cybersecurity Crossword Puzzles

Cybersecurity Concepts 2024-03-31

Cybersecurity Concepts crossword puzzle
Across
  1. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  2. the name commonly given to unwanted emails
  3. Made up of devices that are all connected to each other, like computers and
  4. a security system that forms a virtual perimeter around a network of workstations preventing an attack
  5. the process of verifying the identity of a user or piece of information
Down
  1. a process of maintaining data confidentiality by converting plain data into secret code
  2. makes sure that there are no unauthorized changes to information of systems
  3. A Virtual Private Network
  4. a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
  5. a program that gives a hacker remote access to, and control over, a computer or network

10 Clues: A Virtual Private Networkthe name commonly given to unwanted emailsthe process of verifying the identity of a user or piece of informationmakes sure that there are no unauthorized changes to information of systemsMade up of devices that are all connected to each other, like computers and...

Cybersecurity puzzle 2025-02-03

Cybersecurity puzzle crossword puzzle
Across
  1. - Malicious software that can harm your computer
  2. - An email scam that attempts to trick users into giving up personal information
  3. - The process of converting data into unreadable code for security
  4. - Software that prevents unauthorized access to a network
  5. - The practice of disguising a communication to appear as a trusted source
Down
  1. - A secret combination of characters used to access an account
  2. - A program that appears harmless but has malicious intent
  3. - A security measure used to verify a user's identity, often using two different forms of authentication
  4. - A type of attack where a person tricks someone into revealing sensitive information
  5. - A type of cyberattack where traffic is flooded to a system to make it unavailable

10 Clues: - Malicious software that can harm your computer- Software that prevents unauthorized access to a network- A program that appears harmless but has malicious intent- A secret combination of characters used to access an account- The process of converting data into unreadable code for security...

CyberSecurity 1 2024-07-23

CyberSecurity 1 crossword puzzle
Across
  1. Entitlement is very closely related to ... performed
  2. ... to standard is verified during audit
  3. IAM also differentiates 'authenticate' and ...
  4. We differentiate between User and ... in IAM
  5. ISO 27000 standards has 14 categories for ...
Down
  1. S in SOD
  2. Issue faced by user in IT
  3. A in CIA
  4. C in PDCA
  5. Example of non-human identity

10 Clues: S in SODA in CIAC in PDCAIssue faced by user in ITExample of non-human identity... to standard is verified during auditWe differentiate between User and ... in IAMISO 27000 standards has 14 categories for ...IAM also differentiates 'authenticate' and ...Entitlement is very closely related to ... performed

Cybersecurity Basics 2024-07-25

Cybersecurity Basics crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
  1. A security process that verifies the identity of a user or device attempting to access a system.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Puzzle 2024-07-19

Cybersecurity Puzzle crossword puzzle
Across
  1. Unauthorized access to or manipulation of a computer system or network
  2. A secret word or phrase used to gain access to a system.
  3. The practice of protecting systems, networks, and programs from digital attacks
  4. A digital certificate used to encrypt and authenticate a website
  5. A type of software designed to harm or exploit any programmable device.
Down
  1. The act of pretending to be someone else to gain sensitive information
  2. A type of malicious software that demands ransom
  3. An attack that floods a network with excessive traffic, disrupting service
  4. Unwanted email that often contains malware or phishing attempts
  5. Software designed to detect and remove malicious software

10 Clues: A type of malicious software that demands ransomA secret word or phrase used to gain access to a system.Software designed to detect and remove malicious softwareUnwanted email that often contains malware or phishing attemptsA digital certificate used to encrypt and authenticate a website...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. Security system that forms a virtual perimeter around a network
  3. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  4. software that is secretly installed on a user's device to gather sensitive data
  5. Damage or destroy a computer network or system
  6. A malicious computer program
Down
  1. Block elements from sending you information
  2. Unwanted advertising, the email equivalant of physical junk
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Person who try to gain unauthorized

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Damage or destroy a computer network or system
  2. A malicious computer program
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Security system that forms a virtual perimeter around a network
Down
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  3. Block elements from sending you information
  4. Unwanted advertising, the email equivalant of physical junk
  5. Person who try to gain unauthorized
  6. software that is secretly installed on a user's device to gather sensitive data

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

Cybersecurity Crossword 2025-11-13

Cybersecurity Crossword crossword puzzle
Across
  1. une menace
  2. empêcher
  3. escroquer
  4. activer
  5. malveillant
  6. des escrocs
Down
  1. dévoiler, révéler
  2. tromper, duper
  3. profiter
  4. faire confiance

10 Clues: activerempêcherprofiterescroquerune menacemalveillantdes escrocstromper, duperfaire confiancedévoiler, révéler

Cybersecurity Basics 2025-11-13

Cybersecurity Basics crossword puzzle
Across
  1. A short way to say “Information Technology.”
  2. Your special name you use to log into a computer, cell phone, tablet, or website.
  3. Something you type to log in — keep it secret!
  4. A computer, tablet, or phone is called a _______.
  5. To keep something from harm or danger.
  6. Something that keeps your personal stuff private.
Down
  1. What we use to surf websites and watch videos.
  2. Keeping your computer and personal data safe.
  3. Using smart rules online helps keep you _______.
  4. Inventions that come from science and research. It can solve problems and make our lives easier.

10 Clues: To keep something from harm or danger.A short way to say “Information Technology.”Keeping your computer and personal data safe.What we use to surf websites and watch videos.Something you type to log in — keep it secret!Using smart rules online helps keep you _______.A computer, tablet, or phone is called a _______....

Cybersecurity Awareness 2025-10-15

Cybersecurity Awareness crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information via email.
  2. A type of malicious software that locks files and demands payment.
  3. When employees unknowingly help hackers, it's called an ___ threat.
  4. Regularly updating this can patch security vulnerabilities.
  5. Security appliance that limits access to data or systems.
Down
  1. A secret word or phrase used to gain access to a system.
  2. Portable devices like USBs can carry this kind of malicious code.
  3. A common workplace policy: "Don't write your password on a ___."
  4. Two-step process to verify identity.
  5. You should never connect to public ___ without using a VPN.

10 Clues: Two-step process to verify identity.A secret word or phrase used to gain access to a system.Security appliance that limits access to data or systems.You should never connect to public ___ without using a VPN.Regularly updating this can patch security vulnerabilities.Fraudulent attempt to obtain sensitive information via email....

CyberSecurity Crossword 2025-10-22

CyberSecurity Crossword crossword puzzle
Across
  1. An online trick where someone tries to steal your personal information by pretending to be someone else.
  2. A strong secret word or phrase used to access accounts.
  3. Protecting systems, networks, and data from digital attacks.
  4. A hidden, harmful program disguised as something safe to download.
  5. The practice of using technology in a safe and responsible way.
  6. Messages that threaten or harass others through technology.
Down
  1. Traces of information left online by users.
  2. Software that protects a computer from viruses and malware.
  3. The process of scrambling information to keep it private.
  4. A wall of security that blocks unauthorized access to a network.

10 Clues: Traces of information left online by users.A strong secret word or phrase used to access accounts.The process of scrambling information to keep it private.Software that protects a computer from viruses and malware.Messages that threaten or harass others through technology.Protecting systems, networks, and data from digital attacks....

Module 1 Introductory Course Telehealth 2017-03-01

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. Electronic health
  2. Providing remote healthcare
  3. Ability of computers exchange information"
  4. health Popular emerging term
Down
  1. Mobile health
  2. Measures taken to protect a computer
  3. Refers to teleconsultations
  4. Extended term for information technology

8 Clues: Mobile healthElectronic healthProviding remote healthcareRefers to teleconsultationshealth Popular emerging termMeasures taken to protect a computerExtended term for information technologyAbility of computers exchange information"

cy-rite crossword 2025-11-10

cy-rite crossword crossword puzzle
Across
  1. Response The process of identifying, managing, and recovering from a cybersecurity breach.
  2. Software that secretly collects user information without consent.
  3. Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
  4. Malware disguised as legitimate software, used to trick users into installing it.
Down
  1. The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
  2. The process of converting encrypted data back into its original readable form.
  3. A method of guessing passwords or encryption keys by trying all possible combinations.
  4. A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
  5. Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
  6. A self-replicating program that spreads through networks without user action.

10 Clues: Software that secretly collects user information without consent.A self-replicating program that spreads through networks without user action.The process of converting encrypted data back into its original readable form.Malware disguised as legitimate software, used to trick users into installing it....

Warm-up 2025-12-20

Warm-up crossword puzzle
Across
  1. Short for "applications"
  2. Synonym for "negative side-effects"
  3. Synonym for new
  4. A gathering of people online
Down
  1. Someone doing something great.
  2. What makes Internet safe
  3. Synonym for big
  4. Synonym for "online on social network"
  5. Feeling of loneliness
  6. Something that has a negative effect on you.

10 Clues: Synonym for bigSynonym for newFeeling of lonelinessWhat makes Internet safeShort for "applications"A gathering of people onlineSomeone doing something great.Synonym for "negative side-effects"Synonym for "online on social network"Something that has a negative effect on you.

