cybersecurity Crossword Puzzles

Cybersecurity 101 2025-07-23

Cybersecurity 101 crossword puzzle
Across
  1. A fraudulent attempts to obtain sensitive information through deceptive emails.
  2. Phishing through text messages.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A malicious software designed to gain unauthorized access to a computer or network.
Down
  1. A type of phishing attack that targets a business’ top executives “the big fish”.
  2. A cyberattack tactic where a malicious actor disguises their identity.
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. Where attackers use phone calls to trick individuals.
  5. A series of multiple words, often longer than a typical password.
  6. An extra layer of security to accounts by requiring more than one form of verification.

10 Clues: Phishing through text messages.Where attackers use phone calls to trick individuals.A series of multiple words, often longer than a typical password.A cyberattack tactic where a malicious actor disguises their identity.A fraudulent attempts to obtain sensitive information through deceptive emails....

Cybersecurity Essentials 2024-11-06

Cybersecurity Essentials crossword puzzle
Across
  1. monitors your online activity and can log every key you press
  2. a computer program that replicates and attaches to files
  3. holds data until it makes a payment
  4. a program that scans a computer for malicious software and deletes it
  5. replicates itself to spread from one computer to another
  6. a decoy to sneak malicious software past unsuspecting users
Down
  1. hackers who are self-employed or working for large crime organization
  2. hardware or software that prevents hackers from accessing your personal data
  3. converting information into a form where an unauthorized people cannot read it
  4. any code that can steal data or cause harm to a system

10 Clues: holds data until it makes a paymentany code that can steal data or cause harm to a systema computer program that replicates and attaches to filesreplicates itself to spread from one computer to anothera decoy to sneak malicious software past unsuspecting usersmonitors your online activity and can log every key you press...

Cybersecurity Awareness 2025-09-30

Cybersecurity Awareness crossword puzzle
Across
  1. Synthetic media generated by AI
  2. They wear different hat colors (black hat, white hat, blue hat, etc. hat, etc.)
  3. Your online data trail
  4. Artificial Intelligence
  5. Fraudulent communication attack
  6. Used to prevent, identify and remove malicious software
  7. Software app programmed to do certain tasks
Down
  1. Converting information into a code to prevent unauthorized access.
  2. Use of two authentication methods to log in.
  3. Identity verification process

10 Clues: Your online data trailArtificial IntelligenceIdentity verification processSynthetic media generated by AIFraudulent communication attackSoftware app programmed to do certain tasksUse of two authentication methods to log in.Used to prevent, identify and remove malicious softwareConverting information into a code to prevent unauthorized access....

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

Cybersecurity Crossword 2021-10-08

Cybersecurity Crossword crossword puzzle
Across
  1. verifying the identity of a user, process, or device
  2. a flaw or weakness that may allow harm to occur to a system
  3. malicious code like virus, worm
  4. Blink's single sign-on(SSO) solution
  5. an unauthorized user who attempts to or gains access to an information system
Down
  1. ensuring that data has not been altered or destroyed in an unauthorized manner
  2. an undocumented way of gaining access to a computer system
  3. how we work since covid started
  4. incident that results in disclosure of sensitive data
  5. individually identifiable health information

10 Clues: how we work since covid startedmalicious code like virus, wormBlink's single sign-on(SSO) solutionindividually identifiable health informationverifying the identity of a user, process, or deviceincident that results in disclosure of sensitive dataan undocumented way of gaining access to a computer system...

Cybersecurity Risk 2021-09-07

Cybersecurity Risk crossword puzzle
Across
  1. Abbreviation of Internet of Things.
  2. Short for "malicious software."
  3. Data that in published and can be found by anyone
  4. The type of data that should not be known to everyone.
  5. Pretending to be a friend or a trusted source online.
Down
  1. software that encrypts data on someone's device until that person agrees to pay to regain access.
  2. measures taken to protect computer systems.
  3. Joined or linked together.
  4. is a password made up of a saying or memorable set of words.
  5. Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.

10 Clues: Joined or linked together.Short for "malicious software."Abbreviation of Internet of Things.measures taken to protect computer systems.Data that in published and can be found by anyonePretending to be a friend or a trusted source online.The type of data that should not be known to everyone....

Cybersecurity Password 2020-01-10

Cybersecurity Password crossword puzzle
Across
  1. You may not divulge this information while you are working for an employer or after you leave.
  2. Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
  3. E-mailing victims to trick them into voluntarily giving up their confidential information.
  4. Software aimed at protecting your computer from malware.
Down
  1. A flaw in a system that leaves it open to attack.
  2. A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
  3. It is the scrambling of data into a secret code that can be read only by software set to decode the information.
  4. A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
  5. Malware that secretly installs more malware on a computer.
  6. A remote infrastructure for developing and deploying new online software applications.

10 Clues: A flaw in a system that leaves it open to attack.Software aimed at protecting your computer from malware.Malware that secretly installs more malware on a computer.A remote infrastructure for developing and deploying new online software applications.E-mailing victims to trick them into voluntarily giving up their confidential information....

cybersecurity story 2024-02-23

cybersecurity story crossword puzzle
Across
  1. - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
  2. - The protection of the cyber realms
  3. - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
  4. - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
  5. - someone who tries to access data they aren't authorized to view
  6. - monitoring network security system
Down
  1. - What happens when the firewall is broken
  2. - A security incident where confidential information is stolen
  3. - the story this puzzle is about
  4. - a mechanism for creating a secure connection

10 Clues: - the story this puzzle is about- The protection of the cyber realms- monitoring network security system- What happens when the firewall is broken- a mechanism for creating a secure connection- A security incident where confidential information is stolen- someone who tries to access data they aren't authorized to view...

Cybersecurity Crossword 2024-04-13

Cybersecurity Crossword crossword puzzle
Across
  1. What feature can you activate to secure your Habbo account from hacking attempts?
  2. What security measure adds an extra layer of protection to online accounts beyond just a username and password?
  3. What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
  4. What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
  5. What precautionary measure should you take to protect your personal information when using public networks?
  6. What is the first step you should take before giving personal information to a stranger online?
Down
  1. What symbol is often found on the badges and mottos of mafia members?
  2. What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
  3. What action should you take if someone threatens you or attempts to scam you on Habbo?
  4. What type of software can protect your devices from malware, trojans, and ransomware?

10 Clues: What symbol is often found on the badges and mottos of mafia members?What feature can you activate to secure your Habbo account from hacking attempts?What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?What type of software can protect your devices from malware, trojans, and ransomware?...

cybersecurity 5 2024-05-07

cybersecurity 5 crossword puzzle
Across
  1. turning a code into the information it was originally
  2. a program that threats to destroy data if they don't give money
  3. a program that decides whether to allow or block specific traffic
  4. to avoid
  5. a software that automates the process of scanning systems
  6. managing and protecting information assets
Down
  1. use of copying IT resources by employees
  2. type of substitution cipher in which each letter in plaintext is replaced
  3. practice of secure communication or information from the public
  4. converting information into a code

10 Clues: to avoidconverting information into a codeuse of copying IT resources by employeesmanaging and protecting information assetsturning a code into the information it was originallya software that automates the process of scanning systemsa program that threats to destroy data if they don't give money...

Cybersecurity Awareness 2024-10-17

Cybersecurity Awareness crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. A security model that requires strict identity verification for every person and device trying to access resources on a network
  3. Software that secretly gathers information about a user's activities
  4. The process of encoding information to protect it from unauthorized access
  5. Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
  1. Manipulating people into divulging confidential information
  2. Phishing attacks conducted via SMS messages
  3. A malware designed to deny a user or organization access to files on their computer
  4. A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
  5. Small files stored on a user’s system to recognize the user and track preferences

10 Clues: Phishing attacks conducted via SMS messagesManipulating people into divulging confidential informationSoftware that secretly gathers information about a user's activitiesThe process of encoding information to protect it from unauthorized accessSmall files stored on a user’s system to recognize the user and track preferences...

Cybersecurity Awareness - 2024-10-08

Cybersecurity Awareness - crossword puzzle
Across
  1. [?] is a situation where a victim is tempted into clicking a malicious link
  2. Virus, Trojans and Worms are forms of [?]
  3. [?] are attackers whose motivation are political or social causes
  4. [?] is the term we used to to state that a transaction performed cannot be denied
  5. The minimum length of password we aim for is [?} numeric representation
Down
  1. [?} is a common social engineering tactic involving fake emails
  2. Fingerprint and/or facial recognition are form of authentication known as [?] scans
  3. The term [?] is commonly used in cybersecurity as a representation of weakness
  4. Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
  5. The microsoft brand for mobile device management is known as [?]

10 Clues: Virus, Trojans and Worms are forms of [?][?} is a common social engineering tactic involving fake emailsThe microsoft brand for mobile device management is known as [?][?] are attackers whose motivation are political or social causesThe minimum length of password we aim for is [?} numeric representation...

SULAM cybersecurity 2023-06-15

SULAM cybersecurity crossword puzzle
Across
  1. Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
  2. Upaya untuk menembusi sistem komputer dengan niat jahat.
  3. Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
  4. Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
  1. Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
  2. Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
  3. Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
  4. Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
  5. Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
  6. Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.

10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat.Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan....

Cybersecurity - General 2022-05-26

Cybersecurity - General crossword puzzle
Across
  1. Large scale attacks using remotely controlled malware-infected devices
  2. Systems, functions & data being provided on-demand, based on levels of service and defined parameters
  3. Number of stages of Penetration Testing
  4. Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
  5. Only authorized parties permitted to access sensitive information / functions
Down
  1. Process of psychologically manipulating people to divulge personal or critical information
  2. A method of interrupting data traffic between nodes and stealing the required information
  3. Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
  4. Ensuring only authorized users can enter, modify or delete information / functions
  5. An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution

10 Clues: Number of stages of Penetration TestingLarge scale attacks using remotely controlled malware-infected devicesOnly authorized parties permitted to access sensitive information / functionsEnsuring only authorized users can enter, modify or delete information / functions...

