cybersecurity Crossword Puzzles
Kryptics 2023-04-07
29 Clues: Boron • Octane • Server • Syntax • Neutron • Caliper • Network • Density • Solenoid • Crowdmap • Industry • Crosswall • Ductility • Benchmark • Framework • Dimension • Honeycomb • Arccutting • Cartograph • Javascript • Radioactive • Capillarity • Spreadsheet • Electrolysis • Gatingsystem • Cybersecurity • Backupbalance • Functiongenerator • Dieelectricconstant
30 Technological Terms 2024-04-11
29 Clues: IP • AI • ML • BI • Lan • BCP • IoT • GUI • CPU • API • WAN • CRM • VPN • Debug • Cache • Domain • Binary • Malware • Gateway • Network • Endpoint • Database • Firewall • Encryption • Decryption • Programming • Cybersecurity • Virtualization • Troubleshooting
Technology Terms 2024-10-09
29 Clues: ai • ram • Data • code • File • Cloud • Virus • Source • Backup • Python • Reboot • Memory • mining • Malware • Archive • Network • Browser • Database • Hardware • Firewall • Software • Phishing • Bandwidth • Algorithm • JavaScript • Encryption • Development • Cybersecurity • Authorization
Kryptics 2023-04-07
30 Clues: Boron • Syntax • Octane • Server • Caliper • Density • Network • Neutron • Industry • Solenoid • Crowdmap • Crosswall • Ductility • Honeycomb • Benchmark • Dimension • Framework • Photodiode • Javascript • Cartograph • Arccutting • Spreadsheet • Radioactive • Capillarity • Electrolysis • Gatingsystem • Backupbalance • Cybersecurity • Functiongenerator • Dieelectricconstant
Current Events in USA 2024-02-29
Across
- Media platforms
- Highest court
- Online protection
- Social media fallout
- Rising prices
- Cybersecurity threats
- Wellness focus
- Commerce negotiations
- Economic bounce-back
Down
- Law enforcement
- Global health crisis
- Legal fairness
- Emergency situation
- Roads, bridges, and utilities
- Environmental concern
- Civic duty
- Sustainable energy
- Financial burden
- Border policy
- Exploration frontier
20 Clues: Civic duty • Highest court • Rising prices • Border policy • Legal fairness • Wellness focus • Law enforcement • Media platforms • Financial burden • Online protection • Sustainable energy • Emergency situation • Global health crisis • Social media fallout • Exploration frontier • Economic bounce-back • Environmental concern • Cybersecurity threats • Commerce negotiations • Roads, bridges, and utilities
Cybersecurity 2023-01-25
Across
- changing ip addresses
- malware that collects personal data
- applications that direct computers
- program that allows remote access
- "UI redress attack"
- network of computers for attacks
- short for malicious software
- an attack that wants ransom
- means to attack a system
- connected items that represent one
Down
- protects data by scrambling it
- protects your location
- using media manipulation to scam
- cyber attack that is disguised
- filters network traffic
- used to detect viruses
- being bullied using the internet
- where users store data
- using your own device
- malware that reproduces itself
20 Clues: "UI redress attack" • changing ip addresses • using your own device • protects your location • used to detect viruses • where users store data • filters network traffic • means to attack a system • an attack that wants ransom • short for malicious software • protects data by scrambling it • cyber attack that is disguised • malware that reproduces itself • ...
Cybersecurity 2023-04-21
Across
- information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
- A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
- A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
- is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- facts provided or learned about something or someone.
- Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
- A computer virus is a type of malware that attaches itself to other programs, self-replicates, and spreads from one computer to another.
- something has been done which was: not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits.
- Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
- Hacking or Black Hat hacking is performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
Down
- A blagging attack is a version of a phishing attack, again with its background in social engineering.
- the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user
- As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- A name generator attack is an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
- In a Distributed Denial of Service attack, the attacker enlists the help of (many) thousands of Internet users to each generate a small number of requests which, added together, overload the target.
- Statistics that can be used to analise or observe.
- The authorization given to users that enables them to access specific resources on the network, such as data files, applications, printers and scanners.
- A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.
24 Clues: Statistics that can be used to analise or observe. • facts provided or learned about something or someone. • A blagging attack is a version of a phishing attack, again with its background in social engineering. • Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user • ...
Cybersecurity 2020-11-18
Across
- A piece of property that cannot be viewed by the public.
- A thing that comes before another of the same kind.
- A person who tries to penetrate a computer system to find weaknesses.
- A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- When a hacker uses a compromised email account to impersonate the account owner.
- The name of the bot.
- Makes sure that users do not send important or valuable data to outside sources.
- A malicious attempt to disrupt the normal traffic of a targeted server.
- Luring someone into a relationship by means of a fictional online persona.
- Someone who breaks into a computer’s system.
- The process of undermining a company's cyber defences by going after its vulnerable partner network.
- The path a hacker takes to deliver the malicious software.
- An extra copy of data from a computer.
- Software tools that enable an unauthorized user to gain control of a system without being noticed.
- Criminals who break into computer networks with malicious intent.
- A software that demands payment in order to access the system again.
- An accessory that can be added to a computer. (??)
- Confidential or personal information that may be used for fraudulent purposes.
- Allows access of specific data to certain members of a group.
- A software that displayed advertisements.
- A threat agent is any person or thing that acts to cause, carry, transmit, or support a threat.
- used to confirm the identity of a user or computer.
- A set of instructions used to help staff members respond to a security incident.
- To change into a coded form.
- A type of attack that doesn’t allow the owner to access their data.
- A number that is associated with a specific computer.
- The process of protecting important data from corruption.
- When data is copied or transferred from one place to another without authorization.
- A process used to determine which components of the system need to be protected and the types of security risks they should be protected from.
Down
- A place where data is stored on the internet and not on the computer’s hard drive.
- A security method where information is encoded so it can only be accessed with a key.
- A software tool made to take advantage of a weakness in a computer.
- A piece of code put in to correct an error.
- A value with a unique length to identify data.
- The study of codes and the art of writing or solving them.
- A stealthy attacker that remains undetected for a long time.
- When a hacker submitts many passwords in hopes of eventually guessing the real one.
- A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Used to block unauthorized access while permitting outward communication.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- A number of internet connected computers that are all running one or more bots.
- Process that checks the identity of the user is what it is supposed to be.
- The controller of the bot that provides direction for the bot.
- Analyzing large databases to get information.
- A term used to describe the overall process or method where you: Identify hazards and risk factors that have the potential to cause harm.
- The unauthorized movement of classified information to unauthorized users.
- An encrypted connection over the internet from a device to a network.
- A decoy computer system designed to attract cyber attacks.
- A kind of monitoring software to keep track of keystrokes made by the user.
- A group that helps organizations to improve themselves by providing opposition to the point of view of the organization that they are helping.
- A program used to distinguish between a person and an automated access website.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- A self multiplying system that spreads itself across a network.
- A resource that is released under a copyright licence and allows anyone to use it.
- An online threat that hides itself in computers and mobile devices.
- A collective name for a variety of malicious software variants.
- List of things that are untrustworthy and should be avoided.
- The practice of determining the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality.
- The identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- Malware that is disguised as actual software.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
- An autonomous program on the internet that can interact with systems or users.
64 Clues: The name of the bot. • To change into a coded form. • An extra copy of data from a computer. • A software that displayed advertisements. • A piece of code put in to correct an error. • Someone who breaks into a computer’s system. • Analyzing large databases to get information. • Malware that is disguised as actual software. • A value with a unique length to identify data. • ...
Cybersecurity 2022-10-15
Across
- When online, using a ______ name helps protect your true identity
- Secretly watches computer activity
- Software that protects computers from virus-related harm
- Phishing is malware that asks for personal ___________
- Someone who intentionally targets people for harm using online chat rooms or social media
- Type of bullying that takes place online
- Many features in online _____ can expose players to predators
- Rules for interacting politely and responsibly online
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Programs that appear to be useful but damage computers
- A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- ____ passwords contain easy-to-guess information
Down
- Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
- Programs or code that damage or destroy data by attaching to a program or file in a victim computer
- URLs that mislead the user into downloading a virus or visiting a harmful website
- Never list your _________ number or home address under contact information online
- Illegal ___ of copyrighted material is often referred to as piracy
- Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
- Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
- Your ______ device often contains more personal information than any other device
- A password containing at least 10 characters and several unique characters could be described as ______
- _______ settings help control things like your profile, contact, and other information relating to your account
- A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
- Social __________ describes sites or online communities where like-minded people can communicate with each other
25 Clues: Secretly watches computer activity • Type of bullying that takes place online • ____ passwords contain easy-to-guess information • Rules for interacting politely and responsibly online • Phishing is malware that asks for personal ___________ • Programs that appear to be useful but damage computers • Software that protects computers from virus-related harm • ...
Cybersecurity 2022-09-07
Across
- A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
- The assurance that systems and data are accessible and useable
- A sequence of words used for authentication.
- A method used to discover errors or potential security vulnerabilities in software.
- A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
- Our hashtag
- Measurable physical characteristics used to identify or verify an individual.
- Data that is being communicated across a communication medium is said to be "in ____"
- A sequence of characters used for authentication.
- A computer that provides services to users or other systems.
- A generic term for hardware which is used to store data.
- A previously unknown, bug, flaw, or backdoor in software is known as a "____ day".
- A user who can alter or circumvent a system’s controls is said to be "____"
- The categorisation of systems and data according to the expected impact if it was to be compromised.
- Malware used to gain access to a user’s systems and monitor their data, files, and behavior.
- The use of different character sets, such as lower-case characters , upper-case characters , numeric characters and special characters increases as password's "____".
- a form of malware that disguises itself as legitimate software but performs malicious activity when executed
- Any circumstance or event with the potential to harm systems or data.
- Descriptive data about the content and context used to identify data.
- Measures used to protect the confidentiality, integrity and availability of systems and data.
- A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
- The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.
Down
- Code that attempts to subvert the confidentiality, integrity or availability of a system is "____"
- Verifying the identity of a user
- email that falsely claims to be from a legitimate source, usually with a threat or request for information
- A security process that uses an additional factor for verification is called "____ factor authentication"
- An evident change to the normal behaviour of a network, system or user is called "an ____".
- The assurance that data is disclosed only to authorised entities.
- a type of malware that encrypts a victim’s information and demands payment in return for the decryption key
- A senior executive who is responsible for cybersecurity
- A network device that filters incoming and outgoing network data based on a series of rules.
- Anything of value, such as computer equipment, software or data.
- The act of exploiting human weaknesses to gain access to personal information and protected systems is called "____ engineering"
- Software embedded in computer equipment.
- The level of security risk to which a system is exposed.
- These securely manage data flows between connected networks.
- A tube, duct or pipe used to protect cables.
- The assurance that data has been created, amended or deleted only by authorised individuals.
- Data that resides on media or a system is said to be "at ____"
- An individual that is authorised to access a system.
40 Clues: Our hashtag • Verifying the identity of a user • Software embedded in computer equipment. • A sequence of words used for authentication. • A tube, duct or pipe used to protect cables. • A sequence of characters used for authentication. • An individual that is authorised to access a system. • A senior executive who is responsible for cybersecurity • ...
cybersecurity 2023-11-21
Across
- Attacco in cui molti sistemi compromessi vengono utilizzati per colpire un singolo sistema, causando un'interruzione del servizio
- Messaggi indesiderati, spesso di natura pubblicitaria, inviati in massa via email
- Persona che utilizza le proprie competenze informatiche per superare le barriere di sicurezza, spesso con scopi illegali
- Metodo di attacco che consiste nel provare tutte le possibili combinazioni di password per accedere a un sistema
- Tipo di malware che si replica automaticamente per diffondersi ad altri computer
- Injection Tecnica di attacco informatico che manipola le query SQL per accedere o manipolare database
- Tecnica di frode online che reindirizza gli utenti da un sito web legittimo a uno fraudolento
- Pratica di intercettazione e analisi di pacchetti di dati che passano attraverso una rete
- Sistema di sicurezza che monitora e controlla il traffico di rete in entrata e in uscita basandosi su regole predefinite
- Rete di computer infetti controllati da un attaccante, spesso utilizzati per lanciare attacchi su larga scala
- Manipolazione psicologica delle persone per indurle a rivelare informazioni confidenziali
- Debolezza in un sistema che può essere sfruttata da un attaccante
- Insieme di computer e altri dispositivi interconnessi che condividono risorse e scambiano dati
- Sequenza segreta di caratteri utilizzata per autenticare l'identità di un utente
- Protocollo di sicurezza che stabilisce un collegamento crittografato tra un server web e un browser
- Strumento utilizzato in attacchi di forza bruta per decifrare password, sfruttando una grande raccolta di hash precalcolati
- Day Vulnerabilità di sicurezza non ancora scoperta dal produttore del software o da esperti di sicurezza
- Pratica di proteggere sistemi, reti e programmi dagli attacchi digitali
- Tipo di malware che cripta i file della vittima e richiede un riscatto per la loro decrittazione
- Arte di scrivere o risolvere codici per proteggere informazioni, rendendole leggibili solo da chi possiede la chiave di decrittazione
Down
- Accesso segreto a un sistema o a dati che bypassa le normali procedure di autenticazione
- Tecnica di protezione delle comunicazioni attraverso l'uso di codici
- Funzione che converte un input (o 'messaggio') in una stringa di lunghezza fissa, tipicamente utilizzata per scopi di sicurezza.
