cybersecurity Crossword Puzzles
Cybersecurity Concepts 2024-03-31
Across
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- the name commonly given to unwanted emails
- Made up of devices that are all connected to each other, like computers and
- a security system that forms a virtual perimeter around a network of workstations preventing an attack
- the process of verifying the identity of a user or piece of information
Down
- a process of maintaining data confidentiality by converting plain data into secret code
- makes sure that there are no unauthorized changes to information of systems
- A Virtual Private Network
- a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
- a program that gives a hacker remote access to, and control over, a computer or network
10 Clues: A Virtual Private Network • the name commonly given to unwanted emails • the process of verifying the identity of a user or piece of information • makes sure that there are no unauthorized changes to information of systems • Made up of devices that are all connected to each other, like computers and • ...
Cybersecurity puzzle 2025-02-03
Across
- - Malicious software that can harm your computer
- - An email scam that attempts to trick users into giving up personal information
- - The process of converting data into unreadable code for security
- - Software that prevents unauthorized access to a network
- - The practice of disguising a communication to appear as a trusted source
Down
- - A secret combination of characters used to access an account
- - A program that appears harmless but has malicious intent
- - A security measure used to verify a user's identity, often using two different forms of authentication
- - A type of attack where a person tricks someone into revealing sensitive information
- - A type of cyberattack where traffic is flooded to a system to make it unavailable
10 Clues: - Malicious software that can harm your computer • - Software that prevents unauthorized access to a network • - A program that appears harmless but has malicious intent • - A secret combination of characters used to access an account • - The process of converting data into unreadable code for security • ...
CyberSecurity 1 2024-07-23
Across
- Entitlement is very closely related to ... performed
- ... to standard is verified during audit
- IAM also differentiates 'authenticate' and ...
- We differentiate between User and ... in IAM
- ISO 27000 standards has 14 categories for ...
Down
- S in SOD
- Issue faced by user in IT
- A in CIA
- C in PDCA
- Example of non-human identity
10 Clues: S in SOD • A in CIA • C in PDCA • Issue faced by user in IT • Example of non-human identity • ... to standard is verified during audit • We differentiate between User and ... in IAM • ISO 27000 standards has 14 categories for ... • IAM also differentiates 'authenticate' and ... • Entitlement is very closely related to ... performed
Cybersecurity Basics 2024-07-25
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
- A security process that verifies the identity of a user or device attempting to access a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Puzzle 2024-07-19
Across
- Unauthorized access to or manipulation of a computer system or network
- A secret word or phrase used to gain access to a system.
- The practice of protecting systems, networks, and programs from digital attacks
- A digital certificate used to encrypt and authenticate a website
- A type of software designed to harm or exploit any programmable device.
Down
- The act of pretending to be someone else to gain sensitive information
- A type of malicious software that demands ransom
- An attack that floods a network with excessive traffic, disrupting service
- Unwanted email that often contains malware or phishing attempts
- Software designed to detect and remove malicious software
10 Clues: A type of malicious software that demands ransom • A secret word or phrase used to gain access to a system. • Software designed to detect and remove malicious software • Unwanted email that often contains malware or phishing attempts • A digital certificate used to encrypt and authenticate a website • ...
cybersecurity Y.V 2024-10-17
Across
- Way a programmer may bypass securityto access a computer through trapdoor programs
- Security system that forms a virtual perimeter around a network
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- software that is secretly installed on a user's device to gather sensitive data
- Damage or destroy a computer network or system
- A malicious computer program
Down
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Person who try to gain unauthorized
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
cybersecurity Y.V 2024-10-17
Across
- Damage or destroy a computer network or system
- A malicious computer program
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Security system that forms a virtual perimeter around a network
Down
- Way a programmer may bypass securityto access a computer through trapdoor programs
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- Person who try to gain unauthorized
- software that is secretly installed on a user's device to gather sensitive data
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
Cybersecurity Crossword 2025-11-13
Cybersecurity Basics 2025-11-13
Across
- A short way to say “Information Technology.”
- Your special name you use to log into a computer, cell phone, tablet, or website.
- Something you type to log in — keep it secret!
- A computer, tablet, or phone is called a _______.
- To keep something from harm or danger.
- Something that keeps your personal stuff private.
Down
- What we use to surf websites and watch videos.
- Keeping your computer and personal data safe.
- Using smart rules online helps keep you _______.
- Inventions that come from science and research. It can solve problems and make our lives easier.
10 Clues: To keep something from harm or danger. • A short way to say “Information Technology.” • Keeping your computer and personal data safe. • What we use to surf websites and watch videos. • Something you type to log in — keep it secret! • Using smart rules online helps keep you _______. • A computer, tablet, or phone is called a _______. • ...
Cybersecurity Awareness 2025-10-15
Across
- Fraudulent attempt to obtain sensitive information via email.
- A type of malicious software that locks files and demands payment.
- When employees unknowingly help hackers, it's called an ___ threat.
- Regularly updating this can patch security vulnerabilities.
- Security appliance that limits access to data or systems.
Down
- A secret word or phrase used to gain access to a system.
- Portable devices like USBs can carry this kind of malicious code.
- A common workplace policy: "Don't write your password on a ___."
- Two-step process to verify identity.
- You should never connect to public ___ without using a VPN.
10 Clues: Two-step process to verify identity. • A secret word or phrase used to gain access to a system. • Security appliance that limits access to data or systems. • You should never connect to public ___ without using a VPN. • Regularly updating this can patch security vulnerabilities. • Fraudulent attempt to obtain sensitive information via email. • ...
CyberSecurity Crossword 2025-10-22
Across
- An online trick where someone tries to steal your personal information by pretending to be someone else.
- A strong secret word or phrase used to access accounts.
- Protecting systems, networks, and data from digital attacks.
- A hidden, harmful program disguised as something safe to download.
- The practice of using technology in a safe and responsible way.
- Messages that threaten or harass others through technology.
Down
- Traces of information left online by users.
- Software that protects a computer from viruses and malware.
- The process of scrambling information to keep it private.
- A wall of security that blocks unauthorized access to a network.
10 Clues: Traces of information left online by users. • A strong secret word or phrase used to access accounts. • The process of scrambling information to keep it private. • Software that protects a computer from viruses and malware. • Messages that threaten or harass others through technology. • Protecting systems, networks, and data from digital attacks. • ...
Module 1 Introductory Course Telehealth 2017-03-01
8 Clues: Mobile health • Electronic health • Providing remote healthcare • Refers to teleconsultations • health Popular emerging term • Measures taken to protect a computer • Extended term for information technology • Ability of computers exchange information"
cy-rite crossword 2025-11-10
Across
- Response The process of identifying, managing, and recovering from a cybersecurity breach.
- Software that secretly collects user information without consent.
- Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
- Malware disguised as legitimate software, used to trick users into installing it.
Down
- The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- The process of converting encrypted data back into its original readable form.
- A method of guessing passwords or encryption keys by trying all possible combinations.
- A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
- Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
- A self-replicating program that spreads through networks without user action.
10 Clues: Software that secretly collects user information without consent. • A self-replicating program that spreads through networks without user action. • The process of converting encrypted data back into its original readable form. • Malware disguised as legitimate software, used to trick users into installing it. • ...
Warm-up 2025-12-20
10 Clues: Synonym for big • Synonym for new • Feeling of loneliness • What makes Internet safe • Short for "applications" • A gathering of people online • Someone doing something great. • Synonym for "negative side-effects" • Synonym for "online on social network" • Something that has a negative effect on you.
NAVFAC Capabilities 2023-02-13
Across
- _____ Handling Ashore Procurement
- NEPA Requirement: Environmental ______
- _______ and Facilities Operations
- Real Estate _______ and Management
- _______ Facilities and Equipment Engineering
Down
- Military Construction acronym
- Basic physical and organizational structures and facilities
- Protection against unauthorized data usage
- _______Vehicles providing transportation services
- _______ Conservation: Health assessment of natural and cultural resources
10 Clues: Military Construction acronym • _____ Handling Ashore Procurement • _______ and Facilities Operations • Real Estate _______ and Management • NEPA Requirement: Environmental ______ • Protection against unauthorized data usage • _______ Facilities and Equipment Engineering • _______Vehicles providing transportation services • ...
Cybersecurity Awareness Month Crossword Challenge 2023-09-25
Across
- When malicious actors send an email-based attack to trick the recipient into taking an action.
- The term for an email-based attack that involves the use of a QR code
- Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
- The month associated with Cybersecurity Awareness.
- The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
- A disgruntled or financially motivated employee is called a(n) ______ threat.
- The color of the banner that indicates a company email is from an external source.