NAVFAC Capabilities 2023-02-13

NAVFAC Capabilities crossword puzzle
Across
  1. _____ Handling Ashore Procurement
  2. NEPA Requirement: Environmental ______
  3. _______ and Facilities Operations
  4. Real Estate _______ and Management
  5. _______ Facilities and Equipment Engineering
Down
  1. Military Construction acronym
  2. Basic physical and organizational structures and facilities
  3. Protection against unauthorized data usage
  4. _______Vehicles providing transportation services
  5. _______ Conservation: Health assessment of natural and cultural resources

10 Clues: Military Construction acronym_____ Handling Ashore Procurement_______ and Facilities OperationsReal Estate _______ and ManagementNEPA Requirement: Environmental ______Protection against unauthorized data usage_______ Facilities and Equipment Engineering_______Vehicles providing transportation services...

Cybersecurity Awareness Month Crossword Challenge 2023-09-25

Cybersecurity Awareness Month Crossword Challenge crossword puzzle
Across
  1. When malicious actors send an email-based attack to trick the recipient into taking an action.
  2. The term for an email-based attack that involves the use of a QR code
  3. Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
  4. The month associated with Cybersecurity Awareness.
  5. The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
  1. A disgruntled or financially motivated employee is called a(n) ______ threat.
  2. The color of the banner that indicates a company email is from an external source.
  3. The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
  4. The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
  5. The action every associate must take when a suspicious email message is identified.

10 Clues: The month associated with Cybersecurity Awareness.The term for an email-based attack that involves the use of a QR codeA disgruntled or financially motivated employee is called a(n) ______ threat.The color of the banner that indicates a company email is from an external source....

algorithms 2025-10-28

algorithms crossword puzzle
Across
  1. converts code into readable data
  2. study of secure communication
  3. secure distributed digital ledger
  4. logical true or false value
  5. delay between request and response
  6. software made to harm
  7. structure for programming language
Down
  1. repetition of a code block
  2. rules for data communication
  3. protecting system from attacks

10 Clues: software made to harmrepetition of a code blocklogical true or false valuerules for data communicationstudy of secure communicationprotecting system from attacksconverts code into readable datasecure distributed digital ledgerdelay between request and responsestructure for programming language

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

Issue #1 2023-09-11

Issue #1 crossword puzzle
Across
  1. The Spooky Month Holiday
  2. Red ________ Week - Keeping kids drug-free
  3. Magnolia ________ Institute
  4. Racket sport this season
  5. Recent Hurricane in California
Down
  1. Seniors should be thinking about their college __________
  2. Homecoming King and ______
  3. Applying to a 4-year __________
  4. Future __________ Leaders of America Club

9 Clues: The Spooky Month HolidayRacket sport this seasonHomecoming King and ______Magnolia ________ InstituteRecent Hurricane in CaliforniaApplying to a 4-year __________Future __________ Leaders of America ClubRed ________ Week - Keeping kids drug-freeSeniors should be thinking about their college __________

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What is a digital document that verifies the ownership of a public key?
  2. What type of malware records keystrokes made by a user?
  3. What term refers to the permission to enter or use a system or network?
  4. What term refers to malicious software designed to harm or exploit devices?
  5. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  6. term describes a weakness in a system that can be exploited by threats?
  7. What is the process of verifying the identity of a user or system?
  8. What is the process of converting data into a fixed-size string of characters for security?
Down
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is the process of converting ciphertext back into plaintext?
  3. What protocol secures data sent over the internet by encrypting it?
  4. What is the process of converting plaintext into ciphertext to protect information?
  5. What is the process of creating copies of data to restore in case of loss?
  6. What is a physical or digital object used to prove identity in security systems?
  7. What type of malware disguises itself as legitimate software?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity Crossword Puzzle 2025-05-06

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Software that secretly gathers user information
  2. Software that is harmful to your system
  3. Software used to detect and remove malicious software
  4. A security system that blocks unauthorized access to a network
  5. A hidden way to access a system or software
  6. The process of converting data into a secret code
  7. A method of guessing passwords by trying all combinations
  8. A fake email that tricks you into giving personal info
Down
  1. A tool that records everything you type
  2. A tool that hides your IP and encrypts your internet connection
  3. A vulnerability that is exploited before it’s known to developers
  4. A type of malware that locks your files until you pay
  5. A type of malware disguised as a legitimate file
  6. An extra step to verify your identity during login
  7. Manipulating people to reveal confidential information

15 Clues: A tool that records everything you typeSoftware that is harmful to your systemA hidden way to access a system or softwareSoftware that secretly gathers user informationA type of malware disguised as a legitimate fileThe process of converting data into a secret codeAn extra step to verify your identity during login...

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – What cybersecurity keeps us.
  2. – Information AI studies.
  3. – Harmful software.
  4. – What we do to teach AI.
  5. – A common target for phishing.
  6. – Automated programs used online.
  7. – What AI learns from.
Down
  1. – The goal of cybersecurity.
  2. – Process to teach AI models.
  3. – A warning from AI about danger.
  4. – A small automated tool.
  5. – Short for Artificial Intelligence.

12 Clues: – Harmful software.– What AI learns from.– Information AI studies.– What we do to teach AI.– A small automated tool.– The goal of cybersecurity.– Process to teach AI models.– What cybersecurity keeps us.– A common target for phishing.– A warning from AI about danger.– Automated programs used online.– Short for Artificial Intelligence.

Cybersecurity Vocab 2 2021-09-28

Cybersecurity Vocab 2 crossword puzzle
Across
  1. biometrics considered invalid
  2. Resources such as computers and accounts
  3. cycle or new roles
  4. Validating a user
  5. authorizing access to user using biological feature
  6. token into USB port
  7. permission giver from other things
  8. denying authorized biometircs credential
  9. permission recieved from higher level
Down
  1. Everyplace the hacker can get into
  2. standard authentication protocol
  3. permission given at certain lications
  4. reducing vulnerability
  5. Identity Managementsemi-independent systems
  6. FAR and FRR are equal

15 Clues: Validating a usercycle or new rolestoken into USB portFAR and FRR are equalreducing vulnerabilitybiometrics considered invalidstandard authentication protocolEveryplace the hacker can get intopermission giver from other thingspermission given at certain licationspermission recieved from higher levelResources such as computers and accounts...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Department to call for computer problem
  2. A device you should not plug in
  3. Think before you -- ?
  4. A type of malware that encrypts your file
  5. Something you should never share
  6. Programs installed on your phone are called?
Down
  1. Location of the Bank's Disaster Recovery Site
  2. A type of an email scam
  3. key word used to send secure email
  4. Password should always be?
  5. Northern Bank's Mission Statement
  6. Location of the Bank's head quarter
  7. A way to access the bank resources remotely
  8. Last name of the head of IT
  9. Type of an Operating system

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

cybersecurity Puzzle-Enrique 2023-08-22

cybersecurity Puzzle-Enrique crossword puzzle
Across
  1. prevents unauthorized changes
  2. scrambling data
  3. UI redress attack
  4. false perception of reality
  5. disguised attacks
  6. fools users into providing sensitive information
  7. personal laptop, smart phones, ect
Down
  1. online harassment
  2. virtual private network
  3. locks users out until they pay
  4. short for malicious software
  5. prevents unauthorized access
  6. transmits information without user knowing
  7. codes that protect data
  8. carry out cyber attacks on other systems

15 Clues: scrambling dataonline harassmentUI redress attackdisguised attacksvirtual private networkcodes that protect datafalse perception of realityshort for malicious softwareprevents unauthorized accessprevents unauthorized changeslocks users out until they paypersonal laptop, smart phones, ectcarry out cyber attacks on other systems...

Week 1 Puzzle 2020-08-25

Week 1 Puzzle crossword puzzle
Across
  1. This is an example of "something you know"--one of the key factors in MFA.
  2. Approximately $6 trillion is planned on being spent on this by 2021.
  3. General term for the type of device most often connecting to public WiFi.
  4. This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
  5. Globally, one of these attacks every 39 seconds.
  6. By 2025, there will be an estimated 75 billion of these devices connected to the internet.
  7. 95% of cybersecurity breaches involve this type of error.
Down
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices.
  2. The most dangerous type of WiFi.
  3. This is an example of "something you are"--one of the key factors of MFA.
  4. This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
  5. To increase your personal internet security, consider turning off the "save password" feature in this.
  6. 93% of these organizations have experienced a data breach within the past 3 years.
  7. Software that is created specifically to help detect, prevent and remove malicious software.

14 Clues: The most dangerous type of WiFi.Globally, one of these attacks every 39 seconds.95% of cybersecurity breaches involve this type of error.Approximately $6 trillion is planned on being spent on this by 2021.This is an example of "something you are"--one of the key factors of MFA....

