cybersecurity Crossword Puzzles

cybersecurity 2022-12-05

cybersecurity crossword puzzle
Across
  1. is unwanted software designed to throw advertisements up on your screen, most often within a web browser
  2. is a collection of updates and fixes, called patches, for an operating system or a software program.
  3. is a type of malware that downloads onto a computer disguised as a legitimate program.
  4. is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  5. is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  6. often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard
  7. is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
  8. is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action
  9. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  10. is a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks.
Down
  1. is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  2. designed to detect and destroy computer viruses
  3. is caused by software or hardware errors.
  4. is a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. malicious software bundle designed to give unauthorized access to a computer or other software
  6. is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  7. is a type of malware from cryptovirology that threatens to publish the victim's personal data unless the ransom is paid
  8. is any program that prohibits a pop-up at some point in time.
  9. is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan.
  10. a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.

20 Clues: is caused by software or hardware errors.designed to detect and destroy computer virusesis any program that prohibits a pop-up at some point in time.is a type of malware that downloads onto a computer disguised as a legitimate program.malicious software bundle designed to give unauthorized access to a computer or other software...

Cybersecurity 2022-08-15

Cybersecurity crossword puzzle
Across
  1. Full name of a DoS attack (three words).
  2. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
  3. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
  4. A collection of malware infested computers that form a network to attack (e.g. a DDoS attack).
  5. (See xx) A set of cybersecurity threats that rely on a victim falling for a trap set for them (two words).
  6. An important process that verifies a user is really who they are; many different ways this can be done.
  7. An email that contains a message with a suspicious link designed to steal personal information.
  8. An annoying malware that spams you with ads.
  9. A name ... attack is a type of silly survey or quiz that actually harvests personal information from unaware users.
  10. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
  11. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
  12. I am not a robot.
  13. Settings on folders or files that control who is allowed to access them.
  14. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly (first word only).
  15. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
  16. A type of malware that records every single press of the keyboard that you make.
Down
  1. When raw data is put into context and has meaning, the data transforms into ...
  2. Hacking to try and champion a cause, e.g. climate change, rather than to steal information.
  3. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
  4. See clue xx.
  5. An example would be an email from a Nigerian prince asking you to send your name, address, contact number and bank details to him reportedly so you can receive many millions of dollars.
  6. Stealing information from someone simply by looking from behind them.
  7. A ... is created about a user based on data - for example, personal data, shopping habits, etc. - in order to better target that user.
  8. Malicious code intended to monitor your activity without your permission.
  9. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  10. Gaining unauthorised access to or control of a computer system.
  11. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
  12. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
  13. A malicious code typically disguised as a legitimate program.
  14. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
  15. Protection for a network by monitoring and controlling traffic that passes through it.
  16. The general term for programs that gains access to your system for unethical reasons, e.g. to steal data, cause system damage, send you spam, etc.

32 Clues: See clue xx.I am not a robot.Full name of a DoS attack (three words).An annoying malware that spams you with ads.A malicious code typically disguised as a legitimate program.Gaining unauthorised access to or control of a computer system.Stealing information from someone simply by looking from behind them....

Cybersecurity 2022-04-03

Cybersecurity crossword puzzle
Across
  1. A form of malware that demands money from the user in return for something.
  2. This process is similar to encryption in that plaintext is transformed into ciphertext, which cannot be understood. However, in this instance the ciphertext cannot be decrypted (converted back.)
  3. The act of fraudulently impersonating others in order to gain trust and cause victims to share unauthorised information.
  4. A cybersecurity attack in which multiple devices are used to prevent genuine users from being able to access a particular system.
  5. The form of encryption that requires a single key.
  6. An attack that involves intercepting communications without the knowledge of the victim or the service.
  7. A cybersecurity attack in which an individual attempts to stop genuine users from being able to use a particular system, using only one device.
  8. The technique of finding vulnerabilities that could potentially be exploited to gain access and information.
  9. A form of malware that is disguised as a legitimate program. Malicious code is hidden within the software to gain access to the user's system.
  10. A form of malware that is more self-sufficient, as it has the ability to exist and spread with no reliance on host files or human interaction.
  11. A social engineering technique that uses social media to impersonate others for some form of personal gain, potentially including unauthorised information and money.
  12. A service that can be used to protect your internet connection and privacy when operating online. This is done via the creation of an encrypted tunnel.
  13. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  14. Software that was created with malicious intent.
  15. A device which monitors all data coming into and out of a system/network, stopping anything that it believes could be harmful and/or unwanted.
  16. A form of malware that attaches itself to other files and requires human interaction in order to be able to spread and attach to more files.
  17. The coloured hat of hackers that are cybersecurity experts who have received authorisation to hack others in order to identify vulnerabilities.
  18. A form of malware that shows unwanted ads on the user's device
  19. The result of spreading bots, whereby the army of slave devices under one master can be controlled and used in DDoS attacks to harness the power and networking capabilities of all of them.
  20. A social engineering technique that uses voice calls to impersonate others and gain access to unauthorised information.
Down
  1. The act of a hacker gathering information about your device and its connection to a website/service to then configure their device to match yours and take over in communication as if they are you.
  2. A form of malware that gathers data about you and your device usage and forwards this to a third-party without your knowledge or consent.
  3. A social engineering technique that directs a website's traffic elsewhere in order to gain access to unauthorised information.
  4. The process of eavesdropping on what is being sent in a network using a piece of software.
  5. A technique in which an unknown source is disguised as a genuine business/person/platform in order to gain access to unauthorised information.
  6. A more concentrated form of social engineering in which the engineer uses small pieces of easily-accessible information to appear more believable e.g. using the individual's name.
  7. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain.
  8. The coloured hat of cybercriminals who gain access to systems without permission for the purposes of what they believe is ethically right.
  9. A type of network that is heavily susceptible to attacks due to not having a password, thus allowing anyone to join.
  10. A piece of software that can be used to store and manage online credentials. It uses encryption to store the passwords in a safe way, so that they can be accessed later.
  11. A form of malware that makes it so that a device can be controlled. This relationship between the controlled device and the one doing the controlling is known as slave and master.
  12. The form of encryption that requires two keys.
  13. The process of converting normal data/information (plaintext) into another form (ciphertext.)
  14. A social engineering technique that uses text messages to impersonate others and gain access to unauthorised information.
  15. Someone who attempts to breach the defenses of a computer system or network to identify weaknesses.
  16. A piece of software that detects, prevents and removes viruses and other malware from a system.
  17. A network security measure in which a secure computer (or computer network) is isolated with no access to the internet.
  18. A targeted, focused form of social engineering in which the engineer uses information to appear more believable in targeting a high-profile individual e.g. a celebrity or business person in a significant role.
  19. The coloured hat of hackers who do not have authorisation to hack a given system, but do so without malicious intent.
  20. A human threat in which people gain access to unauthorised areas by following others into secure areas.

40 Clues: The form of encryption that requires two keys.Software that was created with malicious intent.The form of encryption that requires a single key.A form of malware that shows unwanted ads on the user's deviceA form of malware that demands money from the user in return for something....

Cybersecurity 2022-10-15

Cybersecurity crossword puzzle
Across
  1. When online, using a ______ name helps protect your true identity
  2. Secretly watches computer activity
  3. Software that protects computers from virus-related harm
  4. Phishing is malware that asks for personal ___________
  5. Someone who intentionally targets people for harm using online chat rooms or social media
  6. Type of bullying that takes place online
  7. Many features in online _____ can expose players to predators
  8. Rules for interacting politely and responsibly online
  9. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  10. Programs that appear to be useful but damage computers
  11. A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
  12. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  13. ____ passwords contain easy-to-guess information
Down
  1. Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
  2. Programs or code that damage or destroy data by attaching to a program or file in a victim computer
  3. URLs that mislead the user into downloading a virus or visiting a harmful website
  4. Never list your _________ number or home address under contact information online
  5. Illegal ___ of copyrighted material is often referred to as piracy
  6. Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
  7. Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
  8. Your ______ device often contains more personal information than any other device
  9. A password containing at least 10 characters and several unique characters could be described as ______
  10. _______ settings help control things like your profile, contact, and other information relating to your account
  11. A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
  12. Social __________ describes sites or online communities where like-minded people can communicate with each other

25 Clues: Secretly watches computer activityType of bullying that takes place online____ passwords contain easy-to-guess informationRules for interacting politely and responsibly onlinePhishing is malware that asks for personal ___________Programs that appear to be useful but damage computersSoftware that protects computers from virus-related harm...

Cybersecurity 2022-11-22

Cybersecurity crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  3. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  4. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  5. An attacker who controls a botnet.
  6. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. Software that helps prevent computers from becoming infected by different types of spyware.
  9. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
  10. A logical computer network of zombies under the control of an attacker.
  11. An infected computer that is under the remote control of an attacker.
  12. A publicly released software security update intended to repair a vulnerability.
Down
  1. Software code that gives access to a program or a service that circumvents normal security protections.
  2. Malware that prevents a user's device from properly operating until a fee is paid.
  3. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
  4. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  5. Hardware or software designed to limit the spread of malware.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. A general term used to describe software that spies on users by gathering information without consent.
  8. Software that is a cumulative package of all patches and feature updates.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

Cybersecurity 2018-08-02

Cybersecurity crossword puzzle
Across
  1. CLI command to search for a pattern of letters
  2. Program used to collect cryptocurrency
  3. The telephone equivalent of phishing
  4. Protocol that WannaCry took advantage of
  5. First step in the cyber kill chain
  6. A compromised computer in a botnet
  7. Command to identify Ethernet devices
  8. Process security analysts use to search for advanced threats
  9. Resolve hostnames to IP addresses
  10. The second in the CIA triad
Down
  1. ... is the process of directing the company approach to security
  2. ... systems use physical characteristics to determine access
  3. The process of adding allowed programs to a list is called ...
  4. Testing technique using invalid or random data as input
  5. A weakness that can be exploited
  6. Specifies who gets access to what
  7. The process of reversing encoded data is ...
  8. The approach of using multiple layers of security
  9. Piece of forensic data identifying potential malicious activity
  10. Uses rules to allow or block traffic

20 Clues: The second in the CIA triadA weakness that can be exploitedSpecifies who gets access to whatResolve hostnames to IP addressesFirst step in the cyber kill chainA compromised computer in a botnetThe telephone equivalent of phishingCommand to identify Ethernet devicesUses rules to allow or block trafficProgram used to collect cryptocurrency...