- Tecnica di frode online per ingannare gli utenti al fine di ottenere dati personali o finanziari sensibili
- Tipo di malware che utilizza il modem di un computer per chiamare numeri telefonici a pagamento senza il consenso dell'utente
- Tipo di malware che si maschera da software legittimo per ingannare gli utenti affinché lo installino, consentendo l'accesso non autorizzato al sistema
- Software dannoso progettato per danneggiare, disturbare o ottenere l'accesso non autorizzato a sistemi informatici
- Tipo di spyware che registra le battiture sulla tastiera per rubare informazioni come password e dettagli bancari
- Software progettato per prevenire, rilevare e rimuovere malware
- Processo di verifica dell'identità di un utente o di un dispositivo
- Codice, dati o comandi che sfruttano una vulnerabilità in software o hardware
- Tipo di malware che raccoglie informazioni da un computer senza il consenso dell'utente
- Rete privata virtuale che estende una rete privata attraverso una rete pubblica, consentendo agli utenti di inviare e ricevere dati attraverso reti condivise o pubbliche come se i loro dispositivi di calcolo fossero direttamente connessi alla rete privata
- Atto ingannevole volto a ottenere un vantaggio personale o finanziario
- Componente aggiuntivo del browser che può fornire funzionalità aggiuntive ma può anche essere usato come spyware o malware
- Insieme di software che consente a un utente non autorizzato di ottenere il controllo di un sistema informatico senza essere rilevato
- Software che mostra automaticamente o scarica pubblicità sul dispositivo dell'utente
- Aggiornamento software rilasciato dai produttori per correggere bug o vulnerabilità
38 Clues: Software progettato per prevenire, rilevare e rimuovere malware • Debolezza in un sistema che può essere sfruttata da un attaccante • Processo di verifica dell'identità di un utente o di un dispositivo • Tecnica di protezione delle comunicazioni attraverso l'uso di codici • Atto ingannevole volto a ottenere un vantaggio personale o finanziario • ...
Cybersecurity 2023-09-07
Across
- a computer infection
- protects organizations on internet attacks
- locks databases
- gives a scammer access to your personal computer
- security for computers
- information
- faking
- to save something
Down
- deceive people into giving up their personal info
- ransomeware
- authentication method (2)
- to ensure protection
- worker
- when something isnt safe
- protecting information
- desktop
- authentication method
- scammers that impersonate a business
- when a virus spreads
- damages
20 Clues: worker • faking • desktop • damages • ransomeware • information • locks databases • to save something • a computer infection • to ensure protection • when a virus spreads • authentication method • protecting information • security for computers • when something isnt safe • authentication method (2) • scammers that impersonate a business • protects organizations on internet attacks • ...
Cybersecurity 2024-05-09
Across
- Malicious software designed to harm or exploit any programmable device, service, or network.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A security incident in which information is accessed without authorization.
- A weakness in a system or its design that can be exploited by a threat actor to perform unauthorized actions within a computer system.
- The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
- A cybersecurity strategy under which a user can only take actions on their computer or network that an administrator has explicitly allowed.
- A small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
- A software update comprised code inserted (or patched) into the code of an existing software program to fix security vulnerabilities, improve functionality, or to update the software.
- The act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or classified), for personal, economic, political, or military advantage using illicit means.
- A mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.
- A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an attacker might.
- Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets.
- A control mechanism that allows through all elements (email, users, passwords, URLs, etc.), except for those explicitly mentioned.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- Attack An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
- A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
- A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
- A device or software application that monitors a network or systems for malicious activity or policy violations.
Down
- A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- The application of scientific knowledge to investigate crimes on digital devices, such as computers, smartphones, or networks.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- A type of surveillance technology used to record keystrokes made by a user, often without their knowledge.
- Software that automatically displays or downloads advertising material when a user is online.
- Software designed to detect, prevent, and remove malicious software like viruses, worms, and trojans.
- The process of identifying, analyzing, and evaluating risk.
- A service that encrypts your internet traffic and protects your online identity by hiding your IP address.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
- Someone who uses computers to gain unauthorized access to data.
- Horse A type of malware that is often disguised as legitimate software.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Attack An attack that exploits a previously unknown vulnerability in a computer application or operating system.
- The practice of protecting systems, networks, and programs from digital attacks.
- A cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need.
- Authentication A security process in which users provide two different authentication factors to verify themselves.
- A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software or hardware.
40 Clues: The process of identifying, analyzing, and evaluating risk. • Someone who uses computers to gain unauthorized access to data. • Horse A type of malware that is often disguised as legitimate software. • A security incident in which information is accessed without authorization. • The practice of protecting systems, networks, and programs from digital attacks. • ...
Cybersecurity 2020-09-13
Across
- Special viruses that move from computer to computer without human action
- Rules for interacting politely and responsibly online
- programs or code that damage or destroy data by attaching to a program or file in a victim computer
- Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- Programs that appear to be useful but damage computers
- Software that protects computers from virus related harm
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- The format that is most commonly used in education and social sciences
- ______ settings help control things like your Profile, Contact, and other Information relating to your account
- Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- A detailed report, usually about a person
- When online, using a _____ name helps protect your true identity
- Secretly watches computer activity
- Your _______ device often contains more personal information that any other source
- The exclusive right to make copies, license, or otherwise use a creative work
- Information about you and what you do online
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Many features in online ________ can expose players to predators
Down
- When entering _______ information, be careful not to reveal personal details like you birthday or home address
- Someone who intentionally targets people for harm using online chat rooms or social media
- Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- The ability to act in a safe and responsible way on the internet and other connected environments
- You do not need to _________ for a copyright, it is automatic
- Phishing is malware that asks for personal _______.
- Illegal ____ of copyrighted material is often referred to as piracy
- The format most commonly used for citing sources in language, literature, and in K-12
- ____ use allows limited use of copyrighted material for educational purposes
- Formal ways of giving credit to others for their work
- people that stand up for others
- Using someone else's work and passing it off as your own
- Passwords that contain easy-to-guess information
- Never list your ________ number or home address under contact information onlin.
- Are used in conjunction with a screen name to help identify an online user without giving away personal details
- A _______ password is one that contains at least 10 characters and several unique characters.
- Bullying that takes place online
- Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- URLS that lead the user to download a virus or visit a harmful website
37 Clues: people that stand up for others • Bullying that takes place online • Secretly watches computer activity • A detailed report, usually about a person • Information about you and what you do online • Passwords that contain easy-to-guess information • Phishing is malware that asks for personal _______. • Rules for interacting politely and responsibly online • ...
Cybersecurity 2024-11-26
Across
- A network security device that monitors and filters incoming and outgoing traffic.
- A method used to take advantage of vulnerabilities.
- Endpoint Detection and Response, tools for endpoint threat detection and response.
- Security Operations Center, a centralized team for monitoring and responding to security incidents.
- A one-way function to generate a fixed-size representation of data.
- Data Loss Prevention, tools to prevent data exfiltration.
- The likelihood of a threat exploiting a vulnerability with impact.
- Command and Control infrastructure used by attackers to communicate with compromised systems.
- A potential cause of an incident that could harm a system or organization.
- Open Source Intelligence, information gathered from publicly available sources.
- Mean Time to Detect, the average time to identify a security incident.
- A security event compromising the confidentiality, integrity, or availability of information.
- A record of events or actions on a system or network.
- Isolating suspicious files or programs to observe their behavior.
Down
- Mean Time to Respond, the average time to respond to and remediate an incident.
- Malicious software such as viruses, worms, or ransomware.
- Isolating suspicious files or processes to prevent harm to systems.
- Management The process of updating software and systems to address vulnerabilities.
- A vulnerability unknown to the vendor, exploited before a fix is available.
- Virtual Private Network, encrypting data over untrusted networks.
- The part of malware that performs the malicious action.
- Cloud Access Security Broker, tools that enforce security policies for cloud services.
- Tactics, Techniques, and Procedures used by threat actors.
- Remote Monitoring and Management, tools for remote administration of client systems.
- Advanced Persistent Threat, a sophisticated and long-term cyber attack.
- A social engineering attack to steal sensitive information via deceptive emails or websites.
- Indicator of Compromise, data points that signal malicious activity.
- Demilitarized Zone, a subnet adding security for external-facing services.
- A protocol for collecting and organizing log messages across a network.
- Security Information and Event Management, a tool for log aggregation and analysis.
30 Clues: A method used to take advantage of vulnerabilities. • A record of events or actions on a system or network. • The part of malware that performs the malicious action. • Malicious software such as viruses, worms, or ransomware. • Data Loss Prevention, tools to prevent data exfiltration. • Tactics, Techniques, and Procedures used by threat actors. • ...
Cybersecurity 2023-03-17
Across
- cable preventing theft of mobile devices
- network virus
- unwanted email messages
- storing files from hard drive remotely
- malicious code stored in files
- tricking victim into giving information
- bring your own device
- verifying a user's identity
- sending fake emails to scam
Down
- UI redress attack
- malicious software
- attack that changes devices' address
- malware requiring payment to fix
- false warning from fake senders
- masks user's location
- network of hacker computers
- website generated file storing info on your computer
- scrambling information necessitating a passkey
- instructions commanding browser actions
- malware hidden within another program
20 Clues: network virus • UI redress attack • malicious software • masks user's location • bring your own device • unwanted email messages • network of hacker computers • verifying a user's identity • sending fake emails to scam • malicious code stored in files • false warning from fake senders • malware requiring payment to fix • attack that changes devices' address • ...
Cybersecurity 2023-06-08
Across
- Tricks you by posing as real company
- Altered Audio/Video to trick users
- Periodic security updates
- Virus that appears to be useful
- Coding to hide info from hackers.
- Software demanding money to unlock Personal information
- Technology used to keep intruders out
- Uses Hand, Voice, and face recognition
Down
- Unauthorized access to an information system
- Series of numbers assigned
- Fake Website/URL Address
- Storage for infected files
- Unexpected failure of a system component
- Online storage
- Weaknesses in a system
- Masks IP address and location
- Denied access/Privileges
- Applications with instructions for computer tasks
- Malware that self reproduces
- used to auto-perform repetitive tasks
20 Clues: Online storage • Weaknesses in a system • Fake Website/URL Address • Denied access/Privileges • Periodic security updates • Series of numbers assigned • Storage for infected files • Malware that self reproduces • Masks IP address and location • Virus that appears to be useful • Coding to hide info from hackers. • Altered Audio/Video to trick users • ...
Cybersecurity 2023-08-21
Across
- The process of verifying the identity or other attributes of an entity (user, process, or device).
- A system designed to prevent unauthorized access to or from a computer network.
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
- A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin.
- The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- A type of malware that can collect and transmit private user information without the user’s knowledge or consent.
- A method of scrambling data so that only authorized users or systems can access it.
- A network of compromised computers used to carry out cyberattacks on other systems. Hackers will often infect computers using malware, then control those devices remotely to destroy data.
- A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
- The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
Down
- A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
- A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites.
- A secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-Fi.
- An unauthorized user who attempts to or gains access to an information system.
- An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- Short for malicious software, is any type of harmful software designed to damage or disrupt a computer system
22 Clues: An unauthorized user who attempts to or gains access to an information system. • A system designed to prevent unauthorized access to or from a computer network. • A method of scrambling data so that only authorized users or systems can access it. • The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. • ...
Cybersecurity 2023-08-23
Across
- Little card in your phone
- Unwanted email messages
- Being free from public attention
- Stores information on your computer
- Virus that spreads through network
- Attack a nation’s computer networks
- Intrudes on a device remotely
- Wireless data network
Down
- Malicious software
- Prevents device from functioning correctly
- Finger prints
- Secret combination
- Bypass security to gain access
- From an outside/unknown source
- Discarded digital devices
- Malicious software
- Scrambling information
- Tracks all pressed keys
- Copying files from a computer
- Hides inside another program
- Confirming the person is authentic
21 Clues: Finger prints • Malicious software • Secret combination • Malicious software • Wireless data network • Scrambling information • Unwanted email messages • Tracks all pressed keys • Little card in your phone • Discarded digital devices • Hides inside another program • Copying files from a computer • Intrudes on a device remotely • Bypass security to gain access • ...
cybersecurity 2022-12-05
Across
- a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- Likes to chase mice
- is a type of malware from cryptovirology that threatens to publish the victim's personal data unless the ransom is paid
- game that teaches you about viruses
- is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
- often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard
- is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- is a collection of updates and fixes, called patches, for an operating system or a software program.
- is a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks.
- designed to detect and destroy computer viruses
- Flying mammal
- malicious software bundle designed to give unauthorized access to a computer or other software
- is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Large marsupial
Down
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- is a type of malware that downloads onto a computer disguised as a legitimate program.
- is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan.
- is caused by software or hardware errors.
- is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
- is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
- is any program that prohibits a pop-up at some point in time.
- Man's best friend
- is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action
- is unwanted software designed to throw advertisements up on your screen, most often within a web browser
- Has a trunk
- is a set of changes to a computer program or its supporting data designed to update, fix, or improve
26 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • game that teaches you about viruses • is caused by software or hardware errors. • designed to detect and destroy computer viruses • is any program that prohibits a pop-up at some point in time. • is a type of malware that downloads onto a computer disguised as a legitimate program. • ...
Cybersecurity 2024-08-13
Across
- Observing someone's actions to gain information
- Attempting to acquire sensitive information
- Self-replicating malware
- Malicious program disguised as legitimate software
- Malicious software that blocks access to data
- System designed to lure attackers
- Unauthorized use of a computer for cryptocurrency mining
- Unauthorized use of copyrighted material
- To take advantage of a vulnerability
- Disguising as another person or entity
- Network of compromised computers
- Malicious software
- Redirecting users to a fake website
- Phishing attack via SMS
- Backup of data changed since last full backup
Down
- Manipulating people to reveal information
- Disaster recovery site with basic infrastructure
- System for managing changes to software
- Process of converting data into a code
- Network of honeypots
- Multi-factor authentication
- Software that gathers information without consent
- Harmful data delivered by malware
- Disaster recovery site fully operational
- Backup of data changed since last backup
- Complete copy of all data
- Pretend to be someone else
- Attack that intercepts communication
- Software that records keystrokes
- Unauthorized access by following someone
- Disaster recovery site with partial capabilities
31 Clues: Malicious software • Network of honeypots • Phishing attack via SMS • Self-replicating malware • Complete copy of all data • Pretend to be someone else • Multi-factor authentication • Software that records keystrokes • Network of compromised computers • System designed to lure attackers • Harmful data delivered by malware • Redirecting users to a fake website • ...