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

crossword about Cybersecurity 2025-06-07

crossword about Cybersecurity crossword puzzle
Across
  1. Malware that encrypts files for ransom
  2. Network of infected devices
  3. Small data file stored by websites
  4. Software that secretly monitors activity
  5. Scrambling data for security
  6. Person who exploits system vulnerabilities
  7. Remote data storage and computing
Down
  1. Fraudulent attempts to steal info
  2. Harmful software like viruses
  3. Authentication using fingerprints
  4. Directs internet traffic
  5. Decentralized ledger technology
  6. Malware disguised as legitimate software
  7. Secures internet connections
  8. Network security barrier

15 Clues: Directs internet trafficNetwork security barrierNetwork of infected devicesSecures internet connectionsScrambling data for securityHarmful software like virusesDecentralized ledger technologyFraudulent attempts to steal infoAuthentication using fingerprintsRemote data storage and computingSmall data file stored by websites...

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Divide and conquer. Tool to reduce the scope
  2. Roofies mixed in software
  3. Party host
  4. Secure data with a pinch of salt
  5. Chained blocks. Runs crypto
  6. 12 characters long in PCI DSS v4.0
Down
  1. Something you are (Inherence factor)
  2. Rhymes with fishing
  3. Your cybersecurity partner
  4. Vaccine for your Ssystems
  5. Burning wall in cold rooms
  6. Data secured. Locked with a key
  7. Malicious code on a horse

13 Clues: Party hostRhymes with fishingVaccine for your SsystemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning wall in cold roomsChained blocks. Runs cryptoData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)...

Browsing safely 2025-06-19

Browsing safely crossword puzzle
Across
  1. hoaxing or misleading
  2. harming or harassing using information technology
  3. illegal entry in computer
  4. illegal method to get money
  5. security to prevent cybercrime
  6. disturbs normal functioning of computer
  7. act of stealing and misusing someone's personal information
  8. building a face friendship
  9. any information about a person can be found
  10. conduct a terrosism by computer
Down
  1. protects from virus
  2. any criminal activity intended to harm anyone using computer
  3. complaining against cybercrime
  4. that helps in preventing unauthorised access to your computer
  5. protects from cyber crime

15 Clues: protects from virushoaxing or misleadingillegal entry in computerprotects from cyber crimebuilding a face friendshipillegal method to get moneycomplaining against cybercrimesecurity to prevent cybercrimeconduct a terrosism by computerdisturbs normal functioning of computerany information about a person can be found...

Cybersecurity Careers Crossword 2022-09-26

Cybersecurity Careers Crossword crossword puzzle
Across
  1. the process of getting new software or hardware up and running
  2. small groups of similar careers within a career cluster
  3. the study of technologies to determine their usefulness
  4. a person who creates, manages, and maintains computer networks, software, and systems
  5. they ensure hardware, software, and other systems are working properly
  6. This person improves and maintains an information technology system
  7. creating or improving any part of technology
  8. the change in the number of people that are employed in a certain occupation in the future
  9. computer programs that run by giving instructions to the computer
Down
  1. a flaw or weakness that may allow harm to occur in an information technology system
  2. it is two or more computers or devices that exchange data
  3. all hardware, software, and other equipment operated by a group of users
  4. A type of software that can be installed and run on a computer, tablet, or other electronic device
  5. clusters a group of careers with similar features
  6. the physical parts that make up a computer or device

15 Clues: creating or improving any part of technologyclusters a group of careers with similar featuresthe physical parts that make up a computer or devicesmall groups of similar careers within a career clusterthe study of technologies to determine their usefulnessit is two or more computers or devices that exchange data...

Cybersecurity In December 2022-12-21

Cybersecurity In December crossword puzzle
Across
  1. 2 or more computers/devices connected together to share resources
  2. The process of identifying a user's identity
  3. Coding used to protect your information from unauthorized access
  4. a form of malware that spies on you and your computer activities
  5. acronym for Virtual Private Network
  6. an update released to fix bugs and other vulnerabilities
  7. Used to keep intruders out
Down
  1. Software or device that has a flaw that can be exploited
  2. software or hardware used to combat viruses
  3. malware that looks legitimate, like the Greek horse
  4. MALicious softWARE
  5. a copy of data that is used in case of emergencies
  6. Software that is used to encrypt a user's files then demand ransom
  7. Trying to get sensitive information through social engineering
  8. the act of using a vulnerability

15 Clues: MALicious softWAREUsed to keep intruders outthe act of using a vulnerabilityacronym for Virtual Private Networksoftware or hardware used to combat virusesThe process of identifying a user's identitya copy of data that is used in case of emergenciesmalware that looks legitimate, like the Greek horse...

CyberSecurity Terminologies Check! 2024-12-03

CyberSecurity Terminologies Check! crossword puzzle
Across
  1. A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
  2. A decoy system or network that serves to attract potential attackers.
  3. A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
  4. Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
  5. Locks the computer or data and demands a payment to release the machine.
  6. identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
  1. The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
  2. A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
  3. A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
  4. A process that ensures and confirms a user’s identity.
  5. A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
  6. A type of surveillance software that records keystrokes made by a user
  7. Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
  8. Spread to other machines on a network.Red : A color
  9. A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.

15 Clues: Spread to other machines on a network.Red : A colorA process that ensures and confirms a user’s identity.A decoy system or network that serves to attract potential attackers.A type of surveillance software that records keystrokes made by a userLocks the computer or data and demands a payment to release the machine....

Technology puzzle 2025-10-02

Technology puzzle crossword puzzle
Across
  1. physical parts of a computer
  2. device used to type information
  3. handheld device with apps
  4. software application for phones or computers
  5. global system connecting computers
  6. computer-generated 3D environment
  7. machine designed to perform tasks
  8. secret code for security access
  9. wireless internet connection
  10. electronic message system
  11. protection of systems and networks
Down
  1. organized collection of data
  2. computer that provides data to others
  3. a device for processing information
  4. a collection of web pages
  5. technology that simulates human thinking
  6. system of connected computers
  7. online storage and computing services
  8. programs that run on a computer
  9. device that produces a paper copy

20 Clues: a collection of web pageshandheld device with appselectronic message systemorganized collection of dataphysical parts of a computerwireless internet connectionsystem of connected computersdevice used to type informationsecret code for security accessprograms that run on a computercomputer-generated 3D environmentmachine designed to perform tasks...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Kigen Christmas Crossword 2025 2025-12-16

Kigen Christmas Crossword 2025 crossword puzzle
Across
  1. Foundation of good partnerships
  2. Connected product in the field
  3. What you’re solving right now
  4. A friendly way to start a conversation
  5. Safe and protected
  6. Downloaded to enable connectivity
  7. Standards body behind eSIM specs
  8. Connected devices ecosystem
  9. Embedded SIM technology
Down
  1. Designed to withstand disruption
  2. Season when devices and people recharge
  3. Worldwide in reach
  4. What Kigen always aims to keep things 😉
  5. Fruit or famous tech company
  6. Devices rely on this to communicate
  7. Something batteries (and people) need
  8. Tiny but essential technology
  9. Keeps devices protected over time
  10. Secure connectivity specialists
  11. Upcoming EU cybersecurity regulation

20 Clues: Worldwide in reachSafe and protectedEmbedded SIM technologyConnected devices ecosystemFruit or famous tech companyWhat you’re solving right nowTiny but essential technologyConnected product in the fieldFoundation of good partnershipsSecure connectivity specialistsDesigned to withstand disruptionStandards body behind eSIM specs...

Informatika 7 Bab 1 2025-08-26

Informatika 7 Bab 1 crossword puzzle
Across
  1. Rekam medis merupakan dampak informatika dibidang
  2. Upaya melindungi keamanan di internet
  3. Langkah logis dan sistematis menyelesaikan masalah
  4. Konsultasi dokter melalui daring
  5. Proses menulis instruksi dalam bahasa pemrograman
  6. Kumpulan fakta mentah yang belum diolah
Down
  1. Elemen infografis yang membuat cantik tampilan
  2. Aplikasi GPS dan peta digital untuk navigasi
  3. Unsur penting pembuatan infografis
  4. Salah satu aplikasi kecerdasan buatan
  5. Platform pembelajaran daring
  6. Halaman pada presentasi
  7. Kemajuan teknologi membuat aktivitas menjadi lebih..
  8. Representasi visual dari informasi
  9. Salah satu aplikasi membuat presentasi

15 Clues: Halaman pada presentasiPlatform pembelajaran daringKonsultasi dokter melalui daringUnsur penting pembuatan infografisRepresentasi visual dari informasiUpaya melindungi keamanan di internetSalah satu aplikasi kecerdasan buatanSalah satu aplikasi membuat presentasiKumpulan fakta mentah yang belum diolahAplikasi GPS dan peta digital untuk navigasi...