- The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
- The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
- The action every associate must take when a suspicious email message is identified.
10 Clues: The month associated with Cybersecurity Awareness. • The term for an email-based attack that involves the use of a QR code • A disgruntled or financially motivated employee is called a(n) ______ threat. • The color of the banner that indicates a company email is from an external source. • ...
algorithms 2025-10-28
Across
- converts code into readable data
- study of secure communication
- secure distributed digital ledger
- logical true or false value
- delay between request and response
- software made to harm
- structure for programming language
Down
- repetition of a code block
- rules for data communication
- protecting system from attacks
10 Clues: software made to harm • repetition of a code block • logical true or false value • rules for data communication • study of secure communication • protecting system from attacks • converts code into readable data • secure distributed digital ledger • delay between request and response • structure for programming language
AWS 2024-08-14
Issue #1 2023-09-11
Across
- The Spooky Month Holiday
- Red ________ Week - Keeping kids drug-free
- Magnolia ________ Institute
- Racket sport this season
- Recent Hurricane in California
Down
- Seniors should be thinking about their college __________
- Homecoming King and ______
- Applying to a 4-year __________
- Future __________ Leaders of America Club
9 Clues: The Spooky Month Holiday • Racket sport this season • Homecoming King and ______ • Magnolia ________ Institute • Recent Hurricane in California • Applying to a 4-year __________ • Future __________ Leaders of America Club • Red ________ Week - Keeping kids drug-free • Seniors should be thinking about their college __________
Cybersecurity and Cryptography 2024-10-17
Across
- What is a digital document that verifies the ownership of a public key?
- What type of malware records keystrokes made by a user?
- What term refers to the permission to enter or use a system or network?
- What term refers to malicious software designed to harm or exploit devices?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of verifying the identity of a user or system?
- What is the process of converting data into a fixed-size string of characters for security?
Down
- What device monitors and controls incoming and outgoing network traffic?
- What is the process of converting ciphertext back into plaintext?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of creating copies of data to restore in case of loss?
- What is a physical or digital object used to prove identity in security systems?
- What type of malware disguises itself as legitimate software?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Cybersecurity Crossword Puzzle 2025-05-06
Across
- Software that secretly gathers user information
- Software that is harmful to your system
- Software used to detect and remove malicious software
- A security system that blocks unauthorized access to a network
- A hidden way to access a system or software
- The process of converting data into a secret code
- A method of guessing passwords by trying all combinations
- A fake email that tricks you into giving personal info
Down
- A tool that records everything you type
- A tool that hides your IP and encrypts your internet connection
- A vulnerability that is exploited before it’s known to developers
- A type of malware that locks your files until you pay
- A type of malware disguised as a legitimate file
- An extra step to verify your identity during login
- Manipulating people to reveal confidential information
15 Clues: A tool that records everything you type • Software that is harmful to your system • A hidden way to access a system or software • Software that secretly gathers user information • A type of malware disguised as a legitimate file • The process of converting data into a secret code • An extra step to verify your identity during login • ...
AI in Cybersecurity 2025-10-20
Across
- – What cybersecurity keeps us.
- – Information AI studies.
- – Harmful software.
- – What we do to teach AI.
- – A common target for phishing.
- – Automated programs used online.
- – What AI learns from.
Down
- – The goal of cybersecurity.
- – Process to teach AI models.
- – A warning from AI about danger.
- – A small automated tool.
- – Short for Artificial Intelligence.
12 Clues: – Harmful software. • – What AI learns from. • – Information AI studies. • – What we do to teach AI. • – A small automated tool. • – The goal of cybersecurity. • – Process to teach AI models. • – What cybersecurity keeps us. • – A common target for phishing. • – A warning from AI about danger. • – Automated programs used online. • – Short for Artificial Intelligence.
Cybersecurity Vocab 2 2021-09-28
Across
- biometrics considered invalid
- Resources such as computers and accounts
- cycle or new roles
- Validating a user
- authorizing access to user using biological feature
- token into USB port
- permission giver from other things
- denying authorized biometircs credential
- permission recieved from higher level
Down
- Everyplace the hacker can get into
- standard authentication protocol
- permission given at certain lications
- reducing vulnerability
- Identity Managementsemi-independent systems
- FAR and FRR are equal
15 Clues: Validating a user • cycle or new roles • token into USB port • FAR and FRR are equal • reducing vulnerability • biometrics considered invalid • standard authentication protocol • Everyplace the hacker can get into • permission giver from other things • permission given at certain lications • permission recieved from higher level • Resources such as computers and accounts • ...
October Cybersecurity Month 2019-09-19
Across
- Department to call for computer problem
- A device you should not plug in
- Think before you -- ?
- A type of malware that encrypts your file
- Something you should never share
- Programs installed on your phone are called?
Down
- Location of the Bank's Disaster Recovery Site
- A type of an email scam
- key word used to send secure email
- Password should always be?
- Northern Bank's Mission Statement
- Location of the Bank's head quarter
- A way to access the bank resources remotely
- Last name of the head of IT
- Type of an Operating system
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Last name of the head of IT • Type of an Operating system • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
cybersecurity Puzzle-Enrique 2023-08-22
Across
- prevents unauthorized changes
- scrambling data
- UI redress attack
- false perception of reality
- disguised attacks
- fools users into providing sensitive information
- personal laptop, smart phones, ect
Down
- online harassment
- virtual private network
- locks users out until they pay
- short for malicious software
- prevents unauthorized access
- transmits information without user knowing
- codes that protect data
- carry out cyber attacks on other systems
15 Clues: scrambling data • online harassment • UI redress attack • disguised attacks • virtual private network • codes that protect data • false perception of reality • short for malicious software • prevents unauthorized access • prevents unauthorized changes • locks users out until they pay • personal laptop, smart phones, ect • carry out cyber attacks on other systems • ...
Week 1 Puzzle 2020-08-25
Across
- This is an example of "something you know"--one of the key factors in MFA.
- Approximately $6 trillion is planned on being spent on this by 2021.
- General term for the type of device most often connecting to public WiFi.
- This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
- Globally, one of these attacks every 39 seconds.
- By 2025, there will be an estimated 75 billion of these devices connected to the internet.
- 95% of cybersecurity breaches involve this type of error.
Down
- Any incident that results in unauthorized access to computer data, applications, networks or devices.
- The most dangerous type of WiFi.
- This is an example of "something you are"--one of the key factors of MFA.
- This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
- To increase your personal internet security, consider turning off the "save password" feature in this.
- 93% of these organizations have experienced a data breach within the past 3 years.
- Software that is created specifically to help detect, prevent and remove malicious software.
14 Clues: The most dangerous type of WiFi. • Globally, one of these attacks every 39 seconds. • 95% of cybersecurity breaches involve this type of error. • Approximately $6 trillion is planned on being spent on this by 2021. • This is an example of "something you are"--one of the key factors of MFA. • ...
Cybersecurity Awareness 2023 2023-10-06
Across
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
- Digital ______ is the ability to use digital technology and media effectively
- Illegal _____ of copyrighted material is often referred to as piracy
- Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Cybersecurity awareness month
- Online commenter whose intent is to attack views expressed online; these attacks are often personal
- Many features in online _____ can expose players to predators
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
- A person who attempts to gain unauthorized access to computer systems
- _____ settings help control things like your profile, contact, and other information relating to your account
- Online harrassment
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- ______ theft is a type of crime in which your private information is stolen and used for criminal activity
- Designed to detect and destroy computer viruses
15 Clues: Online harrassment • Cybersecurity awareness month • Designed to detect and destroy computer viruses • Many features in online _____ can expose players to predators • Illegal _____ of copyrighted material is often referred to as piracy • A person who attempts to gain unauthorized access to computer systems • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What device monitors and controls incoming and outgoing network traffic?
- What is a digital document that verifies the ownership of a public key?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of converting data into a fixed-size string of characters for security?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of converting ciphertext back into plaintext?
- What type of malware disguises itself as legitimate software?
- What type of malware records keystrokes made by a user?
Down
- What is a physical or digital object used to prove identity in security systems?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- What term refers to malicious software designed to harm or exploit devices?
- What term refers to the permission to enter or use a system or network?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of verifying the identity of a user or system?
- What is the process of creating copies of data to restore in case of loss?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
crossword about Cybersecurity 2025-06-07
Across
- Malware that encrypts files for ransom
- Network of infected devices
- Small data file stored by websites
- Software that secretly monitors activity
- Scrambling data for security
- Person who exploits system vulnerabilities
- Remote data storage and computing
Down
- Fraudulent attempts to steal info
- Harmful software like viruses
- Authentication using fingerprints
- Directs internet traffic
- Decentralized ledger technology
- Malware disguised as legitimate software
- Secures internet connections
- Network security barrier
15 Clues: Directs internet traffic • Network security barrier • Network of infected devices • Secures internet connections • Scrambling data for security • Harmful software like viruses • Decentralized ledger technology • Fraudulent attempts to steal info • Authentication using fingerprints • Remote data storage and computing • Small data file stored by websites • ...