Cybersecurity 2020-09-13
Across
- Using someone else's work and passing it off as your own
- Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- people that stand up for others
- Never list your ________ number or home address under contact information onlin.
- Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- The ability to act in a safe and responsible way on the internet and other connected environments
- A detailed report, usually about a person
- Rules for interacting politely and responsibly online
- Formal ways of giving credit to others for their work
- Someone who intentionally targets people for harm using online chat rooms or social media
- passwords that contain easy-to-guess information
- programs or code that damage or destroy data by attaching to a program or file in a victim computer
- Phishing is malware that asks for personal _______.
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- ______ settings help control things like your Profile, Contact, and other Information relating to your account
- Many features in online ________ can expose players to predators
Down
- public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- Secretly watches computer activity
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Software that protects computers from virus related harm
- When entering _______ information, be careful not to reveal personal details like you birthday or home address
- The exclusive right to make copies, license, or otherwise use a creative work
- Information about you and what you do online
- The format most commonly used for citing sources in language, literature, and in K-12
- A _______ password is one that contains at least 10 characters and several unique characters.
- ____ use allows limited use of copyrighted material for educational purposes
- Illegal ____ of copyrighted material is often referred to as piracy
- Programs that appear to be useful but damage computers
- Bullying that takes place online
- are used in conjunction with a screen name to help identify an online user without giving away personal details
- Your _______ device often contains more personal information that any other source
- You do not need to _________ for a copyright, it is automatic
- special viruses that move from computer to computer without human action
- when online, using a _____ name helps protect your true identity
- Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- URLS that lead the user to download a virus or visit a harmful website
- The format that is most commonly used in education and social sciences
37 Clues: people that stand up for others • Bullying that takes place online • Secretly watches computer activity • A detailed report, usually about a person • Information about you and what you do online • passwords that contain easy-to-guess information • Phishing is malware that asks for personal _______. • Rules for interacting politely and responsibly online • ...
Cybersecurity 2024-10-17
Across
- The process of transforming data into a secret code
- A weak point in a system that can be exploited
- Protects digital data by requiring two forms of authentication
- The action of intercepting communication without permission
- An encrypted tunnel used for secure internet communication
- A deceptive method used to trick systems into executing harmful code
- A software update meant to fix bugs or vulnerabilities
- The overall practice of protecting networks and systems from digital attacks
- A malicious program that replicates itself
Down
- The concept of ensuring only authorized users have access to data
- Software designed to protect against malware
- A method used to guess a password by systematically checking all possibilities
- A type of software that monitors and blocks unauthorized network traffic
- A program that logs user keystrokes to steal information
- Unsolicited or junk email
- A small piece of malicious software disguised as legitimate software
- A person who tests security systems legally to find vulnerabilities
- A database of known vulnerabilities used by security analysts
- A type of attack that overwhelms a network with traffic
- A tool used to scan for vulnerabilities in a system
- A technique used by attackers to trick users into providing sensitive information
- The unauthorized access and use of data
22 Clues: Unsolicited or junk email • The unauthorized access and use of data • A malicious program that replicates itself • Software designed to protect against malware • A weak point in a system that can be exploited • The process of transforming data into a secret code • A tool used to scan for vulnerabilities in a system • ...
Cybersecurity 2022-08-15
Across
- Full name of a DoS attack (three words).
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- A collection of malware infested computers that form a network to attack (e.g. a DDoS attack).
- (See xx) A set of cybersecurity threats that rely on a victim falling for a trap set for them (two words).
- An important process that verifies a user is really who they are; many different ways this can be done.
- An email that contains a message with a suspicious link designed to steal personal information.
- An annoying malware that spams you with ads.
- A name ... attack is a type of silly survey or quiz that actually harvests personal information from unaware users.
- Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- I am not a robot.
- Settings on folders or files that control who is allowed to access them.
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly (first word only).
- In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- A type of malware that records every single press of the keyboard that you make.
Down
- When raw data is put into context and has meaning, the data transforms into ...
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information.
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- See clue xx.
- An example would be an email from a Nigerian prince asking you to send your name, address, contact number and bank details to him reportedly so you can receive many millions of dollars.
- Stealing information from someone simply by looking from behind them.
- A ... is created about a user based on data - for example, personal data, shopping habits, etc. - in order to better target that user.
- Malicious code intended to monitor your activity without your permission.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- Gaining unauthorised access to or control of a computer system.
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
- A malicious code typically disguised as a legitimate program.
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
- Protection for a network by monitoring and controlling traffic that passes through it.
- The general term for programs that gains access to your system for unethical reasons, e.g. to steal data, cause system damage, send you spam, etc.
32 Clues: See clue xx. • I am not a robot. • Full name of a DoS attack (three words). • An annoying malware that spams you with ads. • A malicious code typically disguised as a legitimate program. • Gaining unauthorised access to or control of a computer system. • Stealing information from someone simply by looking from behind them. • ...
Cybersecurity 2023-04-18
Across
- fake email that fools users
- online harassment
- small files stored on PC
- tricking victims into buying online
- bring your own device
- junk mail
- replicating computer program malware
- virtual private network
- prevents unauthorized access
- fraudulent business practices
- following employee into restricted are
- malware that collects and transmits
Down
- wireless technology
- unauthorized intrusion
- codes that protect data
- bypassing security (hidden method)
- name used identify someone online
- harmful software
- malicious "horse" software
- telephone scam
20 Clues: junk mail • telephone scam • harmful software • online harassment • wireless technology • bring your own device • unauthorized intrusion • codes that protect data • virtual private network • small files stored on PC • malicious "horse" software • fake email that fools users • prevents unauthorized access • fraudulent business practices • name used identify someone online • ...
CyberSecurity 2023-09-02
Across
- Process of identifying a user
- Changing your IP address to read a false location
- A group of applications used to complete a task
- Virtual Private Network
- A series of computers connected as one entity
- Collection of programs that allow remote access to hackers
- Malware that tracks your activities
- Virus detection technology
- Malicious software
- Hackers using scams to attain sensitive info
- Malware that reproduces itself
Down
- Two or more connected computers sharing resources
- Tricking a user into clicking onto something they didn't want to
- Coding used to protect sensitive data
- Network of infected computers
- Malware that holds your system hostage
- Distributed Denial of Service
- Internet protocol
- Malware that manipulates data and spreads to other systems
- tech used to keep out unwanted users
20 Clues: Internet protocol • Malicious software • Virtual Private Network • Virus detection technology • Process of identifying a user • Network of infected computers • Distributed Denial of Service • Malware that reproduces itself • Malware that tracks your activities • tech used to keep out unwanted users • Coding used to protect sensitive data • Malware that holds your system hostage • ...
Cybersecurity 2023-12-01
Across
- preventing denial of action
- ensuring accessability
- barrier to protect network
- targeting high profile individuals
- overwhelming resources
- guiding behavior
- keeping data secret
- self-replicating program
- weakness in system
- coding to protect data
Down
- interfering with communication
- harmful software
- suspicious activity
- unwanted email
- verifying who you are
- deceptive email
- date-holding software
- granting access to data
- ensuring accuracy
- protection of computer system from cyberthreats
20 Clues: unwanted email • deceptive email • harmful software • guiding behavior • ensuring accuracy • weakness in system • suspicious activity • keeping data secret • verifying who you are • date-holding software • ensuring accessability • overwhelming resources • coding to protect data • granting access to data • self-replicating program • barrier to protect network • preventing denial of action • ...
Cybersecurity 2023-09-13
Across
- cable preventing theft of mobile devices
- network virus
- unwanted email messages
- storing files from hard drive remotely
- malicious code stored in files
- tricking victim into giving information
- bring your own device
- verifying a user's identity
- sending fake emails to scam
Down
- UI redress attack
- malicious software
- attack that changes devices' address
- malware requiring payment to fix
- false warning from fake senders
- masks user's location
- network of hacker computers
- website generated file storing info on your computer
- scrambling information necessitating a passkey
- instructions commanding browser actions
- malware hidden within another program
20 Clues: network virus • UI redress attack • malicious software • masks user's location • bring your own device • unwanted email messages • network of hacker computers • verifying a user's identity • sending fake emails to scam • malicious code stored in files • false warning from fake senders • malware requiring payment to fix • attack that changes devices' address • ...
Cybersecurity 2023-10-27
Across
- Outdated symmetric key method of data encryption
- Plastic card that contains a memory chip and microprocessor or just a memory chip
- Symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream
- Traditionally need large integers composed of two or more large prime factors
- A process used to encrypt and decrypt large plaintext inputs by creating a cryptographic chain wherein each ciphertext block is dependent on the last.
- Set of communication rules or protocols for setting up secure connections over a network
- Variable length, symmetric, 64-bit block cipher
- Virtual Private Network; Protects users when browsing the web
- Encryption with authentication
- constructing and analyzing protocols that prevent third parties or the public from reading private messages.
Down
- Prevents modification of data
- Block cipher mode/acts like a stream cipher
- An encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications
- Extends use of DES cipher
- US Federal Government Standard
- The process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel
- A cryptographic network protocol for operating network services securely over an unsecured network
- Hash Based Message Authentication Code; A cryptographic network protocol for operating network services securely over an unsecured network
- Used for encryption, digital signatures, pseudo-random generators, and more
- The practice of concealing information within another message or physical object to avoid detection.
- Simplest encryption mode/Too simple for most cases
- Family of message digest algorithms
- Encryption program that provides cryptographic privacy and authentication for data communication
- Public key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem.
24 Clues: Extends use of DES cipher • Prevents modification of data • US Federal Government Standard • Encryption with authentication • Family of message digest algorithms • Block cipher mode/acts like a stream cipher • Variable length, symmetric, 64-bit block cipher • Outdated symmetric key method of data encryption • Simplest encryption mode/Too simple for most cases • ...
Cybersecurity 2024-03-22
Across
- a virus which can travel from computer to computer with no human action
- something you lose if you post your name or address online
- files stored on your device that give browsers information
- programs which can damage your computer or steal your information
- posting URLs which lead to a virus
- someone who is mean online
- a way to cite sources. Usually used in social sciences
- maybe the greatest online privacy risk
- programs which look useful but can damage your computer
- using someone else's work as your own
- using someone's work in a criticism, news report, or research
- the exclusive rights to make copies
- use this to protect your mobile device
- an online activity with anonymous chats
Down
- a way to cite sources. Usually used in the humanities (and k-12 schools)
- someone who targets people for harm
- when a copyright expires, the work enters the public _____
- rules for appropriate online behavior
- what your profile picture should be
- one example is identity theft
- all the info about you online
- emails that look like they are from somewhere you trust
22 Clues: someone who is mean online • one example is identity theft • all the info about you online • posting URLs which lead to a virus • someone who targets people for harm • what your profile picture should be • the exclusive rights to make copies • rules for appropriate online behavior • using someone else's work as your own • maybe the greatest online privacy risk • ...
Cybersecurity 2024-03-14
Across
- Being free from the Public
- Stealing personal information from users
- String of characters accessing information
- Someones who harms other users
- False display gaining private information
- Verify identity on physical characters
- Help protect and secure passwords
- File website stores information on computer
- Unwanted messages from unknown users
- Move files to remote locations
- A false warning
Down
- Ensuring request information not imposter
- Security treats inside the company
- Behavioral hazard when user obsess
- Sciences designed to arrange items
- Active file that are harmful
- Malware hidden inside another program
- Technology used to stalk others
- Toxic waste from discarded devices
- Collection of harmful computer codes
20 Clues: A false warning • Being free from the Public • Active file that are harmful • Someones who harms other users • Move files to remote locations • Technology used to stalk others • Help protect and secure passwords • Security treats inside the company • Behavioral hazard when user obsess • Sciences designed to arrange items • Toxic waste from discarded devices • ...
Cybersecurity 2024-04-12
Across
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- Word referring to who can use a specific system or view specific data
- A security measure that requires two or more proofs of identity to grant you access to a system (3)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- A type of backup in which an exact replica of data is created and stored in a separate location
- A broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems (2)
- IoT (3)
- Law which upholds the right of the public to access information that the government holds about them (4)
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The protection of information that says who we are, what we do and what we believe
- is a type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- Type of backup that contains only those files which have been altered since the last backup
- attack is carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Type of cyber attack that uses third-party tools or services to infiltrate a target’s system or network (2)
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
Down
- Physical, network, and operational separation of data to keep it safe from both external cyberattacks and internal threats
- Type of backup that involves backing up data that was created or changed since the last full backup
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- The process of converting ciphertext (random and meaningless) back to plaintext
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
- A perceived threat to an organisation that comes from people within the organisation (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- The greatest vulnerability in a system when thinking about cybersecurity
- Type of backup that backs up everything since the last back up
- A tool used in risk management to assess and prioritise risks based on their likelihood and potential impact (2)
- Type of encryption that involves the use of one key for both encryption and decryption
40 Clues: IoT (3) • Type of backup that backs up everything since the last back up • Word referring to who can use a specific system or view specific data • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • ...
Cybersecurity 2024-07-10
Across
- Multiple compromised computers
- Trial and error password guessing
- Layered security system
- Malware locked by bribe
- Copy of computer data
- Junk emails or posts
- Character sequence used for access
- Electronic inventory of someones network
Down
- Identity verification
- Private and secure network
- Software created to disrupt
- Recording keystrokes in real time
- Tracking user on a server
- Identifying entities on the internet
- File link to another location
- Protection through scrambled data
- Locate/display information on servers
- Malware that monitors and reports
- Pretending to gain trust
- Searching or screening data
20 Clues: Junk emails or posts • Identity verification • Copy of computer data • Layered security system • Malware locked by bribe • Pretending to gain trust • Tracking user on a server • Private and secure network • Software created to disrupt • Searching or screening data • File link to another location • Multiple compromised computers • Recording keystrokes in real time • ...