DAMPAK SOSIAL INFORMATIKA 2023-11-08

DAMPAK SOSIAL INFORMATIKA crossword puzzle
Across
  1. salah satu fitur keamanan windows10
  2. Dampak sosial informatika
  3. angka sandi rahasia antara pengguna dan sistem
  4. perangkat lunakk yang menempel pada perangkat lain
  5. salah satu fitur windows security
  6. keamanan data di internet
  7. Data dapat berupa
  8. perkakas peretasan
Down
  1. pengkodean data sebelum dikirim
  2. contoh otentifikasi biomtrik
  3. pishing biasanya melakukan kejahatannya melalaui
  4. contoh sistem operasi
  5. contoh Perkakas melindungi data atau informasi
  6. sistem operasi seluler
  7. program komputer yang mampu menyalin dirinya sendiri kekomputer lain
  8. Data atau keterangan yang benar (fakta)
  9. perdagangan elektronik
  10. individu yang membool, melepaskan virus, membobol komputer untuk mrncuri informasi
  11. kesalahan dalam aplikasi atau program
  12. world wide web

20 Clues: world wide webData dapat berupaperkakas peretasancontoh sistem operasisistem operasi selulerperdagangan elektronikDampak sosial informatikakeamanan data di internetcontoh otentifikasi biomtrikpengkodean data sebelum dikirimsalah satu fitur windows securitysalah satu fitur keamanan windows10kesalahan dalam aplikasi atau program...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Penyimpanan data online
  2. Platform untuk belajar atau kursus online
  3. Layanan pengiriman barang berbasis digital
  4. Aktivitas jual-beli tanpa uang tunai
  5. Uang digital yang digunakan secara global
  6. Pembayaran digital via ponsel
  7. Teknologi untuk transaksi cepat dan aman
  8. Promosi produk melalui media sosial
  9. Model bisnis online berbasis internet
  10. Platform untuk membangun toko online
  11. Teknologi komunikasi internet cepat
Down
  1. Platform jual-beli online
  2. , Layanan streaming konten digital
  3. Sistem manajemen konten website
  4. ,Perangkat lunak untuk mengelola bisnis online
  5. , Analisis data untuk strategi bisnis digital
  6. Sistem keamanan data digital
  7. Alat pembayaran otomatis di toko online
  8. Teknologi untuk mengenali wajah atau suara
  9. Layanan transportasi berbasis aplikasi

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

FIT_Vocab.JT 2013-05-15

FIT_Vocab.JT crossword puzzle
Across
  1. picture for a business
  2. internet service provider
  3. headphone port
  4. TB
  5. online presentation maker
  6. Wireless Fidelity
  7. flash drive, disc
  8. who is asking, what they asking, why are they asking
  9. Google Bing Yahoo
  10. flash drive plug in
  11. online protection
  12. GB
  13. smallest storage amount
  14. 3g 4g
  15. MG
Down
  1. light emitting diode
  2. speakers, printer
  3. cd drive
  4. computer screen
  5. Safari, iTunes, iMovie, App Store
  6. central circuit board
  7. main engine of computer
  8. central processing unit
  9. National Cyber Security Alliance
  10. online manners
  11. Random Access Memory
  12. KB
  13. eight bits
  14. liquid crystal display

29 Clues: TBKBGBMG3g 4gcd driveeight bitsheadphone portonline mannerscomputer screenspeakers, printerWireless Fidelityflash drive, discGoogle Bing Yahooonline protectionflash drive plug inlight emitting diodeRandom Access Memorycentral circuit boardpicture for a businessliquid crystal displaymain engine of computercentral processing unit...

Cybersecurity Terms Crossword Puzzle 2024-02-28

Cybersecurity Terms Crossword Puzzle crossword puzzle
Across
  1. Secure connection for private browsing
  2. Hostage-taking malware for files
  3. Vulnerability before the fix
  4. Identity verification for access
  5. Computer virus and harmful software
  6. Guard against harmful computer viruses
  7. Protecting digital systems and data
  8. Monitor for malicious activities
  9. Deceptive emails for sensitive data
Down
  1. Deliberate act to disrupt systems
  2. Malicious software's harmful action
  3. Secretly records keystrokes for theft
  4. System's exploitable weak point
  5. Network traffic gatekeeper and monitor
  6. Secret entry to bypass security
  7. Impersonation for unauthorized access
  8. Secure data with secret code
  9. Authorized entities' access list
  10. Flood of traffic to disrupt
  11. Software update to fix vulnerabilities

20 Clues: Flood of traffic to disruptVulnerability before the fixSecure data with secret codeSystem's exploitable weak pointSecret entry to bypass securityHostage-taking malware for filesIdentity verification for accessAuthorized entities' access listMonitor for malicious activitiesDeliberate act to disrupt systemsMalicious software's harmful action...

Technology 2023-06-11

Technology crossword puzzle
Across
  1. (Step-by-step problem-solving procedure)
  2. (Global computer network)
  3. (Intelligence that mimics human behavior)
  4. (Securing data with codes)
  5. (Global Positioning System)
  6. (Pocket-sized mobile device)
  7. (Identification based on unique human characteristics)
  8. (Remote data storage and computing)
  9. (Wireless network connectivity)
  10. (Unmanned aerial vehicles)
  11. (Process of making systems operate automatically)
Down
  1. (Protection of computer systems)
  2. (Electronic data processing machine)
  3. (Distributed digital ledger)
  4. (Simulated or computer-generated)
  5. (Enhancement of real-world experiences with digital content)
  6. (Manipulation of matter at the atomic and molecular scale)
  7. (Field of building and programming robots)
  8. Printing (Additive manufacturing process)
  9. Data (Large sets of complex data)

20 Clues: (Global computer network)(Securing data with codes)(Unmanned aerial vehicles)(Global Positioning System)(Distributed digital ledger)(Pocket-sized mobile device)(Wireless network connectivity)(Protection of computer systems)(Simulated or computer-generated)Data (Large sets of complex data)(Remote data storage and computing)...

Wedding Crossword 2024-11-18

Wedding Crossword crossword puzzle
Across
  1. Where Bride was working when the couple met
  2. Amanda's middle name
  3. Bride’s favorite cuisine
  4. Month of the proposal
  5. Amanda's birth month
  6. Bride’s profession
  7. Location of the wedding venue
  8. Couple's favorite fantasy series
  9. Bride's Eye Color
  10. Groom’s favorite holiday
  11. Groom’s favorite takeout
Down
  1. Where the couple get engaged
  2. Russ' middle name
  3. Bride's favorite outdoor activity
  4. Russ' birth month
  5. Bride’s favorite holiday
  6. What Russ is in school for
  7. Groom's Eye Color
  8. # of years couple has been together
  9. Where Groom was born
  10. Couple's favorite hobby
  11. Their cat's name
  12. Groom's favorite hobby
  13. Where Bride was born
  14. Honeymoon Destination

25 Clues: Their cat's nameRuss' middle nameRuss' birth monthGroom's Eye ColorBride's Eye ColorBride’s professionAmanda's middle nameWhere Groom was bornAmanda's birth monthWhere Bride was bornMonth of the proposalHoneymoon DestinationGroom's favorite hobbyCouple's favorite hobbyBride’s favorite holidayBride’s favorite cuisineGroom’s favorite holiday...

2025 CSS GRADUATES AND NEW MEMBERS 2025-05-20

2025 CSS GRADUATES AND NEW MEMBERS crossword puzzle
Across
  1. Loves pina coladas and getting caught in the rain
  2. Johnston High School
  3. Kristina Davis
  4. BS IT Cybersecurity, University North Georgia
  5. University of Nebraska Grad
  6. Loves all things tennis, crafting and trying to become a better golfer
  7. M.S. Information Technology
  8. Supports Client Promos and Quality Control
  9. Andrew Pare
  10. Mitchell Harvey Jr.
Down
  1. Penn State Grad
  2. B.S. Marine Biology
  3. Jamie Worthy
  4. HS Diploma & CNA certification
  5. Where Michael Canizares graduated from
  6. Supports Production Validation and Quality Control
  7. Shaurya Chauhan
  8. May have a partridge in a pear tree
  9. Northview High Grad
  10. Where Sanjitha Eswaramoorthy graduated
  11. Loves short walks to the beer fridge

21 Clues: Andrew PareJamie WorthyKristina DavisPenn State GradShaurya ChauhanB.S. Marine BiologyNorthview High GradMitchell Harvey Jr.Johnston High SchoolUniversity of Nebraska GradM.S. Information TechnologyHS Diploma & CNA certificationMay have a partridge in a pear treeLoves short walks to the beer fridgeWhere Michael Canizares graduated from...

Jobs 2024-12-11

Jobs crossword puzzle
Across
  1. Grows crops or raises animals
  2. Serves food and drinks at a restaurant
  3. Designs and writes software programs
  4. Builds and maintains websites
  5. Manages networks and servers
  6. Devivers mail and packages
  7. Enforces laws and keeps order
  8. Treats people`s illnesses
  9. Bakes bread, cake, and pastries
  10. Cuts and styles hair
Down
  1. Helps students learn in school
  2. Codes mobile applications
  3. test software for errors
  4. Protects systems from hackers
  5. Oversees technology stategy in a company
  6. Designs user interfaces and experiences
  7. Create artificial intelligence solutions
  8. Analyzes data to provide insights
  9. Drives a vehicle for passengers
  10. Sells goods in a shop

20 Clues: Cuts and styles hairSells goods in a shoptest software for errorsCodes mobile applicationsTreats people`s illnessesDevivers mail and packagesManages networks and serversGrows crops or raises animalsProtects systems from hackersBuilds and maintains websitesEnforces laws and keeps orderHelps students learn in schoolDrives a vehicle for passengers...