CBL Puzzle 2023-09-01
Across
- Divide and conquer. Tool to reduce the scope
- Roofies mixed in software
- Party host
- Secure data with a pinch of salt
- Chained blocks. Runs crypto
- 12 characters long in PCI DSS v4.0
Down
- Something you are (Inherence factor)
- Rhymes with fishing
- Your cybersecurity partner
- Vaccine for your Ssystems
- Burning wall in cold rooms
- Data secured. Locked with a key
- Malicious code on a horse
13 Clues: Party host • Rhymes with fishing • Vaccine for your Ssystems • Roofies mixed in software • Malicious code on a horse • Your cybersecurity partner • Burning wall in cold rooms • Chained blocks. Runs crypto • Data secured. Locked with a key • Secure data with a pinch of salt • 12 characters long in PCI DSS v4.0 • Something you are (Inherence factor) • ...
Browsing safely 2025-06-19
Across
- hoaxing or misleading
- harming or harassing using information technology
- illegal entry in computer
- illegal method to get money
- security to prevent cybercrime
- disturbs normal functioning of computer
- act of stealing and misusing someone's personal information
- building a face friendship
- any information about a person can be found
- conduct a terrosism by computer
Down
- protects from virus
- any criminal activity intended to harm anyone using computer
- complaining against cybercrime
- that helps in preventing unauthorised access to your computer
- protects from cyber crime
15 Clues: protects from virus • hoaxing or misleading • illegal entry in computer • protects from cyber crime • building a face friendship • illegal method to get money • complaining against cybercrime • security to prevent cybercrime • conduct a terrosism by computer • disturbs normal functioning of computer • any information about a person can be found • ...
Cybersecurity Careers Crossword 2022-09-26
Across
- the process of getting new software or hardware up and running
- small groups of similar careers within a career cluster
- the study of technologies to determine their usefulness
- a person who creates, manages, and maintains computer networks, software, and systems
- they ensure hardware, software, and other systems are working properly
- This person improves and maintains an information technology system
- creating or improving any part of technology
- the change in the number of people that are employed in a certain occupation in the future
- computer programs that run by giving instructions to the computer
Down
- a flaw or weakness that may allow harm to occur in an information technology system
- it is two or more computers or devices that exchange data
- all hardware, software, and other equipment operated by a group of users
- A type of software that can be installed and run on a computer, tablet, or other electronic device
- clusters a group of careers with similar features
- the physical parts that make up a computer or device
15 Clues: creating or improving any part of technology • clusters a group of careers with similar features • the physical parts that make up a computer or device • small groups of similar careers within a career cluster • the study of technologies to determine their usefulness • it is two or more computers or devices that exchange data • ...
Cybersecurity In December 2022-12-21
Across
- 2 or more computers/devices connected together to share resources
- The process of identifying a user's identity
- Coding used to protect your information from unauthorized access
- a form of malware that spies on you and your computer activities
- acronym for Virtual Private Network
- an update released to fix bugs and other vulnerabilities
- Used to keep intruders out
Down
- Software or device that has a flaw that can be exploited
- software or hardware used to combat viruses
- malware that looks legitimate, like the Greek horse
- MALicious softWARE
- a copy of data that is used in case of emergencies
- Software that is used to encrypt a user's files then demand ransom
- Trying to get sensitive information through social engineering
- the act of using a vulnerability
15 Clues: MALicious softWARE • Used to keep intruders out • the act of using a vulnerability • acronym for Virtual Private Network • software or hardware used to combat viruses • The process of identifying a user's identity • a copy of data that is used in case of emergencies • malware that looks legitimate, like the Greek horse • ...
CyberSecurity Terminologies Check! 2024-12-03
Across
- A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
- A decoy system or network that serves to attract potential attackers.
- A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
- Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
- Locks the computer or data and demands a payment to release the machine.
- identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
- The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
- A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
- A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
- A process that ensures and confirms a user’s identity.
- A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
- A type of surveillance software that records keystrokes made by a user
- Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
- Spread to other machines on a network.Red : A color
- A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.
15 Clues: Spread to other machines on a network.Red : A color • A process that ensures and confirms a user’s identity. • A decoy system or network that serves to attract potential attackers. • A type of surveillance software that records keystrokes made by a user • Locks the computer or data and demands a payment to release the machine. • ...
Technology puzzle 2025-10-02
Across
- physical parts of a computer
- device used to type information
- handheld device with apps
- software application for phones or computers
- global system connecting computers
- computer-generated 3D environment
- machine designed to perform tasks
- secret code for security access
- wireless internet connection
- electronic message system
- protection of systems and networks
Down
- organized collection of data
- computer that provides data to others
- a device for processing information
- a collection of web pages
- technology that simulates human thinking
- system of connected computers
- online storage and computing services
- programs that run on a computer
- device that produces a paper copy
20 Clues: a collection of web pages • handheld device with apps • electronic message system • organized collection of data • physical parts of a computer • wireless internet connection • system of connected computers • device used to type information • secret code for security access • programs that run on a computer • computer-generated 3D environment • machine designed to perform tasks • ...
TEMA 2 2025-10-24
Across
- Sistem keamanan data digital
- Platform untuk belajar atau kursus online
- Pembayaran digital via ponsel
- Promosi produk melalui media sosial
- Alat pembayaran otomatis di toko online
- Model bisnis online berbasis internet
- Teknologi untuk transaksi cepat dan aman
- Penyimpanan data online
- Uang digital yang digunakan secara global
- Platform jual-beli online
Down
- Layanan pengiriman barang berbasis digital
- Aktivitas jual-beli tanpa uang tunai
- Teknologi untuk mengenali wajah atau suara
- , Analisis data untuk strategi bisnis digital
- Platform untuk membangun toko online
- Layanan transportasi berbasis aplikasi
- Teknologi komunikasi internet cepat
- Sistem manajemen konten website
- , Layanan streaming konten digital
- ,Perangkat lunak untuk mengelola bisnis online
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Teknologi komunikasi internet cepat • Promosi produk melalui media sosial • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
TEMA 2 2025-10-24
Across
- Sistem keamanan data digital
- Platform untuk belajar atau kursus online
- Pembayaran digital via ponsel
- Promosi produk melalui media sosial
- Alat pembayaran otomatis di toko online
- Model bisnis online berbasis internet
- Teknologi untuk transaksi cepat dan aman
- Penyimpanan data online
- Uang digital yang digunakan secara global
- Platform jual-beli online
Down
- Layanan pengiriman barang berbasis digital
- Aktivitas jual-beli tanpa uang tunai
- Teknologi untuk mengenali wajah atau suara
- , Analisis data untuk strategi bisnis digital
- Platform untuk membangun toko online
- Layanan transportasi berbasis aplikasi
- Teknologi komunikasi internet cepat
- Sistem manajemen konten website
- , Layanan streaming konten digital
- ,Perangkat lunak untuk mengelola bisnis online
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Teknologi komunikasi internet cepat • Promosi produk melalui media sosial • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
Kigen Christmas Crossword 2025 2025-12-16
Across
- Foundation of good partnerships
- Connected product in the field
- What you’re solving right now
- A friendly way to start a conversation
- Safe and protected
- Downloaded to enable connectivity
- Standards body behind eSIM specs
- Connected devices ecosystem
- Embedded SIM technology
Down
- Designed to withstand disruption
- Season when devices and people recharge
- Worldwide in reach
- What Kigen always aims to keep things 😉
- Fruit or famous tech company
- Devices rely on this to communicate
- Something batteries (and people) need
- Tiny but essential technology
- Keeps devices protected over time
- Secure connectivity specialists
- Upcoming EU cybersecurity regulation
20 Clues: Worldwide in reach • Safe and protected • Embedded SIM technology • Connected devices ecosystem • Fruit or famous tech company • What you’re solving right now • Tiny but essential technology • Connected product in the field • Foundation of good partnerships • Secure connectivity specialists • Designed to withstand disruption • Standards body behind eSIM specs • ...
