE Nama lain pertukaran data • protokol komunikasi untuk segala jenis • Salah satu topologi yang mirip bintang • Salah satu fitur konfigurasi keamanan jaringan • Manfaat jaringan komputer berguna untuk komunikasi lebih • ...
Nationwide 2021-01-21
Across
- relevant now
- tax free
- We have over 15 Million of them
- means of payment
- data,knowledge
- The renters dream
- Preparing for the worst
- To move around freely
- card Payment method
- Give for temporary use
- Items or things purchased or applied for
- Business exchange
Down
- in cyber space
- Will give you access to private information
- Where Dorothy longs to be
- school,university
- beneficial for me and you
- Given as a percentage
- Financial security achieved over time
- Who we serve?
- Can be High or low risk
- Suffer a loss
- Something to plan for
- Style of clock
- Something worth getting in to
- To bend or stretch
- Can be earnt
27 Clues: tax free • relevant now • Can be earnt • Who we serve? • Suffer a loss • in cyber space • data,knowledge • Style of clock • means of payment • school,university • The renters dream • Business exchange • To bend or stretch • card Payment method • Given as a percentage • Something to plan for • To move around freely • Give for temporary use • Can be High or low risk • Preparing for the worst • ...
Yep! That happened. 2020-10-14
Across
- One of the first ISPs in 1992
- Ransomware that got Greenville City and Baltimore City
- Windows application used to wreak havoc on AOL
- A ransomware cyber attack unprecedented in scale
- Network outage from an “external intrusion"
- The red corporation that was breached due to an HVAC vendor
- Hi.COM VMS sender
- Founded by Julian Assange
- 1989 AIDS Trojan file
Down
- Enigma’s nemesis
- Email love letter
- CERT creator to address network security
- AKA Downup AKA Downadup AKA Kido
- NSA’s developed exploit
- Major consumer credit reporting agency breach
- His perfect pitch opened the door for phreaking
- The social networking site attacked in 2013
- Hacktivist group formed in 2003
- The Morris worm’s landing location
- Worm targeting a specific SCADA system
20 Clues: Enigma’s nemesis • Email love letter • Hi.COM VMS sender • 1989 AIDS Trojan file • NSA’s developed exploit • Founded by Julian Assange • One of the first ISPs in 1992 • Hacktivist group formed in 2003 • AKA Downup AKA Downadup AKA Kido • The Morris worm’s landing location • Worm targeting a specific SCADA system • CERT creator to address network security • ...
training presentation 2023-10-03
Across
- HOW DID ADT INITIALLY MONITOR THEIR CUSTOMERS SERVICES?
- OPERATIONS SUPPORT GROUP
- CUSTOMER MONITORING CENTER
- GENERAL CARE
- ADT IS THE LARGEST PROVIDER OF _________ HOMES
- IN 2017, ADT STARTED INSTALLING ______ UNITS
- ON APRIL 2, 2016, APOLLO GLOBAL MERGES ADT WITH WHO_____?
- CYBER _____ACTIVELY MONITORING 24/7, 365 DAYS
- IT WAS INVENTED IN THE LATE 1800'S TO INCREASE COMMUNICATION
- CREATING CUSTOMER FOR LIFE IS ADT'S ______ STATEMENT
- LOCAL OFFICE
Down
- WHO IS CEO?
- ON MAY 2, 2016 ADT BECOME A PRIVATE COMPANY HEADQUARTERED IN _____?
- OVER 149 YEARS OF ______?
- AMERICAN DISTRICT TELEGRAPH
- HOW DO WE RECEIVE CALLS?
- TECH SUPPORT
- ADT WAS ____ IN 1874?
- TO EARN THE LIFELONG TRUST OF CUSTOMERS IS CALLED WHAT?
- ACCOUNT MANAGEMENT
20 Clues: WHO IS CEO? • TECH SUPPORT • GENERAL CARE • LOCAL OFFICE • ACCOUNT MANAGEMENT • ADT WAS ____ IN 1874? • OPERATIONS SUPPORT GROUP • HOW DO WE RECEIVE CALLS? • OVER 149 YEARS OF ______? • CUSTOMER MONITORING CENTER • AMERICAN DISTRICT TELEGRAPH • IN 2017, ADT STARTED INSTALLING ______ UNITS • CYBER _____ACTIVELY MONITORING 24/7, 365 DAYS • ADT IS THE LARGEST PROVIDER OF _________ HOMES • ...
tts informatika_cintavania_8_xf 2025-04-22
Across
- mencari lokasi di peta
- mencari terjemahan
- mengembangkan dan memelihara situs web
- konten yang merusak reputasi
- proses membuat konten digital
- yang melindungi sistem komputer dari serangan cyber
- undang undang yang mengatur HAKI di Indonesia
- badan yang mengatur HAKI
- proses memeriksa konten sebelum di publikasikan
- simbol pengganti karakter
- singkatan dari hak kekayaan intelektual
- mencari gambar serupa
- konten digital tentang budaya
- mengembangkan perangkat lunak
Down
- konten yang dapat memicu konflik
- tujuan dari HAKI
- proses mengunggah ke medsos
- mencari file dengan format tertentu
- tindakan memverifikasi kebenaran konten
- medsos yang bisa menyebar video/postingan budaya
- konten yang sangat populer
- informasi palsu adalah
- profesi yang menganalisis data
- tindakan ilegal yang melanggar HAKI
- merancang antarmuka pengguna
25 Clues: tujuan dari HAKI • mencari terjemahan • mencari gambar serupa • mencari lokasi di peta • informasi palsu adalah • badan yang mengatur HAKI • simbol pengganti karakter • konten yang sangat populer • proses mengunggah ke medsos • konten yang merusak reputasi • merancang antarmuka pengguna • proses membuat konten digital • konten digital tentang budaya • mengembangkan perangkat lunak • ...
TTS Jaringan Komputer dan Internet 2024-01-11
Across
- melindungi data termasuk?
- lapisan ke empat
- salah satu komponen jaringan komputer
- salah satu jenis cyber security
Down
- kata lain dari tata kelola data
- berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna
- konfigurasi keamanan jaringan
- salah satu mekanisme pertukaran data
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya.
- jaringan area lokal
10 Clues: lapisan ke empat • jaringan area lokal • melindungi data termasuk? • konfigurasi keamanan jaringan • kata lain dari tata kelola data • salah satu jenis cyber security • salah satu mekanisme pertukaran data • salah satu komponen jaringan komputer • berbagi sumber daya mencakup semua cara dapat bekerja sama untuk melayani pengguna • ...
Cyber Bullying! 2020-08-29
Across
- Some victims of cyber bullying may have increased anxiety or .....
- Cyber bullying is intended aggression through.... platforms
- People who are bullied are called ......
- It is important for Victims to know that they are never .....
- Some people who get cyber bullied can become depressed and .....
- We need to ....children and keep them safe on the internet
Down
- Some victims of cyber bullying may have feelings of .....
- Parents need to be able to ..... the effects of cyber bullying
- People who are cyber bullied feel like there is no ....
- Victims of cyber bullying can contact the .... for help
- Parents should teach their children how to .... people on social media and set their privacy
- Sometimes children who are cyber bullied ..... from school or even their favourite activities.
12 Clues: People who are bullied are called ...... • People who are cyber bullied feel like there is no .... • Victims of cyber bullying can contact the .... for help • Some victims of cyber bullying may have feelings of ..... • We need to ....children and keep them safe on the internet • Cyber bullying is intended aggression through.... platforms • ...