Cybersecurity 2024-11-07
Across
- Special viruses that move from computer to computer without human action
- Rules for interacting politely and responsibly online
- programs or code that damage or destroy data by attaching to a program or file in a victim computer
- Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- Programs that appear to be useful but damage computers
- Software that protects computers from virus related harm
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- The format that is most commonly used in education and social sciences
- ______ settings help control things like your Profile, Contact, and other Information relating to your account
- Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- A detailed report, usually about a person
- When online, using a _____ name helps protect your true identity
- Secretly watches computer activity
- Your _______ device often contains more personal information that any other source
- The exclusive right to make copies, license, or otherwise use a creative work
- Information about you and what you do online
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Many features in online ________ can expose players to predators
Down
- When entering _______ information, be careful not to reveal personal details like you birthday or home address
- Someone who intentionally targets people for harm using online chat rooms or social media
- Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- The ability to act in a safe and responsible way on the internet and other connected environments
- You do not need to _________ for a copyright, it is automatic
- Phishing is malware that asks for personal _______.
- Illegal ____ of copyrighted material is often referred to as piracy
- The format most commonly used for citing sources in language, literature, and in K-12
- ____ use allows limited use of copyrighted material for educational purposes
- Formal ways of giving credit to others for their work
- people that stand up for others
- Using someone else's work and passing it off as your own
- Passwords that contain easy-to-guess information
- Never list your ________ number or home address under contact information onlin.
- Are used in conjunction with a screen name to help identify an online user without giving away personal details
- A _______ password is one that contains at least 10 characters and several unique characters.
- Bullying that takes place online
- Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- URLS that lead the user to download a virus or visit a harmful website
37 Clues: people that stand up for others • Bullying that takes place online • Secretly watches computer activity • A detailed report, usually about a person • Information about you and what you do online • Passwords that contain easy-to-guess information • Phishing is malware that asks for personal _______. • Rules for interacting politely and responsibly online • ...
cybersecurity 2022-05-24
Across
- A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company
- Designed to detect and destroy computer virus
- An individual who gains unauthorized access to a computer system/network for social or political purposes.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- internet Is the global system of interconnected computer networks that use the Internet protocol suite
- A network point that acts as an entrance to another network
- A feature or defect of a computer system that allows surreptitious unauthorized access to data
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
- Gaining access into a computer system/network illegally.
- an automated program that runs over the Internet
- Self-replicating virus that does not alter files but resides in active memory and duplicates itself
- Data confidentiality is a measure of the ability of a system to protect its data
- A person who uses computers to gain unauthorized access to data
- It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- Software that is intended to damage or disable computers and computer systems
- Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
- management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
- Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
- Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.
26 Clues: Designed to detect and destroy computer virus • an automated program that runs over the Internet • Gaining access into a computer system/network illegally. • A network point that acts as an entrance to another network • A person who uses computers to gain unauthorized access to data • Software that is intended to damage or disable computers and computer systems • ...
Cybersecurity 2023-06-04
Across
- process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- when a programmer gains access to a computer or network by bypassing security steps through a trapdoor programs
- a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device
- provides additional- revised or updated code for an operating system or application
- software that is secretly installed on a user’s device to gather sensitive data
- someone who intentionally challenges the security of a computer system- network- or web application to discover vulnerabilities that an attacker or hacker could exploit
- information should be consistently and readily accessible for authorized parties
- attack when one or more compromised systems launch a flooding attack on a remote target(s)- in an attempt to overload network resources and disrupt service.
- a type of internet fraud that seeks to acquire a user’s credentials by deception- usually taking the form of fake notifications from banks- providers- e-pay systems- and other organizations.
- taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
- the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.
- the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
- an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
- maintaining the consistency- accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit- and steps must be taken to ensure data cannot be altered by unauthorized people
Down
- assurance that information is not disclosed to unauthorized persons- processes- or devices.
- an attack method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- criminals who break into computer networks with malicious intent.
- an increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques
- a facility where enterprise information systems (websites- applications- databases- data centers and servers- networks- desktops- and other endpoints) are monitored- assessed- and defended by SOC analysts.
- look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found- they report them to the owner- sometimes requesting a small fee to fix the problem
- sometimes also called “ethical hackers” or “good hackers” – exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
- the practice and study of techniques for secure communication in the presence of adversarial behavior.
- the process of verifying the identity of a user or piece of information and the veracity of the information provided. In computing- it is the process of identifying a person or system with a username- password- etc.
- encrypted parts of the internet that are not indexed by search engines- most notoriously used by all types of criminals including; pedophiles- illicit human and contraband traffickers- and cyber criminals- to communicate and share information without being detected or identified by law enforcement.
- a kind of spyware software that records every keystroke made on a computer’s keyboard
- when a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- a security system that forms a virtual perimeter around a network of workstations preventing viruses- worms- and hackers from penetrating.
- a general term for any type of intrusive computer software with malicious intent against the user.
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
30 Clues: criminals who break into computer networks with malicious intent. • software that is secretly installed on a user’s device to gather sensitive data • information should be consistently and readily accessible for authorized parties • provides additional- revised or updated code for an operating system or application • ...
Cybersecurity 2023-07-15
Across
- cybersecurity professionals who identify and fix security vulnerabilities
- collect and transmit private user information
- creates and stores strong passwords
- exploits a new vulnerability in software
- prevents unauthorized changes to a system’s settings and files
- software that combats malware infections
- codes that protect data during encryption
- floods a website or server with traffic
- a network of compromised computers
Down
- ubiquitous access points using wireless hotspots
- tricks users into clicking on hidden elements
- looks safe, but isn't
- a secure service that connects remotely to another network
- training to protect sensitive information from cyber-attacks.
- they illegally exploit network vulnerabilities to gain unauthorized access
- blocks unauthorized access to or from a computer network
- steals sensitive information or gains access
- fake email that fools users into providing information
- scrambles data to prevent unauthorized access
- locks users out of their computer for a ransom
20 Clues: looks safe, but isn't • a network of compromised computers • creates and stores strong passwords • floods a website or server with traffic • exploits a new vulnerability in software • software that combats malware infections • codes that protect data during encryption • steals sensitive information or gains access • tricks users into clicking on hidden elements • ...
Cybersecurity 2023-11-21
Across
- Tipo di spyware che registra le battiture sulla tastiera per rubare informazioni come password e dettagli bancari
- Accesso segreto a un sistema o a dati che bypassa le normali procedure di autenticazione
- Insieme di computer e altri dispositivi interconnessi che condividono risorse e scambiano dati
- Arte di scrivere o risolvere codici per proteggere informazioni, rendendole leggibili solo da chi possiede la chiave di decrittazione
- Rete privata virtuale che estende una rete privata attraverso una rete pubblica, consentendo agli utenti di inviare e ricevere dati attraverso reti condivise o pubbliche come se i loro dispositivi di calcolo fossero direttamente connessi alla rete privata
- Attacco in cui molti sistemi compromessi vengono utilizzati per colpire un singolo sistema, causando un'interruzione del servizio
- Persona che utilizza le proprie competenze informatiche per superare le barriere di sicurezza, spesso con scopi illegali
- Debolezza in un sistema che può essere sfruttata da un attaccante
- Sistema di sicurezza che monitora e controlla il traffico di rete in entrata e in uscita basandosi su regole predefinite
- Tecnica di protezione delle comunicazioni attraverso l'uso di codici
- Tipo di malware che raccoglie informazioni da un computer senza il consenso dell'utente
- Pratica di proteggere sistemi, reti e programmi dagli attacchi digitali
- Processo di verifica dell'identità di un utente o di un dispositivo
- Software progettato per prevenire, rilevare e rimuovere malware
- Atto ingannevole volto a ottenere un vantaggio personale o finanziario
Down
- Rete di computer infetti controllati da un attaccante, spesso utilizzati per lanciare attacchi su larga scala
- (Secure Sockets Layer) Protocollo di sicurezza che stabilisce un collegamento crittografato tra un server web e un browser
- Metodo di attacco che consiste nel provare tutte le possibili combinazioni di password per accedere a un sistema
- Aggiornamento software rilasciato dai produttori per correggere bug o vulnerabilità
- Tipo di malware che si maschera da software legittimo per ingannare gli utenti affinché lo installino, consentendo l'accesso non autorizzato al sistema
- Messaggi indesiderati, spesso di natura pubblicitaria, inviati in massa via email
- Pratica di intercettazione e analisi di pacchetti di dati che passano attraverso una rete
- Tecnica di frode online per ingannare gli utenti al fine di ottenere dati personali o finanziari sensibili
- Engineering Manipolazione psicologica delle persone per indurle a rivelare informazioni confidenziali
- Tipo di malware che cripta i file della vittima e richiede un riscatto per la loro decrittazione
- Software dannoso progettato per danneggiare, disturbare o ottenere l'accesso non autorizzato a sistemi informatici
- Insieme di software che consente a un utente non autorizzato di ottenere il controllo di un sistema informatico senza essere rilevato
- Codice, dati o comandi che sfruttano una vulnerabilità in software o hardware
- Tipo di malware che si replica automaticamente per diffondersi ad altri computer
- Sequenza segreta di caratteri utilizzata per autenticare l'identità di un utente
30 Clues: Software progettato per prevenire, rilevare e rimuovere malware • Debolezza in un sistema che può essere sfruttata da un attaccante • Processo di verifica dell'identità di un utente o di un dispositivo • Tecnica di protezione delle comunicazioni attraverso l'uso di codici • Atto ingannevole volto a ottenere un vantaggio personale o finanziario • ...
Cybersecurity 2024-03-22
Across
- a virus which can travel from computer to computer with no human action
- something you lose if you post your name or address online
- files stored on your device that give browsers information
- programs which can damage your computer or steal your information
- posting URLs which lead to a virus
- someone who is mean online
- a way to cite sources. Usually used in social sciences
- maybe the greatest online privacy risk
- programs which look useful but can damage your computer
- using someone else's work as your own
- using someone's work in a criticism, news report, or research
- the exclusive rights to make copies
- use this to protect your mobile device
- an online activity with anonymous chats
Down
- a way to cite sources. Usually used in the humanities (and k-12 schools)
- someone who targets people for harm
- when a copyright expires, the work enters the public _____
- rules for appropriate online behavior
- what your profile picture should be
- one example is identity theft
- all the info about you online
- emails that look like they are from somewhere you trust
22 Clues: someone who is mean online • one example is identity theft • all the info about you online • posting URLs which lead to a virus • someone who targets people for harm • what your profile picture should be • the exclusive rights to make copies • rules for appropriate online behavior • using someone else's work as your own • maybe the greatest online privacy risk • ...
Cybersecurity 2024-03-18
Across
- stalking through web technology
- Process of confirming someone's identity
- Protection against potential harm
- Malware that can collect/transmit user data without the user's knowledge
- Malware designed to restrict access
- Illegal activity done on the internet
- Unlocking encrypted information
- free from public attention
- False claims to get private information
Down
- Network security monitors/controls incoming and outgoing traffic
- Security threat from within company
- hacker who is highly motivated by principles
- Information converted into secret form
- Someone who tries to gain access without authorization
- Software that delivers ads on your system
- Unwanted emails from unknown senders
- Bullying on the internet
- Gaining access an undocumented way
- Malicious software designed to infect
- File from website that stores your info
- collection of malware that spreads through computer
21 Clues: Bullying on the internet • free from public attention • stalking through web technology • Unlocking encrypted information • Protection against potential harm • Gaining access an undocumented way • Security threat from within company • Malware designed to restrict access • Unwanted emails from unknown senders • Illegal activity done on the internet • ...
Cybersecurity 2024-03-13
Across
- Implanted malware with a fee.
- Linked computers with a virus.
- Copy of computer's hard drive.
- Program that stores passwords.
- Emails sent by unknown sender.
- Take someone's identity for fraud.
- Upper/lowercase letters, numbers, symbols
- Hardware tracking keystrokes.
- Multiple computers that are connected.
- Protective barrier.
- Identity verification of physical appearance.
- Private network.
Down
- Scrambled data unlocked with key.
- Software used to infect computers.
- Code sent to phone.
- Software attacks unshielded computer components.
- Malware hackers operate.
- Not easily accessible without URL.
- Website stored preferences.
- Computer address changed.
- Hacker posing as someone else.(Email)
- Malware disguised as another program.
22 Clues: Private network. • Code sent to phone. • Protective barrier. • Malware hackers operate. • Computer address changed. • Website stored preferences. • Implanted malware with a fee. • Hardware tracking keystrokes. • Linked computers with a virus. • Copy of computer's hard drive. • Program that stores passwords. • Emails sent by unknown sender. • Scrambled data unlocked with key. • ...
Cybersecurity 2024-03-13
Across
- bullying another digitallly
- hides in other programs
- copying files to store
- file that tracks your preferences
- a strongly motivated attacker
- spreads without user interaction
- sequence of secure characters
- falsely claiming legitimacy to hack
- malicious software
- unwanted email message
- wireless data network
Down
- scrambling security method
- unlocking encrypted information
- proving you are real
- a threat from within
- code that reproduces itself
- discard from digital devices
- a false warning
- holds information until money is paid
- sifting through data
20 Clues: a false warning • malicious software • proving you are real • a threat from within • sifting through data • wireless data network • copying files to store • unwanted email message • hides in other programs • scrambling security method • bullying another digitallly • code that reproduces itself • discard from digital devices • a strongly motivated attacker • sequence of secure characters • ...