Cyber Safety 2024-08-06

Cyber Safety crossword puzzle
Across
  1. - Bullying online
  2. - Being safe online
  3. - Putting agressive presure on someone
  4. - Stands up against bullies
Down
  1. - Protecting systems
  2. - Supporting bullies
  3. - Sites that are accessed using a web browser
  4. - Connected computers share resources

8 Clues: - Bullying online- Being safe online- Protecting systems- Supporting bullies- Stands up against bullies- Connected computers share resources- Putting agressive presure on someone- Sites that are accessed using a web browser

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Man's best friend
  3. Steals data and holds it for ransom
  4. Has a trunk
  5. Flying mammal
Down
  1. Large marsupial
  2. What are we here for?
  3. What is my name?

8 Clues: Has a trunkFlying mammalLarge marsupialWhat is my name?Man's best friendLikes to chase miceWhat are we here for?Steals data and holds it for ransom

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what I have as another pet
  3. what i think my future job is going to be
  4. pc
  5. what is aphone
Down
  1. where i used to live
  2. what i do
  3. something better than cookies
  4. what is the base of a computer
  5. what I have as a pet

10 Clues: pcwhat i dowhat is aphoneMy favorite gamewhere i used to livewhat I have as a petwhat I have as another petsomething better than cookieswhat is the base of a computerwhat i think my future job is going to be

CYBER SECURITY 2023-09-20

CYBER SECURITY crossword puzzle
Across
  1. to steal sensitive information
  2. malware
  3. protection of computing systems and data that these systems store
  4. set of rules
Down
  1. the virtual and dynamic space created by the machine clones
  2. protecting info.from inauthorized parties
  3. attack data to web application
  4. malicious software
  5. attack uses trial & attack method
  6. automated process

10 Clues: malwareset of rulesautomated processmalicious softwareto steal sensitive informationattack data to web applicationattack uses trial & attack methodprotecting info.from inauthorized partiesthe virtual and dynamic space created by the machine clonesprotection of computing systems and data that these systems store

Digital Literacy Vocabulary 2025-10-21

Digital Literacy Vocabulary crossword puzzle
Across
  1. data tracking system to make suggestions to the viewer
  2. everything you do online
  3. think like a human
  4. protection online
  5. realistic but fake video
  6. reputable source has this
Down
  1. critical thinking when reading news online
  2. having a certain viewpoint towards something
  3. a place where information comes from
  4. false or misleading information

10 Clues: protection onlinethink like a humaneverything you do onlinerealistic but fake videoreputable source has thisfalse or misleading informationa place where information comes fromcritical thinking when reading news onlinehaving a certain viewpoint towards somethingdata tracking system to make suggestions to the viewer

TTS TIK Neysha 8D 2025-10-12

TTS TIK Neysha 8D crossword puzzle
Across
  1. proses masuk ke sebuah sistem
  2. ketika perangkat berhenti merespon secara permanen
  3. tempat penyimpanan file
  4. perangkat lunak yang bisa merusak sistem
  5. perlindungan terhadap ancaman digital
Down
  1. otak komputer, nama lain CPU
  2. jenis malware yang bisa menyebar dan merusak data
  3. sebutan program komputer
  4. sebutan alamat web
  5. salinan data untuk cadangan

10 Clues: sebutan alamat webtempat penyimpanan filesebutan program komputersalinan data untuk cadanganotak komputer, nama lain CPUproses masuk ke sebuah sistemperlindungan terhadap ancaman digitalperangkat lunak yang bisa merusak sistemjenis malware yang bisa menyebar dan merusak dataketika perangkat berhenti merespon secara permanen

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. A device you should not plug in
  2. Last name of the head of IT
  3. Location of the Bank's Disaster Recovery Site
  4. Type of an Operating system
  5. key word used to send secure email
  6. Programs installed on your phone are called?
  7. Think before you -- ?
Down
  1. A type of malware that encrypts your file
  2. Something you should never share
  3. A type of an email scam
  4. Department to call for computer problem
  5. Location of the Bank's head quarter
  6. Northern Bank's Mission Statement
  7. Password should always be?
  8. A way to access the bank resources remotely

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Something you should never share
  2. A type of an email scam
  3. Location of the Bank's Disaster Recovery Site
  4. Northern Bank's Mission Statement
  5. Last name of the head of IT
  6. Department to call for computer problem
  7. Location of the Bank's head quarter
  8. Password should always be?
Down
  1. A type of malware that encrypts your file
  2. Type of an Operating system
  3. Think before you -- ?
  4. A way to access the bank resources remotely
  5. Programs installed on your phone are called?
  6. key word used to send secure email
  7. A device you should not plug in

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Type of an Operating systemLast name of the head of ITA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity Week 2025 2025-08-27

Cybersecurity Week 2025 crossword puzzle
Across
  1. Publishing someone's personal information online without their consent
  2. Users are tricked into revealing sensitive information to gain access to a system
  3. A form a social engineering that is done via email or other messages
  4. Area of study where machines are programmed to reason, learn and act similar to human intelligence
  5. Software that causes damage to data and software
  6. A network device used to separate an internal network from an external network, usually the Internet
  7. Software to disrupt, damage or gain unauthorised access to a computer system
  8. Any or a combination of usernames, passwords or biometrics to access a system
Down
  1. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
  2. A technique used to disguise the sender's identity to gain sensitive information
  3. A method of writing that disguises a message
  4. Type of threat that has the potential to or cause actual damage that can be done to an organisation by a person with authorized access to systems
  5. Malicious software that prevents access to a system until a ransom is paid
  6. Sofware that automatically subjects a user to advertisements
  7. A person who uses computers to gain unauthorized access to data

15 Clues: A method of writing that disguises a messageSoftware that causes damage to data and softwareSofware that automatically subjects a user to advertisementsA person who uses computers to gain unauthorized access to dataA form a social engineering that is done via email or other messages...

Week 6-7 spelling 2016-03-01

Week 6-7 spelling crossword puzzle
Across
  1. a decorative plate to finish motor vehicles
  2. to be someone's favorite
  3. a device to look at stars
  4. you usually hit BALLS with this
  5. to put up with something
  6. to think or believe that something is true
  7. to cancel something
Down
  1. to blend in
  2. to be safe online
  3. a device to look at very very small things
  4. to make a continuous low humming sound
  5. an area of land
  6. to make up your mind
  7. to secretly get married
  8. the past tense of strive

15 Clues: to blend inan area of landto be safe onlineto cancel somethingto make up your mindto secretly get marriedto be someone's favoriteto put up with somethingthe past tense of strivea device to look at starsyou usually hit BALLS with thisto make a continuous low humming sounda device to look at very very small things...

PeopleTec Engineering Week 2024-02-12

PeopleTec Engineering Week crossword puzzle
Across
  1. operations security
  2. exploratory programming marathon session
  3. use of scientific discoveries for practical purposes
  4. people first, technology always
  5. cyberattack prevention measures
  6. composing instructions for a computer to follow
  7. individual that provides products or services to the government
  8. Information technology role responsible for data security
Down
  1. representation of a real-world system
  2. training algorithms to create self-learning models
  3. designing and experimenting with a model
  4. connected computer systems
  5. professional problem solver
  6. next generation...
  7. document attesting to a level of achievement

15 Clues: next generation...operations securityconnected computer systemsprofessional problem solverpeople first, technology alwayscyberattack prevention measuresrepresentation of a real-world systemexploratory programming marathon sessiondesigning and experimenting with a modeldocument attesting to a level of achievement...

Cyberbullying 2024-05-02

Cyberbullying crossword puzzle
Across
  1. Platforms where cyberbullying often occurs.
  2. Connected to the internet.
  3. Malicious digital intrusion.
  4. Online harassment targeting high school students.
  5. Person who intimidates or mistreats others.
  6. Persistent online abuse or intimidation.
  7. Measures taken to protect against online threats.
Down
  1. Individual singled out for cyberbullying.
  2. Moral principles governing online behavior.
  3. Person who posts provocative or offensive messages.
  4. Without a known identity.
  5. Someone subjected to cyberbullying.
  6. Illegal activities carried out online.
  7. Relating to electronic technology.
  8. Online space for real-time communication.

15 Clues: Without a known identity.Connected to the internet.Malicious digital intrusion.Relating to electronic technology.Someone subjected to cyberbullying.Illegal activities carried out online.Persistent online abuse or intimidation.Individual singled out for cyberbullying.Online space for real-time communication....

Browsing safely 2025-06-19

Browsing safely crossword puzzle
Across
  1. hoaxing or misleading
  2. harming or harassing using information technology
  3. illegal entry in computer
  4. illegal method to get money
  5. security to prevent cybercrime
  6. disturbs normal functioning of computer
  7. act of stealing and misusing someone's personal information
  8. building a face friendship
  9. any information about a person can be found
  10. conduct a terrosism by computer
Down
  1. protects from virus
  2. any criminal activity intended to harm anyone using computer
  3. complaining against cybercrime
  4. that helps in preventing unauthorised access to your computer
  5. protects from cyber crime

15 Clues: protects from virushoaxing or misleadingillegal entry in computerprotects from cyber crimebuilding a face friendshipillegal method to get moneycomplaining against cybercrimesecurity to prevent cybercrimeconduct a terrosism by computerdisturbs normal functioning of computerany information about a person can be found...