Cybersecurity 2020-09-13

Cybersecurity crossword puzzle
Across
  1. Special viruses that move from computer to computer without human action
  2. Rules for interacting politely and responsibly online
  3. programs or code that damage or destroy data by attaching to a program or file in a victim computer
  4. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
  5. Programs that appear to be useful but damage computers
  6. Software that protects computers from virus related harm
  7. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  8. The format that is most commonly used in education and social sciences
  9. ______ settings help control things like your Profile, Contact, and other Information relating to your account
  10. Public _______ applies to works that are not copyrighted or have lost their copyright status due to age
  11. A detailed report, usually about a person
  12. When online, using a _____ name helps protect your true identity
  13. Secretly watches computer activity
  14. Your _______ device often contains more personal information that any other source
  15. The exclusive right to make copies, license, or otherwise use a creative work
  16. Information about you and what you do online
  17. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  18. Many features in online ________ can expose players to predators
Down
  1. When entering _______ information, be careful not to reveal personal details like you birthday or home address
  2. Someone who intentionally targets people for harm using online chat rooms or social media
  3. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
  4. The ability to act in a safe and responsible way on the internet and other connected environments
  5. You do not need to _________ for a copyright, it is automatic
  6. Phishing is malware that asks for personal _______.
  7. Illegal ____ of copyrighted material is often referred to as piracy
  8. The format most commonly used for citing sources in language, literature, and in K-12
  9. ____ use allows limited use of copyrighted material for educational purposes
  10. Formal ways of giving credit to others for their work
  11. people that stand up for others
  12. Using someone else's work and passing it off as your own
  13. Passwords that contain easy-to-guess information
  14. Never list your ________ number or home address under contact information onlin.
  15. Are used in conjunction with a screen name to help identify an online user without giving away personal details
  16. A _______ password is one that contains at least 10 characters and several unique characters.
  17. Bullying that takes place online
  18. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  19. URLS that lead the user to download a virus or visit a harmful website

37 Clues: people that stand up for othersBullying that takes place onlineSecretly watches computer activityA detailed report, usually about a personInformation about you and what you do onlinePasswords that contain easy-to-guess informationPhishing is malware that asks for personal _______.Rules for interacting politely and responsibly online...

Cybersecurity 2020-11-18

Cybersecurity crossword puzzle
Across
  1. A piece of property that cannot be viewed by the public.
  2. A thing that comes before another of the same kind.
  3. A person who tries to penetrate a computer system to find weaknesses.
  4. A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  5. When a hacker uses a compromised email account to impersonate the account owner.
  6. The name of the bot.
  7. Makes sure that users do not send important or valuable data to outside sources.
  8. A malicious attempt to disrupt the normal traffic of a targeted server.
  9. Luring someone into a relationship by means of a fictional online persona.
  10. Someone who breaks into a computer’s system.
  11. The process of undermining a company's cyber defences by going after its vulnerable partner network.
  12. The path a hacker takes to deliver the malicious software.
  13. An extra copy of data from a computer.
  14. Software tools that enable an unauthorized user to gain control of a system without being noticed.
  15. Criminals who break into computer networks with malicious intent.
  16. A software that demands payment in order to access the system again.
  17. An accessory that can be added to a computer. (??)
  18. Confidential or personal information that may be used for fraudulent purposes.
  19. Allows access of specific data to certain members of a group.
  20. A software that displayed advertisements.
  21. A threat agent is any person or thing that acts to cause, carry, transmit, or support a threat.
  22. used to confirm the identity of a user or computer.
  23. A set of instructions used to help staff members respond to a security incident.
  24. To change into a coded form.
  25. A type of attack that doesn’t allow the owner to access their data.
  26. A number that is associated with a specific computer.
  27. The process of protecting important data from corruption.
  28. When data is copied or transferred from one place to another without authorization.
  29. A process used to determine which components of the system need to be protected and the types of security risks they should be protected from.
Down
  1. A place where data is stored on the internet and not on the computer’s hard drive.
  2. A security method where information is encoded so it can only be accessed with a key.
  3. A software tool made to take advantage of a weakness in a computer.
  4. A piece of code put in to correct an error.
  5. A value with a unique length to identify data.
  6. The study of codes and the art of writing or solving them.
  7. A stealthy attacker that remains undetected for a long time.
  8. When a hacker submitts many passwords in hopes of eventually guessing the real one.
  9. A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
  10. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  11. Used to block unauthorized access while permitting outward communication.
  12. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  13. A number of internet connected computers that are all running one or more bots.
  14. Process that checks the identity of the user is what it is supposed to be.
  15. The controller of the bot that provides direction for the bot.
  16. Analyzing large databases to get information.
  17. A term used to describe the overall process or method where you: Identify hazards and risk factors that have the potential to cause harm.
  18. The unauthorized movement of classified information to unauthorized users.
  19. An encrypted connection over the internet from a device to a network.
  20. A decoy computer system designed to attract cyber attacks.
  21. A kind of monitoring software to keep track of keystrokes made by the user.
  22. A group that helps organizations to improve themselves by providing opposition to the point of view of the organization that they are helping.
  23. A program used to distinguish between a person and an automated access website.
  24. The act of disguising a communication from an unknown source as being from a known, trusted source.
  25. A self multiplying system that spreads itself across a network.
  26. A resource that is released under a copyright licence and allows anyone to use it.
  27. An online threat that hides itself in computers and mobile devices.
  28. A collective name for a variety of malicious software variants.
  29. List of things that are untrustworthy and should be avoided.
  30. The practice of determining the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality.
  31. The identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
  32. Malware that is disguised as actual software.
  33. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  34. A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
  35. An autonomous program on the internet that can interact with systems or users.

64 Clues: The name of the bot.To change into a coded form.An extra copy of data from a computer.A software that displayed advertisements.A piece of code put in to correct an error.Someone who breaks into a computer’s system.Analyzing large databases to get information.Malware that is disguised as actual software.A value with a unique length to identify data....

Cybersecurity 2020-09-13

Cybersecurity crossword puzzle
Across
  1. Never list your ________ number or home address under contact information onlin.
  2. special viruses that move from computer to computer without human action
  3. You do not need to _________ for a copyright, it is automatic
  4. Formal ways of giving credit to others for their work
  5. ______ settings help control things like your Profile, Contact, and other Information relating to your account
  6. Rules for interacting politely and responsibly online
  7. The exclusive right to make copies, license, or otherwise use a creative work
  8. A _______ password is one that contains at least 10 characters and several unique characters.
  9. URLS that lead the user to download a virus or visit a harmful website
  10. when online, using a _____ name helps protect your true identity
  11. Your _______ device often contains more personal information that any other source
  12. Bullying that takes place online
  13. passwords that contain easy-to-guess information
  14. When entering _______ information, be careful not to reveal personal details like you birthday or home address
  15. Phishing is malware that asks for personal _______.
  16. are used in conjunction with a screen name to help identify an online user without giving away personal details
  17. The format most commonly used for citing sources in language, literature, and in K-12
  18. Programs that appear to be useful but damage computers
Down
  1. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  2. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
  3. Using someone else's work and passing it off as your own
  4. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  5. Information about you and what you do online
  6. public _______ applies to works that are not copyrighted or have lost their copyright status due to age
  7. programs or code that damage or destroy data by attaching to a program or file in a victim computer
  8. people that stand up for others
  9. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  10. The ability to act in a safe and responsible way on the internet and other connected environments
  11. Someone who intentionally targets people for harm using online chat rooms or social media
  12. Software that protects computers from virus related harm
  13. Secretly watches computer activity
  14. Many features in online ________ can expose players to predators
  15. ____ use allows limited use of copyrighted material for educational purposes
  16. A detailed report, usually about a person
  17. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
  18. The format that is most commonly used in education and social sciences
  19. Illegal ____ of copyrighted material is often referred to as piracy

37 Clues: people that stand up for othersBullying that takes place onlineSecretly watches computer activityA detailed report, usually about a personInformation about you and what you do onlinepasswords that contain easy-to-guess informationPhishing is malware that asks for personal _______.Formal ways of giving credit to others for their work...

cybersecurity 2022-05-24

cybersecurity crossword puzzle
Across
  1. A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
  2. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  3. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  5. Designed to detect and destroy computer virus
  6. An individual who gains unauthorized access to a computer system/network for social or political purposes.
  7. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  8. internet Is the global system of interconnected computer networks that use the Internet protocol suite
  9. A network point that acts as an entrance to another network
  10. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  11. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  12. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  13. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
  1. Gaining access into a computer system/network illegally.
  2. an automated program that runs over the Internet
  3. Self-replicating virus that does not alter files but resides in active memory and duplicates itself
  4. Data confidentiality is a measure of the ability of a system to protect its data
  5. A person who uses computers to gain unauthorized access to data
  6. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  7. Software that is intended to damage or disable computers and computer systems
  8. Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
  9. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  10. A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
  11. management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
  12. Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
  13. Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.

26 Clues: Designed to detect and destroy computer virusan automated program that runs over the InternetGaining access into a computer system/network illegally.A network point that acts as an entrance to another networkA person who uses computers to gain unauthorized access to dataSoftware that is intended to damage or disable computers and computer systems...

Cybersecurity 2022-09-07

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
  2. The assurance that systems and data are accessible and useable
  3. A sequence of words used for authentication.
  4. A method used to discover errors or potential security vulnerabilities in software.
  5. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
  6. Our hashtag
  7. Measurable physical characteristics used to identify or verify an individual.
  8. Data that is being communicated across a communication medium is said to be "in ____"
  9. A sequence of characters used for authentication.
  10. A computer that provides services to users or other systems.
  11. A generic term for hardware which is used to store data.
  12. A previously unknown, bug, flaw, or backdoor in software is known as a "____ day".
  13. A user who can alter or circumvent a system’s controls is said to be "____"
  14. The categorisation of systems and data according to the expected impact if it was to be compromised.
  15. Malware used to gain access to a user’s systems and monitor their data, files, and behavior.
  16. The use of different character sets, such as lower-case characters , upper-case characters , numeric characters and special characters increases as password's "____".
  17. a form of malware that disguises itself as legitimate software but performs malicious activity when executed
  18. Any circumstance or event with the potential to harm systems or data.
  19. Descriptive data about the content and context used to identify data.
  20. Measures used to protect the confidentiality, integrity and availability of systems and data.
  21. A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
  22. The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.
Down
  1. Code that attempts to subvert the confidentiality, integrity or availability of a system is "____"
  2. Verifying the identity of a user
  3. email that falsely claims to be from a legitimate source, usually with a threat or request for information
  4. A security process that uses an additional factor for verification is called "____ factor authentication"
  5. An evident change to the normal behaviour of a network, system or user is called "an ____".
  6. The assurance that data is disclosed only to authorised entities.
  7. a type of malware that encrypts a victim’s information and demands payment in return for the decryption key
  8. A senior executive who is responsible for cybersecurity
  9. A network device that filters incoming and outgoing network data based on a series of rules.
  10. Anything of value, such as computer equipment, software or data.
  11. The act of exploiting human weaknesses to gain access to personal information and protected systems is called "____ engineering"
  12. Software embedded in computer equipment.
  13. The level of security risk to which a system is exposed.
  14. These securely manage data flows between connected networks.
  15. A tube, duct or pipe used to protect cables.
  16. The assurance that data has been created, amended or deleted only by authorised individuals.
  17. Data that resides on media or a system is said to be "at ____"
  18. An individual that is authorised to access a system.

40 Clues: Our hashtagVerifying the identity of a userSoftware embedded in computer equipment.A sequence of words used for authentication.A tube, duct or pipe used to protect cables.A sequence of characters used for authentication.An individual that is authorised to access a system.A senior executive who is responsible for cybersecurity...

CyberSecurity 2021-03-22

CyberSecurity crossword puzzle
Across
  1. a group of computers on the same network
  2. an unwanted ad that pops up on your computer
  3. malicious software that spreads computer to computer
  4. a software that completes a task
  5. an entertainment service based online
  6. voice control for technology
  7. a connection between computers
  8. full transfer of files through lan
  9. a replicating malicious software
Down
  1. an open portal for admins
  2. a board for discussions
  3. internet communication
  4. weaknesses in computers
  5. software designed to look legit
  6. the transfer of image files
  7. electronic messages sent through the internet
  8. a list of people to mail a single email
  9. malicious software designed to try to get personal data
  10. a text or email

19 Clues: a text or emailinternet communicationa board for discussionsweaknesses in computersan open portal for adminsthe transfer of image filesvoice control for technologya connection between computerssoftware designed to look legita software that completes a taska replicating malicious softwarefull transfer of files through lan...