Cybersecurity 2024-04-12
Across
- Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- Word related to data being held on system devices such as hard drives and servers
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- Backup Strategy for sending a copy of data to a secondary, off-site, online location
- The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- Type of encryption that involves the use of one key for both encryption and decryption
- Type of backup that backs up everything since the last back up
- Type of backup that involves backing up data that was created or changed since the last full backup
- Law which upholds the right of the public to access information that the government holds about them (4)
- Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- Type of backup that contains only those files which have been altered since the last backup
- Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- Type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- The act of compromising digital devices and networks through unauthorised access to an account or computer system
Down
- An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- The protection of information that says who we are, what we do and what we believe
- Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The assurance that sensitive information is accessed only by authorised individuals or entities
- A perceived threat to an organisation that comes from people within the organisation (2)
- A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- The greatest vulnerability in a system when thinking about cybersecurity
- Attack carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- The process of converting ciphertext (random and meaningless) back to plaintext
- The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- IoT (3)
- A type of backup in which an exact replica of data is created and stored in a separate location
- Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
34 Clues: IoT (3) • Type of backup that backs up everything since the last back up • The greatest vulnerability in a system when thinking about cybersecurity • The process of converting ciphertext (random and meaningless) back to plaintext • Word related to data being held on system devices such as hard drives and servers • ...
CyBeRsEcUrItY 2024-07-11
Across
- Bring your own device
- Proves human, not bot
- Internet-based data storage
- Network of infected computers
- Decoy system for attackers
- Breaks into computer systems
- Takes advantage of vulnerability
- Secretly collects user data
- Protects against computer viruses
- Malicious software
- Verifies user identity
- Encrypts internet connections
Down
- Secret access to system
- AI-generated fake video
- Blocks unauthorized entities
- Disguised malicious software
- Demands payment for data
- Blocks unauthorized network access
- Fraudulent data collection attempt
- Unwanted advertising software
20 Clues: Malicious software • Bring your own device • Proves human, not bot • Verifies user identity • Secret access to system • AI-generated fake video • Demands payment for data • Decoy system for attackers • Internet-based data storage • Secretly collects user data • Blocks unauthorized entities • Disguised malicious software • Breaks into computer systems • Network of infected computers • ...
Cybersecurity 2024-11-22
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- The “A” in the C-I-A Triad. It ensures authorized users have access.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Verifying identity.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Facebook, Twitter, Instagram, etc. (Two words)
- Hardware or software designed to prevent unauthorized access to or from a private network.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- Threatening behavior facilitated through electronic means such as texting.
- The process of taking plain text and scrambling it into an unreadable format.
- Unauthorized access to a network, information systems, or application.
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
20 Clues: Verifying identity. • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • The “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cybersecurity 2022-04-03
Across
- A form of malware that demands money from the user in return for something.
- This process is similar to encryption in that plaintext is transformed into ciphertext, which cannot be understood. However, in this instance the ciphertext cannot be decrypted (converted back.)
- The act of fraudulently impersonating others in order to gain trust and cause victims to share unauthorised information.
- A cybersecurity attack in which multiple devices are used to prevent genuine users from being able to access a particular system.
- The form of encryption that requires a single key.
- An attack that involves intercepting communications without the knowledge of the victim or the service.
- A cybersecurity attack in which an individual attempts to stop genuine users from being able to use a particular system, using only one device.
- The technique of finding vulnerabilities that could potentially be exploited to gain access and information.
- A form of malware that is disguised as a legitimate program. Malicious code is hidden within the software to gain access to the user's system.
- A form of malware that is more self-sufficient, as it has the ability to exist and spread with no reliance on host files or human interaction.
- A social engineering technique that uses social media to impersonate others for some form of personal gain, potentially including unauthorised information and money.
- A service that can be used to protect your internet connection and privacy when operating online. This is done via the creation of an encrypted tunnel.
- A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
- Software that was created with malicious intent.
- A device which monitors all data coming into and out of a system/network, stopping anything that it believes could be harmful and/or unwanted.
- A form of malware that attaches itself to other files and requires human interaction in order to be able to spread and attach to more files.
- The coloured hat of hackers that are cybersecurity experts who have received authorisation to hack others in order to identify vulnerabilities.
- A form of malware that shows unwanted ads on the user's device
- The result of spreading bots, whereby the army of slave devices under one master can be controlled and used in DDoS attacks to harness the power and networking capabilities of all of them.
- A social engineering technique that uses voice calls to impersonate others and gain access to unauthorised information.
Down
- The act of a hacker gathering information about your device and its connection to a website/service to then configure their device to match yours and take over in communication as if they are you.
- A form of malware that gathers data about you and your device usage and forwards this to a third-party without your knowledge or consent.
- A social engineering technique that directs a website's traffic elsewhere in order to gain access to unauthorised information.
- The process of eavesdropping on what is being sent in a network using a piece of software.
- A technique in which an unknown source is disguised as a genuine business/person/platform in order to gain access to unauthorised information.
- A more concentrated form of social engineering in which the engineer uses small pieces of easily-accessible information to appear more believable e.g. using the individual's name.
- The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain.
- The coloured hat of cybercriminals who gain access to systems without permission for the purposes of what they believe is ethically right.
- A type of network that is heavily susceptible to attacks due to not having a password, thus allowing anyone to join.
- A piece of software that can be used to store and manage online credentials. It uses encryption to store the passwords in a safe way, so that they can be accessed later.
- A form of malware that makes it so that a device can be controlled. This relationship between the controlled device and the one doing the controlling is known as slave and master.
- The form of encryption that requires two keys.
- The process of converting normal data/information (plaintext) into another form (ciphertext.)
- A social engineering technique that uses text messages to impersonate others and gain access to unauthorised information.
- Someone who attempts to breach the defenses of a computer system or network to identify weaknesses.
- A piece of software that detects, prevents and removes viruses and other malware from a system.
- A network security measure in which a secure computer (or computer network) is isolated with no access to the internet.
- A targeted, focused form of social engineering in which the engineer uses information to appear more believable in targeting a high-profile individual e.g. a celebrity or business person in a significant role.
- The coloured hat of hackers who do not have authorisation to hack a given system, but do so without malicious intent.
- A human threat in which people gain access to unauthorised areas by following others into secure areas.
40 Clues: The form of encryption that requires two keys. • Software that was created with malicious intent. • The form of encryption that requires a single key. • A form of malware that shows unwanted ads on the user's device • A form of malware that demands money from the user in return for something. • ...
Cybersecurity 2018-08-02
Across
- CLI command to search for a pattern of letters
- Program used to collect cryptocurrency
- The telephone equivalent of phishing
- Protocol that WannaCry took advantage of
- First step in the cyber kill chain
- A compromised computer in a botnet
- Command to identify Ethernet devices
- Process security analysts use to search for advanced threats
- Resolve hostnames to IP addresses
- The second in the CIA triad
Down
- ... is the process of directing the company approach to security
- ... systems use physical characteristics to determine access
- The process of adding allowed programs to a list is called ...
- Testing technique using invalid or random data as input
- A weakness that can be exploited
- Specifies who gets access to what
- The process of reversing encoded data is ...
- The approach of using multiple layers of security
- Piece of forensic data identifying potential malicious activity
- Uses rules to allow or block traffic
20 Clues: The second in the CIA triad • A weakness that can be exploited • Specifies who gets access to what • Resolve hostnames to IP addresses • First step in the cyber kill chain • A compromised computer in a botnet • The telephone equivalent of phishing • Command to identify Ethernet devices • Uses rules to allow or block traffic • Program used to collect cryptocurrency • ...
Cybersecurity 2023-02-28
Across
- Never list your ________ number or home address under contact information onlin.
- special viruses that move from computer to computer without human action
- You do not need to _________ for a copyright, it is automatic
- Formal ways of giving credit to others for their work
- ______ settings help control things like your Profile, Contact, and other Information relating to your account
- Rules for interacting politely and responsibly online
- The exclusive right to make copies, license, or otherwise use a creative work
- A _______ password is one that contains at least 10 characters and several unique characters.
- URLS that lead the user to download a virus or visit a harmful website
- when online, using a _____ name helps protect your true identity
- Your _______ device often contains more personal information that any other source
- Bullying that takes place online
- passwords that contain easy-to-guess information
- When entering _______ information, be careful not to reveal personal details like you birthday or home address
- Phishing is malware that asks for personal _______.
- are used in conjunction with a screen name to help identify an online user without giving away personal details
- The format most commonly used for citing sources in language, literature, and in K-12
- Programs that appear to be useful but damage computers
Down
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- Using someone else's work and passing it off as your own
- Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Information about you and what you do online
- public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- programs or code that damage or destroy data by attaching to a program or file in a victim computer
- people that stand up for others
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- The ability to act in a safe and responsible way on the internet and other connected environments
- Someone who intentionally targets people for harm using online chat rooms or social media
- Software that protects computers from virus related harm
- Secretly watches computer activity
- Many features in online ________ can expose players to predators
- ____ use allows limited use of copyrighted material for educational purposes
- A detailed report, usually about a person
- Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- The format that is most commonly used in education and social sciences
- Illegal ____ of copyrighted material is often referred to as piracy
37 Clues: people that stand up for others • Bullying that takes place online • Secretly watches computer activity • A detailed report, usually about a person • Information about you and what you do online • passwords that contain easy-to-guess information • Phishing is malware that asks for personal _______. • Formal ways of giving credit to others for their work • ...
Cybersecurity 2024-09-04
Across
- Individually identifiable health information in the form of electronic data, paper records, or even spoken conversation.
- Cookie that exists only as long as the web browser is open.
- All points or areas in a system that could be used or compromised to allow hackers entry into the system.
- The actions of malicious code
- Flaw that exists in software when it was released and remains unknown until it is exploited by hackers.
- Changes to a system are tracked by which user account made them.
- Having multiple levels of protection.
- Digging through trash for useful information.
- Ransomware automatically downloaded when a user visits a web page that is infected.
- A macro that has been programmed to carry out a malicious intent.
- Cookie that originates from a visit to a website, but references a different website.
- Malware that changes its characteristics in attempts to avoid detection from antivirus programs.
- Cookie that stays on the computer until an expiration date is met.
- Software embedded on hardware devices to control the system.
- Malware hidden inside other software that appears to be harmless.
- Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.
- A virus that infects a computer before the operating system loads.
- Malware that allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer.
- Computer code intentionally written to cause some form of harm;
- Using social tools and technk1ues to obtain information.
- The three underlying principles of data protection: confidentiality, integrity, and availability.
- Set of regulations from credit card vendors that apply to businesses using their services; an industry standard, not a law.
- The state of data being I complete or uncorrupted; also the honesty of a person's actions.
- A flaw or potential for harm.
- Law ensuring financial businesses protect consumer’s private data.
- Following the rules or standards that have been established.
- Law dealing with unauthorized access of computers.
- methodology An approach to finding previously undetected unwanted programs or variants of known viruses through a learning approach.
- Malware designed to prevent security analysts from reading the source code by attempting to prevent access to or disassembly of the code itself.
- Law protecting wire and electronic transmissions of data.
Down
- Cookie that can only be sent using an encrypted session.
- Information about a person left behind by hi~ or her actions on the Internet.
- Law protecting electronic medical records and personal health information.
- Something that takes a vulnerability to a level where the flaws can be exploited
- Technology that tracks a 4ser's keystrokes on the keyboard.
- Computing technology incorporated into nontypical devices to allow communication with other devices and the Internet.
- Statement of if the site uses cookies and, if so, how.
- Malware that deploys its payload when a date or time occurs.
- Digital or electronic platform for health records.
- Malware deployed when conditions exist that the malware is seeking.
- The condition of being private or secret.
- Using a lie or scam to obtain private information.
- Software installed on a computer that collects data on the user and then redirects advertising sites to the web browser.
- Malware that encrypts the user's data; also called ransomware.
- A secret or unknown access point of entry into a system.
- Law preventing company executives from hiding or destroying electronic records
- Encrypts data, rather than stealing or destroying, to prevent user access unless a fee is paid to the hacker;
47 Clues: The actions of malicious code • A flaw or potential for harm. • Having multiple levels of protection. • The condition of being private or secret. • Digging through trash for useful information. • Digital or electronic platform for health records. • Using a lie or scam to obtain private information. • Law dealing with unauthorized access of computers. • ...
Cybersecurity 2024-08-31
Across
- bring your own computer
- coding used to protect information
- a method of gaining access to a network
- protects users from fraudulent websites
- a string used to identify user
- a program that is run without installation
- malicious software
- bring your own device
- items that are temporarily blocked
- process of identifying someone
- taking advantage of a vulnerability in a network
Down
- combination of robot and network
- individual with intent to hack maliciously
- network security system
- a kind of spyware
- a denial of service
- computer security system trap
- casting a reel in water
- intrusive software
- someone with knowledge of exploits
- misuse of devices to corrupt
21 Clues: a kind of spyware • malicious software • intrusive software • a denial of service • bring your own device • bring your own computer • network security system • casting a reel in water • misuse of devices to corrupt • computer security system trap • process of identifying someone • a string used to identify user • combination of robot and network • coding used to protect information • ...
CyBeRsEcUrItY 2024-07-11
Across
- Breaks into computer systems
- Verifies user identity
- AI-generated fake video
- Secret access to system
- Demands payment for data
- Malicious software
- Proves human, not bot
- Network of infected computers
- Encrypts internet connections
- Bring your own device
- Disguised malicious software
Down
- Protects against computer viruses
- Fraudulent data collection attempt
- Unwanted advertising software
- Blocks unauthorized entities
- Decoy system for attackers
- Blocks unauthorized network access
- Takes advantage of vulnerability
- Internet-based data storage
- Secretly collects user data
20 Clues: Malicious software • Proves human, not bot • Bring your own device • Verifies user identity • AI-generated fake video • Secret access to system • Demands payment for data • Decoy system for attackers • Internet-based data storage • Secretly collects user data • Breaks into computer systems • Blocks unauthorized entities • Disguised malicious software • Unwanted advertising software • ...
Cybersecurity 2023-04-28
Across
- Special viruses that move from computer to computer without human action
- Rules for interacting politely and responsibly online
- programs or code that damage or destroy data by attaching to a program or file in a victim computer
- Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- Programs that appear to be useful but damage computers
- Software that protects computers from virus related harm
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- The format that is most commonly used in education and social sciences
- ______ settings help control things like your Profile, Contact, and other Information relating to your account
- Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- A detailed report, usually about a person
- When online, using a _____ name helps protect your true identity
- Secretly watches computer activity
- Your _______ device often contains more personal information that any other source
- The exclusive right to make copies, license, or otherwise use a creative work
- Information about you and what you do online
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Many features in online ________ can expose players to predators
Down
- When entering _______ information, be careful not to reveal personal details like you birthday or home address
- Someone who intentionally targets people for harm using online chat rooms or social media
- Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- The ability to act in a safe and responsible way on the internet and other connected environments
- You do not need to _________ for a copyright, it is automatic
- Phishing is malware that asks for personal _______.