Crosswords Cybersecurity 2025-11-03

Crosswords Cybersecurity crossword puzzle
Across
  1. is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
  2. establishes a digital connection between your computer and a remote server belonging to a provider
  3. malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
  4. is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
  5. It involves copying the magnetic stripes of a bank card using a memory reader
Down
  1. a person who seeks ways to bypass software and hardware protections.
  2. Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
  3. Key a string of characters used within an encryption algorithm for altering data so that it appears random
  4. a form of malware or hardware that tracks and records your keystrokes as you type
  5. fraudulent technique that allows fraudsters to display a phone number that is not their own.

10 Clues: a person who seeks ways to bypass software and hardware protections.It involves copying the magnetic stripes of a bank card using a memory readera form of malware or hardware that tracks and records your keystrokes as you typefraudulent technique that allows fraudsters to display a phone number that is not their own....

Intro to Cybersecurity Vocabulary 2025-10-14

Intro to Cybersecurity Vocabulary crossword puzzle
Across
  1. set of security controls designed to protect payment account security such as credit or debit card transactions
  2. protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
  3. crime committed over the internet
  4. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  5. set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
  6. occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
  1. set of best practice recommendations for information security management
  2. unique skills for a specific area
  3. attempt to steal, damage or destroy information on a device or computer system
  4. individual who participates in hacking
  5. abilities needed to communicate and work with others
  6. prevents a user from accessing a system
  7. act of skirting or breaking through security boundaries

13 Clues: unique skills for a specific areacrime committed over the internetindividual who participates in hackingprevents a user from accessing a systemabilities needed to communicate and work with othersact of skirting or breaking through security boundariesset of best practice recommendations for information security management...

Career Night Companies 2025-10-09

Career Night Companies crossword puzzle
Across
  1. geotechnical construction
  2. designs, engineers, and manufactures custom, heavy-haul trailers
  3. bridge design and inspection
  4. live theater productions of Bible stories
  5. information technology and cybersecurity
  6. materials testing and inspection
  7. construction services
Down
  1. bread and roll manufacturer
  2. site planning and landscape design
  3. stormwater management
  4. roadway and bridge design
  5. attaching communications equipment to utility poles
  6. bridge design and inspection
  7. connecting, distributing, and controlling power and data
  8. designs mechanical, electrical, and plumbing (MEP) systems

15 Clues: stormwater managementconstruction servicesgeotechnical constructionroadway and bridge designbread and roll manufacturerbridge design and inspectionbridge design and inspectionmaterials testing and inspectionsite planning and landscape designinformation technology and cybersecuritylive theater productions of Bible stories...

ACES 2022-12-19

ACES crossword puzzle
Across
  1. ACES IS A MEMBER OF THE ______ COLLEGE
  2. ACES FOUNDING PARTNER
  3. WHAT ACES STUDENTS STUDY
  4. STUDENT UNION
  5. GROUP THAT PLANS SOCIAL EVENTS FOR ACES
  6. COMPUTER SCIENCE BUILDING
Down
  1. THE DAY THE WEEKLY EMAIL COMES OUT
  2. ACES IS MADE UP OF AN LLP AND A _____
  3. LAST NAME OF ACES DIRECTOR
  4. CODING USED IN ACES COURSES
  5. COURSE CODE FOR ACES COURSES REGISTRATION
  6. HOME TO ACES LLP
  7. TYPE OF PROJECT COMPLETED IN HACS200 or 202
  8. HOME TO ACES NORTH
  9. UNIVERSITY OF MARYLAND MASCOT

15 Clues: STUDENT UNIONHOME TO ACES LLPHOME TO ACES NORTHACES FOUNDING PARTNERWHAT ACES STUDENTS STUDYCOMPUTER SCIENCE BUILDINGLAST NAME OF ACES DIRECTORCODING USED IN ACES COURSESUNIVERSITY OF MARYLAND MASCOTTHE DAY THE WEEKLY EMAIL COMES OUTACES IS MADE UP OF AN LLP AND A _____ACES IS A MEMBER OF THE ______ COLLEGEGROUP THAT PLANS SOCIAL EVENTS FOR ACES...

Boredom buster 2023-06-28

Boredom buster crossword puzzle
Across
  1. Delicious Korean dish
  2. Creepy kids playground equipment at Minnippi parkland
  3. Dan's dream celebrity date
  4. Dan's alter ego
  5. 'Rejoice' in latin
  6. Place where the best conversations are had
  7. Dan's favourite mayonnaise
Down
  1. Hand-built spacecraft
  2. Name for a pressure cooker
  3. Bec's forbidden name
  4. I'm an ...
  5. 14th song on playlist
  6. Nerdy basketball team with cute point scorer
  7. Never would Dan ever ...
  8. I see you've played __ before
  9. Beloved kungfu fantasy series
  10. Term for a handsome cybersecurity person
  11. Powerful choral piece during epic space fight scene
  12. Best-looking hobbits in the Shire
  13. Name for a white Kona
  14. Brooklyn
  15. Dan's favourite book genre

22 Clues: BrooklynI'm an ...Dan's alter ego'Rejoice' in latinBec's forbidden nameHand-built spacecraftDelicious Korean dish14th song on playlistName for a white KonaNever would Dan ever ...Name for a pressure cookerDan's dream celebrity dateDan's favourite book genreDan's favourite mayonnaiseI see you've played __ beforeBeloved kungfu fantasy series...

填字游戏词汇库-科技类-G1-数字基础 2025-03-26

填字游戏词汇库-科技类-G1-数字基础 crossword puzzle
Across
  1. Software application (~ store)
  2. Using binary code (~ currency)
  3. Organized information (~ query)
  4. Digital protection (~ threat)
  5. Input device (mechanical ~)
  6. Mobile communication tool (smart ~)
  7. Atomic-scale science (前缀: nano-)
  8. Initial model (~ testing)
  9. Global network (~ access)
  10. Moving visuals (~ streaming)
  11. Artificial intelligence (~ chatbot)
  12. Machine-driven process (~ industry)
Down
  1. Image capturer (digital ~)
  2. Produce (~ electricity)
  3. Simulated reality (~ reality)
  4. Living systems tech (前缀: bio-)
  5. Electronic processing device (~ programmer)
  6. Step-by-step procedure (搜索 ~)
  7. Digital information (~ analysis)
  8. Technical designer (software ~)
  9. Pointing device (wireless ~)
  10. Connected system (~ security)
  11. Novel invention (形容词: innovative)
  12. Visual display (~ touch)
  13. Automated machine (~ assistant)

25 Clues: Produce (~ electricity)Visual display (~ touch)Initial model (~ testing)Global network (~ access)Image capturer (digital ~)Input device (mechanical ~)Pointing device (wireless ~)Moving visuals (~ streaming)Simulated reality (~ reality)Step-by-step procedure (搜索 ~)Digital protection (~ threat)Connected system (~ security)...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Aktivitas jual-beli tanpa uang tunai
  2. Platform untuk membangun toko online
  3. Platform jual-beli online
  4. Platform untuk belajar atau kursus online
  5. Pembayaran digital via ponsel
  6. Sistem manajemen konten website
  7. Promosi produk melalui media sosial
  8. Teknologi untuk transaksi cepat dan aman
  9. Teknologi komunikasi internet cepat
  10. Model bisnis online berbasis internet
Down
  1. Sistem keamanan data digital
  2. Alat pembayaran otomatis di toko online
  3. Penyimpanan data online
  4. , Layanan streaming konten digital
  5. Layanan transportasi berbasis aplikasi
  6. ,Perangkat lunak untuk mengelola bisnis online
  7. , Analisis data untuk strategi bisnis digital
  8. Uang digital yang digunakan secara global
  9. Layanan pengiriman barang berbasis digital
  10. Teknologi untuk mengenali wajah atau suara

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Technology Buzzwords 2023-09-05

Technology Buzzwords crossword puzzle
Across
  1. - Leading internet search engine.
  2. - Online buying and selling.
  3. - High-tech mobile device.
  4. - Digital audio or video series.
  5. - Rapidly spreading on the internet.
  6. - Wireless internet connection.
Down
  1. - Online journal or web log.
  2. - Protection against online threats.
  3. - Online seminar or workshop.
  4. - Digital symbols conveying emotions.

10 Clues: - High-tech mobile device.- Online journal or web log.- Online buying and selling.- Online seminar or workshop.- Wireless internet connection.- Digital audio or video series.- Leading internet search engine.- Protection against online threats.- Rapidly spreading on the internet.- Digital symbols conveying emotions.

Saint Mary 2022-07-07

Saint Mary crossword puzzle
Across
  1. Saint Mary Mascot
  2. We own a copy of this Amendment
  3. These are underground so we stay warm and dry
  4. One of four Saint Mary Values
  5. Colors are Navy and ____
Down
  1. Newest Major
  2. Residence Hall
  3. Saint ______ Dining Hall where we eat lunch
  4. ______ Memorial Stadium
  5. We eat at Oak Kiln
  6. _______ of Charity
  7. President whose lock of hair is in the KLC

12 Clues: Newest MajorResidence HallSaint Mary MascotWe eat at Oak Kiln_______ of Charity______ Memorial StadiumColors are Navy and ____One of four Saint Mary ValuesWe own a copy of this AmendmentPresident whose lock of hair is in the KLCSaint ______ Dining Hall where we eat lunchThese are underground so we stay warm and dry

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Rhymes with fishing
  2. Something you are (Inherence factor)
  3. Roofies mixed in software
  4. Divide and conquer. Tool to reduce scope
  5. Your cybersecurity partner
  6. Malicious code on a horse
Down
  1. Vaccine for your systems
  2. 12 characters long in PCI DSS v4.0
  3. Burning walls in cold rooms
  4. Party host
  5. Secure data with a pinch of salt
  6. Data secured. Locked with a key

12 Clues: Party hostRhymes with fishingVaccine for your systemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning walls in cold roomsData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)Divide and conquer. Tool to reduce scope

Cybersecurity Awareness 2021-09-29

Cybersecurity Awareness crossword puzzle
Across
  1. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
  2. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
  3. The process of converting information or data into a code to further prevent unauthorized access.
  4. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
  1. Unauthorized access to computer data, applications, networks, or devices.
  2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
  3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
  4. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
  5. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.

10 Clues: Unauthorized access to computer data, applications, networks, or devices.A vulnerability, or a system flaw, that is taken advantage of for malicious goals.Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to further prevent unauthorized access....