CyberSecurity 2021-03-22

CyberSecurity crossword puzzle
Across
  1. a group of computers on the same network
  2. an unwanted ad that pops up on your computer
  3. malicious software that spreads computer to computer
  4. a software that completes a task
  5. an entertainment service based online
  6. voice control for technology
  7. a connection between computers
  8. full transfer of files through lan
  9. a replicating malicious software
Down
  1. an open portal for admins
  2. a board for discussions
  3. internet communication
  4. weaknesses in computers
  5. software designed to look legit
  6. the transfer of image files
  7. electronic messages sent through the internet
  8. a list of people to mail a single email
  9. malicious software designed to try to get personal data
  10. a text or email

19 Clues: a text or emailinternet communicationa board for discussionsweaknesses in computersan open portal for adminsthe transfer of image filesvoice control for technologya connection between computerssoftware designed to look legita software that completes a taska replicating malicious softwarefull transfer of files through lan...

CYBERSECURITY 2021-01-15

CYBERSECURITY crossword puzzle
Across
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. a defense technology designed to keep the malicious attacks out.
  3. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
  6. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  7. all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  4. internet version of a home address for your computer.
  5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  6. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.

17 Clues: internet version of a home address for your computer.a defense technology designed to keep the malicious attacks out.A group of computers, printers and devices that are interconnected and governed as a whole.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

CYBERSECURITY 2021-01-05

CYBERSECURITY crossword puzzle
Across
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. a defense technology designed to keep the malicious attacks out.
  3. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
  6. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  7. all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  4. internet version of a home address for your computer.
  5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  6. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.

17 Clues: internet version of a home address for your computer.a defense technology designed to keep the malicious attacks out.A group of computers, printers and devices that are interconnected and governed as a whole.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

Cybersecurity 2021-09-13

Cybersecurity crossword puzzle
Across
  1. attempt to exploit vulnerabilities
  2. spread by phishing
  3. malicious violator
  4. malicious software
  5. unauthorized act
  6. secure string of characters
  7. software that monitors online activity
  8. hardware/software to prevent unauthorized access
  9. scam without a rod and reel
  10. recognizable pattern
Down
  1. software to fix vulnerabilities
  2. being unprotected
  3. secure entry
  4. vulnerability
  5. the use of fake addresses
  6. process of verifying identity
  7. enticed by an incentive
  8. a virus or device that captures data

18 Clues: secure entryvulnerabilityunauthorized actbeing unprotectedspread by phishingmalicious violatormalicious softwarerecognizable patternenticed by an incentivethe use of fake addressessecure string of charactersscam without a rod and reelprocess of verifying identitysoftware to fix vulnerabilitiesattempt to exploit vulnerabilities...

Cybersecurity 2021-10-11

Cybersecurity crossword puzzle
Across
  1. a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds
  2. program that hides in a computer and allows someone from a remote location to take full control of the computer
  3. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  4. malicious software
  5. The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.
  6. the practice of obtaining something, especially money, through force or threats
  7. usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
  8. a technology that allows us to access our files/services through the internet instead of through the storage (hard drive) of our device.
Down
  1. the programs and other operating information used by a computer.
  2. hackers use their social skills to trick people into revealing access credentials or other valuable information
  3. fraudulently ask users to provide sensitive account information by posing as legitimate companies.
  4. software that collects data about the user and transmits it over the Internet without the user's knowledge or permission
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Part of a computer system that is designed to block unauthorized access
  8. a group of two or more computer systems linked together.

16 Clues: malicious softwarea group of two or more computer systems linked together.the programs and other operating information used by a computer.Part of a computer system that is designed to block unauthorized accessthe practice of obtaining something, especially money, through force or threats...

Bitdefender Cybersecurity Awareness Crossword Puzzle 2022-10-18

Bitdefender Cybersecurity Awareness Crossword Puzzle crossword puzzle
Across
  1. Electronic data protection
  2. Potential adverse impact
  3. Common security issues
  4. Server data storage
  5. Managed Detection and Response acronym
  6. Processing information
  7. National Cybersecurity Alliance acronym
  8. Future threats
Down
  1. Bitdefender 24/7 offering
  2. Attempt to gain unauthorized access
  3. Connection of computer systems
  4. Internet offender
  5. One of the four key behaviors
  6. Readily available on the internet
  7. Internet not indexed by search engines
  8. Services outsourced to a provider
  9. Provides visibility across infrastructure

17 Clues: Future threatsInternet offenderServer data storageCommon security issuesProcessing informationPotential adverse impactBitdefender 24/7 offeringElectronic data protectionOne of the four key behaviorsConnection of computer systemsReadily available on the internetServices outsourced to a providerAttempt to gain unauthorized access...

Cybersecurity 2021-09-20

Cybersecurity crossword puzzle
Across
  1. 2(wds) altered videos
  2. rearranged letters
  3. masquerade as a trusted source
  4. random data added
  5. disguised
  6. hiding a message
  7. can copy itself and infect
  8. running in the background
  9. 2(Wds) trust is a vulnerability
Down
  1. event that might compromise security
  2. Fingerprint, Retina Scan
  3. making free long distance calls
  4. Illicit and hidden
  5. a fictitious online identity
  6. unlock operating system
  7. dominate in such a fashion as to gain ownership
  8. safe place

17 Clues: disguisedsafe placehiding a messagerandom data addedIllicit and hiddenrearranged letters2(wds) altered videosunlock operating systemFingerprint, Retina Scanrunning in the backgroundcan copy itself and infecta fictitious online identitymasquerade as a trusted sourcemaking free long distance calls2(Wds) trust is a vulnerability...

FISMA Training 2022-01-18

FISMA Training crossword puzzle
Across
  1. Policies and procedures are fully institutionalized, repeatable, automated where appropriate, consistently implemented, and regularly updated
  2. Assessor selects the sample items without intentional bias to include or exclude certain items in the population
  3. the process of the assessor re-preforming the control’s procedures for accuracy
  4. a period of time, normally two weeks, in which specific work has to be completed and made ready for review
  5. supports the ability to limit or contain the impact of a potential cybersecurity event
  6. supports the ability to contain the impact of a potential cybersecurity incident
  7. Based on assessor's sound and seasoned judgement
Down
  1. the process of looking at the entity’s management perform a process outlined in the procedures
  2. relating to or measured by the quality or characteristics
  3. The ____ provides educational guidance materials; develops and grades the Uniform CPA Examination; and monitors and enforces compliance within the profession.
  4. (acronym) provides a detailed step-by-step account of the work the assessor completed
  5. enables timely discovery of cybersecurity events
  6. assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.
  7. relating to, or involving the measurement of quantity or amount
  8. stands for "Prepared by Client" or "Provided by Client." For assurance engagements, the assessor will issue PBC items to the client. Each item is a request to either hold a meeting or obtain documentation.
  9. Control is designed to put into place when specific requirements for compliance can't be met with existing controls
  10. a framework for developing complex software products in an iterative and incremental fashion and is the most widely recognized Agile framework
  11. identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident

18 Clues: enables timely discovery of cybersecurity eventsBased on assessor's sound and seasoned judgementrelating to or measured by the quality or characteristicsrelating to, or involving the measurement of quantity or amountthe process of the assessor re-preforming the control’s procedures for accuracy...

Cybersecurity 2021-10-23

Cybersecurity crossword puzzle
Across
  1. Avoid using these public ones
  2. Being harassed or threatened online
  3. Cybersecurity Awareness Month
  4. Frequent software --- fix cybersecurity “loopholes” attackers can exploit
  5. Something you shouldn't share online
  6. This security software company was purchased by Intel in February 2011
  7. Software that is created specifically to help detect, prevent and remove software viruses
  8. Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
  9. Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
  1. The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
  2. Cybersecurity Awareness Month Theme 2021
  3. Type of security threat
  4. An attempt by hackers to damage or destroy a computer network or system
  5. Being pursued by someone through the anonymity of social media
  6. Establishes secure and encrypted connections to provide greater privacy

15 Clues: Type of security threatAvoid using these public onesCybersecurity Awareness MonthBeing harassed or threatened onlineSomething you shouldn't share onlineCybersecurity Awareness Month Theme 2021Being pursued by someone through the anonymity of social mediaAn attempt by hackers to damage or destroy a computer network or system...

Cybersecurity 2022-04-27

Cybersecurity crossword puzzle
Across
  1. coding files to hide their contents
  2. using fraudulent emails to access information
  3. device on a network with no use other use besides tricking bad actors
  4. determining the importance of each item
  5. US law that prohibits avoiding copyright controls
  6. online document that verifies authenticity
Down
  1. to find additional ways to remain within an attack surface for a time
  2. crimes that target and or use computers / computer systems
  3. stores public and private keys
  4. cipher that replaces each letter uniquely through rotation
  5. controls on real world access
  6. weakness in a system, policy, etc.
  7. situation that poses potential dangers
  8. keeping information secret
  9. intentionally bad programs added to devices

15 Clues: keeping information secretcontrols on real world accessstores public and private keysweakness in a system, policy, etc.coding files to hide their contentssituation that poses potential dangersdetermining the importance of each itemonline document that verifies authenticityintentionally bad programs added to devices...

boundless 2022-01-13

boundless crossword puzzle
Across
  1. Pay or else
  2. best cybersecurity vendor
  3. Bad software
  4. your goal in 2022
  5. Patented real-time AI security
  6. how SonicWall goes to market
Down
  1. who you are
  2. what you sell
  3. theme of this event
  4. Who you protect
  5. Wall of protection
  6. Pen & Teller's tricks

12 Clues: who you arePay or elseBad softwarewhat you sellWho you protectyour goal in 2022Wall of protectiontheme of this eventPen & Teller's tricksbest cybersecurity vendorhow SonicWall goes to marketPatented real-time AI security

Cybersecurity 2020-12-22

Cybersecurity crossword puzzle
Across
  1. things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
  2. a group of computers, printers and devices that are interconnected and governed as a whole
  3. a technology that allows us to access our files and/or services through the internet from anywhere in the world
  4. software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
  5. kind of malware that allows cybercriminals to remotely control your computer
  6. the process or action of verifying the identity of a user or process
  7. a harmful computer program that can copy itself and spread across a number of connected computers
  8. a defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based
  9. computer software that is designed to damage the way a computer works
Down
  1. an attack that enables an attacker to run malware that allows for the generation of cryptocurrency on the infected computer
  2. a computer program that gets access to a computer or system by appearing to be harmless, but is designed to do something damaging
  3. the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  4. an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them, for example by taking money out of their bank account
  5. someone who makes money using illegal methods, especially by tricking people
  6. to allow secret information to become generally known

15 Clues: to allow secret information to become generally knownthe process or action of verifying the identity of a user or processcomputer software that is designed to damage the way a computer workssomeone who makes money using illegal methods, especially by tricking peoplekind of malware that allows cybercriminals to remotely control your computer...