- Illegal ____ of copyrighted material is often referred to as piracy
- The format most commonly used for citing sources in language, literature, and in K-12
- ____ use allows limited use of copyrighted material for educational purposes
- Formal ways of giving credit to others for their work
- people that stand up for others
- Using someone else's work and passing it off as your own
- Passwords that contain easy-to-guess information
- Never list your ________ number or home address under contact information onlin.
- Are used in conjunction with a screen name to help identify an online user without giving away personal details
- A _______ password is one that contains at least 10 characters and several unique characters.
- Bullying that takes place online
- Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- URLS that lead the user to download a virus or visit a harmful website
37 Clues: people that stand up for others • Bullying that takes place online • Secretly watches computer activity • A detailed report, usually about a person • Information about you and what you do online • Passwords that contain easy-to-guess information • Phishing is malware that asks for personal _______. • Rules for interacting politely and responsibly online • ...
Cybersecurity 2022-11-22
Across
- A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
- A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
- A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
- An executable program that is advertised as performing one activity but which actually performs a malicious activity.
- An attacker who controls a botnet.
- Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
- Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- Software that helps prevent computers from becoming infected by different types of spyware.
- Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
- A logical computer network of zombies under the control of an attacker.
- An infected computer that is under the remote control of an attacker.
- A publicly released software security update intended to repair a vulnerability.
Down
- Software code that gives access to a program or a service that circumvents normal security protections.
- Malware that prevents a user's device from properly operating until a fee is paid.
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
- Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
- Hardware or software designed to limit the spread of malware.
- Computer code that lies dormant until it is triggered by a specific logical event.
- A general term used to describe software that spies on users by gathering information without consent.
- Software that is a cumulative package of all patches and feature updates.
20 Clues: An attacker who controls a botnet. • Hardware or software designed to limit the spread of malware. • An infected computer that is under the remote control of an attacker. • A logical computer network of zombies under the control of an attacker. • Software that is a cumulative package of all patches and feature updates. • ...
ETHICS IN NURSING - Ayanda , Mutsa and Emmaculate 2024-05-29
Across
- data - 3rd way cybersecurity can help in the nursing medical field?
- -3rd code of ethics in the medical profession found through cybersecurity
- - 1st way cybersecurity can help in the nursing medical field?
- care-2nd way cybersecurity can help in the nursing medical field?
- Ethical principles of doing good or acting in the best interest of patient
- what are ethical guidelines in cybersecurity in Poland?
Down
- Right of competent adults to take informed decisions about their own medical care
- - A set of moral values and norms guiding individuals,communities and organisations behaviours
- Security Accuracy-3 cyber ethics
- -1st code of ethics in the medical profession found through cybersecurity
- -2nd code of ethics in the medical profession found through cybersecurity
11 Clues: Security Accuracy-3 cyber ethics • what are ethical guidelines in cybersecurity in Poland? • - 1st way cybersecurity can help in the nursing medical field? • care-2nd way cybersecurity can help in the nursing medical field? • data - 3rd way cybersecurity can help in the nursing medical field? • ...
CyberSecurity 2021-03-22
Across
- a group of computers on the same network
- an unwanted ad that pops up on your computer
- malicious software that spreads computer to computer
- a software that completes a task
- an entertainment service based online
- voice control for technology
- a connection between computers
- full transfer of files through lan
- a replicating malicious software
Down
- an open portal for admins
- a board for discussions
- internet communication
- weaknesses in computers
- software designed to look legit
- the transfer of image files
- electronic messages sent through the internet
- a list of people to mail a single email
- malicious software designed to try to get personal data
- a text or email
19 Clues: a text or email • internet communication • a board for discussions • weaknesses in computers • an open portal for admins • the transfer of image files • voice control for technology • a connection between computers • software designed to look legit • a software that completes a task • a replicating malicious software • full transfer of files through lan • ...
CyberSecurity 2021-03-22
Across
- a group of computers on the same network
- an unwanted ad that pops up on your computer
- malicious software that spreads computer to computer
- a software that completes a task
- an entertainment service based online
- voice control for technology
- a connection between computers
- full transfer of files through lan
- a replicating malicious software
Down
- an open portal for admins
- a board for discussions
- internet communication
- weaknesses in computers
- software designed to look legit
- the transfer of image files
- electronic messages sent through the internet
- a list of people to mail a single email
- malicious software designed to try to get personal data
- a text or email
19 Clues: a text or email • internet communication • a board for discussions • weaknesses in computers • an open portal for admins • the transfer of image files • voice control for technology • a connection between computers • software designed to look legit • a software that completes a task • a replicating malicious software • full transfer of files through lan • ...
Do I know my Cyber Security Posture 2023-07-05
Across
- - The potential negative impact or consequence of a cybersecurity incident.
- - Ensuring adherence to relevant cybersecurity regulations and standards.
- - The effects on an organization's operations, revenue, and reputation due to a security breach.
Down
- - The management and oversight of cybersecurity within the organization.
- - Assessing and managing cybersecurity risks associated with vendors, suppliers, and partners.
- - Coverage to mitigate potential financial losses resulting from a cyber incident.
- - Promoting a culture of cybersecurity consciousness among employees.
- - Education programs to inform employees about cybersecurity threats and best practices.
- - An unforeseen event or occurrence related to cybersecurity.
- - Protecting assets, systems, and data from unauthorized access or harm.
10 Clues: - An unforeseen event or occurrence related to cybersecurity. • - Promoting a culture of cybersecurity consciousness among employees. • - The management and oversight of cybersecurity within the organization. • - Protecting assets, systems, and data from unauthorized access or harm. • - Ensuring adherence to relevant cybersecurity regulations and standards. • ...
Cybersecurity 2024-03-12
Across
- Network security barrier.
- Weakness in security.
- Data protection method.
- Malicious program disguised as useful.
- Faking identity or data.
- Secure website protocol.
- Self-replicating malware.
- Unauthorized access attempt.
- Software update for security.
- Harmful software.
Down
- Authentication method.
- Stealth force: Password cracking method.
- Secure network connection.
- Unique physical traits.
- Data encryption for ransom.
- Email scam tactic.
- Computer protection software.
- Denial-of-Service attack.
- engineering Manipulating people for data.
19 Clues: Harmful software. • Email scam tactic. • Weakness in security. • Authentication method. • Unique physical traits. • Data protection method. • Faking identity or data. • Secure website protocol. • Network security barrier. • Denial-of-Service attack. • Self-replicating malware. • Secure network connection. • Data encryption for ransom. • Unauthorized access attempt. • ...
Cybersecurity 2023-01-26
Across
- steals information though a link
- keeps intruders out
- changes IP to look legitimate
- helps provent cyber attacks
- takes data for money
- looks safe but isn’t
- Malware that can reproduce itself
- checks vulnerabilities in a system
- manipulates human error
- someone successfully got in
Down
- identifying a user’s identity.
- malicious software or infected data
- a network of infected computers
- malware used to spy
- manipulating someone's mouse
- A series 15 numbers
- private encrypted network
- protects information from hackers
- locks up a website with requests
19 Clues: keeps intruders out • malware used to spy • A series 15 numbers • takes data for money • looks safe but isn’t • manipulates human error • private encrypted network • helps provent cyber attacks • someone successfully got in • manipulating someone's mouse • changes IP to look legitimate • identifying a user’s identity. • a network of infected computers • steals information though a link • ...
Cybersecurity 2024-03-12
Across
- Secure network connection.
- Email scam tactic.
- Self-replicating malware.
- engineering Manipulating people for data.
- Unauthorized access attempt.
- Stealth force: Password cracking method.
- Data encryption for ransom.
- Network security barrier.
- Faking identity or data.
- Malicious program disguised as useful.
Down
- Weakness in security.
- Data protection method.
- Harmful software.
- Denial-of-Service attack.
- Unique physical traits.
- Authentication method.
- Secure website protocol.
- Computer protection software.
- Software update for security.
19 Clues: Harmful software. • Email scam tactic. • Weakness in security. • Authentication method. • Data protection method. • Unique physical traits. • Secure website protocol. • Faking identity or data. • Self-replicating malware. • Denial-of-Service attack. • Network security barrier. • Secure network connection. • Data encryption for ransom. • Unauthorized access attempt. • ...
Cybersecurity 2024-03-14
Across
- Data Hostage
- Data Recovery
- Logs, Activity Tracking
- Unique Authentication
- Fake Identity
- Secure Data
- Virus Threats
- Isolated Testing
- Layered Authentication
- Fake Emails
- Engineering, Manipulative Tactics
Down
- Unpatched Vulnerability
- Security, Device Protection
- Fake emails
- Network Protection
- Extra Verification
- Insurance, Risk Coverage
- Secure Connection
- Network Overload
- Software Updates
20 Clues: Fake emails • Secure Data • Fake Emails • Data Hostage • Data Recovery • Fake Identity • Virus Threats • Isolated Testing • Network Overload • Software Updates • Secure Connection • Network Protection • Extra Verification • Unique Authentication • Layered Authentication • Unpatched Vulnerability • Logs, Activity Tracking • Insurance, Risk Coverage • Security, Device Protection • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- Unauthorized use of personal information.
- Practices for maintaining cybersecurity.
- Potential harm from cyber threats.
- Protecting networks from unauthorized access.
- Understanding cybersecurity risks.
- Potential dangers to digital systems.
- Rules governing cybersecurity practices.
- Safeguarding data from unauthorized access.
- Measures to protect against cyber threats.
- Malicious software designed to harm systems.
- response Reacting to and mitigating cyber incidents.
- Individuals working in cybersecurity roles.
- Fraudulent attempt to obtain sensitive information.
- Ability to use digital tools effectively.
- Bullying using electronic means.
- Ensuring a healthy digital lifestyle.
- Measures to protect digital assets.
- Security event affecting digital systems.
- Learning about cybersecurity practices.
- Criminal activities conducted online.
- Manipulating individuals to divulge information.
- Self-replicating malicious code.
- Practice of protecting digital systems.
- Practices for staying safe online.
- Dual verification for user identity.
- Secret code for accessing systems.
- Legal regulations governing cyberspace.
- Converting data into a code to secure it.
- Deceptive attempt to acquire sensitive information.
- Traces of online activity.
- Virtual Private Network for secure connections.
- a type of malicious software that self-replicates and spreads to other computer systems
- Unsolicited and often irrelevant messages.
Down
- Unauthorized access to sensitive data.
- Responsible behavior online.
- Covertly obtaining information from digital systems.
- Gathering and analyzing data to prevent cyber threats.
- the state of being protected from harm, danger, or risk,
- Verifying user identity.
- Intentional assault on computer systems.
- Protecting network endpoints from threats.
- Malware that encrypts data for ransom.
- Moral principles guiding online behavior.
- Encrypted and protected communication channels.
- Global network connecting computers worldwide.
- Safely navigating the internet.
- Storing and accessing data over the internet.
- Maintaining a healthy digital lifestyle.
- Ability to withstand and recover from cyber attacks.
- are individuals or groups with advanced technical skills who use their expertise to gain unauthorized access to computer systems,
- Control over personal data usage.
51 Clues: Verifying user identity. • Traces of online activity. • Responsible behavior online. • Safely navigating the internet. • Bullying using electronic means. • Self-replicating malicious code. • Control over personal data usage. • Potential harm from cyber threats. • Understanding cybersecurity risks. • Practices for staying safe online. • Secret code for accessing systems. • ...
Cyber Security 2023-04-05
Across
- A malware synonymous with EternalBlue
- Best cybersecurity tool
- Unauthorised access of someone's gadgets
- Lock icon in the browser address bar for a URL
- Man made universe which we can't live without
- Hackers demand ransom in this currency
- Most dangerous computer virus in history
- Type of malware that threatens to expose information
- Malicious code infecting your system
- Best practices to keep your system secure
Down
- Key to open your account
- Ensures business continuity in CIA triad
- Target contacted by email or telephone or message
- People and management problem
- Browser for the dark web
- Social media platform is a hackers’ favourite
- Unnecessary mail chocking the network
- Malicious software which is installed in your system when you click a link
- Operating system for cybersecurity
- Computer virus that destroyed photos, audio files and documents
20 Clues: Best cybersecurity tool • Key to open your account • Browser for the dark web • People and management problem • Operating system for cybersecurity • Malicious code infecting your system • A malware synonymous with EternalBlue • Unnecessary mail chocking the network • Hackers demand ransom in this currency • Ensures business continuity in CIA triad • ...
Cybersecurity 2023-05-18
Across
- is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
- is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
- bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
- attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- is a general term for any type of intrusive computer software with malicious intent against the user.
- is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
- are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
- is the delivery of hosted services, including software, hardware, and storage, over the Internet.
- every aspect of protecting an organization and its employees and assets against cyber threats.
- is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
- is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
- is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
- is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- is the process of decoding cipher text to plain text so that it is readable by humans
- is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- is a kind of spyware software that records every keystroke made on a computer’s keyboard.
- refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.
18 Clues: is the process of decoding cipher text to plain text so that it is readable by humans • is a kind of spyware software that records every keystroke made on a computer’s keyboard. • every aspect of protecting an organization and its employees and assets against cyber threats. • ...