Informatika 7 Bab 1 2025-08-26
Across
- Rekam medis merupakan dampak informatika dibidang
- Upaya melindungi keamanan di internet
- Langkah logis dan sistematis menyelesaikan masalah
- Konsultasi dokter melalui daring
- Proses menulis instruksi dalam bahasa pemrograman
- Kumpulan fakta mentah yang belum diolah
Down
- Elemen infografis yang membuat cantik tampilan
- Aplikasi GPS dan peta digital untuk navigasi
- Unsur penting pembuatan infografis
- Salah satu aplikasi kecerdasan buatan
- Platform pembelajaran daring
- Halaman pada presentasi
- Kemajuan teknologi membuat aktivitas menjadi lebih..
- Representasi visual dari informasi
- Salah satu aplikasi membuat presentasi
15 Clues: Halaman pada presentasi • Platform pembelajaran daring • Konsultasi dokter melalui daring • Unsur penting pembuatan infografis • Representasi visual dari informasi • Upaya melindungi keamanan di internet • Salah satu aplikasi kecerdasan buatan • Salah satu aplikasi membuat presentasi • Kumpulan fakta mentah yang belum diolah • Aplikasi GPS dan peta digital untuk navigasi • ...
DAMPAK SOSIAL INFORMATIKA 2023-11-08
Across
- salah satu fitur keamanan windows10
- Dampak sosial informatika
- angka sandi rahasia antara pengguna dan sistem
- perangkat lunakk yang menempel pada perangkat lain
- salah satu fitur windows security
- keamanan data di internet
- Data dapat berupa
- perkakas peretasan
Down
- pengkodean data sebelum dikirim
- contoh otentifikasi biomtrik
- pishing biasanya melakukan kejahatannya melalaui
- contoh sistem operasi
- contoh Perkakas melindungi data atau informasi
- sistem operasi seluler
- program komputer yang mampu menyalin dirinya sendiri kekomputer lain
- Data atau keterangan yang benar (fakta)
- perdagangan elektronik
- individu yang membool, melepaskan virus, membobol komputer untuk mrncuri informasi
- kesalahan dalam aplikasi atau program
- world wide web
20 Clues: world wide web • Data dapat berupa • perkakas peretasan • contoh sistem operasi • sistem operasi seluler • perdagangan elektronik • Dampak sosial informatika • keamanan data di internet • contoh otentifikasi biomtrik • pengkodean data sebelum dikirim • salah satu fitur windows security • salah satu fitur keamanan windows10 • kesalahan dalam aplikasi atau program • ...
TEMA 2 2025-10-24
Across
- Sistem keamanan data digital
- Platform untuk belajar atau kursus online
- Pembayaran digital via ponsel
- Promosi produk melalui media sosial
- Alat pembayaran otomatis di toko online
- Model bisnis online berbasis internet
- Teknologi untuk transaksi cepat dan aman
- Penyimpanan data online
- Uang digital yang digunakan secara global
- Platform jual-beli online
Down
- Layanan pengiriman barang berbasis digital
- Aktivitas jual-beli tanpa uang tunai
- Teknologi untuk mengenali wajah atau suara
- , Analisis data untuk strategi bisnis digital
- Platform untuk membangun toko online
- Layanan transportasi berbasis aplikasi
- Teknologi komunikasi internet cepat
- Sistem manajemen konten website
- , Layanan streaming konten digital
- ,Perangkat lunak untuk mengelola bisnis online
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Teknologi komunikasi internet cepat • Promosi produk melalui media sosial • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
TEMA 2 2025-10-24
Across
- Penyimpanan data online
- Platform untuk belajar atau kursus online
- Layanan pengiriman barang berbasis digital
- Aktivitas jual-beli tanpa uang tunai
- Uang digital yang digunakan secara global
- Pembayaran digital via ponsel
- Teknologi untuk transaksi cepat dan aman
- Promosi produk melalui media sosial
- Model bisnis online berbasis internet
- Platform untuk membangun toko online
- Teknologi komunikasi internet cepat
Down
- Platform jual-beli online
- , Layanan streaming konten digital
- Sistem manajemen konten website
- ,Perangkat lunak untuk mengelola bisnis online
- , Analisis data untuk strategi bisnis digital
- Sistem keamanan data digital
- Alat pembayaran otomatis di toko online
- Teknologi untuk mengenali wajah atau suara
- Layanan transportasi berbasis aplikasi
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Promosi produk melalui media sosial • Teknologi komunikasi internet cepat • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
FIT_Vocab.JT 2013-05-15
Across
- picture for a business
- internet service provider
- headphone port
- TB
- online presentation maker
- Wireless Fidelity
- flash drive, disc
- who is asking, what they asking, why are they asking
- Google Bing Yahoo
- flash drive plug in
- online protection
- GB
- smallest storage amount
- 3g 4g
- MG
Down
- light emitting diode
- speakers, printer
- cd drive
- computer screen
- Safari, iTunes, iMovie, App Store
- central circuit board
- main engine of computer
- central processing unit
- National Cyber Security Alliance
- online manners
- Random Access Memory
- KB
- eight bits
- liquid crystal display
29 Clues: TB • KB • GB • MG • 3g 4g • cd drive • eight bits • headphone port • online manners • computer screen • speakers, printer • Wireless Fidelity • flash drive, disc • Google Bing Yahoo • online protection • flash drive plug in • light emitting diode • Random Access Memory • central circuit board • picture for a business • liquid crystal display • main engine of computer • central processing unit • ...
Cybersecurity Terms Crossword Puzzle 2024-02-28
Across
- Secure connection for private browsing
- Hostage-taking malware for files
- Vulnerability before the fix
- Identity verification for access
- Computer virus and harmful software
- Guard against harmful computer viruses
- Protecting digital systems and data
- Monitor for malicious activities
- Deceptive emails for sensitive data
Down
- Deliberate act to disrupt systems
- Malicious software's harmful action
- Secretly records keystrokes for theft
- System's exploitable weak point
- Network traffic gatekeeper and monitor
- Secret entry to bypass security
- Impersonation for unauthorized access
- Secure data with secret code
- Authorized entities' access list
- Flood of traffic to disrupt
- Software update to fix vulnerabilities
20 Clues: Flood of traffic to disrupt • Vulnerability before the fix • Secure data with secret code • System's exploitable weak point • Secret entry to bypass security • Hostage-taking malware for files • Identity verification for access • Authorized entities' access list • Monitor for malicious activities • Deliberate act to disrupt systems • Malicious software's harmful action • ...
Technology 2023-06-11
Across
- (Step-by-step problem-solving procedure)
- (Global computer network)
- (Intelligence that mimics human behavior)
- (Securing data with codes)
- (Global Positioning System)
- (Pocket-sized mobile device)
- (Identification based on unique human characteristics)
- (Remote data storage and computing)
- (Wireless network connectivity)
- (Unmanned aerial vehicles)
- (Process of making systems operate automatically)
Down
- (Protection of computer systems)
- (Electronic data processing machine)
- (Distributed digital ledger)
- (Simulated or computer-generated)
- (Enhancement of real-world experiences with digital content)
- (Manipulation of matter at the atomic and molecular scale)
- (Field of building and programming robots)
- Printing (Additive manufacturing process)
- Data (Large sets of complex data)
20 Clues: (Global computer network) • (Securing data with codes) • (Unmanned aerial vehicles) • (Global Positioning System) • (Distributed digital ledger) • (Pocket-sized mobile device) • (Wireless network connectivity) • (Protection of computer systems) • (Simulated or computer-generated) • Data (Large sets of complex data) • (Remote data storage and computing) • ...
Wedding Crossword 2024-11-18
Across
- Where Bride was working when the couple met
- Amanda's middle name
- Bride’s favorite cuisine
- Month of the proposal
- Amanda's birth month
- Bride’s profession
- Location of the wedding venue
- Couple's favorite fantasy series
- Bride's Eye Color
- Groom’s favorite holiday
- Groom’s favorite takeout
Down
- Where the couple get engaged
- Russ' middle name
- Bride's favorite outdoor activity
- Russ' birth month
- Bride’s favorite holiday
- What Russ is in school for
- Groom's Eye Color
- # of years couple has been together
- Where Groom was born
- Couple's favorite hobby
- Their cat's name
- Groom's favorite hobby
- Where Bride was born
- Honeymoon Destination
25 Clues: Their cat's name • Russ' middle name • Russ' birth month • Groom's Eye Color • Bride's Eye Color • Bride’s profession • Amanda's middle name • Where Groom was born • Amanda's birth month • Where Bride was born • Month of the proposal • Honeymoon Destination • Groom's favorite hobby • Couple's favorite hobby • Bride’s favorite holiday • Bride’s favorite cuisine • Groom’s favorite holiday • ...