Brain Harvest 2025-09-18

Brain Harvest crossword puzzle
Across
  1. Connection of computers… or professionals.
  2. Kevin Costner baseball arena.
  3. The way kids sit these days, with applesauce (2 wds).
  4. Psychological bias effect, or glow above head.
  5. Business advantage… or a physics principle.
  6. First line of cybersecurity defense.
Down
  1. Bavarian beer-and-brats festival.
  2. Exit plan to gather crops?
  3. Cult-classic 1993 witchy Disney movie (2 wds).
  4. Patron saint of the internet.
  5. The Friendly Ghost.
  6. Late-night work shift.
  7. Balance sheet positives.
  8. Spooky arachnid creation.
  9. Payoff metric for a project, abbr.

15 Clues: The Friendly Ghost.Late-night work shift.Balance sheet positives.Spooky arachnid creation.Exit plan to gather crops?Kevin Costner baseball arena.Patron saint of the internet.Bavarian beer-and-brats festival.Payoff metric for a project, abbr.First line of cybersecurity defense.Connection of computers… or professionals....

Crossword - Harold Benjamin 2023-09-08

Crossword - Harold Benjamin crossword puzzle
Across
  1. Financial institution licensed
  2. Stationery company
  3. Fraudulent practice of acquiring sensitive data via emails
  4. Document sent via telecommunications
  5. Concealing management of illegally earnt money
  6. Protection of computer systems and networks
  7. Secured lending partner (last name)
  8. Goddess of health
  9. Client booking system at HH
  10. Transfer of property from one to another
  11. Private client partner (last name)
Down
  1. Equitable and fair treatment
  2. Operations director (last name)
  3. Dishonest persuasion with a gift or money
  4. Process of taking legal action
  5. Emailing system at HB
  6. Folder of court documents
  7. Offsite archiving company
  8. Case management system at HB
  9. Qualified legal professional
  10. Managing partner (last name)

21 Clues: Goddess of healthStationery companyEmailing system at HBFolder of court documentsOffsite archiving companyClient booking system at HHEquitable and fair treatmentCase management system at HBQualified legal professionalManaging partner (last name)Financial institution licensedProcess of taking legal actionOperations director (last name)...

TTS INFORMATIKA DARA CANTIKA DINSKY X-G 2025-04-10

TTS INFORMATIKA DARA CANTIKA DINSKY X-G crossword puzzle
Across
  1. tugas cybersecurity engineer
  2. tujuan diseminasi konten
  3. urutan hasil pencarian
  4. tugas web developer
  5. manfaat pendaftaran HAKI
  6. menyimpan data website
  7. tugas programmer
  8. contoh search engine
  9. konsekuensi pelanggaran HAKI
  10. metode validasi konten negatif
  11. apa itu merek dagang?
  12. konsekuensi konten negatif
  13. platform diseminasi konten digital
  14. tugas data scientist
  15. tantangan validasi konten negatif
Down
  1. kepentingan unsur budaya
  2. tujuan validasi konten negatif
  3. pencegahan pelanggaran budaya
  4. tugas search engine
  5. tugas database administrator
  6. apa itu hak cipta?
  7. apa itu konten negatif?
  8. contoh konten digital berunsur budaya
  9. apa itu paten?
  10. proses pencarian data website

25 Clues: apa itu paten?tugas programmerapa itu hak cipta?tugas search enginetugas web developercontoh search enginetugas data scientistapa itu merek dagang?urutan hasil pencarianmenyimpan data websiteapa itu konten negatif?kepentingan unsur budayatujuan diseminasi kontenmanfaat pendaftaran HAKIkonsekuensi konten negatiftugas cybersecurity engineer...

Jessie & Kurt 2025-03-24

Jessie & Kurt crossword puzzle
Across
  1. Jessie's profession
  2. Kurt's middle name
  3. The proposal location
  4. Kurt's favorite pizza
  5. What College did Jessie go to
  6. How did they meet
  7. What month did they get engaged
  8. First date location
  9. Jessie's middle name
  10. Kurt's profession
  11. How many siblings does Kurt have
Down
  1. What TV show are they currently binging
  2. Where was their first vacation
  3. Jessies favorite food
  4. Where was their last trip together
  5. Favorite hobby together
  6. Jessie's birthday month
  7. Kurt's birthday month
  8. What College did Kurt go to
  9. What is their pet's name
  10. How many years have they been together
  11. How many siblings does Jessie have

22 Clues: How did they meetKurt's professionKurt's middle nameJessie's professionFirst date locationJessie's middle nameJessies favorite foodThe proposal locationKurt's birthday monthKurt's favorite pizzaFavorite hobby togetherJessie's birthday monthWhat is their pet's nameWhat College did Kurt go toWhat College did Jessie go toWhere was their first vacation...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Promosi produk melalui media sosial
  2. Aktivitas jual-beli tanpa uang tunai
  3. Layanan pengiriman barang berbasis digital
  4. Sistem keamanan data digital
  5. Uang digital yang digunakan secara global
  6. Platform untuk membangun toko online
  7. Teknologi untuk mengenali wajah atau suara
  8. Penyimpanan data online
Down
  1. , Analisis data untuk strategi bisnis digital
  2. Platform untuk belajar atau kursus online
  3. Alat pembayaran otomatis di toko online
  4. Pembayaran digital via ponsel
  5. Teknologi komunikasi internet cepat
  6. Model bisnis online berbasis internet
  7. Platform jual-beli online
  8. Teknologi untuk transaksi cepat dan aman
  9. , Layanan streaming konten digital
  10. Sistem manajemen konten website
  11. ,Perangkat lunak untuk mengelola bisnis online
  12. Layanan transportasi berbasis aplikasi

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

Cybersecurity 2023-08-14

Cybersecurity crossword puzzle
Across
  1. Designed to deny a user or organisation access to files on their computer.
  2. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  3. An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
  1. Intrusive software developed to steal data and damage or destroy computers and computer systems.
  2. When attackers attempt to trick users into doing 'the wrong thing.
  3. Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.

6 Clues: When attackers attempt to trick users into doing 'the wrong thing.Designed to deny a user or organisation access to files on their computer.Intrusive software developed to steal data and damage or destroy computers and computer systems.The act of compromising digital devices and networks through unauthorized access to an account or computer system....

Cybersecurity 2024-02-29

Cybersecurity crossword puzzle
Across
  1. is a cyber attack intended to redirect a website's traffic to another, fake site
  2. PIN numbers.
  3. is the act of creating a scenario where the victim gives out personal information
Down
  1. is observing a person's private information over their shoulder e.g. cashpoint
  2. is a technique of fraudulently obtaining private information, often using email or SMS.
  3. Malicious software is called?

6 Clues: PIN numbers.Malicious software is called?is observing a person's private information over their shoulder e.g. cashpointis a cyber attack intended to redirect a website's traffic to another, fake siteis the act of creating a scenario where the victim gives out personal information...

Cybersecurity 2025-11-24

Cybersecurity crossword puzzle
Across
  1. Malware that attaches to files and spreads when the files are shared
  2. Raw facts or figures that can be collected and stored
  3. bullying online
Down
  1. Fake emails or messages designed to trick people into revealing personal information
  2. people looking over your shoulder
  3. Software that automatically displays unwanted advertisements

6 Clues: bullying onlinepeople looking over your shoulderRaw facts or figures that can be collected and storedSoftware that automatically displays unwanted advertisementsMalware that attaches to files and spreads when the files are sharedFake emails or messages designed to trick people into revealing personal information

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

NAVFAC's Ten Capabilities 2023-02-13

NAVFAC's Ten Capabilities crossword puzzle
Across
  1. ________Facilities and Equipment Engineering
  2. detailed coordination of a complex operation involving people, facilities, or supplies.
  3. NAVFAC Capabilities: ______ & Construction
  4. NEPA requirement: Environmental __________
  5. a proposed or planned undertaking
  6. NAVFAC Capabilities: Environmental ___________
  7. Real Estate _________ and Management
  8. Basic physical and organizational structures and facilities
  9. ________ Handling Ashore Procurement
Down
  1. Protection against criminal or unauthorized use of electronic data
  2. Military Construction Acronym
  3. _______ and Facilities Operations
  4. ___________ Conservation: Health assessment of natural and cultural resources
  5. NAVFAC Capabilities: _________ & Facility Operations
  6. _________ Vehicles provide transportation services

15 Clues: Military Construction Acronym_______ and Facilities Operationsa proposed or planned undertakingReal Estate _________ and Management________ Handling Ashore ProcurementNAVFAC Capabilities: ______ & ConstructionNEPA requirement: Environmental __________________Facilities and Equipment EngineeringNAVFAC Capabilities: Environmental ___________...