June 12 - InfoSec 2024-06-12
Across
- Protecting systems and data from threats
- Computer equipment which protects your network from hackers gaining remote access
- Keeping personal information secure
- What needs to be kept private and secure
- Files that may contain sensitive information
- Person who gains unauthorized access to a computer system
- Program that deletes files and/or programs
- Group of connected computers
- Ensuring data remains unaltered and trustworthy
- Permissions granted to view or use data/systems
- Rules and policies governing cybersecurity practices
- Digital information that needs safeguarding
- Being alert to potential cybersecurity risks
Down
- The protection of computers, networks and data from malware and hackers
- Where a person lies to another to trick them into giving over money or information
- Sending fake emails telling victims to log onto a fake website which steals their password and login details
- Malware which gives a hacker admin powers to control your computer
- Malware which completes small repetitive tasks (used in DDoS attacks)
- Someone who might visit offices to teach workers about cybersecurity
- Obligation to follow security best practices
- Program which appears useful, but hides malicious software inside
- Causing a website to crash by directing millions of computers to simultaneously request data from it (4 letter acronym)
- Preventing unauthorized disclosure of information
- A flaw in a program or network which makes it vulnerable to hacking
- Potential danger that could breach security
- Measures to limit access and maintain security
- Plan to maintain cybersecurity defenses
- Another name for a software engineer
- String of letters, numbers and characters entered along with a user ID to log in
- Umbrella term for various programs that cause problems, including viruses, ransomware and trojans
30 Clues: Group of connected computers • Keeping personal information secure • Another name for a software engineer • Plan to maintain cybersecurity defenses • Protecting systems and data from threats • What needs to be kept private and secure • Program that deletes files and/or programs • Potential danger that could breach security • Digital information that needs safeguarding • ...
cybersecurity 2024-06-27
Across
- The information property of being accessible only to a restricted group of persons
- Cryptographic algorithm used to encrypt and decrypt data
- Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
- The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
- Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
- The way of covering communication based on keeping the very fact of communication secret
- The act of granting rights matching with the identifier
- The process of discovering the true identity of a person or item from the entire collection of similar persons or items
- The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
- Type of threat sources when the actor is a human-being
Down
- The best subject :)
- The information property of being accessible and usable by a legal user with possible conditions set by information owner
- Type of access control where determined rights can be represented as an authorization matrix
- Type of threat sources occured because of the devices misfunction
- Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- The information property of having no illegal or unauthorized modifications
17 Clues: The best subject :) • Type of threat sources when the actor is a human-being • The act of granting rights matching with the identifier • Cryptographic algorithm used to encrypt and decrypt data • Type of threat sources occured because of the devices misfunction • The information property of having no illegal or unauthorized modifications • ...
Cybersecurity 2021-09-13
Across
- attempt to exploit vulnerabilities
- spread by phishing
- malicious violator
- malicious software
- unauthorized act
- secure string of characters
- software that monitors online activity
- hardware/software to prevent unauthorized access
- scam without a rod and reel
- recognizable pattern
Down
- software to fix vulnerabilities
- being unprotected
- secure entry
- vulnerability
- the use of fake addresses
- process of verifying identity
- enticed by an incentive
- a virus or device that captures data
18 Clues: secure entry • vulnerability • unauthorized act • being unprotected • spread by phishing • malicious violator • malicious software • recognizable pattern • enticed by an incentive • the use of fake addresses • secure string of characters • scam without a rod and reel • process of verifying identity • software to fix vulnerabilities • attempt to exploit vulnerabilities • ...
CYBERSECURITY 2021-01-05
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- a defense technology designed to keep the malicious attacks out.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- internet version of a home address for your computer.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
17 Clues: internet version of a home address for your computer. • a defense technology designed to keep the malicious attacks out. • A group of computers, printers and devices that are interconnected and governed as a whole. • The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • ...
Cybersecurity 2024-08-05
Across
- A group of interconnected computers that share resources and information.
- Malicious code that replicates itself by modifying other computer programs.
- A hidden method for bypassing normal authentication in a computer system.
- Software that secretly collects user information without their knowledge.
- A network security device that monitors and filters incoming and outgoing network traffic.
- Distributed Denial of Service, an attack that overwhelms a network with traffic.
- A technique used to trick users into providing sensitive information by pretending to be a trustworthy entity.
- A vulnerability that is exploited before the software developer is aware.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Software that displays unwanted advertisements on a user’s device.
- Personally Identifiable Information, data that can identify an individual.
- Malicious software disguised as legitimate software to deceive users.
Down
- The process of converting information into code to prevent unauthorized access.
- A program that records every keystroke made by a user.
- Malware that encrypts files, demanding ransom payment for decryption keys.
- Unauthorized entry into a computer system or network.
- A set of tools that enables unauthorized access to a computer while hiding its presence.
17 Clues: Unauthorized entry into a computer system or network. • A program that records every keystroke made by a user. • Software that displays unwanted advertisements on a user’s device. • Malicious software disguised as legitimate software to deceive users. • A group of interconnected computers that share resources and information. • ...
Cybersecurity 2021-09-20
Across
- 2(wds) altered videos
- rearranged letters
- masquerade as a trusted source
- random data added
- disguised
- hiding a message
- can copy itself and infect
- running in the background
- 2(Wds) trust is a vulnerability
Down
- event that might compromise security
- Fingerprint, Retina Scan
- making free long distance calls
- Illicit and hidden
- a fictitious online identity
- unlock operating system
- dominate in such a fashion as to gain ownership
- safe place
17 Clues: disguised • safe place • hiding a message • random data added • Illicit and hidden • rearranged letters • 2(wds) altered videos • unlock operating system • Fingerprint, Retina Scan • running in the background • can copy itself and infect • a fictitious online identity • masquerade as a trusted source • making free long distance calls • 2(Wds) trust is a vulnerability • ...
CYBERSECURITY 2021-01-15
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- a defense technology designed to keep the malicious attacks out.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- internet version of a home address for your computer.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
17 Clues: internet version of a home address for your computer. • a defense technology designed to keep the malicious attacks out. • A group of computers, printers and devices that are interconnected and governed as a whole. • The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • ...
Cybersecurity 2023-09-13
Across
- attempt to exploit vulnerabilities
- spread by phishing
- malicious violator
- malicious software
- unauthorized act
- secure string of characters
- software that monitors online activity
- hardware/software to prevent unauthorized access
- scam without a rod and reel
- recognizable pattern
Down
- software to fix vulnerabilities
- being unprotected
- secure entry
- vulnerability
- the use of fake addresses
- process of verifying identity
- enticed by an incentive
- a virus or device that captures data
18 Clues: secure entry • vulnerability • unauthorized act • being unprotected • spread by phishing • malicious violator • malicious software • recognizable pattern • enticed by an incentive • the use of fake addresses • secure string of characters • scam without a rod and reel • process of verifying identity • software to fix vulnerabilities • attempt to exploit vulnerabilities • ...
Bitdefender Cybersecurity Awareness Crossword Puzzle 2022-10-18
Across
- Electronic data protection
- Potential adverse impact
- Common security issues
- Server data storage
- Managed Detection and Response acronym
- Processing information
- National Cybersecurity Alliance acronym
- Future threats
Down
- Bitdefender 24/7 offering
- Attempt to gain unauthorized access
- Connection of computer systems
- Internet offender
- One of the four key behaviors
- Readily available on the internet
- Internet not indexed by search engines
- Services outsourced to a provider
- Provides visibility across infrastructure
17 Clues: Future threats • Internet offender • Server data storage • Common security issues • Processing information • Potential adverse impact • Bitdefender 24/7 offering • Electronic data protection • One of the four key behaviors • Connection of computer systems • Readily available on the internet • Services outsourced to a provider • Attempt to gain unauthorized access • ...
Cybersecurity 2021-10-11
Across
- a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds
- program that hides in a computer and allows someone from a remote location to take full control of the computer
- a process of encoding messages to keep them secret, so only "authorized" parties can read it.
- malicious software
- The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.
- the practice of obtaining something, especially money, through force or threats
- usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- a technology that allows us to access our files/services through the internet instead of through the storage (hard drive) of our device.
Down
- the programs and other operating information used by a computer.
- hackers use their social skills to trick people into revealing access credentials or other valuable information
- fraudulently ask users to provide sensitive account information by posing as legitimate companies.
- software that collects data about the user and transmits it over the Internet without the user's knowledge or permission
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Part of a computer system that is designed to block unauthorized access
- a group of two or more computer systems linked together.
16 Clues: malicious software • a group of two or more computer systems linked together. • the programs and other operating information used by a computer. • Part of a computer system that is designed to block unauthorized access • the practice of obtaining something, especially money, through force or threats • ...
Cybersecurity 2023-12-06
Across
- A security measure that involves verifying the identity of a user or system.
- Secret code that must be entered to access a computer or network.
- The study of secure communication and storage of information.
- Barrier that prevents unauthorized access to or from a private network.
- The practice of stealing personal information to commit fraud.
- Person who gains unauthorized access to computer systems for malicious purposes.
- An attack that involves flooding a network with traffic to make it unavailable.
Down
- Unauthorized access, disclosure, or acquisition of sensitive information.
- Type of malicious software that can replicate and spread to other computers.
- Software designed to harm or exploit computers or networks.
- Process of converting information or data into a code to prevent unauthorized access.
- A program or set of programs that runs on a computer to carry out tasks.
- Software designed to detect and remove computer viruses.
- A set of rules governing the exchange or transmission of data.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- Type of malicious software disguised as legitimate software.
16 Clues: Software designed to detect and remove computer viruses. • Software designed to harm or exploit computers or networks. • Type of malicious software disguised as legitimate software. • The study of secure communication and storage of information. • A set of rules governing the exchange or transmission of data. • ...
Cybersecurity 2023-09-12
Across
- Shield users against viruses.
- A series of numbers located on routers.
- Protecting sensitive business information.
- The opposite of a solution.
- Should be kept hidden.
- Two or more computers connected together.
- Hacker successfully breaking into a system.
- Laptop, Phone, etc.
Down
- Attack on the Wifi system.
- Used to keep intruders out.
- Coding used to protect your information from hackers.
- Apps.
- Attackers scamming victims.
- Malware which changes, corrupts, or destroys information.
- Connected to on devices.
- A group of applications.
16 Clues: Apps. • Laptop, Phone, etc. • Should be kept hidden. • Connected to on devices. • A group of applications. • Attack on the Wifi system. • Used to keep intruders out. • Attackers scamming victims. • The opposite of a solution. • Shield users against viruses. • A series of numbers located on routers. • Two or more computers connected together. • ...
Cybersecurity 2024-10-07
Across
- Protection against unauthorized access to personal data
- A type of malware that encrypts data and demands payment for the decryption key
- The process of checking the identity of a user, device, or entity
- A secure gateway that controls traffic between an internal network and the internet
- Software designed to detect, prevent, and remove malware
- Process of converting data into a secret code to prevent unauthorized access
- The secure process of logging into a system with two layers of security
Down
- The practice of attempting to gain unauthorized access to networks by breaking into systems
- Type of security that protects the flow of data on the internet
- A malicious program designed to harm or exploit any programmable device
- The most common method used by hackers to steal sensitive information through email
- Unauthorized access to a computer system to steal or manipulate data
- A cyber attack that floods a network or service to overwhelm it and make it unavailable
- A weakness or flaw in a computer system that can be exploited by hackers
- The study of secure communication in the presence of adversaries
- An attack where an adversary impersonates another user to gain information
16 Clues: Protection against unauthorized access to personal data • Software designed to detect, prevent, and remove malware • Type of security that protects the flow of data on the internet • The study of secure communication in the presence of adversaries • The process of checking the identity of a user, device, or entity • ...
FISMA Training 2022-01-18
Across
- Policies and procedures are fully institutionalized, repeatable, automated where appropriate, consistently implemented, and regularly updated
- Assessor selects the sample items without intentional bias to include or exclude certain items in the population
- the process of the assessor re-preforming the control’s procedures for accuracy
- a period of time, normally two weeks, in which specific work has to be completed and made ready for review
- supports the ability to limit or contain the impact of a potential cybersecurity event
- supports the ability to contain the impact of a potential cybersecurity incident
- Based on assessor's sound and seasoned judgement
Down
- the process of looking at the entity’s management perform a process outlined in the procedures
- relating to or measured by the quality or characteristics
- The ____ provides educational guidance materials; develops and grades the Uniform CPA Examination; and monitors and enforces compliance within the profession.
- (acronym) provides a detailed step-by-step account of the work the assessor completed
- enables timely discovery of cybersecurity events
- assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.
- relating to, or involving the measurement of quantity or amount
- stands for "Prepared by Client" or "Provided by Client." For assurance engagements, the assessor will issue PBC items to the client. Each item is a request to either hold a meeting or obtain documentation.
- Control is designed to put into place when specific requirements for compliance can't be met with existing controls
- a framework for developing complex software products in an iterative and incremental fashion and is the most widely recognized Agile framework
- identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident
18 Clues: enables timely discovery of cybersecurity events • Based on assessor's sound and seasoned judgement • relating to or measured by the quality or characteristics • relating to, or involving the measurement of quantity or amount • the process of the assessor re-preforming the control’s procedures for accuracy • ...
Cybersecurity 2021-10-23
Across
- Avoid using these public ones
- Being harassed or threatened online
- Cybersecurity Awareness Month
- Frequent software --- fix cybersecurity “loopholes” attackers can exploit
- Something you shouldn't share online
- This security software company was purchased by Intel in February 2011
- Software that is created specifically to help detect, prevent and remove software viruses
- Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
- The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
- Cybersecurity Awareness Month Theme 2021
- Type of security threat
- An attempt by hackers to damage or destroy a computer network or system
- Being pursued by someone through the anonymity of social media
- Establishes secure and encrypted connections to provide greater privacy
15 Clues: Type of security threat • Avoid using these public ones • Cybersecurity Awareness Month • Being harassed or threatened online • Something you shouldn't share online • Cybersecurity Awareness Month Theme 2021 • Being pursued by someone through the anonymity of social media • An attempt by hackers to damage or destroy a computer network or system • ...