Cybersecurity Crossword 2021-02-12

Cybersecurity Crossword crossword puzzle
Across
  1. Something to protect your personal data.
  2. It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  3. A malicious form of self-replicating software.
  4. It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
  1. It is any information relating to an identifiable person.
  2. a person who uses computers to gain unauthorized access to data.
  3. It is unwanted software that monitors and gathers information on a person and how they use their computer.
  4. It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
  5. They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
  6. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.

10 Clues: Something to protect your personal data.A malicious form of self-replicating software.It is any information relating to an identifiable person.a person who uses computers to gain unauthorized access to data.They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware....

Cybersecurity Introduction 2023-06-18

Cybersecurity Introduction crossword puzzle
Across
  1. Protects your online accounts and prevents unauthorized access
  2. A program that self-replicates and spreads to other computers
  3. The practice of tricking individuals into revealing sensitive information
  4. A type of software designed to block or remove computer viruses
  5. A software vulnerability that allows unauthorized access to a system
  6. Malicious software that encrypts files and demands a ransom
Down
  1. The unauthorized copying or distribution of copyrighted material
  2. The act of intentionally damaging or disrupting computer systems
  3. A set of characters used to gain access to a computer system
  4. A method used to verify the identity of a user

10 Clues: A method used to verify the identity of a userMalicious software that encrypts files and demands a ransomA set of characters used to gain access to a computer systemA program that self-replicates and spreads to other computersProtects your online accounts and prevents unauthorized access...

CyberSecurity Crossword 2023-09-02

CyberSecurity Crossword crossword puzzle
Across
  1. Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
  2. Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
  3. Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
  4. Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
  1. Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
  2. Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
  3. Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
  4. Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
  5. Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
  6. Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)

10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanyaSedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)...

Cybersecurity Concepts 2024-03-31

Cybersecurity Concepts crossword puzzle
Across
  1. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  2. the name commonly given to unwanted emails
  3. Made up of devices that are all connected to each other, like computers and
  4. a security system that forms a virtual perimeter around a network of workstations preventing an attack
  5. the process of verifying the identity of a user or piece of information
Down
  1. a process of maintaining data confidentiality by converting plain data into secret code
  2. makes sure that there are no unauthorized changes to information of systems
  3. A Virtual Private Network
  4. a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
  5. a program that gives a hacker remote access to, and control over, a computer or network

10 Clues: A Virtual Private Networkthe name commonly given to unwanted emailsthe process of verifying the identity of a user or piece of informationmakes sure that there are no unauthorized changes to information of systemsMade up of devices that are all connected to each other, like computers and...

Cybersecurity Awareness 2025-10-15

Cybersecurity Awareness crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information via email.
  2. A type of malicious software that locks files and demands payment.
  3. When employees unknowingly help hackers, it's called an ___ threat.
  4. Regularly updating this can patch security vulnerabilities.
  5. Security appliance that limits access to data or systems.
Down
  1. A secret word or phrase used to gain access to a system.
  2. Portable devices like USBs can carry this kind of malicious code.
  3. A common workplace policy: "Don't write your password on a ___."
  4. Two-step process to verify identity.
  5. You should never connect to public ___ without using a VPN.

10 Clues: Two-step process to verify identity.A secret word or phrase used to gain access to a system.Security appliance that limits access to data or systems.You should never connect to public ___ without using a VPN.Regularly updating this can patch security vulnerabilities.Fraudulent attempt to obtain sensitive information via email....

CyberSecurity Crossword 2025-10-22

CyberSecurity Crossword crossword puzzle
Across
  1. An online trick where someone tries to steal your personal information by pretending to be someone else.
  2. A strong secret word or phrase used to access accounts.
  3. Protecting systems, networks, and data from digital attacks.
  4. A hidden, harmful program disguised as something safe to download.
  5. The practice of using technology in a safe and responsible way.
  6. Messages that threaten or harass others through technology.
Down
  1. Traces of information left online by users.
  2. Software that protects a computer from viruses and malware.
  3. The process of scrambling information to keep it private.
  4. A wall of security that blocks unauthorized access to a network.

10 Clues: Traces of information left online by users.A strong secret word or phrase used to access accounts.The process of scrambling information to keep it private.Software that protects a computer from viruses and malware.Messages that threaten or harass others through technology.Protecting systems, networks, and data from digital attacks....

Cybersecurity puzzle 2025-02-03

Cybersecurity puzzle crossword puzzle
Across
  1. - Malicious software that can harm your computer
  2. - An email scam that attempts to trick users into giving up personal information
  3. - The process of converting data into unreadable code for security
  4. - Software that prevents unauthorized access to a network
  5. - The practice of disguising a communication to appear as a trusted source
Down
  1. - A secret combination of characters used to access an account
  2. - A program that appears harmless but has malicious intent
  3. - A security measure used to verify a user's identity, often using two different forms of authentication
  4. - A type of attack where a person tricks someone into revealing sensitive information
  5. - A type of cyberattack where traffic is flooded to a system to make it unavailable

10 Clues: - Malicious software that can harm your computer- Software that prevents unauthorized access to a network- A program that appears harmless but has malicious intent- A secret combination of characters used to access an account- The process of converting data into unreadable code for security...

CyberSecurity 1 2024-07-23

CyberSecurity 1 crossword puzzle
Across
  1. Entitlement is very closely related to ... performed
  2. ... to standard is verified during audit
  3. IAM also differentiates 'authenticate' and ...
  4. We differentiate between User and ... in IAM
  5. ISO 27000 standards has 14 categories for ...
Down
  1. S in SOD
  2. Issue faced by user in IT
  3. A in CIA
  4. C in PDCA
  5. Example of non-human identity

10 Clues: S in SODA in CIAC in PDCAIssue faced by user in ITExample of non-human identity... to standard is verified during auditWe differentiate between User and ... in IAMISO 27000 standards has 14 categories for ...IAM also differentiates 'authenticate' and ...Entitlement is very closely related to ... performed

Cybersecurity Basics 2024-07-25

Cybersecurity Basics crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
  1. A security process that verifies the identity of a user or device attempting to access a system.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Puzzle 2024-07-19

Cybersecurity Puzzle crossword puzzle
Across
  1. Unauthorized access to or manipulation of a computer system or network
  2. A secret word or phrase used to gain access to a system.
  3. The practice of protecting systems, networks, and programs from digital attacks
  4. A digital certificate used to encrypt and authenticate a website
  5. A type of software designed to harm or exploit any programmable device.
Down
  1. The act of pretending to be someone else to gain sensitive information
  2. A type of malicious software that demands ransom
  3. An attack that floods a network with excessive traffic, disrupting service
  4. Unwanted email that often contains malware or phishing attempts
  5. Software designed to detect and remove malicious software

10 Clues: A type of malicious software that demands ransomA secret word or phrase used to gain access to a system.Software designed to detect and remove malicious softwareUnwanted email that often contains malware or phishing attemptsA digital certificate used to encrypt and authenticate a website...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. Security system that forms a virtual perimeter around a network
  3. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  4. software that is secretly installed on a user's device to gather sensitive data
  5. Damage or destroy a computer network or system
  6. A malicious computer program
Down
  1. Block elements from sending you information
  2. Unwanted advertising, the email equivalant of physical junk
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Person who try to gain unauthorized

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Damage or destroy a computer network or system
  2. A malicious computer program
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Security system that forms a virtual perimeter around a network
Down
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  3. Block elements from sending you information
  4. Unwanted advertising, the email equivalant of physical junk
  5. Person who try to gain unauthorized
  6. software that is secretly installed on a user's device to gather sensitive data

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

Cybersecurity Crossword 2025-11-13

Cybersecurity Crossword crossword puzzle
Across
  1. une menace
  2. empêcher
  3. escroquer
  4. activer
  5. malveillant
  6. des escrocs
Down
  1. dévoiler, révéler
  2. tromper, duper
  3. profiter
  4. faire confiance

10 Clues: activerempêcherprofiterescroquerune menacemalveillantdes escrocstromper, duperfaire confiancedévoiler, révéler

Cybersecurity Basics 2025-11-13

Cybersecurity Basics crossword puzzle
Across
  1. A short way to say “Information Technology.”
  2. Your special name you use to log into a computer, cell phone, tablet, or website.
  3. Something you type to log in — keep it secret!
  4. A computer, tablet, or phone is called a _______.
  5. To keep something from harm or danger.
  6. Something that keeps your personal stuff private.
Down
  1. What we use to surf websites and watch videos.
  2. Keeping your computer and personal data safe.
  3. Using smart rules online helps keep you _______.
  4. Inventions that come from science and research. It can solve problems and make our lives easier.

10 Clues: To keep something from harm or danger.A short way to say “Information Technology.”Keeping your computer and personal data safe.What we use to surf websites and watch videos.Something you type to log in — keep it secret!Using smart rules online helps keep you _______.A computer, tablet, or phone is called a _______....

Cybersecurity Crossword 2026-03-20

Cybersecurity Crossword crossword puzzle
Across
  1. A virus that spreads itself across networks
  2. Software that protects against malware
  3. Attack that locks data for payment
Down
  1. Weakness in a system
  2. Secret code used to protect data
  3. Secure login method using two steps
  4. Fake emails used to trick users
  5. Malicious software
  6. Hidden software used to spy on users
  7. Person who breaks into systems

10 Clues: Malicious softwareWeakness in a systemPerson who breaks into systemsFake emails used to trick usersSecret code used to protect dataAttack that locks data for paymentSecure login method using two stepsHidden software used to spy on usersSoftware that protects against malwareA virus that spreads itself across networks

Module 1 Introductory Course Telehealth 2017-03-01

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. Electronic health
  2. Providing remote healthcare
  3. Ability of computers exchange information"
  4. health Popular emerging term
Down
  1. Mobile health
  2. Measures taken to protect a computer
  3. Refers to teleconsultations
  4. Extended term for information technology

8 Clues: Mobile healthElectronic healthProviding remote healthcareRefers to teleconsultationshealth Popular emerging termMeasures taken to protect a computerExtended term for information technologyAbility of computers exchange information"

cy-rite crossword 2025-11-10

cy-rite crossword crossword puzzle
Across
  1. Response The process of identifying, managing, and recovering from a cybersecurity breach.
  2. Software that secretly collects user information without consent.
  3. Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
  4. Malware disguised as legitimate software, used to trick users into installing it.
Down
  1. The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
  2. The process of converting encrypted data back into its original readable form.
  3. A method of guessing passwords or encryption keys by trying all possible combinations.
  4. A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
  5. Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
  6. A self-replicating program that spreads through networks without user action.