2025 CSS GRADUATES AND NEW MEMBERS 2025-05-20
Across
- Loves pina coladas and getting caught in the rain
- Johnston High School
- Kristina Davis
- BS IT Cybersecurity, University North Georgia
- University of Nebraska Grad
- Loves all things tennis, crafting and trying to become a better golfer
- M.S. Information Technology
- Supports Client Promos and Quality Control
- Andrew Pare
- Mitchell Harvey Jr.
Down
- Penn State Grad
- B.S. Marine Biology
- Jamie Worthy
- HS Diploma & CNA certification
- Where Michael Canizares graduated from
- Supports Production Validation and Quality Control
- Shaurya Chauhan
- May have a partridge in a pear tree
- Northview High Grad
- Where Sanjitha Eswaramoorthy graduated
- Loves short walks to the beer fridge
21 Clues: Andrew Pare • Jamie Worthy • Kristina Davis • Penn State Grad • Shaurya Chauhan • B.S. Marine Biology • Northview High Grad • Mitchell Harvey Jr. • Johnston High School • University of Nebraska Grad • M.S. Information Technology • HS Diploma & CNA certification • May have a partridge in a pear tree • Loves short walks to the beer fridge • Where Michael Canizares graduated from • ...
Jobs 2024-12-11
Across
- Grows crops or raises animals
- Serves food and drinks at a restaurant
- Designs and writes software programs
- Builds and maintains websites
- Manages networks and servers
- Devivers mail and packages
- Enforces laws and keeps order
- Treats people`s illnesses
- Bakes bread, cake, and pastries
- Cuts and styles hair
Down
- Helps students learn in school
- Codes mobile applications
- test software for errors
- Protects systems from hackers
- Oversees technology stategy in a company
- Designs user interfaces and experiences
- Create artificial intelligence solutions
- Analyzes data to provide insights
- Drives a vehicle for passengers
- Sells goods in a shop
20 Clues: Cuts and styles hair • Sells goods in a shop • test software for errors • Codes mobile applications • Treats people`s illnesses • Devivers mail and packages • Manages networks and servers • Grows crops or raises animals • Protects systems from hackers • Builds and maintains websites • Enforces laws and keeps order • Helps students learn in school • Drives a vehicle for passengers • ...
Cyber Safety 2024-08-06
8 Clues: - Bullying online • - Being safe online • - Protecting systems • - Supporting bullies • - Stands up against bullies • - Connected computers share resources • - Putting agressive presure on someone • - Sites that are accessed using a web browser
Cyber Security 2016-05-24
8 Clues: Has a trunk • Flying mammal • Large marsupial • What is my name? • Man's best friend • Likes to chase mice • What are we here for? • Steals data and holds it for ransom
Shayaans Life 2023-01-11
10 Clues: pc • what i do • what is aphone • My favorite game • where i used to live • what I have as a pet • what I have as another pet • something better than cookies • what is the base of a computer • what i think my future job is going to be
CYBER SECURITY 2023-09-20
Across
- to steal sensitive information
- malware
- protection of computing systems and data that these systems store
- set of rules
Down
- the virtual and dynamic space created by the machine clones
- protecting info.from inauthorized parties
- attack data to web application
- malicious software
- attack uses trial & attack method
- automated process
10 Clues: malware • set of rules • automated process • malicious software • to steal sensitive information • attack data to web application • attack uses trial & attack method • protecting info.from inauthorized parties • the virtual and dynamic space created by the machine clones • protection of computing systems and data that these systems store
Digital Literacy Vocabulary 2025-10-21
Across
- data tracking system to make suggestions to the viewer
- everything you do online
- think like a human
- protection online
- realistic but fake video
- reputable source has this
Down
- critical thinking when reading news online
- having a certain viewpoint towards something
- a place where information comes from
- false or misleading information
10 Clues: protection online • think like a human • everything you do online • realistic but fake video • reputable source has this • false or misleading information • a place where information comes from • critical thinking when reading news online • having a certain viewpoint towards something • data tracking system to make suggestions to the viewer
TTS TIK Neysha 8D 2025-10-12
Across
- proses masuk ke sebuah sistem
- ketika perangkat berhenti merespon secara permanen
- tempat penyimpanan file
- perangkat lunak yang bisa merusak sistem
- perlindungan terhadap ancaman digital
Down
- otak komputer, nama lain CPU
- jenis malware yang bisa menyebar dan merusak data
- sebutan program komputer
- sebutan alamat web
- salinan data untuk cadangan
10 Clues: sebutan alamat web • tempat penyimpanan file • sebutan program komputer • salinan data untuk cadangan • otak komputer, nama lain CPU • proses masuk ke sebuah sistem • perlindungan terhadap ancaman digital • perangkat lunak yang bisa merusak sistem • jenis malware yang bisa menyebar dan merusak data • ketika perangkat berhenti merespon secara permanen
October Cybersecurity Month 2019-09-19
Across
- A device you should not plug in
- Last name of the head of IT
- Location of the Bank's Disaster Recovery Site
- Type of an Operating system
- key word used to send secure email
- Programs installed on your phone are called?
- Think before you -- ?
Down
- A type of malware that encrypts your file
- Something you should never share
- A type of an email scam
- Department to call for computer problem
- Location of the Bank's head quarter
- Northern Bank's Mission Statement
- Password should always be?
- A way to access the bank resources remotely
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Last name of the head of IT • Type of an Operating system • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
October Cybersecurity Month 2019-09-19
Across
- Something you should never share
- A type of an email scam
- Location of the Bank's Disaster Recovery Site
- Northern Bank's Mission Statement
- Last name of the head of IT
- Department to call for computer problem
- Location of the Bank's head quarter
- Password should always be?
Down
- A type of malware that encrypts your file
- Type of an Operating system
- Think before you -- ?
- A way to access the bank resources remotely
- Programs installed on your phone are called?
- key word used to send secure email
- A device you should not plug in
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Type of an Operating system • Last name of the head of IT • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What device monitors and controls incoming and outgoing network traffic?
- What is a digital document that verifies the ownership of a public key?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of converting data into a fixed-size string of characters for security?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of converting ciphertext back into plaintext?
- What type of malware disguises itself as legitimate software?
- What type of malware records keystrokes made by a user?
Down
- What is a physical or digital object used to prove identity in security systems?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- What term refers to malicious software designed to harm or exploit devices?
- What term refers to the permission to enter or use a system or network?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of verifying the identity of a user or system?
- What is the process of creating copies of data to restore in case of loss?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Cybersecurity Week 2025 2025-08-27
Across
- Publishing someone's personal information online without their consent
- Users are tricked into revealing sensitive information to gain access to a system
- A form a social engineering that is done via email or other messages
- Area of study where machines are programmed to reason, learn and act similar to human intelligence
- Software that causes damage to data and software
- A network device used to separate an internal network from an external network, usually the Internet
- Software to disrupt, damage or gain unauthorised access to a computer system
- Any or a combination of usernames, passwords or biometrics to access a system
Down
- Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
- A technique used to disguise the sender's identity to gain sensitive information
- A method of writing that disguises a message
- Type of threat that has the potential to or cause actual damage that can be done to an organisation by a person with authorized access to systems
- Malicious software that prevents access to a system until a ransom is paid
- Sofware that automatically subjects a user to advertisements
- A person who uses computers to gain unauthorized access to data
15 Clues: A method of writing that disguises a message • Software that causes damage to data and software • Sofware that automatically subjects a user to advertisements • A person who uses computers to gain unauthorized access to data • A form a social engineering that is done via email or other messages • ...
Week 6-7 spelling 2016-03-01
Across
- a decorative plate to finish motor vehicles
- to be someone's favorite
- a device to look at stars
- you usually hit BALLS with this
- to put up with something
- to think or believe that something is true
- to cancel something
Down
- to blend in
- to be safe online
- a device to look at very very small things
- to make a continuous low humming sound
- an area of land
- to make up your mind
- to secretly get married
- the past tense of strive
15 Clues: to blend in • an area of land • to be safe online • to cancel something • to make up your mind • to secretly get married • to be someone's favorite • to put up with something • the past tense of strive • a device to look at stars • you usually hit BALLS with this • to make a continuous low humming sound • a device to look at very very small things • ...
PeopleTec Engineering Week 2024-02-12
Across
- operations security
- exploratory programming marathon session
- use of scientific discoveries for practical purposes
- people first, technology always
- cyberattack prevention measures
- composing instructions for a computer to follow
- individual that provides products or services to the government
- Information technology role responsible for data security
Down
- representation of a real-world system
- training algorithms to create self-learning models
- designing and experimenting with a model
- connected computer systems
- professional problem solver
- next generation...