Cybersecurity 2020-12-22
Across
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
- a group of computers, printers and devices that are interconnected and governed as a whole
- a harmful computer program that can copy itself and spread across a number of connected computers
- to allow secret information to become generally known
- someone who makes money using illegal methods, especially by tricking people
- kind of malware that allows cybercriminals to remotely control your computer
- computer software that is designed to damage the way a computer works
- an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them, for example by taking money out of their bank account
Down
- the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- a technology that allows us to access our files and/or services through the internet from anywhere in the world
- software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
- an attack that enables an attacker to run malware that allows for the generation of cryptocurrency on the infected computer
- a computer program that gets access to a computer or system by appearing to be harmless, but is designed to do something damaging
- a defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based
- the process or action of verifying the identity of a user or process
15 Clues: to allow secret information to become generally known • the process or action of verifying the identity of a user or process • computer software that is designed to damage the way a computer works • someone who makes money using illegal methods, especially by tricking people • kind of malware that allows cybercriminals to remotely control your computer • ...
Cybersecurity 2024-01-19
Across
- Malware that attaches itself to other software.
- A way to protect a network from incoming and outgoing attacks.
- Keeping secret things secret.
- An attack that takes place through digital means.
- Government agency responsible for Cybersecurity and Infrastructure Security
- The national organization which sets standards for technology
- Malware that can self-replicate and spread on its own.
- A way to secure an account; Something you know.
Down
- The right to access systems or networks.
- Maintaining access to key technologies.
- Verifying someone is who they say they are.
- A malicious software
- Monitoring who accesses what.
- Keeping systems secure and complete.
- A cybersecurity competition
15 Clues: A malicious software • A cybersecurity competition • Monitoring who accesses what. • Keeping secret things secret. • Keeping systems secure and complete. • Maintaining access to key technologies. • The right to access systems or networks. • Verifying someone is who they say they are. • Malware that attaches itself to other software. • ...
Cybersecurity 2023-09-13
Across
- Avoid using these public ones
- Being harassed or threatened online
- Cybersecurity Awareness Month
- Frequent software --- fix cybersecurity “loopholes” attackers can exploit
- Something you shouldn't share online
- This security software company was purchased by Intel in February 2011
- Software that is created specifically to help detect, prevent and remove software viruses
- Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
- The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
- Cybersecurity Awareness Month Theme 2021
- Type of security threat
- An attempt by hackers to damage or destroy a computer network or system
- Being pursued by someone through the anonymity of social media
- Establishes secure and encrypted connections to provide greater privacy
15 Clues: Type of security threat • Avoid using these public ones • Cybersecurity Awareness Month • Being harassed or threatened online • Something you shouldn't share online • Cybersecurity Awareness Month Theme 2021 • Being pursued by someone through the anonymity of social media • An attempt by hackers to damage or destroy a computer network or system • ...
Cybersecurity Fundamentals Chapter 1 2024-06-02
Across
- Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
- Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
- Professionals dedicated to protecting information systems and networks from cyber threats.
- refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
- The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
- Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
- Individuals or groups who use computers, networks, and the internet to commit illegal activities.
- The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.
8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats. • Individuals or groups who use computers, networks, and the internet to commit illegal activities. • Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals. • ...
cybersecurity 2023-01-25
Across
- an interruption in authorized users access to a computer network, typically one caused with malicious intent
- an exchange of keys where the parties involved are not authenticated, meaning fraud can happen.
- A form of denial of service attack desgined to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system
- software that generates revenue by throwing ads up on your screen
- a software or hardware tool that allows the user to monitor your internet traffic
- a situation in which a person or program successfully identifies itself as another by falsifying data
- a computer that is connected to the internet and taken over by a computer worm, virus, or other malware
- malicious software designed to steal data and harm or destroy computers.
- occurs when multiple machines are operating together to attack one target
Down
- a malfunction of a hardware or a software component
- A computer virus written in the same type of macro language as things like excel or word
- ethical hacking
- a type of malware that infects your computer and harms its master boot partition
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- average time between repairable failures of a technology product
15 Clues: ethical hacking • a malfunction of a hardware or a software component • average time between repairable failures of a technology product • software that generates revenue by throwing ads up on your screen • malicious software designed to steal data and harm or destroy computers. • occurs when multiple machines are operating together to attack one target • ...
Cybersecurity 2023-09-13
Across
- royal Canadian mounted police
- fraudulent practice of sending emails
- software designed to block computer access until money is paid
- belief in reliability and truth
- defense
- weakness or flaw
Down
- converting data into code
- secret word or phrase
- being kept secret or private
- make full use and benefit
- malicious software
- verifying identity
- electronic device for storing/processing data
- being free from danger or threat
- system designed to block unauthorized access
15 Clues: defense • weakness or flaw • malicious software • verifying identity • secret word or phrase • converting data into code • make full use and benefit • being kept secret or private • royal Canadian mounted police • belief in reliability and truth • being free from danger or threat • fraudulent practice of sending emails • system designed to block unauthorized access • ...
Cybersecurity 2022-04-27
Across
- coding files to hide their contents
- using fraudulent emails to access information
- device on a network with no use other use besides tricking bad actors
- determining the importance of each item
- US law that prohibits avoiding copyright controls
- online document that verifies authenticity
Down
- to find additional ways to remain within an attack surface for a time
- crimes that target and or use computers / computer systems
- stores public and private keys
- cipher that replaces each letter uniquely through rotation
- controls on real world access
- weakness in a system, policy, etc.
- situation that poses potential dangers
- keeping information secret
- intentionally bad programs added to devices
15 Clues: keeping information secret • controls on real world access • stores public and private keys • weakness in a system, policy, etc. • coding files to hide their contents • situation that poses potential dangers • determining the importance of each item • online document that verifies authenticity • intentionally bad programs added to devices • ...
Hackers, Scams, and Online Safety 2023-04-22
Across
- Online Harassment
- Security Protects against unauthorized access
- Media manipulation to change image
- Designs, Builds, and tests cybersecurity
- Cyber "kidnapping" for payment
- Tricks for getting private information
- Protects info from cyber attacks
- Harmful Software
- Collects private info without consent
- work that uses personal devices
Down
- Seemlessly harmful Malware until downloaded
- Detects, prevents, and removes malware
- Monitors networks for possible threats
- Software for securing cloud data
- Identifies device by internet connection
- Compromised computers used for cyberattacks
- Designer of data networks
- Paid testers of cybersecurity
- Scrambling date to restrict access
19 Clues: Harmful Software • Online Harassment • Designer of data networks • Paid testers of cybersecurity • Cyber "kidnapping" for payment • work that uses personal devices • Software for securing cloud data • Protects info from cyber attacks • Media manipulation to change image • Scrambling date to restrict access • Collects private info without consent • ...
boundless 2022-01-13
12 Clues: who you are • Pay or else • Bad software • what you sell • Who you protect • your goal in 2022 • Wall of protection • theme of this event • Pen & Teller's tricks • best cybersecurity vendor • how SonicWall goes to market • Patented real-time AI security
Crossword Day 2024-12-16
Across
- Founding sponsor
- Shining star of our logo
- The awesome director of ACES
- A series of lectures
- A building that can meet all your basic needs!
- A trap
Down
- A perk of an honors college program
- Fun merch, on theme too
- Research or ___
- Our passion...of course
- Matchmaking...but with a cybersecurity professional
- Earned in the near future
- Fav location
- Class
14 Clues: Class • A trap • Fav location • Research or ___ • Founding sponsor • A series of lectures • Fun merch, on theme too • Our passion...of course • Shining star of our logo • Earned in the near future • The awesome director of ACES • A perk of an honors college program • A building that can meet all your basic needs! • Matchmaking...but with a cybersecurity professional
AP (B) Unidad 4 2024-01-23
20 Clues: fuel • drone • screen • weapon • piracy • device • gadget • upload • immerse • browser • download • research • isolation • challenge • scientist • blackhole • development • advancement • cybersecurity • cyberbullying
Cybersecurity 2024-08-08
Across
- A type of server that allows the access of data and programs over the Internet instead of your computer’s hard drive.
- The amount of data that can pass through a network or part of a network per second.
- Protects against code injection attacks and other malicious content on trusted web pages.
- Malware that locks access to files and demands a ransom to release them.
- Monitors and restricts the sharing of sensitive information to prevent data breaches.
- Software that collects user data without consent and sends it to third parties.
- Encodes data to keep it safe from unauthorized access.
- Software that stops known malware. It’s crucial for catching viruses before they can cause trouble.
Down
- Software designed to infect and damage a system or network, including viruses, worms, and trojans.
- Malware disguised as harmless software to gain access to a system.
- A specific type of cyberattack that exploits the fraudulent use of electronic communications to take advantage of users and collect personal information.
- Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
- Any unauthorized attempt to access, alter, steal, or block system or user information.
- Acts as a barrier between the network and incoming/outgoing traffic, analyzing and managing web activities.
14 Clues: Encodes data to keep it safe from unauthorized access. • Malware disguised as harmless software to gain access to a system. • Malware that locks access to files and demands a ransom to release them. • Software that collects user data without consent and sends it to third parties. • ...
Sales Trivia 2024-11-08
Across
- KnowBe4's HDR product called
- Process of verifying a user's identity
- What snack food shares its name with KnowBe4 local content publisher in SA?
- A popular Cybersecurity regulation (abbr.)
- What do cows drink?
- Type of sale where a customer buys additional products or services
- Common cybersecurity threat that uses deception to gain sensitive information
Down
- What happens in … stays in …?
- What is the name of KnowBe4's virtual cybersecurity awareness event
- What is the only fruit that has its seeds on the outside?
- Which part of your body contains a bone called the ‘Funny Bone’?
- Acronym for Chief Information Security Officer
- What term describes the total value of sales made over a set period?
- What is the term Gen Z uses for someone that has been ignoring/avoiding you?
- If two’s company and three’s a crowd, what do four and five make?
- What is the term for unsolicited emails sent in bulk?
16 Clues: What do cows drink? • KnowBe4's HDR product called • What happens in … stays in …? • Process of verifying a user's identity • A popular Cybersecurity regulation (abbr.) • Acronym for Chief Information Security Officer • What is the term for unsolicited emails sent in bulk? • What is the only fruit that has its seeds on the outside? • ...
Cybersecurity 2023-09-14
Across
- ________ settings let you decide who can see what you post.
- A secret word or phrase that may include numbers, letters, or symbols
- _______ card. You can use this instead of money to buy things at a store or online.
- When you don't pay for something and just take it
- when you're on the internet, clicking on a _______ will take you to a new page or location
- Sending a letter through the computer.
- _______ security - the title of this crossword
Down
- Ring, ring. You probably carry this with you in your pocket or purse every day!
- Websites like Facebook, Twitter, Instagram and TikTok are examples of ______ media
- It may look like a real email, but if it's asking you to share your passsword, it's probably ____
- Putting a new software program or app on your phone
- Another word for coins, dollars, loonies, and toonies
- When you post pictures of your cat or tell someone your good news
- Information that you need to keep hidden or private
14 Clues: Sending a letter through the computer. • _______ security - the title of this crossword • When you don't pay for something and just take it • Putting a new software program or app on your phone • Information that you need to keep hidden or private • Another word for coins, dollars, loonies, and toonies • ________ settings let you decide who can see what you post. • ...
CYBERSAFETY 2024-05-02
Across
- What is Cybersecurity?
- What is your best weapon?
- Who can do untold damage to you because of the internet
- What is the second part of CIA
- You must only share confidential data when
- What is the first part of CIA
Down
- What does Malware try to make you download
- What is now as important as real security
- What type of scam involves around playing with emotions to push people into a sense of urgency and fear leaving them more susceptible to being tricked
- what is the third part of CIA
- What security option fights off viruses from your computer
- You must only share confidential data with
- What is good to have as it notifies you of any sign-ins
- What security option makes a barrier between you and danger
- What security option hides your data
- What are the 3 principles of cybersecurity
16 Clues: What is Cybersecurity? • What is your best weapon? • what is the third part of CIA • What is the first part of CIA • What is the second part of CIA • What security option hides your data • What is now as important as real security • What does Malware try to make you download • You must only share confidential data with • You must only share confidential data when • ...
CAB-CBG Madness 2015-02-24
CAB-CBG Madness 2015-03-03
CAB Madness 2015-02-23
AI Puzzle 2024-10-15
20 Clues: - Scam • - Test • - Rules • - Device • - Coding • - Network • - Barrier • - Network • - Exploit • - Digital • - Malware • - Physics • - Internet • - Intruder • - Sequence • - Imitation • - Protection • - Efficiency • - Automation • - Information
AI Puzzle 2024-10-15
20 Clues: - Scam • - Test • - Rules • - Device • - Coding • - Exploit • - Digital • - Physics • - Barrier • - Network • - Network • - Malware • - Internet • - Sequence • - Intruder • - Imitation • - Efficiency • - Automation • - Protection • - Information
Security Squares - Simple 2023-08-08
Across
- Deceptive Text Messages
- Trained professional who specializes in IT infrastructure security
- Role-Based Access Control
- A digital form of payment
- A device that provides two-factor for users to prove their identity
- The art of protecting networks, devices and data from unauthorized access
- The use of a fabricated story to gain someone's trust
- National Institute of Standards and Technology
- The process of giving a user permission to access resources
- A Cybersecurity ----- is an attempt to gain unauthorized access to information
- A Cybersecurity -------- is a violation of computer security policies
Down
- Also know as MFA
- Security that manages digital identities and user access to data and systems
- Something you know, something you have, something you are
- Sets of documents describing guidelines, standards and best practices
- Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
- Illegal activity carried out on a digital network
- ----- coding, the process of designing code that adheres to best practices and safeguards
- The application of policies, technologies and procedures to reduce the overall impact and risk
- Voice Phishing
20 Clues: Voice Phishing • Also know as MFA • Deceptive Text Messages • Role-Based Access Control • A digital form of payment • National Institute of Standards and Technology • Illegal activity carried out on a digital network • The use of a fabricated story to gain someone's trust • Something you know, something you have, something you are • ...
Page 1 of 28 Next