CAB-CBG Madness 2015-02-24

CAB-CBG Madness crossword puzzle
Across
  1. 15
  2. 11
  3. 18
  4. 16
  5. 4
  6. 12
  7. 10
  8. 6
  9. 14
  10. 9
Down
  1. 19
  2. 8
  3. 1
  4. 17
  5. 13
  6. 7
  7. 2
  8. 5
  9. 3

19 Clues: 81742563919151713111816121014

CAB Madness 2015-02-23

CAB Madness crossword puzzle
Across
  1. 9
  2. 16
  3. 18
  4. 13
  5. 3
  6. 4
  7. 6
  8. 10
  9. 1
  10. 2
  11. 15
Down
  1. 14
  2. 17
  3. 7
  4. 19
  5. 11
  6. 8
  7. 5
  8. 12

19 Clues: 79835461214171916181113121015

CAB-CBG Madness 2015-03-03

CAB-CBG Madness crossword puzzle
Across
  1. 9
  2. 7
  3. 12
  4. 16
  5. 1
  6. 10
  7. 6
  8. 18
  9. 14
  10. 15
  11. 3
Down
  1. 5
  2. 2
  3. 11
  4. 4
  5. 17
  6. 13
  7. 8
  8. 19

19 Clues: 52947168311171312161019181415

Cyber Security Awareness Month 2021-10-08

Cyber Security Awareness Month crossword puzzle
Across
  1. Results in the loss of contact details if it were stolen
  2. What does cybersecurity have in common with Halloween?
  3. _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
  4. What you will cause IT to have if you get a virus on your computer
  5. Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
  6. Hackers ____ their identity.
  7. This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
  8. A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
  9. What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
  1. This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
  2. You don't want to be the business with the most _____ network on the block.
  3. These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
  4. How your computer might act once infected by a virus.
  5. Happens on Halloween night
  6. If you click on a phishing email you might want to ____ your job
  7. For hackers, it’s all about the _____ and it’s their treat they succeed
  8. These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
  9. A bridge between two computer networks.
  10. In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
  11. The process of translating plaintext into ciphertext.

20 Clues: Happens on Halloween nightHackers ____ their identity.A bridge between two computer networks.How your computer might act once infected by a virus.The process of translating plaintext into ciphertext.What does cybersecurity have in common with Halloween?Results in the loss of contact details if it were stolen...

CTM CROSSWORD PUZZLE 2021-03-18

CTM CROSSWORD PUZZLE crossword puzzle
Across
  1. BO
  2. PH
  3. CY
  4. HK
  5. AD
  6. MC
  7. BK
  8. IN
  9. VR
  10. WO
Down
  1. IN
  2. CO
  3. EN
  4. SP
  5. BA
  6. AT
  7. FI
  8. AV

18 Clues: INCOENBOSPPHCYBAHKADATFIMCBKAVINVRWO

Working in a company 2021-02-16

Working in a company crossword puzzle
Across
  1. Personal(abteilung)
  2. Kaufmännischer Leiter
  3. Geschäftsreise
  4. Qualitätssicherung
  5. Vertriebsleiter
  6. Kleiderordnung
  7. Bestandsliste
  8. Vertrag
  9. Kalkulation
  10. Großraumbüro
  11. Fertigung
  12. Verwaltung
Down
  1. Controlling
  2. Forschung
  3. Internetsicherheit
  4. Schichtarbeit
  5. Berater
  6. Vertriebsleiter
  7. Zusatzleistungen
  8. Arbeitnehmer
  9. Techniker
  10. Lager
  11. Einkauf

23 Clues: LagerBeraterVertragEinkaufForschungTechnikerFertigungVerwaltungControllingKalkulationArbeitnehmerGroßraumbüroSchichtarbeitBestandslisteGeschäftsreiseKleiderordnungVertriebsleiterVertriebsleiterZusatzleistungenInternetsicherheitQualitätssicherungPersonal(abteilung)Kaufmännischer Leiter

Happy National Crossword Day from Frontline! 2020-12-08

Happy National Crossword Day from Frontline! crossword puzzle
Across
  1. Holds your data hostage.
  2. Place people sell your sensitive info.
  3. Is greater than your struggle.
  4. ____ data you store to reduce risk of exposure.
  5. First step in Centurion360 package.
  6. Protects your data on public Wi-Fi.
  7. Who we are.
Down
  1. Next-Gen versions use artificial intelligence.
  2. Practices to protect what's connected to the internet.
  3. When an account double checks your identity.
  4. A password _____ will help store and generate secure ones.
  5. Cause of over 2/3 of cybersecurity incidents.
  6. How most ransomware gets to small businesses.
  7. We Keep IT ____.
  8. Already know your weak points.
  9. Who cyberattacks target.

16 Clues: Who we are.We Keep IT ____.Holds your data hostage.Who cyberattacks target.Is greater than your struggle.Already know your weak points.First step in Centurion360 package.Protects your data on public Wi-Fi.Place people sell your sensitive info.When an account double checks your identity.Cause of over 2/3 of cybersecurity incidents....

TEST1 2020-09-14

TEST1 crossword puzzle
Across
  1. 26
  2. 16
  3. 7
  4. 6
  5. 2
  6. 11
  7. 9
  8. 18
  9. 19
  10. 22
  11. 10
  12. 23
Down
  1. 14
  2. 24
  3. 21
  4. 17
  5. 13
  6. 27
  7. 8
  8. 20
  9. 15
  10. 25
  11. 12
  12. 5

24 Clues: 768295142624162117132720111518251219221023

Cybersecurity Terms 2022-04-27

Cybersecurity Terms crossword puzzle
Across
  1. scrambled data
  2. security incident where confidential data is accessed
  3. a key that can be used by anyone to encrypt messages
  4. key only used by one individual to decrypt
  5. person who has permission to hack
  6. layers of control
  7. using the same keys
  8. person who does not have permission to hack
  9. readable data
Down
  1. command to make a directory
  2. access point that is susceptible to hacking
  3. copy of data
  4. field to protect information on the internet
  5. a trap for cybersecurity criminals
  6. command to create a file

15 Clues: copy of datareadable datascrambled datalayers of controlusing the same keyscommand to create a filecommand to make a directoryperson who has permission to hacka trap for cybersecurity criminalskey only used by one individual to decryptaccess point that is susceptible to hackingperson who does not have permission to hack...

Cybersecurity 2022-05-10

Cybersecurity crossword puzzle
Across
  1. the process of taking plaintext and converting it into a format that is not human-readable
  2. any potential change or disruption of a computer network.
  3. Any crime committed over a connected device, such as a cellphone,
  4. prevent undesirable traffic from entering into a network.
  5. protected strings of characters in unique combinations that no one can easily guess.
  6. Phishing is a technique used to gain personal or sensitive information from a user
  7. theft the process of stealing your personal information such as your social security number or driver's license to open a bank account or apply for a credit card.
Down
  1. a user's physical characteristics.
  2. protect networked systems and all of the data from unauthorized use or harm
  3. software designed to harm or exploit any programmable device, service, or network.
  4. insulting, harassing, or threatening anyone using the Internet via email, instant messaging, and so on.
  5. the code of responsible behavior on the computer as well as on the Internet.
  6. an activity that intrudes into your system or gains unauthorized access to your accounts.

13 Clues: a user's physical characteristics.any potential change or disruption of a computer network.prevent undesirable traffic from entering into a network.Any crime committed over a connected device, such as a cellphone,protect networked systems and all of the data from unauthorized use or harm...

puzzle making 2015-03-02

puzzle making crossword puzzle
Across
  1. 6
  2. 3
  3. 2
  4. 12
  5. 14
  6. 4
  7. 11
Down
  1. 15
  2. 13
  3. 7
  4. 8
  5. 1
  6. 9
  7. 5
  8. 10

15 Clues: 637821954151312141011

Working in a company 2021-02-18

Working in a company crossword puzzle
Across
  1. Schichtarbeit
  2. Techniker
  3. Vertriebsleiter
  4. Großraumbüro
  5. Geschäftsreise
  6. Arbeitnehmer
  7. Bestandsliste
  8. Personal(abteilung)
  9. Controlling
  10. Berater
  11. Finanzvorstand
Down
  1. Fertigung
  2. Kleiderordnung
  3. Lager
  4. Kaufmännischer Leiter
  5. Qualitätssicherung
  6. Forschung
  7. Zusatzleistungen
  8. Vertrag
  9. Internetsicherheit
  10. Einkauf
  11. Kalkulation
  12. Verwaltung

23 Clues: LagerVertragEinkaufBeraterFertigungTechnikerForschungVerwaltungKalkulationControllingGroßraumbüroArbeitnehmerSchichtarbeitBestandslisteKleiderordnungGeschäftsreiseFinanzvorstandVertriebsleiterZusatzleistungenQualitätssicherungInternetsicherheitPersonal(abteilung)Kaufmännischer Leiter

Cybersecurity 2022-02-14

Cybersecurity crossword puzzle
Across
  1. method go through all the files or network elements with an intention to detect something unusual
  2. activities endanger the sovereignty and integrity of nation
  3. unsoliciated commercial email
  4. Compromising confidential Information
  5. collective terms of malicious software, such as viruses, worms and trojans.
  6. attempt to harm, damage or cause threat to a system or network
Down
  1. harassing aperson or following a person
  2. Periodic assessment of security vulnerability in computer systems is called _______audit.
  3. monitor user activity on someone else and transfer information to someone else
  4. existence of weakness in a system or network
  5. Viruses are
  6. Script files sent mostly through email attachment to attack host computer
  7. Doesnot belong to privacy threat
  8. The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim

14 Clues: Viruses areunsoliciated commercial emailDoesnot belong to privacy threatCompromising confidential Informationharassing aperson or following a personexistence of weakness in a system or networkactivities endanger the sovereignty and integrity of nationattempt to harm, damage or cause threat to a system or network...

CyberSecurity 2021-12-16

CyberSecurity crossword puzzle
Across
  1. Protects your Privacy
  2. bits created to unscramble and scramble data
  3. responsible for data
  4. Secures digital data
  5. Owns data
  6. proof that a package is sented
  7. describes a computer network
Down
  1. Order
  2. shared key used to encrypt or decrypt text
  3. uneven bars
  4. technique used to validate messages
  5. Uses Data

12 Clues: OrderOwns dataUses Datauneven barsresponsible for dataSecures digital dataProtects your Privacydescribes a computer networkproof that a package is sentedtechnique used to validate messagesshared key used to encrypt or decrypt textbits created to unscramble and scramble data

Cybersecurity 2022-11-16

Cybersecurity crossword puzzle
Across
  1. Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
  2. The Sarbanes Oxly Act covers which type of activity?
  3. Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
  4. Defined as an intense and selfish desire for something, especially wealth or power.
  5. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  6. One common error when considering people in Cybersecurity is using TRUST instead of
  7. In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
  1. Falsifying header information is a serious violation of the _ Act.
  2. Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
  3. Allows the user to determine how to trust the keys, so its a trust model.
  4. Financial regulations
  5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?

12 Clues: Financial regulationsThe Sarbanes Oxly Act covers which type of activity?Falsifying header information is a serious violation of the _ Act.Allows the user to determine how to trust the keys, so its a trust model.Defined as an intense and selfish desire for something, especially wealth or power....

CYBERSECURITY 2017-04-13

CYBERSECURITY crossword puzzle
Across
  1. information
  2. software that is secretly installed into a system
  3. capability to limit network traffic between networks
  4. measures to reduce the likelihood of an unwanted occurence
  5. software that tracks keystrokes and keyboard events
Down
  1. the abuse of email to send unsolicited bulk messages
  2. a person who breaks into a computer or network
  3. a program that can infect a computer and spread to another computer
  4. a string of characters used to verify access authorization
  5. the process of transforming plaintext into cipher text
  6. software that compromises the operation of a system
  7. self replicating program that uses networking mechanisms to spread itself

12 Clues: informationa person who breaks into a computer or networksoftware that is secretly installed into a systemsoftware that compromises the operation of a systemsoftware that tracks keystrokes and keyboard eventsthe abuse of email to send unsolicited bulk messagescapability to limit network traffic between networks...