- document attesting to a level of achievement
15 Clues: next generation... • operations security • connected computer systems • professional problem solver • people first, technology always • cyberattack prevention measures • representation of a real-world system • exploratory programming marathon session • designing and experimenting with a model • document attesting to a level of achievement • ...
Cyberbullying 2024-05-02
Across
- Platforms where cyberbullying often occurs.
- Connected to the internet.
- Malicious digital intrusion.
- Online harassment targeting high school students.
- Person who intimidates or mistreats others.
- Persistent online abuse or intimidation.
- Measures taken to protect against online threats.
Down
- Individual singled out for cyberbullying.
- Moral principles governing online behavior.
- Person who posts provocative or offensive messages.
- Without a known identity.
- Someone subjected to cyberbullying.
- Illegal activities carried out online.
- Relating to electronic technology.
- Online space for real-time communication.
15 Clues: Without a known identity. • Connected to the internet. • Malicious digital intrusion. • Relating to electronic technology. • Someone subjected to cyberbullying. • Illegal activities carried out online. • Persistent online abuse or intimidation. • Individual singled out for cyberbullying. • Online space for real-time communication. • ...
Browsing safely 2025-06-19
Across
- hoaxing or misleading
- harming or harassing using information technology
- illegal entry in computer
- illegal method to get money
- security to prevent cybercrime
- disturbs normal functioning of computer
- act of stealing and misusing someone's personal information
- building a face friendship
- any information about a person can be found
- conduct a terrosism by computer
Down
- protects from virus
- any criminal activity intended to harm anyone using computer
- complaining against cybercrime
- that helps in preventing unauthorised access to your computer
- protects from cyber crime
15 Clues: protects from virus • hoaxing or misleading • illegal entry in computer • protects from cyber crime • building a face friendship • illegal method to get money • complaining against cybercrime • security to prevent cybercrime • conduct a terrosism by computer • disturbs normal functioning of computer • any information about a person can be found • ...
Brain Harvest 2025-09-18
Across
- Connection of computers… or professionals.
- Kevin Costner baseball arena.
- The way kids sit these days, with applesauce (2 wds).
- Psychological bias effect, or glow above head.
- Business advantage… or a physics principle.
- First line of cybersecurity defense.
Down
- Bavarian beer-and-brats festival.
- Exit plan to gather crops?
- Cult-classic 1993 witchy Disney movie (2 wds).
- Patron saint of the internet.
- The Friendly Ghost.
- Late-night work shift.
- Balance sheet positives.
- Spooky arachnid creation.
- Payoff metric for a project, abbr.
15 Clues: The Friendly Ghost. • Late-night work shift. • Balance sheet positives. • Spooky arachnid creation. • Exit plan to gather crops? • Kevin Costner baseball arena. • Patron saint of the internet. • Bavarian beer-and-brats festival. • Payoff metric for a project, abbr. • First line of cybersecurity defense. • Connection of computers… or professionals. • ...
Crossword - Harold Benjamin 2023-09-08
Across
- Financial institution licensed
- Stationery company
- Fraudulent practice of acquiring sensitive data via emails
- Document sent via telecommunications
- Concealing management of illegally earnt money
- Protection of computer systems and networks
- Secured lending partner (last name)
- Goddess of health
- Client booking system at HH
- Transfer of property from one to another
- Private client partner (last name)
Down
- Equitable and fair treatment
- Operations director (last name)
- Dishonest persuasion with a gift or money
- Process of taking legal action
- Emailing system at HB
- Folder of court documents
- Offsite archiving company
- Case management system at HB
- Qualified legal professional
- Managing partner (last name)
21 Clues: Goddess of health • Stationery company • Emailing system at HB • Folder of court documents • Offsite archiving company • Client booking system at HH • Equitable and fair treatment • Case management system at HB • Qualified legal professional • Managing partner (last name) • Financial institution licensed • Process of taking legal action • Operations director (last name) • ...
TTS INFORMATIKA DARA CANTIKA DINSKY X-G 2025-04-10
Across
- tugas cybersecurity engineer
- tujuan diseminasi konten
- urutan hasil pencarian
- tugas web developer
- manfaat pendaftaran HAKI
- menyimpan data website
- tugas programmer
- contoh search engine
- konsekuensi pelanggaran HAKI
- metode validasi konten negatif
- apa itu merek dagang?
- konsekuensi konten negatif
- platform diseminasi konten digital
- tugas data scientist
- tantangan validasi konten negatif
Down
- kepentingan unsur budaya
- tujuan validasi konten negatif
- pencegahan pelanggaran budaya
- tugas search engine
- tugas database administrator
- apa itu hak cipta?
- apa itu konten negatif?
- contoh konten digital berunsur budaya
- apa itu paten?
- proses pencarian data website
25 Clues: apa itu paten? • tugas programmer • apa itu hak cipta? • tugas search engine • tugas web developer • contoh search engine • tugas data scientist • apa itu merek dagang? • urutan hasil pencarian • menyimpan data website • apa itu konten negatif? • kepentingan unsur budaya • tujuan diseminasi konten • manfaat pendaftaran HAKI • konsekuensi konten negatif • tugas cybersecurity engineer • ...
Jessie & Kurt 2025-03-24
Across
- Jessie's profession
- Kurt's middle name
- The proposal location
- Kurt's favorite pizza
- What College did Jessie go to
- How did they meet
- What month did they get engaged
- First date location
- Jessie's middle name
- Kurt's profession
- How many siblings does Kurt have
Down
- What TV show are they currently binging
- Where was their first vacation
- Jessies favorite food
- Where was their last trip together
- Favorite hobby together
- Jessie's birthday month
- Kurt's birthday month
- What College did Kurt go to
- What is their pet's name
- How many years have they been together
- How many siblings does Jessie have
22 Clues: How did they meet • Kurt's profession • Kurt's middle name • Jessie's profession • First date location • Jessie's middle name • Jessies favorite food • The proposal location • Kurt's birthday month • Kurt's favorite pizza • Favorite hobby together • Jessie's birthday month • What is their pet's name • What College did Kurt go to • What College did Jessie go to • Where was their first vacation • ...
TEMA 2 2025-10-24
Across
- Promosi produk melalui media sosial
- Aktivitas jual-beli tanpa uang tunai
- Layanan pengiriman barang berbasis digital
- Sistem keamanan data digital
- Uang digital yang digunakan secara global
- Platform untuk membangun toko online
- Teknologi untuk mengenali wajah atau suara
- Penyimpanan data online
Down
- , Analisis data untuk strategi bisnis digital
- Platform untuk belajar atau kursus online
- Alat pembayaran otomatis di toko online
- Pembayaran digital via ponsel
- Teknologi komunikasi internet cepat
- Model bisnis online berbasis internet
- Platform jual-beli online
- Teknologi untuk transaksi cepat dan aman
- , Layanan streaming konten digital
- Sistem manajemen konten website
- ,Perangkat lunak untuk mengelola bisnis online
- Layanan transportasi berbasis aplikasi
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Promosi produk melalui media sosial • Teknologi komunikasi internet cepat • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
Cybersecurity 2022-11-01
6 Clues: ___ should use a unsecure password • The best passwords are easy to ____ • Is this a strong password: Muff1n M@n!! • Should you make your password 5 characters? • A strong password has at least __ characters • The best passwords have lowercase and __ letters
Cybersecurity 2023-08-14
Across
- Designed to deny a user or organisation access to files on their computer.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
- Intrusive software developed to steal data and damage or destroy computers and computer systems.
- When attackers attempt to trick users into doing 'the wrong thing.
- Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
6 Clues: When attackers attempt to trick users into doing 'the wrong thing. • Designed to deny a user or organisation access to files on their computer. • Intrusive software developed to steal data and damage or destroy computers and computer systems. • The act of compromising digital devices and networks through unauthorized access to an account or computer system. • ...
Cybersecurity 2024-02-29
Across
- is a cyber attack intended to redirect a website's traffic to another, fake site
- PIN numbers.
- is the act of creating a scenario where the victim gives out personal information
Down
- is observing a person's private information over their shoulder e.g. cashpoint
- is a technique of fraudulently obtaining private information, often using email or SMS.
- Malicious software is called?
6 Clues: PIN numbers. • Malicious software is called? • is observing a person's private information over their shoulder e.g. cashpoint • is a cyber attack intended to redirect a website's traffic to another, fake site • is the act of creating a scenario where the victim gives out personal information • ...