10 Clues: Software that secretly collects user information without consent.A self-replicating program that spreads through networks without user action.The process of converting encrypted data back into its original readable form.Malware disguised as legitimate software, used to trick users into installing it....

algorithms 2025-10-28

algorithms crossword puzzle
Across
  1. converts code into readable data
  2. study of secure communication
  3. secure distributed digital ledger
  4. logical true or false value
  5. delay between request and response
  6. software made to harm
  7. structure for programming language
Down
  1. repetition of a code block
  2. rules for data communication
  3. protecting system from attacks

10 Clues: software made to harmrepetition of a code blocklogical true or false valuerules for data communicationstudy of secure communicationprotecting system from attacksconverts code into readable datasecure distributed digital ledgerdelay between request and responsestructure for programming language

Cybersecurity Awareness Month Crossword Challenge 2023-09-25

Cybersecurity Awareness Month Crossword Challenge crossword puzzle
Across
  1. When malicious actors send an email-based attack to trick the recipient into taking an action.
  2. The term for an email-based attack that involves the use of a QR code
  3. Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
  4. The month associated with Cybersecurity Awareness.
  5. The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
  1. A disgruntled or financially motivated employee is called a(n) ______ threat.
  2. The color of the banner that indicates a company email is from an external source.
  3. The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
  4. The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
  5. The action every associate must take when a suspicious email message is identified.

10 Clues: The month associated with Cybersecurity Awareness.The term for an email-based attack that involves the use of a QR codeA disgruntled or financially motivated employee is called a(n) ______ threat.The color of the banner that indicates a company email is from an external source....

Warm-up 2025-12-20

Warm-up crossword puzzle
Across
  1. Short for "applications"
  2. Synonym for "negative side-effects"
  3. Synonym for new
  4. A gathering of people online
Down
  1. Someone doing something great.
  2. What makes Internet safe
  3. Synonym for big
  4. Synonym for "online on social network"
  5. Feeling of loneliness
  6. Something that has a negative effect on you.

10 Clues: Synonym for bigSynonym for newFeeling of lonelinessWhat makes Internet safeShort for "applications"A gathering of people onlineSomeone doing something great.Synonym for "negative side-effects"Synonym for "online on social network"Something that has a negative effect on you.

NAVFAC Capabilities 2023-02-13

NAVFAC Capabilities crossword puzzle
Across
  1. _____ Handling Ashore Procurement
  2. NEPA Requirement: Environmental ______
  3. _______ and Facilities Operations
  4. Real Estate _______ and Management
  5. _______ Facilities and Equipment Engineering
Down
  1. Military Construction acronym
  2. Basic physical and organizational structures and facilities
  3. Protection against unauthorized data usage
  4. _______Vehicles providing transportation services
  5. _______ Conservation: Health assessment of natural and cultural resources

10 Clues: Military Construction acronym_____ Handling Ashore Procurement_______ and Facilities OperationsReal Estate _______ and ManagementNEPA Requirement: Environmental ______Protection against unauthorized data usage_______ Facilities and Equipment Engineering_______Vehicles providing transportation services...

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – What cybersecurity keeps us.
  2. – Information AI studies.
  3. – Harmful software.
  4. – What we do to teach AI.
  5. – A common target for phishing.
  6. – Automated programs used online.
  7. – What AI learns from.
Down
  1. – The goal of cybersecurity.
  2. – Process to teach AI models.
  3. – A warning from AI about danger.
  4. – A small automated tool.
  5. – Short for Artificial Intelligence.

12 Clues: – Harmful software.– What AI learns from.– Information AI studies.– What we do to teach AI.– A small automated tool.– The goal of cybersecurity.– Process to teach AI models.– What cybersecurity keeps us.– A common target for phishing.– A warning from AI about danger.– Automated programs used online.– Short for Artificial Intelligence.

Issue #1 2023-09-11

Issue #1 crossword puzzle
Across
  1. The Spooky Month Holiday
  2. Red ________ Week - Keeping kids drug-free
  3. Magnolia ________ Institute
  4. Racket sport this season
  5. Recent Hurricane in California
Down
  1. Seniors should be thinking about their college __________
  2. Homecoming King and ______
  3. Applying to a 4-year __________
  4. Future __________ Leaders of America Club

9 Clues: The Spooky Month HolidayRacket sport this seasonHomecoming King and ______Magnolia ________ InstituteRecent Hurricane in CaliforniaApplying to a 4-year __________Future __________ Leaders of America ClubRed ________ Week - Keeping kids drug-freeSeniors should be thinking about their college __________

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What is a digital document that verifies the ownership of a public key?
  2. What type of malware records keystrokes made by a user?
  3. What term refers to the permission to enter or use a system or network?
  4. What term refers to malicious software designed to harm or exploit devices?
  5. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  6. term describes a weakness in a system that can be exploited by threats?
  7. What is the process of verifying the identity of a user or system?
  8. What is the process of converting data into a fixed-size string of characters for security?
Down
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is the process of converting ciphertext back into plaintext?
  3. What protocol secures data sent over the internet by encrypting it?
  4. What is the process of converting plaintext into ciphertext to protect information?
  5. What is the process of creating copies of data to restore in case of loss?
  6. What is a physical or digital object used to prove identity in security systems?
  7. What type of malware disguises itself as legitimate software?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity Crossword Puzzle 2025-05-06

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Software that secretly gathers user information
  2. Software that is harmful to your system
  3. Software used to detect and remove malicious software
  4. A security system that blocks unauthorized access to a network
  5. A hidden way to access a system or software
  6. The process of converting data into a secret code
  7. A method of guessing passwords by trying all combinations
  8. A fake email that tricks you into giving personal info
Down
  1. A tool that records everything you type
  2. A tool that hides your IP and encrypts your internet connection
  3. A vulnerability that is exploited before it’s known to developers
  4. A type of malware that locks your files until you pay
  5. A type of malware disguised as a legitimate file
  6. An extra step to verify your identity during login
  7. Manipulating people to reveal confidential information

15 Clues: A tool that records everything you typeSoftware that is harmful to your systemA hidden way to access a system or softwareSoftware that secretly gathers user informationA type of malware disguised as a legitimate fileThe process of converting data into a secret codeAn extra step to verify your identity during login...

Ariel Cybersecurity Crossword 2026-04-03

Ariel Cybersecurity Crossword crossword puzzle
Across
  1. Locks your files and asks for money.
  2. Malware that spreads by itself on networks.
  3. Security Keeping data safe from being stolen.
  4. Breach When private info gets stolen.
  5. Fake messages that try to steal your info.
  6. Watches what you do without you knowing.
Down
  1. Authentication Uses two steps to log in for extra safety.
  2. Blocks bad traffic from entering your computer.
  3. A secret word to log into accounts.
  4. Bad software that can hurt your computer.
  5. Hides in a computer so hackers can control it.
  6. A program that spreads and damages files.
  7. Turns data into a secret code.
  8. Citizenship Being safe and respectful online.
  9. Security Protecting a network from hackers.

15 Clues: Turns data into a secret code.A secret word to log into accounts.Locks your files and asks for money.Watches what you do without you knowing.Bad software that can hurt your computer.A program that spreads and damages files.Breach When private info gets stolen.Fake messages that try to steal your info.Malware that spreads by itself on networks....

aaliyahs cybersecurity crossword 2026-04-04

aaliyahs cybersecurity crossword crossword puzzle
Across
  1. secret code only you know to log into your accounts
  2. information stored on a computer
  3. people who break into computer systems
  4. a group of connected computers
  5. software that locks your files
  6. checking to correctly conform your identify
  7. attempts to harm or break into a system
Down
  1. ways to keep data and devices safe
  2. fake emails hackers send out to trick you
  3. serious problem that causes data loss
  4. safe from harm
  5. harmful programs that spread or damage devices
  6. harmful software designed to damage or steal data
  7. not doing the right thing
  8. Doing the right thing

15 Clues: safe from harmDoing the right thingnot doing the right thinga group of connected computerssoftware that locks your filesinformation stored on a computerways to keep data and devices safeserious problem that causes data losspeople who break into computer systemsattempts to harm or break into a systemfake emails hackers send out to trick you...

Itani cybersecurity crossword 2026-04-01

Itani cybersecurity crossword crossword puzzle
Across
  1. – spreads and infects files
  2. – harmful software
  3. – extra login step
  4. – secret login word
  5. – protects networks
Down
  1. – stealing personal info
  2. – locks files for money
  3. – coding data for safety
  4. – tricks people for info
  5. – online trail
  6. – blocks threats
  7. – breaks into systems
  8. – removes malware
  9. – spreads by itself
  10. – steals information

15 Clues: – online trail– blocks threats– removes malware– harmful software– extra login step– secret login word– spreads by itself– protects networks– steals information– breaks into systems– locks files for money– stealing personal info– coding data for safety– tricks people for info– spreads and infects files

Jamiah Cybersecurity Crossword 2026-04-02

Jamiah Cybersecurity Crossword crossword puzzle
Across
  1. - Fake messages used to trick people into giving information
  2. - Protection of computer networks from threats
  3. - A malicious program that spreads by attaching to files
  4. - Software designed to harm or exploit a computer system
  5. - Malware that hides deep in a system to avoid detection
  6. - Malware that spreads across networks without user action
  7. - A secret word used to access accounts
Down
  1. - The process of converting data into a secure code
  2. - Software that secretly tracks user activity
  3. - A system that blocks unauthorized access to a network
  4. - Software that detects and removes malware
  5. - Malware that locks files and demands payment
  6. - The trail of data you leave online
  7. - A person who gains unauthorized access to systems
  8. - A login method requiring two forms of verification

15 Clues: - The trail of data you leave online- A secret word used to access accounts- Software that detects and removes malware- Software that secretly tracks user activity- Malware that locks files and demands payment- Protection of computer networks from threats- The process of converting data into a secure code...

azriel cybersecurity crossword 2026-04-02

azriel cybersecurity crossword crossword puzzle
Across
  1. software that shows unwanted ads
  2. someone who hacks into people’s systems
  3. restoring systems after an attack
  4. harmful software used to steal data
  5. software that detects and removes malware
  6. a network of infected devices controlled by a hacker
  7. tricking people into giving personal information
Down
  1. software that tracks your activity and steals info
  2. verifying who someone is
  3. blocks unauthorized access
  4. malware that spreads on its own
  5. malware that pretends to be safe to trick you
  6. type of malware that spreads between devices
  7. malware that locks your files and demands money
  8. malware that hides deep in a system

15 Clues: verifying who someone isblocks unauthorized accessmalware that spreads on its ownsoftware that shows unwanted adsrestoring systems after an attackharmful software used to steal datamalware that hides deep in a systemsomeone who hacks into people’s systemssoftware that detects and removes malwaretype of malware that spreads between devices...