December 2020 Crossword Puzzle 2020-12-01

December 2020 Crossword Puzzle crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. Code that replicates itself
  2. Someone who tries to take your data online
  3. Replicating code that moves through your network
  4. Software that appears useful but is not
  5. Forced advertisement
  6. Safety online
Down
  1. Something that might harm your computer
  2. Tricking someone into giving you data
  3. Unwanted software that reads your data
  4. Someone who is young and "testing out their skills" online
  5. A scam that holds your money hostage
  6. Infectious software

12 Clues: Safety onlineInfectious softwareForced advertisementCode that replicates itselfA scam that holds your money hostageTricking someone into giving you dataUnwanted software that reads your dataSomething that might harm your computerSoftware that appears useful but is notSomeone who tries to take your data online...

Cybersecurity 2022-07-08

Cybersecurity crossword puzzle
Across
  1. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. Type of assessments that are the cornerstone of every program for cybersecurity
  3. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. Protecting information is vital for the normal functioning of organizations
  5. Is an advanced security control that reduces the chance of it being stolen
Down
  1. Systems that are no longer supported by the manufacturer
  2. is a significant threat to the confidentiality, integrity and availability of information
  3. A key stakeholder that may not recognize how to securely communicate with their provider
  4. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. Type of phishing email specific employee within an organization
  6. Most significant security incident
  7. This stakeholder may have lax security policies compromising your system

12 Clues: Most significant security incidentSystems that are no longer supported by the manufacturerType of phishing email specific employee within an organizationThis stakeholder may have lax security policies compromising your systemIs an advanced security control that reduces the chance of it being stolen...

CyberSecurity 2022-11-28

CyberSecurity crossword puzzle
Across
  1. these replicate themselves but do not attach themselves to files as a virus does.
  2. a cyberattack in which multiple devices make a network resource unavailable to its intended users.
  3. software that is designed to gain access to your computer with bad intent.
  4. the term for when human users of a system are tricked into providing confidential information
  5. a large collection of malware-infected devices
Down
  1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge.
  2. a key to a website or account.
  3. unwanted software that monitors and gathers information on a person and how they use their computer.
  4. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  5. a piece of software that appears to perform a useful function, but it also performs malicious actions.
  6. self replicating software.
  7. Something that checks incoming and outgoing network traffic.

12 Clues: self replicating software.a key to a website or account.a large collection of malware-infected devicesSomething that checks incoming and outgoing network traffic.software that is designed to gain access to your computer with bad intent.these replicate themselves but do not attach themselves to files as a virus does....

dasd 2021-04-30

dasd crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

December 2020 Crossword Puzzle Answer Key 2020-12-01

December 2020 Crossword Puzzle Answer Key crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

la tecnología #2 2022-04-01

la tecnología #2 crossword puzzle
Across
  1. knowledge
  2. worsen
  3. screen
  4. delete
  5. cybersecurity
Down
  1. storage
  2. Web
  3. improve
  4. profile
  5. privacy
  6. apps
  7. printer

12 Clues: Webappsworsenscreendeletestorageimproveprofileprivacyprinterknowledgecybersecurity

Spanish 25 words 2021-04-30

Spanish 25 words crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

Cybersecurity crossword 2022-05-18

Cybersecurity crossword crossword puzzle
Across
  1. company security policy that allows for employees’ personal devices to be used in business.
  2. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
  3. malware that functions by spying on user activity without their knowledge.
  4. technology that allows access to files/services through the internet from anywhere in the world.
  5. acronym that stands for distributed denial of service – a form of cyber attack.
  6. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  7. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  8. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  9. udio or video clip that has been edited and manipulated to seem real or believable
  10. internet version of a home address for your computer
  11. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  12. defensive technology designed to keep the bad guys out
  13. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
  14. umbrella term that describes all forms of malicious software
  15. tool that allows the user to remain anonymous while using the internet
  16. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. malware that allows cybercriminals to remotely control your computer.
  2. technique used to manipulate and deceive people to gain sensitive and private information
  3. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
  4. group of computers, printers and devices that are interconnected and governed as a whole
  5. set of programs that tell a computer to perform a task
  6. Breaches the network to gain sensitive information with the owner’s consent
  7. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. technique used by hackers to obtain sensitive information.
  9. piece of malware that can replicate itself in order to spread the infection to other connected computers

25 Clues: internet version of a home address for your computerset of programs that tell a computer to perform a taskdefensive technology designed to keep the bad guys outtechnique used by hackers to obtain sensitive information.umbrella term that describes all forms of malicious softwaremalware that allows cybercriminals to remotely control your computer....

Cybersecurity Words 2020-11-18

Cybersecurity Words crossword puzzle
Across
  1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
  2. An observable occurrence or sign that an attacker may be preparing to cause an incident.
  3. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  5. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
  6. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
  7. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
  8. strategy used to make sure users do not send critical information outside of a corporate network.
  9. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
  10. integrated collection of security measures to prevent unauthorized access to a networked computer system
  11. a cyberattack on a server, service, website, or network floods it with Internet traffic.
  12. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
  13. the unauthorized movement of information being spread throughout the internet.
  14. Authentication via group
  15. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
  16. used to detect malware.
  17. a system that allows web hosts to distinguish between human and automated access to websites.
  18. Someone or Something that authenticates
  19. a standalone malware computer program that replicates itself in order to spread to other computers.
  20. science concerned with data communication and storage in secure and usually secret form.
  21. related to cloud computing, in which it can hold information and photos.
  22. to successfully escape from an area under enemy control.
  23. Source code that is free to copy and modify.
  24. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
  25. Hacker who violates computer security for personal gain or malice.
  26. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
  27. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
  28. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
  1. an evaluation of events that can adversely affect operations and/or specific assets
  2. a type of monitoring software designed to record keystrokes made by a user.
  3. Source code that is not available
  4. the psychological manipulation of people into performing actions or divulging confidential information.
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  6. software that displays unwanted advertisements on your computer.
  7. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. code that takes advantage of a vulnerability of flaw.
  9. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
  10. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
  11. List of people under suspicion, disfavor, etc.
  12. internet protocol address, which identifies the number associated with a specific computer or network.
  13. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
  14. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
  15. any malware which misleads users of its true intent.
  16. A thing that supports another thing
  17. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  18. an attack on the internet that is used to steal usernames and passwords from the network.
  19. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  20. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
  21. keeping data safe
  22. process of collecting and searching through a database to discover information.
  23. a computer network that provides online privacy by creating an encrypted connection on the Internet.
  24. it ensures a person’s identity matches with who they are.
  25. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
  26. a person who operates the command and control of botnets for remote process execution.
  27. when data is coded a certain way to disallow others from seeing that information.
  28. a collection of internet-connected devices infected by malware that allow hackers to control them.
  29. offensive security professionals who are experts in attacking systems and breaking into defenses.
  30. a type of malware that is often disguised as legitimate software.
  31. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
  32. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
  33. the methods that adversaries use to breach or infiltrate your network.
  34. Number generated from a string of text
  35. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  36. to convert information into cipher
  37. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.

65 Clues: keeping data safeused to detect malware.Authentication via groupSource code that is not availableto convert information into cipherA thing that supports another thingNumber generated from a string of textSomeone or Something that authenticatesSource code that is free to copy and modify.List of people under suspicion, disfavor, etc....

Cybersecurity Risk 2021-08-30

Cybersecurity Risk crossword puzzle
Across
  1. Short for malicious software
  2. A conversion of something (such as data) into a code or cipher.
  3. measures taken to protect computer systems.
  4. Text files with small pieces of data used to identify a computer.
  5. Similar to a password but much longer.
  6. The fraudulent practice of sending text messages pretending to be from reputable companies
  7. Legitimate or innocent-looking emails asking you to respond with personal data or to click on a link.
  8. False or inaccurate information,
  9. An acronym for Pause, Ask, Think.
  10. Type of data that should be protected from public view.
Down
  1. Convert data from one system of communication into another.
  2. The enciphering and deciphering of messages in secret code or cipher.
  3. Refers to the range of activities that determine how we manage digital data.
  4. Type of data that is recorded publicly and can be found as part of public record.
  5. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  6. Open to attack or damage.
  7. Software written to damage a computer’s performance, steal or alter data.
  8. Pieces of data left behind when a person moves around on the internet.
  9. A social identity established by an internet user.
  10. Someone disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
  11. abbreviation for personal identifiable information
  12. To engage in activity online that could result in something bad or unpleasant.
  13. Large data sets analyzed to reveal patterns

23 Clues: Open to attack or damage.Short for malicious softwareFalse or inaccurate information,An acronym for Pause, Ask, Think.Similar to a password but much longer.measures taken to protect computer systems.Large data sets analyzed to reveal patternsA social identity established by an internet user.abbreviation for personal identifiable information...

Cybersecurity Terms 2017-05-29

Cybersecurity Terms crossword puzzle
Across
  1. Warfare with a physical element such as shooting people, dropping bombs, and other physical attacks.
  2. "Good” hackers who use their tools for the public good – this can include identifying security holes.
  3. Executable programs, or programs that cause a computer to perform a task, that is bad. What it does can vary, but usually it will try to remain hidden and perform a malicious action. It will also usually attempt to replicate itself and infect other systems.
  4. The most common type of Industrial Control System.
  5. Tiny computers that allow us to digitize processes
  6. A person or company selling something
  7. A person who uses computers to gain unauthorized access to data.
  8. A network of private computers infected with malware and controlled as a group without the owners' knowledge. The word comes from the combination of “robot” and “network.”
  9. Usually means the use of ICT to aid in development projects.
  10. The process that decides whether a vulnerability will be stockpiled or given to the vendor responsible for the product.
  11. A security hole in software that the vendor does not know about.
  12. Can do all kinds of things. For example, give someone the ability to spy on you, steal your data, gain a backdoor into your system. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves
  13. Code attackers use to exploit a software problem.
  14. Something that uses a combo of tactics (also can include social engineering).
  15. Getting someone to give up confidential or personal information by tricking them into telling you freely.
  16. Software that can do a number of things, such as disrupt the normal operations of computers, steal information, gain access to a system, sabotage the system.
  17. A security hole in software
  18. Malware that installs covertly on a victim's device usually encrypting everything and refusing to decrypt it unless a ransom is paid.
  19. An email that are designed to appear to be from someone the recipient knows and trusts and can include a subject line or content that is specifically tailored to the victim’s known interests or industry.
  20. Hackers who use multiple phases to break into a network, avoid detection, and harvest valuable information over the long term.
  21. A team of experts who manage computer emergencies. Usually government based initiatives. Often used as a baseline for understanding a country’s cybersecurity readiness.
Down
  1. Hackers with malicious intentions working to steal, exploit, and sell data. They are usually motivated by personal gain.
  2. A program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  3. Electronic wallet services that allow users to store, send, and receive money using mobile phones. It is often used in places without banking infrastructure and is a common tool for remittances.
  4. Can either work for the public good or for their own gain.
  5. Used in industrial production - a way to automate the process of receiving data from remote stations and then issue supervisory commands.
  6. Generally anything that stores, retrieves, manipulates, transmits, information electronically in a digital form. Computers, smart phones, software, etc.
  7. Under DHS, created in 2015, meant to fill the gaps where ISACs don’t exist
  8. Independent actors working to accomplish political or social change through the use of hacking or other related techniques such as DDOS. Hacker + activist.
  9. 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
  10. An attempt to make a machine or other resource unavailable to valid users. An actor will flood the targeted resource with requests to overload the system and make it crash.
  11. Sector specific organizations meant to collect, analyze, and disseminate threat information to their members.
  12. First known case of a cyberweapon impacting physical infrastructure. It was created by the US and Israeli governments to target the Iranian nuclear facility Natanz.
  13. Where the requests come from a variety of sources. Activists and cybercriminals use this technique. Activists argue it is the equivalent of an online “sit-in.”
  14. It’s phishing, but with a high level target such as an executive or, John Podesta.
  15. Separation of your network from others, particularly the public Internet.
  16. Basically something that is there logging what you are doing and sending it back to the person who initiated the attack.
  17. The practice of sending emails meant to get people to reveal personal information, such as passwords and credit card numbers.