Issue 1 2023-04-14

Issue 1 crossword puzzle
Across
  1. Teacher in charge of MagTV
  2. Farm behind Magnolia
  3. Water sports (not necessarily just swimming)
  4. Vietnamese Dual Language Immersion Program
  5. Magnolia _______ Institute
  6. City we're located in
Down
  1. Girls' soccer and ________ made it to CIF
  2. The classic writing tool for students (that always seems to go missing when you need it)
  3. Book and _____ Club
  4. Associated Student Body
  5. Room 404 teacher
  6. Medical pathway, BITA, and JROTC are ___ programs
  7. Teacher in charge of Theater classes

13 Clues: Room 404 teacherBook and _____ ClubFarm behind MagnoliaCity we're located inAssociated Student BodyTeacher in charge of MagTVMagnolia _______ InstituteTeacher in charge of Theater classesGirls' soccer and ________ made it to CIFVietnamese Dual Language Immersion ProgramWater sports (not necessarily just swimming)...

Nicole & Sam 2023-04-26

Nicole & Sam crossword puzzle
Across
  1. What is Sam's favorite color?
  2. Nicole's major in college
  3. The couple's favorite football team
  4. Where they went the night they met
  5. Sam's major in college
  6. The bride's new last name
Down
  1. Groom's middle name
  2. Who is the couple's dog?
  3. Bride's first name
  4. Name of restaurant where the couple had their first date
  5. Where Sam went to college
  6. Where Nicole went to college
  7. Who made the first move?
  8. number of years together

14 Clues: Bride's first nameGroom's middle nameSam's major in collegeWho is the couple's dog?Who made the first move?number of years togetherWhere Sam went to collegeNicole's major in collegeThe bride's new last nameWhere Nicole went to collegeWhat is Sam's favorite color?Where they went the night they metThe couple's favorite football team...

words related to AI 2025-10-25

words related to AI crossword puzzle
Across
  1. teaching an AI model using examples
  2. step-by-step process AI uses to make decisions
  3. the ability to identify objects or faces
  4. moral principles guiding decisions
  5. unfairness in AI decisions
  6. protection against digital attacks
Down
  1. the ability to think and reason
  2. use of machines to do human tasks
  3. information collected for analysis
  4. global computer network
  5. overeliance on technology
  6. AI program that talks with users
  7. protection of personal information
  8. physical AI machine

14 Clues: physical AI machineglobal computer networkovereliance on technologyunfairness in AI decisionsthe ability to think and reasonAI program that talks with usersuse of machines to do human tasksinformation collected for analysismoral principles guiding decisionsprotection of personal informationprotection against digital attacks...

Cybersecurity 2022-08-15

Cybersecurity crossword puzzle
Across
  1. Flying mammal
  2. The United States' first state-specific consumer privacy law
  3. Has a trunk
  4. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceThe United States' first state-specific consumer privacy law

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

Cybersecurity 2024-01-09

Cybersecurity crossword puzzle
Across
  1. Software update to fix vulnerabilities
  2. A secret code to access your account
  3. Malicious code that can harm your computer
Down
  1. Process of converting data to prevent unauthorized access
  2. Type of social engineering attack
  3. Protective barrier against unauthorized access

6 Clues: Type of social engineering attackA secret code to access your accountSoftware update to fix vulnerabilitiesMalicious code that can harm your computerProtective barrier against unauthorized accessProcess of converting data to prevent unauthorized access

Cybersecurity 2022-09-29

Cybersecurity crossword puzzle
Across
  1. An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
  2. Attacker invents a scenario in order to convince the victim to give them data or money.
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. Sending an email designed to trick the recipient into giving away personal information
  2. Any malware that misleads users of its true intent.
  3. Someone that gains unauthorised access to a device or sever.

6 Clues: Any malware that misleads users of its true intent.Someone that gains unauthorised access to a device or sever.Sending an email designed to trick the recipient into giving away personal informationAttacker invents a scenario in order to convince the victim to give them data or money....

Digital Learning 2025-10-13

Digital Learning crossword puzzle
Across
  1. — Machines that learn and think
  2. — Using tech to improve processes
  3. — Protection from online threats
  4. — Making new things with tech
  5. — Working as a team online
Down
  1. — Skill to read and use information well
  2. — Channels for stories and news online
  3. — Smooth and confident tech use
  4. — Abilities for digital success
  5. — Tools that help communication and info
  6. — Turning paper into data
  7. — Gadgets that connect us digitally
  8. — Doing right with online actions
  9. — Innovations shaping the future

14 Clues: — Turning paper into data— Working as a team online— Making new things with tech— Smooth and confident tech use— Abilities for digital success— Machines that learn and think— Protection from online threats— Innovations shaping the future— Using tech to improve processes— Doing right with online actions— Gadgets that connect us digitally...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Topic 1 - 4 Vocabulary 2026-02-13

Topic 1 - 4 Vocabulary crossword puzzle
Across
  1. Proof of purchase
  2. A group of related episodes
  3. Money you can spend in a shop instead of cash
  4. Visual images used to explain information
  5. Being friendly and welcoming
  6. The main person in a story
  7. An official public statement
  8. A custom passed down through generations
  9. A system that chooses online content
Down
  1. Protection against digital attacks
  2. Rules of a company
  3. A short news titl
  4. To look at websites
  5. A regularly updated online journal
  6. A public display of art
  7. A shop or manufacturer guarantee
  8. Money returned to a customer
  9. Not working properly

18 Clues: Proof of purchaseA short news titlRules of a companyTo look at websitesNot working properlyA public display of artThe main person in a storyA group of related episodesBeing friendly and welcomingMoney returned to a customerAn official public statementA shop or manufacturer guaranteeProtection against digital attacks...

Tech Talk 2024-03-23

Tech Talk crossword puzzle
Across
  1. Machine mimicking human intelligence
  2. Machines that work like humans
  3. Global network of computers
  4. A place you can visit without leaving your chair
  5. Math behind problem-solving
  6. Can be plug in many devices
  7. The brain of a computer
  8. Protects your computer from attacks
Down
  1. A field that protect computer systems,networks from digital attacks.
  2. Graphics processor unit
  3. Physical parts of a computer
  4. Getting a file from the internet
  5. A collection of data
  6. Malicious software
  7. The programs of computer
  8. Needs a mouse and keyboard

16 Clues: Malicious softwareA collection of dataGraphics processor unitThe brain of a computerThe programs of computerNeeds a mouse and keyboardGlobal network of computersMath behind problem-solvingCan be plug in many devicesPhysical parts of a computerMachines that work like humansGetting a file from the internetProtects your computer from attacks...

Cybersecurity : Keselamatan Sosial Media 2023-06-02

Cybersecurity : Keselamatan Sosial Media crossword puzzle
Across
  1. Fikir sebelum __
  2. Kebiasaan phishing dilakukan melalui __
  3. Sejenis malware yang menyerang komputer sehingga dituntut tebusan
  4. Set strict __ pada akaun media sosial
  5. Perbuatan mencuri maklumat peribadi seseorang
  6. Sejenis scam menggunakan e-mel atau mesej
  7. Sejenis bully yang berlaku dalam talian
Down
  1. Sosial media merupakan satu rangkaian __
  2. Cyberbully dilakukan melalui text, imej dan __
  3. Tutup __ lama
  4. Maklumat peribadi
  5. Amalan melindungi rangkaian daripada serangan digital

12 Clues: Tutup __ lamaFikir sebelum __Maklumat peribadiSet strict __ pada akaun media sosialKebiasaan phishing dilakukan melalui __Sejenis bully yang berlaku dalam talianSosial media merupakan satu rangkaian __Sejenis scam menggunakan e-mel atau mesejPerbuatan mencuri maklumat peribadi seseorangCyberbully dilakukan melalui text, imej dan __...

Lesson 1.3 2023-03-08

Lesson 1.3 crossword puzzle
Across
  1. they mitigate vulnerabilities
  2. its top priority is make money
  3. personal identity information
  4. financial information
Down
  1. it's a byproduct of technological change
  2. bugs and …
  3. arise new security issues
  4. a weakness or a lack of countermeasures

8 Clues: bugs and …financial informationarise new security issuesthey mitigate vulnerabilitiespersonal identity informationits top priority is make moneya weakness or a lack of countermeasuresit's a byproduct of technological change

Technology in PMI 2024-04-19

Technology in PMI crossword puzzle
Across
  1. problem solver, creator
  2. a machine that compresses the leaves
  3. new creative ideas
Down
  1. design trial phase
  2. online safety
  3. base or foundation
  4. a simplified model or imitation of an object or a process
  5. detects changes

8 Clues: online safetydetects changesdesign trial phasebase or foundationnew creative ideasproblem solver, creatora machine that compresses the leavesa simplified model or imitation of an object or a process

NCSAM 2021 Crossword 2021-08-05

NCSAM 2021 Crossword crossword puzzle
Across
  1. TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
  2. Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
  3. What malware propagates without a host program?
  4. Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
  5. A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
  6. What does the A in CAP stand for?
  7. What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
  8. What malware encrypts files and demands money for the decryption key?
  9. This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
  1. What is the last name of the TIAA Bank CISO?
  2. A good way to secure your devices at home is by regularly _______
  3. What type of attack do patches not prevent against?
  4. The probability of exposure or loss of assets is considered what?
  5. What type of information is private and identifies people?
  6. What technology allows information sent over the internet to remain private or confidential?
  7. What do most modern websites use to provide encryption?
  8. Which industry is most targeted by social engineers?
  9. Multifactor _____ adds extra layers of security when logging in.
  10. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.