Week 1 Puzzle 2020-08-25

Week 1 Puzzle crossword puzzle
Across
  1. This is an example of "something you know"--one of the key factors in MFA.
  2. Approximately $6 trillion is planned on being spent on this by 2021.
  3. General term for the type of device most often connecting to public WiFi.
  4. This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
  5. Globally, one of these attacks every 39 seconds.
  6. By 2025, there will be an estimated 75 billion of these devices connected to the internet.
  7. 95% of cybersecurity breaches involve this type of error.
Down
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices.
  2. The most dangerous type of WiFi.
  3. This is an example of "something you are"--one of the key factors of MFA.
  4. This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
  5. To increase your personal internet security, consider turning off the "save password" feature in this.
  6. 93% of these organizations have experienced a data breach within the past 3 years.
  7. Software that is created specifically to help detect, prevent and remove malicious software.

14 Clues: The most dangerous type of WiFi.Globally, one of these attacks every 39 seconds.95% of cybersecurity breaches involve this type of error.Approximately $6 trillion is planned on being spent on this by 2021.This is an example of "something you are"--one of the key factors of MFA....

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Divide and conquer. Tool to reduce the scope
  2. Roofies mixed in software
  3. Party host
  4. Secure data with a pinch of salt
  5. Chained blocks. Runs crypto
  6. 12 characters long in PCI DSS v4.0
Down
  1. Something you are (Inherence factor)
  2. Rhymes with fishing
  3. Your cybersecurity partner
  4. Vaccine for your Ssystems
  5. Burning wall in cold rooms
  6. Data secured. Locked with a key
  7. Malicious code on a horse

13 Clues: Party hostRhymes with fishingVaccine for your SsystemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning wall in cold roomsChained blocks. Runs cryptoData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)...

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

crossword about Cybersecurity 2025-06-07

crossword about Cybersecurity crossword puzzle
Across
  1. Malware that encrypts files for ransom
  2. Network of infected devices
  3. Small data file stored by websites
  4. Software that secretly monitors activity
  5. Scrambling data for security
  6. Person who exploits system vulnerabilities
  7. Remote data storage and computing
Down
  1. Fraudulent attempts to steal info
  2. Harmful software like viruses
  3. Authentication using fingerprints
  4. Directs internet traffic
  5. Decentralized ledger technology
  6. Malware disguised as legitimate software
  7. Secures internet connections
  8. Network security barrier

15 Clues: Directs internet trafficNetwork security barrierNetwork of infected devicesSecures internet connectionsScrambling data for securityHarmful software like virusesDecentralized ledger technologyFraudulent attempts to steal infoAuthentication using fingerprintsRemote data storage and computingSmall data file stored by websites...

Sarah cybersecurity passwords 2026-04-02

Sarah cybersecurity passwords crossword puzzle
Across
  1. The collection of data stored online
  2. spreads across devices while replicating within a network
  3. Unwanted software that secretly installs and puts pop ups on your device
  4. protects data from being changed or stolen
  5. a backup of daily changes or new files
  6. a code that is capable of corrupting the system or destroying data.
  7. A malicious software that secretly infects devices to steal information
  8. A complete copy of all data files
Down
  1. keeps software and apps from being hacked into
  2. plans how to restore data AFTER being attacked
  3. The freedom from being observed or disturbed
  4. Stores backup files at an alternative location
  5. A download disguised as a program
  6. protects how data is handled and shared
  7. Protects computer networks from hackers and unauthorized access

15 Clues: A download disguised as a programA complete copy of all data filesThe collection of data stored onlinea backup of daily changes or new filesprotects how data is handled and sharedprotects data from being changed or stolenThe freedom from being observed or disturbedkeeps software and apps from being hacked into...

Browsing safely 2025-06-19

Browsing safely crossword puzzle
Across
  1. hoaxing or misleading
  2. harming or harassing using information technology
  3. illegal entry in computer
  4. illegal method to get money
  5. security to prevent cybercrime
  6. disturbs normal functioning of computer
  7. act of stealing and misusing someone's personal information
  8. building a face friendship
  9. any information about a person can be found
  10. conduct a terrosism by computer
Down
  1. protects from virus
  2. any criminal activity intended to harm anyone using computer
  3. complaining against cybercrime
  4. that helps in preventing unauthorised access to your computer
  5. protects from cyber crime

15 Clues: protects from virushoaxing or misleadingillegal entry in computerprotects from cyber crimebuilding a face friendshipillegal method to get moneycomplaining against cybercrimesecurity to prevent cybercrimeconduct a terrosism by computerdisturbs normal functioning of computerany information about a person can be found...

FIT_Vocab.JT 2013-05-15

FIT_Vocab.JT crossword puzzle
Across
  1. picture for a business
  2. internet service provider
  3. headphone port
  4. TB
  5. online presentation maker
  6. Wireless Fidelity
  7. flash drive, disc
  8. who is asking, what they asking, why are they asking
  9. Google Bing Yahoo
  10. flash drive plug in
  11. online protection
  12. GB
  13. smallest storage amount
  14. 3g 4g
  15. MG
Down
  1. light emitting diode
  2. speakers, printer
  3. cd drive
  4. computer screen
  5. Safari, iTunes, iMovie, App Store
  6. central circuit board
  7. main engine of computer
  8. central processing unit
  9. National Cyber Security Alliance
  10. online manners
  11. Random Access Memory
  12. KB
  13. eight bits
  14. liquid crystal display

29 Clues: TBKBGBMG3g 4gcd driveeight bitsheadphone portonline mannerscomputer screenspeakers, printerWireless Fidelityflash drive, discGoogle Bing Yahooonline protectionflash drive plug inlight emitting diodeRandom Access Memorycentral circuit boardpicture for a businessliquid crystal displaymain engine of computercentral processing unit...

Cybersecurity Terms Crossword Puzzle 2024-02-28

Cybersecurity Terms Crossword Puzzle crossword puzzle
Across
  1. Secure connection for private browsing
  2. Hostage-taking malware for files
  3. Vulnerability before the fix
  4. Identity verification for access
  5. Computer virus and harmful software
  6. Guard against harmful computer viruses
  7. Protecting digital systems and data
  8. Monitor for malicious activities
  9. Deceptive emails for sensitive data
Down
  1. Deliberate act to disrupt systems
  2. Malicious software's harmful action
  3. Secretly records keystrokes for theft
  4. System's exploitable weak point
  5. Network traffic gatekeeper and monitor
  6. Secret entry to bypass security
  7. Impersonation for unauthorized access
  8. Secure data with secret code
  9. Authorized entities' access list
  10. Flood of traffic to disrupt
  11. Software update to fix vulnerabilities

20 Clues: Flood of traffic to disruptVulnerability before the fixSecure data with secret codeSystem's exploitable weak pointSecret entry to bypass securityHostage-taking malware for filesIdentity verification for accessAuthorized entities' access listMonitor for malicious activitiesDeliberate act to disrupt systemsMalicious software's harmful action...

Technology 2023-06-11

Technology crossword puzzle
Across
  1. (Step-by-step problem-solving procedure)
  2. (Global computer network)
  3. (Intelligence that mimics human behavior)
  4. (Securing data with codes)
  5. (Global Positioning System)
  6. (Pocket-sized mobile device)
  7. (Identification based on unique human characteristics)
  8. (Remote data storage and computing)
  9. (Wireless network connectivity)
  10. (Unmanned aerial vehicles)
  11. (Process of making systems operate automatically)
Down
  1. (Protection of computer systems)
  2. (Electronic data processing machine)
  3. (Distributed digital ledger)
  4. (Simulated or computer-generated)
  5. (Enhancement of real-world experiences with digital content)
  6. (Manipulation of matter at the atomic and molecular scale)
  7. (Field of building and programming robots)
  8. Printing (Additive manufacturing process)
  9. Data (Large sets of complex data)

20 Clues: (Global computer network)(Securing data with codes)(Unmanned aerial vehicles)(Global Positioning System)(Distributed digital ledger)(Pocket-sized mobile device)(Wireless network connectivity)(Protection of computer systems)(Simulated or computer-generated)Data (Large sets of complex data)(Remote data storage and computing)...

Wedding Crossword 2024-11-18

Wedding Crossword crossword puzzle
Across
  1. Where Bride was working when the couple met
  2. Amanda's middle name
  3. Bride’s favorite cuisine
  4. Month of the proposal
  5. Amanda's birth month
  6. Bride’s profession
  7. Location of the wedding venue
  8. Couple's favorite fantasy series
  9. Bride's Eye Color
  10. Groom’s favorite holiday
  11. Groom’s favorite takeout
Down
  1. Where the couple get engaged
  2. Russ' middle name
  3. Bride's favorite outdoor activity
  4. Russ' birth month
  5. Bride’s favorite holiday
  6. What Russ is in school for
  7. Groom's Eye Color
  8. # of years couple has been together
  9. Where Groom was born
  10. Couple's favorite hobby
  11. Their cat's name
  12. Groom's favorite hobby
  13. Where Bride was born
  14. Honeymoon Destination

25 Clues: Their cat's nameRuss' middle nameRuss' birth monthGroom's Eye ColorBride's Eye ColorBride’s professionAmanda's middle nameWhere Groom was bornAmanda's birth monthWhere Bride was bornMonth of the proposalHoneymoon DestinationGroom's favorite hobbyCouple's favorite hobbyBride’s favorite holidayBride’s favorite cuisineGroom’s favorite holiday...