38 Clues: A security hole in softwareA person or company selling somethingCode attackers use to exploit a software problem.The most common type of Industrial Control System.Tiny computers that allow us to digitize processesCan either work for the public good or for their own gain.Usually means the use of ICT to aid in development projects....

CyberSecurity Crossword 2022-09-22

CyberSecurity Crossword crossword puzzle
Across
  1. method through which information is converted into secret code through a special algorithm that hides information's true meaning
  2. program or hardware device that filters information coming through an internet connection to a network or computer system.
  3. This attack is carried out by repeatedly trying password combinations till the password match is found.
  4. URLs that lead user to visit an harmful website or to download a virus
  5. This is a worm which came in mid-2010 and was responsible for huge damage to Iran's Nuclear Program.
  6. programs that are used to track or record users keystroke
  7. Centralized Monitoring, analysis, detection/prevention & response to cybersecurity incidents.
  8. The malicious program malware that downloads onto a computer disguised as a legitimate program. Named after an ancient greek story.
  9. I am not a robot
  10. Weaknesses that can be exploited
  11. Packets of data sent from server to browser used to identify the browser
  12. Framework that is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology
  13. Malicious software that is installed on the device without the end user's knowledge and is used to monitor activity without the user's permission.
  14. information about a file
  15. The process of transforming the data from unreadable format to the original message.
  16. You are sending one confidential document to your colleague. In transmission, data gets tampered & content was changed. Which part of security was lost here
  17. Used to commit financial crimes. The attack in which a small amount is taken out every day so that attack goes unnoticed. The name of the attack resembles closely to a chicken dish.
  18. Special viruses that replicate from computer to computer in a network without human interaction
Down
  1. Group of malware-infected computers that form a network to attack
  2. The device or application that monitors a network for malicious activities and has the ability to protect from or stop the incidents from taking place.
  3. this is a vital information resource under siege
  4. the system that shows the location of the person or places through satellites.
  5. The authentication method in which requires two or more verification methods to gain access to the system.
  6. This is the world's first virus(Boot-Sector Virus)
  7. This method is used to hide information inside the picture.
  8. network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access.
  9. The attack that is done to bring down the system or to hinder the normal function of the website or other network resources.
  10. process of giving permission to someone of doing something
  11. science of collecting and analyzing information from information and communication technologies as evidence in a legal case.
  12. Process of being friends builds trust and emotional connection with a young person with future intentions of sexual abuse, exploitation or traficking.

30 Clues: I am not a robotinformation about a fileWeaknesses that can be exploitedthis is a vital information resource under siegeThis is the world's first virus(Boot-Sector Virus)programs that are used to track or record users keystrokeprocess of giving permission to someone of doing somethingThis method is used to hide information inside the picture....

Cybersecurity Terms 2022-11-22

Cybersecurity Terms crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. Software that is a cumulative package of all patches and feature updates.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. An attacker who controls a botnet.
  5. An infected computer that is under the remote control of an attacker.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. Software that helps prevent computers from becoming infected by different types of spyware.
  8. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  9. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  10. A publicly released software security update intended to repair a vulnerability.
  11. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
  1. A logical computer network of zombies under the control of an attacker.
  2. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. Hardware or software designed to limit the spread of malware.
  4. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. Software code that gives access to a program or a service that circumvents normal security protections.
  6. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. A general term used to describe software that spies on users by gathering information without consent.
  9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

Cybersecurity Crossword 2020-09-13

Cybersecurity Crossword crossword puzzle
Across
  1. Pretending to be somebody else online.
  2. A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  3. A type of attack that uses trial and error over and over to guess a password until it is correct.
  4. Small files that are saved on your computer that store information that help websites track your visits
  5. A virus that can replicate without the user doing anything such as opening a program.
  6. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. Stealing another person's information to use for criminal activity.
  8. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  9. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
  10. The amount of data that can pass through a network or part of a network per second.
  11. Computer programs that can block, detect, and remove viruses and other malware.
  12. Creating a web address that purposely fools people into thinking it is another person or company's website.
  13. The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
  14. Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
  2. Two or more interconnected devices that can exchange data.
  3. A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
  4. Software designed to block malware from entering protected networks.
  5. The use of something in a way different from what it was intended for in order to solve a problem.
  6. A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
  7. A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  8. Malware that records every key struck on a keyboard and sends that information to an attacker.
  9. A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
  10. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  11. A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.

25 Clues: Pretending to be somebody else online.Two or more interconnected devices that can exchange data.Stealing another person's information to use for criminal activity.Software designed to block malware from entering protected networks.Computer programs that can block, detect, and remove viruses and other malware....

Cybersecurity Crossword 2021-05-06

Cybersecurity Crossword crossword puzzle
Across
  1. The use of ____ off-the-shelf products have weakened security of ICS.
  2. Network device designed to control the flow of traffic between networks.
  3. Support component that contributes to ICS vulnerabilities.
  4. Total amount of loss or damage that can be expected from a successful attack
  5. Four-step process of taking action to reduce or eliminate risk.
  6. Doing ____ is not a viable option for securing ICS.
  7. has led to workforce downsizing and cost reducing measures in ICS.
  8. Intrusion, attack, and ____ are the three stages of an attack.
  9. The majority of attackers are _____.
Down
  1. Weakness in a system that can be exploited.
  2. The equation for ____ is threat x vulnerability x consequence
  3. A copy of your password should NOT be left on your ___.
  4. _____ should be at least 8 alphanumeric characters long.
  5. The most common social engineering method.
  6. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
  7. Along with intent and opportunity, ____ is needed for threats to succeed.
  8. 22% of breaches involved some form of ___ ___.
  9. ____% of attacks are financially motivated.
  10. _____ is rummaging through business or residential trash for the purpose of finding useful information.
  11. An attack that is used to make computer resources unavailable.
  12. Malicious software.

21 Clues: Malicious software.The majority of attackers are _____.The most common social engineering method.Weakness in a system that can be exploited.____% of attacks are financially motivated.22% of breaches involved some form of ___ ___.Doing ____ is not a viable option for securing ICS.A copy of your password should NOT be left on your ___....

Cybersecurity Crossword 2022-12-06

Cybersecurity Crossword crossword puzzle
Across
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  2. establishes a barrier between a trusted network and an untrusted network
  3. An undocumented way of gaining access to computer system
  4. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
  5. a system where hackers can see your keystrokes
  6. a set of changes to a computer program designed to update, fix, or improve it
  7. a computer program used to prevent, detect, and remove malware
  8. software that is designed to damage a PC
  9. a mandatory access control enforcement feature
  10. a collection of computer software, typically malicious, designed to enable access to a computer
Down
  1. is software that generates revenue for its developer
  2. contain not only security and quality revisions, but also significant feature additions and changes
  3. blocker and system to block unwanted screen popups
  4. a type of program designed to prevent and detect unwanted spyware program installations
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  6. a type of malware from cryptovirology that threatens to publish the victim's personal data
  7. a copy of computer data taken and stored elsewhere
  8. a piece of code intentionally inserted into a software system that will set off a malicious function
  9. a malicious program that is installed on a device that transforms it
  10. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system

20 Clues: software that is designed to damage a PCa system where hackers can see your keystrokesa mandatory access control enforcement featureblocker and system to block unwanted screen popupsa copy of computer data taken and stored elsewhereis software that generates revenue for its developerAn undocumented way of gaining access to computer system...

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. Someone with elevated access
  2. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
  3. Software with malicious characteristics; often used to compromise a system
  4. A type of phishing that is more personalized to the end user
  5. Last name of TIAA's CISO
  6. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  7. The protection of internet connected systems and devices
  8. Label often assigned to devices that are on a network; can be static or dynamic
  9. An algorithmic method which hides characteristics of communication by converting it into various codes
  10. TIAA's one stop shop for computer and technical issues
Down
  1. Ethical hacking; hacking for the greater good
  2. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  3. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  4. Unique hardware identifier; physical layer in the OSI model
  5. TIAA's cybersecurity mascot
  6. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. A concept where all devices are connected to the internet, such as household items
  9. What does VPN stand for
  10. A month dedicated to all things cybersecurity (acronym)

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. A month dedicated to all things cybersecurity (acronym)
  2. TIAA's cybersecurity mascot
  3. Label often assigned to devices that are on a network; can be static or dynamic
  4. The protection of internet connected systems and devices
  5. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  6. TIAA's one stop shop for computer and technical issues
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. Ethical hacking; hacking for the greater good
  9. A type of phishing that is more personalized to the end user
  10. A concept where all devices are connected to the internet, such as household items
  11. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
  1. Unique hardware identifier; physical layer in the OSI model
  2. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  3. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  4. What does VPN stand for
  5. Someone with elevated access
  6. Last name of TIAA's CISO
  7. Software with malicious characteristics; often used to compromise a system
  8. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  9. An algorithmic method which hides characteristics of communication by converting it into various codes

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

Cybersecurity 2021-03-01

Cybersecurity crossword puzzle
Across
  1. Click every traffic light in this image.
  2. Encrypt files to extort money.
  3. Fake email link bait.
  4. Proving your identity.
  5. Sneaky peek a password.
Down
  1. Brute force uses many attempts to guess it.
  2. Denial of Service attacks this.
  3. Blocks incoming and outgoing connections.
  4. Automated internet task software.
  5. Unauthorised access to computer systems.
  6. Horse with a hidden suprise.

11 Clues: Fake email link bait.Proving your identity.Sneaky peek a password.Horse with a hidden suprise.Encrypt files to extort money.Denial of Service attacks this.Automated internet task software.Click every traffic light in this image.Unauthorised access to computer systems.Blocks incoming and outgoing connections....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. refers to the permission to use
  2. a type of malicious code that looks legitimate
  3. a way of preventing errors
  4. information about yourself such as name
  5. the protection of computer systems and networks
  6. type of malware that spreads copies of itself from computer to computer
  7. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
  1. malicious software designed to block access to a computer system
  2. be aware of people trying to steal your information
  3. a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
  4. software that automatically displays or downloads advertising material

11 Clues: a way of preventing errorsrefers to the permission to useinformation about yourself such as namea type of malicious code that looks legitimatethe protection of computer systems and networksbe aware of people trying to steal your informationmalicious software designed to block access to a computer system...

Cybersecurity 2022-03-29

Cybersecurity crossword puzzle
Across
  1. ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
  2. ____ computing uses 1 processor.
  3. A ____ attack is spamming a web server with so many requests so close together that it crashes.
  4. The digital ____is a gap between those who have access to new technology and those who do not.
  5. ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
  6. DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
Down
  1. ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
  2. A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
  3. Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
  4. ____ computing uses multiple processors.
  5. A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info

11 Clues: ____ computing uses 1 processor.____ computing uses multiple processors.The digital ____is a gap between those who have access to new technology and those who do not.A ____ attack is spamming a web server with so many requests so close together that it crashes....