19 Clues: What does the A in CAP stand for?What is the last name of the TIAA Bank CISO?What malware propagates without a host program?What type of attack do patches not prevent against?Which industry is most targeted by social engineers?What do most modern websites use to provide encryption?This year Cyber has rebranded as TIAA _____ Cybersecurity...

Cybersecurity 2020-08-24

Cybersecurity crossword puzzle
Across
  1. Proposito informatico de detectar virus
  2. Estafa que busca sacrte datos bancarios, o tarjetas
  3. Se quedan con tu informacion como la de ingreso, nombre de usuario no espian
Down
  1. Sofwtare malo que esta hecho para meterse infiltradamente a una computadora
  2. Programas que no son originales y que te cambian y inhabilitan el acceso a tu computadora
  3. Hace que no pueda entrar nadie infiltrado a tu computadora

6 Clues: Proposito informatico de detectar virusEstafa que busca sacrte datos bancarios, o tarjetasHace que no pueda entrar nadie infiltrado a tu computadoraSofwtare malo que esta hecho para meterse infiltradamente a una computadoraSe quedan con tu informacion como la de ingreso, nombre de usuario no espian...

Cybersecurity 2025-03-28

Cybersecurity crossword puzzle
Across
  1. artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
  2. The practice of protecting systems, networks, and programs from digital attacks
  3. a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
  1. When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
  2. how many KUB(TYREX) stations in PTTEP YADANA Asset in total
  3. What is the minimum number of characters for PTTEP YADANA Asset user accounts

6 Clues: how many KUB(TYREX) stations in PTTEP YADANA Asset in totalWhat is the minimum number of characters for PTTEP YADANA Asset user accountsThe practice of protecting systems, networks, and programs from digital attacksWhen you got a phishing email, you should (_____) by clicking report phishing button in Outlook....

Puzzle #4 2024-05-07

Puzzle #4 crossword puzzle
Across
  1. corrective action/suggestions for improvement
  2. proof
  3. process effected by management to provide reasonable assurance
  4. daily paid union
  5. an illegal act for financial or personal gain
  6. protecting sensitive information from unauthorised persons
Down
  1. monthly paid union
  2. formal statement of organisation's goal and objectives
  3. protecting systems, networks, and programs from digital attacks
  4. proper disclosure of financial information
  5. competing interest
  6. highest governing body
  7. event/action that negatively affects the achievement of objectives

13 Clues: proofdaily paid unionmonthly paid unioncompeting interesthighest governing bodyproper disclosure of financial informationcorrective action/suggestions for improvementan illegal act for financial or personal gainformal statement of organisation's goal and objectivesprotecting sensitive information from unauthorised persons...

Xoxo 2024-12-23

Xoxo crossword puzzle
Across
  1. Home of the panthers
  2. Serial killer TV show
  3. My favorite shoe store
  4. My least favorite word
  5. A group of mutants
Down
  1. what I’d like to do to your bells
  2. Protection of the internet
  3. Fingers of the foot
  4. what is your best trait

9 Clues: A group of mutantsFingers of the footHome of the panthersSerial killer TV showMy favorite shoe storeMy least favorite wordwhat is your best traitProtection of the internetwhat I’d like to do to your bells

#InfraNet Cyber Awareness 2022-10-13

#InfraNet Cyber Awareness crossword puzzle
Across
  1. Security or house
  2. Password attack method
  3. Doesn'trequire a host file to replicate itself
  4. This horse can stampede your security defenses
  5. Who is responsible for cybersecurity
  6. Verifying identity
  7. Unauthorized access to a network
  8. Scrambling text into an unreadable format
  9. Similar to a password
Down
  1. Any crime committed electronically
  2. Watches where you go on the internet
  3. Multi-factor authentication
  4. Cyber awareness month
  5. Wireless technology using short-wave UHF radio waves
  6. Attack attempt to acquire personal information
  7. Prevents unauthorized access to or from a private network
  8. The address of a webpage
  9. Program that is designed to automate tasks
  10. Chief information security officer

19 Clues: Security or houseVerifying identityCyber awareness monthSimilar to a passwordPassword attack methodThe address of a webpageMulti-factor authenticationUnauthorized access to a networkAny crime committed electronicallyChief information security officerWatches where you go on the internetWho is responsible for cybersecurity...

Binalyze Crossword 2025-05-09

Binalyze Crossword crossword puzzle
Across
  1. The system or device under investigation in a forensic acquisition.
  2. What is the name of Binalyze’s new AI-powered tool?
  3. What was the name of Binalyze's first product designed to collect evidence from a single machine?
  4. A personality assessment framework that categorizes individuals based on dominant behavioral traits to improve workplace communication and collaboration.
  5. A cybersecurity specialist who creates and improves systems to detect malicious activity by analyzing behaviors, tuning detection rules, and staying ahead of evolving threats. ... Engineer
  6. At which conference did Binalyze win the Best Security Investigation Platform award?
Down
  1. Who at Binalyze is known for their passion for antique items?
  2. The type of log or trace left behind by users or malware that forensics experts analyze.
  3. At which competition did Binalyze win the Gold award in the Incident Analysis & Response Solution category?
  4. In Binalyze's guiding philosophy OODA, what does the letter D stand for?
  5. What is the name of the advanced analysis engine developed by the Binalyze team, designed to outperform rule-based tools like YARA and Sigma in analyzing cybersecurity incidents?
  6. In which Gartner category is Binalyze listed?

12 Clues: In which Gartner category is Binalyze listed?What is the name of Binalyze’s new AI-powered tool?Who at Binalyze is known for their passion for antique items?The system or device under investigation in a forensic acquisition.In Binalyze's guiding philosophy OODA, what does the letter D stand for?...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

4IR Technologies Pillars 2023-09-11

4IR Technologies Pillars crossword puzzle
Across
  1. 4IR Sense element (C)
  2. 4IR Sense element (I)
  3. 4IR Analysis element (C)
  4. 4IR Act element (3)
  5. 4IR Act element (A)
  6. 4IR Analysis element (B)
Down
  1. 4IR Sense element (C)
  2. 4IR Act element (S)
  3. 4IR Analysis element (A)
  4. 4IR Act element (A)

10 Clues: 4IR Act element (S)4IR Act element (3)4IR Act element (A)4IR Act element (A)4IR Sense element (C)4IR Sense element (C)4IR Sense element (I)4IR Analysis element (A)4IR Analysis element (C)4IR Analysis element (B)

ict 2023-09-16

ict crossword puzzle
Across
  1. unwanted and unsolicited email.
  2. machine that processes data.
  3. a structured collection of data.
  4. prevents data loss.
  5. writing code to instruct a computer.
  6. helps data find its way
  7. return to an initial state.
  8. Usually in one location.
  9. online storage and computing resources.
  10. blocks unwanted traffic
Down
  1. connects devices in a network.
  2. step-by-step procedure for solving a problem.
  3. wireless data transfer technology.
  4. programs that run on a computer.
  5. protecting computer systems from threats.
  6. a global network of connected computers.
  7. technology that allows data transmission without physical connections.
  8. keeps data secure.
  9. electroniconic communication method for sending and receiving messages.
  10. the global system of interconnected computer networks.

20 Clues: keeps data secure.prevents data loss.helps data find its wayblocks unwanted trafficUsually in one location.return to an initial state.machine that processes data.connects devices in a network.unwanted and unsolicited email.a structured collection of data.programs that run on a computer.wireless data transfer technology....

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Cybersecurity Awareness Month 2024-10-18

Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. A ____ test is performed to identify vulnerabilities in a system.
  3. This form of attack tries to trick you into giving personal information via fake websites or emails.
  4. A phishing attack done over the phone.
  5. The process of verifying someone's identity.
  6. A strong, complex one helps protect your accounts.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A type of phishing attack done over text messages.
  3. A software that fights off malicious viruses and malware.
  4. The backbone of secure communication online, abbreviated as SSL.
  5. Protection against unauthorized changes to data.
  6. Multi-Factor Authentication is shortened to this.
  7. A harmful program disguised as legitimate software.
  8. A malicious code that spreads from computer to computer.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

SANS CyberSecurity Crossword 2021-01-11

SANS CyberSecurity Crossword crossword puzzle
Across
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. An attempt by hackers to damage or destroy a computer network or system.
  3. Computational Procedure
  4. Conceals the data’s original meaning to prevent it from being known or used.
  5. A software exploit that involves a combination of attacks against different vulnerabilities (7,6)
  6. A standalone malware computer program that replicates itself in order to spread to other computers
  7. Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. (9,4)
  8. Text files with small pieces of data
  9. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. Designed to detect and destroy computer viruses
  2. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.(6,5)
  3. A large number of compromised computers
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  5. Often installed after a compromise happens (4,4)

14 Clues: Computational ProcedureText files with small pieces of dataA large number of compromised computersDesigned to detect and destroy computer virusesOften installed after a compromise happens (4,4)An attempt by hackers to damage or destroy a computer network or system.Conceals the data’s original meaning to prevent it from being known or used....