2025 CSS GRADUATES AND NEW MEMBERS 2025-05-20

2025 CSS GRADUATES AND NEW MEMBERS crossword puzzle
Across
  1. Loves pina coladas and getting caught in the rain
  2. Johnston High School
  3. Kristina Davis
  4. BS IT Cybersecurity, University North Georgia
  5. University of Nebraska Grad
  6. Loves all things tennis, crafting and trying to become a better golfer
  7. M.S. Information Technology
  8. Supports Client Promos and Quality Control
  9. Andrew Pare
  10. Mitchell Harvey Jr.
Down
  1. Penn State Grad
  2. B.S. Marine Biology
  3. Jamie Worthy
  4. HS Diploma & CNA certification
  5. Where Michael Canizares graduated from
  6. Supports Production Validation and Quality Control
  7. Shaurya Chauhan
  8. May have a partridge in a pear tree
  9. Northview High Grad
  10. Where Sanjitha Eswaramoorthy graduated
  11. Loves short walks to the beer fridge

21 Clues: Andrew PareJamie WorthyKristina DavisPenn State GradShaurya ChauhanB.S. Marine BiologyNorthview High GradMitchell Harvey Jr.Johnston High SchoolUniversity of Nebraska GradM.S. Information TechnologyHS Diploma & CNA certificationMay have a partridge in a pear treeLoves short walks to the beer fridgeWhere Michael Canizares graduated from...

Jobs 2024-12-11

Jobs crossword puzzle
Across
  1. Grows crops or raises animals
  2. Serves food and drinks at a restaurant
  3. Designs and writes software programs
  4. Builds and maintains websites
  5. Manages networks and servers
  6. Devivers mail and packages
  7. Enforces laws and keeps order
  8. Treats people`s illnesses
  9. Bakes bread, cake, and pastries
  10. Cuts and styles hair
Down
  1. Helps students learn in school
  2. Codes mobile applications
  3. test software for errors
  4. Protects systems from hackers
  5. Oversees technology stategy in a company
  6. Designs user interfaces and experiences
  7. Create artificial intelligence solutions
  8. Analyzes data to provide insights
  9. Drives a vehicle for passengers
  10. Sells goods in a shop

20 Clues: Cuts and styles hairSells goods in a shoptest software for errorsCodes mobile applicationsTreats people`s illnessesDevivers mail and packagesManages networks and serversGrows crops or raises animalsProtects systems from hackersBuilds and maintains websitesEnforces laws and keeps orderHelps students learn in schoolDrives a vehicle for passengers...

Informatika 7 Bab 1 2025-08-26

Informatika 7 Bab 1 crossword puzzle
Across
  1. Rekam medis merupakan dampak informatika dibidang
  2. Upaya melindungi keamanan di internet
  3. Langkah logis dan sistematis menyelesaikan masalah
  4. Konsultasi dokter melalui daring
  5. Proses menulis instruksi dalam bahasa pemrograman
  6. Kumpulan fakta mentah yang belum diolah
Down
  1. Elemen infografis yang membuat cantik tampilan
  2. Aplikasi GPS dan peta digital untuk navigasi
  3. Unsur penting pembuatan infografis
  4. Salah satu aplikasi kecerdasan buatan
  5. Platform pembelajaran daring
  6. Halaman pada presentasi
  7. Kemajuan teknologi membuat aktivitas menjadi lebih..
  8. Representasi visual dari informasi
  9. Salah satu aplikasi membuat presentasi

15 Clues: Halaman pada presentasiPlatform pembelajaran daringKonsultasi dokter melalui daringUnsur penting pembuatan infografisRepresentasi visual dari informasiUpaya melindungi keamanan di internetSalah satu aplikasi kecerdasan buatanSalah satu aplikasi membuat presentasiKumpulan fakta mentah yang belum diolahAplikasi GPS dan peta digital untuk navigasi...

Technology puzzle 2025-10-02

Technology puzzle crossword puzzle
Across
  1. physical parts of a computer
  2. device used to type information
  3. handheld device with apps
  4. software application for phones or computers
  5. global system connecting computers
  6. computer-generated 3D environment
  7. machine designed to perform tasks
  8. secret code for security access
  9. wireless internet connection
  10. electronic message system
  11. protection of systems and networks
Down
  1. organized collection of data
  2. computer that provides data to others
  3. a device for processing information
  4. a collection of web pages
  5. technology that simulates human thinking
  6. system of connected computers
  7. online storage and computing services
  8. programs that run on a computer
  9. device that produces a paper copy

20 Clues: a collection of web pageshandheld device with appselectronic message systemorganized collection of dataphysical parts of a computerwireless internet connectionsystem of connected computersdevice used to type informationsecret code for security accessprograms that run on a computercomputer-generated 3D environmentmachine designed to perform tasks...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Kigen Christmas Crossword 2025 2025-12-16

Kigen Christmas Crossword 2025 crossword puzzle
Across
  1. Foundation of good partnerships
  2. Connected product in the field
  3. What you’re solving right now
  4. A friendly way to start a conversation
  5. Safe and protected
  6. Downloaded to enable connectivity
  7. Standards body behind eSIM specs
  8. Connected devices ecosystem
  9. Embedded SIM technology
Down
  1. Designed to withstand disruption
  2. Season when devices and people recharge
  3. Worldwide in reach
  4. What Kigen always aims to keep things 😉
  5. Fruit or famous tech company
  6. Devices rely on this to communicate
  7. Something batteries (and people) need
  8. Tiny but essential technology
  9. Keeps devices protected over time
  10. Secure connectivity specialists
  11. Upcoming EU cybersecurity regulation

20 Clues: Worldwide in reachSafe and protectedEmbedded SIM technologyConnected devices ecosystemFruit or famous tech companyWhat you’re solving right nowTiny but essential technologyConnected product in the fieldFoundation of good partnershipsSecure connectivity specialistsDesigned to withstand disruptionStandards body behind eSIM specs...

DAMPAK SOSIAL INFORMATIKA 2023-11-08

DAMPAK SOSIAL INFORMATIKA crossword puzzle
Across
  1. salah satu fitur keamanan windows10
  2. Dampak sosial informatika
  3. angka sandi rahasia antara pengguna dan sistem
  4. perangkat lunakk yang menempel pada perangkat lain
  5. salah satu fitur windows security
  6. keamanan data di internet
  7. Data dapat berupa
  8. perkakas peretasan
Down
  1. pengkodean data sebelum dikirim
  2. contoh otentifikasi biomtrik
  3. pishing biasanya melakukan kejahatannya melalaui
  4. contoh sistem operasi
  5. contoh Perkakas melindungi data atau informasi
  6. sistem operasi seluler
  7. program komputer yang mampu menyalin dirinya sendiri kekomputer lain
  8. Data atau keterangan yang benar (fakta)
  9. perdagangan elektronik
  10. individu yang membool, melepaskan virus, membobol komputer untuk mrncuri informasi
  11. kesalahan dalam aplikasi atau program
  12. world wide web

20 Clues: world wide webData dapat berupaperkakas peretasancontoh sistem operasisistem operasi selulerperdagangan elektronikDampak sosial informatikakeamanan data di internetcontoh otentifikasi biomtrikpengkodean data sebelum dikirimsalah satu fitur windows securitysalah satu fitur keamanan windows10kesalahan dalam aplikasi atau program...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Sistem keamanan data digital
  2. Platform untuk belajar atau kursus online
  3. Pembayaran digital via ponsel
  4. Promosi produk melalui media sosial
  5. Alat pembayaran otomatis di toko online
  6. Model bisnis online berbasis internet
  7. Teknologi untuk transaksi cepat dan aman
  8. Penyimpanan data online
  9. Uang digital yang digunakan secara global
  10. Platform jual-beli online
Down
  1. Layanan pengiriman barang berbasis digital
  2. Aktivitas jual-beli tanpa uang tunai
  3. Teknologi untuk mengenali wajah atau suara
  4. , Analisis data untuk strategi bisnis digital
  5. Platform untuk membangun toko online
  6. Layanan transportasi berbasis aplikasi
  7. Teknologi komunikasi internet cepat
  8. Sistem manajemen konten website
  9. , Layanan streaming konten digital
  10. ,Perangkat lunak untuk mengelola bisnis online

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalTeknologi komunikasi internet cepatPromosi produk melalui media sosialAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Penyimpanan data online
  2. Platform untuk belajar atau kursus online
  3. Layanan pengiriman barang berbasis digital
  4. Aktivitas jual-beli tanpa uang tunai
  5. Uang digital yang digunakan secara global
  6. Pembayaran digital via ponsel
  7. Teknologi untuk transaksi cepat dan aman
  8. Promosi produk melalui media sosial
  9. Model bisnis online berbasis internet
  10. Platform untuk membangun toko online
  11. Teknologi komunikasi internet cepat
Down
  1. Platform jual-beli online
  2. , Layanan streaming konten digital
  3. Sistem manajemen konten website
  4. ,Perangkat lunak untuk mengelola bisnis online
  5. , Analisis data untuk strategi bisnis digital
  6. Sistem keamanan data digital
  7. Alat pembayaran otomatis di toko online
  8. Teknologi untuk mengenali wajah atau suara
  9. Layanan transportasi berbasis aplikasi

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Cybersecurity Careers Crossword 2022-09-26

Cybersecurity Careers Crossword crossword puzzle
Across
  1. the process of getting new software or hardware up and running
  2. small groups of similar careers within a career cluster
  3. the study of technologies to determine their usefulness
  4. a person who creates, manages, and maintains computer networks, software, and systems
  5. they ensure hardware, software, and other systems are working properly
  6. This person improves and maintains an information technology system
  7. creating or improving any part of technology
  8. the change in the number of people that are employed in a certain occupation in the future
  9. computer programs that run by giving instructions to the computer
Down
  1. a flaw or weakness that may allow harm to occur in an information technology system
  2. it is two or more computers or devices that exchange data
  3. all hardware, software, and other equipment operated by a group of users
  4. A type of software that can be installed and run on a computer, tablet, or other electronic device
  5. clusters a group of careers with similar features
  6. the physical parts that make up a computer or device

15 Clues: creating or improving any part of technologyclusters a group of careers with similar featuresthe physical parts that make up a computer or devicesmall groups of similar careers within a career clusterthe study of technologies to determine their usefulnessit is two or more computers or devices that exchange data...