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Cybersecurity Awareness 2022-10-21

Cybersecurity Awareness crossword puzzle
Across
  1. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. The terms "bug" and "debugging" are popularly attributed to ___.
  4. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. ___ Advertising software can be used to spread malware.
  3. ___ is actually considered the first computer virus?
  4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. ___ is a type of malware that is disguised as legitimate software.
  8. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. In-order to ensure the security of the data/information, we need to ___ the data.
  11. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. Which Wi-Fi communication protocol is more Secure?

20 Clues: Which Wi-Fi communication protocol is more Secure?___ is actually considered the first computer virus?___ Advertising software can be used to spread malware.The terms "bug" and "debugging" are popularly attributed to ___.___ is a type of malware that is disguised as legitimate software....

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático Machine learning
  13. If else
  14. neuronales nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales nueral networksautomático Machine learning

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático, Machine learning
  13. If else
  14. neuronales, nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales, nueral networksautomático, Machine learning

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
  2. A series of letters, numbers or symbols that protect data in your computer.
  3. A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
  4. A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
  5. Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
  1. A more sinister spyware that records every keystroke made by a user.
  2. It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
  3. Being able to edit and view personal files like photos or videos.
  4. A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
  5. A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.

10 Clues: Being able to edit and view personal files like photos or videos.A more sinister spyware that records every keystroke made by a user.A series of letters, numbers or symbols that protect data in your computer.Locks a computer, encrypts files, and prevents the user from being able to access the data....

Cybersecurity 2021-03-08

Cybersecurity crossword puzzle
Across
  1. making a copy of original data
  2. software that causes harm to a computer
  3. a malicious computer program that is hidden in an application
  4. software that tracks the key strokes on the keyboard
  5. defrauding an online account holder of financial information by posing as a legitimate company
Down
  1. software that lets a user obtain covert information on your computer activities
  2. someone who exploits weaknesses in a computer system
  3. Software designed to detect and destroy a virus
  4. a standalone malicious computer program that replicates and spreads on a computer system
  5. software that encodes data and requires a key to decode

10 Clues: making a copy of original datasoftware that causes harm to a computerSoftware designed to detect and destroy a virussomeone who exploits weaknesses in a computer systemsoftware that tracks the key strokes on the keyboardsoftware that encodes data and requires a key to decodea malicious computer program that is hidden in an application...

IEM July SM Crossword 2022-07-26

IEM July SM Crossword crossword puzzle
Across
  1. Each year, over 500,000 ____ are affected by house fires.
  2. ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
  3. National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
  4. On July 17th is also known as what?
Down
  1. People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
  2. The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
  3. NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
  4. The ___ app provides access to weather alerts, disaster resources and preparedness tips.
  5. ______ bring the risk of fires, injuries, and death.
  6. July 25th is National Hire a _____ day.

10 Clues: On July 17th is also known as what?July 25th is National Hire a _____ day.______ bring the risk of fires, injuries, and death.Each year, over 500,000 ____ are affected by house fires.The US Postal Service processes and delivers 425.3 ______ pieces of mail each day....

IEM's December Social Media Crossword Puzzle 2021-12-20

IEM's December Social Media Crossword Puzzle crossword puzzle
Across
  1. United States Space Force
  2. State Association of Counties Annual Meeting
  3. IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
  4. Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
  5. IEM’s innovative GIS ______
  6. IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
  7. FEMA’s interactive Program Planning Toolkit
  8. FEMA’s 2022-2026 ____ ____
  9. Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
  1. AshBritt-IEM Health had the pleasure of meeting First Lady _____
  2. The IEM family would like to wish you and yours
  3. New FEMA Deputy Administrator (last name)
  4. Have you gotten you flu _____?
  5. It’s time to get into the holiday spirit by breaking out your…
  6. New COVID-19 variant

15 Clues: New COVID-19 variantUnited States Space ForceFEMA’s 2022-2026 ____ ____IEM’s innovative GIS ______Have you gotten you flu _____?New FEMA Deputy Administrator (last name)FEMA’s interactive Program Planning ToolkitState Association of Counties Annual MeetingThe IEM family would like to wish you and yours...

test 2022-10-25

test crossword puzzle
Across
  1. djfglijd hfgikjf
  2. fdgsdgsd
  3. gfdsgds
Down
  1. gdfgfs
  2. sgfdsgsdrg
  3. gfdsgdsg
  4. gfdsgd
  5. fdgdfsgfds
  6. gdsgsdgfd
  7. gdfsgds

10 Clues: gdfgfsgfdsgdgdfsgdsgfdsgdsgfdsgdsgfdgsdgsdgdsgsdgfdsgfdsgsdrgfdgdfsgfdsdjfglijd hfgikjf

Lucas' Graduation-Day Crossword 2021-10-14

Lucas' Graduation-Day Crossword crossword puzzle
Across
  1. Grand _ University
  2. Type of Ceremony
  3. GCU Street
  4. Years in School
  5. Type of Degree
  6. Lucas's Employer
  7. Graduate
  8. GCU Color
  9. Black Beans
Down
  1. Name of GCU Mascot
  2. Go...
  3. Lucas's Major
  4. Pomp
  5. group of people
  6. Hat Decoration
  7. A builder
  8. Best type of Tree

17 Clues: PompGo...GraduateA builderGCU ColorGCU StreetBlack BeansLucas's MajorHat DecorationType of DegreeYears in Schoolgroup of peopleType of CeremonyLucas's EmployerBest type of TreeName of GCU MascotGrand _ University

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. Needs to be downloaded as part of another file which is then executed on the computer.
  2. It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
  3. Much similar to phishing but uses an SMS message
  4. Is software that is designed to gain access to your computer with malicious intent.
  5. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
  1. Specific type of computer virus that tricks you into downloading it onto your computer.
  2. Unwanted software that monitors and gathers information on a person and how they use their computer.
  3. Replicate themselves but do not attach themselves to files as a virus does.
  4. Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
  5. A secret word/phrase used to protect important log-in info on different websites

10 Clues: Much similar to phishing but uses an SMS messageReplicate themselves but do not attach themselves to files as a virus does.A secret word/phrase used to protect important log-in info on different websitesIs software that is designed to gain access to your computer with malicious intent....

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person.
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a person.Without permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

Cybersecurity! 2022-09-22

Cybersecurity! crossword puzzle
Across
  1. person who uses computers to gain access to computers without consent
  2. stopping something from happening
  3. a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
  4. protects your computer from attacks
  5. something a user clicks on to go to another page
Down
  1. guidelines for workplace procedures
  2. an attempt to damage or destroy a network
  3. keep safe from harm
  4. knowing of a situation or fact
  5. emails or texts sent to try and get personal information

10 Clues: keep safe from harmknowing of a situation or factstopping something from happeningguidelines for workplace proceduresprotects your computer from attacksan attempt to damage or destroy a networksomething a user clicks on to go to another pageemails or texts sent to try and get personal information...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

CYBERSECURITY 2020-06-13

CYBERSECURITY crossword puzzle
Across
  1. An occasion when private information can be seen by people who should not be able to see it is called data ... .
  2. A string of characters that allows access to a computer system or service.
  3. A web page or screen that updates often to show the latest information.
  4. The manner in which the components of a computer or computer system are organized and integrated.
Down
  1. A piece of code which is capable of copying itself and can corrupt the system or destroy data.
  2. A software designed to interfere with a computer´s normal functioning.
  3. The action to make something stronger or more important is called ... up.
  4. A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. The practice of examining large pre-existing databases in order to generate new information is called data ...

10 Clues: A software designed to interfere with a computer´s normal functioning.A web page or screen that updates often to show the latest information.An attempt by hackers to damage or destroy a computer network or system.The action to make something stronger or more important is called ... up....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. chats for you
  2. irritating
  3. attacks specific servers
  4. covid
  5. rigs elections
Down
  1. forced advertising
  2. knowingly downloaded
  3. ransoms your files
  4. wastes network bandwidth
  5. shops for you

10 Clues: covidirritatingchats for youshops for yourigs electionsforced advertisingransoms your filesknowingly downloadedwastes network bandwidthattacks specific servers

Cybersecurity 2022-12-05

Cybersecurity crossword puzzle
Across
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
  3. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  4. A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
  2. Worms target vulnerabilities in operating systems to install themselves into networks.
  3. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
  4. it kidnaps your computer and holds it for ransom, hence the clever name.
  5. disguises itself as desirable code

10 Clues: disguises itself as desirable codeit kidnaps your computer and holds it for ransom, hence the clever name.A form of malware used by hackers to spy on you and your computer activities.Worms target vulnerabilities in operating systems to install themselves into networks....

Cybersecurity 2022-11-18

Cybersecurity crossword puzzle
Across
  1. the protection of internet-connected systems such as hardware, software and data from cyberthreats
  2. engineering the term used for a broad range of malicious activities accomplished through human interactions.
  3. testing an authorized simulated attack performed on a computer system to evaluate its security
  4. category of malicious cyber-attacks that hackers or cybercriminals employ
  5. information such as facts and numbers used to analyze something or make decisions
  6. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
  2. when attackers send malicious emails designed to trick people into falling for a scam
  3. allow users to keep their software programs updated without having to check for and install available updates manually
  4. software designed to interfere with a computer's normal functioning

10 Clues: software designed to interfere with a computer's normal functioningcategory of malicious cyber-attacks that hackers or cybercriminals employinformation such as facts and numbers used to analyze something or make decisionswhen attackers send malicious emails designed to trick people into falling for a scam...

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. manipulation of people into performing actions or give up confidential information.
  2. causes your computer to download or display malicious adverts or pop-ups
  3. a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
  4. Designed to gain access to your computer with malicious intent.
  5. a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
  1. When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
  2. replicate itself by maliciously modifying other computer programs and inserting code.
  3. Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
  4. replicate itself in order to create traffic and slowing down the system.
  5. describes a social engineering act of obtaining someone else's personal information without their consent.

10 Clues: Designed to gain access to your computer with malicious intent.causes your computer to download or display malicious adverts or pop-upsreplicate itself in order to create traffic and slowing down the system.manipulation of people into performing actions or give up confidential information....

Cybersecurity 2021-02-28

Cybersecurity crossword puzzle
Across
  1. Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
  2. The type of operating system that is permanently programmed into a hardware device.
  3. A _____ determines how memory is used.
  4. The most common Mobile OS.
Down
  1. The type of software license that allows a predetermined number of people to use the account at the same time.
  2. What is saved even when in private browsing?
  3. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
  4. The most popular OS for desktops and laptops.
  5. An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
  6. The ____ accounts are responsible for creating new user accounts and setting permissions.

10 Clues: The most common Mobile OS.A _____ determines how memory is used.What is saved even when in private browsing?The most popular OS for desktops and laptops.The type of operating system that is permanently programmed into a hardware device.The ____ accounts are responsible for creating new user accounts and setting permissions....