Cybersecurity 2025-11-24
Across
- Malware that attaches to files and spreads when the files are shared
- Raw facts or figures that can be collected and stored
- bullying online
Down
- Fake emails or messages designed to trick people into revealing personal information
- people looking over your shoulder
- Software that automatically displays unwanted advertisements
6 Clues: bullying online • people looking over your shoulder • Raw facts or figures that can be collected and stored • Software that automatically displays unwanted advertisements • Malware that attaches to files and spreads when the files are shared • Fake emails or messages designed to trick people into revealing personal information
AWS 2024-08-14
NAVFAC's Ten Capabilities 2023-02-13
Across
- ________Facilities and Equipment Engineering
- detailed coordination of a complex operation involving people, facilities, or supplies.
- NAVFAC Capabilities: ______ & Construction
- NEPA requirement: Environmental __________
- a proposed or planned undertaking
- NAVFAC Capabilities: Environmental ___________
- Real Estate _________ and Management
- Basic physical and organizational structures and facilities
- ________ Handling Ashore Procurement
Down
- Protection against criminal or unauthorized use of electronic data
- Military Construction Acronym
- _______ and Facilities Operations
- ___________ Conservation: Health assessment of natural and cultural resources
- NAVFAC Capabilities: _________ & Facility Operations
- _________ Vehicles provide transportation services
15 Clues: Military Construction Acronym • _______ and Facilities Operations • a proposed or planned undertaking • Real Estate _________ and Management • ________ Handling Ashore Procurement • NAVFAC Capabilities: ______ & Construction • NEPA requirement: Environmental __________ • ________Facilities and Equipment Engineering • NAVFAC Capabilities: Environmental ___________ • ...
Issue 1 2023-04-14
Across
- Teacher in charge of MagTV
- Farm behind Magnolia
- Water sports (not necessarily just swimming)
- Vietnamese Dual Language Immersion Program
- Magnolia _______ Institute
- City we're located in
Down
- Girls' soccer and ________ made it to CIF
- The classic writing tool for students (that always seems to go missing when you need it)
- Book and _____ Club
- Associated Student Body
- Room 404 teacher
- Medical pathway, BITA, and JROTC are ___ programs
- Teacher in charge of Theater classes
13 Clues: Room 404 teacher • Book and _____ Club • Farm behind Magnolia • City we're located in • Associated Student Body • Teacher in charge of MagTV • Magnolia _______ Institute • Teacher in charge of Theater classes • Girls' soccer and ________ made it to CIF • Vietnamese Dual Language Immersion Program • Water sports (not necessarily just swimming) • ...
Nicole & Sam 2023-04-26
Across
- What is Sam's favorite color?
- Nicole's major in college
- The couple's favorite football team
- Where they went the night they met
- Sam's major in college
- The bride's new last name
Down
- Groom's middle name
- Who is the couple's dog?
- Bride's first name
- Name of restaurant where the couple had their first date
- Where Sam went to college
- Where Nicole went to college
- Who made the first move?
- number of years together
14 Clues: Bride's first name • Groom's middle name • Sam's major in college • Who is the couple's dog? • Who made the first move? • number of years together • Where Sam went to college • Nicole's major in college • The bride's new last name • Where Nicole went to college • What is Sam's favorite color? • Where they went the night they met • The couple's favorite football team • ...
words related to AI 2025-10-25
Across
- teaching an AI model using examples
- step-by-step process AI uses to make decisions
- the ability to identify objects or faces
- moral principles guiding decisions
- unfairness in AI decisions
- protection against digital attacks
Down
- the ability to think and reason
- use of machines to do human tasks
- information collected for analysis
- global computer network
- overeliance on technology
- AI program that talks with users
- protection of personal information
- physical AI machine
14 Clues: physical AI machine • global computer network • overeliance on technology • unfairness in AI decisions • the ability to think and reason • AI program that talks with users • use of machines to do human tasks • information collected for analysis • moral principles guiding decisions • protection of personal information • protection against digital attacks • ...
Cybersecurity 2022-08-15
6 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • The United States' first state-specific consumer privacy law
Cybersecurity 2022-11-01
6 Clues: ___ should use a unsecure password • The best passwords are easy to ____ • Is this a strong password: Muff1n M@n!! • Should you make your password 5 characters? • A strong password has at least __ characters • The best passwords have lowercase and __ letters
Cybersecurity 2024-01-09
6 Clues: Type of social engineering attack • A secret code to access your account • Software update to fix vulnerabilities • Malicious code that can harm your computer • Protective barrier against unauthorized access • Process of converting data to prevent unauthorized access
Cybersecurity 2022-09-29
Across
- An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
- Attacker invents a scenario in order to convince the victim to give them data or money.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- Sending an email designed to trick the recipient into giving away personal information
- Any malware that misleads users of its true intent.
- Someone that gains unauthorised access to a device or sever.
6 Clues: Any malware that misleads users of its true intent. • Someone that gains unauthorised access to a device or sever. • Sending an email designed to trick the recipient into giving away personal information • Attacker invents a scenario in order to convince the victim to give them data or money. • ...
Digital Learning 2025-10-13
Across
- — Machines that learn and think
- — Using tech to improve processes
- — Protection from online threats
- — Making new things with tech
- — Working as a team online
Down
- — Skill to read and use information well
- — Channels for stories and news online
- — Smooth and confident tech use
- — Abilities for digital success
- — Tools that help communication and info
- — Turning paper into data
- — Gadgets that connect us digitally
- — Doing right with online actions
- — Innovations shaping the future
14 Clues: — Turning paper into data • — Working as a team online • — Making new things with tech • — Smooth and confident tech use • — Abilities for digital success • — Machines that learn and think • — Protection from online threats • — Innovations shaping the future • — Using tech to improve processes • — Doing right with online actions • — Gadgets that connect us digitally • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Topic 1 - 4 Vocabulary 2026-02-13
Across
- Proof of purchase
- A group of related episodes
- Money you can spend in a shop instead of cash
- Visual images used to explain information
- Being friendly and welcoming
- The main person in a story
- An official public statement
- A custom passed down through generations
- A system that chooses online content
Down
- Protection against digital attacks
- Rules of a company
- A short news titl
- To look at websites
- A regularly updated online journal
- A public display of art
- A shop or manufacturer guarantee
- Money returned to a customer
- Not working properly
18 Clues: Proof of purchase • A short news titl • Rules of a company • To look at websites • Not working properly • A public display of art • The main person in a story • A group of related episodes • Being friendly and welcoming • Money returned to a customer • An official public statement • A shop or manufacturer guarantee • Protection against digital attacks • ...
Tech Talk 2024-03-23
Across
- Machine mimicking human intelligence
- Machines that work like humans
- Global network of computers
- A place you can visit without leaving your chair
- Math behind problem-solving
- Can be plug in many devices
- The brain of a computer
- Protects your computer from attacks
Down
- A field that protect computer systems,networks from digital attacks.
- Graphics processor unit
- Physical parts of a computer
- Getting a file from the internet
- A collection of data
- Malicious software
- The programs of computer
- Needs a mouse and keyboard
16 Clues: Malicious software • A collection of data • Graphics processor unit • The brain of a computer • The programs of computer • Needs a mouse and keyboard • Global network of computers • Math behind problem-solving • Can be plug in many devices • Physical parts of a computer • Machines that work like humans • Getting a file from the internet • Protects your computer from attacks • ...
Cybersecurity : Keselamatan Sosial Media 2023-06-02
Across
- Fikir sebelum __
- Kebiasaan phishing dilakukan melalui __
- Sejenis malware yang menyerang komputer sehingga dituntut tebusan
- Set strict __ pada akaun media sosial
- Perbuatan mencuri maklumat peribadi seseorang
- Sejenis scam menggunakan e-mel atau mesej
- Sejenis bully yang berlaku dalam talian
Down
- Sosial media merupakan satu rangkaian __
- Cyberbully dilakukan melalui text, imej dan __
- Tutup __ lama
- Maklumat peribadi
- Amalan melindungi rangkaian daripada serangan digital
12 Clues: Tutup __ lama • Fikir sebelum __ • Maklumat peribadi • Set strict __ pada akaun media sosial • Kebiasaan phishing dilakukan melalui __ • Sejenis bully yang berlaku dalam talian • Sosial media merupakan satu rangkaian __ • Sejenis scam menggunakan e-mel atau mesej • Perbuatan mencuri maklumat peribadi seseorang • Cyberbully dilakukan melalui text, imej dan __ • ...
Lesson 1.3 2023-03-08
8 Clues: bugs and … • financial information • arise new security issues • they mitigate vulnerabilities • personal identity information • its top priority is make money • a weakness or a lack of countermeasures • it's a byproduct of technological change
Technology in PMI 2024-04-19
8 Clues: online safety • detects changes • design trial phase • base or foundation • new creative ideas • problem solver, creator • a machine that compresses the leaves • a simplified model or imitation of an object or a process
NCSAM 2021 Crossword 2021-08-05
Across
- TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
- Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
- What malware propagates without a host program?
- Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
- A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
- What does the A in CAP stand for?
- What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
- What malware encrypts files and demands money for the decryption key?
- This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
- What is the last name of the TIAA Bank CISO?
- A good way to secure your devices at home is by regularly _______
- What type of attack do patches not prevent against?
- The probability of exposure or loss of assets is considered what?
- What type of information is private and identifies people?
- What technology allows information sent over the internet to remain private or confidential?
- What do most modern websites use to provide encryption?
- Which industry is most targeted by social engineers?
- Multifactor _____ adds extra layers of security when logging in.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
19 Clues: What does the A in CAP stand for? • What is the last name of the TIAA Bank CISO? • What malware propagates without a host program? • What type of attack do patches not prevent against? • Which industry is most targeted by social engineers? • What do most modern websites use to provide encryption? • This year Cyber has rebranded as TIAA _____ Cybersecurity • ...
Cybersecurity 2020-08-24
Across
- Proposito informatico de detectar virus
- Estafa que busca sacrte datos bancarios, o tarjetas
- Se quedan con tu informacion como la de ingreso, nombre de usuario no espian
Down
- Sofwtare malo que esta hecho para meterse infiltradamente a una computadora
- Programas que no son originales y que te cambian y inhabilitan el acceso a tu computadora
- Hace que no pueda entrar nadie infiltrado a tu computadora
6 Clues: Proposito informatico de detectar virus • Estafa que busca sacrte datos bancarios, o tarjetas • Hace que no pueda entrar nadie infiltrado a tu computadora • Sofwtare malo que esta hecho para meterse infiltradamente a una computadora • Se quedan con tu informacion como la de ingreso, nombre de usuario no espian • ...
Cybersecurity 2025-03-28
Across
- artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
- The practice of protecting systems, networks, and programs from digital attacks
- a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
- When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
- how many KUB(TYREX) stations in PTTEP YADANA Asset in total
- What is the minimum number of characters for PTTEP YADANA Asset user accounts
6 Clues: how many KUB(TYREX) stations in PTTEP YADANA Asset in total • What is the minimum number of characters for PTTEP YADANA Asset user accounts • The practice of protecting systems, networks, and programs from digital attacks • When you got a phishing email, you should (_____) by clicking report phishing button in Outlook. • ...
Puzzle #4 2024-05-07
Across
- corrective action/suggestions for improvement
- proof
- process effected by management to provide reasonable assurance
- daily paid union
- an illegal act for financial or personal gain
- protecting sensitive information from unauthorised persons
Down
- monthly paid union
- formal statement of organisation's goal and objectives
- protecting systems, networks, and programs from digital attacks
- proper disclosure of financial information
- competing interest
- highest governing body
- event/action that negatively affects the achievement of objectives
13 Clues: proof • daily paid union • monthly paid union • competing interest • highest governing body • proper disclosure of financial information • corrective action/suggestions for improvement • an illegal act for financial or personal gain • formal statement of organisation's goal and objectives • protecting sensitive information from unauthorised persons • ...
Xoxo 2024-12-23
9 Clues: A group of mutants • Fingers of the foot • Home of the panthers • Serial killer TV show • My favorite shoe store • My least favorite word • what is your best trait • Protection of the internet • what I’d like to do to your bells
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
Binalyze Crossword 2025-05-09
Across
- The system or device under investigation in a forensic acquisition.
- What is the name of Binalyze’s new AI-powered tool?
- What was the name of Binalyze's first product designed to collect evidence from a single machine?
- A personality assessment framework that categorizes individuals based on dominant behavioral traits to improve workplace communication and collaboration.
- A cybersecurity specialist who creates and improves systems to detect malicious activity by analyzing behaviors, tuning detection rules, and staying ahead of evolving threats. ... Engineer
- At which conference did Binalyze win the Best Security Investigation Platform award?
Down
- Who at Binalyze is known for their passion for antique items?
- The type of log or trace left behind by users or malware that forensics experts analyze.
- At which competition did Binalyze win the Gold award in the Incident Analysis & Response Solution category?
- In Binalyze's guiding philosophy OODA, what does the letter D stand for?
- What is the name of the advanced analysis engine developed by the Binalyze team, designed to outperform rule-based tools like YARA and Sigma in analyzing cybersecurity incidents?
- In which Gartner category is Binalyze listed?
12 Clues: In which Gartner category is Binalyze listed? • What is the name of Binalyze’s new AI-powered tool? • Who at Binalyze is known for their passion for antique items? • The system or device under investigation in a forensic acquisition. • In Binalyze's guiding philosophy OODA, what does the letter D stand for? • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
4IR Technologies Pillars 2023-09-11
10 Clues: 4IR Act element (S) • 4IR Act element (3) • 4IR Act element (A) • 4IR Act element (A) • 4IR Sense element (C) • 4IR Sense element (C) • 4IR Sense element (I) • 4IR Analysis element (A) • 4IR Analysis element (C) • 4IR Analysis element (B)
ict 2023-09-16
Across
- unwanted and unsolicited email.
- machine that processes data.
- a structured collection of data.
- prevents data loss.
- writing code to instruct a computer.
- helps data find its way
- return to an initial state.
- Usually in one location.
- online storage and computing resources.
- blocks unwanted traffic
Down
- connects devices in a network.
- step-by-step procedure for solving a problem.
- wireless data transfer technology.
- programs that run on a computer.
- protecting computer systems from threats.
- a global network of connected computers.
- technology that allows data transmission without physical connections.
- keeps data secure.
- electroniconic communication method for sending and receiving messages.
- the global system of interconnected computer networks.
20 Clues: keeps data secure. • prevents data loss. • helps data find its way • blocks unwanted traffic • Usually in one location. • return to an initial state. • machine that processes data. • connects devices in a network. • unwanted and unsolicited email. • a structured collection of data. • programs that run on a computer. • wireless data transfer technology. • ...
Cybersecurity Awareness Month 2024-10-16
Across
- A type of malware that demands payment in exchange for restoring access to data
- A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
- Creating a copy of data to prevent its loss in case of a disaster or data breach
- A type of software that is designed to damage or exploit a computer system
- The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
- The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
- The process of verifying the identity of a user, device, or system
Down
- A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- Type of malware that allows an attacker to remotely control a system or network
- A network that encrypts internet connections and helps secure remote access to a network
- Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
- Unsolicited, unwanted, and often malicious messages sent in bulk.
- Attack where an attacker gains unauthorized access to a system or network
- The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.
14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk. • The process of verifying the identity of a user, device, or system • Attack where an attacker gains unauthorized access to a system or network • A type of software that is designed to damage or exploit a computer system • ...
Cybersecurity Awareness Month 2024-10-18
Across
- Common type of cyberattack where the hacker encrypts your files and demands payment.
- A ____ test is performed to identify vulnerabilities in a system.
- This form of attack tries to trick you into giving personal information via fake websites or emails.
- A phishing attack done over the phone.
- The process of verifying someone's identity.
- A strong, complex one helps protect your accounts.
Down
- A person who attempts to gain unauthorized access to your system.
- A type of phishing attack done over text messages.
- A software that fights off malicious viruses and malware.
- The backbone of secure communication online, abbreviated as SSL.
- Protection against unauthorized changes to data.
- Multi-Factor Authentication is shortened to this.
- A harmful program disguised as legitimate software.
- A malicious code that spreads from computer to computer.
14 Clues: A phishing attack done over the phone. • The process of verifying someone's identity. • Protection against unauthorized changes to data. • Multi-Factor Authentication is shortened to this. • A type of phishing attack done over text messages. • A strong, complex one helps protect your accounts. • A harmful program disguised as legitimate software. • ...
SANS CyberSecurity Crossword 2021-01-11
Across
- A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- An attempt by hackers to damage or destroy a computer network or system.
- Computational Procedure
- Conceals the data’s original meaning to prevent it from being known or used.
- A software exploit that involves a combination of attacks against different vulnerabilities (7,6)
- A standalone malware computer program that replicates itself in order to spread to other computers
- Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. (9,4)
- Text files with small pieces of data
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
- Designed to detect and destroy computer viruses
- Any malicious computer program which is used to hack into a computer by misleading users of its true intent.(6,5)
- A large number of compromised computers
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Often installed after a compromise happens (4,4)
14 Clues: Computational Procedure • Text files with small pieces of data • A large number of compromised computers • Designed to detect and destroy computer viruses • Often installed after a compromise happens (4,4) • An attempt by hackers to damage or destroy a computer network or system. • Conceals the data’s original meaning to prevent it from being known or used. • ...