Cybersecurity In December 2022-12-21

Cybersecurity In December crossword puzzle
Across
  1. 2 or more computers/devices connected together to share resources
  2. The process of identifying a user's identity
  3. Coding used to protect your information from unauthorized access
  4. a form of malware that spies on you and your computer activities
  5. acronym for Virtual Private Network
  6. an update released to fix bugs and other vulnerabilities
  7. Used to keep intruders out
Down
  1. Software or device that has a flaw that can be exploited
  2. software or hardware used to combat viruses
  3. malware that looks legitimate, like the Greek horse
  4. MALicious softWARE
  5. a copy of data that is used in case of emergencies
  6. Software that is used to encrypt a user's files then demand ransom
  7. Trying to get sensitive information through social engineering
  8. the act of using a vulnerability

15 Clues: MALicious softWAREUsed to keep intruders outthe act of using a vulnerabilityacronym for Virtual Private Networksoftware or hardware used to combat virusesThe process of identifying a user's identitya copy of data that is used in case of emergenciesmalware that looks legitimate, like the Greek horse...

CyberSecurity Terminologies Check! 2024-12-03

CyberSecurity Terminologies Check! crossword puzzle
Across
  1. A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
  2. A decoy system or network that serves to attract potential attackers.
  3. A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
  4. Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
  5. Locks the computer or data and demands a payment to release the machine.
  6. identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
  1. The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
  2. A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
  3. A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
  4. A process that ensures and confirms a user’s identity.
  5. A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
  6. A type of surveillance software that records keystrokes made by a user
  7. Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
  8. Spread to other machines on a network.Red : A color
  9. A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.

15 Clues: Spread to other machines on a network.Red : A colorA process that ensures and confirms a user’s identity.A decoy system or network that serves to attract potential attackers.A type of surveillance software that records keystrokes made by a userLocks the computer or data and demands a payment to release the machine....

AI-Driven Cybersecurity 2026-03-30

AI-Driven Cybersecurity crossword puzzle
Across
  1. Secure data coding
  2. AI that creates content
  3. Data changes that fool AI
  4. Harmful software
  5. Finding hidden attacks
  6. AI trained on text data
  7. AI that learns from data
  8. Handling cyber attacks
Down
  1. Network security barrier
  2. Controlled infected network
  3. Email scam attack
  4. Autonomous AI system
  5. Malware that locks files
  6. Protects online systems
  7. AI neural network model

15 Clues: Harmful softwareEmail scam attackSecure data codingAutonomous AI systemFinding hidden attacksHandling cyber attacksAI that creates contentAI trained on text dataProtects online systemsAI neural network modelNetwork security barrierMalware that locks filesAI that learns from dataData changes that fool AIControlled infected network

Patrick Cybersecurity Crossword 2026-04-01

Patrick Cybersecurity Crossword crossword puzzle
Across
  1. malicious software that secretly installs on your device to steal personal data like passwords, browsing habits, and financial details, often without your knowledge, causing identity theft, fraud, or system slowdowns
  2. Unsolicited messages sent to a large group of people
  3. backup of all changes made since last full backup
  4. malware disguised as legitimate software, tricking users into installing it to gain unauthorized access to their systems for stealing data, creating backdoors, or causing damage like deleting files
  5. the process of securing a system from attacks by discovering/reducing system vulnerabilities
  6. a type of malicious software (malware) that attaches to legitimate files, replicates itself, and spreads to other programs and devices, often without the user's knowledge
Down
  1. Consists of security controls designed to protect individual computers
  2. type of self-replicating malware that spreads across networks, exploiting security flaws to infect other devices independently
  3. unwanted software that secretly installs on your device to bombard you with ads, slowing performance and posing security risks
  4. has digital technology similar to a flash drive, no moving parts
  5. backup of any daily changes or new data files
  6. stores data using laser technology
  7. complete copy of all data files
  8. Emails that “fish” for users’ private information
  9. uses electronic technology; needs USB port to connect/save files

15 Clues: complete copy of all data filesstores data using laser technologybackup of any daily changes or new data filesbackup of all changes made since last full backupEmails that “fish” for users’ private informationUnsolicited messages sent to a large group of peoplehas digital technology similar to a flash drive, no moving parts...

Saxon Cybersecurity Crossword 2026-04-01

Saxon Cybersecurity Crossword crossword puzzle
Across
  1. a program/software designed to keep your location hidden/protect your personal information.
  2. a type of malware that needs a host to spread.
  3. the type of malware that provides remote access control to a device.
  4. a two step security code, can be a fingerprint scan, face scan, voice, eye ID, etc.
  5. When you go into the code of malware to figure out how it works, and deconstruct it.
  6. a type of malware that may display many ads/pop ups.
Down
  1. a type of malware that steals personal information and other data when on your computer.
  2. a one step security code.
  3. a type of malware that does many malicious things to your computer, like send spam, attack the DDoS, and spread more malware.
  4. a type of malware that allows someone to have high system access to a computer, and also hides malware.
  5. a type of malware that looks like something good or innocent, but is not once on your computer.
  6. a type of malware that does not need a host to spread. (Can spread through internet, websites, etc.)
  7. a software/program designed to let you browse through a fake device on your device, deterring some viruses from damaging your computer.
  8. a type of malware that once it takes in effect, it may take hostage of something that you own digitally, whether it be money, apps, or all of your computer’s files.
  9. Something that was programmed/coded specifically to harm your computer.

15 Clues: a one step security code.a type of malware that needs a host to spread.a type of malware that may display many ads/pop ups.the type of malware that provides remote access control to a device.Something that was programmed/coded specifically to harm your computer.a two step security code, can be a fingerprint scan, face scan, voice, eye ID, etc....

Mustafa’s Cybersecurity Crossword 2026-04-01

Mustafa’s Cybersecurity Crossword crossword puzzle
Across
  1. email attack
  2. Digital information
  3. Annoying spam
  4. Monitors and controls traffic
  5. An extra layer of protection
  6. Prevents and fixes
  7. Hidden malicious software
  8. Hides your location
  9. Self replicating
Down
  1. Protecting a network
  2. Collecting data
  3. Harmful infections
  4. Storage stored somewhere else
  5. Converting data into code
  6. Could be good or bad

15 Clues: email attackAnnoying spamCollecting dataSelf replicatingHarmful infectionsPrevents and fixesDigital informationHides your locationProtecting a networkCould be good or badConverting data into codeHidden malicious softwareAn extra layer of protectionMonitors and controls trafficStorage stored somewhere else

Patrick Cybersecurity Crossword 2026-04-01

Patrick Cybersecurity Crossword crossword puzzle
Across
  1. type of malicious software (malware) that attaches to legitimate files, replicates itself, and spreads to other programs and devices, often without the user's knowledge,
  2. type of self-replicating malware that spreads across networks
  3. Malicious software used by hackers or cybercriminals
  4. People who “hack” or break into computer systems
  5. Hackers that commit financial crimes
  6. copy of all changes made since last full backup
  7. Pop-up out of nowhere
  8. malicious software that secretly installs on your device to steal personal data like passwords, browsing habits, and financial details,
  9. copy of any daily changes/new files
Down
  1. Breaches of security causing harm to a computer
  2. copy of all files
  3. Unsolicited messages sent to a large group of people
  4. malware disguised as legitimate software, tricking users into installing it to gain unauthorized access to their systems
  5. Emails that “fish” for users’ private information
  6. unwanted software that secretly installs on your device to bombard you with ads,

15 Clues: copy of all filesPop-up out of nowherecopy of any daily changes/new filesHackers that commit financial crimesBreaches of security causing harm to a computercopy of all changes made since last full backupPeople who “hack” or break into computer systemsEmails that “fish” for users’ private information...

Lynette + Cybersecurity Crossword 2026-04-03

Lynette + Cybersecurity Crossword crossword puzzle
Across
  1. Authentication: Extra step to verify identity when logging in
  2. Malware disguised as a normal program
  3. Citizenship: Using the internet safely and responsibly
  4. Malware that spreads by attaching to files
  5. Someone who breaks into computer systems illegally
  6. Software that secretly tracks your activity
  7. Protects a network by controlling traffic
  8. Trick to steal personal info through fake messages
Down
  1. Secret code used to access accounts
  2. Malware that spreads itself across networks
  3. Malware hidden deep in a system to avoid detection
  4. Software designed to harm or access a computer without permission
  5. Security: Protecting a network from attacks or intrusions
  6. Malware that locks files and demands payment
  7. Scrambles data so only authorized users can read it

15 Clues: Secret code used to access accountsMalware disguised as a normal programProtects a network by controlling trafficMalware that spreads by attaching to filesMalware that spreads itself across networksSoftware that secretly tracks your activityMalware that locks files and demands paymentMalware hidden deep in a system to avoid detection...

Cybersecurity Vocab 2 2021-09-28

Cybersecurity Vocab 2 crossword puzzle
Across
  1. biometrics considered invalid
  2. Resources such as computers and accounts
  3. cycle or new roles
  4. Validating a user
  5. authorizing access to user using biological feature
  6. token into USB port
  7. permission giver from other things
  8. denying authorized biometircs credential
  9. permission recieved from higher level
Down
  1. Everyplace the hacker can get into
  2. standard authentication protocol
  3. permission given at certain lications
  4. reducing vulnerability
  5. Identity Managementsemi-independent systems
  6. FAR and FRR are equal

15 Clues: Validating a usercycle or new rolestoken into USB portFAR and FRR are equalreducing vulnerabilitybiometrics considered invalidstandard authentication protocolEveryplace the hacker can get intopermission giver from other thingspermission given at certain licationspermission recieved from higher levelResources such as computers and accounts...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Department to call for computer problem
  2. A device you should not plug in
  3. Think before you -- ?
  4. A type of malware that encrypts your file
  5. Something you should never share
  6. Programs installed on your phone are called?
Down
  1. Location of the Bank's Disaster Recovery Site
  2. A type of an email scam
  3. key word used to send secure email
  4. Password should always be?
  5. Northern Bank's Mission Statement
  6. Location of the Bank's head quarter
  7. A way to access the bank resources remotely
  8. Last name of the head of IT
  9. Type of an Operating system

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

cybersecurity Puzzle-Enrique 2023-08-22

cybersecurity Puzzle-Enrique crossword puzzle
Across
  1. prevents unauthorized changes
  2. scrambling data
  3. UI redress attack
  4. false perception of reality
  5. disguised attacks
  6. fools users into providing sensitive information
  7. personal laptop, smart phones, ect
Down
  1. online harassment
  2. virtual private network
  3. locks users out until they pay
  4. short for malicious software
  5. prevents unauthorized access
  6. transmits information without user knowing
  7. codes that protect data
  8. carry out cyber attacks on other systems

15 Clues: scrambling dataonline harassmentUI redress attackdisguised attacksvirtual private networkcodes that protect datafalse perception of realityshort for malicious softwareprevents unauthorized accessprevents unauthorized changeslocks users out until they paypersonal laptop, smart phones, ectcarry out cyber attacks on other systems...