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a personWithout permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

CYBERSECURITY 2021-10-18

CYBERSECURITY crossword puzzle
Across
  1. The short form of malicious software - Malware
  2. A software that covertly monitors your online behavior
  3. A software or hardware device designed to protect your private data
  4. A tool that helps mask to location of the user to guarantee anonymity
  5. The practice of sending fraudulent communications that appear to come from a reputable source
Down
  1. HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  2. A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
  3. A technology that enables us to access our files through the internet remotely
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  5. An incident where a hacker gains unauthorized access to a computer or device

10 Clues: The short form of malicious software - MalwareA software that covertly monitors your online behaviorA software or hardware device designed to protect your private dataA tool that helps mask to location of the user to guarantee anonymityAn incident where a hacker gains unauthorized access to a computer or device...

cybersecurity 2022-05-06

cybersecurity crossword puzzle
Across
  1. eg.: 192.160.81.1
  2. A network security system
  3. background process of stealing data
  4. Virtual Private Network
  5. A man who hacks
Down
  1. sharing negative content about someone else
  2. denial of internet service attack
  3. baiting to reveal personal information
  4. A type of malware that steals data
  5. privileged acces managemen (or a brawl stars character)

10 Clues: A man who hackseg.: 192.160.81.1Virtual Private NetworkA network security systemdenial of internet service attackA type of malware that steals databackground process of stealing databaiting to reveal personal informationsharing negative content about someone elseprivileged acces managemen (or a brawl stars character)

Cybersecurity 2022-06-29

Cybersecurity crossword puzzle
Across
  1. Purchasing of asset
  2. hardware and software
  3. Longeststage of asset lifecycle
  4. Tangible asset
  5. Intangible asset
  6. tangible asset
Down
  1. physical asset
  2. Digital media and content
  3. Wear and tear situation
  4. Costlier than traditional
  5. plumbing installation

11 Clues: physical assetTangible assettangible assetIntangible assetPurchasing of assethardware and softwareplumbing installationWear and tear situationDigital media and contentCostlier than traditionalLongeststage of asset lifecycle

Cybersecurity 2022-09-16

Cybersecurity crossword puzzle
Across
  1. update to an operating system to repair an bug or vulnerability
  2. tool installed to give an attacker easier access to the compromised system
  3. Electronic junk mail or junk newsgroup postings.
  4. generic term for a number of different types of malicious code.
  5. User acting with malicious intent to compromise a system
  6. term to describe connecting multiple separate networks together.
Down
  1. use a computer to gain unauthorized access to data in a system
  2. program that can retrieve and display information from servers on the World Wide Web
  3. Malware that locks/encrypts computers
  4. e-mails that try to trick a user into entering valid credentials at a fake website

10 Clues: Malware that locks/encrypts computersElectronic junk mail or junk newsgroup postings.User acting with malicious intent to compromise a systemuse a computer to gain unauthorized access to data in a systemupdate to an operating system to repair an bug or vulnerabilitygeneric term for a number of different types of malicious code....

NVH September Trivia 2022-08-24

NVH September Trivia crossword puzzle
Across
  1. Ext. 7060
  2. Policy keeper
  3. NVH Lab blood supplier
  4. Personal ______ Equipment
  5. Cybersecurity Training
  6. Code Call for Combative Person
  7. Coffee Shop
  8. Extended Care "Family"
  9. John Caitlynn & Liz Therapy
Down
  1. TFMC ARNP
  2. Zzz Service
  3. payroll software
  4. BOC Meeting Day
  5. Purchaser
  6. Resuscitation Quality Improvement
  7. Drs. Dhillon & Jex Service
  8. The next EHR
  9. New mammo system

18 Clues: TFMC ARNPExt. 7060PurchaserZzz ServiceCoffee ShopThe next EHRPolicy keeperBOC Meeting Daypayroll softwareNew mammo systemNVH Lab blood supplierCybersecurity TrainingExtended Care "Family"Personal ______ EquipmentDrs. Dhillon & Jex ServiceJohn Caitlynn & Liz TherapyCode Call for Combative PersonResuscitation Quality Improvement

Cybersecurity Awareness 2021-10-27

Cybersecurity Awareness crossword puzzle
Across
  1. records keystrokes and sends its info to a hacker
  2. (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
  3. verifying your identity with a username, password, or other piece of information
  4. hackers demand a ransom for the return of information after deploying this
  5. an audio or video clip that has been edited and changed to seem believable
  6. malware disguised as legitimate software
  7. the most common form of cryptocurrency
Down
  1. (two words) manipulating and deceiving people to get sensitive and private info; lying
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. emails, text messages, or other communication designed to convince you to give the sender personal information
  4. sends information from your computer to a third party without your knowledge
  5. short for malicious software
  6. use this to protect your information
  7. a way of hiding information
  8. a network security device that filters incoming and outgoing websites
  9. displays unauthorized ads on a user's screen
  10. short for virtual private network

17 Clues: a way of hiding informationshort for malicious softwareshort for virtual private networkuse this to protect your informationthe most common form of cryptocurrencymalware disguised as legitimate softwaredisplays unauthorized ads on a user's screenrecords keystrokes and sends its info to a hacker...

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

revision 2022-09-14

revision crossword puzzle
Across
  1. захист
  2. злиття_акцій
  3. комплексні_рішення
  4. штаб-квартира
  5. власники_акцій
Down
  1. проривні_технології
  2. під_керівництвом
  3. кібербезпека
  4. розсувати кордони
  5. виявляти_загрози

10 Clues: захисткібербезпеказлиття_акційштаб-квартиравласники_акційпід_керівництвомвиявляти_загрозирозсувати кордоникомплексні_рішенняпроривні_технології

Dbl AA November 16! 2022-11-16

Dbl AA November 16! crossword puzzle
Across
  1. Favorite TV
  2. Favorite outdoor hobby
  3. Older vehicle
  4. Zoom zoom
  5. Grodhaus Family game
  6. Cute youngster
  7. Sisters of mom
  8. Grandma appreciated Aaron’s
  9. Walking with cat in
  10. Fun with Lizzy’s hair
Down
  1. Love spark established
  2. Kit for picking
  3. Impressive talent
  4. special older woman
  5. Cute girl
  6. Favorite indoor hobby
  7. Work interest
  8. Teal Team
  9. Quail Hollow
  10. Your mama

20 Clues: Zoom zoomCute girlTeal TeamYour mamaFavorite TVQuail HollowOlder vehicleWork interestCute youngsterSisters of momKit for pickingImpressive talentspecial older womanWalking with cat inGrodhaus Family gameFavorite indoor hobbyFun with Lizzy’s hairLove spark establishedFavorite outdoor hobbyGrandma appreciated Aaron’s

Cybersecurity 2022-04-05

Cybersecurity crossword puzzle
Across
  1. A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
  2. A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
  3. A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
  1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
  2. A standalone malware computer program that replicates itself in order to spread to other computers.
  3. A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
  4. A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
  5. Malware that involves advertising.
  6. A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.

9 Clues: Malware that involves advertising.A standalone malware computer program that replicates itself in order to spread to other computers.A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge....

Cybersecurity 2022-05-11

Cybersecurity crossword puzzle
Across
  1. computer program that hides and replicates
  2. most common type of social engineering
  3. inspects network traffic
  4. octets network address
Down
  1. appears to be a legitimate file or program
  2. user of programs to overcome technical obstacles
  3. database that contains the login account information
  4. hexadecimal address
  5. system that detects incoming threats

9 Clues: hexadecimal addressoctets network addressinspects network trafficsystem that detects incoming threatsmost common type of social engineeringappears to be a legitimate file or programcomputer program that hides and replicatesuser of programs to overcome technical obstaclesdatabase that contains the login account information

CyberSecurity 2022-08-25

CyberSecurity crossword puzzle
Across
  1. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
  2. Detailed report, usually about a person
  3. rules for interacting politely online
  4. files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
  5. the practice of protecting systems, networks, and programs from digital attacks
  6. Someone who intentionally targets people for harm using online chat rooms or social media.
Down
  1. The ability to act in a safe and responsible way on the Internet and other connected environments.
  2. A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
  3. Information about you and what you do online

9 Clues: rules for interacting politely onlineDetailed report, usually about a personInformation about you and what you do onlinethe practice of protecting systems, networks, and programs from digital attacksSomeone who intentionally targets people for harm using online chat rooms or social media....

cybersecurity awareness 2017-09-28

cybersecurity awareness crossword puzzle
Across
  1. is a string of characters used for authenticating a user on acomputer system
  2. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
  3. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
  6. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. an electronic device for storing and processing data
  8. is a type of malware that is often disguised as legitimate software
Down
  1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
  2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
  3. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
  4. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
  5. The translation of data into a secret code.The most effective way to achieve data security.
  6. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
  7. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  8. software that is intended to damage or disable computers and computer systems.

16 Clues: an electronic device for storing and processing datais a type of malware that is often disguised as legitimate softwareis a string of characters used for authenticating a user on acomputer systemsoftware that is intended to damage or disable computers and computer systems....

Cybersecurity Crossword 2022-09-07

Cybersecurity Crossword crossword puzzle
Across
  1. umbrella term for malicious software
  2. a software tool used to take advantage of a software or hardware vulnerabilities
  3. self replicating malware that does not require human interaction
  4. software that lets you browse the internet
  5. small files that track browser usage and preferences
  6. email based scamming
  7. software that scans a device to detect threats
Down
  1. day of the week most vendors release patches
  2. malware that encrypts files and demands payment
  3. software that secretly captures info as it is typed
  4. text message based scamming
  5. another word for a software update
  6. copy of computer data for data loss prevention
  7. phone based scamming
  8. any kind of unwanted, unsolicited digital communication
  9. filters unwanted traffic on a network

16 Clues: phone based scammingemail based scammingtext message based scamminganother word for a software updateumbrella term for malicious softwarefilters unwanted traffic on a networksoftware that lets you browse the internetday of the week most vendors release patchescopy of computer data for data loss prevention...

Cybersecurity Vocab 2021-09-28

Cybersecurity Vocab crossword puzzle
Across
  1. Secret unknown access point into a system
  2. Flaw or potential for harm
  3. Virus that infects a computer before the operating system loads
  4. Following the rules or standards that have been established
  5. Software that is embedded in hardware
  6. Computer code intentially written to cause some form of harm
  7. Using a lie or scam to obtain private information
  8. Physical token inserted into a computer's usb port
Down
  1. Measurement and analysis of a biological feature
  2. Condition of being pricate or secret
  3. Something that takes a vulnerability to a level where it can be exploited
  4. Encrypts data do user connot access it intil a fee is paid to hacker only
  5. Acions of ,alicous code
  6. Proccess by which something becomes harder it is made harder to hack
  7. State of being complete or uncorrupted
  8. Technology that thracks a users' keystokes on the keyboard

16 Clues: Acions of ,alicous codeFlaw or potential for harmCondition of being pricate or secretSoftware that is embedded in hardwareState of being complete or uncorruptedSecret unknown access point into a systemMeasurement and analysis of a biological featureUsing a lie or scam to obtain private informationPhysical token inserted into a computer's usb port...

Vocabulary Test LKE Media A 2022-03-14

Vocabulary Test LKE Media A crossword puzzle
Across
  1. durchsetzen
  2. eine Webseite schließen
  3. Suchmaschine
  4. technikaffin
  5. Sicherheit im Netz
  6. die aktuellsten Nachrichten über
Down
  1. unbeschränkt
  2. offline gehen
  3. Verkaufszahlen
  4. jemanden oder etwas misstrauen
  5. Berichterstattung

11 Clues: durchsetzenunbeschränktSuchmaschinetechnikaffinoffline gehenVerkaufszahlenBerichterstattungSicherheit im Netzeine Webseite schließenjemanden oder etwas misstrauendie aktuellsten Nachrichten über