Cybersecurity Crossword Puzzle 2026-02-27

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Structures like NIST used to manage security risk.
  2. Software designed to damage or gain unauthorized access to a system.
  3. A security handshake that requires at least two pieces of proof.
  4. Top IT security role
  5. Malware that demands payment to unlock files.
  6. Phishing via voice or phone call.
Down
  1. The digital sentry that monitors network traffic.
  2. Verifying that a user is who they claim to be
  3. AI-generated media that replaces a person's likeness.
  4. A vulnerability that is previously unknown to the software developer.
  5. A digital cipher that keeps data from prying eyes.
  6. Phishing via SMS text message.
  7. The "weakest link" in the security chain.
  8. System generated cryptographic key pairs more secure than a password.
  9. A digital "sit-in" that overwhelms a website’s server with fake requests.

15 Clues: Top IT security rolePhishing via SMS text message.Phishing via voice or phone call.The "weakest link" in the security chain.Verifying that a user is who they claim to beMalware that demands payment to unlock files.The digital sentry that monitors network traffic.A digital cipher that keeps data from prying eyes....

Jacob’s cybersecurity crossword 2026-04-07

Jacob’s cybersecurity crossword crossword puzzle
Across
  1. A program that appears harmless but contains malicious code to give a hacker access.
  2. A network of private computers infected with malicious software and controlled as a group.
  3. Malware that locks or encrypts your files and demands payment to get them back.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. The trail of data you leave behind while using the internet.
  6. The process of verifying the identity of a user or process.
  7. Short for "malicious software," designed to damage or gain unauthorized access to a computer.
  8. A piece of code that can copy itself and typically has a detrimental effect, such as corrupting the system.
Down
  1. A weakness in a computer system that could be exploited by a cyberattack.
  2. The process of converting information into a secret code to prevent unauthorized access.
  3. Using human interaction to manipulate people into breaking normal security procedures.
  4. The correct or acceptable way of communicating on the internet.
  5. A security process that requires two different forms of identification to access an account.
  6. Software that secretly records what you do on your computer, like capturing your keystrokes.
  7. A deceptive email or message designed to trick you into revealing personal information.

15 Clues: The process of verifying the identity of a user or process.The trail of data you leave behind while using the internet.The correct or acceptable way of communicating on the internet.A weakness in a computer system that could be exploited by a cyberattack.Malware that locks or encrypts your files and demands payment to get them back....

Joaly cybersecurity puzzle 2026-04-07

Joaly cybersecurity puzzle crossword puzzle
Across
  1. theft- When someone steals your personal information
  2. a secret word used to log into account
  3. horse- looks safe but secretly harms computer
  4. Information stored on a computer
  5. Software designed to harm or steal information
  6. Tricking people into giving personal information
  7. A copy of your data in case something is lost
  8. Protected from danger or unauthorized access
Down
  1. A harmful program that can damage your computer
  2. Software that secretly watches what you do online
  3. A type of malware that spreads
  4. The name you use to identify yourself online
  5. A system that blocks unwanted access to your computer
  6. Installing the newest version of software for safety and fixes
  7. A person who tries to break into computers or accounts

15 Clues: A type of malware that spreadsInformation stored on a computera secret word used to log into accountThe name you use to identify yourself onlineProtected from danger or unauthorized accesshorse- looks safe but secretly harms computerA copy of your data in case something is lostSoftware designed to harm or steal information...

Michel cybersecurity crossword 2026-04-01

Michel cybersecurity crossword crossword puzzle
Across
  1. Malware that hides in a system
  2. Harmful computer software
  3. Software that secretly collects information
  4. Two step login security
  5. Trick to steal personal information
  6. Verifying identity
  7. Person who breaks into systems
Down
  1. Malware that spreads through networks
  2. Safe behavior online
  3. Malware that attaches to files
  4. Secret word to log in
  5. Protecting computer networks
  6. Malware that locks files for money
  7. Blocks unauthorized network access
  8. Coding data to keep it safe

15 Clues: Verifying identitySafe behavior onlineSecret word to log inTwo step login securityHarmful computer softwareCoding data to keep it safeProtecting computer networksMalware that hides in a systemMalware that attaches to filesPerson who breaks into systemsMalware that locks files for moneyBlocks unauthorized network access...

Aniya’s cybersecurity crossword 2026-04-01

Aniya’s cybersecurity crossword crossword puzzle
Across
  1. – Get a file
  2. – Harmful software
  3. – Breaks into systems
  4. – Tricks for info
  5. – Send a file
  6. – Spreads by itself
  7. – Watches secretly
  8. – Login code
Down
  1. – Scrambles data
  2. – Copy of files
  3. – Locks files for money
  4. – Stops viruses
  5. – Harmful program
  6. – Blocks threats
  7. – Account name

15 Clues: – Get a file– Login code– Send a file– Account name– Copy of files– Stops viruses– Scrambles data– Blocks threats– Harmful program– Tricks for info– Harmful software– Watches secretly– Spreads by itself– Breaks into systems– Locks files for money

Camila’s cybersecurity crossword 2026-04-01

Camila’s cybersecurity crossword crossword puzzle
Across
  1. Being protected from danger online
  2. Global network connecting computer
  3. An attempt to damage or access a system
  4. Protected from harm or danger
  5. Something kept hidden
  6. A mistake in a system or program
  7. To keep something safe
Down
  1. Something that can cause harm
  2. The ability to enter or use a system
  3. A person who uses a computer system
  4. Instructions for a computer
  5. Information stored on a computer
  6. A computer that provides data to others
  7. To manage or direct a system
  8. To change a password or system

15 Clues: Something kept hiddenTo keep something safeInstructions for a computerTo manage or direct a systemSomething that can cause harmProtected from harm or dangerTo change a password or systemInformation stored on a computerA mistake in a system or programBeing protected from danger onlineGlobal network connecting computer...

Isirani cybersecurity crossword 2026-04-01

Isirani cybersecurity crossword crossword puzzle
Across
  1. Coding data to keep it safe
  2. Person who breaks into systems
  3. Software that secretly collects information
  4. Secret word used to log in
  5. Malware that spreads through networks
  6. Harmful computer software
  7. Process of proving identity
  8. Malware that spreads through files
Down
  1. Malware that locks files for money
  2. Stolen private information from a system
  3. Fake messages used to steal information
  4. Extra security code after login
  5. Connected computers sharing data
  6. Software that removes malware
  7. Security system that blocks threats

15 Clues: Harmful computer softwareSecret word used to log inCoding data to keep it safeProcess of proving identitySoftware that removes malwarePerson who breaks into systemsExtra security code after loginConnected computers sharing dataMalware that locks files for moneyMalware that spreads through filesSecurity system that blocks threats...

Sarah Cybersecurity Password 2026-04-01

Sarah Cybersecurity Password crossword puzzle
Across
  1. Horse A download disguised as a program.
  2. A code that is capable of corrupting the system or destroying data.
  3. 1 The duplication of data files to at least 2 hard drives simultaneously.
  4. Hardening Making a computer system more secure by fixing weaknesses so attackers cant get in.
  5. Security Keeps software and apps from being attacked.
  6. Unwanted software that secretly installs and puts pop ups on your device.
  7. Spreads across devices while replicating within a network.
  8. Backup A backup of daily changed or new files.
Down
  1. Footprint The collection of data stored online, created while an individual is using the internet.
  2. Security Protects how data is handled and shared.
  3. Security Protects data from being changed or stolen.
  4. Recovery Plans how to restore data after being attacked.
  5. Backup A complete copy of all data files.
  6. Security Protects computer networks from hackers and unauthorized access.
  7. Freedom from being observed or disturbed.

15 Clues: Freedom from being observed or disturbed.Horse A download disguised as a program.Backup A backup of daily changed or new files.Security Protects how data is handled and shared.Backup A complete copy of all data files.Security Protects data from being changed or stolen.Security Keeps software and apps from being attacked....

Landon cybersecurity puzzle 2026-04-07

Landon cybersecurity puzzle crossword puzzle
Across
  1. A security system that blocks or allows network traffic based on safety rules.
  2. A secret set of characters used to access accounts or devices.
  3. Security — Protecting a computer network from unauthorized access or attacks.
  4. Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
  5. A scam where attackers trick you into giving personal information through fake emails or websites.
  6. Malware that spreads on its own across networks without needing a file or user action.
  7. A type of malware that spreads by attaching itself to files and activates when the file is opened.
  8. The process of converting data into a coded form so only authorized users can read it.
  9. Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
  1. Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
  2. A hidden program that gives hackers control over a system while staying undetected.
  3. Backup — Saving copies of your files in case the original data is lost or damaged.
  4. Malware that locks or threatens your data and demands payment to restore access.
  5. Citizenship — Using technology responsibly, safely, and respectfully online.
  6. Software that secretly monitors your activity and collects personal information.

15 Clues: A secret set of characters used to access accounts or devices.Citizenship — Using technology responsibly, safely, and respectfully online.Security — Protecting a computer network from unauthorized access or attacks.A security system that blocks or allows network traffic based on safety rules....

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Man's best friend
  3. Steals data and holds it for ransom
  4. Has a trunk
  5. Flying mammal
Down
  1. Large marsupial
  2. What are we here for?
  3. What is my name?

8 Clues: Has a trunkFlying mammalLarge marsupialWhat is my name?Man's best friendLikes to chase miceWhat are we here for?Steals data and holds it for ransom